Skip to main content
Log in

Understanding information disclosure behaviour in Australian Facebook users

  • Research Article
  • Published:
Journal of Information Technology

Abstract

The advent of social networking websites presents further opportunities for criminals to obtain information for use in identity theft, cyber-stalking, and worse activities. This paper presents research investigating why users of social networking websites willingly disclose personal information and what sorts of information they provide (or not). The study employed an ethnographic approach of participation in the online community and interviews of community members, combined with a quantitative survey. The findings show that users are often simply not aware of the issues or feel that the risk to them personally is very low. The paper develops a preliminary theoretical model to explain the information disclosure phenomenon. It further recommends that government agencies or social networking websites themselves conduct campaigns to inform the public of these issues and that social networking websites consider removing some facilities. The study was conducted in an Australian context and focussed on the popular Facebook website.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Figure 1

Similar content being viewed by others

References

  • Acquisti, A. and Gross, R. (2006). Imagined Communities: Awareness, information sharing, and privacy on the facebook, in Proceedings of the 6th Workshop on Privacy Enhancing Technologies, PET 2006 (Robinson College, Cambridge, UK); Berlin: Springer-Verlag, 28–30 June, http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.93.8177&rep=rep1&type=pdf.

  • Atkinson, S. and Abu El Haj, M. (1996). Domain Analysis for Qualitative Public Health Data, Health Policy and Planning 11 (4): 438–442.

    Article  Google Scholar 

  • Boyd, D. (2006). Identity Production in a Networked Culture: Why youth heart MySpace, in Conference Paper Talk at AAAS 2006 (part of panel: ‘It’s 10PM: Do You Know Where Your Children Are … Online!’) (St. Louis, Missouri, 19 February 2006).

  • Boyd, D. and Heer, J. (2006). Profiles as Conversation: Networked identity performance on friendster, in Proceedings of the 39th Annual Hawaii International Conference on System Sciences, HICSS '06, (Kauai, Hawaii); New York: IEEE digital library, Vol.3, 59c–59c, 4–7 January, doi: 10.1109/HICSS.2006.394, http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=1579411&isnumber=33363.

  • Boyd, D.M. and Ellison, N.B. (2008). Social Network Sites: Definition, history, and scholarship, Journal of Computer-Mediated Communication 13 (2008): 210–230.

    Google Scholar 

  • Brooks, G. (2007). Secret Society, New Media Age, 13 December, p. 10.

  • Brusilovsky, P., Kobsa, A. and Nejdl, W. (2007). The Adaptive Web: Methods and strategies of web personalization, Berlin: Springer Verlag.

    Book  Google Scholar 

  • Campbell, J., Sherman, R.C., Kraan, E. and Birchmeier, Z. (2001). Internet Privacy Awareness and Concerns among College Students, Paper presented to APS, Toronto, June 2001 [www document] http://www.users.muohio.edu/shermarc/aps01.htm.

  • Caruso, J.B. and Salaway, G. (2008). The ECAR Study of Undergraduate Students and Information Technology, 2008, [www document] http://net.educause.edu/ir/library/pdf/EKF/ekf0808.pdf (accessed 4th May 2009).

  • Cranor, L.F., Reagle, J. and Ackerman, M.S. (1999). Beyond Concern: Understanding net users’ attitudes about online privacy, AT&T, [www document] http://citeseer.ist.psu.edu/cranor99beyond.html.

  • Dell, P. and Marinova, D. (2002). Erving Goffman and the Internet, Theory of Science 24 (4): 85–98.

    Google Scholar 

  • Denzin, N.K. (1971). The Logic of Naturalistic Inquiry, Social Forces 50 (2): 166–182.

    Article  Google Scholar 

  • Dinev, T. and Hart, P. (2006). Internet Privacy Concerns and Social Awareness as Determinants of Intention to Transact, International Journal of Electronic Commerce 10 (2): 7–29.

    Article  Google Scholar 

  • Dwyer, C., Hiltz, S.R. and Passerini, K. (2007). Trust and Privacy Concern within Social Networking Sites: A comparison of Facebook and MySpace, in Proceedings of the Thirteenth Americas Conference on Information Systems (Keystone, Colorado); New York: Curran Associates, Inc., http://csis.pace.edu/~dwyer/research/DwyerAMCIS2007.pdf.

  • Ellison, N.B., Steinfield, C. and Lampe, C. (2007). The Benefits of Facebook ‘Friends’: Social capital and college students’ use of online social network sites, Journal of Computer-Mediated Communication 12 (2007): 1143–1168.

