Ncmaren Ib5clck45 Final-Report n06
Ncmaren Ib5clck45 Final-Report n06
Ncmaren Ib5clck45 Final-Report n06
----------
FINAL REPORT
MARKETING RESEARCH
TITLE:
PRIVACY RISK AWARENESS AND INTENT TO DISLOSE
PERSONAL INFORMATION OF USERS USING TWO SOCIAL
NETWORKS:
FACEBOOK AND INSTAGRAM.
TITLE:
PRIVACY RISK AWARENESS AND INTENT TO DISLOSE
PERSONAL INFORMATION OF USERS USING TWO
SOCIAL NETWORKS: FACEBOOK AND INSTAGRAM.
TABLE OF PICTURES
Figure 1. Model of reference for research…………………………………….8
Figure 2. Model of reference for research…………………………………….9
Figure 3.Model of reference for research……………………………………....10
Figure 4. Model of reference for research……………………………………...14
Figure 5. Model of reference for research……………………………………..15
Figure 6. Model of reference for research……………………………………..17
Figure 7. Model of reference for research……………………………………..18
Figure 8. Model of reference for research……………………………………..19
Figure 9. Model of reference for research……………………………………...20
Figure 10. Model of reference for research…………………………………….21
Figure 11. Research model…………………………………………………….28
Figure 12. Research model after qualitative research………………………….33
Figure 13. Results of Model and Hypotheses Testing........................................70
TABLE OF BOARD
Table 1: Results of qualitative research and scale……………………………..38
Table 2: Calculate the number of survey samples……………………………..44
Table 3: User's gender………………………………………………………….48
Table 4: User's age……………………………………………………………..49
Table 5: User's occupation……………………………………………………..50
Table 6: Using Facebook and Instagram……………………………………….51
Table 7: Frequency of Use Facebook and Instagram…………………………..51
Table 8: a user's number of Facebook and Instagram friends………………….52
Table 9: Used time Facebook and Instagram…………………………………..53
Table 10: Reliability Statistics and Item-Total Statistics………………………54
Table 11: Reliability Statistics and Item-Total Statistics………………………55
Table 12: Reliability Statistics and Item-Total Statistics………………………56
Table 13: Reliability Statistics and Item-Total Statistics………………………56
Table 14: Reliability Statistics and Item-Total Statistics………………………57
Table 15: Reliability Statistics and Item-Total Statistics………………………57
Table 16: Reliability Statistics and Item-Total Statistics………………………58
Table 17: Reliability Statistics and Item-Total Statistics………………………59
Table 18: Reliability Statistics and Item-Total Statistics………………………60
Table 19: The final summary table of the scale test……………………………60
Table 20: 1st- Rotated Component Matrix……………………………………..62
Table 21: 2nd - Rotated Component Matrix…………………………………....63
Table 22: 1st-rotation matrix…………………………………...........................64
Table 23: 2nd-rotation matrix…………………………………..........................65
Table 24: Summary for results KMO……………………….………................65
Table 25: Pattern Matrix……………………….………....................................66
Table 26: CMIN……………………….……….................................................68
Table 27: RMR, GFI……………………….………..........................................68
Table 28: Baseline Comparisons…………….………........................................69
Table 29: RMSEA……………………….………..............................................69
Table 30: Summary of the normalized and values……......................................71
Table 31: Indirect and direct effects of variables…………...…………………72
THANK YOU
First of all, our group would like to thank the teachers and friends who have
encouraged and helped us a lot in the process of conducting this scientific
research.
In particular, the team would like to express their deepest gratitude to Mr. Dinh
Tien Minh and Ms. Linh, who have taught and guided the group wholeheartedly
throughout the process of conducting and completing this research paper.
In addition, the team would also like to thank the teachers and students named
below who helped and supported us in providing orientation, suggestions and
additional information to complete the research paper throughout last time.
- Master Hoang Cuu Long
- Mr. Tran Thanh Tung
- Le Hoang An
- Nguyen Thao Nguyen
- Nguyen Dang Minh Quan
- Ro Cham Bien
- Nguyen Thi Anh Thu
- Tran Nguyen Nhu Quynh
- Mr. Tran Anh Minh
And the friends who participated in the survey to help my group.
1
PROJECT SUMMARY
Today, with the rapid development of 4.0 technology, more and more people
are moving to a second life: the digital world. And everyone, in one way or
another, is facing information privacy concerns, since engaging in sharing and
communicating on social networking sites entails saving money. disclose
personal information. Although today there are threats such as privacy issues,
malicious use of information, invasion of information access rights, user safety
risks, and negative effects of social networks, ... people still continue to reveal a
large amount of personal information on online social networks, most notably
the two major social networking sites, Facebook and Instagram.
One might ask: do Facebook and Instagram users really take their privacy
seriously? And how does this affect their perception of privacy risks as a result
of the personal information they disclose? And what factors exist that can
influence the intention to disclose personal information on Facebook and
Instagram?
Facebook and Instagram are constantly and rapidly updated (options for
personal sharing of information through digital media) and the technologies that
enable individuals to use the service require the constant attention of
researchers. The main objective of the study is to better understand the factors
that motivate online social network users to disclose personal information in
order to analyze and assess users' perceptions of privacy risksdisclose personal
information through two social networking sites, Facebook and Instagram.
2
CHAPTER 1: INTRODUCTION
1. TOPIC:
Privacy risk awareness and intent to disclose personal information of users
using two social networks: Facebook and Instagram.
3
5. RESEARCH OBJECTIVES:
Research on the relationship of privacy awareness with the intent to disclose
personal information.
Discover factors affecting risk perception as well as intent to disclose personal
information of Facebook and Instagram users.
Propose solutions to improve risk awareness and publicize personal information
of users of social networks Facebook and Instagram.
7. RESEARCH METHODS:
The study was carried out in two main steps:
(1) Preliminary research using a qualitative research method.
(2) Formal research to collect data for quantitative research.
- Qualitative research: is used to explore nature, directly explore ideas and to
provide a preliminary description of the research model of the group. From the
results of qualitative research combined with previous research articles related
to the topic, make amendments and supplements to the research model; at the
same time, develop a formal questionnaire to match the meaning of the scales
and the subjects for sampling. Conduct qualitative research: Face-to-face
interviews or messaging on online social networking sites. The study population
was 8 people. Includes 1 expert- with deep understanding of social networking,
and a focus group of 7 people. Focus on understanding the factors affecting the
perception of privacy risks, and direct respondents to the factors used in the
research model, scale construction, questions, concepts, terminology related.
- Quantitative research: used to collect data used in the research paper and the
final results. Conduct quantitative research: Create an online questionnaire, and
send it to research subjects to answer and collect data for the research paper.
4
8. SUBJECT LIMITED:
The study focused only on people between the ages of 15 and 29. Since,
according to our research, this target audience uses the social media platforms
Facebook and Instagram more often than other age groups.
5
CHAPTER 2: THEORETICAL FRAMEWORK
1. RELATED THEORIES:
6
1.2. Theory of Planned Behavior (Ajzen, 1991)
- The theory of intended behavior (TPB) (Ajzen, 1991), developed from the
theory of rational action (TRA; Ajzen & Fishbein, 1975), assumes that a
behavior can be predicted or explained by behavioral propensity to perform that
behavior. Behavioral tendencies are assumed to include motivational factors
that influence behavior, and are defined as the degree of effort with which
people attempt to perform. perform the behavior (Ajzen, 1991).
- Behavioral propensity is again a function of three factors. First, attitudes are
conceptualized as positive or negative evaluations of performance behavior. The
second factor is social influence which refers to the perceived social pressure to
perform or not to perform the behavior. Finally, the theory of planned behavior
TPB (Theory of Planned Behavior) was built by Ajzen by adding the perceived
behavioral control factor to the TRA model.
- The perceived behavioral control component reflects the ease or difficulty of
performing the behavior; This depends on the availability of resources and
opportunities to perform the behavior. Ajzen suggested that behavioral control
factors directly affect the tendency to perform the behavior, and that if the
person is accurate in his perception of the degree of control, then behavioral
control also predicts the behavior.
7
2. RELATED RESEARCH ARTICLES:
2.1.1. Books:
*Consumers' ethical perceptions of social media analytics practices:
Risks, benefits and potential outcomes
-Nina Michael Idoua, Milena Maticevski-
- In this study, we model outcomes of the ethical perceptions of SMA, and of
trustworthiness, looking also at the roles of perceived risk in sharing
information on social media, and benefits.
- The research model:
8
samples were concentrated among 21 to 30 year olds, this paper studied the
impact of various factors on disclosure willingness, enriching the existing
literature on disclosure.
