The effects of privacy awareness, security concerns and trust on information sharing in social media among public university students in Selangor
<p>The purpose of this research was to determine the effect of privacy awareness on</p><p>security concerns, the effect of privacy awareness and security concerns on trust and</p><p>the effect of privacy awareness, security concer...
Saved in:
Main Author: | |
---|---|
Format: | thesis |
Language: | eng |
Published: |
2023
|
Subjects: | |
Online Access: | https://ir.upsi.edu.my/detailsg.php?det=10237 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
id |
oai:ir.upsi.edu.my:10237 |
---|---|
record_format |
uketd_dc |
institution |
Universiti Pendidikan Sultan Idris |
collection |
UPSI Digital Repository |
language |
eng |
topic |
T Technology |
spellingShingle |
T Technology Ara Anjuman The effects of privacy awareness, security concerns and trust on information sharing in social media among public university students in Selangor |
description |
<p>The purpose of this research was to determine the effect of privacy awareness on</p><p>security concerns, the effect of privacy awareness and security concerns on trust and</p><p>the effect of privacy awareness, security concerns and trust on information sharing in</p><p>the social media platform. This study employed a quantitative method. Data were</p><p>collected from a sample of 373 public university students, in the age range of 18 to 29</p><p>years old in Selangor using an online questionnaire. To analyze the data, descriptive</p><p>analysis and covariance-based structural equation modeling (CB-SEM) were used.</p><p>Based on the R2 value, 17.0 per cent of the total variance in security concerns (SC) is</p><p>explained by privacy awareness (PA), 6.0 per cent of the variance in the trust is</p><p>explained by PA and SC, while 27.0 per cent of the variance in information sharing</p><p>(IS) is explained by PA, SC and trust. The findings showed the significant positive</p><p>effects of PA on trust (=0.273, p<0.05), trust on IS (=0.447, p<0.001), and PA on</p><p>SC (=0.464, p<0.001). The findings also indicated the significant negative effect of</p><p>SC on trust (=-0.227, p<0.05) and PA on IS (=-0.400, p<0.001). The effect of SC</p><p>on IS (=-0.020, p>0.1) is not significant. In conclusion, to promote IS in social</p><p>media platforms, trust is the dominant factor that should be enhanced, in which</p><p>privacy awareness could promote trust, but security concerns weaken the trust. In</p><p>implication, the findings provide the service providers and sellers with useful</p><p>information on the elements of privacy, security and trust that need to be emphasized</p><p>to encourage users to share their information online.</p> |
format |
thesis |
qualification_name |
|
qualification_level |
Master's degree |
author |
Ara Anjuman |
author_facet |
Ara Anjuman |
author_sort |
Ara Anjuman |
title |
The effects of privacy awareness, security concerns and trust on information sharing in social media among public university students in Selangor |
title_short |
The effects of privacy awareness, security concerns and trust on information sharing in social media among public university students in Selangor |
title_full |
The effects of privacy awareness, security concerns and trust on information sharing in social media among public university students in Selangor |
title_fullStr |
The effects of privacy awareness, security concerns and trust on information sharing in social media among public university students in Selangor |
title_full_unstemmed |
The effects of privacy awareness, security concerns and trust on information sharing in social media among public university students in Selangor |
title_sort |
effects of privacy awareness, security concerns and trust on information sharing in social media among public university students in selangor |
granting_institution |
Universiti Pendidikan Sultan Idris |
granting_department |
Fakulti Pengurusan dan Ekonomi |
publishDate |
2023 |
url |
https://ir.upsi.edu.my/detailsg.php?det=10237 |
_version_ |
1804890536292646912 |
spelling |
oai:ir.upsi.edu.my:102372024-05-23 The effects of privacy awareness, security concerns and trust on information sharing in social media among public university students in Selangor 2023 Ara Anjuman T Technology <p>The purpose of this research was to determine the effect of privacy awareness on</p><p>security concerns, the effect of privacy awareness and security concerns on trust and</p><p>the effect of privacy awareness, security concerns and trust on information sharing in</p><p>the social media platform. This study employed a quantitative method. Data were</p><p>collected from a sample of 373 public university students, in the age range of 18 to 29</p><p>years old in Selangor using an online questionnaire. To analyze the data, descriptive</p><p>analysis and covariance-based structural equation modeling (CB-SEM) were used.</p><p>Based on the R2 value, 17.0 per cent of the total variance in security concerns (SC) is</p><p>explained by privacy awareness (PA), 6.0 per cent of the variance in the trust is</p><p>explained by PA and SC, while 27.0 per cent of the variance in information sharing</p><p>(IS) is explained by PA, SC and trust. The findings showed the significant positive</p><p>effects of PA on trust (=0.273, p<0.05), trust on IS (=0.447, p<0.001), and PA on</p><p>SC (=0.464, p<0.001). The findings also indicated the significant negative effect of</p><p>SC on trust (=-0.227, p<0.05) and PA on IS (=-0.400, p<0.001). The effect of SC</p><p>on IS (=-0.020, p>0.1) is not significant. In conclusion, to promote IS in social</p><p>media platforms, trust is the dominant factor that should be enhanced, in which</p><p>privacy awareness could promote trust, but security concerns weaken the trust. In</p><p>implication, the findings provide the service providers and sellers with useful</p><p>information on the elements of privacy, security and trust that need to be emphasized</p><p>to encourage users to share their information online.</p> 2023 thesis https://ir.upsi.edu.my/detailsg.php?det=10237 https://ir.upsi.edu.my/detailsg.php?det=10237 text eng closedAccess Masters Universiti Pendidikan Sultan Idris Fakulti Pengurusan dan Ekonomi <p>Acquisti, A. & Gross, R. (2006). Imagined communities: Awareness, information sharing, and privacy on the Facebook. 6th International Workshop on Privacy Enhancing Technologies. Springer Berlin Heidelberg, 3658.</p><p></p><p>Aljohani, M., Nisbet, A., & Blincoe, K. (2016). A survey of social media users privacy settings &amp; information disclosure. 6775. https://doi.org/10.4225/75/58a693deee893</p><p></p><p>Abdul Hamid, N., Ishak, M., Ismail, S., & Mohamad Yazam, S. (2013). Social Media Usage among University Students in Malaysia. Social Media and the New Academic Environment: Pedagogical Challenges, 244-255. doi:https://doi.org/10.4018/978-1- 4666-2851-9.ch012.</p><p></p><p>Ahmad, R., Hassan, N. A., Tajuddin, J. M., Wimpi & Yollanda T. (2018). A Study on Social Media Usage among Private University Students in Klang Valley. Journal Sultan Alauddin Sulaiman Shah. 5, 257-268.</p><p></p><p>Ahmad, N. A. (2019). Information Privacy Awareness Among Young Generation in Malaysia. 5(2), 110.</p><p></p><p>Ali, S., Islam, N., Rauf, A., Din, I. U., Guizani, M., & Rodrigues, J. J. P. C. (2018). Privacy and security issues in online social networks. Future Internet, (12), 112. https://doi.org/10.3390/fi10120114.</p><p></p><p>Ajzen, I. (1991). The theory of planned behaviour. Organizational Behavior and Human Decision Processes, 50(2), 179211.</p><p></p><p>Aldhafferi, N., Watson, C., & Sajeev, A. (2013). Personal Information Privacy Settings of Online Social Networks and Their Suitability for Mobile Internet Devices. International Journal of Security, Privacy and Trust Management,2(2), 1-17. doi:10.5121/ijsptm.2013.2201.</p><p></p><p>Aljohani M., Nisbet, A., & Blincoe, K. (2016). A survey of social media users privacy setting& amp; information disclosure. The Proceeding of 14th AustralianInformation Security Management Conference 67-75. https://doi.org/10.4225/75/58a693deee893.</p><p></p><p>Almadhoun, N., Dominic, P., & Woon, F. (2011). Perceived Security, Privacy, and Trust concernss within Social Networking Sites. IEEE International Conference on Control System, Computing and Engineering. 426-431.</p><p></p><p>Ampong, G., Mensah, A., Adu, A., Addae, J., Omoregie, O. K. & Ofori, K. S. (2018). Examining self-disclosure on social networking sites: A flow theory and privacy perspective. Behavioral Sciences. 