    Article  Google Scholar 

  • Facebook (2008). About Facebook [www document] http://www.Facebook.com/about.php (accessed 7th April 2008).

  • Fogg, B.J. (2003). Persuasive Technology: Using computers to change what we think and do, San Francisco: Morgan Kaufmann Publishers.

    Google Scholar 

  • Frankel, M.S. and Siang, S. (1999). Ethical and Legal Aspects of Human Subjects Research on the Internet, American Association for the Advancement of Science [www document] http://www.aaas.org/spp/sfrl/projects/intres/report.pdf.

  • Glaser, B. (1992). Basics of Grounded Theory Analysis, Mill Valley, CA: Sociology Press.

    Google Scholar 

  • Goffman, E. (1959). The Presentation of Self in Everyday Life, New York: Anchor Books.

    Google Scholar 

  • Goffman, E. (1963). Behavior in Public Places, New York: The Free Press.

    Google Scholar 

  • Govani, T. and Pashley, H. (2005). Student Awareness of the Privacy Implications When Using Facebook, unpublished manuscript [www document] http://lorrie.cranor.org/courses/fa05/tubzhlp.pdf.

  • Gray, R. and Montague, B. (2007). Criminals Trawl Facebook and MySpace, The Telegraph (UK) [www document] http://www.telegraph.co.uk/news/uknews/1558125/Criminals-trawl-Facebook-and-MySpace.html.

  • Gross, R., Acquisti, A. and Heinz III, H.J. (2005). Information Revelation and Privacy in Online Social Networks (The Facebook case), in Proceedings of the 2005 ACM Workshop on Privacy in the Electronic Society (Alexandria, VA, USA); New York: ACM, 71–80.

  • Hardin, R. (2002). Trust & Trustworthiness, New York: Sage.

    Google Scholar 

  • Hardin, R. (2004). Distrust, New York: Sage.

    Google Scholar 

  • Handwerker, W.P. (2005). Sample Design, in K. Kempf-Leonard (ed.) Encyclopedia of Social Measurement, New York: Academic Press, pp. 429–436.

    Chapter  Google Scholar 

  • Hargittai, E. (2008). Whose Space? Differences among users and non-users of social network sites, Journal of Computer-Mediated Communication 13 (2008): 276–297.

    Google Scholar 

  • Henri, C. (1991). Computer Conferencing and Content Analysis, in A. Kaye (ed.) Collaborative Learning through Computer Conferencing: The Najaden papers, London: Springer-Verlag, pp. 117–136.

    Google Scholar 

  • Hosaka, T.A. (2008). Facebook Asks Users to Translate for Free, MSNBC [WWW document] http://www.msnbc.msn.com/id/24205912/.

  • Jarvis, J. (2007). Amazing Facebook, [www document] http://www.buzzmachine.com/2007/05/29/amazing-Facebook/.

  • Klein, A. (2006). Facebook Opens Too Many Doors?, Planet Blacksburg [www document] http://www.planetblacksburg.com/news/klein-Facebook-042606.html.

  • Kobsa, A. (2007). Privacy-Enabled Web Personalization, Communications of the ACM 50 (8): 24–33.

    Article  Google Scholar 

  • Kolek, E.A. and Saunders, D. (2008). Online Disclosure: An empirical examination of undergraduate facebook profiles, NASPA Journal 45 (1): 1–25.

    Article  Google Scholar 

  • Lampe, C., Ellison, N. and Steinfield, C. (2006). A Face(book) in the Crowd: Social searching vs. social browsing, in Proceedings of the 2006 20th Anniversary Conference on Computer Supported Cooperative Work (Alberta, Canada); New York: ACM, 167–170, http://portal.acm.org/ft_gateway.cfm?id=1180901&type=pdf&coll=GUIDE&dl=GUIDE&CFID=87544933&CFTOKEN=31631052.

  • Lincoln, Y.S. and Guba, E.G. (1985). Naturalistic Inquiry, California: Sage Publications.

    Google Scholar 

  • Lipford, H.R., Besmer, A. and Watson, J. (2008). Understanding Privacy Settings in Facebook with an Audience View, in Proceedings: Usability, Psychology and Security ‘08 [www document] https://www.usenix.org/events/upsec08/tech/full_papers/lipford/lipford.pdf.

  • Malik, O. (2007). Facebook Launches Mobile, Takes $240 Million Investment from Microsoft, [WWW document] http://gigaom.com/2007/10/24/Facebook-and-microsoft-bff-for-240-million/.