- The research model:
2.1.2. Newspapers:
*Understanding third-person perception about Internet privacy risks
- Hongliang Chen, David Atkin-
- This study aims to examine the effect of third parties in Internet privacy risk
perception. Support is found for a TPE model that suggests that users report
Internet privacy risk awareness to others rather than themselves, based on a
sample from Amazon MTurk.
9
- Research results indicate that third-party perception is one of the major
barriers preventing privacy protection from being applied. Another consequence
of a privacy breach involves a relationship conflict. Unauthorized access to
personal accounts can lead to inappropriate comments and posts that can cause
conflicts with online contacts, damage users' reputation and lose muscle mass.
However, some other users simply believe they won't experience negative
privacy experiences, while others are more likely to be victims.
- Drawn from TPE theory, this study develops a three-phase model that includes
five precursors of TPE awareness of Internet privacy risks - social distance,
privacy risk on Unidentifiable Internet, previous negative privacy experiences,
online privacy and consumption security awareness of online sources about
Internet privacy threats; TPE's awareness of Internet privacy risks; and the act
of intent to self-take privacy protections and refer it to others.
- The research model:
10
*“Who should I grant access to my post?”: Identifying the most suitable
privacy decisions on online social networks
- Jose Alemany, Elena Del Val, Ana Maria Garcia- Fornes-
- This study focuses on all the elements of communication in the information
disclosure process, taking into account the attributes of the message and the
recipient, and the impact on the value of the user benefit. Which refers to the
risk of personal information disclosure and the right to access information of
groups of people.
- Research has been done to understand how users evaluate the cost benefit of
online social disclosure for the different types of receivers identified and the
sensitivity of the message. Data from 400 respondents were collected and
analyzed using a partial least squares model.
- The findings of this study demonstrate a balanced variance between perceived
cost benefits and disclosure of sensitive information with different types of
receivers. Disclosing personal information to trusted recipients, influential
recipients, and recipients from peer circles has had a significant positive impact
on building social capital. Conversely, disclosing personal information to
recipients from family circles or unidentified recipients has a significant
negative impact on social capital building and even a significant positive effect.
to privacy concerns.
*A measure of the implicit value of privacy under risk.
-Alisa Frik, Alexia Gaudeul -
- In this study, the authors allowed individuals to play the privacy lottery and
took a measure of the value of privacy under risk (VPR) and experimentally
tested the validity of the measure. This was in a lab trial with 148 participants.
Individuals are asked to make an incentive series of decisions about whether to
take the risk of disclosing personal information to other participants.
- The results confirm that privacy risk willingness is driven by a complex range
of factors, including risk aversion, self-reported value of personal information,
and general attitudes. for privacy (derived from surveys). VPR does not depend
on whether there is a pre-existing threat to privacy. The authors found
qualifying support for the existence of an order effect, whereby presenting
financial options before privacy options resulted in less privacy concerns.
11
2.1.3. Blogs:
*Protecting the rights to personal data and information in the current social
networking environment in Vietnam
- On social networks in Vietnam such as facebook, instagram,...in recent years,
there have been many acts of revealing personal secrets, family secrets ...
beyond the will of individuals and families being exposed. . Many people have
not understood, misunderstood or intentionally did not understand the right to
freedom of expression, freedom of expression of personal opinions, freedom of
the press ... so accidentally or intentionally revealing privacy, personal secrets.
personalities, family secrets of other people, causing mixed reactions on social
networks.
=> Through analyzing the current situation of personal data protection in
Vietnam, the author proposes a number of solutions to contribute to improving
and improving the effectiveness of the enforcement of the law on personal data
protection on the environment. social networking school in Vietnam.
2.1.5. Magazines:
*Don't neglect the privacy of your personal information
- In the era of globalization, connecting and interacting on social networks are
increasingly popular. However, very few Internet users in Vietnam care about
the security of personal information. The ease of many people when posting
12
personal information online makes their information more at risk of
exploitation.
- The article outlined the easy habits of users in disclosing personal information
through their social networking habits and outlined the consequences of losing
personal information.
13
Figure 4. Model of reference for research
- Social media and other web 2.0 tools have provided users with the platform to
interact with and also disclose personal information to not only their friends and
acquaintances but also relative strangers with unprecedented ease. Interaction
and perceived control were found to have significant effects on self-disclosure.
14
Figure 5. Model of reference for research
- Results: Data collected from the survey was analyzed using the Partial Least
Square approach to Structural Equation Modelling performed on SmartPLS
Version 3 . Structural Equation Modelling allowed the researchers to test
relationships between latent variables in the proposed research model. To
validate the measurement model, we examined reliability, convergent validity
and discriminant validity. The reliability of the constructs was assessed with
Cronbach’s alpha and composite reliability.
15
not impact self-disclosure directly, it does, however, help them to understand
the potential benefits of self-disclosure.
16
on the intention to disclose personal information on OSNs. In addition, it was
found that there was a causal relationship between both the trusting beliefs
concerning disclosing personal information and the perceived control over this
information, and the respondents’ privacy valuation.
- The research model:
17
- The research model:
18
compares that with their own inherent need for privacy protection. The model
contributes to the theoretical development of privacy protection.
- The research model:
19
2.4. Commercial sources:
20
Figure 10. Model of reference for research
3. RESEARCH HYPOTHESIS:
3.1. Effect of trust in media on Facebook and Instagram user's privacy risk
perception:
Level of trust, this concept refers to the degree to which an organization is
deemed trustworthy and benevolent by consumers and possesses integrity as
well as essential skills and competencies (Caldwell & Clapham, 2003; Mayer &
Davis, 1999). According to a research paper by (Nina Michaelidou, Milena
Micevski) on Consumer Ethical Perceptions of Social Media Analysis Methods:
Potential Risks, Benefits, and Outcomes, states that: if the The lower the trust
level, the higher awareness of disregard for information disclosure on social
networks. The reliability of the product is low, the user is less likely to share
information in the media and the user tends to be against the manufacturer. It is
like the social exchange theory (SET) commonly used to form the concept of
trust, focusing on the rules of exchange, in which the interactions between one
party are conditional and dependent on the actions of the party. others
(Cropanzano & Mitchell, 2005). Consequently, confidence levels are assumed
21
to be reciprocal (eg, Croson & Buchan, 1999). Through the paper of (Nina
Michaelidou, Milena Micevski) client beliefs are informed by the theory of
justice, even in cases where they are not clearly specified and when there is no
clear interaction between the two. Under this theory, credibility is underpinned
by procedural justice, which requires the participation of or representation of
key stakeholders in the organization's processes. Likewise, the responsibility to
inform stakeholders, such as social media users, about the organization's goals
and the procedures used by the organization, and to ensure information
protection as part of activities. If an organization fails to complete a task, the
example does not provide information about the user's SMA (social network
analytics) activities related to the media collection of user information and data.
In society where users do not want this can lead to uncertainty and concern
about the consequences of sharing information on social networks, the problem
is the perception of privacy risks. In addition, lack of trustworthiness affects a
consumer's decision to provide fake information, such as an act of protection or
retaliation, expected by the consumer and trusting organizations to protect their
information (Punj, 2017). Such breaches of trustworthiness can also lead to
consumer action against a service provider in the form of a complaint.
*Hypothesize:
H1: High user trust in media has a positive impact on Facebook and Instagram
users' perceptions of privacy risk.
22
potential benefits of disclosing personal information (Christofides, Muise &
Desmarais, 2009, p. 342).
Benefits that are associated with disclosure are plentiful: enjoyment (e.g.
Krasnova et al., 2009); self-presentation (e.g. Boyd, 2009); the ability to
maintain social ties (e.g. Ellison, Steinfield & Lampe, 2007)
*Hypothesize:
H2: Perceived benefits had a positive effect on intention to disclose personal
information on Facebook and Instagram.
23
The relationship between habit and continuation purpose is explained using
habit theory (Lankton, McKnight, and Thatcher (2012). Intention and users can
be automatically triggered by habit (Ajzan, 2002, p. 119). can elicit strong
feelings of friendliness against such behaviors based on previous habitual
practices, thus increasing the desire to continue the activity (Ellison, Steinfield
& Lampe, 2007 Beldad et al (2011) stated that the value of information
disclosure comes not just from the reasons people disclose information, but also
from the 'taste' of the disclosure itself (p. 226). Strater and Richter's results
support the possibility of strong effects of usage patterns (2007). They
discovered that some of their respondents were unsure why. What motivates
them to exchange information? Others, simply because they were used to filling
out paperwork, did not think twice about providing personal information when
asked.
*Hypothesize
H3: Intention to disclose personal information on Facebook and Instagram has
increased as a result of habit.