8(6), 1-17.</p><p></p><p>Anderson, J. C. & Gerbing, D. W. 1988. Structural Equation Modeling in Practice: A Review and Recommended Two-Step Approach. Psychological Bulletin 103(3): 411-423.</p><p></p><p>Afifi, T. D. (2003). Feeling caughtin stepfamilies: Managing boundary turbulence through appropriate communication privacy rules. Journal of Social and Personal Relationships, 20(6), 729755.</p><p></p><p>Abranovic, W.A. (1997) Statistical Thinking and Data Analysis for Managers. Reading, MA: Addison-Wesley.</p><p></p><p>Arbuckle, J. L. 2007. Amos 16.0 Users Guide. Chicago, USA: Amos Development Corporation..</p><p></p><p>Avkiran, N. K. (2017). An in-depth discussion and illustration of partial least squares structural equation modeling in health care. Health Care Management Science, 1-8. doi: 10.1007/s10729-017-9393-7.</p><p></p><p>Ayaburi, E. W., & Treku, D. N. (2020). Effect of penitence on social media trust and privacy concernss: The case of Facebook. International Journal of Information Management, 50(February 2019), 171181. https://doi.org/10.1016/j.ijinfomgt.2019.05.014.</p><p></p><p>Baxter, L., Braithwaite, D., Petronio, S., & Durham, W. T. (2014). Communication Privacy Management Theory: Significance for Interpersonal Communication. Engaging Theories in Interpersonal Communication: Multiple Perspectives, 309322. https://doi.org/10.4135/9781483329529.n23.</p><p></p><p>Baruh, L., Secinti, E., Cemalcilar, Z. (2017). Online privacy concernss and privacy management: a meta-analytical review. J. Commun. 67, 2653.</p><p></p><p>Bagozzi, R. P. & Yi, Y. 2012. Specification, Evaluation, and Interpretation of Structural Equation Models. Journal of the Academy of Marketing Science 40(1): 8-34.</p><p></p><p>Blau, P. (1964). Exchange And Power In Social Life. New York: John Wiley & Sons.</p><p></p><p>Benson, V., Saridakis, G. & Tennakoon, H. (2015). Information disclosure of social media users: Does control over personal information, user awareness and security notices matter? Information Technology and People 426-441. 10.1108/ITP-10-2014-0232.</p><p></p><p>Bernama. Malaysia ranks top 5 globally in mobile social penetration, highest in region. Retrieved January 31, 2019, from https://www.nst.com.my/lifestyle/bots/2019/01/456119/malaysia-ranks-top-5-globally-mobile-social-media-penetration-highest</p><p></p><p>Berman, J. and Bruening, P. (2001) Is privacy still possible in the twenty-first century?, Social Research, Vol. 68, No. 1, pp.306318.</p><p></p><p>Buchanan, R., Scevak, J., Smith, S. & Southgate, E. (2019). Disclosure in the Post digital age: University Students ' Attitudes to Social Disclosure in the Post digital age:</p><p>University Students Attitudes to Social Media. Retrieved June, 2019, from https://www.researchgate.net/publication/333783532.</p><p></p><p>Barrett-Maitland, N., Barclay, C., & Osei-Bryson, K. M. (2016). Security in Social Networking Services: A Value-Focused Thinking Exploration in Understanding Users" Privacy and Security Concernss. Information Technology for Development, 22(3), 464486. http://doi.org/10.1080/02681102.2016.1173002</p><p></p><p>Bhatt, Dr. Kedar, D. K. P. (2019). Role of Security and Trust in Online Consumer Behavior. (ISSN: 2394-3114 Vol-40, Special Issue-08 National), 09.</p><p></p><p>Brandtzg, P.B., Lders, M., Skjetne, J.H., 2010. Too many facebook friends? Content sharing and sociability versus the need for privacy in social network sites. Int. J. Hum.Comput. Interact. 26 (1112), 10061030.</p><p></p><p>Braithwaite, D., & Schrodt, P. (2014). Engaging Theories in Interpersonal Communication: Multiple Perspectives Social Exchange Theories : Calculating the Rewards and Costs of Personal Relationships. Engaging Theories in Interpersonal Communication: Multiple Perspectives, 377390. https://doi.org/10.4135/9781483329529.n28</p><p></p><p>Bellman, S., Johnson, E.J., Kobrin, S.J. and Lohse, G.L. (n.d.) International differences in information privacy concernss: a global survey of consumers [online] https://www8.gsb.columbia.edu/sites/decisionsciences/files/files/1172.pdf (accessed 19 November 2015).</p><p></p><p>Bartlett, J. E., Kotrlik, J. W. & Higgins, C. C. 2001. Organizational research: determining appropriate sample size in survey research. Learning and Performance Journal, 19, 43-50.</p><p></p><p>Beldad, A. D. (2015). Sharing to be sociable, posting to be popular: factors influencing non-static personal information disclosure on Facebook among young Dutch users. International Journal of Web Based Communities, 11(3/4), 357. https://doi.org/10.1504/ijwbc.2015.072132</p><p></p><p>Baines, P. and Chansarkar, B. (2002), Introducing Marketing Research, England: John Wiley & Sons, Ltd.</p><p></p><p>Baker, T. L. 1994. Doing social research. 2nd ed. New York: McGraw - Hill Inc. 499.</p><p></p><p>Babbie, E. R. (1990). Survey research methods Wadsworth Pub. Co Belmont, Calif, 7882.</p><p></p><p>Bhattacherjee, A. 2012. Social Science Research: Principles, Methods, and Practices. 2nd edition. Zurich, Switzerland: Creative Commons Attribution.</p><p></p><p>Bryman, A. and Cramer, D. (2005), Quantitative Data Analysis with SPSS 12 and 13: A guide for social scientists, East Sussex: Routledge.</p><p></p><p>Buettner, R. (2015). Analyzing the Problem of Employee Internal Social Network Site Avoidance : Are Users Resistant due to their Privacy Concernss ?</p><p></p><p>Byrne, B. M. (2001), Structural Equation Modelling with Amos: Basic Concepts, Applications, and Programming, Mahwah, NJ: Erlbaum.</p><p></p><p>Byrne, B. M. 2010. Structural Equation Modeling with Amos: Basic Concepts, Applications, and Programming. 2nd edition. New York: Taylor and Francis Group.</p><p></p><p>Byrne, B. M. (2016). Structural Equation Modeling With AMOS: Basic Concepts, Applications, and Programming (3rd ed.). New York: Routledge.</p><p></p><p>Cavusoglu, H., Phan, T., Cavusoglu, H., & Airoldi, E. (2016). Assessing the impact of granular privacy controls on content sharing and disclosure on Facebook. Information Systems Research. 27(4), 848-879.</p><p></p><p>Cater, T. & Cater, B. 2010. Product and Relationship Quality Influence on Customer Commitment and Loyalty in B2b Manufacturing Relationships. Industrial Marketing Management 39(8): 1321-1333.</p><p></p><p>Chandio, F. (2011). Studying Acceptance Of Online Banking Information System: A Structural Equation Model: A thesis submitted for the degree of Doctor of Philosophy. (June), 1269.</p><p></p><p>Chang, L.; Chen, J.V. (2014). Aligning principal and agents incentives: A principalagent perspective of social networking sites. Expert Syst. Appl., 41, 30913104.</p><p></p><p>Chang, S. J., VanWitteloostuijn, A., & Eden, L. (2010). From the editors: Common method variance in international business research. Journal of International Business Studies, 41(2), 178184.</p><p></p><p>Chang, L. (1994). A Psychometric Evaluation of 4-Point and 6-Point Likert-Type Scales in Relation to Reliability and Validity. Applied Psychological Measurement, 18(3), 205215. https://doi.org/10.1177/014662169401800302.</p><p></p><p>Cheng, T., Lam, D.Y.C. & Yeung, A.C.L. (2006) "Adoption of internet banking: an empirical study in Hong Kong", Decision Support Systems, vol. 42, no. 3, pp. 1558-1572.</p><p></p><p>Cheung, C., Lee, Z. W. Y. & Chan, T. K. H. (2015). Self-disclosure in social networking sites. Internet Research. 25(2), 279-299. 10.1108/IntR-09-2013-0192.</p><p></p><p>Chen, Yu-Hui and S. Barnes, 2007. Initial trust and online buyer behavior, Industrial Management & Data Systems, 107(1): 21-36.</p><p></p><p>Chin, W.W. (1998b). The partial least squares approach to structural equation modelling. In Marcoulides (Ed.), Modern Methods for Business Research. Mahwah: Lawrence Erlbaum Associates.</p><p></p><p>Chin, E., Felt, A.P., Sekar, V. and Wagner, D. (2012) Measuring user confidence in smartphone security and privacy, Proceedings of the Eighth Symposium on Usable Privacy and Security, No. 1, ACM.</p><p></p><p>Chiu, C.-M. & Wang, E. T. G. 2008. Understanding Web-Based Learning Continuance Intention: The Role of Subjective Task Value. Information & Management 45(3): 194-201.</p><p></p><p>Cho, H., Lee, J., Chung, S. (2010). Optimistic bias about online privacy risks: testing the moderating effects of perceived controllability and prior experience. Comput. Hum. Behav. 26 (5), 987995.</p><p></p><p>Choi, B.C.F.; Land, L. (2016). The effects of general privacy concernss and transactional privacy concernss on Facebook apps usage. Inf. Manag. 53, 868877.</p><p></p><p>Choi, S. (2016). The flipside of ubiquitous connectivity enabled by smartphone-based social networking service: Social presence and privacy concerns. Computers in Human Behavior, 65, 325333.