Professional Documents
Culture Documents
Masur
Situational
Privacy and
Self-Disclosure
Communication Processes in
Online Environments
Situational Privacy and Self-Disclosure
Philipp K. Masur
123
Philipp K. Masur
Institut für Kommunikationswissenschaft
Universität Hohenheim
Stuttgart
Germany
Dissertation, Universität Hohenheim, 2017
This Springer imprint is published by the registered company Springer International Publishing AG part
of Springer Nature.
The registered company address is: Gewerbestrasse 11, 6330 Cham, Switzerland
Preface
v
vi Preface
that allow for different types of social interactions), how they manipulate them (i.e.,
how they use privacy regulation behaviors to control the level of privacy), and how
these external factors, in combination with interpersonal perceptions and internal
personal factors, affect self-disclosure within these environments. Chapter 9 will
introduce the multi-method study conducted to test the derived assumptions. It will
be shown that a combination of survey, experience sampling, and tracking methods
must be regarded as the most valuable research design for testing the proposed
theory. The results obtained will be described in Chap. 10 and discussed in Chap. 11.
In Part III, the overall implications of the theory will be discussed and critically
reflected upon in light of the findings from the empirical study. In Chap. 12, I
will summarize the major findings and offer some overall criticism of the proposed
theory. I will further consider possible extensions and modifications of the theory.
Finally, I will provide some perspectives on future research (Chap. 13). I will argue
for the merits of adopting a situational perspective and suggest possible research
areas which I deem most important within the next years. To conclude, I will discuss
some societal implications of this work.
The interested reader may find it most useful to read all parts consecutively as
each provides the necessary foundation for the next. However, each part may also
be read on its own as each serves additional purposes. For example, privacy scholars
will find a systematic review of classic as well as contemporary theories of privacy
and self-disclosure in Part I. Likewise, communication scholars will discover an
additional methodological discussion of the mobile experience sampling method in
Part II which—in my opinion—provides an invaluable approach toward measuring
situational communication processes in general. Finally, practitioners, teachers, or
interested individuals may draw from the practical implications discussed in Part III.
By investigating a subject as complex and elusive as privacy and self-disclosure,
I have worked and struggled with the inspiring and oftentimes incredibly compre-
hensive work of previous scholars. Although I may have been critical at times, their
work has been an insightful and an inspiring resource on which I humbly hope to
build. I sincerely hope that I succeeded to provide an enjoyable and insightful read,
not just for other scholars but also for the layperson who is interested in the complex,
yet fascinating nature of privacy and self-disclosure.
This book could not have been written without the help of many important
people. They all have contributed in one way or another and I am deeply indebted to
them. First, I want to thank my supervisor Prof. Dr. Sabine Trepte for her guidance,
inspiration, motivation, feedback, and continual support. I am grateful for being a
part of her team, which provides a truly stimulating research environment. I feel
very blessed to work with such wonderful people and such an inspiring group of
researchers. I also thank her for the initial encouragement to use alternative methods
of data collection and for the funding of the empirical study. Second, I want to thank
Prof. Dr. Jens Vogelgesang, who is the second advisor of this thesis and provided
valuable feedback during the writing of this book. He has encouraged me to be more
critical and precise.
I especially would like to thank Tobias Dienlin. Many thoughts expressed in this
book evolved from our long discussions. I am grateful for such a great scientific
Preface vii
sparring partner, and, more important, for such a true friend. His critical comments,
his ability to think differently, and (obviously) his research have all shaped this
book. I hope, Tobias, that you will continue challenging me over and over again.
Many thanks also go to Michael Scharkow. For me, there could not have been a
better time for him to join our team. I received a great colleague and a new friend.
I want to thank Michael for his continual advice, help, and constructive criticism,
even going beyond methodical issues.
I further want to thank all of my current and past colleagues at the University
of Hohenheim: Cornelia, Doris, Josephine, Laura, Max, Susanne, and Thilo. They
have often made me think outside of the box and inspired me with their original
ways of thinking. I am particularly indebted to Max Braun, who was an invaluable
listener and sparring partner in the last phase of my dissertation. I also want to thank
Marko Bachl, who provided valuable last-minute feedbacks. Many thanks go to Keri
Hartman and Niha Jain for their thorough language editing and proofreading. I also
want to thank the German Society for Online Research for supporting this work. I
am also indebted to all participants who were willing to take part in such a time-
consuming study.
I further want to express my gratitude and love to my family. I thank them for
their understanding and help. They provided constant encouragement and support
during the writing of this book. Finally, I want to thank Maria Kaulbarsch—for
everything.
1 Introduction .. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. . . . . . . . . . . . . . . . . . . . 1
1.1 A Situational Perspective . . . . . . . . . . . . . . . . . . . . . . . .. . . . . . . . . . . . . . . . . . . . 3
1.2 Overall Research Goals . . . . . . . . . . . . . . . . . . . . . . . . . .. . . . . . . . . . . . . . . . . . . . 7
ix
x Contents
9 Methods .. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. . . . . . . . . . . . . . . . . . . . 215
9.1 Beyond Traditional Data Collection Methods . .. . . . . . . . . . . . . . . . . . . . 217
9.1.1 The Experience Sampling Method.. . . .. . . . . . . . . . . . . . . . . . . . 217
9.1.2 Combining Experience Sampling and Tracking
Methods .. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. . . . . . . . . . . . . . . . . . . . 219
9.2 Overall Research Design .. . . . . . . . . . . . . . . . . . . . . . . .. . . . . . . . . . . . . . . . . . . . 221
9.3 Pre-study .. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. . . . . . . . . . . . . . . . . . . . 222
9.3.1 Sample and Procedure .. . . . . . . . . . . . . . . . .. . . . . . . . . . . . . . . . . . . . 223
9.3.2 Measures . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. . . . . . . . . . . . . . . . . . . . 223
9.3.3 Results and Implications . . . . . . . . . . . . . . .. . . . . . . . . . . . . . . . . . . . 225
9.4 Main Study . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. . . . . . . . . . . . . . . . . . . . 228
9.4.1 Sample and Procedure .. . . . . . . . . . . . . . . . .. . . . . . . . . . . . . . . . . . . . 230
9.4.2 Event Sampling Strategy . . . . . . . . . . . . . . .. . . . . . . . . . . . . . . . . . . . 232
9.4.3 Measures . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. . . . . . . . . . . . . . . . . . . . 236
9.4.4 Variable Coding and Data Analyses . . .. . . . . . . . . . . . . . . . . . . . 242
10 Results .. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. . . . . . . . . . . . . . . . . . . . 251
10.1 Preliminary Analyses . . . . . . . . . . . . . . . . . . . . . . . . . . . .. . . . . . . . . . . . . . . . . . . . 252
10.1.1 Scale and Item Analyses . . . . . . . . . . . . . . .. . . . . . . . . . . . . . . . . . . . 252
10.1.2 Assessing Potential Bias in the ESM Sample . . . . . . . . . . . . . 254
10.2 Predicting Pre-situational Preventive Privacy Regulation . . . . . . . . . . 256
10.2.1 Choosing the Environment .. . . . . . . . . . . .. . . . . . . . . . . . . . . . . . . . 256
10.2.2 Manipulating the Environment.. . . . . . . .. . . . . . . . . . . . . . . . . . . . 264
10.3 Predicting Situational Depth of Self-Disclosure .. . . . . . . . . . . . . . . . . . . 272
10.3.1 Situational Variance in Depth of Self-Disclosure . . . . . . . . . 272
10.3.2 Antecedents of Depth of Self-Disclosure.. . . . . . . . . . . . . . . . . 274
11 Discussion . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. . . . . . . . . . . . . . . . . . . . 285
11.1 Implications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. . . . . . . . . . . . . . . . . . . . 286
11.1.1 What Makes People Engage in Privacy Regulation
Behavior? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. . . . . . . . . . . . . . . . . . . . 287
11.1.2 What Determines Whether People Disclose
Themselves? . . . . . . . . . . . . . . . . . . . . . . . . . . . .. . . . . . . . . . . . . . . . . . . . 293
11.2 Limitations and Reflections . . . . . . . . . . . . . . . . . . . . . .. . . . . . . . . . . . . . . . . . . . 299
11.2.1 Subjective Perceptions of External Environmental
Factors.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. . . . . . . . . . . . . . . . . . . . 299
11.2.2 Sample, Variance, and Power Constraints .. . . . . . . . . . . . . . . . 301
11.2.3 General Methodological Considerations . . . . . . . . . . . . . . . . . . 302
11.2.4 Ethical Reflections .. . . . . . . . . . . . . . . . . . . . .. . . . . . . . . . . . . . . . . . . . 304
11.3 Preliminary Conclusion .. . . . . . . . . . . . . . . . . . . . . . . . .. . . . . . . . . . . . . . . . . . . . 306
Contents xiii
References .. .. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. . . . . . . . . . . . . . . . . . . . 365
Chapter 1
Introduction
increasingly blurs the distinction between public and private spheres (e.g., Boyd,
2011; Joinson, Houghton, Vasalou, & Marder, 2011; Papacharissi, 2010).
At the same time, we can observe an increasing commodification of information
as communication services providers collect more and more data from their clients
(e.g., Castells, 2009). The revelations of former National Security Agency (NSA)
contractor Edward Snowden have shown that governmental agencies have access to
emails, chat conversations, voice calls, documents, search histories, file transfers,
and even live chats through servers of companies like Microsoft, Google, Apple,
Yahoo, Facebook, and many more (Greenwald, 2014). The acceleration in data
collection, accompanied by a steady advancement in aggregation and analysis
abilities, has thus facilitated ubiquitous surveillance and large-scale mining of
databases from which sensitive inferences about individuals can be drawn (Acquisti,
Brandimarte, & Loewenstein, 2015, p. 509).
Simply shifting the topic to avoid unwanted access is hence no longer applicable.
Instead, people have to be aware of a multitude of environmental factors that were
nonexistent in offline situations and implement a variety of preventive privacy
regulation strategies in order to achieve circumstances under which they feel able
to self-disclose. The decision between revealing and concealing private information
therefore must include assessment of the respective media environment in which
the communication takes place. However, the speed of technological progress
often exceeds the time individuals need to become aware of the new threats or
risks. Much information necessary to make reasonable decisions with regard to
privacy regulations and self-disclosure is somewhat intangible and therefore is often
not understood or simply unknown. In many cases, individuals feel overburdened
and consequently experience considerable uncertainty about the safety of their
online privacy (Acquisti et al., 2015, pp. 509–511). Not surprisingly, journalists
have recently proclaimed a constant decrease of privacy in western societies and
consistently evaluated this development as negative (e.g., von Pape, Trepte, &
Mothes, 2017, pp. 8–10). Analogically, uncertainty and privacy concerns increased
almost in all populations all over the world (European Commission, 2011, 2015;
Madden & Rainie, 2015; Trepte & Masur, 2017b).
In the last decades, communication scholars have studied why people seemingly
disclose a lot of private information in new media environments such as social
network sites (SNS). Several theoretical advancements have been proposed and
much empirical work has been conducted in order to shed light on this complex topic
(for overviews, see Abramova, Wagner, Krasnova, & Buxmann, 2017; Bélanger
& Crossler, 2011; Li, 2011; Smith, Dinev, & Xu, 2011; Trepte & Reinecke,
2011a). Although these approaches have brought important insights into many
aspects of privacy and self-disclosure processes in online environments, I think
it is important to go back to a rather fundamental question: What exactly makes
people disclose themselves? Based on several studies that have been conducted
recently, we could argue that general privacy concerns affect the decision to self-
disclose (for a recent meta-analysis, see e.g., Baruh, Secinti, & Cemalcilar, 2017).
Someone who generally fears that the content of digitally transferred messages
might be visible to unintended third parties might be more likely to decide against
1.1 A Situational Perspective 3
of situational factors (e.g., Nisbett & Ross, 1980; Ross, 1977; Ross & Nisbett,
2011).1
There are also some methodical caveats in the current research practice. By
taking an aggregative perspective, many recent studies have resorted to a somewhat
similar methodical design: based on self-reports in standardized online surveys,
scholars often correlated person-related characteristics and people’s estimations of
their average privacy regulation behavior or average self-disclosure. A limitation
of such a method is that we can only ask people at one point in time. Although
this method is often adequate to assess a variety of stable variables such as
individual’s personality, opinions, attitudes, or even unique experiences, it is less
suitable to capture behaviors that are very frequent, but irregular (e.g., such
as self-disclosure). As scholars, we try to work around this limitation and ask
participants to reflect about their “general” behavior, their “general” perceptions,
or their “general” feelings. Strictly speaking, participants thus aggregate their many
situational experiences and estimate how they behave, think, or feel “in general” or
“on average.” Research on people’s memory and estimation capabilities, however,
has shown that such guesses or estimations are typically biased (for overviews,
see Bradburn, Rips, & Shevell, 1987; Nisbett & Ross, 1980; Sudman, Bradburn,
& Schwarz, 1996; Tourangeau, Rips, & Rasinski, 2000). Moreover, such biased
estimations disguise the oftentimes considerable variability in human perceptions,
feelings, and behavior across different situations, leaving the researcher with a
somewhat artificially constructed measure.
With this work, I aim to both challenge and build upon the existing literature by
proposing a comprehensive situational perspective on privacy and self-disclosure
processes. Of course, non-situational personal characteristics account for general
differences between individuals. However, I argue that it is the combination of
non-situational and situational factors that allows for more accurate predictions
and a more comprehensive understanding of privacy and self-disclosure processes.
As I intend to show, a situational perspective will not only help to solve some
conceptual issues, but will also provide the necessary tools to grasp the peculiarities
of new media environments. Different online environments provide different cir-
cumstances for communication and, consequently, also different levels of privacy.
Depending on the types of platform or applications that are used to communicate,
different combinations of environmental factors affect people’s privacy and self-
disclosure decisions. A situational theory will thus help us to understand why
new media environments represent a challenge for individual users and why their
behaviors in these environments might not always reflect their own concerns or
attitudes.
1 Empirical evidence suggests that people are inclined to offer dispositional explanations for human
behavior even when situational manipulations are easily perceivable (for an overview, see Ross &
Nisbett, 2011, pp. 119–144).
1.2 Overall Research Goals 7
In line with the rationale presented above, the first and major aim of this work is to
provide the theoretical foundation to study privacy and self-disclosure from a situa-
tional point of view. As the synthesis of privacy and self-disclosure research remains
largely fragmented, I primarily aim to theoretically connect theories of privacy and
self-disclosure and thereby integrate both aggregative and situational approaches.
Building upon theoretical work investigating person–environment interactions, I
will then develop the theory of situational privacy and self-disclosure which allows
the investigation of both pre-situational privacy regulation processes and self-
disclosure as a consequence of situational privacy perceptions. It hence extends prior
theoretical work on privacy regulation and self-disclosure by putting the concepts
into a sequential order which, in turn, allows a more nuanced understanding
of individual privacy management processes. It further enables differentiation
between antecedents of self-disclosure with regard to their stability (situational
vs. non-situational) and whether they represent personal (i.e., characteristics of the
discloser) or environmental factors (i.e., both interpersonal and external character-
istics). As I will show, this theoretical framework allows to investigate privacy and
self-disclosure processes both in offline and online environments. The integration
of external environmental factors as relevant antecedents particularly facilitates the
inclusion of characteristics of new media environments and, correspondingly, an
investigation of their influence on people’s behaviors.
The second objective of this work is to test the assumptions of the theory
empirically. Of course, scholars have long used experimental designs to investigate
situational processes. However, experiments are likewise limited because they only
provide insights into one specific, and often artificial situation. In contrast, while the
theory of situational privacy and self-disclosure still aims to identify general patterns
in behaviors (just like correlational studies before), it simultaneously acknowledges
the situational variance (which was only partly considered in experiments). Since
classical data collection methods do not suffice to prove the assumptions of the
theory, I propose a new multi-method approach combining traditional survey
methods, log data, and experience sampling techniques. This method facilitates
investigation into how both personal and environmental factors affect self-disclosure
in various mediated and non-mediated communication situations, and it thereby
strengthens the external validity of the empirical analysis by sampling from real-
life situations.
In order to address the issues in explaining people’s behavior in online envi-
ronments, this empirical study is one of the first to address privacy and self-
disclosure processes in smartphone-based communication situations. Investigating
communication in this context is relevant for two reasons: First, using smartphone
applications for interpersonal communication has become the norm instead of the
exception. In 2012, only one-third of the US-American and German populations
owned a smartphone. Five years later, however, the number of smartphone users
doubled, and is likely to continue to increase (see Fig. 1.1). Representative surveys
8 1 Introduction
USA Germany
64% 74%
60%
56% 65%
55%
46%
35% 41%
36%
2011 2012 2013 2014 2015 2012 2013 2014 2015 2016
Fig. 1.1 Percentage of population owning a smartphone in the USA and Germany from 2012 to
2016 (based on data collected by Bitkom, 2016; Smith, 2013, 2015; Trepte & Masur, 2017b)
have shown that people mostly use their smartphones for communicative purposes
(e.g., Duggan, 2015; Trepte & Masur, 2017b). Smartphone-based communication
thus plays a pivotal role in the daily lives of individuals. Despite these findings,
research on privacy and self-disclosure processes in different types of smartphone-
based communication environments remains surprisingly scarce. Instead, previous
research has typically focused specific platforms (mostly Facebook).
Second, hardly any other device has changed our daily communication as much
as the smartphone. As previous research is often limited to a single platform, it
neglects that people today use different applications for different purposes and thus
engage in what may be termed multimodal communication practices. In light of
this, choosing between different communication applications may already constitute
effective privacy regulation. Even more importantly, each application provides a
different environment that differently challenges an individual in his or her decision
to self-disclose. Hasebrink and Schmidt (2013) have argued that with increasing
media convergence, scholars need to take a more global perspective and analyze
so-called media repertoires. In the context of privacy and self-disclosure processes,
this is particularly relevant because individuals are confronted with more and diverse
communication situations that require granular privacy regulations and individually
affect the disclosure decision process. In light of this, the theory of situational
privacy and self-disclosure will thus be used to answer the following two overall
research questions: First, what makes people engage in application-specific privacy
regulation behaviors? Second, under what circumstances do people engage in high
levels of self-disclosure during smartphone-based communication?
The final goal of this work is to discuss the implications of the proposed theory
and the empirical findings for the individual, society, and future research. Among
other things, I particularly advocate for a stronger emphasis on understanding
online privacy literacy—defined as the awareness, knowledge, reflexion capabilities,
technical skill, and motivation necessary to communicate self-determined and in
line with individually reflected privacy needs in an increasingly digital way of life.
1.2 Overall Research Goals 9
can enjoy the benefits and gratifications of these new communication systems.
However, in doing so, they simultaneously risk what they themselves consider
privacy breaches under other circumstances (cf. Walther, 2011, p. 3). In general,
three complicating factors challenge users’ privacy when communicating in online
environments (Walther, 2011, p. 3). First, people generally seem to have a misplaced
presumption that online communication is somehow private because it resembles
analogous offline activities from an interpersonal point of view. Second, the
technical infrastructure of the Internet and in particular of new communication
platforms is in many ways incompatible with traditional concepts of privacy. Third,
people’s expectations of privacy do not constitute privileged communication by
definition.
In light of this, I deem it important to reanalyze what actually defines online
communication and what characterizes the new media environments in which online
communication takes place. I will first analyze the underlying technical infras-
tructure and evaluate how it changes traditional information flows. I will further
elaborate on how online communication differs from face-to-face communication.
I will place a specific emphasis on the impact of mobile devices (e.g., tablets,
or smartphones) and how they have altered they way we communicate with each
other. In doing so, I will describe a number of horizontal and vertical dynamics
that particularly challenge traditional privacy and self-disclosure processes. In the
final section, I will discuss the implications of these analyses for the development
of theories of privacy and self-disclosure.
The fundamental difference between offline and online communication lies in the
properties of digital information. Whereas information passed to other people by
2.1 Technical Properties of Online Communication 15
speech is fleeting and in most cases unrecorded, sharing information online means
transforming words, images, or meanings into bits. This transformation can be
understood as a translation of complex combinations into a simple binary code that
contains only 1 and 0 or on and off. A bit thus refers to the smallest element within
the “DNA of information” (Negroponte, 1996, p. 14). From a computer’s point of
view, information represents strings of these two digits (Miller, 1971, p. 11)
This transformation changes the way one can interact with information. Informa-
tion once shared online becomes persistent, searchable, replicable, and editable (cf.
Boyd, 2008a, p. 126). In my opinion, we can further add the notion that information
becomes linkable.1 These five properties are not distinct and must be regarded as
intertwined.
Persistence Once information is transformed into bits, it can be saved on a
computer hard drive. As long as it is not deleted, information becomes long-lasting
and can be reassessed at later points in time. In contrast to the ephemeral nature of
oral communication, mediated communication is generally recorded and stored. In
principle, what we type into the computer is stored on some local hard drive (either
on hard drives in our own computers or in third party-operated computers). For
example, the clusters of bits that constitute a status update on Facebook are stored
on the company’s servers. The information contained in the status update thereby
becomes accessible beyond the original posting and from anywhere in the world.
Searchability Information can be understood as combinations of binary code or
clusters of bits. However, there are new types of bits that tell us more about these
clusters. As Negroponte (1996) denotes: “a new kind of bit is born – a bit that
tells you about the other bits” (p. 18). Through these so-called headers, digital
information can be indexed and searched by web search engines or other discovery
tools. Mentally returning to a previous face-to-face conversation requires a good
memory. On the Internet, in contrast, finding the right information is comparatively
easy. One can easily browse through old messages and even use search functions to
find specific text passages. People’s profiles are easily detectable and web pages
or pictures can be found based on simple keywords or by searching for meta-
information such as the date or time of the posting.
1 Scholars have discussed similar terms as affordances of social media (e.g., Boyd, 2011; Evans,
Pearce, Vitak, & Treem, 2016; Treem & Leonardi, 2012). They thereby emphasize a relational
view on how people use social media. Affordances represents subjective action possibilities related
to particular features of an object or artifact. There is an important difference between defining
something as a property of digital information or as an affordance of social media. For example,
persistence can be regarded as a mere characteristic of an object. If we say that something is
persistent, we mean that it lasts for a long time (e.g., if I am stating that information is persistent, I
am referring to the long-lasting nature of digital bits). Persistence as an affordance of social media,
in contrast, refers to the reviewability of information as an emerging social practice connected
to the long-lasting nature of information transformed into digital bits. For now, I only use the
following terms to describe the characteristics of digital information and not the action possibilities
they suggest to individual users. However, I will come back to affordances in Sect. 12.3.
16 2 New Media Environments and Their Threats
Although the term networked publics is mostly used in the literature, I favor
the term networked environments because not all new media environments that
are based on digital information necessarily imply a certain level of publicness.
However, they can nonetheless represent a network structure. Livingstone (2005)
defined publics as “a collection of people who share a common understanding of
the world, a shared identity, a claim to inclusiveness, a consensus regarding the
collective interest” (p. 5). The term networked publics is thus meant to represent
such collections of people in online environments and is often used to describe the
nature of platforms such as SNS or microblogging services that offer different forms
of one-to-many communication. It therefore makes sense to speak about networked
publics for many types of online media such as SNS (e.g., Facebook, Google+,
or Instagram.), microblogging services (e.g., Twitter), blogs, and other platforms
that have created a kind of (virtual) public space. Interpersonal communication via
instant messenger, on the other hand, is also based on network technology but does
not necessarily feel public to its users.
Notwithstanding this notion, networked technology provides the stage for a
multitude of social interactions (Papacharissi, 2011b, p. 304). It is important to note,
however, that the networked nature of online communication does not allow us to
think of different platforms as distinct spheres. The properties of digital information
outlined above allow information to flow through these networks. It thereby passes
increasingly blurred boundaries: A conversation started on SNSs, for example, may
continue on an instant messenger service; a picture uploaded on a photo-sharing
website may be shared on a blog; and a tweet posted to a small audience may be
shared with originally unintended recipients and eventually even with unknown
third parties. Content or information created for a small audience in this way
often expands beyond the original target market (Papacharissi, 2011a, p. 305).
Scholars have thus coined the term media convergence (Jenkins, 2008; Jensen, 2010;
Papacharissi, 2010), which can be described as “the flow of content (i.e., informa-
tion) across media platforms, an overlap between media industries, migratory behav-
ior on the part of audiences that follow content, [. . . ] and the ability for audiences
to interact with content as both consumers and producers” (Papacharissi, 2011a,
p. 305). The convergent architectures of online communication platforms give rise
to new dynamics and social practices. Before I discuss those in detail, however, it is
important to consider some non-technical characteristics of online communication.
Furthermore, we should consider the impact of the increasing use of mobile devices
on the ways in which people communicate today. These new forms of communica-
tion contribute significantly to the tensions that I will discuss further below.
Walther’s HPM proposed a set of processes that explain why online communication
may “facilitate impressions and relationships online that exceed the desirability
and intimacy that occur in parallel off-line interactions” (Walther, 2011, p. 460).
The development was inspired by a study in which scholars observed both CMC
and face-to-face groups and rated their relational communication (Walther, 1995).
20 2 New Media Environments and Their Threats
Walther was surprised to find that CMC groups were generally rated more positively
on several dimensions of intimacy and social orientation (Walther, 1996, p. 17). He
therefrom derived that under certain conditions, CMC may become hyperpersonal.
The model proposes that CMC affects all common components of the com-
munication process (sender, receiver, channel, and feedback). First, CMC is gen-
erally text-based and thereby facilitates selective self-presentation. Without the
co-presence of receivers, senders can actively shape their self-presentation by
transmitting only cues that they desire others to have (Walther, 2011, p. 461). The
technological preconditions allow for a high levels of control over the transmitted
cues and thus foster positive or optimized self-presentation (Walther, 1996, p. 19).
Second, the receiver is presented with a selective self-presentation and may thereby
gain an idealized perception of the sender (Walther, 1996, pp. 17–19). This may
be enforced because individuals tend to complete their impressions of the sender
(based on reduced cues) with stereotypical characteristics (cf. Trepte & Reinecke,
2013a, pp. 166–167). Third, the asynchronous nature of CMC allows senders to edit
their messages without disrupting the communication flow. Walther (1996) noted
that “following the removal of temporal limitations, task and interpersonal inter-
action becomes, in a sense, disentrained; both task-oriented and socially oriented
exchanges may take place without one constraining the time available for others”
(p. 24). It is this very characteristic of early CMC that provides the possibility for
enhanced selective message construction (pp. 25–27). Fourth, Walther argued that
the selective and idealized self-presentation is intensified because receivers provide
corresponding feedback. Senders only receive feedback to the cues they transmitted
and not for those they choose to hide.
A problematic aspect of this model is that it does not explain under what
circumstances such hyperpersonal interaction takes place. It is unlikely that people
always exploit CMC for idealized self-presentation. Furthermore, today’s CMC
is not necessarily always asynchronous. Mobile devices and applications such as
instant messenger have given people the possibility of synchronous communication
even when they are not close to each other. Nonetheless, the HPM provides a first
and comprehensive picture of how online communication can differ from face-
to-face interaction. Cues-filtered-out theories have sparked much research with
important implications for privacy and self-disclosure. For example, Joinson (2001)
found experimentally that participants disclose more information in dyads when
communicating with computers compared to face-to-face. Nonetheless, devices and
technological progress have further shaped how people communicate today. In the
next sections, I will thus discuss some recent theoretical reflections that scholars
have engaged in as a consequence to the growing proliferation of smartphones and
other mobile devices.
2.2 Characteristics of Online Communication 21
Campbell (2013) argued that simply the size of the smartphone “is one of the
important mechanisms of mobility because it means that individuals are both able
and willing to carry, use, and even wear the technology virtually anywhere” (p.
11). This mobility, in turn, allows for “flows of information and communication to
be more seamlessly weaved into the rhythms of every day life” (p. 10). Arguably,
we thus have slowly come to think, feel, experience, and act with the expectation
of being permanently online and permanently connected (Vorderer, 2015; Vorderer
& Kohring, 2013). Anecdotal evidence of people frantically searching for places
to charge their smartphones further supports this claim. Several terms such as
“always-on” (Turkle, 2008), “ubiquitous reachability” (Ling & Donner, 2013),
“hyper-connection” (Lee, Leung, Qiu, & Chu, 2012), and “perpetual contact”
(Mascheroni & Vincent, 2016) have been coined to describe this phenomenon.
Obviously, being permanently online and permanently connected has several
consequences for our relationships and the ways in which we interact with each
other. The possibility of communicating independently of time and space allows,
but also presupposes, permanent social exchange and subsequently leads to an on-
going, never-ending stream of interaction between the individual and his or her
significant others. It has been argued that individuals thereby develop a form of
“connected presence” (Cui, 2016; Licoppe, 2003). In light of this phenomenon,
Vorderer (2015) proposed several transformations. For one, for example, he argues
that availability might replace spatial closeness (pp. 263–264). As geographical
distance is no longer a boundary condition for interpersonal exchange, people
also place much more emphasis on constant accessibility. Among teenagers, these
connected interactions “have an expressive and phatic function, serving as a way
to check on the status of friendship ties” (Mascheroni & Vincent, 2016, p. 311).
Recent smartphone applications such as Periscope, Instagram, and also Facebook
even allow to share live videos with friends and followers. This kind of live
broadcasting allows individuals to share experiences as they are created. In this
context, being available might be more important than actually being close to each
other. Vorderer further argues that boundaries between contact and non-contact are
blurred. Or, in other words, the strict separation between mediated and non-mediated
communication becomes almost meaningless.
This development might also have a dramatic impact on privacy and self-
disclosure processes. Vorderer (2015) proposes that self-transparency might replace
secrets (p. 270). Under the condition of being permanently online and permanently
connected, it seems that people are more inclined to disclose themselves or
might even perceive the necessity to disclose themselves and produce a form
of self-transparency. For example, a study based on 488 SNS users has shown
that frequency of SNS use indeed increased the willingness to self-disclose 6
months later (Trepte & Reinecke, 2013b). This effect was found particularly for
22 2 New Media Environments and Their Threats
those users who perceived to have a high social capital with their SNS contacts
(p. 1108). Moreover, as individuals expect from others to be constantly available
and communicate, people may feel obliged to disclose and participate more than
they otherwise would.
2 In the context of privacy research, several scholars have proposed a differentiation between those
two levels (e.g., Masur, Teutsch, & Dienlin, 2018; Raynes-Goldie, 2010; Schwartz, 1968). I will
discuss this differentiation more thoroughly in Sect. 6.2.1.
24 2 New Media Environments and Their Threats
In face-to-face situations, we are rarely confronted with several contexts at the same
time. In communicating with a partner, for example, we are most likely in the
context of “the family” or an intimate relationship. Other times, we communicate
with friends, work colleagues, or neighbors. In his seminal work The Presentation
of Self in Everyday Life, Goffman (1959) stated—in an analogy to an actor
on stage—that every performance by an individual is influenced by the region
and time in which it takes place. People thus engage in many different dramas
that require them to constantly change roles and inhibit conventional behavior.
A variety of nomenclature has been used to explain that privacy behavior does not
happen under universal circumstances. Different scholars have used labels such as
regions (Goffman, 1959), spheres of value (Max Weber as cited in Oakes, 2003),
social fields (Bourdieu, 1984), or contexts (Nissenbaum, 2010). Apart from slight
differences, these concepts refer to the same idea well described within the definition
of contexts by Helen Nissenbaum:
2.3 Privacy-Related Dynamics in Networked Environments 25
Contexts are structured social settings characterized by canonical activities, roles, rela-
tionships, power structures, norms (or rules), and internal values (goals, ends, purposes)
(Nissenbaum, 2010, p. 132).
and can be understood as the blurring of traditional boundaries between the private
and the public.
Vertical dynamics refer to interactions between users and companies (or clients and
providers) or citizen and governmental institutions. Privacy intrusions thus involve
companies or institutions accessing private data of individuals. This interference
with people’s privacy has been fortified by the increasing proliferation of the com-
puter. Over time, and particularly after the invention of the Internet, this has led to
several economic and societal dynamics that threaten people’s privacy. First, there is
a growing economy that treats personal information as a commodity. An increasing
interest in personal data thus fuels a societal system that structurally invades privacy.
Second, companies collect data in order to maximize their profits.They also use
data about their clients to manipulate them to disclose private information. Third,
governmental agencies and institutions are increasingly interested in data about
their citizens. By promoting national security, they increasingly develop practices
of ubiquitous surveillance.
2.3 Privacy-Related Dynamics in Networked Environments 27
etc.). These companies often offer their services for free but collect all types of
information from their members which they, in turn, sell to the first or second
type of company. Oftentimes, these service companies provide not only valuable
information about individuals, but also advertising space that is specifically tailored
to the needs of advertisers (Acquisti, 2014, p. 8). This new information capitalism
(Castells, 2009; Sevignani, 2016; Webster, 2000), however, would cease to function
were people to stop sharing (or producing) personal information on online services.
This large-scale data mining and the practice of using data to draw inferences
about individuals represents an unprecedented interference with people’s privacy.
Many scholars have consequently argued that “privacy is structurally invaded in
contemporary information capitalism” (Sevignani, 2016, p. 1). This is possible
because individuals have almost no prior experience with such privacy interferences.
Understanding this new information flow requires sophisticated knowledge about
the infrastructure of networked environments and the interests of the respective
players. Whereas violations of privacy by other users are mostly perceivable and
may thus be more influential in shaping subsequent behavior, privacy interferences
stemming from providers and institutions are mostly opaque and difficult to
identify. Additionally, the consequences of such violations are mostly invisible
and have no perceivable consequences in the individuals’ everyday lives. Whereas
unauthorized sharing of private information by another user may lead to real
negative consequences such as bad reputation or embarrassment, the repercussions
of having unknown third parties become aware of one’s personal life or surfing
behavior are mostly elusive and intangible (Acquisti, Brandimarte, & Loewenstein,
2015, p. 509). Despite the apparent lack of knowledge and the intangibility of these
privacy intrusions, most people are nonetheless concerned. In Europe, for example,
55% of all citizens are concerned about the recording of everyday activities via
mobile phone use or mobile applications, and about 45% are concerned about
the recording of everyday activities on the Internet (European Commission, 2015,
pp. 15–21). Five years earlier, European populations showed less concerns about
similar issues (European Commission, 2011, pp. 66–68).
In summary, the lines between public and private boundaries are increasingly
complicated on the vertical level as many interactions in networked environments
seem private to the user, yet render the exchanged information accessible to
companies and other third parties. Trepte and Reinecke (2011b) have argued that the
social web offers users an illusion of privacy—users might believe their information
is protected from other users via privacy settings, but they fail to realize that all
their conversations and disclosures can be accessed by the company operating the
platform and potentially other third parties or institutions (p. 62). In this way, users
have a certain of privacy on the horizontal level, but less privacy on a vertical
level.
2.3 Privacy-Related Dynamics in Networked Environments 29
When we talk about privacy, we talk about many things. We call our home a private
sphere, but we think of our thoughts and feelings as private as well. Our deepest
fears and greatest hopes are private, but so are our decisions to vote for a certain
political party. Information about our families, partners, or friends are private, as
is information about our hobbies and jobs. At the same time, what we share with
others can be, but does not have to be private.
From a linguistic point of view, the word private is an elusive predicate that
people ascribe to actions, situations, states or conditions, locations, and objects
(Rössler, 2001, p. 17). We use the word both for its descriptive and its normative
meaning. If we call something private, we want to emphasize that it belongs to us
and that it deserves protection from unwanted access. Calling something private
connotes that it should not be known by the general public (cf. Geuss, 2013, p. 19).
But talking about privacy must be distinguished from actually experiencing privacy.
When we seek privacy, we often wish to be alone or to be left alone. We sometimes
desire to be in a (spatial or mental) sphere in which we feel we are on our own,
free from external influences, social pressures, or surveillance. Privacy can thus also
be understood as a form of voluntary withdrawal from social contact or society in
general (e.g., Westin, 1967, p. 5).
Although scholars have tried to formulate concepts of privacy around relevant
elements of our lives, theories of privacy do not necessarily adhere to this ordinary
meaning (cf., Solove, 2008, p. 13). The discrepancy results primarily from the
impossibility of capturing all aspects of privacy as well as the vague and ambiguous
usage of the word itself. According to Solove (2008, pp. 13–14), the majority of
scholars have tried to conceptualize privacy by defining it per genus et differentiam.
They hence searched for distinct characteristics of privacy that differentiate it
from other concepts. Although numerous theoretical concepts of privacy have been
developed throughout the last century, it nonetheless seems that scholars today are
still confused about how to tackle the problem of defining privacy. Most of the
theories thus remain fragmented, largely inconsistent, often not fully developed and
hardly empirically validated (Smith, Dinev, & Xu, 2011, p. 992).
Theories of privacy evolved from different disciplines and scientific cultures.
As a first step, I will summarize the most prominent disciplinary discourses and
evaluate their potential to contribute to a situational concept of privacy. I will
show that particularly many approaches implicitly acknowledge the situationality
of privacy by defining it as something temporary. At the core of this chapter, I will
then review existing behavioral approaches to privacy that stem from psychologists
and communication scholars. Before I delve into the literature review, I want to
emphasize that when I talk about privacy, I am referring to individual privacy.
Although the privacy of institutions, organizations, or other entities has been
discussed before (e.g., Westin, 1967, pp. 46–56), I am concerned with a theory of
individual privacy, and more specifically with the situational experience of privacy
and how it influences people’s behavior, from a psychological point of view.
From where does our current understanding of, as well as the value we place on
privacy, stem? This question is almost impossible to answer because the origins of
privacy are so manifold and can be traced back to different societal transformations
and schools of thought. Although the term privacy was only coined in the late
nineteenth century when legal scholars defined the right to privacy as “the right to
be left alone” (Warren & Brandeis, 1890, p. 195), a number of older discourses exist
that have all contributed in one way or another towards our modern understanding of
privacy. Most of these discourses evolved independently from each other, and efforts
to integrate them remain scarce. Although most of these discourses still impact
modern thought, I will nonetheless try to represent them in their chronological order
while pinpointing similarities, differences, and reciprocal impacts.
The first formulation of this idea can be found in Thomas Hobbes’ seminal work
Leviathan. Hobbes assumed that all men are equal and free and therefore strive for
self-preservation and pleasure (Hobbes, 1651/2011, pp. 75–78). He described the
natural condition of mankind (when individuals do not yet live in a society under
a common power) as a state of war, in which every man fights every other man.
In order to escape this precarious state of life, men united and agreed to transfer
power to a regulative institution which Hobbes denoted “Leviathan.” He further
reasoned that this sovereign must be strong to ensure that its authority would not be
questioned by the citizens. Yet the limits of the state’s power would be clearly set;
Leviathan’s function would only be to enforce adherence to common rules. Beyond
these rules, however, men would have no duty to obey and could be free. Hobbes
hence granted citizens in a state-run society a space in which they would still have
the liberty to do as they pleased. Negative freedom is thus freedom from interference
by others (in this case from the sovereign). Positive freedom, in contrast, is having
the capacity to act upon one’s free will (Berlin, 1969).