24
collected and used to achieve personalization is at risk. privacy (Altman &
Taylor, 1973), i.e. risk awareness of user privacy. That is why we want to
hypothesize that personalization affects Facebook and Instagram user's privacy
perceptions just as it positively affects risk perception of social media users in
our research paper. by Kai Li, Liangqi Cheng, and Ching-I Teng.
*Hypothesize:
H4: Personalization positively affects Facebook and Instagram users'
perception of privacy risks.
25
bias or peer pressure (overwhelming impact and emotional commitment) can
lead to disclosure decisions. Unreasonable data. Therefore, the knowledge and
understanding of social media users about privacy risk is the factor that adjusts
the user's behavior to match the perception of the level of risk they consider to
have can happen to myself.
*Hypothesize:
H5:Users' perceptions of privacy risks on Facebook and Instagram are
positively influenced by user knowledge.
26
Bouguettaya & Eltoweissy, 2003). People are commonly aware that personal
information is often used for financial gain on the internet (e.g. Olivero & Lunt,
2004).
Inadequate data security (e.g., Youn, 2005) is another risk that causes fear.
Finally, OSN users are becoming more mindful that the details they freely share
can be misused by crooks, stalkers, bullies, or even one's own friends (e.g.
Staksrud & Livingstone, 2009; Saunders and Zucker, 1999). Because of the
possibility of being discovered online, those who reveal information online are
not aware of the real-world implications of their acts (Lee, Im & Taylor, 2008;
Youn, 2005). This may explain why people's trust in transparency decreases as
the sensitivity of the information sought rises (Castaeda & Montoro, 2007).
Users still do not understand the full risks of the details they disclose, according
to research (Dwyer, 2007; Govani & Pashley, 2005). According to Youn
(2005), "as teen privacy threats became more serious, they became less able to
provide personal information to a website."
*Hypothesize:
H6: The perception of privacy threats has a negative impact on personal
information disclosure.
27
-This broadens the scope of the topic's tentative model. The hypotheses
pertaining to the link between the variables are then built based on the
hypotheses as well as the two theories that we have chosen.
28
CHAPTER 3: RESEARCH DESIGN
1. RESEARCH PROCESS:
Theoretical basis
↓
Research models
↓
Qualitative research
↓
Complete Questionnaire
↓
Quantitative research
↓
Test Cronbach's Alpha & EFA
scale
↓
CFA analysis
↓
SEM analysis
↓
Analysis & discussion
↓
Conclude
29
2. QUALITATIVE RESEARCH:
Qualitative research is a form of exploratory research in which information is
collected in qualitative form through discussion and interpretation techniques
(Nguyen Dinh Tho and Nguyen Thi Mai Trang, 2007). The qualitative research
phase aims to evaluate:
- Assess the suitability of the scales after adjusting, adding observed variables to
the scale of the user's perceived value for the disclosure of personal information
through two social networking sites Facebook and Instagram.
- Check the word usage in each question of each observed variable to ensure
that all subjects in the surveyed age group understand the correct and clear
meaning.
- Preliminary examination of the correlation of the hypotheses given in the
research model.
Qualitative research results are the basis for building questionnaires for
quantitative research. The scales are inherited from previous studies, however,
different risk perception factors will have different characteristics.
In this study, qualitative research is represented by in-depth interviews with 8
people, including 1 person who is an expert on privacy issues. The remainder
were ordinary users of the social networks Facebook and Instagram,
interviewed using a set of questionnaires to uncover new factors influencing
information disclosure and perceived risk about information disclosure. privacy
as well as adjusting and supplementing the scales.
30
-The group will interview 2 groups of subjects by online interviewing based on
a pre-established outline, the interview process takes place independently and in
groups. First, the group will interview a general question about the factors to be
surveyed with 2 groups of subjects. This question will contribute to the
perception, thinking and perception of each group of subjects that need to be
studied about the perception and intention to disclose personal information on
social networks. As for the risk factor, it will be the question of what risks do
you think users of social networks Facebook and Instagram will face when
disclosing personal information on social networks,... Then , will go specifically
into the observed variables of the factors to be investigated. Through the above
two steps, it will help the group to recognize the thoughts, perceptions, and
evaluations of the two research groups and the information they need to know
about the intention to disclose personal information as well as the perception of
risks about privacy. on social networks Facebook and instagram.
-Scale design:
The scale used to measure the factors in this study is built on the basis of TPR
risk perception theory, consumer behavior theory and planned behavior theory.
32
Figure 12. Research model after qualitative research:
A. Scale of “trust”
The notation for trust is: TRUST. Seven observations are used to measure this
concept, denoted from TRUST1 to TRUST7. The observed variables of this
scale are measured by the seven-point interval scale and based on the scale of
Krasnova et al., 2010. The results of the trust scale include the following
observed variables:
I trust that Facebook and Instagram have sufficient expertise to handle my
personal information.
Facebook and Instagram have good intentions about my personal information.
I trust that my Facebook and Instagram friends have the expertise not to
jeopardize my personal information.
I trust that my Facebook and Instagram friends do nothing with my personal
information that I will not consent to.
33
I trust that my Facebook and Instagram friends keep in mind my preferences
and desires regarding my personal information.
I trust that Facebook and Instagram protect my personal information from
companies and advertisers who want to misuse my information.
I believe Facebook and Instagram will check if people are playing by the rules.
C. Scale of “Habits”
Habit is denoted by HA. Four observations were used to measure this concept,
denoted HA1 to HA4. The observed variables of this scale are measured by the
octave scale and are based on the scale of Verplanken & Orbell, 2003, p. 1329.
The results of the habit scale include the following observed variables:
Sharing personal information is a habit for me.
I sometimes share personal information without thinking about it.
34
Sometimes I share personal information because it's hard for me not to share it
with others
If I see something interesting, the first thing that comes to mind is to share it on
Facebook.
D. Scale of “Personalization”
Personalize the symbol as PE. Three observations are used to measure this
concept, denoted PE1 through PE3. The observed variables of this scale are
measured by the seven-point interval scale and are based on the scale of Xu,
Luo, Carroll & Rosson, 2011. The results of the personalized scale include the
following observed variables:
Facebook and Instagram may provide me with personalized promotions and
deals.
Facebook and Instagram provide me with a push message respectively based on
my interests or personal preferences.
Facebook and Instagram provide me with ads that I like.
E. Scale of “Knowledge”
Notational knowledge is KNL. Six observations were used to measure this
concept, denoted KNL1 through KLN6. The observed variables of this scale are
measured using the seven-point interval scale and are based on the scale of Xu,
Luo, Carroll & Rosson, 2011. The results of the knowledge scale include the
following observed variables:
How knowledgeable are you about virus attacks?
How knowledgeable are you about hacker attacks?
How knowledgeable are you about identity theft?
How knowledgeable are you about credit card theft?
How well do you understand privacy invasions?
How knowledgeable are you about online insults?
35
&Hart, 2004. The results of the privacy risk perception scale include the
following observed variables:
Social networking sites Facebook and Instagram are a danger to the security of
my personal information
I believe that Facebook and Instagram sell my personal information to others.
I am afraid that Facebook and Instagram secretly use my personal information
for purposes with which I do not agree.
Friends of friends or companies on Facebook and Instagram are a danger to my
personal information.
Hackers are a danger to my personal information on Facebook and Instagram.
I'm afraid my Facebook and Instagram friends will get the wrong impression of
me because of the personal information I've shared on Facebook
My Facebook and Instagram friends are a danger to the safety of my personal
information.
I'm afraid my Facebook and Instagram friends might use my personal
information to bully me.
I don't care about the risks of sharing personal information.
I’m afraid that I have unintentionally shared personal information because I
made a mistake.
There are dangers in sharing personal information without my knowledge.
36
H. Scale of “Privacy Policy”
The privacy policy is denoted by POLICY. Three observations were used to
measure this concept, denoted from POLICY1 to POLICY3. The observed
variables of this scale are measured using the octave scale and are based on the
scale of Chang et al. (2018), Xu et al. (2011). The results of the security policy
scale include the following observed variables:
With the privacy statements, on Facebook and Instagram, I believe that my
personal information will be kept private and confidential.
I believe the privacy statements on Facebook and Instagram reflect their
commitment to protecting my personal information.
I believe the privacy statements on Facebook and Instagram are an effective
way to demonstrate their commitment to privacy.
37
adjusting and supplementing from the preliminary scale, the results have 61
observed variables used to measure for nine concepts in the research model.
TRUST
1 I trust that Facebook and Instagram have the TRUST1
expertise to handle my personal information.
2 Facebook and Instagram have good intentions for TRUST2
my personal information.
3 I trust that my Facebook and Instagram-friends TRUST3
have the expertise to not jeopardize my personal
information.
