The Influence Of Information Privacy Awareness On Privacy Protection Behavior In Facebook

Sulthan Muhammad Fahrezi, Candiwan Candiwan

Abstract


The use of the internet has become very common in today society. Based on a survey by dataindonesia.id, 68.9 percent of the 370.1 million internet users in Indonesia are social media users, and Facebook is one of the most widely used social media platforms in Indonesia, with the number of users growing to 202.2 million by July 2022. Due to this increase and the huge number of users, as well as the amount of personal information stored in it, this can be a vulnerability for Cybercriminals to exploit such as phising or scams. This research was conducted to analyze and determine what factors affect users information privacy concerns towards privacy protection behavior on Facebook. The data were collected by distributing a questionnaire to a total of 417 Facebook users in Indonesia. This research model consists of seven constructs. The research model constructs consist of User's Information Privacy Concerns, Perceived Severity, Perceived Vulnerability, Self-Efficacy, Response Efficacy, Rewards, and Privacy Protection Behavior. This research was analyzed using quantitative methods by processing data through SPSS and AMOS software. The data is processed using the SEM model, which is validated with a confirmatory factor analysis test, a structural model test, and a hypothesis test. The results of this study indicate a positive correlation between User's Information Privacy Concerns and Perceived vulnerability in Privacy Protection behavior, it can be concluded that User's Information Privacy Concerns (UIPC) can affect Privacy Protection behavior (PPB) among Facebook users. Therefore, Facebook users are advised to be more concerned about their privacy information protection behaviors by avoiding any behavior that may put them at risk of privacy threats. This paper suggest users to take measures to prevent any threats to their privacy.


Keywords


security awareness; information privacy; security behavior; Facebook social media users; Structural Equation Modeling

References


Gischa, S. (2020, February 24). Globalisasi: Perubahan Perilaku Masyarakat Halaman all - Kompas.com. KOMPAS.com. https://www.kompas.com/skola/read/2020/02/24/130000469/globalisasi-perubahan-perilaku-masyarakat?page=all

Zlatolas, L. N., Welzer, T., Hericko, M., & Hölbl, M. (2015). Privacy antecedents for SNS self-disclosure: The case of Facebook. Computers in Human Behavior, 45, 158–167. https://doi.org/10.1016/j.chb.2014.12.012

S. (2022, November 2). Digital 2022 - We Are Social USA. We Are Social USA. https://wearesocial.com/us/blog/2022/01/digital-2022/

Ali, A. T., Kamran, A., Ahmed, M. M., Raza, B., & Ilyas, M. (2019). Privacy Concerns in Online Social Networks: A Users’ Perspective. International Journal of Advanced Computer Science and Applications, 10(7). https://doi.org/10.14569/ijacsa.2019.0100780

Rizaty, M. A. (2022, August 9). Pengguna Facebook di Indonesia Capai 202,2 Juta pada Juli 2022. Dataindonesia.id. https://dataindonesia.id/digital/detail/pengguna-facebook-di-indonesia-capai-2022-juta-pada-juli-2022

N. Naurah, “Serangan Phishing di Indonesia Terus Meningkat, Ini Datanya,” GoodStats, Jul. 13, 2023. [Online]. Available: https://goodstats.id/article/serangan-phishing-di-indonesia-terus-meningkat-ini-statistiknya-U8VdY

I. W. S. Suadnyana, “Anggota DPRD Klungkung Diduga Kena Phising gegera Klik Link di Facebook,” Detikbali, Feb. 02, 2023. [Online]. Available: https://www.detik.com/bali/hukum-dan-kriminal/d-6548064/anggota-dprd-klungkung-diduga-kena-phising-gegera-klik-link-di-facebook

N. Naurah, “Serangan Phishing di Indonesia Terus Meningkat, Ini Datanya,” GoodStats, Jul. 13, 2023. [Online]. Available: https://goodstats.id/article/serangan-phishing-di-indonesia-terus-meningkat-ini-statistiknya-U8VdY

J.-Y. Son and S. W. Kim, “Internet Users’ Information Privacy-protective Responses: A taxonomy and a nomological model,” Management Information Systems Quarterly, vol. 32, no. 3, p. 503, Jan. 2008, doi: 10.2307/25148854.

Altman, I. (1975). The Environment and Social Behavior: Privacy, Personal Space, Territory, Crowding. Monterey, Calif. : Brooks/Cole Publishing Company.

Rogers, R. (1975). A Protection Motivation Theory of Fear Appeals and Attitude Change1. The Journal of Psychology, 91(1), 93–114. https://doi.org/10.1080/00223980.1975.9915803

Zhang, L., & McDowell, W. H. (2009). Am I Really at Risk? Determinants of Online Users’ Intentions to Use Strong Passwords. Journal of Internet Commerce, 8(3–4), 180–197. https://doi.org/10.1080/15332860903467508

Lee, D., LaRose, R., & Rifon, N. J. (2008). Keeping our network safe: a model of online protection behaviour. Behaviour & Information Technology, 27(5), 445–454. https://doi.org/10.1080/01449290600879344

Woon, I. M. Y., Tan, G. W., & Low, R. (2005). A Protection Motivation Theory Approach to Home Wireless Security. In International Conference on Information Systems. http://aisel.aisnet.org/cgi/viewcontent.cgi?article=1237&context=icis2005

Mohamed, N., & Ahmad, I. H. (2012). Information privacy concerns, antecedents and privacy measure use in social networking sites: Evidence from Malaysia. Computers in Human Behavior, 28(6), 2366–2375. https://doi.org/10.1016/j.chb.2012.07.008

LaRose, R., Rifon, N., Liu, S., & Lee, D. (2005, May). Online safety strategies: A content analysis and theoretical assessment. Paper presented at the 55th Annual Conference of the International Communication Association, New York, NY.