</p><p></p><p>Choi, Y. (2013). A structural equation model of the determinants of repeat purchase behaviour of online grocery shoppers in the UK. 230.</p><p></p><p>Cho, H., Rivera-Snchez, M., & Lim, S. S. (2009). A multinational study on online privacy: Global concernss and local responses. New Media & Society, 11(3), 395416. http://dx.doi.org/10.1177/1461444808101618</p><p></p><p>Churchill, G.A. 1(987), Marketing Research: Methodological Foundations, Fifth edition, The Dryden Press, New York, USA.</p><p></p><p>Clinch, J. ITIL V3 and Information Security. Best Management Practice, White Paper Retrieved 12 July 2013, from http://www.best-management-practice.com/gempdf/itilv3_and_information_security_ white_paper_may09.</p><p></p><p>Clement, J (2020). Social media-Statistics & Facts. Retrieved from</p><p>https://www.statista.com/topics/1164/social-networks/</p><p></p><p>Coppola, N., Hiltz, S.R., Rotter, N. (2004). Building trust in virtual teams. IEEE Transactions on Professional Communication 47 (2), 95104.</p><p></p><p>Coakes, S. J. & Steed, L. G. 2003. Spss Analysis without Anguish: Version 11.0 for Windows. Queensland: John Wiley & Sons Australia Ltd.</p><p></p><p>Cohen, J. & and Cohen, P. (1983) Applied multiple regression/correlation analysis for the behavioral science, 2nd edn, Hillsdale, NJL Lawrence Erlbaum Associates, Inc.</p><p></p><p>Connelly, L. M. (2008). Research Roundtable: Pilot studies. Medsurg Nursing, 17(6), 411412. Retrieved from http://search.ebscohost.com/login.aspx?direct=true&db=a9h&AN=36085347&site=ehost-livefile://C:%5Cdownloads%5CJ#6301 Connelly MedSurgNursing 2008.pdf.</p><p></p><p>Cooper, D.R. and Schindler, P.S. (2001), Business Research Methods, 7th ed., Irwin/ McGraw-Hill, Singapore.</p><p></p><p>Courtney Walton, S.; Rice, R.E. (2013). Mediated disclosure on Twitter: The roles of gender and identity in boundary impermeability, valence, disclosure, and stage. Comput. Hum. Behav. 29, 14651474.</p><p></p><p>Chan, L. L., & Idris, N. (2017). Validity and Reliability of The Instrument Using Exploratory Factor Analysis and Cronbach's alpha. International Journal of Academic Research in Business and Social Sciences, 7(10), 400410. https://doi.org/10.6007/ijarbss/v7-i10/3387</p><p></p><p>Child, J. T., Pearson, J. C., & Petronio, S. (2009). Blogging, communication, and privacy management: Development of the blogging privacy management measure. Journal of the American Society for Information Science and Technology, 60(10), 20792094. http://dx.doi.org/10.1002/asi.21122.</p><p></p><p>Chung, K. C., Chen, C. H., Tsai, H. H., & Chuang, Y. H. (2021). Social media privacy management strategies: A SEM analysis of user privacy behaviors. Computer Communications, 174(March), 122130. https://doi.org/10.1016/j.comcom.2021.04.012.</p><p></p><p>Cloarec, J., Meyer-Waarden, L., & Munzel, A. (2022). The personalizationprivacy paradox at the nexus of social exchange and construal level theories. Psychology and Marketing, 39(3), 647661. https://doi.org/10.1002/mar.21587.</p><p></p><p>Cox EP. The optimal number of response alternate for a scale: A review. Journal of Marketing Research. 1980;17(4):407-422.</p><p></p><p>D. Ingram. Facebook says data leak hits 87 million users, widening privacy scandal. Reuters. Retrieved April 5, 2018, from https://www.reuters.com/article/us-facebook-privacy/facebook-says-data-leak-hits-87-million-users-widening-privacy-scandal-idUSKCN1HB2CM.</p><p></p><p>Dai, H., & Chen, Y. (2015). Effects of Exchange Benefits, Security Concerns and Situational Privacy Concerns on Mobile Commerce Adoption. Journal of International Technology and Information Management, 24(3), 41.</p><p></p><p>De Wolf, R.; Willaert, K.; Pierson, J. (2014). Managing privacy boundaries together: Exploring individual and group privacy management strategies in Facebook. Comput. Hum. Behav. 35, 444454.</p><p></p><p>DataReportal. (2022). Digital 2022: Portugal. (January), 109. Retrieved from https://datareportal.com/reports/digital-2022-portugal</p><p></p><p>Delafrooz, N., L.H. Paim and A. Khatibi, 2011. Understanding consumers internet purchase intention in Malaysia. African Journal of Business Management, 5(3): 2837-2846.</p><p></p><p>Dhami, A., Agarwal, N., Chakraborty, T., Singh, B. P., & Minj, J. (2013). Impact of trust, security and privacy concernss in social networking: An exploratory study to understand the pattern of information revelation in Facebook. Proceedings of the 2013 3rd IEEE International Advance Computing Conference, IACC 2013. 2, 465-469.</p><p></p><p>Dhawan, S, Singh, K & Goel, S. (2014). Impact of privacy attitude, concerns and awareness on use of online social networking. Proceedings of the 5th International Conference on Confluence 2014: The Next Generation Information Technology Summit 14-17. 10.1109/CONFLUENCE.2014.6949226.</p><p></p><p>Dongke, P., & Sannusi, S. N. (2021). Social Media Use among University Students in Malaysia during the COVID-19 Pandemic. Higher Education and Oriental Studies, 1(4), 1725. https://doi.org/10.54435/heos.v1i4.28.</p><p></p><p>Dwyer, C., Hiltz, S., Passerini, K. (2007). Trust and privacy concerns within social networking sites: a comparison of Facebook and MySpace. Proceedings of the Thirteenth Americas Conference on Information Systems, Keystone, Colorado.</p><p></p><p>Dwyer, C., Roxanne Hiltz, S., Passerini, K., & Roxanne, S. (2007) Association for Information Systems AIS Electronic Library (AISeL) Trust and Privacy Concerns Within Social Networking Sites: A Comparison of Facebook and MySpace Recommended Citation "Trust and Privacy Concerns Within Social Networking Sites. AIS eLibrary. 12-31.</p><p></p><p>Dinev, T., & Hart, P. (2006). An extended privacy calculus model for e-commerce transactions. Information Systems Research, 17(1), 61-80.</p><p></p><p>Davis, F.D., (1989), Perceived Usefulness, Perceived Ease of Use, and User Acceptance of Information Technology, MIS Quarterly, Vol. 13, No. 3, pp. 319-339.</p><p></p><p>Davis, F., Bagozzi, R. & Warshaw, P. (1989) "User Acceptance of Computer Technology: A Comparison of Two Theoretical Models", Management Science, vol. 35, no. 8, pp. 982-1003.</p><p></p><p>Dolma, S. (2010). The central role of the unit of analysis concept in research design. Istanbul University Journal of the School of Business Administration, 39(1), 169174. Retrieved from: http://eds.b.ebscohost.com.uplib.idm.oclc.org/ehost/pdfviewer/pdfviewer?vid=33&sid=557e1ca9-810b-4e4f-ae0a-c29c73493ce2@sessionmgr103&hid=117.</p><p></p><p>Diefenbach, M.A., Weinstein, N.D., & OReilly, J. (1993). Scales for assessing perceptions of health hazard susceptibility. Health Education Research, 8, 181-192.</p><p></p><p>Enders, C. K. & Bandalos, D. L. 2001. The Relative Performance of Full Information Maximum Likelihood Estimation for Missing Data in Structural Equation Models. Structural Equation Modeling A Multidisciplinary Journal 8(3): 430-457.</p><p></p><p>Erkan, I. (2016). The Influence of Electronic Word of Mouth in Social Media on Consumers Purchase Intentions. Computers in Human Behavior, 61, 4755.</p><p></p><p>Et.al, N. H. H. (2021). Awareness about Cyber bullying on Social Media among Female Students in a Malaysian Public University. Turkish Journal of Computer and Mathematics Education (TURCOMAT), 12(3), 15921601. https://doi.org/10.17762/turcomat.v12i3.972.</p><p></p><p>Etikan, I. (2017). Sampling and Sampling Methods. Biometrics & Biostatistics International Journal, 5(6), 57. https://doi.org/10.15406/bbij.2017.05.00149.</p><p></p><p>Fern, L., Zanariah, S., & Ishak, A. (2018). Trust and Other Factors that Drive Students Self -Disclosure on Social Networking Sites. 1, 25-31.</p><p></p><p>Finstad, K. (2010). Response Interpolation and Scale Sensitivity: Evidence Against 5-Point Scales Usability Metric for User Experience View project. Journal of Usability Studies, 5(3), 104110. Retrieved from https://www.researchgate.net/publication/265929744.</p><p></p><p>Fink, A. (1995). The survey handbook. Thousand Oaks, CA: Sage Publications.</p><p></p><p>Flavin, C. and Guinalu, M. (2006) Consumer trust, perceived security and privacy policy: three basic elements of loyalty to a web site, Industrial Management and Data Systems, Vol. 106, No. 5, pp.601620.</p><p></p><p>Fogel, J., Nehmad, E. (2009). Internet social network communities: risk taking, trust, and privacy concernss. Computers in Human Behavior 25, 153160.</p><p></p><p>Fornell, C. & Larcker, D. F. 1981. Evaluating Structural Equation Models with Unobservable Variables and Measurement Error. Journal of Marketing Research 18(1): 39-50.