  • Mantovani, F. (2001). Networked Seduction: A test-bed for the study of strategic communication on the internet, CyberPsychology and Behavior 4 (1): 147–154.

    Article  Google Scholar 

  • Mead, G.H. (1934). Mind, Self and Society: From the standpoint of a social behaviorist, Chicago, IL: University of Chicago Press.

    Google Scholar 

  • Meyrowitz, J. (1990). Redefining the Situation: Extending dramaturgy into a theory of social change and media effects, in S.H. Riggins (ed.) Beyond Goffman: Studies on communication, institution and social interaction, Berlin: Mouton de Gruyter.

    Google Scholar 

  • Minister for Home Affairs (2008). New Identity Crime Offences Proposed [media release] [www document] http://www.ministerhomeaffairs.gov.au/www/ministers/ministerdebus.nsf/Page/Media Releases_2008_Firstquarter_27March2008-Newidentitycrimeoffencesproposed.

  • Mullen, S. (2005). Media Choice, Interpersonal Relationships, and Problem Solving, in IADIS Virtual Multi Conference on Computer Science and Information Systems (MCCSIS 2005) (Lisbon, Portugal); Lisbon, Portugal: IADIS Digital Library, http://www.iadis.net/dl/final_uploads/200504G005.pdf.

  • Network Security (2006). ‘Social Networking’ Study Shows Cybercrime Risk, Network Security 2006 (11): 2.

  • Office of the Attorney General (2003). Australia's First Cyberstalking laws [media release] [www document] http://www.legislation.vic.gov.au/domino/Web_Notes/newmedia.nsf/bc348d5912436a9cca256cfc0082d800/2550a989153b5bebca256cf600824ef2!OpenDocument.

  • Orb, A., Eisenhauer, L. and Wynaden, D. (2001). Ethics in Qualitative Research, Journal of Nursing Scholarship 33 (1): 93–96.

    Article  Google Scholar 

  • Paine, C., Reips, U.D., Stieger, S., Joinson, A. and Buchanan, T. (2006). Internet Users’ Perceptions of ‘Privacy Concerns’ and ‘Privacy Actions’, International Journal of Human-Computer Studies 65 (6): 526–536.

    Article  Google Scholar 

  • Seaman, C.B. (1999). Qualitative Methods in Empirical Studies of Software Engineering, IEEE Transactions on Software Engineering 25 (4): 557–572.

    Article  Google Scholar 

  • Sjöberg, L. (2000). Factors in Risk Perception, Risk Analysis 20 (1): 1–11.

    Article  Google Scholar 

  • Skiba, D.J. (2007). Nursing Education 2.0: Poke me. Where's your face in space? Nursing Education Perspectives 28 (4): 214–216.

    Google Scholar 

  • Sophos (2007). Sophos Facebook ID Probe Shows 41% of Users Happy to Reveal all to Potential Identity Thieves [media release], [www document] http://www.sophos.com/pressoffice/news/articles/2007/08/Facebook.html.

  • Sorrell, J.M. and Redmond, G.M. (1995). Interviews in Qualitative Nursing Research: Differing approaches for ethnographic and phenomenological studies, Journal of Advanced Nursing 21: 1117–1122.

    Article  Google Scholar 

  • Spradley, J. (1979). The Ethnographic Interview, New York: Holt.

    Google Scholar 

  • Stolen ID (2008). Television Program, SBS Television, Australia, broadcast 19 May.

  • Strater, K. and Richter, H. (2007). Examining Privacy and Disclosure in a Social Networking Community, in Symposium on Usable Privacy and Security (SOUPS) 2007: Proceedings of the 3rd Symposium on Usable Privacy and Security, (Pittsburgh, USA, 18–20 July 2007); New York: ACM, http://cups.cs.cmu.edu/soups/2007/posters/p157_strater.pdf.

  • Strauss, A. and Corbin, J. (1990). Basics of Qualitative Research: Grounded theory procedures and techniques, London: Sage.

    Google Scholar 

  • Watson, S.W., Smith, Z. and Driver, J. (2006). Alcohol, Sex and Illegal Activities: An analysis of selected Facebook central photos in fifty states, Education Resources Information Center [www document] http://eric.ed.gov/ERICWebPortal/contentdelivery/servlet/ERICServlet?accno=ED493049.

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to William Newk-Fon Hey Tow.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Tow, WF., Dell, P. & Venable, J. Understanding information disclosure behaviour in Australian Facebook users. J Inf Technol 25, 126–136 (2010). https://doi.org/10.1057/jit.2010.18

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1057/jit.2010.18

Keywords

Navigation