This general idea of negative freedom has remained unaltered in most liberal
theories. John Locke, for example, extended the concept of negative freedom beyond
land and goods to every thought, intellectual output, writing or anything men could
produce (Locke, 1689/2005, pp. 79–87). von Humboldt (1851/1967) formulated the
most radical anti-paternalistic view on this public–private dichotomy. According
to von Humboldt, the self-reliant occupation and self-determined development of
individuals are the highest “human good” and the state has no value per se. The
state is merely a necessary means to obtain the desired end: to allow for individual
self-occupation. Every positive intervention of the state for individual welfare is
inappropriate or even detrimental as it pre-empts individual occupation. The state
should therefore only be responsible for security (von Humboldt, 1851/1967, p. 56).
These limits of state power were most famously formulated by John Stuart Mill:
That principle is, that the sole end for which mankind are warranted, individually or
collectively, in interfering with the liberty of action of any of their number, is self-protection.
That the only purpose for which power can be rightfully exercised over any member of a
civilized community, against his will, is to prevent harm to others (Mill, 1859/2015, p. 11).
emphasizes the necessity to maintain both privacy and publicity. Most prominently
she argued that the private sphere on its own is nothing but a state of deprivation:
To live an entirely private life means above all to be deprived of things essential to human
life: to be deprived of the reality that comes from being seen and heard by others, to
be deprived of an “objective” relationship with them that comes from being related to
and separated from them through the intermediary of a common world of things, to be
deprived of the possibility of achieving something more permanent than life itself (Arendt,
1958/1998, p. 58).
Theories of the public sphere have often bemoaned the decay of public life in the
modern age in similar ways. In his work The Fall of Public Man, Sennett argued
that this decay is caused by the increased secularism and industrial capitalism that
eventually led to a tyranny of intimacy. He argues that people nowadays assume
that being close to each other is a moral value itself and that people strive to unfold
individuality through closeness with other people (Sennett, 1976/1992, p. 259).
According to the author, this gradual shift is deeply problematic for society as a
whole and in particular for political involvement and action. As private interests and
individual goals become the main occupation for citizens, society generally becomes
much less political and passive. He claims that the erosion of the public sphere leads
people to develop personalities longing solely for intimacy and comfort (p. 230).
This second discourse thus reveals a continual back and forth with regard to
the general evaluation of the private sphere. In the beginning, Greek and Roman
philosophers glorified the public sphere as the domain of governance, democracy,
and deliberation (e.g., Papacharissi, 2010, p. 28). During the age of enlightenment,
in contrast, philosophers discovered the value of freedom and hence the necessity for
a private sphere. After the industrial revolution and the rising capitalism, however,
the decline of the public sphere was again bemoaned. This discourse shows us
that individual privacy claims often have to be defended against the argument that
more transparency and publicity serves a greater, societal good. The exploitation
of privacy in the age of information, for example, is often justified by the need for
security and protection on a national level.
one hand, the private sphere denotes an area of life in which an individual is free
from state interference (i.e., negative freedom in terms of liberal theorists). This
sphere is not regulated by public institutions or government supervision. Such a
differentiation is the fundamental basis and a structural characteristic of modern
societies (Rössler, 2001, p. 42). On the other hand, however, the private sphere
is associated with the household and the family—a place that was traditionally
reserved for women. The public sphere, in contrast, is where political and societal
decisions are made and where professional life takes place and is traditionally
reserved for men. The public–private distinction is hence part of “an ideological
apparatus that minimizes the significance of the domestic sphere” (Papacharissi,
2010, p. 34). In this conceptualization, the private sphere remains devalued because
it is only in the public sphere that relevant decisions are made and that independence
from requirements of nature and reproduction can be obtained (cf. Benhabib &
Nicholson, 1988; Rössler, 2001).
The problem is that the two meanings of the private sphere contradict each other.
Although liberalism claims equality and freedom for all human beings, at the same
time, these rights are in practice reserved for men. This is in particular problematic
as women in consequently may not have the same privacy experience as men.
Whereas a male perception of the private sphere accords with a relief of public
pressures and political responsibility, women (whose life is limited to the private
realm) cannot find this freedom and autonomy. In the view of feminist scholars, the
separation of a private and a public sphere plays a key role “in ideologies justifying
both the exclusion of women from full membership in the political community and
the denial of equality of opportunity in economic life” (Cohen, 1997, pp. 134–135).
As such, it has contributed towards stereotypes about gender and reinforced unequal
power constellations between men and women. As Cohen notes, “apparently neutral
discourses of privacy and [emphasis in original] of publicity have all too often been
conducted on the basis of male norms, and have served male interests” (p. 135).
Even more specific, the feminist critique rightfully argued that for men, the private
sphere can be a shielded sphere in which female suppression is not sanctioned
(DeCew, 1997, p. 81).
In consequence, some feminist scholars have demanded the total abolishment
of the public–private distinction altogether (e.g., Brown, 2004; Olson, 1991). For
the most part, however, they have demanded a reconceptualization of the privacy-
public dichotomy in order to secure equal freedom for both men and women to
live their lives according to their own will. In sum, we must acknowledge that
classical concepts of privacy (sometimes despite their overall positive intention) are
not free from gender connotations. The question remains how the general idea of
equal freedom can be preserved without risking a gender-specific codification of the
private-public dichotomy (Rössler, 2001, p. 49).
3.1 Multidisciplinary Discourses 39
Starting in the 1890s and resurfacing in the 1960s, a legal discourse about the right
to privacy began to be taken into account. All attempts to secure people’s right
to privacy in common law can be counted hereunto. However, the legal discourse
is multifaceted and also multinational, and consequently not very homogeneous.
Differences between the American and European data protection law created very
different discourses. In this section, I will not summarize how privacy is protected
in different legal systems.1 Instead, I will pinpoint definitions of privacy that have
been developed in these discourses and that do provide a useful basis for a situational
concept of privacy.
The foundation of privacy law in the USA was the seminal article The Right to
Privacy, by Samuel Warren and Louis Brandeis, which was published in 1890. In
this paper, the authors argued in favor of a new right that should serve to guarantee
the full protection of the individual in person and property (Warren & Brandeis,
1890, p. 193). Based on common law, they argued that a right to privacy could
be understood as “the right to be let alone” (p. 195). The article had a profound
influence on privacy law, but even more so on the conception of privacy itself.
Unfortunately, it seems that many scholars have mistaken Warren and Brandeis for
conceptualizing privacy as a right (Tavani, 2007, p. 5). Such a conceptualization,
however, would be problematic because it would not allow differentiation between
the right itself and the content of the right. Warren and Brandeis instead defined
privacy as “being let alone.” Tavani (2007) counts this definition among the non-
intrusion theories of privacy. He argued that definitions in this traditions are
nonetheless problematic as they partly confuse privacy with liberty. He argued for
a differentiation between these concepts because “privacy is essential for liberty
in that it makes possible the exercise of [emphasis in original] liberty” (Tavani,
2007, p. 5). Despite these limitations, it is due to Warren and Brandeis that many
scholars have regarded privacy as a condition or state. This implies that there must
be conditions of no privacy or less privacy. We may therefrom derive that such
approaches regard privacy as varying across situations.
Over the course of several decades, legal scholars and philosophers have further
advanced the theoretical concept of privacy by developing refined, but sometimes
contradictory, definitions of privacy. Fruitful academic disputes arose between anti-
reductionists and reductionists (cf. Powers, 1996, pp. 370–372), on the one hand,
and between those who favored descriptive concepts versus those who argued for
normative concepts, on the other (cf. Nissenbaum, 2010, pp. 68–69).
1 The literature is too vast to be summarized here. In Germany, for example, the Sphärentheorie
(engl. theory of spheres) is additionally used to distinguish between the social sphere, the private
sphere, and the intimate sphere (e.g., Geminn & Roßnagel, 2015). Valuable overviews can be found
in the Law, Government and Technology Series of the publisher Springer (e.g., Gutwirth, Leenes,
& de Hert, 2015, 2016; Leenes, Gutwirth, & de Hert, 2017).
40 3 Theories of Privacy
privacy if there is also the possibility of abandoning privacy. Or, in other words,
an individual enjoys privacy if he or she voluntarily chooses to have privacy in a
situation where he or she could also have less or no privacy.
The shortcomings of these concepts were addressed in subsequent years by
adding the notions of choice and control. Early non-intrusion or seclusion theories
of privacy had a strong focus on limited accessibility. However, with the widespread
use of computers at the time, this focus shifted. Privacy concerns became primarily
associated with the new flow of information. The “increasing electronic way of
life” (Miller, 1971, p. 2) and the massive data collection practices of institutions led
scholars to analyze privacy in terms of control over personal information (cf. Tavani,
2007, p. 7). Although legal and philosophical scholars continue to be influential in
this discourse, many more disciplines such as computer sciences, communication
and media sciences, psychology, and sociology have contributed to the on-going
goal of conceptualizing informational privacy.
From the 1960s onward, a specific discourse on informational privacy can thus be
identified (e.g., Miller, 1971; Nissenbaum, 2010; Petronio, 2002; Shils, 1956/1996;
Tavani & Moor, 2001; Westin, 1967). Since the rise of computer technology, and
even more since the advent of the Internet and social media, a broad discourse of
the implications of these developments has captured both the scientific world and
society and politics. This discourse is largely defined by the fear of a loss of privacy
due to the digitization of many aspects of our everyday lives. The central focus of
this discourse is the threat arising from the increased interest of governments and
companies in collecting data of their citizens and clients and relatedly, the legal
protection of informational privacy in the age of ubiquitous computing (Miller,
1971, p. 26).
There are several variations of the control theory of privacy (cf. Tavani, 2007,
pp. 7–9), all of which claim that one has privacy if one has control over information
about oneself. Perhaps the most influential definition of privacy comes from Westin
(1967), who defined privacy as “the claim of individuals, groups, or institutions to
determine for themselves when, how, and to what extent information about them
is communicated to others” (p. 5). In this definition, he emphasized the normative
notion of self-determination, that people claim they should be able to control what
information is shared with others. Fried (1990) used a similar definition in which he
noted that privacy “is not simply an absence of information about us in the minds
of others, rather it is the control over information we have about ourselves” (p. 54).
Miller (1971), summarizing several contemporary lawyers’ and social scientists’
conceptions of privacy, noted that “privacy is the individual’s ability to control
the circulation of information relating to him—a power that often is essential to
maintaining social relationships and personal freedom” (p. 25). There are several
other control-based theories of privacy that had a great influence on the subsequent
42 3 Theories of Privacy
privacy must also include a principled account of its limits. Trepte (2016a) made a
similar point by arguing that control over information in many online situations is
no longer feasible since active control cannot really be exerted once information is
shared. She thus argued that we should question whether control remains a useful
paradigm for understanding privacy, and instead, asserted that control is increasingly
replaced by communication about how information can and should be used (p. 162).
items (p. 255). However, Rössler argued that this dimension should not be mistaken
as a simple description of a spatial area.2
Informational privacy refers to the control over what other people are able to
know about oneself (p. 201). In other words, informational privacy is obtained if one
is able to control the access of others to information about oneself. Consequently,
it alludes to topics such as unknown or unwanted surveillance and data collection,
sharing or dissemination of information to third parties without the consent of the
information owner and so on (pp. 201–254).
Rössler identified a third dimension, decisional privacy, which she believed
captures what people mean when saying things like “religion is my private affair”
(p. 144). In contrast to local and informational privacy, decisional privacy protects
people—symbolically and literally—from interference with their decisions, actions,
and ways of living. In other words, this dimension should protect people from
unwanted access to their private affairs. Rössler herself acknowledged that the
predicate “decisional” might be misleading since this dimension encompasses many
more aspects than decisions (p. 145). Protection of decisional privacy is necessary in
order to enable individuals to enact their deliberately chosen actions, decisions, and
ways of living without interference from others. Claims to decisional privacy are
claims to indifference, reserve or non-perception with regard to the private aspects
of a publicly lived life (p. 153).
Some scholars have criticized this dimension as being too elusive and negligible.
For example, Hotter (2011) argued that even issues about local and decisional
privacy encompass personal information (p. 37). Furthermore, he promoted the
argument that people are already protected against physical or psychological
intrusion by simple rights to liberty (p. 37). Although decisional privacy might
indeed be protected by other rights, it could nonetheless be a fundamental aspect
of people’s understanding of privacy. According to Rössler, decisional privacy is
based on the argument that self-determination and autonomy include the right of
individuals to be the authors their own biographies and should therefore guarantee
that individuals’ life must not be commented upon, interpreted or influenced by
others in social contexts (p. 153).
Apart from this tripartite concept of privacy, Rössler emphasized that her
definition was oriented around the basis idea of individual control and as such was
a departure from the traditional distinction between public and private. She argued
that, by focusing on the “ability to control,” her definition accounted for the norma-
tive notion of the overall concept as “being able to control” should be understood as
“being allowed to control” or even as “being supposed to control” (Rössler, 2001,
p. 137). Control, in this sense, can even be understood as democratically legitimized
2 Rössler’s concept of local privacy is far more comprehensive than comparable dimensions
developed by other scholars (e.g., Burgoon, 1982). Apart from physical intrusion into someone’s
property, it describes a sphere that is subject to an individual’s enactment. For a comprehensive
description of this dimension, see again (Rössler, 2001, pp. 255–304).
3.1 Multidisciplinary Discourses 45
As we have seen, the identified discourses often strongly reflect the interests and
problems of different disciplines. Almost in all discourses, privacy is viewed as
an important value for individuals and often even for society (see also: Newell,
1995). Yet the differences are clearly identifiable. Privacy may refer to limits
on governmental authority, separation of spheres of activity, secret knowledge or
experiences, control over access, ideas of group memberships or simple conditions
of states of protection (DeCew, 1997, p. 13). However, there is also considerable
overlaps. Taken together, these discourses have provided the subsequent scholarship
on privacy with a vast landscape of theoretical frameworks, a long list of potential
problems and threats associated with privacy, and an important discussion on why
privacy should be considered as an essential value for modern societies. In short,
the following key findings should be kept in mind for the further investigation of
privacy:
1. Initial ideas about privacy and more specifically, about the private sphere, stem
from liberal philosophies that emphasized the importance of individual rights
and limits to the state’s power. For the first time, the private sphere became a
valued domain that allowed for individual self-determination and liberty. Modern
claims of privacy—and particularly of data protection and self-determination—
are consequently derived from this tradition of limiting the powers of the state to
interfere with the private activities of its citizens.
2. Privacy has often only been treated as a residual category in opposition to the
public sphere. Scholars have often bemoaned the decay of the public in favor
of lived individuality in the private. In this context, the private sphere is often
negatively connoted because it symbolizes the slow erosion of an active, political
society.
3.1 Multidisciplinary Discourses 47
3. Feminist scholars have criticized the liberal concepts of privacy and their
potential to shield domination, repression, degradation, and physical harm to
women and others without power. Although some have advocated in favor of the
total abolishment of the term privacy, most feminist scholars have nonetheless
identified an inherent value in the concept and subsequently contributed towards
more refined and gender-neutral interpretations of privacy and in particular the
private sphere.
4. In the legal sciences, many scholars have provided refined definitions of privacy
in order to generate a starting point for the subsequent discussions of how
to protect individuals’ rights. In particular, theories that define privacy as a
form of seclusion or nonintrusion and theories that define privacy as a form of
control over the access to the self can be differentiated. Subsequent academic
discourses have introduced the role of choice into previously narrow and neutral
concepts of privacy. The question of whether privacy should be regarded as a
form of control or a form of constraint or limited access is still not solved.
According to Nissenbaum (2010), common usage suggests the intuition behind
both conceptions is sound and that both capture essential aspects of privacy
that seem to matter to people (p. 71). Nonetheless, we will have to return to
this question once we conceptualize privacy from a psychological point of view
(cf. Sect. 3.2).
5. In the 1960s, scholars focused specifically on informational privacy, which led to
several systematic analyses of privacy. Threats arising from computer technology
have motivated scholars to redefine privacy and include several distinct aspects
in the broader concept.
6. Finally, philosophical scholars have tried to develop more comprehensive and
integrative frameworks of privacy that focus on the premises that are implicitly
assumed in most other discourses. These treatises of privacy mainly aim at
identifying the value of privacy by linking it to the concept of autonomy, and by
further providing a robust basis for both policymakers and empirical researchers.
Moreover, the context-dependence of privacy is highlighted and consequently
discussed with regard to prevailing societal norms.
Up until the mid-1960s, there were only a few scholars that had investigated
privacy as a social-psychological phenomenon. The state of social research on pri-
vacy at the time led Westin (1967) to start the first part of his seminal work Privacy
and Freedom with the following words: “Few values so fundamental to society as
privacy have been left so undefined in social theory or have been the subject of such
vague and confused writings by social scientists.” (p. 5). Eight years later, Margulis
(1974) still came to a similar conclusion, stating, “privacy is a concept with a long
past but a short history” (p. 101). Since that time, however, several psychologists
and communication scientists have provided systematic analyses of privacy as a
behavioral phenomenon. In the following sections, I will provide an overview of the
most important contributions within this field. In doing so, I will link back to several
aspects of the aforementioned discourses.
48 3 Theories of Privacy
Within psychology and communication science, scholars are less concerned about
rights to privacy, the public–private dichotomy or clarifying premises of traditional
privacy concepts. Instead, they focus on individuals’ experiences of privacy or
privacy violations and how these influence behavior. Privacy research from a
social scientific point of view generally aims at analyzing and understanding
individuals’ behaviors and their associated mental processes. To grasp the potential
of disciplines such as communication science or psychology in contributing to a
more comprehensive understanding of privacy, it seems fruitful to identify common
aims and interests of scholars in these fields. These aims are reflected in the typical
research questions of these disciplines. Most of them can broadly be subsumed
under four main research questions. Of course, such a categorization represents a
disproportionate oversimplification of all research interests and aims. Over time,
scholars have investigated many more fine-grained aspects of privacy. At this stage,
I simply want to pinpoint their key interests in abstract terms that can be identified
in the literature on privacy and can help to understand the potential contribution of
a socio-psychological discourse on privacy.
What Is Privacy from the Individual’s Point of View?
The first of the four key questions asks how privacy should be defined, or rather
conceptualized when the focus is the individual person. Interestingly, privacy in
this regard is often not as clearly defined or conceptualized as in other disciplines.
One origin of this vagueness could be the differentiation of objective and subjective
privacy. Studying privacy from an individual’s point of view inherently requires
scholars to acknowledge the variability in how people perceive privacy or how they
define it for themselves. Accordingly, we will find that all privacy theories developed
in psychology or communication science incorporate the notion of subjective
perceptions. It is important to note, however, that other aspects of the discourse
on privacy aspects (e.g., as raised in other disciplines) may not be addressed with
these theories in a meaningful way.
Why Do Individuals Need Privacy?
A second central interest refers to the identification of the psychological functions
of privacy for the individual. Behavioral scientists generally accept the proposition
that human beings are cognizing and goal-directed organisms that attempt to satisfy
their needs by interactions and exchanges with their physical environments (cf.
Proshansky, Ittelson, & Rivlin, 1970, p. 176). In order to understand people’s
behaviors associated with privacy, it is crucial to understand why people need
privacy.
How Do Individuals Achieve Privacy?
The third question inquires about the ways in which people regulate their individual
privacy. It is commonly believed that perceptions of a lack of privacy motivate
people to act and achieve a desired level of privacy. Questions along these lines
include: What mechanisms can individuals use to achieve privacy? Are there
3.2 A Socio-Psychological Perspective on Privacy 49
According to Margulis (1977), the literature on privacy in the social sciences can
be differentiated into three overlapping stages of concept development. The first
stage includes the works of Goffman (1963a, 1963b), Bates (1964), and Schwartz
(1968). These early works helped to justify the research on privacy and raised
important questions with regard to the usability of privacy as a concept for the
behavioral sciences. In the second stage, scholars turned to explore the concept of
privacy systematically. The works of Westin (1967), Kelvin (1973), Johnson (1974),
Altman (1975), Laufer, Proshansky, and Wolfe (1973), and Laufer and Wolfe (1977)
deserve mention here. It should be noted that scholars in the second stage developed
their ideas and theories almost simultaneously. In the work of one scholar, we find
references to others and vice versa.
Stage three represents the move towards concrete theory development. At the
time, Margulis still believed that the major analyses by Westin and Altman should
be seen as orientations rather than complete theories (p. 6). But given the various
studies that have adopted their theories since that time, we can now conclude
that they represent the most cited and most useful accounts of privacy today.
Surprisingly, theoretical advancement has almost stopped since the 1970s. It was
only in 1982 that Burgoon presented a newer dimensional account of privacy.
Accounts combining the concepts of privacy and self-disclosure emerged later
50 3 Theories of Privacy
(e.g., Dienlin, 2015; Petronio, 2002), but as they represent more comprehensive
approaches that explicitly incorporate the concept of self-disclosure, I will discuss
them in Chap. 5.
Although Goffman (1959, 1963a, 1963b) did not explicitly advance a theory of
privacy, his studies on self-presentation, behavior in public places and stigmatized
identities anticipated many of the ideas that guided later approaches to privacy. He
stated—in an analogy to actors on stage—that every performance of an individual
is influenced by the region and time in which it takes place (Goffman, 1959,
pp. 106–140). People engage in many different “dramas” that require them to
constantly change roles and inhibit conventional behavior. He was one of the first
to prominently acknowledged the situational variance of behavior. In his work
Behavior in Public Places (1963a), he further distinguished between unfocused and
focused interactions between individuals, acknowledging how different situations
affect individuals’ self-presentation and thus implicitly their need for privacy. He
thereby proposed the concept of “communication boundaries” (p. 151), which later
became a powerful metaphor often used in privacy theories (Altman, 1974; Petronio,
2002).
One of the first psychological treatises that explicitly focused on privacy came
from Bates (1964). As a starting point, he observed that by thinking about the
meaning of privacy, scholars and individuals alike were irresistibly tempted to slip
into spatial analogies. His somewhat colloquial definition thus referred to privacy as
a dwelling with “the self” as the only inhabitant (p. 430). He argued that everybody
decides who else is allowed to enter the “rooms” of this house. More precisely, he
proposed a tripartite scheme of privacy. First, privacy can be structured into many
different content areas. Different things (e.g., body image, ideas, emotions, beliefs)
arouse feelings of privacy for different people. Second, privacy can be seen as a sort
of withdrawal. Referring to informational privacy, Bates argued that privacy can
be structured “by the answer a person gives to the question, ‘Who are the persons
you wish to exclude from having this knowledge?”’ (p. 430). He suggested that
there are differences between individuals regarding the extent to which they want to
open themselves to others. Third, he argued that privacy is structured by situational
contexts. Feelings of privacy are affected by the situation in which individuals find
themselves. Based on these three aspects of privacy, Bates further noted that privacy
is inevitably subjective and that the “structure of these psychological regions” must
be regarded as subjective perceptions of individuals. A final observation was that
privacy is generally positively valued, although there is the possibility of having
too much privacy. Like Goffman, he thus acknowledged the situational nature of
privacy. Although this was only a first attempt of conceptualizing privacy, Bates
raised important points and aspects of privacy that led subsequent scholars to
develop systematic and structurally richer concepts of privacy.
3.2 A Socio-Psychological Perspective on Privacy 51
privacy that one could achieve (p. 34). The second state is intimacy and refers
to small group seclusion (p. 34). Intimacy exists typically between husband and
wife, or with family or friends. It comprises a small group of individuals who
withdraw from larger groups or society. The third state is anonymity and refers to
being free from identification and surveillance in public places or during public
acts (p. 34). Although an individual may be walking in the streets, he must not fear
being personally identified as he merges with the situational landscape. The last state
of privacy is called reserve and refers to a mental state of privacy that people can
achieve by creating a psychological barrier (p. 35). Even if all other states of privacy
are not achievable, individuals may still find privacy by not disclosing information
to others and limiting communication about themselves.
A problematic aspect of conceptualizing states of privacy is that it suggests
privacy is something one can either have or not have. However, Westin himself
acknowledged the gradual nature of privacy; he later wrote that “individuals are
constantly engaged in an attempt to find sufficient privacy to serve their general
social roles as well as their individual needs of the moment” (p. 44). It thus makes
sense to view Westin’s theory as defining different types of privacy instead of
different states of privacy. Depending on the situational circumstances, people may
experience different levels of these types of privacy. Most importantly, however,
Westin’s approach is clearly acknowledging the situationality of privacy.
Kelvin’s (1973) aim was to establish a concept of privacy that helps to explain
people’s concrete behavior. In broad terms, he defined privacy as a function of
the perceived limitation of power through the active intervention or presence of
others. He demonstrated that privacy can be linked to well-explored phenomena
such as power and norms. According to Margulis (1974), Kelvin’s theory has many
strengths as it is testable and based on prior conceptual and research literature
(p. 113).
He observed that privacy refers to situations of conflict between the individual
and society (Kelvin, 1973, p. 250). In all these situations, one can assume that
the individual is (1) independent and has the right to be independent, but this
independence can be threatened making the individual (2) vulnerable, and this
vulnerability is given because other people have (3) power over him (p. 250). From
these observations, he derived that “it is a necessary condition of privacy (though not
sufficient to define ‘privacy’) that the individual is free from the power or influence
of other people: he enjoys privacy (. . . ) to the extent to which the probabilities of
his behavior are not (emphasis in original) causally affected by others” (p. 251).
It is important to note that Kelvin viewed privacy as a matter of degree and not
as a dichotomy between no-privacy and privacy. Power, here, is understood as an
attribute of a relationship (between two or more persons) that is causal in nature and
refers to the idea that the power of person A modifies the probabilities of a person
3.2 A Socio-Psychological Perspective on Privacy 53
B’s behavior (p. 251). According to Kelvin, behavior could also refer to feelings and
beliefs, beyond just concrete actions.
Kelvin elaborated on this power-based view of privacy in four ways. First, he
noted that privacy can be extended to units and groups of all sizes. Like Westin,
who proposed the state of small-group intimacy, he also emphasized that there are
important realms of privacy associated with dyadic relationships such as friendships
or marriages (p. 251). Second, power can be differentiated into active intervention
of a person and the mere presence of this person. Whereas the first can be regarded
as positive, the second represents a constraint (p. 252). Third, Kelvin argued that
absolute absence of external influence is not feasible as even in solitude people’s
thoughts, feelings, and actions have antecedents that may be caused by the influence
of others. Based on this rationale, he proposed giving privacy a location in time
in order to clarify that a condition of privacy exists whenever the behavior of an
individual “is not immediately affected or determined by the influence of ‘others”’
(p. 252). This notion is important as it will be a fundamental of the theory of
situational privacy and self-disclosure that I will develop later. Finally, and in line
with Bates, he regarded privacy as a subjective state that is only present in the
experience of the individual. Again, his account of privacy is clearly situational
as the amount of power that others exert over an individual varies across situations.
Like Westin, Kelvin embraced the notion of choice. In contrast to isolation
(which an individual seeks to avoid), privacy is a pleasurable experience because
it is deliberately chosen. Privacy is hence the perceived—and positively valued—
limitation of others’s power. Privacy in this sense is a kind of counterpower that
individuals can exercise to nullify the perceived power of others over them. The
final definition hence reads as follows:
Privacy may be regarded as a condition of ’separateness’ deliberately chosen and protected
by the individual (or group), as separateness which the individual can, in principle, abandon
or break down if he chooses (Kelvin, 1973, p. 253).
Johnson (1974) elaborated on the general idea that privacy involves personal
control. He defined privacy as “those behaviors which enhance and maintain
one’s control over outcomes indirectly by controlling interactions with others”
(Johnson, 1974, p. 90). He thereby contributed an important notion towards a
broader understanding of privacy: privacy is not an end in itself, as it does not satisfy
a fundamental need (p. 91). Because of this, Johnson regarded privacy as a sort of
secondary control (or, more precisely, a secondary need).
In order to corroborate this concept of privacy, he drew upon the extensive
psychological literature on personal control, which posits that people generally
“seek to make their outcomes consistent with their needs by translating their
desires through actions into appropriate outcomes” (p. 85). This process (from need
awareness to need satisfaction) involves several stages of control. First, outcome
choice control refers to the selection of a one of more outcomes. Second, behavior
54 3 Theories of Privacy
One of the most influential theories of privacy was advanced by Altman (1974,
1975). He aimed to establish the concept of privacy systematically in the field
of environment and behavior by analyzing the distinct properties and multiple
levels of behaviors associated with privacy, and by regarding the environment as
a determinant of as well as an extension of behavior (Margulis, 1977, p. 12).
Central to his analysis is the definition of privacy “as the selective control
of access to the self or to one’s group” (Altman, 1975, p. 18). This definition
again contains several notions worth examining: First of all, Altman’s definition
is consistent with the limited-access perspective (Margulis, 2011, p. 14). Privacy
is fundamentally about access to the self. It is also consistent with control-based
theories of privacy in that it concretely defines privacy as control of access to
the self. However, Altman emphasized that this control is selective since privacy
demands change over time and in different circumstances (Altman, 1975, p. 18).
His approach was thus also inherently situational.
Altman explicated the nature of privacy by postulating six properties (pp. 10–
12). First, privacy can be regarded as an interpersonal boundary-control process.
The term “boundary” is important here as it has been adapted and extended in
the Communication Privacy Management Theory by Petronio (2002). According
to Altman, “privacy regulation [. . . ] is somewhat like the shifting permeability
of a cell membrane” (p. 10). Second, privacy includes the regulation of inputs
and outputs. Third, Altman differentiated between desired and achieved privacy.
He thereby acknowledged the subjectivity of privacy perception as the individual
3.2 A Socio-Psychological Perspective on Privacy 55
constantly compares his desired level of privacy (the optimal level of interaction
with others) to the actual degree of contact that results from interaction with others
(p. 10). If desired and achieved privacy are equal, an optimum level of privacy
exists. Too much or too little achieved privacy in comparison to the desired level of
privacy leads to a perceived imbalance. In consequence, fourthly, privacy involves a
continuous optimizing process. An imbalance between desired and achieved privacy
is unsatisfactory and hence drives the individual towards an optimal level of privacy
at any moment in time. Fifth, privacy involves different types of social units (individ-
uals, families, couples, etc.). Finally, Altman regarded privacy as a dialectic process.
In his view, privacy should be understood as an interplay of opposing forces. People
sometimes want to be open and interact with others while at other times, they want
to be alone and out of contact. Like other control-based theories, this implies that
people enjoy privacy even when they voluntarily disclose all information about
themselves. With this last property, Altman also departed from the traditional
understanding of privacy as a form of withdrawal. His theory is consequently
only partly consistent with the conventional usage of the word privacy. Although
Altman’s theory is highly useful, I will come back to this critical aspect later on.
Based on the existing literature at the time, Burgoon (1982) asked whether the
overall concept of privacy must be divided into different kinds of subdimensions.
Like other scholars before, she emphasized that privacy is subjective in nature. She
further argued that the concept of privacy needs to include the concepts of choice
and control because privacy is generally considered a desirable state (p. 209). Her
main contribution, however, was a multidimensional account of privacy based on a
comprehensive literature review. She proposed four interdependent dimensions that
she believed to have concrete implications for individual’s communication:
Physical privacy refers to the “degree to which one is physically inaccessible to
others” (Burgoon, 1982, p. 211). This dimension is closely related to concepts such
as crowding, personal space, and territory. Depending on an individual’s desired
level of physical privacy, physical privacy can be violated because someone literally
comes too close or even touches the individual’s body. According to Burgoon,
however, physical privacy can also relate to a personal space or “buffer zone,” as
well as to one’s claim to a certain territory (e.g., house). In other words, physical
privacy alludes to the ability to control the physical boundaries surrounding oneself
(p. 214).
Social privacy refers to one’s degree of interaction with others. Perceptions of
social privacy refer both to feelings of intimacy (e.g., with a significant other) and
to feelings of inaccessibility from outsiders (p. 217). For Burgoon, this dimension
captures well what Altman termed the dialectic nature of privacy: social privacy in
this sense fosters closeness among some individuals while simultaneously creating
distance from others. In other words, social privacy alludes to “the ability to
withdraw from social intercourse” (p. 216).
56 3 Theories of Privacy
By now, we should have a basic understanding of what privacy is. We can thus
turn to an even more fundamental question: Why do people need privacy? Finding
an answer to this question is essential for any discipline that is concerned with
privacy. Legal scholars need to inquire about the function of privacy in order to
justify what a right to privacy actually protects. Philosophers inquire about the
value or moral legitimacy of privacy because it could otherwise be a negligible
concept. Naturally, this question also concerns social scientists because if privacy
has nameable functions, it should be these ends that foster and explain human
behavior related to regulating, achieving, or abandoning privacy.
In order to understand the functions of privacy from a psychological point of
view, it is useful to have a general idea about what constitutes a need. A need can
generally be defined as a motivational force that is activated in an unpleasant state of
deprivation (Doyal & Gough, 1991). Because such a state is unsatisfactory, it drives
the human organism to reduce or eliminate the respective deficiency. Its motivational
aspect is the satisfaction an individual believes he or she is able to achieve through
by eliminating the specific unpleasant condition (Trepte & Masur, 2017a). Being
lonely, for example, is such an undesirable condition. Someone who is lonely longs
for the company because he or she knows that interacting and being in company of
other people will alleviate the unpleasant feeling of loneliness. It is the anticipated
shedding of the feeling of loneliness that drives the person to go about and seek the
company of other people.
3.2 A Socio-Psychological Perspective on Privacy 57
With this definition in mind, we can ask whether there is a need for privacy.
A first assumption that is shared by all scholars is that privacy is not a self-
sufficient state or end in itself. Instead, a need for privacy has to be understood
as a secondary need, as it represents the desire for a temporary (spatial or mental)
state in which the satisfaction of more fundamental needs becomes possible (Trepte
& Masur, 2017a). Westin (1967), for example, said that privacy is “basically an
instrument for achieving individual goals of self-realization” (p. 43). As denoted,
Johnson (1974) even went so far as to say that privacy is nothing else but secondary
control, as it facilitates the attainment of other outcomes or ends. More precisely,
he regarded privacy as “condition-setting control” (p. 91), which means people
engage in privacy behavior in order to indirectly set the conditions necessary to
satisfy other primary outcomes (or more fundamental needs). Furthermore, he
argued that even successfully achieved privacy itself is not satisfactory if the
originally desired (primary) outcomes are not attained. Based on this rationale, he
deduced that decisions about privacy behaviors are in particular stressful because the
individual may not know beforehand which state of privacy is necessary to satisfy
specific needs. In sum, to investigate the functions of privacy means to ask about
the fundamental needs that require privacy in order to be satisfied. Based on the
literature, we can differentiate a number of functions, which will be described in the
following paragraphs.
do things that they deem not appropriate for public spaces, and accordingly develop
individuality and consciousness of individual choice because they are not under the
scrutiny of other people. Similarly, Kelvin (1973) argued that privacy “consists of a
removal of limitation of constraints—in common parlance, it allows the individual
‘to be truly himself”’ (p. 259). If an individual perceives a (positive) limitation of the
power of others over himself, he can feel truly by himself as his behavior (note that
Kelvin uses the term ‘behavior’ for actions, beliefs, and feelings) is not influenced
by the presence or interference of others. In sum, privacy provides the necessary
conditions for individuals to act, think, and feel autonomously.
With regard to the question of why people need privacy, we can hence argue that
people from time to time desire (spatial or mental) conditions in which they can
exercise self-determination because their daily lives puts them under the constant
scrutiny and influence of other people, social norms, and external pressures.
Another functional aspect of privacy is its fundamental role for human relations.
Many scholars have argued that privacy is a precondition for the development of
strong relationships based on friendship, love, and trust (e.g., Fried, 1968, p. 477).
The general idea is that conditions or states of privacy allow for closeness and
intimacy between two or more individuals. People generally maintain a number of
different relationships that vary based on the level of closeness, appreciation, love,
or trust. Whereas some things are appropriate in one relationship, the same things
may not be appropriate in another (Schoeman, 1984, p. 408). Again, we can identify
related ideas in the systematic analyses of Westin and Altman.
Westin’s (1967) fourth function of privacy, called “limited and protected commu-
nication” (pp. 41–43), refers to the idea that in small-group intimacy, individuals are
able to share their feelings, thoughts, and other personal things with trusted others
(e.g., partner, friends, family) without fearing being overheard by outsiders. This
raises an interesting point: although Westin seemed to view needs for privacy and
needs for self-disclosure as opposing forces (Westin, 1967, p. 43), he also posited
that conditions of privacy allow for self-disclosure. In other words, limiting one’s
self-disclosure could be means to attaining a certain level of privacy (e.g., a state of
reserve), but a certain level of privacy could also foster self-disclosure (e.g., in a state
of small-group intimacy). Nissenbaum (2010) provided an informative summary
of this general idea: “Privacy makes it possible for people to share information
discriminately, which in turn enables them to determine not only how close they are
to others, but the nature of their relationships” (p. 85). However, I will investigate
the relationship of self-disclosure and privacy further in Chap. 5.
Altman (1975) explained this function of privacy differently. In contrast to other
scholars, he argued that privacy mainly serves to regulate the interaction with the
social environment (p. 46). Conceptualizing privacy as a dialectic process, he argued
that privacy allows for interpersonal-boundary regulation. As he defined privacy as
the selective control of access to the self, he seemed to argue that privacy allows
individuals to achieve a desired amount or degree of interaction with other people.
In this case, however, Altman remained somewhat imprecise, because in his terms,
interpersonal-boundary regulation is both the function and the definition of privacy.
However, his contribution remains important, as it shows that privacy is clearly
linked to the management of social interactions. The nature of this connection,
however, becomes comprehensible once we connect the concepts of privacy and
self-disclosure (Chap. 5).