</p><p></p><p>Fornell, C., & Bookstein, F.L. (1982). two structural equation models: LISREL and PLS applied to consumer exit-voice theory. Journal of Marketing Research, 19(4), 440-452.</p><p></p><p>Fox, A.K., & Royne, M.B. (2018). Private information in a social media world: Assessing consumers fear and understanding of social media privacy. Journal of Marketing Theory & Practice, 26, 72- 89. https://doi.org/10.1080/10696679.2017.1389242.</p><p></p><p>Frampton, B.D.; Child, J.T. (2013). Friend or not to friend: Coworker Facebook friend requests as an application of communication privacy management theory. Comput. Hum. Behav. 29, 22572264.</p><p></p><p>Fairbairn, W., & Kessler, A. (2015). Practical Advice for Selecting Sample Sizes. Dced, (May), 111.</p><p></p><p>Fuller, C. M., Simmering, M. J., Atinc, G., Atinc, Y., & Babin, B. J. (2016). Common methods variance detection in business research. Journal of Business Research, 69(8), 31923198. https://doi.org/10.1016/j.jbusres.2015.12.008.</p><p></p><p>Gao, S., Mokhtarian, P. L. & Johnston, R. A. 2008. Nonnormality of Data in Structural Equation Models. Transportation Research Record: Journal of the Transportation Research Board 2082(1): 116-124.</p><p></p><p>Garrison, C. P., & Ncube, M. (2011). A Longitudinal Analysis of Data Breaches. Information Management & Computer Security, 19(4), 216230.</p><p></p><p>Gouldner, A.W., (1960). The norm of reciprocity: a preliminary statement, Am. Sociol. Rev. 25 (2) 161178.</p><p></p><p>Gefen, D. (2002). Reflections on the dimensions of trust and trustworthiness among online consumers. ACM SIGMIS Database: Database Adv. Inf. Syst. 33, 3853.</p><p></p><p>Granville K. (2018). Facebook and Cambridge Analytica: What you need to know as fallout widens. New York Times, March 19, 2018. www.nytimes.com/2018/03/19/ technology/facebook-cambridge-analytica-explained.html.</p><p></p><p>Grazioli S. & Jarvenpaa, S.L. (2000). Perlis of Internet Fraud: An Empirical Investigation of Deception and Trust with Internet Consumers. Systems and Humans, 30(4), 395-410.</p><p></p><p>Greenwood S, Perrin A, Duggan M. (2016). Social Media Update 2016: Numbers, Facts and Trends Shaping the World. (Pew Research Center, Washington, DC) (pp. 119).</p><p></p><p>Gupta, A., & Dhami, A. (2015). Measuring the impact of security, trust and privacy in information sharing: A study on social networking sites. Journal of Direct, Data and Digital Marketing Practice. 17(1), 43-53.</p><p></p><p>Garson, G. D. 2012a. Structural Equation Modeling. Asheboro, NC USA: Statistical Associates Publishing.</p><p></p><p>Garson, G. D. 2012b. Testing Statistical Assumptions. Asheboro, NC USA: Statistical Associates Publishing.</p><p></p><p>Gaskin, J. 2013. Data Screening.Gaskination's StatWiki. http://statwiki.kolobkreations.com/index.php?title=Data_screening&oldid=49 80 [June 6, 2014].</p><p></p><p>Gaskin, J. 2012a. Common Method Bias.Gaskination's Statistics. http://youtube.com/Gaskination [20th February 2013].</p><p></p><p>Gaskin, J. 2012b. Confirmatory Factor Analysis.Gaskination's StatWiki. http://statwiki.kolobkreations.com [20th February 2013].</p><p></p><p>Goodhue, D., Lewis, W., & Thompson, R. (2006). PLS, small sample size, and statistical power in MIS research. In System Sciences, 2006. HICSS'06. Proceedings of the 39th Annual Hawaii International Conference on (Vol. 8, pp. 202b-202b). IEEE.</p><p></p><p>Groenland, E. & Stalpers, J. 2012. Structural Equation Modeling: A Verbal Approach Nyenrode Research Paper Series. Breukelen, The Netherlands, Nyenrode Business Universiteit.</p><p></p><p>Haris, A. R., Sarijan, S., & Hussin, N. (2017). Information Security Challenges: A Malaysian Context. International Journal of Academic Research in Business and Social Sciences, 7(9). https://doi.org/10.6007/ijarbss/v7-i9/3335</p><p></p><p>Hamid, N.R. and A.A. Khatibi, 2006. 'Perceived Risk and Users Experience Influence on Internet Technology Adoption,' WSEAS Transactions on Systems, 5(12): 2766-2773.</p><p></p><p>Haghighi, B.T., Othman, M., & Hashim, F. H. (2011). Internet Addiction and dependency: A case study in UNITEN. IEEE(Malaysia), 1-4.</p><p></p><p>Habibullah, M. S., Sanusi, N. A., Abdullah, L., Kusairi, S., Golam Hassan, A. A., & Ghazali, N. A. (2018). Does The Less Developed States In Malaysia Catching-Up To The Richer State Of Selangor? Journal of Contemporary Issues and Thought, 8, 2940. https://doi.org/10.37134/jcit.vol8.4.2018.</p><p></p><p>Homans, G. (1961). Social Behavior. New York: Harcourt, Brace & World.</p><p></p><p>Homans, G.C. (1958), Social behavior as exchange, American Journal ofSociology, Vol. 63 No. 6, pp. 597-606.</p><p></p><p>Hasmida, J., Zauwiyah, A., & Noorhazreen, Z. (2011). Exploratory study on Internet addiction among varsity students in Malaysia. International Conference on e-Commerce, e-Administration, e-Society, e Education, and e-Technology (e-CASE & e-TECH 2011).</p><p></p><p>H. K Tsoi & L.Chen (2011). From Privacy Concerns to Uses of Social Network Sites: A Cultural Comparison via User Survey. 2011 IEEE Third International Conference on Privacy, Security, Risk and Trust and 2011 IEEE Third International al Conference on Social Computing, pp. 457-464.</p><p></p><p>Hagen, J.M., & Choe, S. (1998). Trust in Japanese Interfirm Relations: Institutional Sanctions Matter. Academy of Management Review. 23(3), 589-600.</p><p></p><p>Hall, H., Widn, G., & Paterson, L. (2010). Not what you know, nor who you know, but who you know already: Examining online information sharing behaviours in a blogging environment through the lens of social exchange theory. Libri. 60(2), 117-128.</p><p></p><p>Hoadley, C.M.; Xu, H.; Lee, J.J.; Rosson, M.B. (2010). Privacy as information access and illusory control: The case of the Facebook News Feed privacy outcry. Electron. Commer. Res. Appl. 9, 5060.</p><p></p><p>Hazzi, O. A., & Maaldaon, I. S. (2015). A pilot study: Vital methodological issues. Business: Theory and Practice, 16(1), 5362. https://doi.org/10.3846/btp.2015.437</p><p></p><p>Hertzog, M. A. 2008. Considerations in Determining Sample Size for Pilot Studies. Research in Nursing & Health 31(2): 180191.</p><p></p><p>Hair, J.F., Black, W.C., Babin, B.J., Anderson, R.E. and Tatham, R.L. (1998) Multivariate Data Analysis. Vol. 5, No. 3, 207-219, Prentice Hall, Upper Saddle River.</p><p></p><p>Hair Joseph F. Jr., Black William C., Babin Barry J., Anderson Rolph E. & Tatham Ronald L. (2006) Multivariate Data Analysis, 6th edn, Pearson Prentice Hall, Pearson Education, Inc., Upper Saddle River, New Jersey 07458.</p><p></p><p>Haenlein, M. & Kaplan, A. M. 2004. A Beginner's Guide to Partial Least Squares Analysis. Understanding Statistics 3(4): 283-297.</p><p></p><p>Hair, J. F., Ringle, C. M. & Sarstedt, M. 2011. Pls-Sem: Indeed a Silver Bullet. Journal of Marketing Theory and Practice 19(2): 139-151.</p><p></p><p>Hair J, Hult GTM, Ringle C, Sarstedt M 2014 A Primer on Partial Least Squares Structural Equation Modeling (PLS-SEM) (Los Angeles: SAGE Publications, Incorporated).</p><p></p><p>Hair, J. F., Hult, G. T. M., Ringle, C. M., & Sarstedt, M. (2017b). A primer on partial least squares structural equation modeling (PLS-SEM) (2nd ed.). Thousand Oaks, CA: Sage.</p><p></p><p>Hair, J. F., Sarstedt, M., Ringle, C. M. & Mena, J. A. 2012. An Assessment of the Use of Partial Least Squares Structural Equation Modeling in Marketing Research. Journal of the Academy of Marketing Science 40(3): 414-433.</p><p></p><p>Huck, S. W. 2012. Reading Statistics and Research. 6th edition. Boston, MA: Pearson Education, Inc</p><p></p><p>Henseler, J., Ringle, C. & Sinkovics, R. 2009. The Use of Partial Least Squares Path Modeling in International Marketing. Advances in International Marketing (AIM) 20(277-320.</p><p></p><p>Henseler, J. & Sarstedt, M. 2013. Goodness-of-Fit Indices for Partial Least Squares Path Modeling. Computational Statistics 28(2): 565-580.</p><p></p><p>Hair, J. F., Black, W. C., Babin, B. J. & Anderson, R. E. 2010. Multivariate Data Analysis: A Global Perspective. 7th edition. Upper Saddle River, New Jersey: Pearson Education Inc.</p><p></p><p>Ho, R. 2006. Handbook of Univariate and Multivariate Data Analysis and Interpretation with Spss. Boca Raton, Florida: Chapman & Hall/CRC (Taylor & Francis Group).</p><p></p><p>Hauff, S., & Veit, D. (2014). Communication privacy management in the digital age - effects of general and situational privacy concerns. 20th Americas Conference on Information Systems, AMCIS 2014, (Dillet), 110.