scholarly journals Digital Identity Management on Social Media: Exploring the Factors That Influence Personal Information Disclosure on Social Media

2020 ◽  
Vol 12 (23) ◽  
pp. 9994
Author(s):  
Joseph Kwame Adjei ◽  
Samuel Adams ◽  
Isaac Kofi Mensah ◽  
Peter Ebo Tobbin ◽  
Solomon Odei-Appiah

A number of social media platforms have emerged as dominant medium for societal discourse, enabling significant user involvement in creation and shaping of social media contents. However, the phenomenon raises the challenge of digital identity management on such platforms in order to maintain reputations and ensure information privacy preservation. This study examined the factors that influence users’ decision to disclose personal information on Social Media and their antecedents. We employed a mixed-methods approach based on analysis of data of 250 respondents from tertiary institutions in Ghana, and 8 focus group discussions comprising 86 participants. The results revealed a lack of user awareness and appreciation of the limitations of the privacy settings on social media platforms. Secondly, we observed that users’ ability to establish the legitimacy of parties to social media interactions are fundamental requirements in how individuals engage social media. Finally, there is a disparity between information privacy concerns and actual privacy practices of users on social media.

2021 ◽  
Vol ahead-of-print (ahead-of-print) ◽  
Author(s):  
Heather J. Parker ◽  
Stephen Flowerday

Purpose Social media has created a new level of interconnected communication. However, the use of online platforms brings about various ways in which a user’s personal data can be put at risk. This study aims to investigate what drives the disclosure of personal information online and whether an increase in awareness of the value of personal information motivates users to safeguard their information. Design/methodology/approach Fourteen university students participated in a mixed-methods experiment, where responses to Likert-type scale items were combined with responses to interview questions to provide insight into the cost–benefit analysis users conduct when disclosing information online. Findings Overall, the findings indicate that users are able to disregard their concerns due to a resigned and apathetic attitude towards privacy. Furthermore, subjective norms enhanced by fear of missing out (FOMO) further allows users to overlook potential risks to their information in order to avoid social isolation and sanction. Alternatively, an increased awareness of the personal value of information and having experienced a previous privacy violation encourage the protection of information and limited disclosure. Originality/value This study provides insight into privacy and information disclosure on social media in South Africa. To the knowledge of the researchers, this is the first study to include a combination of the theory of planned behaviour and the privacy calculus model, together with the antecedent factors of personal valuation of information, trust in the social media provider, FOMO.


2021 ◽  
Vol 12 (44) ◽  
pp. 22-36
Author(s):  
Busra ERTOGRUL ◽  
Gizem KILICSIZ ◽  
Aysun BOZANTA

Social media platforms have become an inevitable part of our daily lives. Companies that noticed the intense use of social media platforms started to use them as a marketing tool. Even ordinary people have become famous by social media and companies have been sending their products to them to try and advertise. Many people have gained a considerable amount of money in this way and today new jobs are emerged like "Youtuber" and "Instagram Influencer". Therefore, ordinary people realized the power of social media and many people started to strength their digital identity over social media. The question raising in people’s mind is that “What is the difference between the influencers and the ordinary people who have also digital identity over social media?”. This study examined Instagram influencers for five categories namely fashion, makeup, photography, travel, and fitness in Turkey. As an exploratory study, the relationship between the influencers’ average number of posts, the number of likes, the number of views, the number of comments, number of followers, and the number of following were examined. As well as the engagement rates of the followers to the influencers were calculated. In addition, the words they mostly used in the captions of the posts were examined.


Author(s):  
Joseph Kwame Adjei

Monetization of personal identity information has become a major component of modern business models, contributing to dramatic innovations in the collection, aggregation, and use of personal information. This phenomenon is commonplace given that parties to business transactions and social interactions usually rely on the issue of claims and disclosure of unique attributes and credentials for proof and verification of identity. However, the heightened societal information privacy concerns and the diminishing level of trust between transacting parties make such attempts to monetize personal information a very risky endeavor. This chapter examines the major technological and regulatory imperatives in the monetization of personal identity information. The resulting monetization model provides an important source of reference for effective monetization of personal information.


Author(s):  
Joseph Kwame Adjei

Monetization of personal identity information has become a major component of modern business models, contributing to dramatic innovations in the collection, aggregation, and use of personal information. This phenomenon is commonplace given that parties to business transactions and social interactions usually rely on the issue of claims and disclosure of unique attributes and credentials for proof and verification of identity. However, the heightened societal information privacy concerns and the diminishing level of trust between transacting parties make such attempts to monetize personal information a very risky endeavor. This chapter examines the major technological and regulatory imperatives in the monetization of personal identity information. The resulting monetization model provides an important source of reference for effective monetization of personal information.


Author(s):  
Sophia Alim

Cyberbullying amongst teenagers is a major issue, due to their increased use of social media. Previous literature surveys have not covered in detail cyberbullying studies in 2014 and cyberbullying risk factors. This literature review explores cyberbullying research areas, such as the use of social media by teenagers, themes from cyberbullying studies carried out since 2012, cyberbullying risk factors and how teenagers deal with cyberbullying incidents. Current cyberbullying studies highlighted issues such as the high volume of cyberbullying incidents in school, increased personal information disclosure on social media, peer influences and the safety of the school environment for both bully and victim. Studies focusing on cyberbullying risk factors raised debates on factors such as whether males or females are most likely to be victims/cyberbullies. Tackling cyberbullying requires awareness, education for actors involved in cyberbullying, development of software to detect cyberbullying and including actors in the monitoring of cyberbullying.


Author(s):  
Venetis Kanakaris ◽  
Georgios Lampropoulos ◽  
Kerstin Siakas

Nowadays, social media and social networks are increasingly used in business as they have drastically changed the way the community works, communicates, collaborates, socialises, creates content and shares knowledge and ideas. However, in particular, IT professionals and practitioners need to be aware of online security and privacy issues and the potential negative impact that they may cause on different aspects of business, such as online breaches or information theft. The use of social media inevitably leads to disclosure of personal information, with the use of open-source intelligence (OSINT) and other similar techniques. Hence, the aim of this article is twofold, namely first to show results of a survey towards future Greek IT practitioners regarding awareness and viewpoints of social media users concerning security and privacy on social media. More specifically the study was based on responses and viewpoints of 178 Greek electrical engineering and IT students to an online questionnaire. Secondly, the aim is also to show how easily a potential malicious user can anonymously track and retrieve sensitive personal information in an automated and undetectable way from popular social media platforms by using publicly available information, resources, and tools. The results of the survey show that most of the respondents are aware of the privacy settings of the social media platforms they use. However, they consider that they should be more careful concerning personal data and whom they add as friends or followers and they do not feel comfortable with the fact that a stranger might be able to access their personal information through their publications on social media platforms.The case study indicates that it is possible for malicious users to acquire sensitive personal data (e.g. user's location via tweets and instas from smartphones). In addition, the ability to map activity could allow malicious users to track the activities of unsuspected users and predict their future locations.


Sign in / Sign up

Export Citation Format

Share Document