60 3 Theories of Privacy
Altman (1975) differentiated (1) verbal, (2) non-verbal, (3) environmental privacy
mechanisms, and (4) culturally defined norms and practices (pp. 32–40). Verbal
privacy mechanisms include the use of verbal content to signal the desired level of
social interaction (e.g., “I’d like to be alone”) and the use of structural aspects of
verbal behavior such as vocabulary selection, pronunciation, voice dynamics, and
so on. For example, individuals may be able to achieve a desired level of protected
communication by lowering their voices so that others cannot hear them. Nonverbal
privacy mechanisms refer to the use of body language. Privacy can be subtly
managed by arm and leg positions, facial expressions, body postures, broad gestures,
or head movements. Among others, Altman proposes to use the classification by
Ekman and Friesen (1969), who differentiate the use of (1) emblems (nonverbal
gestures as substitutes for words or statements, e.g, nodding) and (2) illustrators
(complements of verbal statements, e.g., pointing), (3) displaying affect (e.g.,
conveying emotions through facial expressions), (4) using regulators to manage
and pace interactions, and (5) using adapters (e.g., covering the eyes, mouth, or
face). Privacy, for example, may be obtained through aversion or defensive facial
expressions. Environmental privacy mechanisms include the use of clothing (e.g.,
using a veil to cover the face) and personal space (e.g., regulating the distance from
3.2 A Socio-Psychological Perspective on Privacy 61
other people by sitting next or further from them), as well as the use of territories
(e.g., building oneself a house with fences or walls) or objects (e.g., closing doors)
(Altman, 1975, pp. 36–40).
Burgoon (1982) further refined this classification of privacy regulation behaviors,
proposing six categories (pp. 232–243). In line with Altman, she recognized the
(1) use of the environment and artifacts, (2) regulation of personal space and
physical contact (also labeled haptic and spatial privacy regulation), (3) use of time
(chronemics), (4) kinesic and vocalic privacy management, (5) privacy regulation
through physical appearance, and finally (6) verbal privacy regulation. Whereas
most of the categories are straightforward, the use of time and physical appearance
deserve closer attention. Burgoon argued that people could achieve privacy by
“permitting territories to overlap spatially, but to be segregated by time use” (p.
238). This occurs, for example, when someone tries to escape crowded trains or
buses by riding them during non-peak times. Physical appearance in the form of
clothing may also help to establish privacy as clothes can signal approachability
or define a certain role (e.g., wearing a uniform signals a professional distance).
Likewise, wearing sunglasses may provide a certain level of anonymity as people
cannot see where one is looking.
Differentiating the modes of privacy regulation behaviors helps to identify
concrete actions people use to achieve a certain state of privacy. However, this type
of classification is merely descriptive and does not tell anything about the goals
behind each actions.
A complete review of all studies that have built upon the theories presented above is
beyond the scope of this work (valuable attempts to grasp the influence of the most
prominent approaches can be found in the following reviews: Margulis, 1977, 2003;
Newell, 1995); however, it seems fruitful to pinpoint some of the key empirical
validations of the theories, and to summarize further refinements and potential
alternative suppositions. I will conclude by synthesizing the presented theories into
six broad statements that serve as a first foundation for the theory of situational
privacy and self-disclosure.
Reviewing the research conducted in the last few decades highlights that Westin’s
typology of privacy states and functions and Altman’s dialectical approach to
privacy have been the most influential. Many scholars have tried to empirically
identify the privacy states and functions proposed by Westin (1967) using factor
analytical frameworks (e.g., Dawson & Hammitt, 1996; Hammitt, 1982, 2000;
Marshall, 1974; Pedersen, 1979, 1997, 1999). These items have been administered
to individuals in surveys and the responses factor analyzed. In general, these
studies have found evidence for the suggested factor structure. Marshall (1974), for
example, found six privacy states: intimacy, solitude, anonymity, reserve (all posited
3.3 On the Status of Socio-Psychological Privacy Theories 63
by Westin), seclusion (being or living away from other people), and not neighboring
(attitudes towards inclusion of neighbors in daily life). It should be noted that
these results reflect the author’s decision to include items regarding specific privacy
concerns relating to living in a family home and dealing with neighbors. Hammitt
and colleagues have further found evidence for privacy functions such as self-
evaluation and limited communication for individuals or small-groups living in
wilderness areas (Dawson & Hammitt, 1996). Pedersen not only investigated the
stability of Westin’s states of privacy, but also tested the relationship between states
and functions proposed by Westin. In his original factor analysis (Pedersen, 1997,
1999), he found evidence for three of Westin’s privacy states (solitude, anonymity,
and reserve) and two additional states (intimacy with friends and intimacy with
family) which further specify the fourth state proposed by Westin. He also found a
sixth state (isolation) that closely resembles Marshall’s identified state of seclusion.
Pedersen (1999) also extended Westin’s theory by proposing a model for types of
privacy by privacy functions. His results suggested, for example, that intimacy with
friends best fosters autonomy, and intimacy with the family provides conditions
for concealment. He also identified an additional function described as “creativity”
(Pedersen, 1997, p. 153). His findings suggest that isolation and solitude provide the
best conditions for being creative (Pedersen, 1999, p. 401).
However, as early as 1970, Proshansky et al. (1970) criticized the typology
proposed by Westin because his proposed states “are not always conceptually clear
or consistent with each other” (p. 178). They asserted, for example, that solitude
refers to an individual’s relationship to the physical environment, whereas intimacy
refers to his relationship with other people. Accordingly, the relationship between
the proposed states is not considered. They further proposed distinguishing between
individual and group states of privacy. A final criticism of Westin’s theory was that
identifying the states of privacy implies that privacy is a matter of being in one of
these states or not. The idea of privacy as a matter of degree is largely ignored in the
research based on Westin’s typology.
Pastalan and Carson (1970) provided an additional, largely ignored extension of
Westin’s theory. In their analysis, they systematically related situational, organismic
factors and other antecedent factors with specific privacy regulation mechanisms
and the privacy states proposed by Westin in a matrix. Although they acknowledged
that this approach was more suggestive than comprehensive, the developed matrix
(see Table 3.1) may help to understand the general process when people seek
any of the proposed states of privacy. People’s behaviors and needs can easily be
classified within the framework and evaluated according to the four specified social
contingencies. Consider the following example:
A young adolescent recently moved into a new town with his parents. On the first day at
school, he gets introduced to some new classmates. Although they are nice and friendly,
they do not inquire much about the young adolescents. Despite wanting to make friends,
the young adolescent consequently hesitates to reveal too much about himself. This way, he
does not risk making a bad impression.
64
Table 3.1 Privacy states and situational contingencies by Pastalan and Carson (1970)
Organismic factors Behavioral states
Types of privacy Antecedent factors (privacy needs) (privacy regulation behaviors) Environmental factors
Solitude Pressure of multiple role playing; Relief from visual Physical withdrawal from Degree of crowdedness and
role incompatibility; observations; self-evaluation; secondary associates; primary confinement; design and
interpersonal incompatibility; unmasking oneself; and reference groups; arrangement of space;
defeat performance of bodily defensive responses and environmental props to
functions verbal reports control informational flow;
location; single person
Intimacy Role relations and interpersonal Need for close, relaxed, frank Physical seclusion from Degree of crowdedness and
compatibility or incompatibility relationships; egalitarian secondary associates and confinement; design and
sharing of confidences (limited public; anticipatory arrangement of space;
and protected communication) preventive responses; full environmental props to
range of occupancy and control informational flow;
defense responses location; small group
Anonymity Role responsibilities demanding Need to escape personal Psychological and physical Control of informational flow
full adherences to expected identification and responsibility blending with the public; through merging into the
behavior; anonymous relation of full rules of behavior and self-markers and verbal situational landscape; use of
role; anonymous sharing of reports open space, mass numbers of
confidences people and objects;
anonymous interviews,
questionnaires. . .
Reserve Reciprocal reserve and Need to limit communcation Psychological barriers against Control of informational flow
indifference; mental distance to about the self unwanted intrusion; defense through self-restraint and
protect the personality through self-markers and willing discretion of others
verbal reports
3 Theories of Privacy
3.3 On the Status of Socio-Psychological Privacy Theories 65
We can use Pastalan and Carson’s matrix to identify the relevant aspects of
this specific communicative act. The reason for the young adolescent’s hesitation
to disclose personal information is most likely the indifference and reserve of the
other people (antecedent factors). Since he does not learn anything about them and
perceives a social distance between himself and his classmates, the need for privacy
in the form of reserve is aroused (organismic factors). He consequently engages in
privacy regulation behavior by not disclosing personal information (maybe even
lying when asked about personal things), thus creating a psychological barrier
(behavioral states). The adolescent controls the flow of information through restraint
(environmental factors) and thereby reduces his vulnerability.
Pastalan and Carson explicitly incorporated the environment as a central factor
into the process. They further identified environment-related antecedents that raise
needs for different types of privacy which, in turn, lead to certain privacy regulation
behaviors. The type of privacy regulation behavior again depends on the environ-
ment. I want to emphasize the value of Pastalan and Carson’s framework here,
because it allows the systematization of such processes by highlighting individual’s
perception of situations, subsequent privacy needs, and privacy regulation behaviors.
The theory of situational privacy and self-disclosure (described in detail in Chap. 7)
follows a similar approach in order to identify relevant situational factors for privacy
perceptions and corresponding self-disclosure.
Altman’s (1975) theory has greatly influenced subsequent research. Since its
publication, two aspects have been featured in almost all psychological accounts
of privacy. First, the idea that privacy is about interpersonal interaction and second,
that privacy is about the interplay between people and the physical environment
(Margulis, 2003, cf.). According to Margulis (1977), Altman’s analysis has distinct
strengths. It integrates earlier concepts into a comprehensive account of privacy
and particular privacy perception and control processes. It integrates social psycho-
logical concepts as well as environmental psychological concepts such as personal
space, territory and crowding, and it proposes their interplay with social interaction
and needs for privacy (Margulis, 2003, p. 422). It also links concepts of the self with
interpersonal interaction (Margulis, 1977, p. 14).
Altman’s influence is not only visible in empirical work (e.g., Harris, Brown,
& Ingebritsen, 1995; Harris, Brown, & Werner, 1996), but also in subsequent
theories that combined several frameworks into a (more) comprehensive model
(e.g., Dienlin, 2015; Kupritz, 2000a, 2000b; Petronio, 2002). Kupritz (2000a),
for example, extended Altman’s privacy regulation mechanisms, Dienlin (2015)
specifically drew upon Altman’s idea of desired and achieved privacy—which play
a central role in his Privacy Process Model, and Petronio (2002) explicitly used the
idea of boundary management as a key concept for her Communication Privacy
Management Theory (CPM-Theory). The latter two provide a useful basis for
66 3 Theories of Privacy
3 I deliberately chose not to focus on cultural aspects of privacy since the discussed theories all
Humans are social beings. Although an individual might want to be alone from
time to time and seek privacy in the form or solitude, he or she has a stronger
desire to form meaningful relationships and have significant others in his life. The
need to belong (Baumeister & Leary, 1995) or the need for relatedness (Ryan &
Deci, 2000) has been said to be a fundamental driving force of human behavior.
As a simple starting point, we could advance the following hypothesis: in order to
form a meaningful relationship, an individual has to overcome the initial barrier
of interpersonal mistrust by disclosing personal information to another person.
Although this might render him or her vulnerable to the recipient of the information,
it may also create a form of obligation in the recipient to disclose as well and
subsequently make both individuals known to each other. This might provide the
basis for further interactions and in the long-run, the preconditions for forming and
maintaining a meaningful relationship. But what is self-disclosure exactly and why
is it important for individuals?
Before we define self-disclosure, it is fruitful to state what self-disclosure is
not. People express themselves in many different ways. Although their manifold
utterances may include truthful information about themselves, they oftentimes seek
to present themselves in a favorable manner. While communicating with other
people, they seek to attain certain goals that sometimes require them to present
themselves differently from their actual selves. Or, in other words, “the process of
self-presentation becomes an ever-evolving cycle through which individual identity
is presented, compared, adjusted, or defended against a constellation of social,
cultural, economic, or political realities” (Papacharissi, 2011a, p. 304). Scholars
have proclaimed that people virtually always engage in self-presentation (see the
seminal work by Goffman, 1959). Self-Disclosure, in contrast, refers to “the process
of making the self known to other persons” (Jourard & Lasakow, 1958, p. 91). The
emphasis is on revealing the true self. It thus follows that self-presentation may
include self-disclosure, but does not necessarily have to. In this work, I am only
concerned with truthful disclosures of the self.
sensitive information such as tastes and preferences. Greene et al. (2006) noted
that research on self-disclosure often focuses on the revealing of highly sensitive
information (p. 411). Disclosure of the self, in this sense, refers to the revealing
or granting of access to private information or secrets (e.g., Rosenfeld, 2000).
However, most scholars have acknowledged that even disclosure of less serious
information serves similar goals (cf. Sect. 4.2). Altman and Taylor (1973) suggested
categorizing the content of self-disclosures into three layers: peripheral (e.g.,
biographic data such as name, age, gender, or address), intermediate (e.g., attitudes,
values, or opinions), and core layers (e.g., personal beliefs, needs, or fears). Like
the metaphor of an onion, information becomes increasingly sensitive as one
approaches the core layers of the self. In line with this, Masur and Scharkow (2016)
found that people perceive different types of information as differently private. In
a study with 316 university students, they found that personal feelings, fears, and
concerns were generally perceived as very private, whereas tastes and information
about one’s job or hobbies was rated mostly as not very private (p. 7).
For now, let us assume that self-disclosure is not limited to highly sensitive
information. We can then ask on what dimensions self-disclosure varies. Although
it can be assessed on dimensions such as frequency, duration, honesty, accuracy,
intimacy, intention, or valence (Chelune, 1975; Greene et al., 2006; Wheeless,
1976), the amount or level of self-disclosure has mostly been measured on three
dimensions (Omarzu, 2000, p. 175): The first dimension refers to the breadth of self-
disclosure. This dimension asks how many different types of information or topics
an individual discloses or has disclosed. The more topics an individual is willing
to share with another person, the higher the level of self-disclosure. The second
dimension refers to the duration of self-disclosure or “the time spent describing each
item of information” (Cozby, 1973, p. 75). This dimension has often been measured
by word count of self-disclosure acts. The last dimension refers to the depth of self-
disclosure and thus to the idea put forth by Altman and Taylor (1973). It assesses
the level of intimacy of the information that has been disclosed. Obviously, the
three dimensions are not completely independent. As the breadth of self-disclosure
increases, in most cases the duration and depth will increase as well.
It has been argued that what constitutes an intimate or private disclosure is
highly subjective (Masur & Scharkow, 2016). It is hence pivotal to include the
individual’s intimacy or privacy rating of specific information in the measurement
of self-disclosure. This seems particularly important as many previous studies have
argued that the more information someone discloses, the more privacy he or she
loses. However, the sharing of a non-sensitive information may not be perceived
as a loss of privacy by the individual. In order to anticipate some of the ideas
developed in Chap. 5, I think it is important to understand that the relationship
between self-disclosure and privacy is not straightforward one of opposing forces,
as is often proclaimed in the literature. As already briefly mentioned in Sect. 3.2.3,
self-disclosure can be both a means to attain a certain level of privacy and a behavior
in which one engages in while in a condition of privacy. This becomes clearer when
investigating the functions of self-disclosure, which will be subject of Sect. 4.2.
72 4 Theories of Self-Disclosure
first stage, they start to express personal attitudes in the second, begin to reveal
private things in the third, and finally disclose their deepest feelings, thoughts or
beliefs in the last stage.
Several studies have supported this developmental aspect of self-disclosure and
relationship intimacy. Laurenceau, Barrett, and Pietromonaco (1998), for example,
studied how reciprocal self-disclosure between partners affected their experiences
of intimacy. Sixty-nine participants completed short standardized questionnaires
after every partner interaction that lasted longer than 10 min for 7 days. The within-
subject correlations showed that intimacy strongly correlated with the individual’s
self-disclosure (r = 0.66) and with the partner’s self-disclosure (r = 0.57).
Multilevel regression models showed that the self-disclosure had a direct effect on
the perceived intimacy (β = 0.47) and was further mediated by perceived partner
responsiveness.
Although this process seems intuitive at first, the reality might be more complex.
For example, another view is provided by the so-called clicking model (Berg
& Clark, 1986). This model assumes that an individual makes an immediate
assessment of another person and compares him or her with his or her prototype
of a friend or intimate partner. This assessment further influences the subsequent
behavior, and increase the level of self-disclosure. Derlega et al. (1993) proposed
that self-disclosure and relationships must be regarded as mutually transformative
(p. 9). Assuming that self-disclosure and relationships are mutually transformative,
however, has a number of underlying assumptions. First, self-disclosure and the
ways in which individuals perceive relationships are dynamic, vary over time, and
are deeply subjective. Second, although the amount of self-disclosure influences
(and also defines) a relationship, the relationship, in turn, determines the amount
of self-disclosure (i.e., the appropriateness of certain disclosures). According to
Derlega et al. (1993), these transformations occur because communicative messages
are “always received into a matrix of expectations, perceptions, and understandings
of relational rules that give meaning to messages and that also change in light of
these” (p. 10). The receiver of a self-disclosing message does not only react to the
information itself, but he or she also evaluates the information with regard to the
relationship with the sender and its implication for future interactions (p. 10).
Although researchers have highlighted the beneficial function of self-disclosure
in relationships, negative consequences are possible too (e.g., when certain self-
disclosures are considered inappropriate in a relationship or the disclosed informa-
tion is used against the sender at a later point in time). In light of this, proposing
a linear relation between closeness and self-disclosure in a relationship is rather
imprecise. Derlega et al. (1993) noted that other patterns are imaginable (p. 25).
Empirical work with couples has shown that the level of disclosure indeed increases
in the beginning of a relationship, but oftentimes declines sharply after an initial
period of openness (e.g., Huston & Ashmore, 1986). For the purpose of this work,
76 4 Theories of Self-Disclosure
1 There is a vast amount of theoretical work on relationship formation and self-disclosure. For
more detailed theoretical conceptualizations of relationship stages, see for example: Knapp and
Vangelisti (1991) and Levinger (1983). For theoretical work on self-disclosure in relationships, see
Derlega and Grzelak (1979), Parks and Floyd (1996), or Harvey and Omarzu (1997).
4.2 Functions of Self-Disclosure 77
between self-disclosure and social support has recently been studied in non-
mediated and mediated communication contexts (Trepte, Masur, & Scharkow,
2017). In a longitudinal survey study, the authors found that willingness to self-
disclose in instant-messaging communications leads to more social support 6 month
later.
Apart from this general positive effect, Derlega (1987) noted that self-disclosure
is not always successful in reducing stress and anxiety. They argued that “it is
unrealistic to expect that social support provided by talking with a friend inevitably
leads to coping successfully with stress” (p. 28). In summarizing exemplary studies
that found negative effects of self-disclosure, they noted that the effect of received
social support after self-disclosure depends on the nature of the experienced crisis,
the specific needs of both participants, the timing of social support, and the content
of the verbal exchange.
and inconsistency in their own thinking. The overall purpose is consequently the
avoidance of self-criticism and potential criticism from others (p. 157).
to gain self-esteem and to strengthen the self-value more than by just disclosing
to a friend. Although the functions of broadcasting self-disclosure have seldom
been investigated, some well-designed studies suggest that people mostly disclose
in one-to-many conversations to satisfy needs for social validation (Bazarova &
Choi, 2014). Although an explicit investigation of the functions of self-disclosure
has rarely been undertaken, research on SNS use generally shows that people
general profit from the social capital they can asses through their friends (e.g.,
Ellison, Lampe, Steinfield, & Vitak, 2011; Ellison, Steinfield, & Lampe, 2007). As
disclosing the self is a pivotal part of using SNS, these findings lend further credence
to these claims.
noted that the ideology of intimacy led to the exclusion of important phenomena
such as information control or the individual and social functions of weak or non-
intimate relationships (p. 89). In particular, focusing on information control—which
can be regarded as the flipside of self-disclosure—may provide further insights into
the nature of opening and closing the self.
Since the 1980s, several scholars have investigated why people refrain from dis-
closing in certain situations. Initially, research investigated negative consequences
of self-disclosure as a primary reason for non-disclosure. In the following, I will
hence first discuss potential negative outcomes of disclosure of the self. I will
then move on to describe some approaches toward studying the avoidance of self-
disclosure (i.e., information control).
disclosure. Derlega et al. (1993), for example, argued that self-disclosure under
conditions of heightened self-awareness, disclosure of negative feelings or generally
negative information can lead to worse feelings as the individual pays even more
attention to his or her weaknesses, faults or problems (p. 104).
As a reaction to Park’s criticism, some scholars have devoted themselves to the study
of information control. As Crowley (2017) recently noted, concepts of information
control vary. It thus rather represents a sort of umbrella term for a variety of different
topics and primarily for different types of behavioral manifestations revolving
around the notion the people consciously hide or withhold information in social
relationships (p. 203). Research areas focusing on information control include
“taboo topics” (e.g., Baxter & Wilmot, 1985; Dunleavy & Dougherty, 2013; Roloff
& Ifert, 1998), “topic avoidance” (Afifi & Afifi, 2009; Dailey & Palomares, 2004),
and “secrecy” (Bok, 1983; Caughlin & Vangelisti, 2009).
What these studies and investigation add to the literature on self-disclosure is that
people might also have reasons to not disclose to other persons that are not related
to the risks or potential negative consequences (for a discussion of the literature,
see Crowley, 2017). Although protecting the self might be a primary driving factor
of information control (which I will discuss more thoroughly in the next chapter),
people might also avoid certain topics in order to avoid stress or disputes, or they
might choose to remain closed in order to increase their attractiveness. Information
control is thus often bound to certain topics or to the type of information that is
withheld (Crowley, 2017, p. 2011)
disclosure acts. Some of these models have been developed in the context of health
communication and focus on explaining under what conditions individuals disclose
personal secrets or illnesses. Although developed for this particular context, they
can nonetheless be applied to broader situations.
In the following, I will focus on the model advanced by Omarzu (2000) as
it is particularly useful to understanding the situational decision-making process
before the actual disclosure of private information. It adopts a situational perspective
and isolates variables that are constantly present in different situations and are
thus amendable to different situational circumstances. The models by Afifi and
Steuber (2009) and Greene (2009) represent similar approaches, but do not extend
or refine the general process described by Omarzu.2 Another model was proposed
by Chaudoir and Fisher (2010), which aims at outlining long-term processes
and consequences of self-disclosure. This model incorporates mediating variables
that help to explain how the disclosure event influences long-term individual,
interpersonal, and societal outcomes. Both models fit well with my own way of
thinking, as they adapt a situational perspective on self-disclosure that will be the
core of the proposed theory in Chap. 7.
Lastly, I will conclude this chapter by synthesizing insights from the presented
theories and models into six broad statements that again serve as a foundation for
the following chapters.
2 Both models represent valuable approaches on their own. For example, both Afifi and Steuber
(2009) and Greene (2009) incorporated the concept of communication or disclosure efficacy. That
being said, they did not extend Omarzu’s model in substantial ways. Consequently, I will refrain
from discussing them in detail here. The interested reader may nonetheless consult the cited papers
as they may further enhance the comprehension of disclosure decision processes.
4.4 On the Status of Self-Disclosure Theories 83
No disclosure
occurs
No No
Disclosure
duraon
Is there an What is the
Situaonal
Possible goals appropriate subjecve
cues ulity?
target ?
Approval Disclosure
Is a parcular breadth
Relief
goal salient? Yes Yes
Inmacy
Identy Is disclosure an What is the
Individual Control Disclosure
appropriate subjecve
differences depth
strategy? risk?
(p. 17). To understand the implications of the model, I will look at each stage more
closely.
Stage 1: Entering the Situation A basic assumption of the DDM is that people
enter situations in which a particular goal is made salient. The accessibility of
these goals depends both on situational cues and individual differences. Although
Omarzu remained vague with regard to what these situational cues and individual
differences actually are, it seems that she mostly referred to interpersonal cues and
general personality traits or needs associated with interpersonal interaction. The
logic outlined here is that certain situations foster certain needs that make certain
goals more salient than others. For example, a party or a romantic dinner may make
the goal of establishing an intimate relationship more salient than an office meeting
(see also p. 178). On the other hand, individual differences (e.g., feeling lonely,
being less sociable) may motivate people to pursue a certain goal (e.g., relationship
initiation) in almost any situation. In conclusion, which goal is salient depends both
on situational cues and individual motivations. Omarzu further argued that because
situations are often complex, it may be difficult to identify one specific goal. Goals
as described by Derlega and Grzelak (1979) may be combined, overlap or even
conflict each other.
Stage 2: Selecting a Strategy and Searching for Targets In this stage, individuals
first evaluate whether self-disclosure is an appropriate strategy to obtain the goal
that is salient. Some goals (e.g., relationship initiation or maintenance) may be
achieved through other means such as physical contact or showing non-verbal
affection. However, in many situations (e.g., computer-mediated conversations),
verbal exchanges of information are the most effective way of achieving particular
goals. Second, individuals have to assess potential recipients of their disclosures.
The assessment of potential targets is critical because if an appropriate target is not
available, disclosure will most likely not occur. Selecting the strategy and the target
hence “sets up the conditions under which individuals will be making the ultimate
decision about what and how to disclose” (p. 179).
84 4 Theories of Self-Disclosure
Stage 3: Weighing Subjective Utility Against Subjective Risk In the last stage
of the disclosure decision process, individuals precisely evaluate how much, how
intimately, and how broadly they will disclose themselves (cf. three dimensions
of self-disclosure: duration, depth, and breadth). Assessments of the subjective
utility of self-disclosure refers to the individually perceived importance of achieving
the particular goal that was made salient. The importance of goal achievements
depends on individual characteristics of the discloser, situational cues, and the
characteristics of the recipients. In sum, the higher the perceived benefits and the
higher the importance of receiving these benefits, the more likely and the longer
self-disclosure will be. With regard to subjective risk perceptions, Omarzu argued
that the probability of making oneself vulnerable may lower the level, particularly
the depth, of self-disclosure. Risks include social rejection, betrayal or causing
discomfort for the listener (p. 180).
The DDM provides a valuable model that allows us to study situational disclosure
decision processes empirically. Its strength is the focus on variables that are con-
stantly present across different situations. It thus allows us to explain variations of
self-disclosure as a function of these variables. This approach is particularly useful
in conquering the challenge of conceptualizing an infinite number of situations.
Nonetheless, Omarzu did not explicitly define what a situation is. I will elaborate
on this in more detail in Chap. 7 and propose my own definition of the situation
(p. 136). This definition will then provide the basic framework for the theory of
situational privacy and self-disclosure that I aim to develop.
The disclosure processes model (DPM) by Chaudoir and Fisher (2010) rather asked
under what conditions self-disclosure may be beneficial.3 In line with the DDM, the
disclosure processes model (DPM) argues that self-disclosure is essentially goal-
directed. However, next to goals associated with high levels of self-disclosure, it also
incorporates goals associated with low levels or even avoidance of self-disclosure.
That being said, at its core, it focuses on different long-term outcomes and the
processes that mediate between the situational disclosure event and these outcomes
(Fig. 4.2). Finally, it also acknowledges potential feedback loops. Chaudoir and
Fisher (2010) argue that the long-term outcomes of self-disclosure events may, in
turn, influence the antecedent goals of future disclosure events, eventually leading
to an upward spiral toward visibility or a downward spiral toward concealment.
The model hence distinguishes between (1) salient or antecedent goals, (2) the
3 Please note that the DPM was developed for the context of revealing or concealing stigmatized
identities. All the same, I do believe that it provides a broader insight on how self-disclosure may
led to benefical outcomes in general, and how these outcomes, in turn, influence self-disclosure in
future interactions.
4.4 On the Status of Self-Disclosure Theories 85
Antecedent goals
Mediang processes
Approach -Focused Goals All eviaon of inhibion
Social support
Pursue posive outcomes Changes in social informaon
(e.g., understanding, stronger
relaonships, educang others)
Aenon to posive cues
Long-term outcomes
(e.g., greater inmacy, acceptance) Disclosure event
Posive affect
Individual
(e.g., hopefulness) Content Psychological
Approach coping Depth / Breadth / Duraon Behavioral
Emoonal content Health
Fig. 4.2 The disclosure processes model by Chaudoir and Fisher (2010)
disclosure event, (3) mediating processes between the disclosure event and the
outcomes, (4) long-term outcomes, and (5) feedback processes. To understand the
core implications of the model, I will discuss each component in more detail.
Salient or Antecedent Goals Chaudoir and Fisher differentiated between
approach-focused goals and avoidance-focused goals. With regard to the first,
they relied on the works of Derlega and Grzelak (1979) and Omarzu (2000),
arguing that several goals foster higher levels of self-disclosure. Approach-focused
goals include the pursuit of positive outcomes, attention to positive cues and
positive affect. The latter, on the other hand, can be compared to what Omarzu
called subjective risk evaluation. Reformulating subjective risks as goals means
that under certain conditions, individuals seek to prevent negative outcomes, give
attention to negative cues, and sustain negative effect. Although Chaudoir and
Fisher emphasized the importance of incorporating goals associated with concealing
behavior, they nonetheless noted that “approach- (or compassionate) focused goals
may be better able to garner positive social responses” (p. 10). From an overall
perspective, the antecedent goals represent a simplification of Omarzu’s disclosure
decision model.
Disclosure Event Chaudoir and Fisher operationalized the disclosure event itself
as a combination of the disclosure content and the reaction of the confidant. In
line with prior research, they differentiated between depth, breadth, and duration
of disclosure. The level of self-disclosure is a direct function of the antecedent
goals. Approach-focused goals positively influence the level of self-disclosure and
avoidance-focused goals negatively affect the level of self-disclosure. Extending
prior research, they further argued that the disclosure content has an emotional
dimension. Thus, disclosure events also vary with regard to the amount of emotions
a discloser expresses.
86 4 Theories of Self-Disclosure
It is important to note that Chaudoir and Fisher (2010) subsumed both one-time
situations and longer periods of time under the concept of the disclosure event. They
argued that it is important to incorporate the reaction of the confidant in this event.
As this reaction can be either supportive or unsupportive, the level of disclosure may
be adapted to this reaction despite salient goals. The authors argued here that some
people choose “to test the waters” with their confidant before they discuss a topic in
its entirety (p. 6).
Long-term Outcomes Based on an in-depth review of the literature, Chaudoir
and Fisher (2010) proposed that self-disclosure generally leads to three types of
long-term outcomes: (1) individual, (2) dyadic, and (3) social contextual outcomes.
In line with the theories and findings presented in Sect. 4.2, they proposed that
self-disclosure may have a range of psychological, behavioral and positive health
outcomes for the individual, that it positively influences relationships through
processes of liking, intimacy, and trust, and that it may also positively affect the
social and cultural context in which the individual lives in.
Mediating Processes Chaudoir and Fisher (2010) proposed three processes that
mediate between the disclosure event and the various outcomes. These include
alleviation of inhibition, social support, and changes in social information. All three
processes may impact different types of outcomes.
Feedback Loops The general idea is that if self-disclosure has created positive
outcomes, it may increase the likelihood of future disclosure. Likewise, negative
outcomes may decrease the likelihood of disclosure (Chaudoir & Fisher, 2010,
p. 23). The experience of positive outcomes is thus critical: if a person receives
negative feedback after disclosing to a confidant and negative long-term outcomes
increase, he or she may find himself or herself in a downward spiral toward conceal-
ment. Given the benefits of disclosing the self such a process can be problematic. In
the case of stigmatized identities, this may be even more problematic.
In sum, the DPM conceptualizes potential long-term effects of self-disclosure
and models how these outcomes may, in turn, influence future disclosure. As such,
it provides a broad and comprehensive picture of the overall process in which self-
disclosure events are embedded. We can critically argue that it simplifies certain
components within this process. Yet, by combining the work of Derlega and Grzelak
(1979), Omarzu (2000), and Chaudoir and Fisher (2010), it paints a fuller picture
that provides a comprehensive basis for further theoretical development.
of unrestrained self-disclosure?” (p. 88). We could argue that the need for privacy
may be regarded as an inhibiting factor for self-disclosure. However, as we will see
in the next chapter, this view is too narrow and does not explain the occurrence of
self-disclosure and privacy regulation behavior under specific circumstances.
Chapter 5
Connecting Privacy and Self-Disclosure
From the two previous chapters, it should be evident that people face needs for
both privacy and self-disclosure in their daily lives. They constantly seek a balance
between concealing and revealing when initiating friendships, communicating with
strangers, buying products on online shopping platforms, or talking with friends via
instant messengers. We could hence hastily conclude that privacy and self-disclosure
are two sides of the same coin: by disclosing information about ourselves, we lose
a little bit of privacy, conversely, by concealing information about ourselves, we
can retain privacy. Similar arguments have been made by many scholars. Westin
(1967), for example, already emphasized that privacy “is only part of the individual’s
complex and shifting system of social needs (. . . ) Individuals have needs for
disclosure and companionship every bit as important as their needs for privacy”
(p. 43). This dialectical view is also present in Altman’s (1975) theory in which he
posits that privacy itself is nothing but an “interplay of opposing forces – that is,
different balances of opening and closing the self to others” (p. 11).
Although implicit assumptions such as these have always guided research on
privacy and self-disclosure, an in-depth theoretical discussion has rarely been
undertaken. In the following chapter, I will discuss two theoretical approaches
that focus on both privacy and self-disclosure: first, the communication privacy
management theory (CPM) by Petronio (2002), which uses the metaphor of closed
and open boundaries and a rule-based management system in order to exemplify and
explain processes of revealing or concealing, and second, the privacy process model
(PPM) by Dienlin (2015), which provides a procedural framework for explaining
why people disclose in situations of perceived privacy.
One of the most elaborate theories and according to Margulis (2011) “the most
valuable privacy theory for understanding interpersonal computer-mediated com-
munication” (p. 12) was advanced by Petronio (2002). Her communication privacy
management theory (CPM) provides a systematic framework for understanding the
ways in which people manage the relationships between revealing (self-disclosure)
and concealing (privacy) and how they control access to and distribution of shared
information. In short, the theory posits that individuals sustain and control private
boundaries with other people. Each boundary is characterized by specific rules
that coordinate the level of accessibility of the information that flows between the
members of the boundary. The theory further rests on the assumption that people
view information as private if they believe they own this information. Based on this
feeling of ownership, they claim to have the right to decide who may become a
co-owner and what these co-owners are allowed to do with that information. If this
rule-based privacy management fails (e.g., a co-owner shares private informations
with non-owners), boundary turbulences occur.
Essentially, Petronio (2002) argues that privacy and self-disclosure can be regarded
as polar opposites, as disclosing information means giving up privacy (p. 14).
However, to understand how CPM theory connects privacy and self-disclosure in
more detail, it is useful to take a closer look at the underlying principles (see also
Margulis, 2011; Petronio & Durham, 2008):
Ownership and Control Privacy is defined as “the feeling that one has the right
to own private information” (Petronio, 2002, p. 6). Personal information is thus
perceived as private because people believe it belongs to them. By defining privacy
in terms of ownership, CPM theory alludes to legal conceptions of privacy that also
emphasize the role of control over information. In light of this, CPM further argues,
“because the information belongs to us, we want to determine who is privy to it and
who is not ” (p. 9). People hence want to control the access to and distribution of
their private information.
Boundaries and Co-ownership CPM refers to boundaries in order to illustrate
the border between public and private (Petronio, 2002, p. 6). If information is not
shared with anyone, it remains in the smallest and completely closed boundary,
which Petronio also refers to as the “personal boundary” (p. 7). Once an information
is shared with other people, all receivers become co-owners of that information and
form a collective privacy boundary. Boundaries thus differ with regard to the people
they include. They can be small (e.g., dyadic boundaries) or large (e.g., groups of
people).
5.1 Communication Privacy Management Theory 91
5.1.2 Implications
CPM theory as described by Petronio (2002) has been very influential since its
publication. By now, Google Scholar records 1018 citations, not counting those
researchers that cited earlier publications on the theory. Despite this huge impact,
empirical evidence for its underlying assumptions are still scarce. Many investiga-
tions remain fragmented and insufficient in providing solid credence to all claims
made in the theory. This may come as a surprise as many of the suppositions seem
intuitively valuable. The problem seems to be that central aspects of the theory such
as private boundaries or the rule-based management are difficult to operationalize
in empirical studies. Child, Pearson, and Petronio (2009), for example, are the
only researchers who have tried to develop a measure that applies the boundary
coordination processes proposed in CPM theory to privacy management of bloggers.
The final scale (p. 2085) includes items on three dimensions reflecting boundary
permeability (e.g., “I would be upset if friends shared what’s written on my blog”),
boundary ownership (e.g., “I am certain that all the information I reveal on my blog
remains under my control”), and boundary linkage (e.g., “No one can read my blog
without my permission”). However, I would critically note that this measure rather
reflects individual’s perception of whether his or her individual rules are working.
Taken together, these dimensions thus show how open or closed someone wants the
privacy boundary around a personal blog to be. Nonetheless, the measure can help
to identify people who are more reluctant to disclose private information on their
blog and who are more likely to restrict their blog to specific audiences.
Based on an extensive literature review, and to the best of my knowledge, many
important assumptions of the theory such as how private boundaries are created,
what characterizes them, and how rules are established have not been the explicit
subject of empirical investigation. Notable exceptions are the studies by Hosek
and Thompson (2009), who explored motivations to form privacy rules in the
context of college education, or Child and Westermann (2013), who investigated
adjustment of privacy rules when privacy boundaries (in this case their Facebook
community) grow. Most notably, the notion of information ownership and boundary
coordination was investigated by Kennedy-Lightsey, Martin, Thompson, Himes, and
Clingerman (2012). Based on 100 pairs of friends’ survey answers, they found that
5.1 Communication Privacy Management Theory 93
when disclosed information was riskier, disclosers and receivers both perceived
that the receiver had fewer ownerships rights. Receivers, furthermore, were more
likely to share the disclosed information when they perceived they had more
ownership. More recently, Steuber and McLaren (2015) conducted a survey with
273 participants and found that recalibration of rules after privacy turbulences was
related to less relational damage.
On a theoretical level, CPM theory has several implications with regard to the
connection of privacy and self-disclosure. First of all, the link between privacy and
self-disclosure lies in the assumption that CPM theory is dialectical (Petronio, 2002,
pp. 12–23). A dialectical perspective generally describes the connection of two
concepts through a set of conceptual assumptions that revolve around the notions
of contradiction, dialectical change, praxis, and totality (Baxter & Montgomery,
1996, p. 6). Specifically, contradiction refers to the “dynamic interplay of unified
oppositions” (p. 8) and dialectical change to the interplay of stability and flux that
people experience in their daily lives (p. 10).
According to Petronio (2002), CPM theory acknowledges these characteristics of
dialectics in the interconnectedness of privacy and self-disclosure. It suggests that
privacy and self-disclosure are functional opposites as they have “distinct features
from one another that function in incompatible ways” (p. 13). In this sense, privacy
is not disclosure, however, they are unified as each presupposes the existence of the
other for its meaning (p. 14). Self-Disclosure is thus only meaningful in relation to
privacy as disclosing private information means giving up some degree of privacy.
In short, Petronio (2002) argued that through disclosure, people become a little
less private and more public (p. 12). Furthermore, the theory adheres to the notion
of dialectical change as people are constantly experiencing opposing forces of
revealing and concealing. As disclosure leads to the formation of privacy boundaries
and boundaries themselves are constantly changing, change is an inherent concept
of CPM theory.