</p><p></p><p>Hugl, U. (2012). Reviewing person s value of privacy of online social networking. (2007). https://doi.org/10.1108/10662241111158290.</p><p></p><p>Irvine, E. J., Tack, J., Crowell, M. D., Gwee, K. A., Ke, M., Schmulson, M. J., Spiegel, B. (2016). Design of treatment trials for functional gastrointestinal disorders. Gastroenterology, 150(6), 1469-1480.e1. https://doi.org/10.1053/j.gastro.2016.02.010.</p><p></p><p>JithiKrishna P P, Suresh Kumar R and Sreejesh V K, (2015). Impact of trust, privacy and security in Facebook information. International Journal of Emerging Trends & Technology in Computer Science (IJETTCS), 4(6), 59. Retrieved from www.ijettcs.org.</p><p></p><p>Jabee, R., & Afshar, M. (2016). Issues and Challenges of Cyber Security for Social Networking Sites (Facebook). International Journal of Computer Applications. 144(3), 36-40.</p><p></p><p>James, T.L.; Warkentin, M.; Collignon, S.E. (2015). A dual privacy decision model for online social networks. Inf. Manag. 52, 893908.</p><p></p><p>Jakobsen, M., & Jensen, R. (2015). Common method bias in public management studies. International Public Management Journal, 18(1), 330.</p><p></p><p>Jaeschke, R., Singer, J., & Guyatt, G. H. (1989). Measurement of health status. Ascertaining the minimal clinically important difference. Controlled Clinical Trials, 10(4), 407415. https://doi.org/10.1016/0197-2456(89)90005-6.</p><p></p><p>Jarvenpaa, S., Leidner, D. (1998). Communication and trust in global virtual teams. Journal of Computer-Mediated Communication 3 (4).</p><p></p><p>Joe, M. (2014). A Survey of Various Security Issues in Online Social Networks. International Journal of Computer Networks and Applications. 1(1), 11-14.</p><p></p><p>Jsang, A., Ismail, R. and Boyd, C. (2007) A survey of trust and reputation systems for online service provision, Decision Support Systems, Vol. 43, No. 2, pp.618644.</p><p></p><p>Jai, T. M., & King, N. J. (2016). Privacy versus reward: Do loyalty programs increase consumers willingness to share personal information with third-party advertisers and data brokers? Journal of Retailing and Consumer Services, 28, 296303. https://doi.org/10.1016/j.jretconser.2015.01.005</p><p></p><p>Jackson, D. L., Gillaspy, J. A. & Purc-Stephenson, R. 2009. Reporting Practices in Confirmatory Factor Analysis: An Overview and Some Recommendations. Psychological Methods 14(1): 6-23.</p><p></p><p>Jeong, Y., & Kim, Y. (2017). Privacy concernss on social networking sites: Interplay among posting types, content, and audiences. Computers in Human Behavior, 69, 302310. https://doi.org/10.1016/j.chb.2016.12.042.</p><p></p><p>Kaplan, D. (1990). Evaluating and modifying covariance structure models: A review and recommendation. Multivariate Behavioral Research, 25(2), 137-155.</p><p></p><p>Kasikci, D.N., Cagiltay, K., Karakus, T., Kursun, E., Ogan, C., (2014). European online kids project (EU kids online): Internet habits and safer Internet use among children from Turkey and Europe. Educ. Sci. 39 (171), 230243.</p><p></p><p>Kaiser, H.F. (1974) An index of factorial simplicity, Psychometrika, Vol. 39, No. 1, pp.3136.</p><p></p><p>Kayes, I., Kourtellis, N., Bonchi, F., & Iamnitchi, A. (2015). Privacy concernss vs. user behavior in community question answering. Proceedings of the 2015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, ASONAM 2015. 681-688.</p><p>Kennedy-Lightsey, C., Martin, M., Thompson, M., Himes, K., & Clingerman, Z. (2012). Communication Privacy Management Theory: Exploring Coordination and Ownership between Friends. Communication Quarterly. 60(5), 665-680.</p><p></p><p>Krejcie, R.V. & Morgan, D.W. (1970). Determining sample size for research activities. Educational & Psychological Measurement, 30, 607-610.</p><p></p><p>King, J.; Lampinen, A. (2011). Smolen, A. Privacy: Is There an App for That? In Proceedings of the Symposium on Usable Privacy and Security. Pittsburgh, PA, USA, 2022.</p><p></p><p>King, J. (2018). Privacy, Disclosure, and Social Exchange Theory [Doctoral Dissertation, UC Berkeley]. UC Berkeley Electronic Theses and Dissertations. https://escholarship. org/uc/item/5hw5w5c1.</p><p>Kline, R. (1998) Principles and Practice of Structural Equation Modeling. New York: Guildford.</p><p></p><p>Kline, R. B. (2005). Principles and practice of structural equation modeling. New York, NY: Guilford Press.</p><p></p><p>Kline, R. B. 2011. Principles and Practice of Structural Equation Modeling. 3rd edition. New York: The Guilford Press.</p><p></p><p>Kisekka, V.; Bagchi-Sen, S.; Rao, H.R. (2013). Extent of private information disclosure on online social networks: An exploration of Facebook mobile phone users. Comput. Hum. Behav. 29, 27222729.</p><p></p><p>Koohang, A., & Georgia, M. (2021). Social media privacy concerns , security concerns , trust , and awareness : Empirical validation of an instrument. 22(2), 133145.</p><p></p><p>Krasnova, H., Gnther, O., Spiekermann, S. and Koroleva, K. (2009) Privacy concernss and identity in online social networks, Identity in the Information Society, Vol. 2, No. 1, pp.3963.</p><p></p><p>Krasnova, H., Spiekermann, S., Koroleva, K., & Hildebrand, T. (2010). Online social networks: Why we disclose. Journal of Information Technology, 25(2), 109125. https://doi.org/10.1057/jit.2010.6.</p><p></p><p>Krishnamurthy, B. and Wills, C.E. (2008) Characterizing privacy in online social networks, Paper presented at the Proceedings of the First Workshop on Online Social Networks.</p><p></p><p>Kgler, M., Smolnik, S., & Raeth, P. (2013). Determining the Factors Influencing Enterprise Social Software Usage : Development of a Measurement Instrument for Empirical Assessment. https://doi.org/10.1109/HICSS.2013.173.</p><p></p><p>Lankton, N.K., Tripp, J.F., 2013. A Quantitative and Qualitative Study of Facebook Privacy using the Antecedent-Privacy Concern-Outcome Macro Model.</p><p></p><p>Lee, H.; Park, H.; Kim, J. (2013). Why do people share their context information on Social Network Services? A qualitative study and an experimental study on users behavior of balancing perceived benefit and risk. Int J. Hum. Comput. St. 71, 862877.</p><p></p><p>Lee, S., & Mohamad, Z. S. (2022). The Factors of Social Media Usage and Mental Health: A Study on Malaysian Adolescents. Asian Journal of Behavioural Sciences, (June). https://doi.org/10.55057/ajbs.2022.4.2.4.</p><p></p><p>Lenhart, M., Duggan, A., Perrin, A., Stepler, R., Rainie, L., & Parker, K. (2015). Teens, social media, & technology overview. Retrieved April 9, 2015, from http://www.pewinternet.org/2015/04/09/teens-social-media-technology-2015/</p><p></p><p>Leong, M., Murad, N., Teoh, S. H., & Mohamad, M. (2020). Quality of life of university students during the COVID-19 pandemic: Assessing the level of quality of life and the associated factors after the end of movement lockdown. Research Square, 1-25. doi:https://doi.org/10.21203/rs.3.rs-104496/v2.</p><p></p><p>Lin, K.-Y. & Lu, H.-P. (2011). Why people use social networking sites: An empirical study integrating network externalities and motivation theory. Computers in Human Behavior, Vol. 27, No. 3, pp. 11521161.</p><p></p><p>Lin, S. W., & Liu, Y. C. (2012). The effects of motivations, trust, and privacy concerns in social networking. Service Business, 6(4), 411424. https://doi.org/10.1007/s11628-012-0158-6.</p><p></p><p>Lin, S., & Armstrong, D. J. (2019). Beyond information: The role of territory in privacy management behavior on social networking sites. Journal of the Association for Information Systems, 20(4), 434475. https://doi.org/10.17705/1.jais.00540.</p><p></p><p>Livingstone, S., Mascheroni, G., lafsson, K., & Haddon, L. (2014). Childrens online risks and opportunities: Comparative findings from EU Kids online and Net Children Go Mobile. London: EU Kids Online, LSE. July. 1-70.</p><p></p><p>Lancaster G.A, Dodd. S & Williamson. P. R. (2004). Design and analysis of pilot studies: recommendations for good practice. J Eval Clin Pract, 10(2), 307312.</p><p></p><p>Madden, Mary, Lenhart, Amanda, Cortesi, Sandra & Gasser, Urs (2013). Teens and Mobile Apps Privacy. Pew Research Center: The Berkman Center for Internet & Society at Harvard University. Retrieved from http://www.pewinternet.org/files/old-media/Files/Reports/2013/PIP_Teens%20an d%20Mobile%20Apps%20Privacy.pdf</p><p></p><p>Malaysian Communication and Multimedia Commission. Internet User Survey. Statistical Brief Numbered Twenty-Three. Retrieved 2018, from, https://www.mcmc.gov.my/skmmgovmy/media/General/pdf/Internet-Users-Survey-2018.pdf.