The Influence Of Information Privacy Awareness On Privacy Protection Behavior In Facebook
Abstract
The use of the internet has become very common in today society. Based on a survey by dataindonesia.id, 68.9 percent of the 370.1 million internet users in Indonesia are social media users, and Facebook is one of the most widely used social media platforms in Indonesia, with the number of users growing to 202.2 million by July 2022. Due to this increase and the huge number of users, as well as the amount of personal information stored in it, this can be a vulnerability for Cybercriminals to exploit such as phising or scams. This research was conducted to analyze and determine what factors affect users information privacy concerns towards privacy protection behavior on Facebook. The data were collected by distributing a questionnaire to a total of 417 Facebook users in Indonesia. This research model consists of seven constructs. The research model constructs consist of User's Information Privacy Concerns, Perceived Severity, Perceived Vulnerability, Self-Efficacy, Response Efficacy, Rewards, and Privacy Protection Behavior. This research was analyzed using quantitative methods by processing data through SPSS and AMOS software. The data is processed using the SEM model, which is validated with a confirmatory factor analysis test, a structural model test, and a hypothesis test. The results of this study indicate a positive correlation between User's Information Privacy Concerns and Perceived vulnerability in Privacy Protection behavior, it can be concluded that User's Information Privacy Concerns (UIPC) can affect Privacy Protection behavior (PPB) among Facebook users. Therefore, Facebook users are advised to be more concerned about their privacy information protection behaviors by avoiding any behavior that may put them at risk of privacy threats. This paper suggest users to take measures to prevent any threats to their privacy.
Keywords
References
Gischa, S. (2020, February 24). Globalisasi: Perubahan Perilaku Masyarakat Halaman all - Kompas.com. KOMPAS.com. https://www.kompas.com/skola/read/2020/02/24/130000469/globalisasi-perubahan-perilaku-masyarakat?page=all
Zlatolas, L. N., Welzer, T., Hericko, M., & Hölbl, M. (2015). Privacy antecedents for SNS self-disclosure: The case of Facebook. Computers in Human Behavior, 45, 158–167. https://doi.org/10.1016/j.chb.2014.12.012
S. (2022, November 2). Digital 2022 - We Are Social USA. We Are Social USA. https://wearesocial.com/us/blog/2022/01/digital-2022/
Ali, A. T., Kamran, A., Ahmed, M. M., Raza, B., & Ilyas, M. (2019). Privacy Concerns in Online Social Networks: A Users’ Perspective. International Journal of Advanced Computer Science and Applications, 10(7). https://doi.org/10.14569/ijacsa.2019.0100780
Rizaty, M. A. (2022, August 9). Pengguna Facebook di Indonesia Capai 202,2 Juta pada Juli 2022. Dataindonesia.id. https://dataindonesia.id/digital/detail/pengguna-facebook-di-indonesia-capai-2022-juta-pada-juli-2022
N. Naurah, “Serangan Phishing di Indonesia Terus Meningkat, Ini Datanya,” GoodStats, Jul. 13, 2023. [Online]. Available: https://goodstats.id/article/serangan-phishing-di-indonesia-terus-meningkat-ini-statistiknya-U8VdY
I. W. S. Suadnyana, “Anggota DPRD Klungkung Diduga Kena Phising gegera Klik Link di Facebook,” Detikbali, Feb. 02, 2023. [Online]. Available: https://www.detik.com/bali/hukum-dan-kriminal/d-6548064/anggota-dprd-klungkung-diduga-kena-phising-gegera-klik-link-di-facebook
N. Naurah, “Serangan Phishing di Indonesia Terus Meningkat, Ini Datanya,” GoodStats, Jul. 13, 2023. [Online]. Available: https://goodstats.id/article/serangan-phishing-di-indonesia-terus-meningkat-ini-statistiknya-U8VdY
J.-Y. Son and S. W. Kim, “Internet Users’ Information Privacy-protective Responses: A taxonomy and a nomological model,” Management Information Systems Quarterly, vol. 32, no. 3, p. 503, Jan. 2008, doi: 10.2307/25148854.
Altman, I. (1975). The Environment and Social Behavior: Privacy, Personal Space, Territory, Crowding. Monterey, Calif. : Brooks/Cole Publishing Company.
Rogers, R. (1975). A Protection Motivation Theory of Fear Appeals and Attitude Change1. The Journal of Psychology, 91(1), 93–114. https://doi.org/10.1080/00223980.1975.9915803
Zhang, L., & McDowell, W. H. (2009). Am I Really at Risk? Determinants of Online Users’ Intentions to Use Strong Passwords. Journal of Internet Commerce, 8(3–4), 180–197. https://doi.org/10.1080/15332860903467508
Lee, D., LaRose, R., & Rifon, N. J. (2008). Keeping our network safe: a model of online protection behaviour. Behaviour & Information Technology, 27(5), 445–454. https://doi.org/10.1080/01449290600879344
Woon, I. M. Y., Tan, G. W., & Low, R. (2005). A Protection Motivation Theory Approach to Home Wireless Security. In International Conference on Information Systems. http://aisel.aisnet.org/cgi/viewcontent.cgi?article=1237&context=icis2005
Mohamed, N., & Ahmad, I. H. (2012). Information privacy concerns, antecedents and privacy measure use in social networking sites: Evidence from Malaysia. Computers in Human Behavior, 28(6), 2366–2375. https://doi.org/10.1016/j.chb.2012.07.008
LaRose, R., Rifon, N., Liu, S., & Lee, D. (2005, May). Online safety strategies: A content analysis and theoretical assessment. Paper presented at the 55th Annual Conference of the International Communication Association, New York, NY.