However, CPM theory contradicts itself in aspects. In contrast to the dialectical
point of view, Petronio also introduced the concept of privacy boundaries, which can
be seen as safe environments in which self-disclosure becomes possible. Compared
to viewing privacy and self-disclosure as conceptual opposites, this view emphasizes
that privacy is sometimes needed to facilitate self-disclose. In the following, I will
discuss another theoretical model that stresses this view on privacy and self-
disclosure.
As I will show later, these perspectives do not contradict each other. In fact,
I argue that CPM theory presents a well-designed rationale for seeing self-disclosure
both as a dialectical opposite to privacy and as a function of privacy. In conclusion,
the merit of CPM theory is its focus on the mutual relationships between sender and
recipient. Using the metaphor of privacy boundaries and a rule-based management
system, the theory provides the necessary tools to understand how people manage
their disclosures both individually and collectively.
94 5 Connecting Privacy and Self-Disclosure
The model comprises four major elements that serve as the procedural framework.
To understand the implications of the model for the connection of privacy and self-
disclosure, I discuss each component in more detail.
Privacy Context The first component of the PPM refers to the context in which
the individual finds himself or herself in Dienlin (2015, pp. 104–105). This context
should be objectively measurable in all four dimensions proposed by Burgoon
(1982). The idea of a privacy context refers to the idea that privacy may be
regarded as the degree of separation from others. In other words, it is the condition
of informational, social, psychological, and physical privacy that an individual is
currently experiencing (Dienlin, 2015, p. 105). However, it is important to note
here that Dienlin most likely referred to the situational circumstances instead of
contextual characteristics.1
Privacy Perception The second component refers to the idea that privacy is always
subjectively perceived. Dienlin argued that the objectively measurable privacy
context does not necessarily adhere to the subjective perception of the individual.
Using a number of different examples, he showed that oftentimes discrepancies exist
between actual and perceived privacy.
Privacy Behavior Depending on the respective privacy perception, individuals
engage in corresponding behaviors. The third component of the PPM is hence the
privacy-related behavior, which, according to Dienlin, is nothing but self-disclosure.
The general idea is that individuals will disclose themselves when they perceive high
levels of privacy (p. 107).
Privacy Regulation and Controllability The PPM further adheres to Altman’s
(1975) concept of balancing desired and achieved privacy. Dienlin argued that
the perceived privacy and the privacy behavior are constantly compared to a
corresponding desired level of privacy and a desired privacy behavior. An imbalance
1 I will discuss the problems of the synonymous use of context and situation in more detail in
Sect. 7.2.2.
5.2 The Privacy Process Model 95
between the current and the desired status is perceived as dissatisfying and fosters
privacy regulation. Privacy regulation can mean adjusting the context or the behavior
(p. 108). Which mechanism people choose depends further on their controllability.
Figure 5.1 represents a visualization of the entire model.
5.2.2 Implications
So far, the PPM has not explicitly been tested empirically. Nonetheless, the model
has several valuable implications and some studies implicitly support some of its
underlying claims. First of all, it separates the objective privacy context from the
subjective privacy perception. Dienlin emphasized the importance of drawing such
a clear distinction because people may sometimes perceive privacy although they
are not in a private situation from an objective perspective. Trepte and Reinecke
(2011b), for example, argued that “people create online spaces of social and
psychological privacy that may be an illusion; however, these spaces seem to be
experienced as private” (p. 62). SNS users thus often perceive a high level of
privacy because they have the illusion of controlling with whom they interact or
share information. Particularly on social media platforms, people may feel private
because a lot of fine-grained privacy settings are provided.
The PPM furthermore allows the integration of both privacy regulation behaviors
and self-disclosure. In contrast to CPM theory, self-disclosure is not seen as a
dialectical opposite to privacy. Instead, Dienlin (2015) argued that people disclose
specifically when they feel they are in a private situation: the higher the perceived
privacy, the higher the corresponding level of disclosure. This rationale is closely
96 5 Connecting Privacy and Self-Disclosure
In my opinion, the works of Petronio (2002) and Dienlin (2015) provide promising
starting points for the theoretical linking of the two concepts. Notwithstanding their
contributions, I still believe it is necessary to look into the connection of privacy
and self-disclosure more deeply and to develop a comprehensive framework that
incorporates both perspectives addressed in these theories. In order to exemplify
the connection of privacy and self-disclosure, let us imagine the following typical
situation:
Parents are worried about their child’s unsatisfactory school achievements. They are not sure
whether they are supporting their child enough. They start to debate the right and wrongs
of parenting and education. They both get very agitated and emotional, thereby revealing
a lot about their fears and hopes. In the meantime, their child comes home from school.
Both parents stop their conversation and shift to a neutral topic. Once the child has left, they
resume the conversation about his or her education.
From this example, we can derive two observations that give us an idea of
how privacy and self-disclosure are inherently intertwined. First, it should be quite
obvious that both parents need a rather high level of privacy to be able to discuss
their child’s education. They only feel able to talk about their true feelings and
hopes when they are alone and no one—especially not their child—can overhear
them. They do not want to appear vulnerable or doubtful in front of their child, and
most likely anyone else. In their home, withdrawn from the public, both parents feel
able to securely discuss these sensitive matters with each other. A first supposition
is hence that privacy can be regarded as a necessary condition for self-disclosure.
At other times, however, limiting or actively managing one’s disclosure can be a
means to attain privacy in the form of reserve. In the example, the parents shift to a
neutral topic as soon as the child enters the situation. By refraining from disclosing
their vulnerability in front of their child, they are able to achieve an optimal balance
between their conflicting needs. In this sense, actively deciding not to disclose
something can be regarded as an effective privacy regulation strategy. A second
supposition is hence that disclosure management presents a valuable means to arrive
at an appropriate level of concealing and revealing, specifically in situations when
the appropriate level for disclosing oneself is not given.
A similar idea was proposed by Derlega and Chaikin (1977) who argued that
when self-disclosure is regarded as a form of boundary regulation, it makes sense to
imagine two boundaries: They distinguish between the self (or personal) boundary
and the dyadic boundary. The self boundary “separates the discloser and his or her
information from the recipient” (Derlega, Metts, Petronio, & Margulis, 1993, p. 68).
It is the smallest boundary possible as a closed self boundary means that nobody
has access to the discloser or his or her information. Nondisclosure or disclosure
management is thus a form of privacy regulation. The dyadic boundary “is perceived
by the individual as the boundary within which it is safe to disclose to the invited
participant and across which the self-disclosure will not pass” (p. 67). In this regard,
98 5 Connecting Privacy and Self-Disclosure
the boundary is the safe condition in which self-disclosure can be performed. This
boundary is hence the private sphere which is needed for self-disclosure. It has to
be noted, however, that this boundary does not necessarily have to be dyadic. As
proposed by Petronio (2002), privacy boundaries can included more than one or
two people.
In my opinion, both perspectives are important to understand the theoretical
connection between privacy and self-disclosure. In the following, I will elaborate
further on this theoretical link between privacy and self-disclosure by referring to
existing theories from both areas of research. While scholars have often written
about similar ideas, they have used different terminologies. I will show that the
two perspectives do not contradict each other but rather provide the necessary
foundations for a comprehensive theory of privacy and self-disclosure. In fact,
resolving the seeming paradox that self-disclosure can be both an opposite to privacy
and the reason why we seek privacy is fundamental to the theory of situational
privacy and self-disclosure that I will develop.
Rachels, 1975; Schoeman, 1984). Rachels (1975) provided a great example that
illustrates quite well why privacy is essential for self-disclosure which, in turn, is
important for maintaining relationships with other people:
First, consider what happens when two close friends are joined by a casual acquaintance.
The character of the group changes; and one of the changes is that conversation about
intimate matters is now out of order. Then suppose these friends could never be alone;
suppose there were always third parties (. . . ) intruding. Then they could do either of two
things. They could carry on as close friends do, sharing confidences, freely expressing their
feelings about things, and so on. But this would mean violating their sense of how it is
appropriate to behave around casual acquaintances or strangers. Or they could avoid doing
or saying anything which they think inappropriate to do or say around a third party. But this
would mean that they could no longer behave with one another in the way that friends do
and further that, eventually, they would no longer be close friends (p. 3).
Schoeman (1984) in a similar manner argued that privacy rather is a need for
facilitating intimacy with other people, instead of independence from them. Privacy
thus plays a key role for differentiating and maintaining on the one hand the variety,
and on the other hand the distinctiveness of, relationships with different people
(Nissenbaum, 2010, p. 85).
Despite the supposition that privacy and self-disclosure should be regarded
as dialectical opposites, this view is quite well adopted in CPM theory: private
boundaries in fact may be more accurate descriptions of what Westin called small-
group intimacy. People thus establish boundaries with other people in which private
information can circulate (p. 6). To put differently, people are able to disclose private
information within groups of people they trust or have allowed to be co-owners of
this information: in such boundaries, “the discloser believes that the disclosure is
safe with the recipient” (Derlega et al., 1993, p. 67).
Of course, we could still argue that by disclosing to a significant other, an
individual loses privacy. In fact, he or she does lose some privacy with regard to
the other person(s) within the defined privacy boundary. However, as the privacy
boundary was initiated in order to allow the disclosure and circulation of private
information and rules pertaining these boundaries are carefully established, this
loss of privacy is not particularly large and not necessarily perceived as a loss
of privacy by the individual. In line with this rationale, Ben-Ze’ev (2003) noted
that the need for privacy might be less pronounced in the case of close, intimate
relationships (romantic couples or friends) or in the extreme case of an relationship
with a complete stranger who simply does not present a risks to the discloser (p.
453).
In sum, theories on privacy and self-disclosure can be linked through these two
interdependent perspectives. On the one hand, managing self-disclosure or even
non-disclosure is a means to adapt to situations of low privacy, and on the other
102 5 Connecting Privacy and Self-Disclosure
In the last three chapters, I discussed the predominant theories of privacy and self-
disclosure and how they should be linked. However, these theoretical approaches
mostly date back to the 1960s and 1970s. They thus emerged before the proliferation
of contemporary information and communication technologies.1 As mentioned
previously in Chap. 2, we should now inquire whether they hold up to the dynamics
of a changing media environment. In particular, we have to ask whether certain
modifications or extensions are needed to account for the specific horizontal and
vertical information flows that cause new privacy threats and breaches.
Nonetheless, I believe that the traditional theories of privacy and self-disclosure
provide a comprehensive framework through which human behaviors related to
privacy in new media environments can be understood and analyzed (a similar
point is also made by Trepte & Dienlin, 2014, p. 53). It is hence not surprising
that most scholars in the last two decades have adopted one of these theories for
empirically investigating privacy and self-disclosure in various online environments
in the larger contexts of e-commerce and social media. The results of these empirical
studies, however, have sometimes puzzled scholars and raised questions, the distinct
characteristics of online privacy processes.
In the following, I will first present a critical review of the literature that has
been published on online privacy and self-disclosure within the last 20 years.
I will highlight which theories scholars used to investigate privacy and self-
disclosure processes and to what extent these theories were able to predict the
empirical findings. Based on this review, I will discuss potential extensions for
traditional privacy and self-disclosure theories. More recent work has pinpointed
several new aspects that seem promising for grasping the characteristics of online
privacy and self-disclosure processes. These include particularly the differentiation
between horizontal and vertical privacy, the collaborative or networked nature of
1 Exceptionsare of course Petronio’s CPM theory (2002) and Dienlin’s PPM (2015), but these
approaches are still not necessarily media-specific.
The growing discomfort with data collection practices had already begun before
the rise of the Internet, when companies and organizations started to use computers
to handle client information more efficiently. Smith, Milberg, and Burke (1996),
for example, developed a four-dimensional information privacy concern scale
which comprised (1) concerns about data collection, (2) concerns about errors or
inaccuracies in databases, (3) concerns about unauthorized use of data, and (4)
concerns about improper access to data (p. 172 and p. 183). Interestingly, the first
engagement with information privacy thus focused on vertical dynamics and the
question of to what extent companies or organizations are allowed to interfere
with their clients’ privacy. The 15-item concern for information privacy (CFIP)
scale was later validated by Stewart and Segars (2002), who found that each of
its dimensions serves as a second-order factor that makes up the broader concept
of information privacy concerns. Although not explicitly formulated for the Internet
context, this scale was used in several empirical studies, including those that focused
more particularly on online privacy (Bélanger & Crossler, 2011, p. 1020). Further
online privacy concern scales were later proposed by Malhotra, Kim, and Agarwal
(2004) and Buchanan, Joinson, Paine, and Reips (2007). Bansal (2017) recently also
developed the more comprehensive Internet user information transmission security
concern (IUITSC) scale, which further distinguishes privacy and security concerns.
Since the 1990s, growing privacy concerns have been documented in numerous
surveys. A large survey conducted by the Federal Trade Commission (2000), for
example, found that more than half of US American consumers were very concerned
about the privacy of personal information they shared online (cited after Acquisti
& Grossklags, 2004, pp. 2–3). Ten years later, 40% of the European population
was very concerned about their behavior being recorded through the Internet when
browsing, downloading files, and accessing content online (European Commission,
2011, p. 67). In 2014, the percentage of those concerned rose to 45% (European
Commission, 2015, p. 15). In Germany, 57% indicated concern about data collection
practices of website providers (Trepte & Masur, 2017b, p. 28).
Given the theoretical approaches to privacy that I have presented in the previous
chapters, it is surprising that initial research put so much emphasis on privacy
108 6 Privacy and Self-Disclosure in the Age of Information
With survey studies consistently reporting high privacy concerns in different popu-
lations, scholars began to ask how these concerns affect individuals’ behavior. Over
time, different studies investigated relationships between privacy concerns (some-
times also broadly conceptualized as privacy attitudes) and behavioral outcomes
such as self-disclosure, privacy regulation, and willingness to use privacy-invasive
online services.
In evaluating the respective literature, four aspects have to be taken into account.
First, it is important to note that, except in few experimental studies, scholars mostly
relied on measurements of people’s aggregated estimations of their general behavior
or simply their intentions to behave in certain ways (e.g., the willingness to self-
disclose or the intention to use certain privacy regulation strategies), instead of
capturing actual behavior. Second, similar study designs were used in the context
of both e-commerce and social media. Although contextual factors are certainly
of relevance, the literature in both contexts is nonetheless often treated as a
continuous exploration of the same relationship. Third, it is vitally important to
distinguish between experiments (which allow us to investigate situational effects
of concerns on behavior) and surveys (which allow us to draw conclusions about
general relationships). In the following, I will pinpoint the implications of these
aspects whenever necessary. Lastly, most studies refer to the theories of Westin
(1967), Altman (1975), and more recently also to CPM theory (Petronio, 2002).
In these studies, however, the theories mostly served to conceptualize privacy
and in particular privacy regulation behavior. Additionally, scholars mostly drew
from socio-psychological theories such as utility maximization theory or behavioral
theories such as the theory of planned behavior (Ajzen, 1985) in order to derive
testable assumptions (cf. Li, 2012).
One of the first studies investigating the relationship between privacy concerns and
actual behaviors was by Spiekermann et al. (2001). In their laboratory experiments,
participants reported their privacy preferences in a pre-survey and then engaged
in an online-shopping transaction during which an anthropomorphic shopping
bot asked them different questions designed to elicit sensitive disclosures. The
results revealed that even those who were clustered as privacy fundamentalists
(i.e., very concerned about their privacy) revealed their addresses during the online
110 6 Privacy and Self-Disclosure in the Age of Information
privacy concerns) were negatively related to the intention to self-disclose, but not
to the actual amount of self-disclosure. In a survey study with 889 participants,
Sheehan (1999) similarly found that stated privacy concerns correlate negatively
with the reported frequency of registering with websites in the past.
Recent attempts to investigate the privacy paradox on SNSs, in contrast, have
revealed that higher privacy concerns do, after all, relate to lower levels of self-
disclosure and higher levels of privacy protection (e.g., Dienlin & Metzger, 2016;
Dienlin & Trepte, 2015; Krasnova, Spiekermann, Koroleva, & Hildebrand, 2010;
Krasnova, Veltri, & Günther, 2012; Zlatolas, Welzer, Heričko, & Hölbl, 2015).
Among other explanations, scholars have particularly argued that the privacy
paradox is illusory because broadly measured attitudes or concerns should not be
expected to correlate to specific behaviors (e.g., Dienlin and Trepte, 2015; Trepte,
Dienlin, & Reinecke, 2014). Correspondingly, Dienlin and Trepte (2015) conducted
an online survey with 595 German participants and showed that the privacy paradox
can be supported if measured similarly to the older studies described above, but is
not supported when items are designed according to the principle of compatibility
(Fishbein & Ajzen, 2010). In consequence, their more specific research design
revealed that privacy concerns moderately related to all different types of privacy
behaviors.
A recent meta-analysis based on 166 studies from 34 countries by Baruh, Secinti,
and Cemalcilar (2017) also confirmed that concerned SNS users were less likely
to disclose themselves (r = −0.13) and also more likely to engage in privacy
regulation (r = 0.13; however, this overall relationships is only based on three
studies). These findings suggest that people indeed adapt their levels of self-
disclosure in order to attain an optimal balance between desired and actual levels
of privacy. Or in other words, if they perceive the prevailing privacy on SNSs to be
too low to self-disclose, they refrain from doing so. In the e-commerce context,
studies likewise found significant effects of privacy concerns on privacy-related
behavioral outcomes. Based on 243 respondents, Chellappa and Sin (2005) found
that consumers with higher information privacy concerns were less likely to use
services that require personal data collection to offer personalized features.
Although the privacy paradox seems to be a methodical relic (Dienlin & Trepte,
2015), it has to be noted that the relationship between concerns and behavior is
mostly moderate or even small. Acquisti, Brandimarte, and Loewenstein (2015) also
argued that considering the privacy paradox to be illusory is not satisfactory because
attitude-behavior gaps may nonetheless arise in particular situations (p. 510). A
problematic aspect of the existing research on the privacy paradox is that most of
it is conducted from an aggregate perspective. Studies have primarily investigated
general attitudes and general behaviors. Results from such studies are different
from those that investigate situational processes. Acquisti and colleagues hence
implicitly argued for a more specific context-dependent or situational approach
to studying the privacy paradox. Even today, the notion of the privacy paradox
sparks a fruitful stream of research, which, by attempting to explain the attitude-
behavior gap, investigates a variety of covariates that were expected to mitigate the
112 6 Privacy and Self-Disclosure in the Age of Information
paradoxical behavior. In the following, I will highlight some of the most promising
studies on this topic.
Many studies have investigated the relationship of trust with privacy concerns and
self-disclosure. Metzger (2004, 2006), for example, studied the role of trust in
websites during e-commerce transactions using a fake commercial website. In the
first study, based on a sample of 189 university students, trust was negatively related
to privacy concerns, but positively related to self-disclosure. Metzger further found
that trust in the website provider correlated with the perceived privacy protection
offered by the website. An experimental study with 180 participants by Joinson,
Reips, Buchanan, Schofield, and Paine (2010) similarly revealed that privacy and
trust at a situational level interact such that high trust compensates for low privacy,
and vice versa. This is an important finding as it indicates that trust may be a pivotal
factor in determining people’s subjective privacy perception in a situation. I will
return to this notion in the next section and also in Sect. 7.4.2.
Theoretically, Trepte and Reinecke (2011b) also argued that “people create
online spaces of social and psychological privacy [emphasis in the original] that
may be an illusion; however, these spaces seem to be experienced as private” (p.
62). SNS users thus often perceive high levels of privacy because they have the
illusion of controlling with whom they interact or share information, but fail to
recognize that they abandon privacy on a vertical dimension. Particularly on social
media platforms, people may perceive high levels of privacy because numerous of
fine-grained privacy settings are provided. In three innovative experiments, Brandi-
marte, Acquisti, and Loewenstein (2013) also found that manipulating participants’
perceived control over information influenced their willingness to self-disclose.
Participants who were “given explicit control over the release and accessibility
of their personal information revealed more, even exposing themselves to higher
risks of identifiability” (p. 345), thus supporting the assumptions by Trepte and
colleagues. Brandimarte and colleagues termed this effect the control paradox—
the tendency of people to respond to safety measures intended to protect them in
ways that counteract the protection (p. 340).
The underestimation of personal risks is also evident in the literature on
optimistic biases. Survey studies by Baek (2014) (conducted in South Korea with
2028 participants) and Metzger and Suh (2017) (conducted with in the United States
with 1156 Facebook users) showed that people are generally quite optimistic that
other people are more likely to experience privacy violations. Interestingly, the
results of both studies suggested that comparative optimism decreases if individuals
experience privacy violations. These empirical results hence also support the
assumption expressed in the PPM (Dienlin, 2015) that an objective privacy context
and a subjective privacy perception should be differentiated.
With the exception of research in the e-commerce context, communication
scholars have increasingly focused on horizontal privacy perceptions and practices
6.1 Literature Review 113
In 1977, Laufer and Wolfe proposed the “calculus of behavior,” which posits that
individuals rationally evaluate potentially negative outcomes of their behavior while
simultaneously identifying positive outcomes (pp. 35–36). Accordingly, people
will self-disclose when the perceived benefits outweigh the negative consequences.
This mental calculus is a central tenet of many psychological theories. Protection
motivation theory, for example, suggests that individuals engage in protection
behavior after evaluating the advantages and disadvantages of a reaction to a
perceived threat (Rogers, 1975). The general idea—which is also advanced in other
theories such as the theory of planned behavior (Ajzen, 1985) or the subjective
expected utility theory (for an comprehensive analysis of theories used in the privacy
literature, see again Li, 2012)—is that “motivation toward protection results from a
perceived threat and the desire to avoid the potential negative outcome” (Floyd,
Prentice-Dunn, & Rogers, 2000, p. 408).
Interestingly, this notion has been adopted in several privacy theories already
presented in the previous chapter. The balancing of desired and achieved privacy
114 6 Privacy and Self-Disclosure in the Age of Information
levels as suggested by Altman (1975) might implicitly allude to the notion that
a mental calculus drives people’s privacy behaviors. Likewise, Petronio (2002)
argued that risk-benefit analyses are important in establishing the rules for particular
privacy boundaries. The second perspective on the link between privacy and self-
disclosure, described in Sect. 5.3.2, similarly alludes to the idea that people evaluate
the circumstances of a situation with regard to potential risks before they deem it
appropriate to engage in self-disclosure.
In the context of e-commerce, a fruitful line of privacy research adapted this
theoretical rationale quite early on and investigated the so-called “privacy calculus”
(Culnan & Armstrong, 1999; Dinev & Hart, 2006). Later, scholars also investigated
the privacy calculus in the context of SNS use (Dienlin & Metzger, 2016; Krasnova
et al., 2010, 2012). In general, the findings of these studies lend credence to
the assumption that oftentimes perceived benefits outweigh the perceived threats.
Culnan and Armstrong (1999), for example, conducted a secondary analysis of 1000
US American survey participants. The findings suggest that for people who were
told that their data would be handled with care, privacy concerns did not influence
their willingness to disclose the data. Likewise, Dinev and Hart (2006) conducted
a survey with 369 participants and found that personal interest in the transaction
and perceived trust towards the e-commerce provider could outweigh privacy risk
perceptions in the decision to disclose necessary data for the transaction.
With regard to communication on SNSs and based on a sample of 259 partici-
pants, Krasnova et al. (2010) found that the perceived benefits of disclosing on SNSs
(convenience, relationship building functions, and general enjoyment) positively
predicted the actual amount of self-disclosure, while perceived risks were negatively
related to the same behaviors. The cumulative effect size of the benefits was higher
than the effect of the perceived risks. Dienlin and Metzger (2016) conducted a
representative survey of the US population (N = 1156 participants) and again found
that the privacy calculus helps to predict self-disclosure behavior. Again, benefits
had more predictive power than the privacy concerns. Additionally, they found that
privacy concerns predicted the level of self-withdrawal (i.e., the implementation of
privacy settings), thus exemplifying that people try to manage their contrary needs—
revealing and concealing—in different ways. Recently, Trepte, Reinecke, et al.
(2017) investigated to what extent cultural differences affect the privacy calculus
that determines whether one is willing to have an SNS profile that is visible to
anybody (even non-SNS users) and whether one is willing to upload pictures on SNS
profile. The results showed that individualism (which is, for example, high in the
USA, rather high in European countries, but low in China) was negatively correlated
to the subjective importance participants ascribed to privacy risks, but positively
to the subjective importance of social gratification that could be obtained through
having an open profile or uploading pictures. In contrast, uncertainty avoidance
(which is rather high in Germany, moderate in the USA and other European
countries, and rather low in China) was positively related to avoiding privacy risks
and negatively related to ascribing importance to social gratifications. The calculus
itself confirmed prior findings that costs and benefits exerted contrary effects on the
willingness to have an open SNS profile and to upload pictures.
6.1 Literature Review 115
Again, a major limitation of these studies is that they did not analyze the privacy
calculus from a situational perspective. In its original sense, the privacy calculus
is meant to represent a decision-making process (similar to the weighing process
described in the disclosure decision process model by Omarzu, 2000). People
assess the risks and benefits of a particular behavior in a specific situation. The
calculus of behavior may thus be different for each disclosure act. It seems likely
that in some cases, the benefits may indeed outweigh the risks, but in others, the
opposite is equally likely. By using cross-sectional and aggregative data, most prior
studies often asked participants about their general risk evaluations and their general
expectations of benefits. Consequently, these findings can only be regarded as an
aggregated representation of several situationally varying decision processes that
involved a privacy calculus. Although the overall theory is quite intuitive, further
research is needed that experimentally prompts participants to reflect on the risks
and benefits of information disclosure. The theory of situational privacy and self-
disclosure acknowledges the variability in these decision processes by including
both self-disclosure enforcing and inhibiting factors on the situational level. The
findings of the aggregative studies, however, will nonetheless be considered by
incorporating attitudinal and trait-like factors on a personal level.
someone might use encryption for all of his or her email communications in order
to achieve a certain privacy level every time he or she was to write an email (long-
term preventive privacy strategy), but he or she could also decide to use a totally
different communication channel (e.g., intimate face-to-face communication) for an
especially sensitive conversation (short-term preventive privacy strategy).
Corrective strategies can also be further differentiated as they encompass both
actions after concrete privacy violations as well as subtle corrective measures. As
the theoretical concepts presented earlier suggest, people often engage in privacy
regulation behaviors when a current situation or state becomes unbearable or
does not fit a desired level of privacy. This does not necessarily mean that a
privacy violation has occurred; according to Johnson’s (1974), people can only
evaluate whether the achieved privacy actually serves to generate the intended need-
satisfying outcomes after they have engaged in previously decided behaviors. If the
desired needs are not satisfied, people should employ (sometimes subtle) corrective
measures that have an optimizing nature. Obviously, actual privacy violations also
trigger privacy regulation behaviors as people seek to restore the desired level of
privacy.
In line with Lampinen et al. (2011), we should finally differentiate individual
and collaborative strategies. Table 6.1 presents a systematic overview of privacy
regulation behaviors that synthesize both traditional classifications of privacy
regulation behaviors and the extensions proposed by recent research on online
privacy. It assigns both individual and collaborative strategies to long- and short-
term preventive strategies, preservative strategies, and corrective strategies of an
optimizing or restorative nature. Apart from explaining the general purpose of
these strategies, the table provides typical examples of such privacy regulation
behaviors. The collection of examples is not meant to be comprehensive. Rather,
the present matrix provides a framework for organizing all forms of privacy
regulations behaviors. As we will see later, this organizational framework is useful
for determining situational environmental factors influencing the willingness to self-
disclose (see Chap. 7).
Based on this literature review, we can state that much progress has been made
to understand and explain people’s privacy-related behaviors in the contexts of
e-commerce and social media. However, some important novelties seem underrepre-
sented. I am thus going to discuss three (new) aspects of privacy and self-disclosure
in networked environments that I believe can be regarded as major challenges to
traditional concepts of privacy and self-disclosure. Although initial work on these
aspects has already been conducted (as shown by the literature review above), we
Table 6.1 Classification of privacy regulation behaviors
120
are still at the beginning of investigating these phenomena both theoretically and
empirically.
The first aspect refers to the differentiation between the horizontal and vertical
levels of privacy. To understand users’ perceptions and behaviors related to privacy,
it is indispensable to distinguish between threats arising from other people and
threats arising from institutions, companies, and governments. Although empirical
research has investigated people perceptions, concerns, and behaviors on both
levels, the previous theories have not explicitly differentiated between the two per-
spectives. The second aspect refers to the impossibility of controlling information
on the Internet. As many scholars noted, absolute control over personal information
may no longer be feasible. As a consequence, we have to ask whether traditional
concepts of privacy and self-disclosure, which are often based on control over
personal information (e.g., Altman, 1974), suffice to explain the new dynamics of
online communication. In particular, people seem to circumvent the impossibility
of information control by engaging in collective privacy management processes and
thus create a sort of “networked privacy.” It is hence necessary to revisit traditional
approaches to privacy and ask whether they account or allow for incorporating
such collaborative processes. Finally, and as noted in Chap. 2, the multimodality
of online communication itself poses new risks to the privacy regulation and self-
disclosure processes of individuals. As the literature review has shown, many
empirical studies focus only on one platform and oftentimes on the broad context
of SNSs or e-commerce. However, the increasing differentiation of application and
media platforms requires multimodal privacy regulation behaviors.
As described already earlier, the increasing digital way of life presents challenges
to individuals’ privacy from two perspectives. On the one hand, privacy may be
endangered on a horizontal level (i.e., by other users). On the other hand, it may be
threatened on a vertical level (i.e., by providers and institutions). It is important
to note that such a differentiation of two levels of privacy was first mentioned
by Schwartz (1968, p. 744) who argued that privacy serves to stabilize both the
horizontal and vertical societal order. However, the use of the terminology by Masur,
Teutsch, and Dienlin (2018)—which I have adopted here—instead refers to the
entities against which individual’s seek to protect there privacy. This differentiation
is similar to the one proposed by Raynes-Goldie (2010), who distinguished between
social (referring to other users) and institutional privacy (referring to providers
such as Facebook). With regard to horizontal privacy, Internet users thus need to
prevent their personal information from misuse by other users, from spreading to
unwanted audiences, and generally from flowing uncontrollably through networked
environments in which it may be replicated, altered, and redefined. With regard
to vertical privacy, users are confronted with a new economy that centers on their
personal information as a commodity, gathers as much information about them
122 6 Privacy and Self-Disclosure in the Age of Information
as possible, and aggregates and analyzes it to infer personal tastes, beliefs, and
willingness to buy products or engage in certain activities. Violations thus occur
primarily through unwanted access to personal information.
The current research implies that people engage in several measures to safeguard
their horizontal privacy, but are largely uncertain about whether and how to protect
their vertical privacy. In a 2.5-year ethnographic study, Boyd (2008a) found that
teens mostly care about horizontal privacy and use various privacy settings to
mitigate threats arising from other users. The studied users were well aware of the
privacy challenges arising from other users they encountered while using Myspace
or Facebook. However, Boyd also found that her participants oftentimes did not
know how to use privacy settings that would help to mitigate those threats. Raynes-
Goldie (2010) conducted a similar year-long ethnographic study of young Facebook
users. She found that the participants generally cared a lot about their privacy
while using Facebook. However, they were primarily concerned about how to
manage inappropriate friend requests and about information being shared with their
bosses, or students they were teaching. In many in-depth interviews and through
observation, Raynes-Goldie found that these young adolescents were often quite
concerned about their “social privacy,” but considerably less concerned about how
Facebook and its partners might use their personal information.
Recently, Padyab, Päivärinta, Ståhlbröst, and Bergvall-Kåreborn (2016) con-
ducted an innovative study in which they confronted participants with inferences
based on their own Facebook data. In two consecutive studies, they presented
participants with a tool that allowed them to draw specific inferences from disclo-
sures. In focus-group interviews with 12 participants in total, the authors found that
participants were generally aware of what they disclosed on Facebook. However,
they became more aware and concerned about their privacy when they were
confronted with the tool. Some even expressed feelings of being shocked and
frightened because what the tool could do was completely new to them (p. 10).
In sum, being confronted with the possibilities of secondary data analysis made
participants more concerned and even scared. Many participants consequently stated
that they will be more cautious when disclosing personal information in the future.
From these findings, we can conclude that vertical privacy (or institutional
privacy) is something new for most people. It seems that awareness and knowledge
are often not yet developed and that individual privacy needs are not reflected with
regard to vertical privacy violations. Threats are most likely not even identified.
Accordingly, many questions remain to be answered. Do people actually perceive
privacy intrusions by website providers, institutions or governments as threats? How
do they perceive the new type of information flow? Furthermore, how do people
manage their vertical privacy? Are there new needs associated with vertical privacy?
I will consider some of these questions in more detail in Sect. 6.3.
Distinguishing between horizontal and vertical privacy in the context of media
use represents a major task for future research. With regard to the psychological
experience of privacy, we have to bear in mind that mediated communication takes
place in environments that are provided by large companies. Previous research has
often either investigated people’s perceptions and concerns about data collection
6.2 Potential Extensions for Theories of Privacy and Self-Disclosure 123
findings by Marwick & Boyd (2014), for example, show that individuals indeed
try to achieve privacy through relationship management: when absolute control
is not possible, risks may be lowered by sharing only with trusted others. This
view also fits well with the literature on self-disclosure, which suggests that trust
is indeed an important antecedent of disclosing (see Sect. 7.4.2). Teutsch, Masur,
and Trepte (2018) conducted qualitative interviews and found that the perceived
level of privacy in a communication is mainly dependent on the people that are
present in that situation. A high level of privacy is therefore perceived when these
people can be trusted. Based on these findings, trust seems to be a central aspect of
people’s privacy perceptions and has a pivotal role for achieving an appropriate flow
of information in networked environments.
In the previous two sections, I presented a literature review on privacy and self-
disclosure in the age of information and discussed three aspects that I deem
particularly important to consider for further theoretical development. In this third
section, I want to offer some further considerations on why theorizing and analyzing
privacy in networked environments is particularly challenging. These considerations
concern one aspect that can be subsumed under the following thesis: the speed of
recent technological progress often exceeds the time individuals need to become
aware of new threats or risks and, furthermore, to become knowledgeable about the
dynamics that affect their communication. In some cases—when privacy violations
occur on a horizontal level and are thus tangible and may cause severe negative
consequences—privacy management or seeking privacy emerges naturally (Acquisti
et al., 2015, p. 509). For example, if a friend posts an undesired picture of me
on Instagram, I can quickly tell him to remove it. Or if I do not want all of my
Facebook contacts to see one of my posts, I might change its visibility and restrict
access to selected friends. Thus, depending on the situation, my engagement in both
preventive and corrective privacy regulation behavior emerges naturally.
However, today, many privacy breaches that stem from the discussed information
capitalism and the growing interest of governments in monitoring citizens (see
Sect. 2.3.2) requires individuals to be quite knowledgeable and skilled at evaluating
their own privacy needs and consciously deciding how to handle their data in
networked environments. From an objective point of view, it even seems that privacy
protection is not feasible anymore. To ensure limited access to personal information,
one has to engage in sophisticated and difficult privacy management strategies
(Masur, Teutsch, & Trepte, 2017; Matzner et al., 2016).
From the user’s point of view, however, it is more complicated: Because society
and research fails to clearly formulate the threats stemming from vertical privacy
intrusions, potentially negative consequences of self-disclosure are too vague and
consequently not taken seriously, pushed aside and downplayed because people are
not able to relate to them, or simply require too much knowledge about data handling
practices and the information society in order to be conceivable. For the average
user, there remains only an elusive feeling that he or she should be concerned
without visible impact on his or her everyday life (Acquisti et al., 2015, p. 509).
As discussed above, many theories and empirical studies are based on the idea that
people weight the benefits and risks of disclosing information. But what if the risks
are simply to elusive and intangible? What if they are too abstract to be understood,
rendering a rationalized calculus improbable? In such a scenario, benefits of use
or disclosure may be the only antecedent factor guiding peoples’ behavior. The
126 6 Privacy and Self-Disclosure in the Age of Information
The first considerations allude to the recent stream of research that began investi-
gating the role of online privacy literacy in predicting people’s privacy regulation
behaviors. The argument can be formulated as follows: people are not able to act
rationally in the context of networked environments because they lack awareness of
and knowledge about potential threats, as well as the ability to connect these privacy
breaches with their own behaviors.
Although scholars have made great efforts in improving the conceptualization of
online privacy literacies, it has been argued recently that online privacy literacy has
to be understood as a combination of knowledge, skills, and behaviors in order to
function as a true enabler of individual self-determination (Masur, Teutsch, Dienlin,
& Trepte, 2017; Masur, Trepte, & Wolfers, 2018, May). People not only need
to be knowledgeable about different aspects of online privacy (such as vertical
information flows and economic interests); they also need to be able to identify the
subsequent risks, relate them to their personal use of specific online-services, reflect
on their current behavior, and reevaluate their own needs and finally learn new skills
2 The present work nonetheless assumes that people mostly act rationally and thus employ such a
privacy calculus. As noted already in the previous chapter, this general paradigm can be criticized.
I discuss this notion in more detail in Sect. 12.2.
6.3 Further Considerations and Implications 127
to be able to use the Internet and handle their data in accordance with their reflected
attitudes and needs (Masur, Teutsch, Dienlin, et al., 2017).3
In light of this, fostering privacy literacy becomes an important driver of users’
self-determination. Only by becoming more literate will users be able “to see
through the technological veil and make educated choices” (Debatin, 2011, p. 57).
However, an important requirement for increasing privacy literacy is making privacy
relevant for individual users. This is not as easy as it seems because people seem to
have few negative experiences when communicating in networked environments.
People experience uncertainty with regard to their online privacy because they gen-
erally lack negative experiences. A representative survey of the German population
revealed that Internet users barely experience any privacy violations (Trepte &
Masur, 2017b, p. 42). Based on 3278 participants, the authors found that the large
majority of people never had negative experiences such as identify theft, unwanted
information dissemination, or someone unintentionally gaining information about
them. The only negative experience that at least 56% of the participant had was
that they felt website providers asked for too much personal information, a privacy
breach that most people seem to accept nonetheless.
In light of these findings, we could argue that the lack of negative experiences
leaves people uncertain about whether their current online behaviors are actually
privacy-endangering. Some smaller studies, however, found significant effects of
negative experiences with privacy invasions on subsequent use of privacy settings
on SNSs. Debatin et al. (2009), for example, conducted an online-survey with
119 university students and found that people who did experience unwanted
advances, stalking, or harassment, damaging gossip or rumors, or personal data
being stolen/abused by others were more likely to change their Facebook privacy
settings. Trepte et al. (2014) similarly conducted a longitudinal online survey with
327 participants. They found that participants who had negative experiences with
hostile or aggressive messages were also those who disclosed less personal infor-
mation on their Facebook profiles 6 months later. However, negative experiences
were not related to social (i.e., use of privacy settings that regulate the content or
profile visibility) or psychological privacy behaviors (i.e., the willingness to discuss
sensitive topics on the SNS).
