TY - GEN
T1 - Launching the new profile on Facebook
T2 - 5th International Conference onTrust and Trustworthy Computing, TRUST 2012
AU - Zheng, Saijing
AU - Shi, Pan
AU - Xu, Heng
AU - Zhang, Cheng
PY - 2012
Y1 - 2012
N2 - While the body of privacy research on online social networks has been growing over the past several years, privacy problems emerged from the dynamism inherent in the launch of new features or interfaces have not been widely discussed. Drawing on the grounded theory approach, we aim to fill this gap by investigating the trigger conditions under which users may perceive the introduction of a new IT artifact as privacy threats. With the specific case of the New Profile introduced by Facebook, we conducted a content analysis of user responses posted on the official blog of Facebook. Results can be constructed as a process model including two stages. The first stage of the model presented four broad categories of trigger conditions of privacy concerns-information processing, increased accessibility, intrusion, and loss of control. The second stage describes three types of outcomes, including psychological outcomes, behavior outcomes, and suggested privacy mechanisms.
AB - While the body of privacy research on online social networks has been growing over the past several years, privacy problems emerged from the dynamism inherent in the launch of new features or interfaces have not been widely discussed. Drawing on the grounded theory approach, we aim to fill this gap by investigating the trigger conditions under which users may perceive the introduction of a new IT artifact as privacy threats. With the specific case of the New Profile introduced by Facebook, we conducted a content analysis of user responses posted on the official blog of Facebook. Results can be constructed as a process model including two stages. The first stage of the model presented four broad categories of trigger conditions of privacy concerns-information processing, increased accessibility, intrusion, and loss of control. The second stage describes three types of outcomes, including psychological outcomes, behavior outcomes, and suggested privacy mechanisms.
UR - http://www.scopus.com/inward/record.url?scp=84863098458&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=84863098458&partnerID=8YFLogxK
U2 - 10.1007/978-3-642-30921-2_19
DO - 10.1007/978-3-642-30921-2_19
M3 - Conference contribution
AN - SCOPUS:84863098458
SN - 9783642309205
T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
SP - 325
EP - 339
BT - Trust and Trustworthy Computing - 5th International Conference, TRUST 2012, Proceedings
Y2 - 13 June 2012 through 15 June 2012
ER -