</p><p></p><p>Malaysian Communication and Multimedia Commission (MCMC). (2020). Internet users survey 2020: Infographic. Statistics and Data Intelligence Department, Malaysian Communications and Multimedia Commission, 16. Retrieved from https://www.mcmc.gov.my/ms/resources/statistics/internet-users-survey.</p><p></p><p>Malaysia Sixth Most Vulnerable To Cyber Crime. Retrieved 10 May 2017, from http://says.com/my/news/malaysia-sixth-most-vulnerable-to-cyber-crime</p><p></p><p>Malaysia Internet Users (2012). Retrieved 20 December 2013 from http://www.indexmundi.com/malaysia/internet_users.html</p><p></p><p>Malhotra N.K. (2002). Marketing Research: An Applied Orientation (4th Eds). United State, MA: Pearson Education, Inc.</p><p></p><p>Malhotra, N.K., Kim, S.S. and Agarwal, J. (2004) Internet users information privacy concernss (IUIPC): the construct, the scale, and a causal model, Information Systems Research, Vol. 15, No. 4, pp.336355.</p><p></p><p>Malhotra, N. K., Kim, S. S. & Patil, A. 2006. Common Method Variance in Is Research: A Comparison of Alternative Approaches and a Reanalysis of Past Research. Management Science 52(12): 1865-1883.</p><p></p><p>Marcoulides, G.A., Chin, W.W., & Saunders, C. (2009). A critical look at Partial Least Square Modeling. MIS Quarterly, 33(1), 171-175.</p><p></p><p>Martin, K. D., & Murphy, P. E. (2017). The role of data privacy in marketing. Journal of the Academy of Marketing Science, 45(2), 135155. https://doi.org/10.1007/s11747-016-0495-4</p><p></p><p>Masele, J. J. (2022). Information Sharing in the Social Media Era. University of Dar Es Salaam Library Journal, 16(2), 202222. https://doi.org/10.4314/udslj.v16i2.14</p><p></p><p>Mayer R.C., Davis J.H., Schoorman F.D. (1995). An integrative model of organizational trust. Academy of Management Review, 20, 709-734.</p><p></p><p>McKnight, D.H.; Lankton, N.; Tripp, J. (2011). Social Networking Information Disclosure and Continuance Intention: A Disconnect. In Proceedings of the 44th Hawaii International Conference on System Sciences (HICSS), Washington, DC, USA, 47, pp. 110.</p><p></p><p>Metzger, M. J. (2004). Privacy, trust, and disclosure: Exploring barriers to electronic commerce. Journal of Computer-Mediated Communication, Vol. 9, No. 4, pp. 11431168.</p><p></p><p>Meskaran, F., Ismail, Z., & Shanmugam, B. (2013). Online Purchase Intention: Effects of Trust and Security Perception. Australian Journal of Basic and Applied Sciences, 7(6), 307315.</p><p></p><p>Mekovec, R., & Hutinski, Z. (2020). The role of perceived privacy and perceived security in online market. (June).</p><p></p><p>Mohd Azul Mohamad Salleh, Ali Salman & Nurul Madiha Mohd Ilham (2015). Kesedaran Terhadap Isu Pengawasan Sewaktu Mengguna Aplikasi Media Sosial. Journal of Social Science and Humanities, 10(2), 217-229. Retrieved from http://ejournal.ukm.my/ebangi/article/view/11259/3646.</p><p>Moallem, A. (2019). Cyber Security Awareness among College Students. Advances in Intelligent Systems and Computing. 782, 79-87. doi:10.1007/978-3-319-94782-2_8.</p><p></p><p>Molla, A., Licker, P.S. (2001), E-Commerce System Success: An Attempt to Extend and Respceify the Delone and Maclean Model of IS Success, Journal of Electronic Commerce Research, vol. 2, no 4.</p><p></p><p>Mohamed, N. and Ahmad, I.H. (2012) Information privacy concernss, antecedents and privacy measure use in social networking sites: evidence from Malaysia, Computers in Human Behaviour, Vol. 28, No. 6, pp.23662375.</p><p></p><p>Mohd Sobhi, I. 2013. Part C: Mediating, Moderating & Control Variable. Workshop Handout. Universiti Utara Malaysia. Kedah, Malaysia 22 - 23 February 2013.</p><p></p><p>Mobile Apps Privacy. Pew Research Center: The Berkman Center for Internet & Society at Harvard University. Retrieved from, http://www.pewinternet.org/files/old-media/Files/Reports/2013/PIP_Teens%20and%20Mobile%20Apps%20Privacy.pdf.</p><p></p><p>Mostafa, S. A., & Ahmad, I. A. (2018). Recent developments in systematic sampling: A review. Journal of Statistical Theory and Practice, 12(2), 290310. https://doi.org/10.1080/15598608.2017.1353456.</p><p></p><p>Mulisa, F. & Getahun, D. A. (2018). Perceived Benefits and Risks of Social Media: Ethiopian Secondary School Students Perspectives. Journal of Technology in Behavioral Science. 3(4), 294-300.</p><p></p><p>Mustafa, S. & Hamzah, A. (2011). Online Social Networking: A New Form of Social Interaction. International Journal of Social Science and Humanity. 1(2), 96-104.</p><p></p><p>Ministry of Education, M. (2019). Educational Planning and Research Division MINISTRY OF EDUCATION MALAYSIA With Best Compliments.</p><p></p><p>Martin, P. & Bateson, P. (1986). Measuring Behaviour: An Introductory Guide. Cambridge: Cambridge University Press.</p><p></p><p>Moon, J.W. & Kim, Y.G. (2001), "Extending the TAM for a World-Wide-Web context", Information & Management, vol. 38, no. 4, pp. 217-230.</p><p></p><p>Neuman, W.L. (2006). Social Research Methods: Qualitative and Quantitative Approaches (6th Eds). Boston, OH: Pearson Education, Inc.</p><p></p><p>Nielsen, 2011. The Southeast Asia Digital Consumer Report, June 2011. Retrieved from https://www.sphmagazines.com.sg/blog/research/sph-magazines-360/2011/the-southeast-asia-digital-consumer-by-nielsen</p><p></p><p>Nunnally, J. (1978), Psychometric theory, New York: McGraw-Hill.</p><p></p><p>Nurhilyana A. , zaid M. & aminatul (2013). Prevalence of internet usage and academic purpose among pre-degree student: a case study. Proceeding of the International Conference on Social Science Research, ICSSR 2013, 2013, pp. 1064-1070).</p><p>OBien, D.; Torres, A. (2012). Social Networking and Online Privacy: Facebook Users Perceptions. Ir. J. Manag. 31, 6397.</p><p></p><p>Olajide, A. A., & Olayiwola, J. O. (2021). Development of a Proposed Model for Online Social Media Users Information Disclosure. 11(1), 10021016. https://doi.org/10.20533/ijisr.2042.4639.2021.0114.</p><p></p><p>Oke, A. E., Ogunsami, D. R. & Ogunlana, S. 2012. Establishing a Common Ground for the Use of Structural Equation Modelling for Construction Related Research Studies. Australasian Journal of Construction Economics and Building 12(3): 89-94.</p><p></p><p>Othman, N. F., Ahmad, R., & Yusoff, M. (2013). Information Security and Privacy Awareness in Online Social Networks among UTem Students. Journal of Human Capital Development, 6(1), 101110. https://doi.org/10.1016/j.trd.2014.11.018.</p><p></p><p>Padyab, A., Pivrinta, T., Sthlbrst, A., Bergvall. K & Birgitta (2019). Awareness of Indirect Information Disclosure on Social Network Sites. SAGE Journals. 1-14. Doi: 10.1177/2056305118824199.</p><p></p><p>Paramarta, V., Jihad, M., Dharma, A., Hapsari, I. C., Sandhyaduhita, P. I., Hidayanto, & Achmad, N. (2019). Impact of user awareness, trust, and privacy concernss on sharing personal information on social media: Facebook, twitter, and Instagram. 2018 International Conference on Advanced Computer Science and Information Systems, ICACSIS 2018. 271-276.</p><p></p><p>Park, J. S., Kwiat, K. A., Kamhoua, C. A., White, J., & Kim, S. (2014). Trusted online social network (osn) services with optimal data management. Computers & Security, 42:116136.</p><p></p><p>Petronio, S. (2002). Boundary of Privacy: Dialectics of Disclosure; State University of New York Press: Albany, NY, USA.</p><p></p><p>Petronio, S., & Caughlin, J. P. (2006). Communication Privacy Management Theory: Understanding families. In D. O. Braithwaite & L. A. Baxter (Eds.), Engaging theories in family communi- cation: Multiple perspectives (pp. 3549). Thousand Oaks, CA: Sage.</p><p></p><p>Petronio, S. (2013). Brief status report on communication privacy management theory. Journal of Family Communication, 13, 614.</p><p></p><p>Petronio, S.; Durham, W. (2014). Communication Privacy Management Theory: Significance for Interpersonal Communication. Engaging Theories in Interpersonal Communication: Multiple Perspectives, 2nd ed. Braithwaite, D.O., Schrodt, P., Eds.; Sage Publications: Saunders Oaks, CA, USA, 2014; pp. 335347.</p><p></p><p>Petronio, S.; Hernandez, R. (2019). Communication Privacy Management Theory. Retrieved from https://oxfordre.com/communication/view/10.1093/acrefore/9780190228613.001.0001/acrefore-9780190228613-e-373.</p><p></p><p>Planning, Research and Policy Coordination Division, Higher Education Sector, MOE. Retrieved 31st December, 2017, from,https://www.moe.gov.my/penerbitan/1587-quick-facts-2018-malaysia-educational-statistics-1/file.</p><p></p><p>Perrin, A. (2015). Social Media Usage: 2005-2015, (October), 20052015. Retrieved from www.pewinternet.org/2015/10/08/social-networking-usage-2005-2015/.</p><p></p><p>Parasuraman, A. (1991), Marketing research, end edn, Addison-Wesley publishing.