Although more research needs to investigate whether negative experiences
actually increase the likelihood that people engage in privacy regulation behaviors, it
3 Although research on online privacy literacy is still nascent, I strongly believe that increasing
knowledge, skills, reflection abilities, and motivation are pivotal for individuals to live self-
determined lives in line with their needs and hopes as well as for society in order to prevent unequal
power distribution between individual users and large companies aimed at exploiting them. I will
come back to this discussion in Sect. 13.2 when considering the societal and practical implications
of this work.
128 6 Privacy and Self-Disclosure in the Age of Information
seems nonetheless likely that many privacy invasions (and particularly those perpe-
trated by providers and institutions) do not lead to tangible negative consequences.
Users hence do not know whether they should be concerned or how to react. It
even seems that media coverage on the NSA scandal did not necessarily affect user
behavior. Preibusch (2015) found that users’ interest in privacy protection rose after
the Snowden revelations but returned to or even fell below original levels despite
continuing media coverage. He further found that there was no significant growth
in use of privacy-enhancing technologies. Yet, these findings contrast with results
from a study by Marthews and Tucker (2015) that suggests a different pattern. In
their paper, the authors used data from 12 countries on the search volume of select
keywords from before and after the Snowden revelations to analyze whether Google
users’ search behaviors changed as a result. They found that users generally used
less sensitive search terms, which the author saw as evidence for a chilling effect of
government surveillance. That said, it nonetheless seems that people do not want to
stop using privacy-invasive media and the lack of negative experiences might simply
make people accustomed to threats that are communicated by the media, but not felt
in their daily lives.
The central thesis of this book is that privacy and self-disclosure should be
investigated from a situational perspective. I argue that the changing characteristics
and circumstances of situations allow for better predictions of when people perceive
high levels of privacy and, in turn, feel able to self-disclose. In simple terms, I
argue that an individual’s perceived level of privacy directly relates to the specific
circumstances of the situation he or she is experiencing. However, this central claim
has several important implications and connected assumptions. In what follows, I
will advance the theory of situational privacy and self-disclosure. It is meant to
provide a framework for understanding privacy regulation processes, identifying
relevant factors and variables of privacy experiences in a given situation, predicting
privacy related behavior such as self-disclosure, and ultimately guiding research
designs.
Before I begin to develop the theory, it is important to understand what I mean
when I talk about situations. Section 7.1 thus serves as a justification for why I
believe that a situational perspective is warranted when investigating and predicting
fluctuating mental perceptions and continuously shifting behavior. Starting with
the basic ideas of the field theory and moving on to contemporary concepts of
person and environment interactions, I will conclude by providing a comprehensive
definition of the situation. Section 7.2 describes five basic suppositions on which the
theory rests. Afterwards, I will explain the three central components of the theory.
Section 7.3 focuses on what I refer to as pre-situational privacy regulation processes
which explain how situations are initiated or manipulated in order to fulfill certain
needs. Next, I will elaborate on situational privacy perceptions and self-disclosure
in Sect. 7.4. The major assumptions and tenets of the theory are outlined in this sec-
tion. In Sect. 7.5, I will describe post-situational evaluations processes and thereby
discuss how individuals’ evaluations of their privacy regulation behavior and self-
disclosure may influence future behaviors. Finally, I will provide a summary of the
theory and a step-by-step guide on how to apply the theory in Sect. 7.6.
1 Please note that I am citing primarily from the book Field theory in social science (Lewin, 1951).
However, the page indications refer to a German translation of the book (Lewin, 2012) that was
published by Huber.
7.1 Situations as Units of Analysis 133
B = F (P , E) (7.1)
2 Quite inconsistently, scholars have used both the term person factor and personal factor to refer
to person-related characteristics. With regard to environment-related characteristics, however, they
mostly used the term environmental factors. For reasons of consistency, I will use the terms
personal and environmental factors in the course of this work.
134 7 The Theory of Situational Privacy and Self-Disclosure
effect on human behavior. By taking a constructivist view, scholars argue that the
psychological experience of situations matters. An important premise is hence that
physical artifacts themselves have no agency in influencing the individual. Instead
physical cues are processed by the individual, rationally evaluated, and thereby
become driving or inhibiting factors of behavior. It is important to realize that our
own understanding of a situation (even as researchers) is the result of a constructive
and subjective process rather than an objective perception of some external reality.
Situations only affect thinking or behavior when they are perceived, processed, and
thus psychologically experienced by at least one individual (Rauthmann, Sherman,
& Funder, 2015, p. 367). This view was first expressed by Thomas and Thomas
(1928), who formulated famously:
If men define situations as real, they are real in their consequences. The total situation
will always contain more and less subjective factors, and the behavior reaction can be
studied only in connection with the whole context, i.e., the situation as it exists in verifiable,
objective terms, and as it has seemed to exist in terms of the interested persons (p. 572).
Yet such a perspective does not necessarily dismiss the physical reality because
it still assumes that people’s psychological experience of a situation is based on
consistent and somehow tangible external cues from the environment. Accordingly,
the Rauthmann, Sherman, and Funder (2015) also noted that situational concepts
differ with regard to the reality to which they refer. Situational concepts generally
can be classified according to three different realities (see also Block & Block,
1981, pp. 86–87). For example, some scholars define situations in terms of their
measurable physical cues. Such a conceptualization acknowledges a physico-
biological reality that is objective and independent of any individual perceptions.
According to Block and Block (1981), it can be described as the “infinitely
detailable, perceptually unfiltered and uninterpreted, sensorily available intakes by
the individual” (p. 86). Other scholars define situations by referring to a kind
of consensual reality that is socially construed and consensually accepted. Using
such a perspective, a situation is what people agree upon. The shared experience
hence creates the situation. Third, many definitions of situations refer to a solely
idiosyncratic (Rauthmann, Sherman, & Funder, 2015, p. 367) or functional reality
(Block & Block, 1981, p. 87). Such a perspective argues that only an individual’s
unique perception defines a situation. It is thus the most strict adoption of the
processing principle.
Finally, Rauthmann, Sherman, and Funder (2015) point toward an inherent
problem of most definitions. The authors argued that many research designs
need to use participants’ situational perceptions in order to measure information
about the environment. Such a variable, however, is nothing but another person
variable leaving attempts to examine person–environment transactions circular. The
circularity principle thus refers to the idea that persons and environments are in
principle conceptually and methodologically conflated. A clean separation between
person and situation (in the sense of the external environment) is hence not possible.
The authors argued that people’s perceptions and environmental characteristics are
confounded “when situations are defined or measured in terms of (i) people’s mental
136 7 The Theory of Situational Privacy and Self-Disclosure
these people, etc.). External factors refer to what Rauthmann, Sherman, and Funder
(2015) described as perceptions of physical cues of the environment (e.g., objects,
barriers, artifacts, available behavioral options).
Table 7.1 presents a systematic overview of all factors and organizes them on the
two proposed levels. Based on this categorization, one might wonder if there are
any non-situational environmental factors. However, this is not the case based on
the implied differentiation. For example, my gender will influence my behavior in
every situation. It is hence truly a non-situational factor. The fact that I do not have a
surveillance camera at my home might be considered a stable environmental factor,
but because I can go somewhere else where surveillance cameras are installed (e.g.,
a public place), external factors (under which the presence of surveillance cameras
would fall) must be considered situational. Likewise, the audience size on Facebook
(determined by the number of contacts I have) might be fairly stable for all my
status updates, but I can have a totally different audience as soon as I use another
application or even when I choose to restrict the visibility of my status update.
In sum, non-situational factors refer to those that affect behavior in all situations.
Situational factors, however, are all others and even those that remain stable within
a certain context, but change once the individual changes the context.
Differentiating these broad clusters of situational circumstances allows us to
grasp the entire diversity of situations through a limited number of dimensions.
Although more specific subdimensions are possible, I believe the proposed factor
categories present a reasonable framework for characterizing situations with enough
specificity. Hence, predicting variation in a certain behavior (in this case self-
disclosure) across situations becomes possible by identifying the combinations
of enforcing and inhibiting factors that theoretically should affect the respective
behavior in a given situation. This resembles to the approach by Omarzu (2000),
who denoted that “attempting to explain variation in self-disclosure across social
situations requires identifying variables that are constantly present in those differing
situations. To facilitate research, these variables preferably should be amenable to
experimental manipulations” (p. 177).
For the proposed theory, it is further important to understand when a situation
begins and when it ends. From a phenomenological point of view, we can state
that people experience an endless sequence of consecutive situations. However, we
cannot say that one situation has a certain duration. Instead, the temporal stability of
a situation depends on the stability of the situational circumstances. Sometimes the
situational factors influencing an individual’s behavior stay the same for several
minutes or even hours. Other times, they change within seconds. From this it
138 7 The Theory of Situational Privacy and Self-Disclosure
follows that a person experiences a new situation as soon as any of the situational
factors changes. For example, when a third person enters a room in which two
persons are already communicating, the interpersonal factors have changed. The
two persons thus experience a new situation. Or, put differently, a new combination
of personal and environmental factors now influences their behavior. In sum, as soon
as any personal or environmental factor changes, new situational circumstances are
created, and thus a new situation evolves.
On a final note and to simplify usage, I hereafter use the predicate situational in
order to describe something as potentially varying across situations. This does not
mean that such factors have to change from one situation to the next. I rather want
to emphasize that these factors can be different. In contrast, non-situational is used
to describe something that is stable and independent of situations.
The following five consecutive suppositions are derived from the literature presented
in the previous chapters and thus represent the core insights of the distinct attempts
to understand privacy and self-disclosure from a psychological perspective.
Supposition 1:
The level of privacy is determined by
the perception of the environment and is thus situational.
This is the central tenet of the proposed theory. It must therefore be regarded
as the fundamental basis for all following suppositions. As should be apparent
through the discussion of the theoretical work presented in Chaps. 3 and 5, the
assumption that the level of privacy is inherently situational is not new. Perhaps
most explicitly, Laufer and Wolfe (1977) argued that “concepts of privacy and
invasions of privacy are strongly tied to or defined by the experience of given
situations” (p. 25). According to them, any privacy experience must depend on
how individuals interact and comprehend the world in which they live. As these
experiences are inevitably bound to “the modes of consciousness available for
conceptualizing concrete situations” (p. 25), aspects of privacy must reflect the
7.2 Overview of the Theory 139
(see supposition 4). It is important to emphasize here, however, that the perception
of environmental factors may not necessarily be understood or seen as a certain
level of privacy by individuals. As suggested by qualitative research (e.g., Nippert-
Eng, 2010; Teutsch, Masur, & Trepte, 2018; Vasalou, Joinson, & Houghton, 2015),
people may associate various things with the term privacy and may not evaluate
a certain combination of environmental factors as a specific level of privacy.
Nippert-Eng (2010), for example, found three reoccurring themes in people’s
definitions of privacy: (1) the ability or power to control access to a thing, place,
or piece of information, (2) the condition of being alone, without others’ demands,
interruptions, intrusions, and (3) the freedom to do, live, or make decisions, without
regulation or restriction (p. 7). Teutsch et al. (2018) also found that people often
think of private things (e.g., feelings, family affairs, relationships, etc.) or territories
(e.g., the home, rooms, etc.). It seems that there exists great variability in how people
define privacy for themselves. Although some aspects can be linked to the proposed
concept of privacy, it is nonetheless important to take into account that different
people may not articulate the combination of external factors as the same level of
privacy. However, from a scientific point of view, I believe it to be fruitful to look
at it in this way: certain combinations of environmental factors imply a certain level
of privacy.
Supposition 2:
A certain level of privacy is needed to satisfy more fundamental
needs or to perform behaviors (e.g., self-disclosure) necessary
to satisfy fundamental needs.
This assumption has been thoroughly discussed in Chaps. 3 and 5. However, I
would like to highlight some specific implications that are important for the present
theory. First of all, it is important to acknowledge that people have fundamental
needs (e.g., the need for autonomy, competence, relatedness, or social interaction).
Some of these needs require a certain level of privacy to be satisfied. In some cases,
these needs even require individuals to perform a certain behavior, which, in turn,
requires a certain level of privacy. The latter is particularly the case when people
want to disclose themselves (see Sect. 5.3.2).
As assumed by many theories of self-disclosure and supported by empirical
research, people disclose themselves in order to initiate or maintain relationships,
to cope with certain events or experiences, or to clarify and validate their identity.
Broadly speaking, they often seek relatedness with other people in order to ensure
their personal well-being. However, disclosing oneself means sharing private infor-
mation and accepting inherent risks such as misuse or rejection by the recipient(s).
Whether the level of privacy is appropriate or not thus depends on our assessment
of the potential recipients and the protection against unwanted access by other
people and entities in that situation. For example, I would rather disclose personal
information to a friend than to a complete stranger. Likewise, I am more willing to
share a personally traumatic episode with my family than with my work colleagues.
We can thus assume that the person(s) in a given situation should have some sort
7.2 Overview of the Theory 141
of relationship to the discloser. At the very least, the recipients of our disclosures
should be rated as trustworthy.3
This is reflected in most privacy and self-disclosure theories. Westin (1967), for
example, expressed a similar view by suggesting that privacy in the form of small-
group intimacy allows for limited and protected communication (Westin, 1967).
Jourard (1971a) similarly argued that self-disclosure depends on an attitude of trust
and love. Further, Omarzu (2000) emphasized that individuals need to evaluate the
appropriateness of the target person. Petronio (2002) likewise argued that people
build privacy boundaries with other people in which information may circulate
based on certain rules. Finally, the concept of “networked privacy” (Marwick
& Boyd, 2014) also acknowledges that people negotiate rules for information
dissemination. In sum, we can posit that people need to be private in order to be
able to perform self-disclosure. The need for privacy is hence evoked by different,
more fundamental needs.
Supposition 3:
The level of self-disclosure is determined by personal factors
and the perceived level of privacy.
This supposition consolidates the previous two suppositions according to the
definition of the situation described in Sect. 7.1.3. Accordingly, behavior depends on
non-situational and situational personal factors as well as situational environmental
factors. In more abstract terms, behavior (B) is a function of the person (P ) and the
environment (E).
With supposition 2, I posit that people need a certain level of privacy in order to
be able to self-disclose. Supposition 1 further posits that the perception of certain
interpersonal and external factors determines the level of privacy. We can thus
derive that perceptions of the interpersonal and external factors of the environment
affect self-disclosure. More specifically, we can say that a specific combination of
environmental factors represents a certain level of privacy which, in turn, either
allows for or inhibits self-disclosure. Thus, when both external and interpersonal
factors provide protection against identification and unwanted access by other
people or third parties, people feel able to self-disclose. In contrast, when people
are identifiable and many people or companies have access to their communication,
people feel less able to self-disclose. That said, the level of self-disclosure must be
regarded as a linear function of the level of privacy: with higher perceived privacy,
individuals also feel able to engage in higher levels of self-disclosure and vice versa.
This aligns well with the theories of Petronio (2002) and Dienlin (2015) as explained
in Chap. 5: the individual feels particularly able to self-disclose under conditions of
in this regard. A complete stranger might generally be perceived as nonthreatening because the
discloser assumes that this stranger may simply not affect his or her life after their meeting. At the
same time, when the discloser has chosen not to reveal his or her name or any other identifying
information, he or she has actively controlled the level of privacy (in the form of anonymity), thus
allowing him or her to disclose himself without risks.
142 7 The Theory of Situational Privacy and Self-Disclosure
high privacy (or in Petronio’s terms: in functioning privacy boundaries), yet ceases
to disclose under conditions of low privacy.
The level of self-disclosure—in line with the level of privacy—is hence situa-
tional. Again, this idea is not new (see Chap. 4). In 1973, Pearce and Sharp argued
that treating self-disclosure as a trait may fail to account for the dynamic nature of
such a behavior. Based on a transactional view of communication, they noted that
“people are not the same in different communication contexts” (Pearce & Sharp,
1973, p. 412). They further argued that such a view on self-disclosure deprecates
many studies conducted at the time that sought to identify high and low disclosers
and associate those with other personality variables (p. 413).
However, people do not simply disclose because the environmental circum-
stances provide them with the opportunity to do so. Of course, they further have
to be motivated to disclose themselves. We know that self-disclosure is driven by
the need to achieve certain goals (see again Sect. 4.2). Omarzu (2000) argued that
“cues within a situation may make a certain goal salient” (p. 178). Yet these needs
can also be stable across several situations (Omarzu, 2000, p. 178). Hence, next to
environmental factors, a number of personal factors are important drivers of self-
disclosure. These can be differentiated into non-situational (e.g., personality and
other trait-like characteristics) and situational factors (e.g., situationally cued goals
or feelings). Empirical research has shown that there are several personality traits
that make people disclose more. As previously discussed in Chap. 6, certain skills
and knowledge may also influence individuals’ willingness to self-disclose.
That said, personal factors not only directly influence the willingness to engage
in self-disclosure, they may also influence the way in which people perceive
environmental factors. As already noted in supposition 1, online privacy literacy
may be an important personal characteristic that determines whether people are able
to identify environmental factors that affect the level of vertical privacy. Similarly,
certain personality facets (e.g., risk avoidance) can make people attuned to such
evaluations. Accordingly, we can summarize that the level of self-disclosure is
determined by non-situational (traits and trait-like characteristics) and situational
personal factors (internal factors), situational environmental factors (external and
interpersonal), and their interaction in any given situation.
Supposition 4:
People seek certain levels of privacy (to be able to self-disclose)
by choosing and manipulating certain environments.
In supposition 1, I said that environmental factors determine the level of
privacy. Supposition 2 further posits that certain levels of privacy are needed to
satisfy fundamental needs or to perform behaviors that lead to the satisfaction
of fundamental needs (e.g., self-disclosure). We can hence assume that people
actively seek certain levels of privacy (see also the theoretical argument by Johnson,
1974). As described earlier, Westin (1967) noted that “individuals are constantly
engaged in an attempt to find sufficient privacy to serve [. . . ] their individual needs
of the moment” (p. 44). As shown by the literature on online privacy regulation
7.2 Overview of the Theory 143
(Sect. 6.1.5), individuals indeed actively seek specific environments and aim at
manipulating these environments in correspondence to their desired level of privacy.
These pre-situational privacy regulation processes thus actively shape the envi-
ronmental factors of a given situation. External factors can further be differentiated
into those that can be manipulated by the individual (e.g., an individual can
sometimes decide whether to use encryption for a specific online communication)
and those that are non-manipulable (e.g., encryption by default or inevitable
surveillance by CCTV cameras). Interpersonal factors can similarly be distinguished
into those that are manipulable (e.g., excluding certain audiences by using friend
lists) and those that are not manipulable (e.g., when the audience is simply given).
In sum, the results of previous privacy regulation behaviors become environ-
mental factors in the subsequent situation. The theory hence proposes, similarly
to Laufer, Proshansky, and Wolfe (1973), that privacy is a condition that can be
achieved through controlling the environment (but simultaneously also provides the
circumstances for being in control).
Supposition 5:
People evaluate the effectiveness of their privacy regulation,
the accuracy of their environmental assessment,
and the outcome of their self-disclosures.
This last supposition refers to potential pitfalls in the described process. As
Johnson (1974) argued, much of the stress related to privacy decisions stems from
the uncertain relationship between privacy control behavior and need-satisfying
outcomes (p. 93). People often do not know whether their preventive privacy regu-
lation was appropriate to avoid risks of self-disclosure. Similar, their interpersonal
assessments of the potential recipients can be inaccurate. Finally, self-disclosure
itself can be ineffective in providing the desired need satisfaction.
I hence propose that individuals engage in three types of evaluation processes.
First, they evaluate the effectiveness of their privacy regulation behaviors, that is, to
what extent the pre-situational manipulation of a situation enabled them to engage
in self-disclosure. If the privacy regulation was not successful, several boundary
turbulences or even privacy violations may occur (Sect. 5.1). Such an experience
influences individuals’ future pre-situational privacy regulation processes. Second,
they evaluate the accuracy of their interpersonal assessments, that is, to what extent
recipients acted as expected. If a trusted person nonetheless disseminates private
information to unwanted audiences, an individual might not disclose to this person
in the future. The interpersonal assessment thus changes. Third, individuals evaluate
whether disclosing in such a situation allowed them to achieved their initial goal
(e.g., relationship initiation, social validation, and so on). This evaluation then
influences future situations and in particular what situations individuals perceive
as suitable for need satisfaction through self-disclosure.
Using a similar rationale to Chaudoir and Fisher (2010), I thus argue that self-
disclosure events have certain long-term consequences, which in turn, influence
antecedent goals of future situations or affect the ways people use certain privacy
regulation strategies and adapt their levels of self-disclosure to similar situa-
144 7 The Theory of Situational Privacy and Self-Disclosure
tions. This supposition thus also implies that privacy and self-disclosure decision
processes have a developmental character (see also Wolfe & Laufer, 1974). By
experiencing situations and particularly unexpected privacy intrusions, people learn
how to manage their privacy more effectively in future situations.
forces that are activated by situational cues. For example, if I generally feel alone,
it is very likely that my thoughts almost always circle around this problem and I
consequently constantly experience the need to be in an intimate relationship with
another person. However, sometimes such a goal is not of such a chronic nature and
is only activated in certain situations. For example, it is only made salient when an
attractive person is present.
In this manner, different needs constantly influence our behavior. Sometimes, we
are thrown into certain situations and can only evaluate whether the circumstances
actually allow for the pressing satisfaction of the salient need. However, in many
cases, we are able to seek out or actively initiate and control those situations that
enable us to satisfy the more fundamental needs. As the focus of this work is on
the relationship between privacy and self-disclosure, I focus on needs that can be
obtained by disclosing to other people and therefore require conditions of privacy.
When control over situational circumstance can be exerted, people often engage
in what I have previously called preventive privacy regulation (Sect. 6.1.5). It is
important to understand that pre-situational privacy regulation only allows us to
influence the environmental factors of a situation and even those in most cases only
to a certain degree. Person factors (that pertain to the individual himself or herself),
on the other hand, are less susceptible to individual manipulation. In the following, I
focus on two types of preventive privacy regulation strategies that can be understood
as a two-step process toward controlling future situations in which the individual
wants to disclose. The first step is to simply to choose a certain environment. The
second refers to adapting this environment to the specific purpose of disclosing
private information.
In Sect. 6.1.5, I noted that we need to distinguish between long-term or short-term
preventive privacy regulation behaviors. Such a temporal perspective is specifically
important when investigating mediated communication as people mostly choose to
adopt a certain communication technology at one point in time and consequently
use it for a certain type of interaction again and again. However, people oftentimes
also decide what communication technology (of those they chose to adopt earlier)
they want to use situationally. When the salient goal is to engage in self-disclosure
in order to fulfill more fundamental needs such as relationship development or
maintenance, coping and release of tension, or identity clarification and validation
(Sect. 4.2), people may decide situationally what environments are best to satisfy
their salient needs.
and especially when knowledge and experience are limited, trust in the provider
itself may be the only option left for choosing between different environments.
This selection process involves two important aspects: As the goal is to control
the environmental factors of a situation, it includes the control of interpersonal and
external factors (controlling both the people and physical characteristics). However,
these groups of factors can seldom be manipulated independently of each other.
In fact, they are often inseparable, as choosing a certain environment necessarily
affects both types of factors. In general, people seem to prefer offline environments
for self-disclosure compared to online environments (Teutsch et al., 2018). In the
next section, I will consequently discuss the selection of certain non-mediated
environments as a form of preventive privacy regulation. However, the variety
of online communication platforms also allows individuals to choose between
communication channels with different levels of privacy and is thus an invaluable
form of privacy regulation in the age of information.
A first step refers to the active controlling of the potential audience of one’s
disclosures. In face-to-face settings, this is often achieved by withdrawing from a
greater public into small-group seclusion (Westin, 1967). Individuals may simply
walk away from crowds to a place where nobody can overhear their conversations
(or, more broadly speaking, where nobody has access to them). It can also mean to
tell unwanted audiences to go away. Asking people to leave us alone indeed is an
acceptable behavior in many situations.
Teutsch et al. (2018) found that in qualitative interviews, participants often
reported actively seeking “private offline spaces” for communicating intimacies.
The authors note: “Our participants stated that they manage physical and social
boundaries in face-to-face communication by excluding unintended audiences. This
is achieved by meeting in protected spaces such as in one’s bedroom. However,
privacy can also be found in the anonymity of a crowded city center, in a quiet
corner of a café, or during a walk in the park.”
Various offline environments not only exclude unwanted audiences, but also
provide certain barriers against surveillance or other forms of intrusion. Sometimes
they literally supply physical protection (e.g., in the form of walls or fences), and
other times also protection against non-physical intrusion (e.g., a certain safety
against digital interception or surveillance). Choosing a non-mediated environment
is naturally the best way to safeguard one’s vertical privacy. As described in Chap. 2,
such privacy intrusions originate from the transformation of information into bits.
The easiest way of preventing such intrusion is hence to avoid this transformation
and consequently the recording and storing of information.
148 7 The Theory of Situational Privacy and Self-Disclosure
After choosing a certain environment, people may further fine-tune their privacy.
This second step in the pre-situational privacy regulation process thus refers to using
the available options in a chosen environment to further enhance protection against
certain privacy intrusions. In general, people try to prevent two different types of
intrusions: first, they try to avoid being identified by other people and providers,
and second, they try to limit the visibility or accessibility of the content of their
communications.
As noted above, the number of available options depends on the setting or
communication technology that has been chosen. In the case of mediated com-
munication, these options depend on the communication technology that is used.4
Facebook, for example, offers different privacy settings than Twitter or Instagram.
Threema has other privacy regulation features than WhatsApp. Yet, even in certain
offline environments, a more fine-grained privacy tuning is possible. It is important
to note that these options for privacy regulation become particularly important in
environments that imply a certain publicness. Specifically in networked publics,
individuals need to find ways to protect their information from reaching unwanted
audiences (as described in Sect. 2.3.1).
That said, most privacy settings within a certain communication technology only
allow us to safeguard horizontal privacy. Apart from some sophisticated strategies,
they mostly do not protect individuals’ data from being collected, aggregated,
analyzed, and sold by providers and third parties. It is hence important to distinguish
between privacy regulation features that enable control over horizontal privacy,
vertical privacy or both.
4 In the following, I am describing several privacy options of services such as Facebook, Twitter,
Instagram, WhatsApp, and many more. Throughout the history of these services, the respective
privacy settings have constantly changed. My description represents the status quo of these settings
in January 2017. Due to the short lifespan of these features, this description may soon become
outdated; however, I believe the overall aims associated with these privacy settings will likely
remain the same.
150 7 The Theory of Situational Privacy and Self-Disclosure
The theory of situational privacy and self-disclosure is primarily about how the
prevailing circumstances of a situation affect self-disclosure. For the purpose of
this theory, it is important to understand self-disclosure as the deliberate sharing of
information about the self with one or more persons. Two notions are important
here. First, self-disclosure is defined as a deliberate and conscious behavior. In
doing so, I refer to the existing literature of self-disclosure, which posits that self-
disclosure is primarily a goal-directed behavior. Second, such a definition allows
to operationalize the level of self-disclosure with regard to the three proposed
dimensions breadth, depth, and duration (Cozby, 1973, p. 75). Depth of self-
disclosure, for example, may be assessed by asking the discloser how private the
shared information is for him or her. I use the term private as defined by Rössler
(2001, p. 136): information about the self is regarded as private when one wants to
control the access to it. It is important to note that I do not restrict self-disclosure to
152 7 The Theory of Situational Privacy and Self-Disclosure
the verbal revealing of private information. Self-Disclosure may also happen when
an individual shares pictures or other things that might reveal something about him-
or herself.
The level of privateness of different information about the self varies consider-
ably. A substantive amount of empirical work shows that the willingness to disclose
differs greatly depending on the type of information (e.g., Jourard, 1971b; Miller,
Berg, & Archer, 1983). To name one example, fears and concerns are rated as much
more private than, for example, political, ethical, and religious opinions. Personal
interests or hobbies, on the other end, are mostly not rated as very private (Masur
& Scharkow, 2016, p. 7). Accordingly, the definition of self-disclosure I use here
differs from the one proposed by Petronio (2002) because it incorporates all types
of information that reveal something about the discloser being limited to information
that is particularly sensitive.
Based on the definition of the situation provided above, we have to acknowledge
that potentially innumerable factors in all proposed factors categories may influence
self-disclosure. Naming and discussing all of them would be beyond the scope
of this work and, more important, also unnecessary. We only need to know a
limited number of important factors in all suggested factor categories in order to
successfully explain and predict situational self-disclosure.
As noted before, these factors can be differentiated among several dimensions.
First, we have to distinguish between those factors that vary across situations
and those that remain stable. Second, we can differentiate between those factors
that relate to the person (i.e., the discloser), and those factors that relate to the
environment. Personal factors, in turn, can be categorized into personality facets
and trait-like characteristics on the one hand, and situational needs and feelings on
the other. Environmental factors can further be distinguished in interpersonal and
external factors.
In the following, I will discuss each group of factors and their effects on self-
disclosure separately. However, in doing so, two aspects have to be taken into
account. First, we have to acknowledge that these clusters include both inhibiting
and enforcing factors. A situation thus confronts the individual with a dynamic
set of forces that on the one hand enable individuals to self-disclose and on the
other restrict the opportunity to fulfill the need to self-disclose. These positive and
negative tensions may pose a conflict to the individual, for he or she has to decide
rationally whether to dismiss the risks of satisfying the prevailing need. At other
times, these contradicting forces may simply cancel each other out.
Next, I want to stress again that I theoretically understand the specific combi-
nation of the environmental factors at a given time as the level of privacy that an
individual perceives. Put simply, the presence, specific form, and value of these
factors determine the level of privacy in a situation. From this it follows that the mere
perception of these environmental factors—no matter if associated with a somehow
abstract and individual concept of privacy or not—together with the personal factors
at a given time directly influence the likelihood of an individual’s self-disclosure.
7.4 Situational Privacy Perception and Self-Disclosure Processes 153
said, we have to bear in mind that those studies often tried to explain aggregated self-
disclosure and seldom investigated the influence of non-situational personal factors
on self-disclosure in specific situations (e.g., in an experimental design). As such,
we may only find hints about how these characteristics impact situational behavior.
Although I am focusing primarily on personal factors that affect self-disclosure,
it is important to bear in mind that the same personal factors also explain why people
engage in privacy regulation behaviors beforehand. The following personal factors
may thus both directly and indirectly influences the likelihood of self-disclosure. I
will highlight indirect processes when applicable.
7.4.1.1 Personality
In broad terms, personality refers to the idea that individuals can be characterized by
a number of unique psychological facets that in theory influence their characteristic
behaviors in many situations and over a longer period of time. Generally, many
different personality characteristics can be differentiated. Today, most scholars
nonetheless seem to agree that the structure of personality can be described by
five basic factors: neuroticism, extroversion, openness, agreeableness, and consci-
entiousness (e.g., Costa & McCrae, 1976, 1992a; Goldberg, 1981, 1990; Tupes
& Christal, 1992). However, this five-factor model is not meant to replace more
specific facets. Rather, it provides a sort of taxonomy that classifies the various
characteristics and subfacets into broad clusters (e.g., Costa & McCrae, 1992b).
It is important to note, however, that investigating particularly the ‘Big Five’
and their effects on self-disclosure is somewhat arbitrary as other personality
models or individual differences can similarly be incorporated into the theory.
For example, a person with a low self-esteem may feel less comfortable with
disclosing his or her true self. Similarly, a person with alexithymia—the inability
to express emotions—may experience difficulty in disclosing feelings or concerns
(e.g., Loiselle & Dawson, 1988; Páez, Velasco, & González, 1999). That said, I
believe it is fruitful to investigate the potential of certain personality facets of the big
five inventory to influence privacy regulation behaviors and self-disclosure because
there are already some theoretical approaches and also empirical studies that have
analyzed relationships between such facets and general privacy-related measures
such as the need for privacy or privacy concerns.
For example, people scoring high on neuroticism tend to be more worried,
experience more anger, feel discouraged more often, are generally more self-
conscious, and often feel vulnerable (Costa & McCrae, 1992b). Junglas, Johnson,
and Spitzmüller (2008) therefrom reasoned that emotionally unstable individuals
are more worried and concerned about their privacy because they are more likely
to appraise the risks than the potential benefits in a situation (p. 392). In their
survey study with 550 student participants, they nonetheless did not find a significant
relationship between neuroticism and privacy concerns. Based on a survey study
with 296 university students, Dienlin and Metzger (2017) found that anxiety (a sub-
dimension of neuroticism) did not relate to the desire for anonymity or interpersonal
7.4 Situational Privacy Perception and Self-Disclosure Processes 155
privacy. With regard to the effect on self-disclosure, Pedersen and Breglio (1968)
found—based on a survey of 52 students—that males with higher neuroticism
counterintuitively were more likely to disclose aspects of their personality and
describe their physical appearance. Thus there is hence only preliminary and only
survey-based evidence that neuroticism actually influences self-disclosure.
Extroversion refers to the tendency to be outgoing, energetic, and dominant
(Junglas et al., 2008). People with high extroversion are more gregarious, generally
more positive and seek a certain level of excitement (Costa & McCrae, 1992b).
Scholars have thus reasoned that extroverted individuals desire less privacy (e.g.,
Dienlin & Metzger, 2017; Junglas et al., 2008). In their study, Junglas et al. (2008)
again did not find such an effect. However, based on an experiment with 95 adults,
Lu, Tan, and Hui (2004) did find that people with higher extroversion were less
concerned about their privacy and more likely to disclose personal information.
Similarly, Dienlin and Metzger (2017) found that shy people (a subfacet of reversed
extroversion) desired more interpersonal privacy and anonymity. They might hence
employ more privacy regulation strategies and also disclose less private information.
Open people are less bound to habits, try out new things, and are generally
excited by things they do not know yet. Two hypotheses have been proposed
about open people’s approaches to privacy regulation and self-disclosure. First,
people scoring high on openness may tend to discard the risks associated with
new behaviors. They should thus be more inclined to desire less privacy and to
disclose themselves more. On the other hand, it may be argued that open people
generally have richer life experiences due to their curiosity and have thus learned
and become more aware of privacy issues. Results are mixed. If measured as a
tendency to discard risks, openness is indeed a significant negative predictor of the
desire for interpersonal privacy (Dienlin & Metzger, 2017). Measured more broadly,
however, openness has positively predicted privacy concerns (Junglas et al., 2008)
thus contradicting the results obtained by Dienlin and Metzger.
Individuals scoring high on conscientiousness tend to have a high self-discipline
and are deliberate in what they are doing (Costa & McCrae, 1992b). It has thus
been argued that such people should show higher privacy concern because they are
more methodical in assessing situations and risks (Junglas et al., 2008, p. 392).
The empirical findings in study of Junglas et al. support this finding, suggesting the
conscientious people are more inclined to use privacy regulation behaviors to initiate
or seek safe environments and also generally disclose less private information.
From a general point of view, it thus seems that personality factors do dif-
ferentiate people with regard to their desire for certain conditions of privacy and
their general willingness to self-disclose. In this sense, the studies presented above
built upon the classical research on the need for privacy and self-disclosure as
traits. However, research on the influence of personality on specifically situational
behavior is scarce. Based on the rationales described above, we may nonetheless
assume that particularly people who score high on extroversion and openness to new
experiences, and those who score lower on conscientiousness are generally more
likely to engage in self-disclosure. However, as the conflicting findings of Junglas
et al. (2008) and Dienlin and Metzger (2017) show, it remains unclear how specific
156 7 The Theory of Situational Privacy and Self-Disclosure
privacy). As denoted before, research suggests people are generally less concerned
about vertical privacy intrusions (e.g., Raynes-Goldie, 2010).
Consequently, it seems plausible to assume that if horizontal privacy concerns
arise, they may negatively affect the likelihood of self-disclosure. However, even
here we have to keep in mind that based on the interpersonal assessment of the
recipients as described in the next sections, people might not be concerned that
potential recipients will actually put their privacy at risk. Vertical privacy concerns,
on the other hand, may have a lower effect on self-disclosure as there seems
to be great uncertainty about whether data collection practices of providers and
institutions actually pose a threat to the individual (see again Chap. 6). That said,
it remains unclear how horizontal and vertical privacy concerns relate to each other
and whether they interact in predicting situational self-disclosure. From a general
perspective, however, it seems plausible that both concerns are highly correlated.
Higher vertical privacy concerns may further positively affect the influence of
external factors on self-disclosure.
Based on the literature review in the previous chapter, another individual charac-
teristic might be pivotal in determining how an individual behaves in a certain
situation and whether concerns have an impact on this behavior. Perceiving threats
in a situation and thus rightly assessing environmental factors that should inhibit
certain behavior requires knowledge about these threats and, in the case of privacy
and self-disclosure, knowledge about the environment in which one self-discloses.
Particularly in networked environments, people need to know how information is
handled by providers, by whom it can be accessed, and how it may flow across
platforms and invisible boundaries. This knowledge is pivotal for a comprehensive
assessment of the situation. Consequently, online privacy literacy should in principle
make people less willing to disclose personal information.
Research, however, has shown that people who know more about institutional
practices of data collection, technical aspects of data protection, data protection law
and data protections strategies are also more likely to use certain privacy protection
strategies (e.g., using pseudonyms or encryption), but do not necessarily disclose
less (Masur, Teutsch, & Trepte, 2017; Park, 2013). Recently, Bartsch and Dienlin
(2016) conducted a survey study with 630 participants and found that subjectively
perceived higher privacy literacy was positively related to the implementation of
privacy regulation behavior on Facebook. Hence, although higher online privacy
literacy can be regarded as an inhibiting factor for self-disclosure, it is even more
likely that it is a requirement for effective privacy regulation. Privacy literacy
provides the necessary knowledge and skills to choose or manipulate situations
instead of fostering more deliberate self-disclosure. The results from the meta-
analysis by Baruh et al. (2017) again support this rationale, as privacy literacy
generally relates positively to the use of privacy settings on SNSs. Nonetheless, it
may make people more aware of potential threats arising from institutional data
158 7 The Theory of Situational Privacy and Self-Disclosure
collection practices and thus render vertical privacy concerns more effective in
determining the level of self-disclosure.
An additional moderating effect may be detectable for higher online privacy
literacy. The more a person knows about how his or her data is used, the more likely
it will be that the level of protection against identification and content accessibility
affects his or her self-disclosure.
As argued before, certain cues within a situation may make certain needs more
salient and the corresponding need satisfaction more urgent (Omarzu, 2000, p. 178).