4 I trust that my Facebook and Instagram-friends TRUST4
don’t do anything with my personal information I
would not approve of
5 I trust that my Facebook and Instagram-friends TRUST5
keep my preferences and desires about my personal
information in mind.
6 I trust that Facebook and Instagram protect my TRUST6
personal information against companies and
advertisers that want to abuse my information.
7 I trust that Facebook and Instagram check if TRUST7
everybody is playing by the rules.
PERCEIVED BENEFITS
8 Facebook and Instagram are useful to exchange PEB1
personal information with your friends.
9 Thanks to sharing personal information on PEB2
38
Facebook and Instagram, I get to know people
better.
10 Facebook and Instagram are useful for me to PEB3
monitor what others share about themselves.
11 Sharing personal information on Facebook and PEB4
Instagram is fun.
12 On Facebook and Instagram I have more courage PEB5
in sharing personal information compared to other
situations.
13 By sharing personal information on Facebook and PEB6
Instagram, I get more popular with my Facebook-
friends.
14 I share personal information via Facebook and PEB7
Instagram because it’s better than the alternatives.
15 By sharing personal information on Facebook and PEB8
Instagram, I can make a good impression on my
Facebook-friends.
HABITS
16 Sharing personal information is a habit to me. HA1
17 I sometimes share personal information without HA2
thinking about it.
18 I sometimes share personal information because it HA3
is hard for me not to share it with others
19 If I see something interesting, the first thing that HA4
comes into mind is to share it on Facebook.
PERSONALIZATION
39
personalized advertising and transactions.
21 Facebook and Instagram provide me with a PE2
corresponding push message based on my
preferences or personal interests.
22 Facebook and Instagram provide me with ads I PE3
like.
KNOWLEDGE
23 Perceived understandings about virus attacks. KNL1
24 Perceived understanding about hacker attacks. KNL2
25 Perceived understandings about identification theft. KNL3
26 Perceived understandings about credit card theft. KNL4
27 Perceived understandings about privacy invasion. KNL5
28 Perceived understanding about online insults. KNL6
PERCEPTION OF PRIVACY RISKS
29 Facebook and Instagram as a company is a danger PPR1
for the safety of my personal information.
30 I’m afraid that Facebook and Instagram sell my PPR2
personal information to others.
31 I’m afraid that Facebook and Instagram secretly PPR3
use my personal information for purposes I don’t
agree with.
32 Friends-of-friends or companies on Facebook and PPR4
Instagram are a danger to my personal information.
33 Hackers are a danger for my personal information PPR5
on Facebook and Instagram.
34 I’m afraid my Facebook and Instagram-friends get PPR6
a wrong impression of me because of the personal
information I’ve shared on Facebook.
35 My Facebook and Instagram-friends are a danger PPR7
40
to the safety of my personal information.
36 I’m afraid my personal information can be used by PPR8
my Facebook and Instagram friends to bully me
with.
37 I don’t care about the risks of sharing personal PPR9
information.
38 I’m afraid that I unintentionally shared personal PPR10
information because I made a mistake.
39 There are dangers to sharing personal information PPR11
that I’m not aware of
INTENTION TO DISCLOSE PERSONAL
INFORMATION
40 I filled in what town I live in. DPI1
41 I filled in where I work. DPI2
42 I filled in who my family members are. DPI3
43 I am filled in if I have a relationship. DPI4
44 I filled in my phone number. DPI5
45 I often share my opinion on Facebook and DPI6
Instagram.
46 I often share on Facebook and Instagram where I DPI7
am at that moment.
47 How many times have you felt that your privacy PREX1
has been violated?
48 In the past year, how many times have you heard PREX2
about the indiscriminate use of private information
on the Internet?
49 How much have you heard or read during the last PREX3
41
year about the use and potential misuse of
information privacy about consumers?
50 How often have you personally been a victim of PREX4
what you felt was an invasion of privacy?
PRIVACY POLICY
51 I feel confident that privacy statements on POLICY1
Facebook and Instagram reflect their commitments
to protect my personal information.
52 With privacy statements, on Facebook and POLICY2
Instagram I believe that my personal information
will be kept private and confidential.
53 I believe that privacy statements on Facebook and POLICY3
Instagram are an effective way to demonstrate their
commitments to privacy.
42
Completely do not understand - Completely understand, Not yet ever - Many
times.
3. QUANTITATIVE RESEARCH:
43
Table 2: Calculate the number of survey samples
Age Vietnam's population in Number of sample
2019 by age group members on each group
From 15 to 19 years old. 6,474,991 116
From 20 to 24 years old. 7,145,151 128
From 25 to 29 years old. 8,741,274 156
Total 22,361,416 400
In this study, the minimum number of samples needed is 400. By submitting the
online form, the team obtained 428 answer sheets. After performing the test, out
of 428 responses, 400 were selected to be included in the study.
44
dummy factors (Nguyen Dinh Tho & Nguyen Thi Mai Trang, 2007). Criteria
used when assessing the reliability of the scale: Type of observed variables with
small variable-total correlation coefficient (less than 0.3). According to Nunnall
& Burnstein (1994) that variables with variable-sum correlation coefficient less
than 0.3 are considered garbage variables and will be excluded from the model;
criteria for choosing the scale when the alpha reliability is greater than 0.6 (the
larger the alpha, the higher the internal consistency reliability) (Nunnally &
Burnstein 1994; Nguyen Dinh Tho and Nguyen Thi Mai Trang, 2007).
45
After running the general EFA for the data table, it will move to CFA. In CFA
confirmatory factor analysis, the evaluation of model fit is extremely important.
The scales and latent variables form a measurement model of the concepts used
in the research. With a collected data set, we need to test whether this
measurement model with input data meets the requirements. Do the scales meet
the requirements of a good scale? Any observed variable that does not
contribute to the model does not. For this we need to use confirmatory factor
analysis (CFA).
According to Hair et al. (2010), Multivariate Data Analysis, 7th edition of the
indicators considered to evaluate Model Fit while running CFA include many
discriminant indicators such as: CMIN/df index less than 2 is good; CFI index
greater than 0.8 is acceptable; GFI index greater than or equal to 0.9 is good (In
some topics, due to the limitation of sample size, it is difficult for the GFI value
to reach 0.9 because this index depends a lot on the number of scales, the
number of observed variables and the sample size. Therefore, if the GFI value is
below 0.9 but from 0.8 or higher, it is still accepted according to 2 studies by
Baumgartner and Homburg (1995) and Doll, Xia, and Torkzadeh (1994));
RMSEA index less than 0.08 is good.
46
CHAPTER 4: QUANTITATIVE RESEARCH
RESULTS
1. SAMPLE DESCRIPTION:
By submitting the online form, the team obtained 428 answer sheets. After
performing the test, out of 428 answer sheets, 400 votes were selected to be
47
included in the study and run the data, the sample classification structure
according to the following criteria
Valid Khac 1 .2 .2 .2
48
Tu 25-29 156 39.0 39.0 100.0
tuoi
49
Dich vu tu ban 9 2.3 2.3 15.3
hang
50
About 3-5 hours per day: 127 people (31.75%).
51
1000
52
2. CHECK THE SCALE:
The latent variables in the model before conducting exploratory factor analysis
are tested for the reliability of the scale. To test the reliability of the scale, the
research team used Cronbach's Alpha coefficient. The minimum Cronbach's
Alpha selection criterion is 0.6 according to Hair et al., 1998, but the research
team has taken the minimum standard for the Cronbach's Alpha study to be 0.7
and the correlation coefficient of the sum of the observed variables is minimum.
is 0.3 according to Nunally and Burstein, 1994. The results of the scale test of
the research variables with the lowest Cronbach's Alpha is 0.707 of the variable
"Personalization" and the highest Cronbach's Al phase is 0.87 of the variable
"Risk perception" privacy risk”, the specific results are as follows:
53
2.2. Testing the scale of “Perception of benefits”
The factor "perceived benefit" in the model is measured by 8 observed
variables, the test results show that Cronbach's Alpha is 0.860 greater than 0.7
and the correlation coefficient between the sum of the 8 observed variables is
satisfactory. is greater than 0.3 so no observed variables are excluded.
54
coefficient between variables. sum is greater than 0.3, all observed variables
have a great influence on the reliability of the scale and no observed variables
are excluded.