</p><p></p><p>Pallant, J. 2007. Spss Survival Manual: A Step-by-Step Guide to Data Analysis Using Spss for Windows. 3rd Edition. New York: Open University Press.</p><p></p><p>Podsakoff, P.M., & Organ, D.W. (1986). Self-reports in organizational research: Problems and prospects. Journal of Management, 12,6982.</p><p></p><p>Podsakoff, P. M., Mackenzie, S. B., Lee, J.-Y. & Podsakoff, N. P. 2003. Common Method Biases in Behavioral Research: A Critical Review of the Literature and Recommended Remedies. Journal of applied psychology 88(5): 879- 903.</p><p></p><p>Podsakoff, P. M., Mackenzie, S. B. & Podsakoff, N. P. 2012. Sources of Method Bias in Social Science Research and Recommendations on How to Control It. Annual Review of Psychology 63(1): 539-569.</p><p></p><p>Pikkarainen, T., Pikkarainen, K., Karjaluoto, H. & Pahnila, S. (2004), "Consumer acceptance of online banking: an extension of the technology acceptance model", Internet research, vol. 14, no. 3, pp. 224-235.</p><p></p><p>Ramayah, T., Lee, J. W. C. & Mohamad, O. 2010. Green Product Purchase Intention: Some Insights from a Developing Country. Resources, Conservation and Recycling 54(12): 1419-1427.</p><p></p><p>Raeth, P., & Smolnik, S. (2010). Antecedents and Consequences of Corporate Weblog Usage in the Intranet : A Process Perspective. 110.</p><p></p><p>Ranganathan, C. and S. Sanjeev, 2007. Examining online purchase intentions in B2C ecommerce: Testing an integrated model, Information Resources Management Journal, 20(4): 48-64.</p><p></p><p>Rajan, P. M., Alam, S., Kia, K. K., & Subramaniam, C. R. S. (2021). Predicting Intercultural Communication in Malaysian Public Universities from the Perspective of Anxiety/Uncertainty Management (AUM) Theory. Journal of Intercultural Communication, 21(1), 6279. https://doi.org/10.36923/jicc.v21i1.6.</p><p></p><p>R. Gross, A. Acquisti, & H. J. H. Ill. (2005). Information revelation and privacy in online social networks. WPES, pp. 71-80.</p><p></p><p>Reddy, K. & Reddy, E. S. (2019). Integrated approach to detect spam in social media networks using hybrid features. International Journal of Electrical and Computer Engineering (IJECE). 9(1), 562.</p><p></p><p>Reisinger, Y. & Mavondo, F. 2007. Structural Equation Modeling. Journal of Travel & Tourism Marketing 21(4): 41-71.</p><p></p><p>Rigdon, E.E. (2012), Rethinking partial least squares path modeling: in praise of simple methods, Long Range Planning, Vol. 45 Nos 5/6, pp. 341-358.</p><p></p><p>Rigdon, E.E., Sarstedt, M. and Ringle, C.M. (2017), On comparing results from CB-SEM and PLS-SEM. Five perspectives and five recommendations, Marketing Zfp, Vol. 39 No. 3, pp. 4-16.</p><p></p><p>Richter, N. F., Sinkovics, R. R., Ringle, C. M., & Schlgel, C. (2016). A critical look at the use of SEM in international business research. International Marketing Review, 33(3), 376-404. doi: https://doi.org/10.1108/IMR-04-2014-0148.</p><p></p><p>RiskBasedSecurity (2020). "Personal Data of 350,000+ Social Media Influencers and Users Compromised." Retrieved March 15, 2021 from https://www.riskbasedsecurity.com/2020/06/24/personal-data-of-350000-social-media- influencers-and-users-compromised-following-preen-me-hack/</p><p></p><p>Roloff, M. E. (1981). Interpersonal communication: The social exchange approach. Sage Publications Inc, Beverly Hills, CA.</p><p></p><p>Rousseau, D.M., Sitkin, S.B., Burt, R.S., Camerer, C. (1998). Not So Different After All: a Cross-discipline View of Trust. Acad. Manag. Rev. 23 (3), 393404.</p><p></p><p>Rouse, A.C., & Corbitt, B. (2008). There's SEM and "SEM": A critique of the use of PLS regression in Information System research. AIS. Symposium conducted at the meeting of the 19th Australasian Conference on Information Systems, Christchurch, New Zealand.</p><p></p><p>Roscoe, J.T. (1975) Fundamental Research Statistics for the Behavioural Sciences, 2nd edition. New York: Holt Rinehart & Winston.</p><p></p><p>Ronkko, M. & Evermann, J. 2013. A Critical Examination of Common Beliefs About Partial Least Squares Path Modeling. Organizational Research Methods 16(3): 425-448.</p><p></p><p>S. Rathore, P. K. Sharma, V. Loia, Y. S. Jeong, J. H. Park. (2017). Social network security: Issues, challenges, threats, and solutions. Information Sciences, vol. 421, pp. 43-69.</p><p></p><p>Saleh Zolait, A., Al-Anizi, R., Ababneh, S., BuAsalli, F. and Butaiba, N. (2014). User awareness of social media security: The public sector framework. International Journal of Business Information Systems. 17(3), 261-282.</p><p></p><p>Surma, J. (2016). Social exchange in online social networks. the reciprocity phenomenon on Facebook. Computer Communications, 73, 342346. https://doi.org/10.1016/j.comcom.2015.06.017</p><p></p><p>Saleh, Zakaria and Mashour, A. (2016). Evaluating Security Awareness Impact On Perceived Risk and Trust: The Case of Social Networks. International Journal in IT and Engineering, 4(5), 99110.</p><p></p><p>Salleh M. A. M., Salman, A. & Ilham, N. M. M. (2015). Awareness towards the issue of surveilance in using Social Media applications. Journal of Social Science and Humanities. 10(2), 217-229.</p><p></p><p>Salaway, G., Caruso, J. B., & Introduction, R. N. (2007). 2007 The ECAR Study of Undergraduate Students and Information Technology , 2007. 6.</p><p></p><p>Schrobsdorff, S. (2006) Predators Playground? in Newsweek, January 27, 2006.</p><p>Schumacker, R. E. & Lomax, R. G. 2004. A Beginner's Guide to Structural Equation Modeling. Second edition. Lawrence Erlbaum Associates.</p><p></p><p>Symantec. (2016). Cybersecurity Threats: The Risk Is Real In Malaysia. Retrieved November30, 2016, from http://www.malaysiandigest.com/technology/605954-cybersecurity- threats-the-risk-is-real-in-malaysia.</p><p></p><p>Salam, A. F., Rao, H. R., & Pegels, C. C. (1998). An investigation of consumer- perceived risk on electronic commerce transactions: The role of institutional trust, and economic incentive in a social exchange framework. In Paper presented at Americas conference on information systems. Baltimore, MD, USA.</p><p></p><p>Saunders, M., Lewis, P. and Thornhill, A. (2007). Research Methods for Business Students. (4th Edition), Financial Times Prentice Hall, Edinburgh Gate, Harlow.</p><p></p><p>Saunders, M., Lewis, P. & Thornhill, A. (2012). Research Methods for Business Students (6th Ed). London: Pearson Education.</p><p></p><p>Savolainen, R. (2017). Information sharing and knowledge sharing as communicative activities. Information Research, 22(3), 767.</p><p></p><p>Sharbaugh, P. and Le Trang, P.T. (2012) Whats Mine Is Yours: An Exploratory Study of Online Personal Privacy in the Socialist Republic of Vietnam, Unpublished work in International Communication Association 2012, Phoenix.</p><p></p><p>Shiau, W. L., & Luo, M. M. (2012). Factors affecting online group buying intention and satisfaction: A social exchange theory perspective. Computers in Human Behavior, 28(6), 24312444. https://doi.org/10.1016/j.chb.2012.07.030</p><p></p><p>Salkind, N. J. (1997). Exploring research (3rded.). Upper Saddle River, NJ: Prentice Hall.</p><p></p><p>Sekaran, U. (2003). Research Method for Business Student (3rd Eds). Harlow, MA: Financial Times Prentice Hall/Pearson Education.</p><p></p><p>Sekaran, U. (2000), Research Methods for Business: A Skill Building Approach, John Wiley and Sons.</p><p></p><p>Selwyn, N. 2013. Social Media in Higher Education. Europa World Learning.1:1-10.</p><p>Shin, D. (2010). The effects of trust, security and privacy in social networking: A security-based approach to understand the pattern of adoption. Interacting with Computers. 22(5), 428-438.</p><p></p><p>Skeels, M. M., &Grudin, J. (2009, May). When Social Networks Cross Boundaries: A Case Study Of Workplace Use Of Facebook And Linkedin. In Proceedings Of The ACM 2009 International Conference On Supporting Group Work.ACM.95-104.</p><p></p><p>Slusky L. & Partow-Navid P. (2014) Students Information Security Practices and Aware- ness. Journal of Information Privacy and Security. 3-26. Retrieved July 7, 2014, from http://www.tandfonline.com/doi/abs/10.1080/15536548.2012.10845664.</p><p></p><p>Social Media Statistics & Facts. Global social penetration rate. Retrieved September 4, 2019, from https://www.statista.com/topics/1164/social-networks/.</p><p></p><p>Sriratanaviriyakul, N., Nkhoma, M., Felipe, A. L., Cao, T. K., Ha Tran, Q., Epworth, R., Quang, H. Le. (2017). ASEAN users privacy concernss and security in using online social networks. International Journal of Electronic Security and Digital Forensics, 9(1), 8499. https://doi.org/10.1504/IJESDF.2017.081787</p><p></p><p>Saunders, M., Lewis, P. & Thornhill, A. 2009. Research Methods for Business Students. 