Yet people also have stable needs that they bring into any new situation. These needs
can be closely related to the personality of an individual. For example, introverted
people may have a higher need to belong because they are too shy to socialize.
With regard to situational privacy and self-disclosure, we can differentiate two
groups of needs. First, there are a number of goals that positively influence the
willingness to self-disclose in different situations, and second, there are likewise a
number of goals that inhibit such a behavior. Chaudoir and Fisher (2010) similarly
distinguished between approach-focused goals and avoidance-focused goals of
self-disclosure. Some people are more focused on establishing relationships or
experiencing intimacy, while others are more likely to prevent negative outcomes
such as social rejection, conflicts, and anxiety. Omarzu (2000) provides a great
example that exemplifies well that some needs are so chronic that they drive human
behavior in any situation: “A person who desperately wants to achieve intimacy with
another [person] may bring this motivation to every situation encountered, whether
or not the appropriate cues are present” (p. 178). Such a person might try to engage
in a conversation with other people regardless of the situational circumstances.
Such a chronic need to belong has been studied intensively in the psychological
literature. It refers to human being’s “pervasive drive to form and maintain at least
a minimum quantity of lasting, positive, and significant interpersonal relationships”
(Baumeister & Leary, 1995, p. 497). In order to satisfy this need, people need to
interact with other people. As described in Sect. 4.2.2, they particularly have to
engage in self-disclosure in order to initiate and, in turn, maintain relationships with
other people. Although regarded as a fundamental need, the need to belong is not
necessarily equally strong in each individual. In several survey studies, a higher need
to belong was related to grooming behavior on SNSs (Utz, Tanis, & Vermeulen,
2012, p. 39), and to depth of self-disclosure in status updates (Winter et al., 2014,
p. 199).
We thus have to acknowledge that several needs can be stable and strong drivers
of human behaviors in every situation. With regard to the general willingness to self-
disclose, we hence have to bear in mind that people differ with regard to their need to
belong, their need to experience intimacy with other people, their need to be socially
accepted, their feelings of loneliness and so on. These chronically accessible needs
are likely to explain both why people behave similarly in different environments
7.4 Situational Privacy Perception and Self-Disclosure Processes 159
and also why certain environmental factors are less influential for some people than
for others. Again, we have to bear in mind that such stable needs (like all other
non-situational personal factors) can only explain how people differ with regard to
their average self-disclosure and not why a given individual’s behavior varies across
situations.
The general assumption is that different types of needs evoke different levels of self-
disclosure. The higher the need to self-disclose (that is, to share private information),
the more an individual will consequently disclose. Again, it is important to bear
in mind that these needs may be the same needs that drive people to engage in
privacy regulation behavior just before the actual communication takes place. But
oftentimes they are also activated by situational cues (Omarzu, 2000, p. 178). It is
thus also possible for several needs to affect a person’s behavior at the same time.
In Sect. 4.2, I outlined what particular needs and goals drive self-disclosure.
I further explained that these goals are different in dyadic and one-to-many
interactions. Based on the functional theory of self-disclosure (Derlega & Grzelak,
1979), we can nonetheless posit that people generally try to achieve five broad
goals: relationship initiation or maintenance (that is, intimacy with others), social
approval, emotional relief, social control, and identity clarification or development.
As Omarzu (2000) noted (by citing Baumeister, 1982), if no other goal is present,
160 7 The Theory of Situational Privacy and Self-Disclosure
people generally strive to be accepted and liked by others (p. 178). Social approval
is hence a default need that is salient in any situations. But as situations are complex,
different needs may be salient and hence affect the level of self-disclosure.
Existing theories of self-disclosure remain quite vague with regard to how
exactly different needs affect the level of self-disclosure. It seems plausible that
the achievement of different goals also requires the individual to disclose different
types of personal information, thus influencing the level of self-disclosure on all
three dimensions. For example, someone who seeks social approval on Facebook
may increase the breadth of his or her disclosures by showing different aspects of
his or her life through photographs, yet at the same time not exceeding a certain
depth of self-disclosure by taking care that no sensitive information is included in
the pictures.
A recent study conducted by Bazarova and Choi (2014) showed how self-
disclosure goals affect the depth of self-disclosure on SNSs. The authors conducted
a content analysis of 1295 messages including status updates, wall posts, and private
messages that were contributed by 81 participants. They coded these messages
for goals that were closely related to those proposed by Derlega and Grzelak
(1979) and found that participants tried to achieve different goals in different
channels. Different goals were further associated with different depths of self-
disclosure. Whereas goals pursued in status updates were mostly related to social
validation, wall posts and in particular private messages were used more frequently
for relationship development as well as social validation (p. 12). As expected,
messages that were coded as including relationship-related goals were also coded
as containing more intimate information and thus deeper self-disclosure.
Although more research is needed to clarify which goals affect self-disclosure
and in what ways, we can nonetheless conclude that the higher a need associated
with self-disclosure is perceived, the more likely it is that individuals also engage
in deeper self-disclosure. More important, it seems apt to investigate more closely
whether there are needs that require higher levels of privacy in order to be fulfilled
through self-disclosure. Based on the existing literature, for example, goals such as
relationships maintenance, for example, require deep levels of self-disclosure that
can only be performed in situations that are perceived as particularly safe, including
face-to-face situations, dyadic interactions in situations where no other audience is
present (e.g., in a instant messenger chat), and so on. Other goals such as identity
clarification or social approval require less depth of self-disclosure and may thus
be pursued also in public or semi-publics environments (e.g., in status updates on
Facebook or tweets on Twitter).
Next to goals, other affective processes may affect the level of self-disclosure in a
situation. I am referring here to the concept of feelings, which must further be seen
in the context of emotions. An emotion can generally be defined as “an episode of
interrelated, synchronized changes in the states of all or most of the five organismic
7.4 Situational Privacy Perception and Self-Disclosure Processes 161
This first set of environmental factors refers to the people present in a situation. The
level of privacy perceived by the individual depends to a large extent on the people
with whom he or she is at a given time. This is well expressed in the theory by
Altman, who argued that the level of achieved privacy corresponds to the level of
interaction with other people (Altman, 1975, p. 10). With this set of factors I hence
allude to the overall social psychological view on privacy which posits that privacy
is about boundaries around the self that may or may not include certain persons
(particularly Altman, 1975; Dienlin, 2015; Petronio, 2002).
162 7 The Theory of Situational Privacy and Self-Disclosure
The first factor is simply the number of people that can be regarded as potential
recipients of my disclosures. Broadly speaking, it makes a difference whether I
am writing an e-mail to one person or whether I am posting a status update to
large audience on Facebook. The more people that can potentially access the shared
information, the less likely I am to disclose that information at all. Furthermore,
the diversity of these people plays an important role. For example, even in small-
group conversations via instant messenger, it makes a difference whether the group
(consisting of the same number of people) consists of my family, friends, or work
colleagues.
This view is connected to several theoretical works presented earlier. For
example, the context collapse that users experience in networked publics such
as SNSs makes them less likely to engage in deep self-disclosure. Instead they
might use the common lowest denominator approach (Hogan, 2010) and share only
information they deem appropriate for all audience members. Most likely, such
information is not very private. Vitak (2012) also found that users of SNSs are more
deliberate in their disclosures when the audience is more diverse.
So far, audience diversity has mostly been studied by differentiating the contexts
within an audience (Binder, Howes, & Sutcliffe, 2009; Trepte & Masur, 2016; Vitak,
2012). Although this seems reasonable sociologically, it is not very suitable to
explain privacy behavior psychologically. The problem is that the concept always
leads to specific typologies that are only schemata addressing assumptions about
roles, norms, and appropriate behaviors that are supposed to be shared by groups
of people who act accordingly. If we want to find out what factors predict self-
disclosure, it is not sufficient to know to which context the communication partners
7.4 Situational Privacy Perception and Self-Disclosure Processes 163
with the trusted person (e.g., sharing intimacies) and thereby relinquishing control
over behavioral outcomes (e.g., Currall & Judge, 1995; Deutsch, 1958). Currall
and Judge (1995), for example, defined trust as “an individual’s behavioral reliance
on another person under a condition of risks” (p. 153). They emphasized that a
person would experience certain negative outcomes from the ‘untrustworthiness’
of the other person. In an attempt to synthesize the variety of existing definitions,
Kassebaum proposed the following overall definition:
Interpersonal trust is the expectation that another person or group of persons will behave as
agreed, unagreed but loyal, or at least according to subjective expectations in the future, even
though this person or group of persons has the freedom and choice to act differently. This is
because it is impossible or voluntarily unwanted to control the behavior of the person or the
group of persons. This expectation is accompanied by a feeling of calmness, confidence,
and security depending on the degree of trust and the extent of the associated risk (free
translation of Kassebaum, 2004, p. 21).
Based on this definition, we can derive that trust is a central precondition of self-
disclosure because it cognitively reduces the perceived risks involved in sharing
private information (Knapp & Vangelisti, 1991, p. 260). Derlega, Metts, Petronio,
and Margulis (1993) likewise noted that risks of self-disclosure can be lowered if
individuals choose an appropriate recipient who accepts the discloser, has skills
in understanding the discloser’s message, has a motivation to help or support, and
values discretion (pp. 85–86).
However, it is important to consider that trust does not objectively reduce the
risks associated with information disclosure. Instead, it only lowers the subjectively
perceived importance of these risks because we deem them unlikely to occur based
on an interpersonal assessment of the recipient. We thus expect that the other person
will not use the shared information against us. Nonetheless, we lose control over
that information.
CPM theory implicitly alludes to this idea because as the rules within a private
boundary are also based on a risk-benefit ratio (Petronio, 2002, pp. 65–66), it seems
plausible that people also assess the trustworthiness of potential co-owners of private
information. We can hence posit that people will engage in more self-disclosure
when they trust the recipient(s). In other words, collective privacy boundaries can
be regarded as boundaries of trust.
In the case of few recipients, assessing each person’s trustworthiness is manage-
able. In the case of large audiences, however, it seems plausible that the discloser
uses a heuristic similar to the ‘lowest common denominator approach’: he or she
will think of the person within the audience that is the least trustworthy and adapt
the self-disclosure accordingly. Marwick & Boyd (2014) similarly emphasized the
role of trust in teenagers’ privacy management in networked publics. They argued
that when the single-handed controlling of information distribution is impossible, it
must be negotiated socially (p. 11).
Several scholars have investigated interpersonal trust in relation to self-
disclosure. Wheeless, for example, conducted several studies aimed at identifying
interpersonal correlates of self-disclosure. He and his colleagues analyzed whether
higher trust is associated with higher levels of self-disclosure (Wheeless, 1976;
7.4 Situational Privacy Perception and Self-Disclosure Processes 165
Wheeless & Grotz, 1977). Based on a survey study with 261 participants, they found
a correlation of r = 0.28 between interpersonal trust and the overall measure of self-
disclosure, comprised of five dimensions. In particular, the dimension interpersonal
trust was related to the depth of self-disclosure (r = 0.71), indicating that trust
is indeed a rather strong predictor of self-disclosure. Wheeless also conducted a
follow-up study in which he again found strong correlations between interpersonal
trust and self-disclosure (Wheeless, 1978). Larzelere and Huston (1980) also found
that dyadic trust was positively correlated to depth of self-disclosure in married (r
= 0.40) and dating couples (r = 0.19).
In the qualitative study by Marwick & Boyd (2014), young adolescents indicated
that they placed a lot of emphasis on what could be done with information they
have shared. They based their decision to disclose information mostly on trust and
respect (pp. 10–11). Teutsch et al. (2018) likewise found in qualitative interviews
with people from different age groups that participants emphasized the pivotal
role of trust for feeling secure to self-disclose. In sum, it seems that interpersonal
assessments of trust may be the one of the most important factors in determining
whether an individual shares private information with other people.
the relationship partners share the same attitudes, opinions, and values, as well as
a similar views on most things. The last factor is called everyday centrality and is
simply a measure of how often these people talk, see or interact with each other.
The relationships between these aspects of relational closeness and self-
disclosure have been tested in several studies. Vangelisti and Caughlin (1997)
themselves conducted two consecutive survey studies with undergraduates (Study
1: N = 340; Study 2: N = 386) and found that perceived psychological closeness and
similarity to potential recipients (e.g., boyfriend or girlfriend, best friend, friend,
or coworker) was related to the likelihood of disclosing certain family secrets
to these targets. Everyday centrality, however, was not related to self-disclosure.
More broadly, Caughlin and Sharabi (2013) also found that overall communication
frequency—both non-mediated and mediated—between individuals correlated with
relational closeness.
A considerable amount of research has investigated the relationship between
liking and self-disclosure. These findings may also provide support for the rationale
provided above because liking can be regarded a subdimension of psychological
closeness. Although I am primarily concerned with antecedents of self-disclosure,
three types of relationships between self-disclosure and interpersonal liking can
be identified. First, self-disclosure can lead to the recipient liking the individual;
second, liking can lead to self-disclosure to this person; and third, an individual
may like a person as a result of having disclosed to him or her (see also Dindia,
2000, p. 29). Most prominently, Collins and Miller (1994) conducted meta-analyses
for all three relationships.
Specifically the first effect (self-disclosure causes liking) is important as it is
also closely linked to the social penetration theory of Altman and Taylor (1973)
presented above. The theory suggests that a relationship develops through continual
increases in self-disclosure. In line with this rationale, individuals should be more
attracted to those who disclose to them. Collins and Miller (1994) found that
self-disclosure was moderately related to liking (d = 0.28). However, there were
some differences in the effect sizes depending on the type of study conducted.
Whereas correlational studies (mostly based on survey data) typically investigated
the relationship between self-disclosure and liking in close relationships, experi-
mental studies investigated the same relationship in stranger interactions. As one
might expect, the effect proved to be weaker for interactions between strangers.
Nonetheless, and despite rather small effect sizes (d = 0.27 for well-controlled and
d = 0.19 for less-controlled experiments), the studies support a causal relationship
(p. 466).
The second effect (liking causes disclosure) is also supported by several of
the theories mentioned above. As individuals engage in self-disclosure in order to
achieve certain goals and satisfy specific needs, their perceptions of other persons
may play a fundamental role in determining their willingness to disclose to these
persons. As self-disclosure increases the level of intimacy and closeness between
two people, the probability of an individual opening himself or herself to someone
else should primarily depend on his or her positive assessment of that other person.
If the individual judges another person as attractive, attentive, and likable, he or she
7.4 Situational Privacy Perception and Self-Disclosure Processes 167
will be more inclined to get to know this other person and may hence start to reveal
himself or herself to this other person. The meta-analysis by Collins and Miller
(1994) also found evidence for this effect (Collins & Miller, 1994, pp. 467–469).
The average effect size was d = 0.72. Again, correlational studies had higher effect
sizes than experiments. Although smaller in effect size, the experimental findings
suggested that liking actually causes more self-disclosure both in close relationships
and in stranger interactions and initial meetings between persons.
The third effect (self-disclosure makes the disclosure like the recipient more)
was less strong (d = 0.32). The studies were even quite heterogeneous and there
were two studies with no effect (pp. 469–470).
More recently, Sprecher, Treger, and Wondra (2012) conducted a well-designed
experiment aimed at investigating the relationship between self-disclosure and
liking in initial interactions of dyads more closely. Based on 59 pairs, they found that
initial recipients of disclosure liked the discloser more than the initial discloser liked
the recipient. They further found that the difference between both was nonsignificant
when they switched roles afterwards. The results thus suggest that liking increases
even further when the dyads reciprocate self-disclosure during conversation.
In a second experiment, Sprecher, Treger, and Wondra (2013) specifically
manipulated reciprocity of self-disclosure by comparing dyads who both disclosed
and listened in two interactions with people who only disclosed or only listened in
two interactions. The results revealed that dyads that reciprocated self-disclosure
in each interaction showed greater liking towards each other, even when the other
dyads switched roles.
In sum, these analyses imply that self-disclosure causes the recipient to like
the discloser and that individuals disclose to people they like. There is also some
evidence that we like people after disclosing to them; however, this effect may
be influenced by other moderators. More broadly speaking, we can assume that
if individuals rate potential recipients of their disclosures as psychologically close,
and similar in attitudes, opinions, and values, and interact with them on a regular
basis, the likelihood that they will disclose to these potential recipients increases.
Accordingly, people feel obliged to return something after someone has shared
private information with them. Second, reciprocating self-disclosure has become
a conversational norm. It is hence assumed that reciprocity of self-disclosure is
accepted based on the prevailing values of our modern society.
The assumption that initial self-disclosure fosters self-disclosure in return has
been tested from several perspectives. Dindia and Allen (1995, June) conducted a
meta-analysis of 67 studies that investigated the norm of reciprocity. The authors
noted that the evidence in support of this hypothesis would depend on how
reciprocity was tested (Dindia, 2000, p. 25). For example, many studies have
correlated the self-disclosure of two individuals in a relationship. However, a high
correlation in this case might just account for similar base rates of self-disclosure.
Another problem is that a person could theoretically reciprocate certain disclosures
at a later point in time. Apart from these limitations in testing reciprocity of self-
disclosure, the meta-analysis revealed that the average effect was d = 0.69. This
rather large effect size suggests that self-disclosure is indeed reciprocal. These
results again support assumptions propounded in social penetration theory (Altman
& Taylor, 1973) and the functional theory of self-disclosure (Derlega & Grzelak,
1979). It also shows that societal norms and rules have a strong influence on how
people behave, even if they are not consciously considered in concrete situations.
In sum, to determine the likelihood of self-disclosure, one needs to know how
much information has been exchanged beforehand. Or, more simply, I suggest that
it makes a difference whether an individual has started a conversation or simply
responded to someone else’s initiation of conversation. I hence posit that the level
of self-disclosure is higher when information has been exchanged between the
interaction partners before the situation or when the interaction partner(s) have
initiated the conversation.
The second set of environmental factors refers to all characteristics of the physical
or virtual space in which the behavior of interest takes place. However, it is not
necessarily the specific nature of these characteristics that immediately determines
the level of perceived privacy. Rather, it is its potentiality in safeguarding one’s
privacy that influences the level of self-disclosure at a given time. As Altman
(1975) noted, “the role of the physical environment as a privacy mechanism is quite
complex” (p. 36). For example, a door itself as a physical object has no inherent
effect on the level of perceived privacy, but its potential to create a form of seclusion
and thus a barrier against external interferences significantly influences the level of
self-disclosure. People hence use the door, and by closing it, they create a form of
privacy that would not be possible without it.
Online environments are even more complex. From a physical point of view,
it is the technical architecture that provides the virtual spaces in which social
interaction becomes possible. However, what we perceive as the environment is
7.4 Situational Privacy Perception and Self-Disclosure Processes 169
not physical in the sense that we can touch it. Instead, software creates virtual
barriers and environmental characteristics that may resemble offline environments,
yet have unique potentialities for providing spheres of privacy. On the one hand, for
example, hiding one’s face in offline situations may be similar to uploading a non-
recognizable profile picture on a SNS. In both situations, the individual becomes
visually anonymous. Likewise, closing a door is a similar mechanism to moving
a conversation into a private chat. In both cases, people can be secluded from
others. Notwithstanding this similarity, the potentialities of online environments are
often more permanent, thus providing a certain level of privacy for similar future
interactions. For example, choosing to imply certain privacy settings sets the level
of privacy for all types of social interactions to which these privacy settings pertain.
It would be impossible to discuss all potentialities of offline environments
(e.g., by using objects, clothes, artifacts or other characteristics of the physical
environment) and online environments (e.g., by using specific privacy settings
of all communication technologies available). There is great specificity in every
environment at a given time and consequently also in its potential to determine the
level of privacy. To circumvent this limitation, I again distinguish between two types
of privacy that are generally susceptible to external characteristics: (1) the level of
protection against identification (e.g., anonymity or pseudonymity) and (2) the level
of accessibility of the content exchanged (e.g., a form of seclusion achieved by
privacy settings or encryption). In Sect. 7.3.2 on p. 149, I have already discussed
how individuals actively choose certain environments that provide high levels of
privacy or even manipulate some aspects of these environments in order to gain
more privacy. Section 6.1.5, furthermore provides examples of these types of privacy
regulation behaviors. Consequently, I will now confine my discussion of external
factors to how these two types of privacy determine the level of self-disclosure.
2014, p. 21). Effective protection against vertical privacy intrusions is only provided
by end-to-end encryption, which means that a message is encrypted on the sender’s
device and only decrypted on the recipient’s device (Karaboga et al., 2014, p. 22). It
hence implies transmitting a message over the Internet in such a way that it can
only be read by the intended recipient, and cannot be intercepted by accessing
the server or networks of servers through which the message is transmitted.5 This
implies that only encrypted data is stored on transmitting servers, guaranteeing
protection against collection and analysis of communication content by institutions
and providers.
Studies investigating to what extent users of different communication technolo-
gies actually use these settings remain scarce. A representative study for the USA
found that about 53% of all Facebook users limit the visibility of their status
updates (Litt, 2013). A multicultural study by Trepte and Masur (2016) found that
the majority of Facebook users in five different countries limited the visibility of
their status updates to their friends, but not more granularly. Moreover, studies
investigating people’s overall literacy found that only a few users actively decide
to use services that provide encryption or to implement additional encryption
themselves (Masur, Teutsch, & Trepte, 2017; Matzner et al., 2016).
In sum, we can derive that reducing the accessibility of information exchanged in
online interactions should increase the level of horizontal privacy, and in the case of
encryption also the level of vertical privacy. This, in turn, should allow for more self-
disclosure. Yet, the existing findings from empirical studies suggest that few people
actually engage in using these more sophisticated privacy regulations. It is hence
uncertain, whether such external factors have a large impact on self-disclosure.
Furthermore, it seems reasonable to assume that limited visibility achieved through
privacy settings may affect the influence of the audience size on self-disclosure.
When content accessibility is actively limited to certain viewers, it seems likely that
the audience might have a smaller effect on the depth of self-disclosure.
5 So called man-in-the-middle attacks may still be successful. For example, a hacker could try to
install an application on a user’s smartphone that fetches messages before they are encrypted.
7.5 Post-situational Evaluations Processes 173
are also similar to the evaluation processes described int the model of user generated
privacy proposed by Einspänner-Pflock (2016). According to this model, individuals
generally evaluate whether (1) the goal was achieved and (2) the level of privacy was
acceptable or optimal, thus resulting in four categories (pp. 128–130). Depending
on whether the goal was reached and the privacy level was acceptable, a positive
outcome evaluation takes place. If both are not met, a negative evaluation takes
place and corrective measures will be implemented. If one or the other is reached,
the evaluation can be either positive or negative. I argue that the three types of
evaluations that I am going to describe in the following are related in a similar
way.
Although some evaluations might be conducted directly after the disclosure
event, it is important to bear in mind that evaluations processes can take much
longer. Positive as well as negative consequences take time to manifest themselves.
For example, implemented privacy regulation strategies may only prove to be
ineffective after a certain privacy violation (or privacy turbulence) occurs. However,
this privacy breach might not happen directly after the disclosure event, but rather
several days, months, or even years later. Likewise, evaluating the accuracy of
interpersonal assessments of trust is based on future experiences with the recipients
of the disclosures. Do they share the confidential information with other people? If
yes, the discloser might reassess his or her interpersonal perception of the recipients.
Reevaluations hence particularly take place when new experiences are made
that are somehow related to the initial disclosure event. If these new experiences
are positive, the disclosure event might serve as a sort of role model for similar
future interactions. If the experience is negative, however, the discloser might
assess similar future interactions differently and/or employ other privacy regulation
mechanisms. Burgoon et al. (1989) aimed at identifying possible privacy violations.
Using factor analyses, they found that there are typically five types of violations:
(1) psychological and informational violations (e.g., someone tells others what
you discussed or reveals personal information to unintended audiences), (2) non-
verbal interactional violations (e.g., someone stands too close or touches you
unexpectedly), (3) physical violations (e.g., someone watches what you are doing
or enters the room without knocking), (4) impersonal or stranger violations (e.g.,
someone whistles at you in public or tries to start a conversation with you),
and (5) verbal interactional violations (e.g., someone comments on your mood or
appearance). From my point of view, these types of violations can be evaluated in
any of the three forms discussed below.
Johnson (1974) noted that the rather uncertain relationship between different forms
of privacy and need-satisfying outcomes makes it difficult to foresee whether regula-
tive steps taken beforehand actually provided the ideal environmental circumstances
for need satisfaction (p. 92). Consequently, people evaluate the effectiveness of
174 7 The Theory of Situational Privacy and Self-Disclosure
their preventive privacy regulations after they have disclosed. If they feel that their
preventive privacy regulation was successful in providing a safe environment for
their self-disclosure, this positive experience will guide their assessment of future
situations and thus also their future privacy regulation.
For example, if an individual experienced an instant messenger application such
as Threema as an environment with a high level of horizontal privacy because he
or she was able to target his or her disclosures to particular people and also with
a high level of vertical privacy because the disclosures were encrypted, he or she
might choose this application again for similar future interactions. Correspondingly,
negative experiences and in particular privacy violations or unwanted intrusions,
may prevent people from choosing a certain environment or manipulating an
environment in a particular way for similar future interactions. Take the example
of a Facebook user who implemented different types of friend lists in order to
be able to target some disclosures to specific people. He or she arranged a friend
list that contained only family members and shared some of his or her holiday
pictures within that collective boundary. However, one of the members shared one
of the pictures with his or her own Facebook network, thus violating the boundary
established by the original discloser. As a consequence, the discloser might avoid
such an unpredicted dissemination of his or her photographs and not disclose within
that predefined boundary or even exclude the family member that shared the picture.
In general, we can state that overall evaluations of privacy regulation behaviors
lead to a behavioral change when individuals perceive an imbalance between the
desired and the achieved levels of privacy. As an abstract framework, Altman (1975)
proposed four typical cases in which such an imbalance is perceived (pp. 28–31).
Whereas the first two cases involve the control of inputs from others, the latter two
involve the control of output to others.6
In the first case, an individual is intruded upon by another person. The individual
has established a boundary around himself, but someone else has crossed it
nonetheless. An example would be if a person closed a door to be alone and
shielded against visitors. However, someone might nonetheless open the door and
enter without permission. Although this “intrusion” would not necessarily have to
be perceived as severe privacy violation, the individual would still try to reestablish
the boundary that he or she desired at the moment (e.g., by telling the unwanted
visitor to leave). Case one thus represents a situation in which the desired level of
privacy is higher than the achieved level of privacy (Altman, 1975, p. 28)
The second case refers to the opposite situation: an individual wanted to have
a certain level of interaction with someone else, but this level of contact could not
be achieved. Maybe the other person himself wanted to have more privacy, was
inattentive, or was otherwise prevented from interacting with the individual. In this
case, the individual might take certain steps to reach the desired level of interaction
6 Please note that I am referring to cases 3, 4, 7, and 8 in the work of Altman (1975). All other cases
in the work of Altman refer to situations in which a balance between desired and achieved level of
privacy is perceived.
7.5 Post-situational Evaluations Processes 175
with the other person. Case two is thus a situation in which the desired level of
privacy is lower than the achieved level of privacy (Altman, 1975, p. 28).
In the third case, an individual hoped to avoid access of other to the self, but
the boundary he or she established failed. For example, someone posted some
personal information on Facebook. Without his or her knowledge, this information
was shared with unintended audiences. Privacy was hence lost because an undesired
level of interaction with other people occurred. Case three thus represents another
situation in which the desired level of privacy was higher than the achieved level of
privacy (Altman, 1975, p. 30).
The last case refers to situations in which an individual may want to share
information but does not succeed in establishing the necessary level of interpersonal
contact. For example, another person did not get the information from the individual
due to the presence of other people or just because he or she was not available. This
last case presents another situation in which the desired level of privacy is lower
than the achieved level of privacy (Altman, 1975, p. 30).
What Altman described here closely resembles Petronio’s concept of boundary
turbulences (Petronio, 2002, p. 177). Managing information flow is a complex
undertaking and often fails. The instances in which it fails may consequently
affect the handling of future situations and in particular influence the ways in
which an individual engages in pre-situational privacy regulation behaviors. As the
issues that may occur as well as privacy regulation mechanisms are manifold and
impact different interpersonal and external factors of the environment, these first
evaluations processes can be very fine-grained and specific.
In line with the rationale provided in Sect. 6.3, vertical privacy violations are less
tangible and might simply not occur after a disclosure event. However, interventions
such as reading a newspaper article about data leaks or data collection practices of
providers might be evaluated in the context of recent disclosure events and thus
also affect future privacy regulation decisions. Such types of evaluations have to be
considered here too.
has the freedom and choice to act differently (Kassebaum, 2004, p. 21). When the
person does act differently than expected, boundary turbulence occurs (Petronio,
2002).
As self-disclosure is deeply connected to relational development (Derlega et al.,
1993, as well as Chap. 4), we can expect that such privacy violations negatively
impact the relationship between the discloser and the recipients, resulting in less
self-disclosure in future interactions. Based on N = 273 adult participants, Steuber
and McLaren (2015) found that people indeed did not share similar information with
a person who unexpectedly violated their privacy (p. 357). Evaluating the accuracy
of interpersonal assessments is hence an important factor in determining future
interactions with the person(s) involved. In short, if someone we initially trusted,
misuses that trust, our next assessment might lean more towards distrust. That said,
Steuber and McLaren (2015) also found that those who engaged in communication
about the privacy turbulence with the violator and offered explicit rules (a sort of
renegotiation of privacy rules as proposed by Petronio, 2002) were also more likely
to show forgiveness and to report relational improvement (p. 358). Thus, this second
type of evaluation might also positively influence relationship maintenance—even
after a privacy violation has occurred.
In the following, I will briefly summarized the main tenets of the proposed theory. I
also offer a visual representation of the main components of the theory that I believe
will facilitate comprehension of the overall rationale. In the second section, I will
offer an abstract application guide that should help to use the theory in various
research contexts.
Interpersonal
(Audience size, trust, relational
closeness, level of reciprocity)
External
(Protection against identification
and unwanted accesibility)
Evaluation 1 to 3
Privacy Regulation 1 & 2 Environmental factors 1 & 2 (Efficiency of privacy
(Choosing and manipulating Self-Disclosure regulation, accuracy of
the environment) interpersonal assessment,
efficiency of self-disclosure)
Internal
(Situational needs,
feeling, mood)
Personal factors 2
Personal factors 1
Fig. 7.1 Overview of the basic components of the theory of situational privacy and self-disclosure
7 The Theory of Situational Privacy and Self-Disclosure
7.6 Summary and Application 179
a certain level of protection against identification and those that offer protection
against access by unwanted third parties.
The combination of environmental factors (i.e., both the people who have access
to the self of the discloser and the level of protection offered through [virtual]
objects or barriers) is perceived by the individual as the prevailing level of privacy.
If a person wants to disclose himself or herself (due to situationally salient needs),
he or she will only engage in self-disclosure if he or she deems the prevailing
level of privacy as appropriate. Both personal and environmental factors and their
interactions determine the level of self-disclosure in a situation. The first type of
personal factors (stable traits and trait-like characteristics) can influence this process
on all levels. They particularly may influence self-disclosure directly, but also the
effect of both environmental and situational personal factors on self-disclosure. The
situational privacy and self-disclosure processes must be regarded as the central
framework. These processes occur regardless of whether people actively chose or
manipulated such a situation or were simply thrown into it.
That said, the theory further accounts for the fact that people may actively shape
the situations in which they find themselves. The theory therefore includes pre-
situational privacy regulation processes. As denoted in supposition 2, people need
privacy in order to be able to perform behaviors such self-disclosure without risks.
In line with supposition 4, we can hence assume that people actively seek situations
in which they feel private. They do so by either choosing a certain environment
and by manipulating this environment to make it more private. Privacy regulation
processes thus shape the environmental factors that then affect the level of self-
disclosure in communication situations that occur in these environments. Again, the
willingness to engage in these preventive privacy regulation behaviors is influenced
by stable personal factors. It is important to note that the theory focuses particularly
on preventive privacy regulations. Of course, preservative and corrective privacy
regulation could be integrated. However, they would have to be treated similarly to
self-disclosure as a dependent variable with similar antecedents. However, as I am
focusing on self-disclosure, I have refrained from discussing the role of preservative
and corrective regulations.
The theory further includes post-situational evaluation processes, which may
influence future privacy regulation as well as situational self-disclosure processes.
In particular, people evaluate the effectiveness of their privacy regulation (an
ineffective privacy regulation will in many, but not all, cases lead to perceivable
privacy turbulence), the accuracy of their interpersonal assessments (an inaccurate
assessment may lead to concrete privacy violations by one of the recipients), and
the effectiveness of self-disclosing in satisfying the salient need.
As shown in Fig. 7.1, all components are arranged in a procedural framework.
But how can we use the theory for answering specific research questions? In the
following, I will offer an abstract application guide that should help researchers to
make the theory of situational privacy and self-disclosure amendable for empirical
investigations.
180 7 The Theory of Situational Privacy and Self-Disclosure
The following brief step-by-step guide should facilitate the application of the theory
in a wide array of research contexts and fields. It is meant as a starting point for
researchers who aim at investigating situational self-disclosure as a consequence
of privacy processes. Following the proposed steps should provide researchers
with a deeper understanding of the fundamental principles of the theory while
simultaneously adapting them to the context of interest. Part II of this book
represents an example of an in-depth application of the theory to smartphone-based
communication situations based on this guide.
Naturally, the application of the theory, and therefore the steps described in the
following may differ depending on the type of research one seeks to conduct. For
example, the theory may first help to deductively understand situational processes of
privacy and self-disclosure and thus describe how these processes unfold in different
scenarios. Second, one could also use the theory to study privacy perceptions and
self-disclosure across several situations. In this case, the application of the theory
helps to identify the relevant variables that need to be assessed on a situational
level. Lastly, one could use the theory to create laboratory situations in which one or
several of the proposed factors are manipulated. Such a research design would allow
researchers to isolate the effects of each factor (e.g., environmental factors such as
the number of recipients or the amount of privacy resulting from external factors)
or study possible interaction effects. In what follows, I thus describe an abstract
way of applying the theory, which may have to be adapted slightly depending on
the research goal. In this guide, the first two steps must be regarded as suggested
theoretical steps that I deem important to conduct before the actual application can
be made. They will help to make the application of the theory more consistent.
The actual application of theory, however, only starts with step 3. To facilitate
the theoretical investigation, the guide is structured by fundamental questions that
should be considered when investigating privacy or self-disclosure.
What type of communication is studied?
1. Describe the type of communication in which you are interested on a familiar
level of generality (e.g., dyadic communication in friendships, one-to-few
communication at the workplace, one-to-many communication in networked
publics, etc.). Although the theory of situational privacy and self-disclosure
can be applied to any type of communication, it is nonetheless unlikely that
one would want to study all types of communications at the same time.
Notwithstanding this notion, the level of specificity of this initial description
primarily depends on the researcher’s interest. For example, in the second part
of this book, I investigate smartphone-based communication, which includes
several and different types of communication that are all still carried out via
smartphone applications (e.g., WhatsApp, Facebook, Instagram and so on).
2. Identify the kinds of information that are generally shared in this form of
communication. Are certain information types shared more frequently than
7.6 Summary and Application 181
The following study has two major goals: The first is to apply the theory of
situational privacy and self-disclosure to smartphone-based communication situ-
ations in order to understand what makes people engage in preventive privacy
regulation behaviors (in this case, choosing and manipulating the environments
provided by different smartphone applications) and in situational self-disclosure
(in this case, the depth of self-disclosure in smartphone-based conversations).
For this purpose, it is important to analyze possible environments (in this case,
smartphone applications) in detail and understand which environments allow for
more secure and private interactions compared to others, and to what extent far
these environments can be manipulated in order to prevent unwanted identification
and content accessibility. On the basis of this initial theoretical analysis, I aim (1)
to explain why individuals differ with regard to their engagement with preventive
privacy regulation behaviors, and (2) to analyze how external factors, together
with interpersonal perceptions and internal personal factors, influence people’s
self-disclosure within these environments. It is important to note here that I am
not investigating potential post-situational evaluation processes as outlined in the
theory. To investigate such long-term processes empirically, one would have to
monitor participants over a longer period of time in order to capture all potential
privacy turbulences or violations that occur after particular self-disclosure acts. It
is furthermore important to note that I am not going to investigate all potential
antecedents of privacy regulation behavior and self-disclosure I have discussed in
the theory of situational privacy and self-disclosure. For example, due to the lack of
research in this area, I will discuss the influence of situational feelings on subsequent
self-disclosure. I am furthermore limiting the number of factors to those I deem
particularly worthwhile of investigation. The following overall research questions
can be formulated for the purpose of this study:
1. What makes people engage in application-specific privacy regulation behaviors?
More specifically, what personal factors influence people’s decision to choose
certain applications over others and to what extent these factors also explain the
use of privacy strategies and settings within these environments?
2. Under what circumstances do people engage in a high level of self-disclosure
during smartphone-based communication? In particular, which personal and
environmental factors influence the situational depth of self-disclosure?
Using the theory of situational privacy and self-disclosure to answer these overall
questions allows several more specific research questions and assumptions to be
derived. The second aim is therefore to develop a methodical approach to test
these assumptions empirically. To this end, it is necessary to measure participants’
situational assessments and behaviors across several different smartphone-based
communication situations. The present study therefore implemented a combination
of online survey methods, log data, and experience sampling techniques. More
precisely, the first research question was investigated using an initial online survey,
which was answered by N = 1572 German participants. Afterwards, smartphone
users within the sample were invited to participate in a subsequent experience
sampling study which required them to install a specifically programmed application
on their own smartphone that tracked their smartphone use for 14 days. During
this time, the application automatically triggered questionnaires after relevant
usage episodes in order to assess situational factors that influence subsequent self-
disclosure. Based on n = 164 participants, the combined data of the online survey
and the experience sampling method (ESM) study were used to investigate the
second research question.
In this chapter, I apply the theory of situational privacy and self-disclosure to
smartphone-based communication, the step-by-step guide proposed in Sect. 7.6.
Thereby, I put particular emphasis on describing smartphone-based communication
environments and their privacy-influencing characteristics because such an anal-
ysis will help us understand how environmental factors shape self-disclosure in
smartphone-based communication situations. In a subsequent step and in line with
research questions 1 and 2, I identify potential antecedents of privacy regulation
behaviors and situational self-disclosure. In Chap. 9, I first discuss challenges
related to testing the theory of situational privacy and self-disclosure empirically.
Thereby, I focus on combining of experience sampling and log data methods,
which provide a useful approach for investigating situationally varying concepts.
I then proceed to describe the methods used in this study in detail. In Chap. 10,
I present the results of the study. I first describe findings pertaining to the first
question of why people differ in their engagement with privacy regulation behaviors.