56
measured by 2 observed variables PREX2 and PREX3. Details are given in the
table below:
57
Table 17: Reliability Statistics and Item-Total Statistics
Cronbach’s Alpha N of Items
.870 11
Scale Mean if Scale Variance if Corrected Item- Cronbach's
Item Deleted Item Deleted Total Correlation Alpha if Item
Deleted
PPR1 45.40 106.797 .597 .858
PPR2 45.41 103.220 .623 .855
PPR3 45.24 102.799 .670 .852
PPR4 45.77 103.976 .635 .855
PPR5 44.93 105.532 .596 .857
PPR6 45.39 104.153 .631 .855
PPR7 45.65 103.652 .656 .853
PPR8 45.72 102.660 .634 .854
PPR9 46.62 109.811 .323 .879
PPR10 45.59 106.038 .494 .865
PPR11 454.96 107.519 .502 .864
59
PE 0.707 3
KNL 0.860 6
PREX 0.786 2
POLICY 0.827 3
PPR 0.870 11
DPI 0.758 7
60
Table 20: 1st- Rotated Component Matrix
Component
1 2 3 4 5 6 7
PEB5 .705
PEB7 .675
PEB4 .670
PEB2 .657
PEB3 .651
PEB6 .651
PEB8 .602
PEB1 .593
TRUST3 .745
TRUST1 .729
TRUST4 .711
TRUST2 .696
TRUST7 .695
TRUST6 .659 .310
TRUST5 .555 .388
KNL2 .861
KNL3 .853
KNL1 .804
KNL4 .734
KNL5 .643
KNL6 .519 .370
HA2 .811
HA1 .808
HA3 .740
HA4 .646
61
POLICY
.865
1
POLICY
.856
2
POLICY
.855
3
PE2 .758
PE1 .696
PE3 .684
PREX3 .857
PREX2 .852
62
HA2 .817
HA1 .813
HA3 .742
HA4 .655
POLICY1 .865
POLICY2 .856
POLICY3 .855
PE2 .766
PE1 .708
PE3 .692
PREX2 .872
PREX3 .869
63
DPI5 .587
DPI7 .565
DPI6 .502
PPR9 .323 .720
However, after removing the observed variable PPR9, the results are not
satisfactory because the extracted variances are all less than 50%. Therefore, the
group in turn selects the observed variables with lower Factor loading than other
variables and removes them to get better results. And after removing 3 bad
variables in the order of DPI6, DPI7, PPR10, there are results: KMO coefficient
is 0.864 and Bartlett test has p value of 0.000 < 0.05, extracted variance is
50.148% larger 50%, the eigenvalue is 2,413 which is greater than 1.
Component
1 2
PPR3 .778
PPR7 .731
PPR2 .729
PPR4 .728
PPR5 .713
PPR6 .707
PPR8 .704
PPR1 .680
PPR11 .614
DPI3 .779
DPI1 .736
DPI4 .706
DPI2 .626
DPI5 .623
64
%
Independent variables 0.878 0.000 64.054
Intermediate and independent 0.864 0.000 50.148
variables
65
PEB2 .636
PEB4 .632
PEB3 .600
PEB8 .551
TRUST3 .798
TRUST4 .762
TRUST1 .662
TRUST7 .612
TRUST2 .603
TRUST6 .559
KNL2 .884
KNL3 .834
KNL1 .766
KNL4 .625
HA1 .799
HA2 .775
HA3 .654
DPI3 .725
DPI4 .639
DPI1 .620
DPI5 .527
DPI2 .515
POLICY
.793
3
POLICY
.793
1
POLICY
.781
2
PE2 .664
PE1 .654
PE3 .554
PREX3 .830
PREX2 .758
Because the factor loading factor analysis standard is greater than 0.5. So
column number 10 will be removed before running AMOS and SEM.
66
4. CONFIRMATORY FACTOR ANALYSIS (CFA):
After completing the EFA exploratory factor analysis step, we have the Pattern
Matrix rotation matrix table. Using this rotation matrix result, we start with the
CFA confirmatory factor analysis step, to form the basis for SEM and give the
final result.
Both Hair et al. (2010) and Hu & Bentler (1999) both agree that the thresholds
for accepting the Model Fit index will be different based on sample size,
number of factor groups, number of observed variables,... In addition, due to the
limitation of sample size, it is difficult for the GFI value to reach 0.9. Therefore,
a minimum value of 0.8 is still accepted according to Baumgartner and
Homburg (1995), and Doll, Xia, and Torkzadeh (1994).
According to Hair et al. (2010), Multivariate Data Analysis, 7th edition
indicators considered to evaluate Model Fit of a topic include:
CMIN/df ≤ 2 is good, CMIN/df ≤ 5 is acceptable;
CFI ≥ 0.9 is good, CFI ≥ 0.95 is very good, CFI ≥ 0.8 is
acceptable;
GFI ≥ 0.9 is good, GFI ≥ 0.95 is very good;
RMSEA ≤ 0.08 is good, RMSEA ≤ 0.03 is very good.
Therefore, the team will rely on the assessment of Hair et al. (2010) to check the
index:
On the first run of the data, DPI5 shows that Standardized Loading Estimates is
less than 0.5, so it is removed from the observed variables. But then, we use the
two-way Covariances arrow to connect the pairs with high MI correction, as
shown below. After removing as well as concatenating highly correlated pairs,
the following indexes are obtained:
67
Independence
.483 .342 .309 .326
model
68
5. STRUCTURAL EQUATION MODELING (SEM):
After analyzing the CFA, the research team continued to analyze the variables
by SEM to find the relationship between the independent variables and the
intermediate and dependent variables and evaluate the hypothesis for the study.
In this study, the group used the program Amos 24.0, p-value (sig) <= 0.05 with
95% confidence. The results of the analysis are as follows:
69
Table 30: Summary of the normalized and values
Regression Weights Standardized
Regression
Weights
Estimate P (sig) Estimate
With the above results we see, when using the standard confidence level of 95
% then the sig of the TRUST variable affecting the intermediate variable PPR is
0.02 < 0.05, so we say that the variable TRUST has an effect on the
intermediate variable PRR and has a standardized regression coefficient of
-0.156 that has a negative effect on the PPR. that is, when TRUST increases by
1, PPR decreases by 1.
The variable KNL does not affect the intermediate variable PPR, the sig of KNL
affecting PPR is 0.357 > 0.05.
The variable PE has an impact on the intermediate variable PPR, the sig PE
effect on PPR is 0.000 < 0.05 and has a standardized regression coefficient of
0.330, which means that when PE increases by 0.330, PPR increases by 0.330.
Similarly, the PREX variable also has an impact on the intermediate variable
PPR with a sig value of 0.000 < 0.05 and a standardized regression coefficient
of 0.401.
70
Among the four variables affecting the dependent variable, there is an
intermediate variable PPR and the independent variable HA has an impact on
the dependent variable DPI, they all have sig less than 0.05, and two
independent variables PEB and POLICY have no impact on the dependent
variable. DPI dependent variable and sig are both greater than 0.05. From the
above results, we conclude that in the 4 independent variables affecting the
intermediate variable PPR, H5 is rejected corresponding to the variable KNL
and has a significant impact on PPR in the order PREX, PE, TRUST. For 4
variables affecting DPI dependent variables, H2 and H8 correspond to PEB and
POLICY variables and have significant effects on DPI in the order HA, PPR.
71
PPR->DPI 0.143 0.025
Of the four variables considered, only the KNL variable has no indirect effect
on the dependent variable through intermediate variable PPR and has a sig value
of 0.265 > 0.05. The remaining variables TRUST, PE, PREX, all affect the
dependent variable indirectly through the intermediate variable PPR and all
have sig value less than 0.05, but the PREX variable has a sig value of 0.05 and
that result is possible to temporarily conclude it has an indirect effect on DPI
through PPR. Among the three variables identified to have an indirect effect on
DPI through the intermediate variable PPR, the independent variable PREX
with the most significant impact on DPI has a standardized regression
coefficient of 0.057, followed by PE with a coefficient of 0.05. standardized
regression is 0.040, and finally, the variable TRUST has a significant negative
impact with a standardized regression coefficient of -0.023.
Test H1: (TRUST) High user trust in the media has a positive impact on the
perception of Facebook and Instagram users. After SEM analysis, the variable
TRUST has an impact on the intermediate variable PPR with the value sig 0.020
< 0.05 and has a negative impact on the variable PPR, therefore, rejecting the
hypothesis H1.
Hypothesis test H2: (PEB), The perceived benefits have a positive effect on the
intention to disclose personal information on Facebook and Instagram.
According to the SEM analysis, the PEB variable has an impact on the DPI
dependent variable with a sig value of 0.162 > 0.05, therefore, the conclusion
that the PEB variable has no impact on the DPI dependent variable, thus
rejecting the hypothesis H2.
72
of 0.008 < 0.05 and has the same effect as the DPI variable, therefore, the
conclusion of hypothesis H3 is correct for this study.
Hypothesis test H5: (KNL) User perception of privacy risks on Facebook and
Instagram is positively influenced by user knowledge. According to the results
of SEM analysis, the variable KNL affects the intermediate variable PPR with a
sig value of 0.357 > 0.05, concluding that the variable KNL does not affect the
intermediate variable PPR and rejecting the hypothesis H5.