Van De Garde-Perik, E., Markopoulos, P., De Ruyter, B., Eggen, B., & IJsselsteijn, W. W. (2008). Investigating Privacy Attitudes and Behavior in Relation to Personalization. Social Science Computer Review, 26(1), 20–43. https://doi.org/10.1177/0894439307307682
Malhotra, N. K., Kim, S. W., & Agarwal, J. (2004). Internet Users’ Information Privacy Concerns (IUIPC): The Construct, the Scale, and a Causal Model. Information Systems Research, 15(4), 336–355. https://doi.org/10.1287/isre.1040.0032
Edwards, K. J. (2015). Examining the Security Awareness, Information Privacy, and the Security Behaviours of Home Computer Users. In ProQuest LLC eBooks. https://eric.ed.gov/?id=ED567975.
Haryono, S. (2016). Metode SEM Untuk Penelitian Manajemen Amos Lisrel PLS. http://catalogue.ubharajaya.ac.id/slims/index.php?p=show_detail&id=40746
Edwards, K. J. (2015). Examining the Security Awareness, Information Privacy, and the Security Behaviours of Home Computer Users. In ProQuest LLC eBooks. https://eric.ed.gov/?id=ED567975
LaRose, R., Rifon, N., Liu, S., & Lee, D. (2005, May). Online safety strategies: A content analysis and theoretical assessment. Paper presented at the 55th Annual Conference of the International Communication Association, New York, NY
Lee, D., LaRose, R., & Rifon, N. J. (2008). Keeping our network safe: a model of online protection behaviour. Behaviour & Information Technology, 27(5), 445–454. https://doi.org/10.1080/01449290600879344
Niu, H. (2010). Investigating the effects of self-efficacy on foodservice industry employees’ career commitment. International Journal of Hospitality Management, 29(4), 743–750. https://doi.org/10.1016/j.ijhm.2010.03.006
Rhee, H., Kim, C., & Ryu, Y. H. (2009). Self-efficacy in information security: Its influence on end users’ information security practice behavior. Computers & Security, 28(8), 816–826. https://doi.org/10.1016/j.cose.2009.05.008
Woon, I. M. Y., Tan, G. W., & Low, R. (2005). A Protection Motivation Theory Approach to Home Wireless Security. In International Conference on Information Systems. http://aisel.aisnet.org/cgi/viewcontent.cgi?article=1237&context=icis2005
Mohamed, N., & Ahmad, I. H. (2012). Information privacy concerns, antecedents and privacy measure use in social networking sites: Evidence from Malaysia. Computers in Human Behavior, 28(6), 2366–2375. https://doi.org/10.1016/j.chb.2012.07.008
Adhikari, K., & Panda, R. K. (2018). Users’ Information Privacy Concerns and Privacy Protection Behaviors in Social Networks. Journal of Global Marketing, 31(2), 96–110. https://doi.org/10.1080/08911762.2017.1412552
Sari, P. K., Candiwan, & Trianasari, N. (2014). Information security awareness measurement with confirmatory factor analysis. In 2014 International Symposium on Technology Management and Emerging Technologies. https://doi.org/10.1109/istmet.2014.6936509
Haryono, S. (2016). Metode SEM Untuk Penelitian Manajemen Amos Lisrel PLS. http://catalogue.ubharajaya.ac.id/slims/index.php?p=show_detail&id=40746
Haryono, S. (2016). Metode SEM Untuk Penelitian Manajemen Amos Lisrel PLS. http://catalogue.ubharajaya.ac.id/slims/index.php?p=show_detail&id=40746
Crossler, R. E. (2010). Protection Motivation Theory: Understanding Determinants to Backing Up Personal Data. https://doi.org/10.1109/hicss.2010.311
Dinev, T., & Hart, P. ’. (2004). Internet privacy concerns and their antecedents - measurement validity and a regression model. Behaviour & Information Technology, 23(6), 413–422. https://doi.org/10.1080/01449290410001715723
Adhikari, K., & Panda, R. K. (2018). Users’ Information Privacy Concerns and Privacy Protection Behaviors in Social Networks. Journal of Global Marketing, 31(2), 96–110. https://doi.org/10.1080/08911762.2017.1412552
Dinev, T., & Hart, P. ’. (2004). Internet privacy concerns and their antecedents - measurement validity and a regression model. Behaviour & Information Technology, 23(6), 413–422. https://doi.org/10.1080/01449290410001715723
Afandi, I. (2017). Analisis Hubungan Kesadaran Keamanan, Privasi Informasi, Dan Perilaku Keamanan Pada Para Pengguna Media Sosial Line
Dienlin, T., & Trepte, S. (2014). Is the privacy paradox a relic of the past? An in-depth analysis of privacy attitudes and privacy behaviors. European Journal of Social Psychology, 45(3), 285–297. https://doi.org/10.1002/ejsp.2049
DOI: 10.33751/jhss.v8i1.8414
Refbacks
- There are currently no refbacks.
This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.