Findings from the experience sampling study investigating antecedents of the depth
of self-disclosure form the core of that chapter. Finally in Chap. 11, I discuss the
implications of my findings, placing primary focus on the concrete results and how
they can be interpreted. In Part III, I discuss the implications of this study’s findings
for the proposed theory more broadly.
8.1 Describing Smartphone-Based Communication 187
The first stage in applying the theory of situational privacy and self-disclosure
should always be a comprehensive characterization of the type of communication
being studied (steps 1 and 2 of the proposed application guide). This section focuses
on smartphone-based communication. From a cultural-historical point of view, the
smartphone has been conceived as an incomparable intervention into the styles
and genre of contemporary culture (Goggin, 2009, p. 231). By revolutionizing
mobile Internet access, it has brought forth what can be regarded as a new
media and communication environment that “hybridises not only technologies and
platforms but also users’ own practices, habits, and modes of accessing media with
implications for personal communication” (Madianou, 2014, p. 667).
In general, smartphones can be defined as portable personal computers that
combine the functionality of the original mobile phone with network connectivity
enabling the installation and running of diverse and multi-functional software
applications (Madianou, 2014, p. 669). Historically, the smartphone can be seen as
the result of the continuous extension and enhancement of the conventional mobile
phone. This development ranged from originally large and impractical devices to
increasingly smaller phones with some Internet capabilities and finally to advanced
technical devices (e.g., smartphones, tablets, smartwatches or smartglasses) with
increasingly faster processors, larger screens, improved usability, and memory
capabilities (Goggin, 2009; Madianou, 2014). As a result, Krotz (2014) noted that
the smartphone is primarily a multi-functional device which only by historical
chance is still called a “phone” (p. 24). Although feature phones and smartphones
had already existed for quite some time, it was nonetheless Apple’s iPhone in 2007
that initiated their mass penetration (Goggin, 2009 as cited by Madianou, 2014,
p. 669). Specifically the design of the smartphone, which eliminated the keyboard in
favor of a touch screen, led to a “haptic turn” in the mobile industry (Goggin, 2009,
p. 242), eventually supporting the massive transformation of how people navigate,
arrange, and orchestrate their everyday lives (p. 243). Currently, devices based on
iOS (iPhone’s operating system) and Android (Google’s operating system) have the
largest market shares (Goggin, 2012).
The smartphone must be understood as a kind of “metamedium” (Jensen,
Rothenbuhler, Pooley, & Craig, 2016) or as “polymedia” (Madianou, 2014). Such
terms refer to the smartphone’s capacity to install and launch countless applications
with different purposes and uses (Madianou, 2014, p. 667). Thus, the smartphone
rather provides the access to different kinds of media uses rather than representing
a form of media use itself. It allows users to consume news and other content
from different providers, access information from countless resources, navigate
to places, listen to music, play games, organize their everyday life, and to most
notably communicate with other people in various and different ways. Jenkins
(2008) consequently referred to the smartphone as the “swiss army knife of the
21st century” (p. 5) which eventually enables users to unify almost all of their
digital activities on a single device and thereby contributes to and drives the growing
188 8 Applying the Theory to Smartphone-Based Communication
process of media convergence. In June 2016, the Apple App Store listed more than
two million applications (Golson, 2016). In December 2016, the number of available
applications in the Google Play Store was 2.6 million (Statista, 2017).
In light of the technical infrastructure that the smartphone provides, what is
the characteristic nature of smartphone-based communication? From a general
perspective, the smartphone has fortified the characteristics of online communi-
cation already discussed in Sect. 2.2: it increases the likelihood of hyperpersonal
interaction, arouses an expectation in users that they should be permanently online
and permanently connected, and facilitates multimodal communication.
The most important aspect is that the smartphone provides access to already
familiar communication platforms through applications that are installed on a single
device. At the same time, the capacities of this technical device also drive innovation
and thus new forms of communication. As Miller (2014) noted: “the smartphone is
an amalgamation of familiar media along with a few new ones that are constantly
being improved: innovative affordances are regular and expected additions [. . . ] its
distinctiveness lies in its capacity to engage, in a variety of ways, with the larger
multimedia networked world” (p. 211). By using their smartphone, individuals are
able to access any platform or media they use to communicate with other people
from anywhere at anytime.
The range of communication modes is thus large and diverse. People use the
smartphone for one-to-one communication (e.g., phone calls, instant messaging, e-
mailing), one-to-few (e.g., instant messaging in groups), one-to-many (e.g., posting
status updates on social network sites). All of these forms of communication may
include the sharing of voice or written messages, pictures, videos, links or other
digital content. Depending on the application through which these types of com-
munications are performed, the content can be extremely private and sensitive (e.g.,
in dyadic instant messenger conversations) or non-sensitive and public (e.g., when
posting a non-sensitive picture on a photo-sharing platform such as Instagram).
Conversations with the same person are often spread over different applications.
For example, a written conversation started in WhatsApp may be continued on
Facebook.
These multi-modal communication practices comprise the setting for this study
of privacy regulation and self-disclosure. It is important to note, however, that I am
focusing specifically on content sharing within interpersonal communication, which
can range from one-to-one to one-to-many communication. I am thus excluding
traditional phone calls and video telephony from this study. I am also excluding
non-interpersonal one-to-many communication such as posting a comment under a
news article. In the next step, I identify and describe all potential environments in
which the remaining forms of smartphone-based communication can take place.
8.2 Identifying Communication Environments 189
such as WhatsApp now also provide desktop interfaces. Below, I describe the
phenomenology of each group of services in more detail.
Email Services Electronic mail is the oldest form of computer-mediated commu-
nication and encompasses the exchange of digital messages (originally text only)
between people over the Internet (Beck, 2010, p. 22). Email communication is
based on the Simple Mail Transfer Protocol (SMTP). Messages are generally stored
on a mail server and can be retrieved by users using standard protocols such as
the Post Office Protocol (POP) or the Internet Message Access Protocol (IMAP).
Although email communication is mostly dyadic, it nonetheless allows users to
send messages to several other people. Today, it is also possible to send all kinds of
digital attachments, including documents, pictures, videos, or software. Although
email communication was initially conceptualized as an asynchronous form of
communication, technical progress in computational power (and in particular ever
faster data transfer over the Internet) has made email transfer considerably faster
and almost synchronous (Beck, 2010, p. 23). Today, 2.59 billion people worldwide
actively use email communication (Radicati, 2015, p. 2). About one billion of those
use Gmail, which is the email service provided by Google (Statista, 2016). In
Germany, however, people favor other services for email communication. The most
popular email services are GMX (27.34%), Web.de (26.44%), T-Online (11.36%),
Outlook.com (8.15%), AOL (5.17), Freenet (4.37%), Gmail (4.08%), and 1&1
(2.68%) (Statista, 2015). All of these major email services provide proprietary
applications for mobile devices. However, people often also use more generic email
applications that allow them to connect with several providers (e.g., the native
Android email application or Aqua Mail).
Instant Messenger (IM) This form of online communication offers real-time
message transfer in the form of texts, images, emoticons, audio, videos, and location
information over the Internet (Cui, 2016, p. 19). IM services are provided by
different companies, each of which uses proprietary software. In contrast to email
communication, message transfer between different software is not possible. IM
services are primarily designed for synchronous one-to-one communication, but can
also be asynchronous and take the form of one-to-few communication when users
converse in small groups (Beck, 2010, p. 26). Depending on the provider, IM can be
based on peer-to-peer or client–server transmission. In most IM applications, people
can generate a profile with a photo and sometimes also a status that may contain
some individually created content. Users connect through their phone numbers.
Phenomenologically, IM is thus very similar to the older short message service
(SMS) allowing text message transfer through the mobile phone network. Due
to this similarity, I consider both to be instant messaging. In 2014, 51.7% of all
smartphone users worldwide regularly used IM applications (eMarketer, 2015). In
the same year, about 72% of all German smartphone users used IM applications
(Trepte & Masur, 2017b, pp. 13–14). In turn, 72.1% of those IM users used
WhatsApp, 14.2% used Skype, and 5.4% used the Facebook-Messenger. Only a
few people used other applications, such as Threema (1.7%), iMessage (1.7%) or
Snapchat (0.1%).
8.2 Identifying Communication Environments 191
Social Network Sites (SNS) The most common definition of these applications
was advanced by Ellison and Boyd (2013), who define a social network site (SNS)
as “a networked communication platform in which participants (1) have uniquely
identifiable profiles that consist of user-supplied content, content provided by other
users, and/or system-level data; (2) can publicly articulate connections that can
be viewed and traversed by others; and (3) can consume, produce, and/or interact
with streams of user-generated content provided by their connections on the site”
(p. 158). SNS generally provide different modes of communication such as (1)
one-to-one communication using the private message function (e.g., the integrated
Facebook Messenger); (2) one-to-few communication in the form of group chats
using the private message function, status updates in closed groups, and status
updates for which accessibility is limited to only a few recipients; and (3) one-
to-many communication in the form of unrestricted status updates. Overall, a third
of the world population (2.34 billion people) uses social network sites regularly.
In 2014, 30% of the German population used Facebook (Trepte & Masur, 2017b,
p. 12). Only a few people used other SNS such as Google+ (9%), Xing (a German
version of LinkedIn; 3%), or StudiVZ/MeinVZ (German SNSs). Due to the client–
server infrastructures of most SNS, they can be accessed from different devices
(both on desktop computers or laptops and mobile phones or tablets). Major
SNS such as Facebook and Google+ provide adapted mobile versions, again also
using the features of the smartphone (particularly the in-built camera). Professional
networks such as XING and LinkedIn currently do not provide a mobile version of
their service. Instagram, in contrast, was originally developed as a smartphone-only
service. Although a web-based version and a desktop application are now available,
most users still access Instagram with their mobile phones. Of all smartphone users
in Germany, 42% indicated using SNS applications (Trepte & Masur, 2017b, p. 13).
Instagram (which was not explicitly considered in the survey by Trepte and Masur)
recently has grown to more than 600 million users worldwide (Instagram, 2016).
Microblogging Services A weblog or blog refers to a kind of online journal that is
generally publicly accessible. As smartphones are generally not used for traditional
blogging, I have elected to specifically focus on microblogging services, which
have profited massively from the mobility of smartphones. Although microblogs
can be perceived as a new form of online communication, the platform Twitter
has become synonymous with microblogging in most countries (Weller, Bruns,
Burgess, Mahrt, & Puschmann, 2014). Similar to a SNS, it allows users to create
uniquely identifiable profiles, publicly articulate connections that can be viewed
and traversed by others, post short messages (tweets) of up to 140 characters, and
follow the updates posted by other users. A unique characteristic of Twitter is that
communication is heavily based on hyperlinks (in particular so-called hashtags).
Through keywords advanced by a hashtag, users explicitly establish connections
not only with other users but also among tweets and topics (see also Schmidt,
2011). Twitter is hence primarily built for one-to-many communication. However,
it also allows users to share privacy messages with other individual users. Twitter is
a client-server system and can be assessed from different devices. At the beginning
192 8 Applying the Theory to Smartphone-Based Communication
of 2017, Twitter had 313 million users worldwide, of which 82% use Twitter on
their mobile phones (Twitter, 2017). In Germany, about 12 million people regularly
utilize Twitter (Beer, 2016, March 21).
Other Services A number of other applications that were developed for other pri-
mary purposes nonetheless allow for interpersonal communication. These include
social games, multiplayer games, and dating applications. With regard to studying
self-disclosure in interpersonal communication, the popular dating application
Tinder is particularly interesting. It represents a “location-based real-time dating
application” (Ranzini & Lutz, 2017, p. 81) that requires users to log in with their
Facebook profiles. Tinder then uses this information to compile a list of potentially
compatible candidates based on geographical location, number of mutual friends,
and common interests. Users are presented this list and are able to like another
user by swiping right or pass by swiping left. When two users swipe right on each
other, they are able to chat within the application. Tinder thus allows for one-to-one
communication in the context of dating. In 2015, Tinder had about two million users
in Germany (Spiegel Online, 2015, January 30). Similar applications—however
with considerably less users—are, for example, OK Cupid, Lovoo, Zoosk, Grindr
or Happn.
The next step consists of an in-depth analysis of those characteristics that affect the
level of privacy perceived in these environments. Environmental characteristics can
be either interpersonal or external factors. Interpersonal factors refer to the potential
recipients of an individual’s disclosures and external factors to characteristics
of the chosen environments that influence the perceived level of privacy. Both
types of factors are frequently pre-determined by the specific environment, but in
some cases, they can be manipulated. As discussed in the theory of situational
privacy and self-disclosure, the first step to controlling these factors is choosing
the appropriate channel to self-disclose and targeting the appropriate recipient(s).
In smartphone-based communication, this is done by choosing the appropriate
application. The proposed theory allows us to classify all external factors into
those that prevent identification by other users and providers (visual anonymity
and pseudonymity), and those that lower the accessibility of the shared content
(audience segmentation and end-to-end encryption). In some applications, these
factors can be further adapted and controlled using available privacy settings or
by implementing certain strategies. Thus, in this section, I discuss both manipulable
and pre-determined factors within each communication application. Table 8.1 shows
the specific combination of external factors in each application and further presents
an overview of the extent to which these factors are alterable by individual users.
Table 8.1 External factors in communication applications
Preventing identification Preventing content accessibility
Visual anonymity Pseudonymity Audience segmentation (End-to-end) Encryption
Email services By design Possible n/a Possiblea
Instant messenger
WhatsApp Possible Possible n/a Not possibleb
Facebook-Messenger Possible Possible n/a Not possiblec
Google Talk/Hangout Possible Possible n/a Not possible
Skype Possible Possible n/a By designd
Snapchat Possible Possible Possible/by design Not possible
Threema By design By design n/a By design
Signal/TextSecure By design Partly availablee n/a By design
Telegram Possible Possible n/a Possiblec
Surespot By design Possible n/a By design
SMS By design Partly availablee n/a Possiblea
8.2 Identifying Communication Environments
In the next stage of applying the theory, I identify and discuss potential antecedents
of both types of preventive privacy regulation behaviors: (1) choosing certain envi-
ronments and (2) manipulating those environments (steps 6 and 7 in the proposed
application guide). The initial selection and subsequent appropriation of certain
communication technologies is a pivotal step for effective privacy regulation. In line
with the theory of situational privacy and self-disclosure, we have to bear in mind
that such privacy regulation processes can be long-term and short-term focused. In
the context of smartphone-based communication, we have to differentiate between
the process of deciding to install and use a certain application in general (long-term
privacy regulation), and the situational process of deciding which application among
those one has installed and generally uses to use for a certain type of communication
at a given time (short-term privacy regulation). In this study, I focus on antecedents
of long-term preventive privacy regulation behavior, that is, choosing to install and
use certain applications as well as manipulating them. As noted before, Chap. 7
focused mostly on personal factors as antecedents of self-disclosure, as the primary
aim was to understand what makes people disclose themselves. In this section, in
contrast, I take a step back and focus on potential antecedents of pre-situational
privacy regulation processes and discuss them more specifically in the context of
smartphone-based communication. Figure 8.1 highlights these relationship in the
broader framework of the theory (cf. also Fig. 7.1 on p. 178).
Such long-term privacy regulation processes in the context of smartphone-
based communication must be considered within the wider framework of media
appropriation or technology adoption theories. The work of Rogers who developed
diffusion theory (Rogers, 1962) and continuously adapted and refined it (Rogers,,
2003) might serve as a starting point. He originally tried to synthesize a variety
of approaches and findings from different disciplines and backgrounds. Among
other aspects of diffusion processes, he proposed a five-stage innovation decision
process (Rogers,, 2003, pp. 168–218). He argued that individuals have to pass
through five consecutive stages (p. 169): (1) knowledge, (2) persuasion, (3) decision,
(4) implementation, and (5) confirmation. In the knowledge stage, individuals are
exposed to an innovation’s existence and gains an understanding of its functions.
In the following stage, the individual forms positive or negative attitudes toward
the innovation by obtaining information from other people and other resources.
Persuasion, in this sense, does not refer to the intention to induce attitude change.
Rather, it represents the psychological involvement with the innovation (p. 175).
In the decision stage, the individual engages “in activities that lead to a choice
to adopt or reject an innovation” (p. 177). Until this point, the innovation process
can be seen as the individual’s mental occupation with the innovation. However,
in the implementation stage, the individual puts the innovation into practice and
implements it into his or her social or organizational settings. It is only then that he
or she determines the innovation’s usefulness, as uncertainty about consequences of
198
Interpersonal
(Audience size, trust, relational
closeness, level of reciprocity)
External
(Protection against identification
and unwanted accesibility)
Evaluation 1 to 3
Privacy Regulation 1 & 2 Environmental factors 1 & 2 (Efficiency of privacy
(Choosing and manipulating Self-Disclosure regulation, accuracy of
the environment) interpersonal assessment,
efficiency of self-disclosure)
Internal
(Situational needs,
feeling, mood)
Personal factors 2
Personal factors 1
Fig. 8.1 Investigating antecedents of preventive privacy regulation behaviors in the context of the theory of situational privacy and self-disclosure
8 Applying the Theory to Smartphone-Based Communication
8.3 Antecedents of Pre-situational Preventive Privacy Regulation 199
adopting the innovation still exists (p. 179). Finally, the confirmation stage involves
seeking reinforcement for the decision that has been made or reversing the decision
if cognitive dissonance occurs (p. 189). Rogers thus views innovation diffusion
practices as a form of communicative and social practice.
According to von Pape (2008), the merit of the diffusion theory lies primarily in
its integrative nature. However, he criticizes that the theory suffers from theoretical
and methodological stagnation (pp. 46–51). Consequently, a number of alternative
approaches and theories have been proposed or adopted to explain the diffusion
of innovations and the adoption of technology (for an overview, see von Pape,
2008, pp. 53–96). Two widely used approaches to explaining the adoption of
communication information technologies based on social-psychological theories,
such as the theory of reasoned action (Fishbein, 1980; Fishbein & Ajzen, 2010)
and the theory of planned behavior (Ajzen, 1985), are the technology acceptance
model (TAM; Davis, 1989) and its extension the unified theory of acceptance
and use of technology (UTAUT; Venkatesh & Davis, 2000; Venkatesh, Morris,
Davis, & Davis, 2003). Both are based on a cost-benefit paradigm and thus focus
on perceived usefulness and perceived ease of use as antecedent factors of the
intention to adopt a new technology, which, in turn, influences its subsequent
adoption (or non-adoption). The TAM model has been criticized for oversimplifying
the adoption process and putting too much emphasis on people’s rationality in
the adoption process (e.g., LaRose, 2010). Davis and colleagues thus refined the
TAM and proposed the UTAUT (Venkatesh & Davis, 2000). The new model still
includes the two factors identified before (renamed performance expectancy and
effort expectancy), but additionally focuses on social influence factors (the degree to
which an individual perceives that important others believe he or she should use the
new technology) and contextual factors (the degree to which an individual believes
that infrastructure supporting the new technology exists) (Venkatesh et al., 2003,
pp. 447–454). Gender, age, experience, and voluntariness of use are regarded as
moderating factors.
However, another integrative approach also deserves attention in the context
of smartphone adoption. Based on a comprehensive literature review, Wirth, von
Pape, and Karnowski (2008) developed the mobile phone appropriation model
(MPA model). Taking the theory of planned behavior as an initial starting point,
the authors identify several evaluative processes that precede the final appropriation
of the mobile phone: (1) functional evaluations refer to individuals’ expectancies
with regard to the uses of the mobile phone and include a pragmatic and a symbolic
aspect, (2) normative evaluations refer to the influence of norms, and (3) restrictive
evaluations refer to financial, temporal, technological, or cognitive restrictions that
may inhibit mobile phone adoption. von Pape (2008) subsequently studied the
appropriation of mobile phones among young adolescents. Based on the MPA model
and using network analysis in school classes, he found that certain dynamics in
social networks of friends also play an important role in determining whether people
adopt the mobile phone or not.
An important aspect of each of these theoretical approaches to explaining appro-
priation processes is the cost-benefit paradigm, which posits that people’s attitude
200 8 Applying the Theory to Smartphone-Based Communication
and behavior reflect cost-benefit analyses. Evaluating the privacy risks involved
in communication technology adoption must thus be regarded as an important
part of these evaluations. For example, with regard to Roger’s (2003) five-step
innovation decision process, it can be argued that people are also initially confronted
with the innovation’s privacy risks (e.g., media reports that smartphones generally
collect location data) and start to evaluate these risks in the persuasion stage, which
eventually influences their decision to adopt or not adopt the innovation. Evaluating
privacy risks can alternatively be regarded as a form of restrictive evaluation in the
context of the MPA model. A loss of privacy can be regarded as a cost of adopting
a new technology and may hence inhibit overall adoption.
It is important to note that most approaches have focused on the adoption of
technologies (i.e., devices such as the mobile phone). The focus of this work,
however, is not on the adoption of the smartphone as a device, but rather the adoption
of specific applications for communicative purposes. Nonetheless, I believe that
the theories discussed above provide a valuable framework for understanding
application selection processes. In a similar way, the mental calculus preceding the
adoption of each application in the context of smartphone-based communication
includes risk evaluations, particularly those that pertain to privacy threats. In
this sense, the rationale presented here is closely related to the privacy calculus
argumentation (see Sect. 6.3.1). Although privacy calculus theory explicitly focuses
on self-disclosure as the behavioral outcome of this mental cost-benefit analysis, I
argue that such a rational choice process can also be adapted to other behavioral
outcomes, such as the adoption of specific technology or applications.
in order to obtain greater insights into what constitute inhibiting factors to the
adoption of different communication applications.
The second personality facet that seems likely to influence privacy regulation
behaviors is conscientiousness. As discussed in Chap. 7, conscientious people
should be more risk aware and might also desire more privacy due to their logical
assessment of the negative consequences arising from application use. Again,
Junglas et al. (2008) found that participants scoring high on conscientiousness
were indeed more concerned about their online privacy (β = 0.12, p < 0.05).
One subfacet of conscientiousness seems particularly likely to influence privacy-
related measures. Again, in the study by Dienlin and Metzger (2017), risk avoidance
(measured by the deliberation subfacet scale by Costa & McCrae, 1992b) was
positively correlated with the desire to have privacy from the government (β = 0.21,
p = 0.031). Based on these findings, we could argue that more deliberate people are
more likely to use applications that provide high levels of vertical privacy (e.g., IM
applications that have end-to-end encryption). The findings by Dienlin and Metzger
(2017) further revealed that more deliberate people also desire more interpersonal
privacy (β = 0.34, p = 0.003), suggesting that people scoring high on deliberation
should also be more likely to take more steps against horizontal privacy threats.
Again, due to the subtle differences between communication applications and the
lack of prior research, it does not seem adequate to formulate specific hypotheses
for every individual application. For example, a deliberate individual may be less
prone to use Facebook, but still not use Threema. Instead, he or she might use
Telegram which allows him or her to decide whether to protect a particular com-
munication against vertical privacy intrusions. As deliberate people are generally
self-disciplined and thoughtful in their assessments (Costa & McCrae, 1992a), it
seems possible that they are not very open to adopting new technologies in general
8.3 Antecedents of Pre-situational Preventive Privacy Regulation 203
Based on the rationales and findings presented in Sects. 6.3.1.1 and 7.4.1, both
online privacy literacy and online privacy concerns may be critical factors determin-
ing engagement with privacy regulation behaviors and to a lesser degree the level of
self-disclosure as well. Scholars have argued that being aware of the risks associated
with online media use, understanding the data collection practices of the providers
behind these media, and having the skills to implement specific privacy regulation
strategies are important requirements for effective self-data protection (Hoofnagle,
King, Li, & Turow, 2010; Masur, Teutsch, & Trepte, 2017; Park, 2013; Park & Mo
Jang, 2014; Trepte et al., 2015). Several studies support this claim. In the previously
discussed study by Park (2013), higher privacy knowledge was positively correlated
with social and technical protection behavior. In particular, he found that technical
knowledge (β = 0.26), surveillance awareness (β = 0.32), and privacy policy
understanding (β = 0.29) were positively related to preventive privacy regulation
behaviors, which included items referring to both choosing to (not) use certain
services (privacy regulation behavior 1) and manipulating the environment or using
specific strategy within the environment (e.g., using pseudonyms; privacy regulation
behavior 2). Similarly, Masur, Teutsch, and Trepte (2017) found that knowledge
about providers’ and institutions’ data collection practices, technical aspects of
data protection, data protection law, and data protection knowledge were positively
related to implementing privacy protection strategies (e.g., using pseudonyms or
fake email addresses). In the same study, however, higher knowledge did not predict
whether people stopped using certain sites.
Nonetheless, some studies specifically investigated the extent to which skills and
knowledge characterize non-users of services such as Facebook. For example, Vitak
(2015, May) conducted a survey with 2000 US American participants, of which 286
did not use Facebook at the time of the study. Measuring people’s online skills (i.e.,
familiarity with technical terms such as PDF, Cache, etc.), she found that higher
technical knowledge positively predicted Facebook non-use (odds ratio = 1.50, p
< 0.001). Based on this finding, it seems plausible that people who understand the
infrastructure, functions, and information flows of communication applications are
more likely to avoid privacy-intrusive communication applications, and conversely
more likely to use privacy-friendly applications. In other words, we can assume
that higher privacy literacy decreases the likelihood of using privacy-invasive
204 8 Applying the Theory to Smartphone-Based Communication
Privacy concerns should then predict people’s privacy regulation behavior. Only
a few studies have been conducted on the effect of privacy concerns on the first
type of privacy regulation behavior. Based on a representative survey for the USA,
Rainie, Smith, & Duggan (2013) found that some people cited privacy concerns as
reasons for taking a break from Facebook. Baumer et al. (2013) collected open-
ended responses from N = 410 participants on their reasons for not using Facebook.
Again, one recurring theme was privacy concerns. Participants cited both vertical
and horizontal privacy concerns as reasons for leaving, restricting, or limiting
their Facebook use. The results obtained by Vitak (2015, May) also confirm these
qualitative findings: Higher privacy concerns increased the likelihood of not using
Facebook (odds ratio = 0.68, p < 0.001). Based on 13 studies, the meta-analysis by
Baruh et al. (2017) found that privacy concerns negatively predicted online service
use (r = −0.16, p < 0.01).
Almost a decade of research exists on the second type of privacy regulation
behavior (manipulating the environment; i.e. using privacy settings). As discussed in
Chap. 6, studies investigating the so-called “privacy paradox” have long examined
relationships between privacy concerns and privacy regulation behaviors (cf. also
Baruh et al., 2017). Recent work suggests that privacy concerns positively predict
engagement with different privacy regulation behaviors and the effect was mediated
by privacy attitudes and intentions (Dienlin & Trepte 2015). Dienlin and Metzger
206 8 Applying the Theory to Smartphone-Based Communication
(2016) replicated this finding, showing that privacy concerns had a positive effect
on engagement with privacy regulation behaviors involving withdrawal from social
interaction on Facebook (β = 0.45, p < 0.001). Again, the meta-analysis (Baruh
et al., 2017) further supports these findings, as privacy concerns were positively
related to the use of protection measures (r = 0.17, p < 0.001).
A problematic aspect of these findings is the lack of distinction between vertical
and horizontal privacy concerns, which might be important for several reasons: First,
as discussed in the descriptions of communication applications in the preceding
sections, some applications provide a lot of options for safeguarding against hori-
zontal, but not against vertical, privacy intrusions. For example, Facebook provides
many options to gradually adjust the level of horizontal privacy, but has access to
all of its clients’ data. Hence, people with high horizontal privacy concerns may
choose applications that offer a lot of privacy settings (such as Facebook). Those
people might also be more inclined to implement pseudonymization strategies and
use applications that offer many options for restricting content visibility. People
with high vertical privacy concerns, on the other hand, will be more inclined to use
applications that also offer some protection against vertical data collection. This
might take the form of end-to-end encryption or the ability to use anonymization
strategies (e.g., as provided by Threema). Such people might even be less likely
to use privacy-invasive applications such as Facebook, WhatsApp, or Instagram.
Turning to the results of the content analysis of Teutsch (2013), we can again assume
that concerns about privacy violations are more pronounced with regard to popular
SNS or instant messenger (e.g., Facebook or WhatsApp) and less pronounced with
regard to other communication applications. A recent and rather unique study by
Lutz and Ranzini (2017), for example, found on the basis of an online survey with
497 US based participants that Tinder users were more concerned about vertical
privacy concerns than horizontal concerns. However, due to the lack of further
research distinguishing between horizontal and vertical privacy concerns and the
different perceptions of communication applications, I asked the following question:
Research Question 4: To what extent do non-situational personal factors such as higher
vertical privacy concerns influence the likelihood of engaging in preventive privacy
regulation behaviors such as using a) different communication applications and b) privacy
strategies or privacy settings within these applications?
Research Question 5: To what extent to non-situational personal factors such as higher
horizontal privacy concerns influence the likelihood of engaging in preventive privacy
regulation behaviors such as using a) different communication applications and b) privacy
strategies or privacy settings within these applications?
in the previous section, I provided some rationale for why people differ in their
decisions to use certain applications and why they differently engage with the
privacy settings or strategies these environments offer. What type of environment
an individual chooses and how he or she manipulates it is central to discussing the
antecedents of depth of self-disclosure: People determine some of the environmental
circumstances that subsequently allow them to disclose themselves. Or in other
words, the results of their privacy regulation behavior affect the environmental
factors that influence their self-disclosure. When discussing the antecedents of self-
disclosure, it is thus important to bear in mind that the environmental factors (both
interpersonal and external), in particular, are often determined by individuals’ long-
term preventive privacy regulation behaviors.
At this central stage of the theory application, I am going to identify all personal
factors (step 8 of the proposed application guide), all environmental factors (step
9), and possible interactions between those factors (step 10) that influence the
situational level of self-disclosure. The investigated relationships are depicted in
Fig. 8.2.
In the introduction, I asked whether the amount of self-disclosure an individual
engages in depends on his or her personality or general concerns that the content
of digitally transferred messages might be visible to unintended third parties, or
whether it instead depends on the situational circumstances the individual currently
finds himself or herself in. Throughout the book, I have argued that an individual’s
level of self-disclosure primarily depends on how strongly he or she is motivated
to talk to a certain person or group of persons. I have further argued that the
relationship to these (potential) recipients determines the level of self-disclosure in
the conversation. Based on this rationale and in line with Ross and Nisbett (2011),
we must hence bear in mind that the amount of situational variance may exceed the
amount of variance that can be explained by stable personal characteristics. With this
in mind, we have to be careful in evaluating the possible effects of non-situational
personal factors on self-disclosure, as they may only account for a small portion
of the variance. During the following discussion of both stable and situational
factors related to self-disclosure, we need to consider that non-situational personal
characteristics may indeed have some effect on self-disclosure, but this effect may
be small or even fully absorbed by stronger situational effects.
In contrast to pre-situational privacy regulation processes—which are always
specific to the context in which the theory of situational privacy and self-disclosure
is studied—antecedents of the depth of self-disclosure are more universal and can be
derived from the theory of situational privacy and self-disclosure. However, before I
formulate corresponding hypotheses, I would like to go back and challenge the basic
supposition of the theory, which posits that self-disclosure (and perceived level of
privacy as well, for that matter) is inherently situational (cf. p. 138). Although I
208
Interpersonal
(Audience size, trust, relational
closeness, level of reciprocity)
External
(Protection against identification
and unwanted accesibility)
Evaluation 1 to 3
Privacy Regulation 1 & 2 Environmental factors 1 & 2 (Efficiency of privacy
(Choosing and manipulating Self-Disclosure regulation, accuracy of
the environment) interpersonal assessment,
efficiency of self-disclosure)
Internal
(Situational needs,
feeling, mood)
Personal factors 2
Personal factors 1
Fig. 8.2 Investigating antecedents of self-disclosure in the context of the theory of situational privacy and self-disclosure
8 Applying the Theory to Smartphone-Based Communication
8.4 Antecedents of Situational Depth of Self-Disclosure 209
have presented theoretical evidence for this claim, it has not yet been confirmed
and quantified empirically. As a first step, it thus makes sense to ask whether
this supposition is actually true. Consequently, the first research questions was
formulated as follows:
Research Question 6: How much variance in depth of self-disclosure is attributable to
interpersonal differences and how much to situational circumstances?
I assume that the situational variance will be greater than the variance that is
attributable to interpersonal differences. From this, it follows that particular internal,
interpersonal, and external factors of the situation will explain the depth of self-
disclosure. Consequently, I place particular focus on the situational effects within
the broader framework of the theory of situational privacy and self-disclosure.
In discussing the connection between privacy and self-disclosure (Chap. 5), I argued
that two perspectives have to be taken: First, we can argue that managing self-
disclosure is also a means of attaining a certain level of privacy in situations where
potential disclosures are not protected by the environment. Second, we can regard
privacy as a necessary precondition for self-disclosure. The former perspective
implies that refraining from engaging in self-disclosure ought to be regarded as a
form of privacy regulation that people employ to attain a specific level of privacy
that Westin (1967) called “reserve.”
Consequently, we can use the same rationale as in the previous section to formulate
hypotheses on how non-situational personal factors may effect the depth of self-
disclosure. With regard to personality facets, we could assume that gregarious
people will engage in higher self-disclosure (independent of situational constraint)
than people who score low on this subfacet. Similarly, deliberate people ought to
more frequently refrain from engaging in self-disclosure. Moreover, people with
high online privacy literacy should generally be less inclined to disclose themselves,
as they are more knowledgeable about associated risks. Finally, higher concerns
about both horizontal and vertical privacy may further inhibit a person’s overall
level of self-disclosure.
Although previous research on aggregated measures of these variables has shown
that such relationships indeed exist (Baruh et al., 2017), it remains unclear whether
these effects actually hold when self-disclosure is measured situationally. The
aggregated effects are generally very small—a finding that could be the results
of hidden variance across situations. As these personal factors may have an even
greater impact on people’s likelihood of engaging in privacy regulation behavior
210 8 Applying the Theory to Smartphone-Based Communication
(see previous section), it seems possible that they do not directly influence people’s
level of self-disclosure any given situation. Let us consider a simple example:
Peter is concerned about his privacy while using his smartphone for communication. He
does not feel good about the provider’s data collection practices, and fears that the content
of his conversations might end up being more public than he intended them to be. As a result,
he decides to use Threema, which he believes provides an appropriate level of privacy.
Based on this example, we could argue that Peter’s concerns and his privacy
literacy initially made him choose a privacy-friendly application, but since then,
the only factors determining his level of self-disclosure a given situation are purely
situational ones. Whenever he wants to share something (enforcing factor: need),
he chooses the right recipient (his friends) and thus discloses himself. This example
would contradict or at least complicate the finding from traditional survey studies.
Due to the lack of prior research on the influence of non-situational personal factors
on situational self-disclosure, the following research question was formulated:
Research Question 7: How do non-situational personal factors such as a) personality
facets, b) online privacy literacy, and c) horizontal and d) vertical privacy concerns relate to
the depth of self-disclosure in smartphone-based communication situations?
study. This measure can be regarded as an appropriate proxy for the goals associated
with self-disclosure, as it captures the differences between goals in terms of the
willingness to self-disclose they induce. Although quite obvious, I believe that it is
an important factor to be included in the model as it lies at the root of all other factors
and thus allows a more precise assessment of the following environmental factors.
Consequently, I simply hypothesize that a higher need to self-disclose results in
deeper disclosure:
Hypothesis 2: With regard to internal factors, the need to disclose will be positively related
to depth of self-disclosure in smartphone-based communication situations.
The theory of situational privacy and self-disclosure posits that the characteristics
of a specific environment determine the level of privacy in that situation. Taking the
latter of the two perspectives on privacy and self-disclosure, we can now focus on
environmental factors of situations that determine a high level of privacy and should
therefore foster self-disclosure. In this regard, environments are characterized by
two types of factors: (1) the people present in the situation and (2) the level of
protection against identification and content accessibility. Both will be discussed in
the following sections.
The theory of situational privacy and self-disclosure proposes that interpersonal fac-
tors fundamentally affect self-disclosure in any type of communication (Sect. 7.4.4).
Such assessments are pivotal in any kind of social interaction.We constantly try to
assess someone’s character and base our expectations on how he or she will behave.
Human beings learn and internalize such interpersonal assessments throughout their
lives. On the basis of their experiences, they naturally acquire the capacity to judge
their fellow human beings (Laufer & Wolfe, 1977; Peter & Valkenburg, 2011). Just
as self-disclosure plays an important role in our relationships, the nature of these
is equally important for self-disclosure. Based on the rationale provided by the
theory of situational privacy and self-disclosure, the following two hypotheses can
be formulated:
Hypothesis 3a: Interpersonal trust will be positively related to depth of self-disclosure in
smartphone-based communication situations.
Hypothesis 3b: Relational closeness will be positively related to depth of self-disclosure in
smartphone-based communication situations.
212 8 Applying the Theory to Smartphone-Based Communication
Finally, we have to bear in mind that there is consistent support in the literature
for the reciprocity of self-disclosure. In the context of smartphone-based com-
munication, it seems reasonable to assume that people engage in higher levels of
self-disclosure when they have to answer to a message by another person. Hence,
my final hypotheses is formulated as follows:
Hypothesis 3d: Depth of self-disclosure will be higher when the discloser answers a
message compared to when the discloser him- or herself has initiated the conversation.
External factors comprise all characteristics of environments that affect the level
of protection against either identification or content accessibility. Based on the
in-depth analysis of smartphone-based communication applications in Sect. 8.2.2,
specifically in terms of their level of visual anonymity and pseudonymity, the
implementation of end-to-end encryption as well as privacy strategies to limit
content visibility can be analyzed in this study. Based on prior literature, these
factors should all positively influence the level of self-disclosure. However, some
further considerations should be noted: First, many of the applications investigated
rely on identification. It is thus very likely that only a few people actually
implement strategies such as visual anonymity or pseudonymity. For example, on
WhatsApp, people almost always communicate with people they know. Within such
environments, it is possible that visual anonymity and pseudonymity may not really
affect self-disclosure. As noted before, protecting oneself against identification is
particularly important in networked publics and when the goal associated with self-
disclosure does not require being identified (e.g., communicating something in a
health forum). Secondly, content visibility is limited by design in many communi-
cation applications. As such, the effect of privacy settings may only be identifiable
in communication applications that allow for one-to-many communication. Based
on these theoretical considerations, I formulated the following research question:
Research Question 8: To what extent do situational external factors such as a) visual
anonymity, b) pseudonymity, c) limited content accessibility, and d) end-to-end encryption
influence the depth of self-disclosure in smartphone-based communication situations?
8.4 Antecedents of Situational Depth of Self-Disclosure 213
Several interaction (or moderation) effects can be assumed on the basis of the
proposed theory. Broadly, we can differentiate between (1) situational interac-
tions (e.g., internal factors interact with interpersonal factors), (2) non-situational
interactions (e.g., online privacy literacy interacts with privacy concerns), and (3)
cross-situational interactions (e.g., non-situational trait like qualities interact with
situational internal, interpersonal, or external factors).