5th edition. Essex: Pearson Education Limited.</p><p></p><p>Stutzman, F. (2006) An evaluation of identity-sharing behavior in social network communities, International Digital and Media Arts Journal, Vol. 3, No. 1, pp.1018.</p><p></p><p>Tan, X., Qin, L., Kim, Y. and Hsu, J. (2012) Impact of privacy concerns in social networking web sites, Internet Research, Vol. 22, No. 2, pp.211233.</p><p></p><p>Taddei, S., & Contena, B. (2013). Privacy, trust and control: Which relationships with online self-disclosure? Computers in Human Behavior. 29(3), 821826.</p><p></p><p>Teong, K. V., & Ang, M. C. H. (2016). Internet Use and Addiction among Students in Malaysian Public Universities in East Malaysia: Some Empirical Evidence. Journal of Management Research, 8(2), 31. https://doi.org/10.5296/jmr.v8i2.9092.</p><p></p><p>Tess, P. A. (2013). The Role of Social Media in Higher Education Classes (Real and Virtual)A Literature Review. Computers in Human Behavior. 29(5):60-68.</p><p></p><p>Tuunainen V. K., Pitkanen, O. and Hovi, M. (2009). Users Awareness of Privacy on Online Social Networking Sites Case Facebook. 22nd Bled eConference eEnablement: Facilitating an Open, Effective and Representative eSociety.</p><p></p><p>Teijlingen van, E.; Rennie, A. M.; Hundley, V.; Graham, W. 2001. The importance of conducting and reporting pilot studies: the example of the Scottish Births Survey, Journal of Advanced Nursing 34(3): 289295. http://dx.doi.org/10.1046/j.1365?2648.2001.01757.x</p><p></p><p>Tabachnick, B. G. & Fidell, L. S. 2007. Using Multivariate Statistics. 5th edition. Boston, MA: Pearson Education. Inc.</p><p></p><p>Tabachnick, B. & Fidell, L. (2001), Using multivariate statistics, Boston: Allyn and Bacon.</p><p></p><p>Urbach, N. & Ahlemann, F. 2010. Structural Equation Modeling in Information Systems Research Using Partial Least Squares. Journal of Information Technology Theory and Application (JITTA) 11(2): 5-40.</p><p></p><p>Urbonavicius, S., Degutis, M., Zimaitis, I., Kaduskeviciute, V., & Skare, V. (2021). From social networking to willingness to disclose personal data when shopping online: Modelling in the context of social exchange theory. Journal of Business Research, 136(December 2020), 7685. https://doi.org/10.1016/j.jbusres.2021.07.031</p><p></p><p>Vemprala, N., & Dietrich, G. (2019). A Social Network Analysis (SNA) Study On Data Breach Concernss Over Social Media. Proceedings of the 52nd Hawaii International Conference on System Sciences, 6, 71867193. https://doi.org/10.24251/hicss.2019.862</p><p></p><p>Van De Garde-Perik, E., Markopoulos, P., De Ruyter, B., Eggen, B. and Ijsselsteijn, W. (2008) Investigating privacy attitudes and behavior in relation to personalization, Social Science Computer Review, Vol. 26, No. 1, pp.2043.</p><p></p><p>Vesel, P. & Zabkar, V. 2010. Comprehension of Relationship Quality in the Retail Environment. Managing Service Quality 20(3): 213-235.</p><p></p><p>Venkatesh, V., Davis, F.D., (2000), Theoretical extension of the technology acceptance model: four longitudinal field studies, Management Science, Vol. 46(2): 186-204.</p><p></p><p>Wan Mohamad Asyraf Bin Wan Afthanorhan. (2013). A Comparison of Partial Least Square Structural Equation Modeling (PLS-SEM) and Covariance Based Structural Equation Modeling (CB-SEM) for Confirmatory Factor Analysis. International Journal of Engineering Science and Innovative Technology (IJESIT), 2(5), 9.</p><p></p><p>Wang, Y.S., Wang, Y.M., Lin, H.H. & Tang, T.I. (2003), "Determinants of user acceptance of Internet banking: an empirical study", International Journal of Service Industry Management, vol. 14, no. 5, pp. 501-519.</p><p></p><p>Wetzels, M., Odekerken-Schroder, G., & van Oppen, C. (2009). Using PLS path modeling for assessing hiererchical construct models: Guidelines and empirical illustration. MIS Quarterly, 33(1), 177-195.</p><p></p><p>Wild, J. A. Cant, M. C. and Nell, C. E. (2014). Perceptions and Uses of Social Media Networking Systems By South African Students. International Business & Economics Research Journal (IBER). 13(4):715-726.</p><p></p><p>Willoughby, M. (2018). A review of the risks associated with children and young peoples social media use and the implications for social work practice. Journal of Social Work Practice. 0533(5), 1-14.</p><p></p><p>Waters, S., & Ackerman, J. (2011). Exploring privacy management on Facebook: motivations and perceived consequences of voluntary disclosure. Journal of Computer-Mediated Communication, 17(1), 101-115.</p><p></p><p>Widjaja, A. E., Chen, J. V., Sukoco, B. M., & Ha, Q. A. (2019). Understanding users willingness to put their personal information on the personal cloud-based storage applications: An empirical study. Computers in Human Behavior, 91(September 2018), 167185. https://doi.org/10.1016/j.chb.2018.09.034.</p><p></p><p>Wu, I. L., Chuang, C. H., & Hsu, C. H. (2014). Information sharing and collaborative behaviors in enabling supply chain performance: A social exchange perspective. International Journal of Production Economics, 148, 122132. https://doi.org/10.1016/j.ijpe.2013.09.016.</p><p></p><p>Yahia, I. B, Al-Neama, N. & Kerbache, L. (2018). Investigating the drivers for social commerce in social media platforms: Importance of trust, social support and the platform perceived usage. Journal of Retailing and Consumer Services 11-19. 10.1016/j.jretconser.2017.10.021.</p><p></p><p>Yang, J., Wang, J., Wong, C.W.Y., Lai, K.H. (2008). Relational stability and alliance performance in supply chain. Omega 36 (4), 600608.</p><p></p><p>Yang, X. (2019). How perceived social distance and trust influence reciprocity expectations and eWOM sharing intention in social commerce. Industrial Management & Data Systems, 119(4), 867880. https://doi.org/10.1108/IMDS-04-2018-0139.</p><p></p><p>Yin, R.K. (1994), Case Study Research: Design and Methods, Sage, Beverley Hills, CA.</p><p></p><p>Yuen Meikeng, Lim May Lee, & Clarissa Say, (2018). Our teens are bullies. Retrieved 18 March, 2018, from https://www.thestar.com.my/news/nation/2018/03/18/behaving-badly-in-cyberspace-malaysian-teens-more-likely-to-be-cyberbullies-than-victims-says-study.</p><p></p><p>Yusliza Yakimir Abd Talib (2015, November 25). Always keep your identity safe. Retrieved from http://www.hmetro.com.my/node/95657?m=1.</p><p></p><p>Yvette Reisinger, & Mavondo, F. (2008). Structural Equation Modeling : Critical Issues and New Developments. Journal of Travel & Tourism Marketing, (July 2013), 3741. https://doi.org/10.1300/J073v21n04.</p><p></p><p>Zhou, T., Li, H. (2014). Understanding mobile SNS continuance usage in China from the perspectives of social influence and privacy concerns. Comput. Hum. Behav. 37, 283289.</p><p></p><p>Zikmund, W.G. (2003). Business Research Methods (7th Eds). Mason, OH: South Western/Thompson.</p><p></p><p>Zikmund, W. G. (2000). Business research methods (6th ed.). FL: The Dryden Press.</p><p></p><p>Zikmund, W. G. & Babin, B. J. 2006. Exploring Marketing Research. Mason, Ohio: Thomson South-Western.</p><p></p><p>Zlatolas, L. N., Welzer, T., Hericko, M. & Hlbl, M. (2015). Privacy antecedents for SNS self-disclosure: The case of Facebook. Computers in Human Behavior. 45, 158-167.</p><p></p><p>Zlatolas, L. N., Welzer, T., Hlbl, M., & Heri., M. (2019). A Model of Perception of Privacy , Trust , and Self-Disclosure on Online Social Networks. Entropy, 21, 772. doi:10.3390/e21080772.</p><p></p><p>Zainol, Z., (2018). Structural equation modeling using AMOS: A step by step approach. Malaysia.</p><p></p><p>Zakaria, M. H., Watson, J., & Edwards, S. L. (2010). Investigating the use of Web 2.0 technology by Malaysian students. Multicultural Education & Technology Journal, 4(1), 1729.</p><p></p><p>Zainol, Z., Omar, N. A., Osman, J., & Habidin, N. F. (2016). The Effect of CustomerBrand Relationship Investments Dimensions on Customer Engagement in Emerging Markets. Journal of Relationship Marketing, 15(3), 172199. https://doi.org/10.1080/15332667.2016.1209051</p><p></p><p>Zaefarian, G., Henneberg, S. C. & Naud, P. 2013. Assessing the Strategic Fit between Business Strategies and Business Relationships in Knowledge- Intensive Business Services. Industrial Marketing Management 42(2): 260- 272.</p><p></p><p>Zainudin, A. 2012. Research Methodology and Data Analysis. 2nd edition. Shah Alam, Selangor: UiTM Press.</p><p></p><p>Zlatolas, L. N., Hrgarek, L., Welzer, T., & Hlbl, M. (2022). Models of Privacy and Disclosure on Social Networking Sites: A Systematic Literature Review. Mathematics, 10(1). https://doi.org/10.3390/math10010146</p><p></p><p></p><p></p><p></p><p></p> |