Hypothesis test H6: (PPR) Perception of privacy threats has a negative impact
on intention to disclose personal information. According to the results of SEM
analysis, the intermediate variable PPR affects the dependent variable DPI with
a sig value of 0.025 < 0.05 and has the same or positive effect on the DPI
dependent variable, thus rejecting the hypothesis H6.
Hypothesis test H7: (PREX) Intrusive privacy experience has a great influence
on risk perception. According to the SEM analysis results, the PREX variable
affects the intermediate variable PPR with a sig value of 0.000 < 0.05 and has
the same effect as the intermediate variable PPR, concluding that the hypothesis
H7 is true for the study.
Hypothesis testing H8: (POLICY) The perceived effect of the privacy policy in
reducing the intention to disclose personal information on Facebook and
Instagram. According to the SEM analysis results, the variable POLICY affects
the dependent variable DPI with a sig value of 0.354 > 0.05, concluding that the
variable POLICY does not affect the dependent variable, so rejecting the
hypothesis H8.
73
CHAPTER 5: CONCLUSIONS
1. SUMMARY RESULTS:
The survey of factors influencing risk perception and intention to disclose
personal information began with seven independent variables chosen by the
group after reading and researching related reports. and has been thoroughly
edited through the qualitative process. However, those are also the seven factors
influencing perception and intention that were included in the actual survey
with subjects aged 15 to 29 in Vietnam. The 7-scale Likert scale is used to
assess the level of a specific and most accurate one for the observed variables
measured in the study.
Running data, testing the scale, removing unsatisfactory observed variables, and
observing parameters from Cronbach's Alpha, EFA, CFA, and SEM are all
implemented. The topic's outcome was provided by the team: After receiving
the analysis results for the seven initial hypotheses, the research team rejected
five of them: H1, H2, H5, H6, H8, in which the variables of Hypothesis H2, H5,
H8, respectively, the variables PEB, KNL, POLICY do not affect the dependent
variable and the intermediate variable, while the hypotheses' variables H1, H6,
TRUST, and PPR affect an intermediate variable with the dependent variable.
The variables TRUST, PE, and PREX have a direct impact on individual
privacy risk perception in the order PREX, PE, and TRUST, and thus indirectly
affect the intention to disclose user information. And HA is a factor that has a
direct impact on the user's disclosure intent.
2. MEANING:
The research paper's initial goal is to investigate the factors influencing privacy
risk perception and personal information disclosure; examines the relationship
of perceived privacy risk with the intention to disclose personal information on
Facebook and Instagram, thereby proposing a solution for the study. Based on
the above goal, the research team gathered data on variables thought to affect
74
privacy risk perception and personal information disclosure and analyzed the
SEM model to show the new relationship of the variables together.
Privacy risk perception (PPR) influencing variables include user trust variables
-TRUST, personalization -PE, user knowledge -KNL, and privacy-infringed
experience - PREX. Only the user knowledge variable is not statistically
significant for the study, implying that it has no effect on the perception of
privacy risk in this case study.
There is statistical significance in this study for the remaining three variables,
with the variable user's trust affecting the perceived privacy risk variable with
the standard regression value based on the results of SEM model analysis is [-
0.161]. This figure indicates that if user trust or confidence is high in social
networking sites such as Facebook and Instagram, the perception of user
privacy risk is low; this result is beneficial for the research team to have a fresh
look at consumer behavior. For businesses, it takes a long time to develop a
product that will gain the trust of customers. They must ensure that their
products are as risk-free as possible in order to maintain consumer trust because
when consumers choose to trust, they always expect the product's risk to be as
low as possible or zero.
The final variable that influences privacy risk perception is the experience of
privacy invasion, which has a normalized regression coefficient of [0.400] and
explains whether or not a person has ever experienced a privacy breach. The
facts experienced in practice can have a strong impact on people's perception,
similar to a business if the product launch process leaves a bad impression on
the actual user experience, then the product is considered to have failed in
launching and advertising because it was thought to be bad.
75
-PPR; consumer usage habits -HA; awareness of the benefits provided by social
networks -PEB; and the privacy policies of those social networks -POLICY.
Among the aforementioned variables, there are two that are not statistically
significant for the study, i.e They do not affect the user's intention to disclose
personal information in this research case, namely, the perception of benefits
provided by social networks and the privacy policies of those social networks.
There is statistical significance in this study for the other two variables, the
perceived privacy risk variable based on the results of the SEM model analysis
affects the user's intention to disclose personal information. With a normalized
regression value of [0.143], this number indicates that when users are fully
aware of the risks and consequences of stolen privacy, their intentions to post
information are reduced and their vigilance for future posts is increased. Youn
(2005) discovered that "adolescents are less likely to provide personal
information to a website when they perceive a more serious privacy risk."
Based on the results of the SEM model analysis, the impact on the variable of
user intention to disclose personal information has a standardized regression
value of [0.221] for the variable usage habits of customers. This means that if a
person has a habit of regularly updating images and information on social
networks like Facebook and Instagram, it will continue indefinitely. According
to Beldad et al. (2011), the benefits of information disclosure are not the only
reason people share information, but also the "taste" of the disclosure itself
(p.226). The findings of Strater and Richter (2007), who discovered that some
of their respondents were unsure why they shared information, support the
possibility of a strong influence of usage habits. Others didn't hesitate to provide
personal information when asked because they were accustomed to filling out
forms.
Furthermore, because of the direct impact of the PPR variable, there are three
variables that have an indirect influence on social network users' intention to
disclose personal information: -DPI, which is the user's trust variable -TRUST,
personalization -PE, and privacy-invaded experiences -PREX.
With a standardized regression coefficient of [-0.023], the user trust variable has
an indirect impact on the information disclosure intention variable. If the user's
trust or trust is high for social networking sites Facebook and Instagram, their
perceived privacy risk will be low, affecting their intention to continue sharing
in the future. This finding provides the research team with a fresh perspective
76
on consumer behavior. Businesses must ensure that their products pose the least
amount of risk in order to maintain consumer trust. When consumers choose to
use a product, they can say that they trust and believe that the product meets
their needs and that they intend to use it again in the future. Because TRUST
has a negative effect (-) on PPR and PPR has a positive effect (+) on the DPI
variable, TRUST's effect on DPI has the sign (-).
Users will gain more knowledge and a better understanding of their own
personal information as a result of the above results, increasing their vigilance.
At the same time, it provides Facebook and Instagram security administrators
with an overview of the situation, allowing them to develop solutions that help
protect customers' personal information while minimizing risk for user privacy.
Furthermore, based on the survey results, we make recommendations to social
networking site users and social network service providers to help them better
understand the risks associated with sharing personal information.
77
3. LIMITATION OF THEME AND FUTURE RESEARCH
DIRECTIONS
This study provides specific results and contributions that will assist social
networking site owners and users in understanding the factors that influence
perceived privacy risks and intentions to disclose personal information. The
multiplier set by the user. However, there are some limitations to this study:
Firstly, due to research constraints such as time, cost, and the seriousness of the
Covid-19 epidemic, the team only focused on interviewing and surveying users
on a small scale, as well as sending online questionnaires. However, if the scope
of interviews and surveys can be broadened, the research will yield more
general results. As a result, future studies must be carefully invested in and
directly investigated for more positive and practical outcomes.
Secondly, the research method used in this study is a convenient sampling
method, with a small sample size, so the research results will not be as profound
and provide the desired results as a larger sampling method. As a result, it is
prudent to invest in and expand the survey space in order to ensure the validity
and generality of the results.
Thirdly, it was difficult to make an appointment to meet with an expert during
the interview process, so the team could only interview via online message;
additionally, the team lacked in-depth knowledge, so asking questions did not
work. It is not necessary to thoroughly investigate the impact of factors
influencing user perception when promoting topics and goals. As a result,
improving skills as well as learning, listening, and understanding will aid in
developing a deeper understanding of the content as well as the observed
variables of the lesson.
Fourthly, because the team learned the software that runs the data through self-
study and watching video tutorials on YouTube, the team spends a significant
amount of time processing the data tables in SPSS and AMOS. However,
reading the results is also a shortcoming of the article because the team only
focuses on the samples available in documents and videos, resulting in a
shallow and incomplete conclusion.
Finally, the study only surveys seven factors (7 observed variables) that
influence the perception of privacy risks and the intention to disclose personal
information on social media. However, the final results show that only four
factors: HA, PE, PREX, and TRUST, have a direct or indirect impact on the
78
user's perception and behavior. As a result, the results show that the factor
observation and modeling are not complete and professional, and the impact
rate on factors is low. Future research should focus on the effect of demographic
factors on user perception and behavior, as well as learning more about other
factors that influence user perception and behavior. A longitudinal survey is
needed to investigate the effects of perceived control over personal information,
subjective norms, and privacy computational models on information disclosure
of a private message.