Van De Garde-Perik, E., Markopoulos, P., De Ruyter, B., Eggen, B., & IJsselsteijn, W. W. (2008). Investigating Privacy Attitudes and Behavior in Relation to Personalization. Social Science Computer Review, 26(1), 20–43. https://doi.org/10.1177/0894439307307682

Malhotra, N. K., Kim, S. W., & Agarwal, J. (2004). Internet Users’ Information Privacy Concerns (IUIPC): The Construct, the Scale, and a Causal Model. Information Systems Research, 15(4), 336–355. https://doi.org/10.1287/isre.1040.0032

Edwards, K. J. (2015). Examining the Security Awareness, Information Privacy, and the Security Behaviours of Home Computer Users. In ProQuest LLC eBooks. https://eric.ed.gov/?id=ED567975.

Haryono, S. (2016). Metode SEM Untuk Penelitian Manajemen Amos Lisrel PLS. http://catalogue.ubharajaya.ac.id/slims/index.php?p=show_detail&id=40746

Edwards, K. J. (2015). Examining the Security Awareness, Information Privacy, and the Security Behaviours of Home Computer Users. In ProQuest LLC eBooks. https://eric.ed.gov/?id=ED567975

LaRose, R., Rifon, N., Liu, S., & Lee, D. (2005, May). Online safety strategies: A content analysis and theoretical assessment. Paper presented at the 55th Annual Conference of the International Communication Association, New York, NY

Lee, D., LaRose, R., & Rifon, N. J. (2008). Keeping our network safe: a model of online protection behaviour. Behaviour & Information Technology, 27(5), 445–454. https://doi.org/10.1080/01449290600879344

Niu, H. (2010). Investigating the effects of self-efficacy on foodservice industry employees’ career commitment. International Journal of Hospitality Management, 29(4), 743–750. https://doi.org/10.1016/j.ijhm.2010.03.006

Rhee, H., Kim, C., & Ryu, Y. H. (2009). Self-efficacy in information security: Its influence on end users’ information security practice behavior. Computers & Security, 28(8), 816–826. https://doi.org/10.1016/j.cose.2009.05.008

Woon, I. M. Y., Tan, G. W., & Low, R. (2005). A Protection Motivation Theory Approach to Home Wireless Security. In International Conference on Information Systems. http://aisel.aisnet.org/cgi/viewcontent.cgi?article=1237&context=icis2005

Mohamed, N., & Ahmad, I. H. (2012). Information privacy concerns, antecedents and privacy measure use in social networking sites: Evidence from Malaysia. Computers in Human Behavior, 28(6), 2366–2375. https://doi.org/10.1016/j.chb.2012.07.008

Adhikari, K., & Panda, R. K. (2018). Users’ Information Privacy Concerns and Privacy Protection Behaviors in Social Networks. Journal of Global Marketing, 31(2), 96–110. https://doi.org/10.1080/08911762.2017.1412552

Sari, P. K., Candiwan, & Trianasari, N. (2014). Information security awareness measurement with confirmatory factor analysis. In 2014 International Symposium on Technology Management and Emerging Technologies. https://doi.org/10.1109/istmet.2014.6936509

Haryono, S. (2016). Metode SEM Untuk Penelitian Manajemen Amos Lisrel PLS. http://catalogue.ubharajaya.ac.id/slims/index.php?p=show_detail&id=40746

Haryono, S. (2016). Metode SEM Untuk Penelitian Manajemen Amos Lisrel PLS. http://catalogue.ubharajaya.ac.id/slims/index.php?p=show_detail&id=40746

Crossler, R. E. (2010). Protection Motivation Theory: Understanding Determinants to Backing Up Personal Data. https://doi.org/10.1109/hicss.2010.311

Dinev, T., & Hart, P. ’. (2004). Internet privacy concerns and their antecedents - measurement validity and a regression model. Behaviour & Information Technology, 23(6), 413–422. https://doi.org/10.1080/01449290410001715723

Adhikari, K., & Panda, R. K. (2018). Users’ Information Privacy Concerns and Privacy Protection Behaviors in Social Networks. Journal of Global Marketing, 31(2), 96–110. https://doi.org/10.1080/08911762.2017.1412552

Dinev, T., & Hart, P. ’. (2004). Internet privacy concerns and their antecedents - measurement validity and a regression model. Behaviour & Information Technology, 23(6), 413–422. https://doi.org/10.1080/01449290410001715723

Afandi, I. (2017). Analisis Hubungan Kesadaran Keamanan, Privasi Informasi, Dan Perilaku Keamanan Pada Para Pengguna Media Sosial Line

Dienlin, T., & Trepte, S. (2014). Is the privacy paradox a relic of the past? An in-depth analysis of privacy attitudes and privacy behaviors. European Journal of Social Psychology, 45(3), 285–297. https://doi.org/10.1002/ejsp.2049


Full Text: PDF

DOI: 10.33751/jhss.v8i1.8414

Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.