4. SOLUTION
It is now normal practice to update information on social networking sites or to
share photographs and content relating to persons. It has put users at danger of
being sold personal information for nefarious purposes, getting defrauded or
losing money as a result of disclosing too much personal information, and so
on. Users are always exposed to the threats that social networking sites like
Facebook and Instagram pose, as well as the benefits that they provide. We can
offer the following recommendations based on the study's findings:
79
and use applications from official sources provided by reliable units. Do not
visit unknown websites or access links on Facebook and Instagram.
Users should also use specialized anti-virus and anti-malware software, which
should be updated regularly to avoid losing important information in personal
devices connected to the Internet.
Before there are effective sanctions to protect users against online attacks and
scams, people need to minimize the provision and sharing of personal
information to ensure their own safety and the people around them.
In this study, we discovered that previous privacy-invading events have the
greatest impact on users' perceptions of danger and their willingness to utilize
social media to share information. As a result, giving evidence of instances
involving the risk of releasing personal information will serve as a warning to
users about the significance and power of information published on social
media platforms.
In addition, photos and videos posted on social networks, seemingly without
revealing personal information, are actually becoming data that are analyzed,
aggregated, and given advertising suggestions according to needs. user demand.
Therefore, users need to consider carefully before posting any information on
social networks.
Moreover, network security officers must learn from the events in order to
improve cybercrime prevention and network security so that consumers can feel
more secure when using social media. Simultaneously, propagandists are urging
and reminding people to be more conscious of the importance of preserving
their own and others' personal information.
Furthermore, putting complete faith in social network privacy policies is not
advisable and potentially dangerous. Because, in reality, social media's existing
security strategy is riddled with flaws and threats. As a result, it's impossible to
foresee whether they'll offer us benefits or risks, and we shouldn't put too much
faith in them.
80
This study indicates that by improving the cybersecurity environment,
information disclosure can be promoted by reducing perceived risk. Therefore,
social networking platforms should provide high-quality privacy policies and
place them in prominent positions to reduce perceived risk. Because of the
higher perceived risk by users in the mandatory provision, platforms should try
to avoid collecting large amounts of sensitive information during the
registration process and should only ask users for information instead of
believing the security. Registered users will find it easier to disclose more
information because they have decided that the risk is low.
81
REFERENCES
Albert L. Ball, Michelle M. Ramim,Yair Levy (2015). Examining users’
personal information sharing awareness, habits, and practices in social
networking sites and e-learning systemshttps://bitly.com.vn/e0zfya
Alemany, J, Del Val, E. and Garcia-Fornes, A.M. (2021),“Who should I grant
access to my post?”: Identifying the most suitable privacy decisions on online
social networks.https://bitly.com.vn/xizk05
Alisa Frik, Alexia Gaudeul (2020). A measure of the implicit value of privacy
under risk.https://bitly.com.vn/cwtzdk
Ashraf Sharif, Saira Hanif Soroya, Shakil Ahmad and Khalid Mahmood (2021).
Antecedents of Self-Disclosure on Social Networking Sites (SNSs): A Study of
Facebook Users.https://bitly.com.vn/iqhb7y
Aungkana Jattamart, Adisorn Leelasantitham (2020). Perspectives to social
media usage of depressed patients and caregivers affecting to change the health
behavior of patients in terms of information and perceived privacy risks.
Baumgartner, H., Homburg, C.: Applications of Structural Equation Modeling
in Marketing and Consumer Research: a review. International Journal of
Research in Marketing 13(2), 139-161 (1996).
Bauer, 1960. Theory of Perceived Risk.
Beldad et al. (2011), the benefits of information disclosure are not the only
reason people share information, but also the "taste" of the disclosure itself
(p.226).
Boyd, 2009. Why teens have a strong presence and visibility on online social
networks.
Byoungsoo Kim; Daekil Kim (2020). Understanding the Key Antecedents of
Users’ Disclosing Behaviors on Social Networking Sites: The Privacy
Paradox.https://bitly.com.vn/sp1vwy
Chang, Y., Wong, S. F., Libaque-Saenz, C. F., & Lee, H. (2018). The role of
privacy policy on consumers' perceived privacy. Government Information
Quarterly, 35(3), 1–15.
Chantal Mutimukwe, Ella Kolkowska, Åke Grönlunda(2019). Information
privacy in e-service: Effect of organizational privacy assurances on individual
privacy concerns, perceptions, trust and self-disclosure
behavior.https://bitly.com.vn/u70v06
Doll, W.J., Xia, W., Torkzadeh, G.: A confirmatory factor analysis of the end-
user computing satisfaction instrument, MIS Quarterly 18(4), 357–369 (1994).
82
E.g Grant, 2005, 2006; Youn, 2005, 2008; Moscardelli & Divine, 2007.
Researchers started to empirically research adolescents and their attitudes
toward online privacy concerns.
E.g. Livingstone, 2008; Lenhart & Madden, 2007; Romer, 2006. The
information disclosure of young adolescents on these services has intensified
worries about loss of privacy.
George Oppong Appiagyei Ampong, Aseda Mensah, Adolph Sedem Yaw Adu,
John Agyekum Addae, Osaretin Kayode Omoregie and Kwame Simpe Ofori
(2018). Examining Self-Disclosure on Social Networking Sites: A Flow Theory
and Privacy Perspective.https://bitly.com.vn/rlypab
Habit develops in the absence of experience or thought (Bargh, 1994; Nosek,
Hawkins, & Frazier, 2011), which may be influenced by environmental
perceptions and performers rather than conscious awareness (Verplanken,
Myrbakk, & Rudi, 2005).
Habit is described as a set of orchestrated behaviors that are activated by
specific cues and lead to a specific outcome (Verlinken & Arts, 2006).
Hongliang Chen, David Atkin(2020). Understanding third-person perception
about Internet privacy risks.https://bitly.com.vn/qb5xqp
Hair et al. (2010), Multivariate Data Analysis, 7th edition.
Juan Shi, Kin Keung Lai, Gang Chen (2020). Individual Retweeting Behavior
on Social Networking Sites: A Study on Individual Information Disseminating
Behavior on Social Networking Sites.https://bitly.com.vn/1b1374
Kai Li, Xiaowen Wang, Kunrong Li, Jianguo Che(2016). Information privacy
disclosure on social network sites.https://bitly.com.vn/xxae8a
Kai Lia , Liangqi Chenga , Ching-I Teng(2020). Voluntary sharing and
mandatory provision: Private information disclosure on social networking
sites.https://bitly.com.vn/j2ngep
Krasnova, H., Spiekermann, S., Koroleva, K., & Hildebrand, T. (2010). Online
social networks: why we disclose. Journal of Information Technology, p.109-
125.
Leon Caesarius (2015). Disclosing personal information to social networking
site providers The role of trust, risk and perceived
benefits.https://bitly.com.vn/gr5wdu
Mashael Aljohani, Alastair Nisbet, Kelly Blincoe (2016). A survey of social
media users' privacy settings & information
disclosure.https://bitly.com.vn/jk1tjx
83
Nguyen Bich (24/7/2019).Lot, lo thong tin ca nhan tren mang Internet: Nhung
nguy co kho luong. https://bitly.com.vn/zllau6
Nina Michael Idou, Milena Maticevski (2016). Consumers' ethical perceptions
of social media analytics practices: Risks, benefits and potential
outcomes.https://bitly.com.vn/7mw9jk
Office of the Assistant for Administration & Managements. Secretary Privacy
Impact Assessment - OPA - Social Media Services. https://bitly.com.vn/bz2m4i
P. Krubhala, P.Niranjana, G.Sindhu Priya (2015).Online Social Network - A
Threat to Privacy and Security of Human Society.https://bitly.com.vn/g159jg
Paul van Schaik, Jurjen Jansen, Joseph Onibokun, Jean Camp, Petko Kusev
(2017). Security and privacy in online social networking: Risk perceptions and
precautionary behaviour.https://bitly.com.vn/5qzaye
PGS.TS. Nguyen Thi Nhung (2020). Protecting the rights to personal data and
information in the current social networking environment in
Vietnam.https://bitly.com.vn/ee3dwz
Phillip Kotler, 2001. Consumer behavior theory.
Population Pyramids of the World from 1950 to 2100. Population of Viet Nam
2019.https://www.populationpyramid.net/viet-nam/2019/
Power and Trope (2006), Users' behaviors may influence their activities.
Rami Baazeem, Alaa Qaffas (2020). The relationship between user religiosity
and preserved privacy in the context of social media and cybersecurity.
RezaMousavi, Rui Chen, Dan J.Kim, Kuanchin Chen (2020). Effectiveness of
privacy assurance mechanisms in users' privacy protection on social
networking sites from the perspective of protection motivation theory.
Ruud H.G. Koehorst, Dr. A. Beldad and Dr. J.M. Gutteling (2013). Personal
Information Disclosure on Online Social Networks.https://bit.ly/3avUlwO
Santor, Messervey & Kusumakar, 2000. For teens the need to be a part of a
social group and to be popular are important parts of their lives.
The concept of habit is "the degree to which people appear to execute activities
unconsciously as a result of learning" (Limayem, Hirt, & Cheung, 2007, p.
709).
The New Rules on Social Media, Privacy and Data
Protection.https://bitly.com.vn/8y0c5q
Tuong Quan (25/6/2020). Dung lo la viec bao ve thong tin ca
nhan.https://bitly.com.vn/1v4xps
84
Verplanken, B., & Orbell, S. (2003). Reflections on Past Behavior: A Self‐
Report Index of Habit Strength1. Journal of Applied Social Psychology, 33(6),
p.1313-1330.https://bitly.com.vn/o5hm0l
Youn (2005) discovered that "adolescents are less likely to provide personal
information to a website when they perceive a more serious privacy risk."
Xu, Dinev, Smith & Hart, (2011a). Information privacy concern: Linking
individual perceptions with institutional privacy assurances. Journal of the
Association for Information Systems. https://bitly.com.vn/j2ngep
Xu, H., Dinev, T., Smith, J., & Hart, P. (2011). Information privacy concerns:
Linking individual perceptions with institutional privacy assurances. Journal of
the Association for Information Systems, 12(12), 798–824.
Xu, Luo, Carroll & Rosson, 2011. The personalization privacy paradox: An
exploratory study of the decision making process for location-aware marketing.
Decision support Systems.https://bitly.com.vn/j2ngep
85
APPENDIX A: QUALIFICATION QUESTION LIST FOR
SPECIALISTS AND FOCUS GROUPS
Interview questions for in-depth interview:
Question 1: Based on your experience posting personal information on social
media, do you believe you can or should not post your personal information and
activities on social media? And how can the data be disseminated? Should
details be selected and screened before being shared on social media platforms
such as Facebook or Instagram? (Objectives 1)
Question 2: How do you think existing consumers consider privacy threats and
the sharing of sensitive information? (Objectives 1)
Question 3: Which causes, in your view, have a strong influence on
expectations of privacy risks as well as the behavior of disclosing personal
information? (Objectives 2)
Question 4: Do you have any solutions or recommendations for safeguarding
sensitive information and privacy on social networking sites? (Objectives 3)
86
APPENDIX B: QUALITATIVE RESPONSE LIST
In-depth interview:
STT Full name Job Age Perform
er
1 Tran Thanh Tung Working at FOX SPORT 31 N.Hang
Focus group:
STT Full name Job Age Perfor
mer
1 Nguyen Dang Minh Quan Student at Ho Chi Minh City 20 T.Nhi
University of Technology
2 Tran Anh Minh Student at University of 25 T.Nhi
Information Technology
3 Ro Cham Bien Student at Ho Chi Minh City 20 P.Be
University of Medicine and
Pharmacy
4 Nguyen Thi Anh Thu Student at University of Foreign 20 P.Be
Language Studies
5 Le Hoang An Student at Ho Chi Minh City 20 T.Hieu
University of Economics
6 Nguyen Thao Nguyen Student at Ho Chi Minh City 20 T.Hieu
University of Economics
7 Tran Nguyen Nhu Quynh Student at Thanh Nhan High 16 N.Duye
School n
87
APPENDIX C: QUANTITATIVE QUESTIONNAIRE FOR
SURVEY
UNIVERSITY OF ECONOMICS HO CHI MINH CITY
SCHOOL OF INTERNATIONAL BUSINESS - MARKETING
MARKETING RESEARCH
TOPIC:
PRIVACY RISK AWARENESS AND INTENTIONS OF DISCLOSURE
OF PERSONAL INFORMATION FACEBOOK AND INSTAGRAM.
ID:
Hi everybody.
We are a group of students from the Faculty of International Business -
Marketing, University of Economics Ho Chi Minh City (UEH). Currently using
social networking sites is very popular for each of us and especially Facebook,
Instagram, ... And whether everyone can be aware of the potential risks. behind
share buttons or after posts on a personal page. So our team conducted a survey
on the topic "Privacy risk awareness and intent to disclose personal information
of social media users Facebook and Instagram" for the study. Marketing, as well
as being able to share with users solutions, or suggestions to protect themselves
against the strong development of the internet in today's society.
Hope you spend some valuable time helping our team complete the questions in
this survey to support the research process. And the team pledges that all of
your information and opinions will be kept confidential and used for academic
purposes only.
Sincerely thank!
88
No Measurement items
PART 1: DEMOGRAPHIC QUESTIONS
1. What is your gender?
Male
Female
Others
2. What is your age?
From 15 to 19
From 20 to 24
From 25 to 29
89
6. How long do you normally use a Facebook or Instagram
account?
Less than 1 year
From 2-3 years
From 3-5 years
More than 5 years
TRUST
1-7(Completely disagree- completely agree) 1 2 3 4 5 6 7
1 I trust that Facebook and Instagram have the
expertise to handle my personal information.
2 Facebook and Instagram have good intentions for
my personal information.
3 I trust that my Facebook and Instagram-friends
have the expertise to not jeopardize my personal
information.
4 I trust that my Facebook and Instagram-friends
90
don’t do anything with my personal information I
would not approve of
5 I trust that my Facebook and Instagram-friends
keep my preferences and desires about my
personal information in mind.
6 I trust that Facebook and Instagram protect my
personal information against companies and
advertisers that want to abuse my information.
7 I trust that Facebook and Instagram check if
everybody is playing by the rules.
PERCEIVED BENEFITS
1-7(Completely disagree- completely agree) 1 2 3 4 5 6 7
8 Facebook and Instagram are useful to exchange
personal information with your friends.
9 Thanks to sharing personal information on
Facebook and Instagram, I get to know people
better.
10 Facebook and Instagram are useful for me to
monitor what others share about themselves.
11 Sharing personal information on Facebook and
Instagram is fun.
12 On Facebook and Instagram I have more courage
in sharing personal information compared to other
situations.
91
Instagram, I can make a good impression on my
Facebook-friends.
HABIT
1-7(Completely disagree- completely agree) 1 2 3 4 5 6 7
16 Sharing personal information is a habit to me.
17 I sometimes share personal information without
thinking about it.
18 I sometimes share personal information because it
is hard for me not to share it with others
19 If I see something interesting, the first thing that
comes into mind is to share it on Facebook.
PERSONALIZATION
1-7(Completely disagree- completely agree) 1 2 3 4 5 6 7
20 Facebook and Instagram can provide me with
personalized advertising and transactions.
21 Facebook and Instagram provide me with a
corresponding push message based on my
preferences or personal interests.
22 Facebook and Instagram provide me with ads I
like.
KNOWLEDGE
1-7(Totally incomprehensible- Completely 1 2 3 4 5 6 7
understood)
23 Perceived understandings about virus attacks.
24 Perceived understanding about hacker attacks.
25 Perceived understandings about identification
theft.
26 Perceived understandings about credit card theft.
92
27 Perceived understandings about privacy invasion.
28 Perceived understanding about online insults.
93
that I’m not aware of.
PRIVACY INVASION EXPERIENCE
PRIVACY POLICY
1-7(Completely disagree- completely agree) 1 2 3 4 5 6 7
44 I feel confident that privacy statements on
Facebook and Instagram reflect their commitments
to protect my personal information.
94
48 I filled in where I work.
49 I filled in who my family members are.
50 I am filled in if I have a relationship.
51 I filled in my phone number.
52 I often share my opinion on Facebook and
Instagram.
53 I often share on Facebook and Instagram where I
am at that moment.
We sincerely thank you for taking the time to complete the survey for us. And
hopefully the questions of the group topic can partly help people orient and
protect themselves.
Once again sincerely thank you, and good day everyone.
95
APPENDIX D: CFA DIAGRAM
96
97
APPENDIX E: SECONDARY DATA SOURCES
Link: https://bitly.com.vn/xlmz8e
98
PERFORMANCE ASSESSMENT TABLE:
Members Exercise 1 Exercise 2 Exercise 3 Exercise 4 Report
Nguyễn Bình Thảo 100% 100% 100% 100% 100%
Nhi
Bế Nguyễn Hằng 100% 100% 100% 90% 100%
99