Among the first type of interactions, the relation between external environ-
mental factors and audience size needs further inspection. In Sect. 7.4.4, I briefly
argued that external environmental factors (visual anonymity, pseudonymity, and
content accessibility) might not necessarily directly affect self-disclosure, but rather
decrease the negative effect of audience size. In other words, when people have
taken steps to prevent identification and content accessibility, who accesses their
disclosed information might become less important.
Non-situational personal factors may also interact. This second type of interac-
tions is very likely with regard to trait-like characteristics such as concerns or skills.
As argued earlier, it is likely that people with higher online privacy literacy may
also be more aware of potential vertical or horizontal privacy risks. As such, we
could argue that higher literacy also increases the effect of those concerns on self-
disclosure. Furthermore, it seems likely that vertical and horizontal privacy concerns
will be correlated and thus also influence the effect of each other on self-disclosure.
Finally, I argued that personality and trait-like characteristics may not just affect
the situational level of self-disclosure in a linear and direct way, but may also
affect how other situational factors influence the level of self-disclosure (see p.
153). Differences in individuals’ characteristics may thus explain why situational
effects vary across individuals. For example, horizontal privacy concerns may render
interpersonal factors more effective in influencing situational self-disclosure. Higher
gregariousness, on the other hand, may weaken the effect of these factors. At the
same time, personality and trait-like characteristics may also affect the way people
perceive external factors. For example, external factors might be more important for
deliberate people than for non-deliberate people. Likewise, higher privacy literacy
may increase the effect of external factors on self-disclosure.
Although all three types of interactions may seem plausible at first glance, they
remain purely speculative, as no prior study has investigated these type of effects,
and there is no empirical evidence available. For this reason, the present study
remains exploratory. I thus formulated the following research question:
Research Question 9: To what extent do interactions between a) several situational, b)
non-situational), as well as c) between situational and non-situational factors contribute to
explaining the depth of self-disclosure?
Chapter 9
Methods
1 Other forms of EMA include diaries, behavioral observation, self-monitoring, time budget studies,
or ambulatory monitoring. For more information on these data collection techniques, see Stone,
Shiffman, Atienza, and Nebeling (2007).
218 9 Methods
over a number of consecutive days (usually about a week) (e.g., Larson, 1977).
Conceptually, the ESM can be compared to the self-reflective data collection in dairy
studies (Görland, 2017; Karnowski, 2013). However, it moves the self-assessment
time point closer to the actual activity, combining the high ecological validity of
diary studies with more reliable measurements. In technical terms, the researcher
receives self-reported measures by randomly sampling events that should in prin-
ciple be representative of individuals’ daily lives. By prompting respondents to
immediately reflect on their behaviors while performing them, the ESM overcomes
the problem of biased recalling mentioned earlier. As Barrett and Barrett (2001)
emphasize, the ESM “does not require retrieval or reconstruction of data from
memory but rather involves access to and accurate reporting of information available
to conscious awareness” (p. 176). Thus, measures from ESM studies are typically be
regarded as reliable and valid self-assessments (Csikszentmihalyi & Larson, 1987;
Karnowski, 2013; Larson & Csikszentmihalyi, 2014). Nevertheless, the quality of
such measures rests on the assumption that the respondents are actually aware of and
have access to the required information, and moreover, are willing to report it. As
such, we have to bear in mind that ESM is perhaps “best thought of as a procedure
that allows participants to report the contents of awareness along with the situation
in which that awareness takes place” (Barrett & Barrett, 2001, p. 176).
Although ESM studies have mostly used the random sampling procedure
described above, several types of ESM differing with regard to their sampling
method can be distinguished (e.g., Scollon, Kim-Prieto, & Diener, 2003; Shiffman,
2007): Interval-contingent sampling refers to collecting data at designated time
intervals (e.g., every hour or every day) for a longer period of time. Oftentimes,
this type of sampling is also referred to as time-sampling because respondents
are prompted to answer the self-report questionnaires at specific times (e.g., 6.00
pm every day). Event-contingent sampling or event-based sampling refers to data
collection after a predesignated event occurs (e.g., after the respondent has eaten,
has watched TV, has used the Internet, etc.). A specific form of this is known
as self-sampling, as it requires the individual to start the questionnaires him-
or herself. However, compliance is hard to document in such studies. Studying
mediated activities, on the other hand, sometimes allows such event-contingent
sampling procedures to be automatized. As this requires the combination of ESM
and logging techniques, I will discuss these types of automatic event-contingent
sampling procedures more thoroughly below. Lastly, random sampling or signal-
contingent sampling refers to the original procedure proposed by the Chicago
School.
Some scholars have recently introduced the term mobile experience sampling
method (M-ESM) to describe research designs in which mobile devices are used
to collect data (Karnowski, 2013; Karnowski & Doedens, 2010; Randall & Rickard,
2013). Several types of M-ESM approaches can be differentiated (for a discussion of
the costs and benefits of each, see Hofmann & Patel, 2015): (1) giving participants
a prepared device (PDA approach), (2) installing an application on participant’s
smartphones (local APP approach), or (3) sending web-based surveys to participants
via SMS (survey distribution approach). The last two approaches seem particularly
9.1 Beyond Traditional Data Collection Methods 219
As communication scholars, we often want to know when, how often, and how
long people use certain media. Until recently, there was no alternative to simply
asking people to estimate the frequency and duration of their media use. Naturally,
it is quite difficult for respondents to remember, characterize, and aggregate their
media use (Boase & Ling, 2013). Now, however, alternative methods exist that allow
people’s media use to be tracked by assessing log data. A log file can be regarded as
a datum in which a certain event that occurred within a given software is recorded.
With the rise of software-based devices (e.g., the computer, mobile phones, etc.),
the collection of large quantities of log data has become possible (Boase, 2013).
Tracking behavior in this way represents a methodological opportunity for studying
mobile phone use because of two inherent advantages:
220 9 Methods
Facebook use on subsequent mood. The authors were thus able to measure mood-
related variables just minutes after people had used Facebook. The results suggested
that Facebook positively effects mood right after usage, but has no longitudinal
effect on overall mood.
These studies clearly support the assumption that many effects we as communi-
cation scholars are interested in analyzing are tied to fleeting experiences and vary
across situations. They also show that behavior fluctuates. Consequently, the present
study adopted a similar data collection approach. The following section describes
the specific research design in detail.
In testing the theory of situational privacy and self-disclosure, the main method-
ological challenge is to measure the entirety of factors that theoretically influence
self-disclosure in a given situation. First, we need to assess respondent’s trait-
like characteristics. Second, we need to assess a variety of situationally-varying
personal and environmental factors. Assessing external environmental factors is
further complicated by the variety of possible situations that potential respondents
may encounter during the study.
The present study combines traditional online survey methods, the tracking of
smartphone and specifically of application use, and mobile experience sampling
methods. This combined research design represents the ideal form for empirically
investigating the theory of situational privacy and self-disclosure. All three methods
are necessary to capture the entirety of factors that influence self-disclosure
during smartphone-based communication. First, the online survey is necessary
to assess non-situational personal factors such as socio-demographic variables,
overall privacy concerns, literacy and skills, and personality facets. Moreover,
preventive privacy regulation behaviors within specific smartphone applications
can be assessed through surveys as they represent rather infrequent behaviors
that can be accurately recollected (Schwartz & Stone, 2007, p. 14). Second,
participants’ smartphone use needs to be recorded both to assess overall usage and
to automatically trigger situational questionnaires. Third, all situationally-varying
factors (both personal and environmental) need to be assessed through an automatic
event-contingent sampling ESM approach as they represent frequent, yet irregular
and situationally-varying variables (Schwartz & Stone, 2007, p. 14). Lastly, a post-
survey allows potential interferences resulting from the overall research design to
be identified. Figure 9.1 shows the research design that was developed on the basis
of this rationale.
Such a complex research design has several specific technical and method-
ological requirements. First, it is important to carefully design the situational
questionnaires. Previous research has shown that answering each questionnaire
should not take longer than 2–3 min (Hektner et al., 2007; Karnowski & Doedens,
2010). As participants have to answer these questionnaires several times throughout
222 9 Methods
the study and potentially at different times during the day, they can only include
a limited number of items. Nevertheless, the instruments assessing the constructs
of interest should be reliable (even when operationalized as a single item). For this
reason, a pre-study was conducted in order to identify suitable short instruments
for the main study. Second, several technical difficulties have to be considered.
Specifically, in the main study, the different types of data obtained during each
of the consecutive data collection steps must be assignable to the respondent
who generated it. It is thus important to attach a unique identifier code to each
collected datum. It is further necessary to test the planned sampling strategy
beforehand. As I will discuss further below, sampling real-life situations involves
several methodological and technical considerations (e.g., including time-based
filters or adapting the event-based sampling to individual media usage patterns).
Thus, several pretests were conducted to ensure a smooth procedure.
In the following section, I briefly describe the design and the results of the pre-
study and discuss their implications for the main study. Afterwards, in the critical
portion of this chapter, I describe the design of the main study in detail.
9.3 Pre-study
The aim of the pre-study was to find reliable instruments both for the pre-survey (in
which long scales could be implemented) and the ESM study (in which only short
instruments could be used). However, not all factors that were eventually measured
in the main study were also included in this pre-study. In order to not overburden
participants, I only included those measures which needed to be measured with a
single-item in the ESM study and the newly developed measures whose reliability
and validity needed to be assessed.
9.3 Pre-study 223
The data for the pre-study stem from an online survey that was conducted from
the 26th of November 2014 until the 8th of December 2014. The link to the study
was disseminated using a snowball sampling technique: The author posted the link
on his Facebook profile, encouraging his Facebook network to participate in the
study and share the link among their networks. Overall, N = 185 Facebook users
took part in the pre-study, the majority of whom lived in Germany (92%). Due to
missing data, 25 participants had to be excluded. The following analyses are thus
based on the remaining n = 160 participants. Their average age was M = 26 years
(SD = 7.39, range = 18–55) and 71% of them were female. Half of the participants
had a university degree (54%) and about a third had a higher eduction entrance
certificate (Abitur).
The goal of the pre-study was to retrospectively assess a number of factors that
influenced the level of self-disclosure in two different mediated communication
situations. Thus, the approach was similar to the one applied by Bazarova (2012).
Participants were randomly assigned to two groups. The first group (79 participants:
Mage = 27 years, SD = 7.1; 76% female) was asked to copy and paste their latest
status update on Facebook into a designated field in the survey.2 All subsequent
questions referred to this specific post, which can regarded as a type of one-to-many
communication in a networked public. Participants in the first group reported to
spend on average 1.5 h per day on Facebook.
The second group (81 participants: Mage = 26 years, SD = 7.7; 66% female)
was asked to insert their last message they had written in an instant messenger
conversation into the designated field in the survey. The same subsequent questions
now referred to this specific message, which can be regarded as a form of one-to-
one communication within a networked dyadic interaction. On average, this group
reported using their favorite instant messenger 2 h and 8 min per day.
9.3.2 Measures
The following instruments were developed on the basis of prior research whenever
possible. All items were designed and presented in German. Item formulations and
their psychometric properties can be found translated into English in a table in the
Appendix A (p. 347).
Depth of Self-Disclosure Using a similar approach as Bazarova (2012), partici-
pants were asked to rate their latest post or message, respectively, with regard to four
bi-polar items. Respondents indicated on a 7-point scale whether the information in
2 Eight participants did not own a smartphone. These participants were directly assigned to this first
group.
224 9 Methods
the message or post was very intimate vs. not at all intimate, very private vs. not at
all private, very personal vs. not at all personal, and very confidential vs. not at all
confidential.
Online Privacy Concerns As discussed earlier, online privacy concerns can be
regarded as a trait-like characteristic of Internet users. Previous literature has
developed several measures to assess Internet users’ concern about their online
privacy. Buchanan, Joinson, Paine, and Reips (2007), for example, developed a
16-item scale that was subsequently used and refined in many empirical studies
(e.g., Dienlin & Trepte, 2015; Stieger, Burger, Bohn, & Voracek, 2013; Taddicken,
2014). However, this scale does not differ between horizontal and vertical privacy
concerns and lacks items regarding concern about website or mobile application
providers’ and institutions’ data collection practices. To overcome this shortcom-
ing, a new 12-item scale was developed on the basis of previous literature on
privacy concerns that included items referring to concerns about vertical intrusions
stemming from website and mobile application providers (e.g., “How concerned
are you about website provider (e.g., Facebook, Google, Amazon,. . . ) giving your
data to unknown third parties?”), and institutions (e.g., “How concerned are you
about institutions, government authorities, or intelligence services monitoring your
online communication?”), as well as concerns about privacy violations from other
users (e.g., “How concerned are you about other people (e.g., your employer,
acquaintances, neighbors, friends,. . . ) getting information about you without your
consent?”). Respondents answered each item on a 5-point scale ranging from 1 = not
at all concerned to 5 = very concerned.
Need to Self-disclose Participants reassessed how strongly they felt the need to
disclose themselves in that particular situation. Four items were developed (e.g., “In
this situation, my desire was to communicate with other people”) and answered
on a 5-point scale ranging from 1 = strongly disagree to 5 = strongly agree. An
additional, more generic single item was also tested (“How strong was your need
to share something?”) which was answered on a slider ranging from 1 = very low to
101 = very strong.
Interpersonal Trust Several scales to measure trust have been proposed in the
literature (e.g., Rotter, 1967). However, it is important to differentiate between
generalized trust and targeted trust. Whereas the first refers to overall trust in the
benevolence of people, the latter refers to the trustworthiness of a specific person.
Larzelere and Huston (1980) developed a short scale consisting of eight items that
specifically measure dyadic trust. In the original study, this scale had a high internal
consistency (Cronbach’s α = 0.93), was unaffected by social desirability, and was
distinct from other types of trust (Larzelere & Huston, 1980, p. 599). For the purpose
of this study, the scale was adapted to the two study conditions: The first group of
participants were asked to think about the people in their Facebook contact list, and
the second group about the person with whom they had shared their last message.
All eight items (e.g., “I feel that I can trust [my Facebook friends/this person]
completely”) were answered on a 5-point scale ranging from 1 = strongly disagree
9.3 Pre-study 225
to 5 = strongly agree. An additional, generic single item was also included (“How
much do you trust [your Facebook friends/this person]?”) and was again answered
on a slider ranging from 1 to 101.
Relational Closeness The Relational Closeness Scale by Vangelisti and Caughlin
(1997) was adapted to assess how people perceived the person(s) with whom
they shared the post or message. This scale comprises three dimensions that
measure subjective assessments of psychological closeness (4 items: e.g., “The
opinion of [my Facebook friends/this person] is important to me”), similarity (5
items: e.g., “[My Facebook friends/this person] and I share a lot of the same
attitudes about things”), and everyday centrality (3 items: e.g., “I see [my Facebook
friends/this person] very often.”). The internal consistencies of these dimensions
were acceptable in the original study (Cronbach’s α between 0.74 and 0.93). All
15 items were answered on a 5-point scale ranging from 1 = strongly disagree to
5 = strongly agree. For each dimension, generic items were developed that were
again assessed on a slider ranging from 1 to 101.
situational measures, the following procedure was applied to find the best items
to function as single item measures in the ESM study: In general, I identified the
item with the highest true score (= highest factor loading) and asked whether this
item adequately represented the overall latent construct. If the face validity was
high, I chose this item as the single item measure. Sometimes, however, the item
with the highest true score referred to a somewhat specific aspect of the overall
construct. If the scale also included a more generic item with a high factor loading,
I considered that alternative for the single item measure. That being said, in some
cases I computed the correlation between the overall latent variable and the generic
item I had also included in the survey because the resulting coefficient can be
regarded as a measure of the reliability of that particular item (similar to the item-
to-total correlation, see Hair et al., 2010, p. 123). When the correlation coefficient
was above 0.70, I chose the generic item over a too-specific item from the latent
construct as the single item measure. All analyses were conducted with the statistical
software environment R (Version 3.1.2), using the packages lavaan (Rosseel, 2012)
and semTools (semTools Contributors, 2016). All descriptive statistics and factor
loadings of the variables can be found in the Appendix A. The fit indices for the
final models (i.e., after modification) can be found in Table 9.1.
Depth of self-disclosure was modeled as a uni-dimensional latent construct. The
model fit well and the single factor had good internal consistency (Cronbach’s
α = 0.83) as well as good composite reliability (McDonald’s ω = 0.84). The AVE
was 0.57, indicating an acceptable convergent validity. Factor loadings were all
satisfactory (λ > 0.65), however, the item private vs. not at all private had the highest
true-score reliability (λ = 0.87), and was hence chosen as the single item for the main
study.
As proposed, I modeled online privacy concerns as a four-dimensional construct
(see Table A.2 in the Appendix). This model also fit the data well, with the factor
loadings in all four dimensions above 0.70. The first three dimensions had good
internal consistencies, composite reliabilities, and a high AVE (concerns about
provider: α = 0.86, ω = 0.86, AVE = 0.67; concerns about institutions: α = 0.90,
ω = 0.90, AVE = 0.76; concerns about users: α = 0.83, ω = 0.83, AVE = 0.64). The
last dimension, namely concerns about identity theft, had lower reliability (α = 0.66,
ω = 0.66) and the AVE was slightly below 0.50. Although the initial model fit
the data well, the modification indices revealed that the item “How concerned
are you about other people sharing information about you (e.g., photos, your
address, experiences etc.) without your consent?” had cross-loadings on the third
factor (concern about other users) and the fourth factor (concern about identity
theft). Furthermore, the other two items assigned to the third factor, which referred
to the concerns that other people might get information about oneself without
one’s consent, shared more common variance with each other than with the third
item. To address these shortcomings of the third dimension, three new items
were developed in order to measure two subdimensions of user-related concerns:
concerns about other people getting information without one’s consent and concerns
about other people sharing information without one’s consent. Lastly, another item
was developed for the last dimension in order to improve its reliability.
Need to self-disclose was modeled as a uni-dimensional latent construct; how-
ever, the CFA did not result in an acceptable model fit. As a result, the generic item
was chosen as the single item measure.
Interpersonal trust was modeled as a unidimensional latent construct. The fit of
this first model was not very good, χ 2 (20) = 108.00, p < 0.001; CFI = 0.94;
RMSEA = 0.17. Modification indices revealed that all reverse coded items loaded
onto one additional factor. However, including a method factor yielded a non-
identified model. Thus, all three reverse coded items were excluded. The restricted
model then had an acceptable fit to the data (Table 9.1). The single factor then had
good reliability (α and ω = 0.96) and good convergent validity (AVE = 0.82). As
all of the remaining items represented somewhat specific aspects of the overall
construct, the correlation between the generic item and the latent variable was
computed. With r = 0.73 (p < 0.001), the generic item had a good reliability
and was hence chosen as single-item measure for the ESM study.
In line with Vangelisti and Caughlin (1997), relational closeness was modeled
as a three-dimensional construct including the factors psychological closeness,
similarity, and everyday centrality. The model fit was acceptable, and all three
dimensions had a high internal consistency (α > 0.93), a high composite reliability
(ω > 0.93) and a high AVE (> 0.75). With regard to the first dimension, the
item “My Facebook friends/this person are/is important to me” was chosen as
the best single item because it is the most generic item and had the second-
highest factor loading (λ = 0.89). With regard to similarity, the second item “My
Facebook friends/this person and I share a lot of the same attitudes about things”
was chosen because it had the highest factor loading (λ = 0.93) and represents a
particularly interesting aspect of relationships that might be important in influencing
a respondent’s willingness to self-disclose to that person. With regard to everyday
centrality, the last item “I communicate very often with my Facebook friends/that
person” was chosen even though it had slightly lower factor loading than the other
two items (λ = 0.87). From a theoretical point of view, it seems more important
to measure the general communication frequency of two people when investigating
people’s smartphone-based communication as people do not necessarily have to see
each other to establish some form of relational closeness. The final item selection
for the ESM- study can be found in Table 9.2.
228 9 Methods
The main study consisted of three different data collection steps, which took
place from the 10th of April 2015 until the 31st of May 2015 (Fig. 9.2). First,
people were recruited to answer an online questionnaire which was designed to
measure general socio-demographic information and personality facets, media use
(with a focus on smartphone use), general trait-like measures (e.g, smartphone
affinity and organizational trust), privacy-related measures (e.g., privacy literacy,
horizontal and vertical privacy concerns, general privacy protection strategies), and
application specific settings and privacy manipulations. At the end of the survey,
smartphone users with an Android operating system were invited to participate
in a 2-week experience sampling study which would be conducted on their own
smartphone. To increase participation in this subsequent study, interested people
were incentivized with a e 20 payment, which they received after completion of the
study. Additionally, people were offered the chance to win one of several prizes (1x
iPad Mini 2, 2x Samsung Galaxy S3 Mini, 3x vouchers for short trips, and 4x e 10
Amazon vouchers).
9.4 Main Study 229
After obtaining participants’ consent (see also further below), they were
prompted to install the application movisensXS (movisens GmbH, 2017), which
can be downloaded from the Google Play Store. In short, movisensXS is an
Android-based application that allows researchers to conduct ESM studies with
different sampling designs (particularly time- and self-sampling). For this study, the
application was specifically modified in order to capture participants’ application
use in log files and use this data to trigger self-report questionnaires. Several types
of questions can be included in these situational questionnaires, which have high
usability and an unobtrusive design (see Fig. 9.3).
In the month preceding the study, Android released a new version called
“Lollipop 5.0”. With this update, the application programming interface (API)
that provided access to people’s log files was unfortunately no longer available.
Consequently, people who had updated their smartphone prior to the study were not
able to participate. However, most people were still using older Android version
such as “Jelly Bean” (4.1 to 4.3) or “KitKat” (4.4) at the time of the study.
After installation, participants were asked to photograph a QR code presented
on the last page of the online survey. This procedure automatically linked their
smartphone to both their online survey data and with the programmed ESM
study. After the installation process was completed, the application automatically
started tracking participants’ application use and triggered questionnaires using the
selected sampling strategy (see below). These questionnaires always included a first
question about the activities performed within the relevant applications. Whenever
participants indicated that they had posted or shared some content (text, photo,
audio, video, link) they were asked about the depth of self-disclosure as well as
all personal and environmental factors present in that situation.
230 9 Methods
Based on the existing literature, I assumed that the assumed effects would nonethe-
less be small (about r = 0.10). I thus aimed at recruiting as many participants to
detect such small effects with an α-error probability of 5% and a power of 80%.
Power analyses revealed a minimal sample size of N = 779. Due to the study design,
the hypotheses and research questions are tested based on different levels (pre-
survey sample, ESM study sample, and number of events per participants in the
ESM study). I hence tried to recruit as many participants as possible for the pre-
survey so that enough participants and disclosure events would remain for testing
both the non-situational and situational effects in the ESM study.
Participants were initially recruited from the Socio-Scientific Panel, which is
a noncommercial online access panel with voluntary participation (Leiner, 2012,
2016). Members receive a maximum of four invitations for online surveys per year.
The panel currently comprises about 100,000 email addresses (fluctuating due to
the addition of new members and the removal of inactive panelists). Questionnaires
have to go through a peer-review process in order to be selected for the panel.
Several formulations in the pre-survey were improved at the reviewer’s request.
An overview of the final sample in terms of socio-demographics can be found in
Table 9.3.
The link to the pre-survey questionnaire was distributed to a random selection
of the panel on the 10th of April 2015. Recipients were informed that all data
collected via the online survey would be anonymous and handled confidentially.
They were further informed that, depending on their eligibility (specifically, whether
they have an appropriate smartphone operating system), they would also be invited
to participate in a subsequent study. Overall, N = 2014 people clicked on the
link, n = 1692 started filling out the questionnaire, and n = 1572 also completed
it (completion rate: 77.6%). On average, it took M = 15.45 min (SD = 6.13 min) to
finish the survey. Sensitivity analyses revealed that effects of non-situational factors
on preventive privacy regulation behavior with an effect size of r > .071 could be
tested when assuming an α-error probability of 5% and a power of 80%.
The resulting convenience sample had an average age of M = 36.39 years
(SD = 14.80 years; range = 15–87 years) and about two thirds were female (60.19%).
Participants mostly lived in Germany (86.19%), although a few participants lived
in Austria (9.59%), Switzerland (1.92%), or other countries (2.30%). The sample
9.4 Main Study 231
generally was highly educated: 58.88% had a university degree and another 30.14%
had a university entrance certificate. Most participants were either employed or
freelancing (43.57%) or currently registered as students (34.55%).
In order to identify participants who would be able to run movisensXS on their
smartphones, participants were asked in the online survey whether they generally
use a smartphone and if yes, what type of smartphone they own. Overall, 80.09%
of the sample were smartphone users and the most frequently used operating
systems were Android (67.04%), iOS (24.43%), Windows (5.22%), and Blackberry
(0.87%). Although the majority of respondents were thus eligible to be invited to
participate in the subsequent ESM study, the distribution of the smartphone types
only somewhat compared to the actual market shares. According to the International
Data Corporation (IDC, 2016), Android had a market share of 79.6% in 2015,
whereas iOS (the iPhone’s operating system) had only 18.7%.
All N = 848 Android users were provided with detailed information about
the procedure of the subsequent ESM study and that they could discontinue
participation at any time. Specifically, they were informed that they would need
to install the application movisensXS and what type of data it would collect.4 It
was further explained that all collected data would be anonymous and used only
for scientific purposes. Potential participants were also informed of how often they
could expect short questionnaires during the 2-week period. After this explanation,
n = 314 indicated interest in the ESM-study (37.02%). Only respondents who agreed
to the consent form were instructed to download the application and start the study.
A few participants had Android operating systems newer than version 4.4 and
thus had to be excluded from the study. Furthermore, several initially interested
users (who had agreed to take part in the study) decided not to participate during
the installation process. Another several participants contacted the author because
they were not able to install the application on their smartphones. In the end, n = 185
people took part in the ESM study. Twenty-one participants, however, either did not
use their smartphone in a way that triggered situational questionnaires (e.g., they
only used their smartphone for calls or non communicative activities) or answered
several questionnaires but never shared or posted a message. These participants
were thus also excluded. The following analyses are hence based on the remaining
n = 164 people who used their smartphone in ways that produced valuable data
(share of the pre-survey sample: 10.43%). Sensitivity analyses revealed that such
a sample size allows to test effect sizes of r > 0.215. I will thus refrain from drawing
inferences from smaller effects sizes in the multilevel analyses. Participants were
M = 29.5 years old on average (SD = 10.00 years, range = 16–63 years), and 66.46%
were female. Overall, the ESM subsample and the base sample of the pre-survey
from which it was drawn had similar socio-demographic characteristics. However,
4 The application recorded people’s smartphone and application use in log files. More specifically,
it recorded when people accessed their smartphone and when they accessed applications. For each
application use episode, it recorded the date, time, and type of application that was used.
232 9 Methods
participants of the ESM study were significantly younger (see Table 9.3). Finally,
n = 149 participants also completed the post-survey.
provides a universe of
provides log files for if yes, data collecon
event-congent sampling
events that may include can be performed
communicave acts
when people used their smartphone, as well as when and what type of application
they opened or closed.5 Based on these log data, movisensXS was programmed
to automatically trigger application-specific questionnaires right after participants
closed communication applications. However, it is important to note that the log
data did not enable me to identify whether participants engaged in a communicative
act (i.e., a self-disclosure event). As such, the triggered event itself does not
necessarily represent an event of interest for testing the proposed theory. Using a
communication application obviously makes it more probable that the user actually
disclosed something. Nonetheless, the sampling strategy involved several “selection
steps” before actual data collection was conducted (Fig. 9.4):
In a first step, people’s application use was tracked. The resulting log data
provided the basis for the automatic event-contingent sampling which was con-
ducted as a second step. Whenever people used one of a number of predefined
communication applications, movisensXS automatically prompted them to answer
a situational questionnaire. The first question was critical as it asked about the
activities performed within the application. In this third step, communicative acts
involving self-disclosure by the participants were identified. If a person indicated
having shared a post, message, or any other content, the situational personal and
environmental factors identified on the basis of the theory of situational privacy and
self-disclosure were measured. If no communicative act was performed, participants
received a number of questions related to their performed activity (e.g., why they
have changed the privacy settings). These alternative questions were posed in order
to keep all situational questionnaires at a similar length. Otherwise, participants
could have realized that they had to answer fewer questions when indicating that
they did not share or post content and implement avoidance strategies.
As the log files formed the basis of this sampling strategy, it was important to
identify the relevant communication applications discussed in Sect. 8.2.1 within
5 In some cases, movisensXS also allowed me to track what type of activity was performed within
a given application. For very rare, yet interesting events such as posting a tweet on Twitter, these
specific activity logs were also used.
234 9 Methods
these files in advance. I differentiated among the same five types of communication
applications:
1. Email Services. Based on their current market share in Germany and findings
from the pretests, the following email applications were programmed as trig-
gers:
– Gmail
– GMX
– WEB.de
– Aqua Mail
– Native Android Email
2. Instant Messengers. The following IM services were programmed as triggers
on the basis of their user share in Germany:
– Whatsapp
– Facebook Messenger
– Threema
– Skype
– Snapchat
– Signal
– Telegram
– Short Message Services (SMS)
3. Social Network Sites: As not all discussed SNS also provide mobile versions of
their service, only the following applications were programmed as triggers:
– Facebook
– Google+
– Instagram
4. Microblogging Services: As Twitter is the only microblogging service, no other
application was programmed as a trigger:
– Twitter
5. Other applications: The pretests showed that some participants indeed used
Tinder, so this was also included as a trigger:
– Tinder
In the first pretest, closing any of these applications was programmed to trigger
application-specific questionnaires. In order to not overburden people with constant
questionnaires, a filter was implemented that stopped any triggers from firing for
4 h after a questionnaire had been completed. The results of this first pretest showed
that this filter strategy resulted in an overly consistent pattern: People would answer
their first questionnaire in the morning (mostly after having used WhatsApp) and
then answer one questionnaire almost exactly every 4 h. Because WhatsApp was
used so often, most sampled events were WhatsApp usage situations at set intervals.
9.4 Main Study 235
Subsequently, several pretests were conducted in order to find the optimal filter
strategy. In the end, a rather complex sampling scheme was adopted that was best
suited to achieving the two specified goals: First, the applications were divided into
the groups described above. Due to the large number of instant messaging services,
these applications were additionally divided into two separate groups (Group 1:
Facebook-Messenger, Threema, Skype; Group 2: SMS, WhatsApp, Snapchat).
Furthermore, Instagram (in which a form of visual disclosure through photos is
performed), and Tinder (in which disclosure to strangers is mostly performed),
which both represent rather unusual communicative acts, were grouped together
so that they would generally be triggered more frequently. Second, whenever
participants closed an application within any of these groups and the subsequent
questionnaire was triggered and completed, triggers for this particular group were
disabled for different time frames (e.g., 30 h, 29.5 h, 29 h, 28.5 h, etc.). These
different time frames were used to trigger questionnaires less systematically and
thereby spread the events more evenly across the whole day. Third, rather infrequent
events such as one-to-many communications that could be more specifically tracked
by movisensXS (posting a status update on Facebook and posting a tweet on Twitter)
were specified as additional triggers that fired independent of all other filters. If
participants completed a questionnaire after one of those two events, the respective
trigger was disabled for only 12 h. Fourth, a number of other irregular one-to-one or
one-to-few communication events (e.g., writing an SMS or writing an e-mail) were
subsumed to an additional group. If participants completed a questionnaire after one
of those events, triggers were disabled for 24 h.
This rather complex sampling strategy provided the best results in the pretests
and was hence used in the ESM study. According to the log data, participants
engaged in N = 28,525 usage events regarding the designated applications. Of
those, n = 3802 application usage events triggered a questionnaire (13%). Thus,
participants had to answer M = 20.56 questionnaires on average over the course
of the 2-week study (SD = 15.04; range = 1–87). As indicated by the high standard
deviation and the large range, the number of questionnaires per participant varied
considerably, which can be explained by different smartphone usage patterns. A
person who used almost all applications on a daily basis answered up to 4 or 6
questionnaires per day. A person who used only one of the triggered applications
every other day answered only a few questionnaires over the course of the whole
study. The overall response rate was very good, as only 8.31% of all triggered
questionnaires were not completed. More importantly, participant indicated having
performed a communicative act in 31.90% of the completed questionnaires. This
implies that people actively communicated in a third of the sampled events. In the
other cases, they only read messages (e.g., in the case of WhatsApp or Facebook-
Messenger), browsed news feeds (e.g., in the case of Facebook or Google+), or
performed other passive actions within the triggered applications. In the end, 1104
self-disclosure events could be used in the following analyses. In sum, participants
provided situational measures for events in which they disclosed themselves an
average of M = 6.78 times (SD = 5.34; range = 1–32). Sensitivity analyses thus
236 9 Methods
revealed that situational effects of r > .085 could be tested when assuming an α-
error probability of 5% and a power of 80%.
To evaluate the effectiveness of this sampling strategy, it is useful to compare the
distribution of sampled events and the distribution of communicative acts within
these events to the universe of events from which they were drawn (i.e., actual
usage events captured in the log data). Figure 9.5 shows the sampled events and the
proportion of sampled events that included a communicative act (the participants
actually shared a message) plotted against the actual number of such events that
occurred during the study according the log data.
As can be seen, the sampled events represent the universe of actual events quite
well. That being said, the data suggests that communicate acts primarily occur
within WhatsApp, as almost half of all filtered events were WhatsApp use events.
Nonetheless, there is a heterogeneity of communication situations, and we can thus
conclude that the sampling strategy was successful in achieving the predefined
goals.
9.4.3 Measures
In this section, I will describe the scales and measures used in the main study.
Table 9.4 provides an overview of all variables and when they were measured.
As mentioned before, non-situational personal factors (traits and trait-like charac-
teristics) were assessed in the pre-survey. People’s long-term preventive privacy
9.4 Main Study 237
regulation behavior (i.e., their use of application-specific settings) was also mea-
sured in the pre-survey. Participants’ answers were used to assign values to
the environmental factors on the situational level (in line with the theoretical
consideration that privacy regulation determines situational environmental factors).
Situationally varying factors (both internal personal factors and interpersonal envi-
ronmental factors) as well as the depth of self-disclosure of each communication act
were assessed in each situational questionnaire during the ESM study. Finally, the
post-survey consisted of items designed to measure people’s opinion and assessment
of the study.
The following instruments were either based on prior research or represented the
final versions of the instruments tested in the prestudy (Sect. 9.3.3). The order of the
items in each scale was randomized to avoid context effects (the effect of preceding
238 9 Methods
questions on responses to later questions). All items were designed and presented in
German. Their exact formulations and psychometrics can be found translated into
English in the Appendix B (p. 351). In addition to the measures described below,
the questionnaire also included items measuring general data protection strategies
(adopted from Masur, Teutsch, & Trepte, 2017) and average self-disclosure within
the relevant application. These measures were not used in the following analyses.
Gregariousness This subfacet of extraversion captures whether people enjoy the
company of others, are sociable, and are open to meeting new people. People who
score high on gregariousness tend to be comfortable in crowds of people and prefer
company over being alone. Four items taken from the gregariousness subscale of
the Revised NEO Personality Inventory (NEO-PI-R; Costa & McCrae, 1992b) were
used (e.g., “I like to have a lot of people around me”). Participants answered on a
scale ranging from 1 = strongly disagree to 7 = strongly agree.
Deliberation This subfacet of conscientiousness captures how deliberate people
are with regard to their actions and decisions. People who score high on deliberation
tend to be less spontaneous and more aware of the consequences of their behavior.
Participants had to answer four items (e.g., “I always consider the consequences
before I take action”) from the deliberation subscale of the NEO-PI-R (Costa &
McCrae, 1992b) on a scale ranging from 1 = strongly disagree to 7 = strongly agree.
Online Privacy Concerns Based on the insights from the pre-study, I measured
five dimensions of online privacy concerns. The first two refer to vertical privacy
concerns and include (1) concerns about website or app providers (e.g., “How
concerned are you about website or app providers sharing your data with unknown
third parties?”) and (2) concerns about institutions (e.g., “How concerned are you
about institutions, public agencies or intelligence services monitoring your online
or mobile communication?”). The last three dimensions refer to horizontal privacy
concerns and include (3) concerns about other users obtaining one’s personal
information (e.g., “How concerned are you about other users finding information
about you on the Internet?”), (4) concerns about other users sharing one’s personal
information (e.g., “How concerned are you about other users sharing information
about you with other people without your consent?”), and (5) concerns about
identify theft (e.g., “How concerned are you that people on the Internet might not be
who they claim to be?”). All items were measured on a scale ranging from 1 = not
very concerned to 7 = very concerned.
Subjective Online Privacy Literacy Trepte et al. (2015) define online privacy
literacy as a “combination of factual or declarative (“knowing that”) and procedural
(“knowing how”) knowledge about online privacy” (p. 339). Factual knowledge
includes knowledge about technical aspects of online data protection and laws and
directives as well as institutional data collection practices. Procedural knowledge,
on the other hand, refers to knowledge about strategies for individual privacy
regulation and data protection. Although the authors emphasize the need to objec-
tively measure online privacy literacy because people are generally not good at
estimating their own knowledge (see also Jensen, Potts, & Jensen, 2005; Morrison,
9.4 Main Study 239
Two types of data were collected in the ESM study. First, movisensXS recorded
people’s overall smartphone use (when the screen was on and off), as well as their
application use (when and what type of application). Within some applications,
specific activities could be recorded as well (e.g., posting a status update on
Facebook or a tweet on Twitter). In principle, movisensXS logged every time the
screen of the smartphone changed. The resulting log data included a time stamp
relative to the start of the study and a unique code that could be used to identify
which application had been used. These log data were used to trigger the situational
questionnaires.
The second type of data were collected through self-reports in these situational
questionnaires. The items for these self-report measures were mostly taken from
the pre-study described earlier. However, the answer options were changed as
the pretests showed that sliders were more convenient for participants to answer
than Likert-type scales (see right screenshot in Fig. 9.3 on p. 229). The sliders
were mostly used for items that required participants to agree or disagree with
certain statements. Figure 9.6 provides an overview of all items used. Due to
technical restrictions, the items were always presented in the same order. The
specific formulation of each item was adapted to the application and interpersonal
constellation of each situation. Figure 9.6 thus only shows the item formulations for
the scenario in which a participant has written a message to one or several persons.
The first question always inquired about the activities that were performed within
the application that triggered the questionnaire (Question 1). For example, if a
participant used Twitter and a subsequent questionnaire was triggered, this first
question read as follows:
What did you do on Twitter?
– I read the newest tweets.
– I read only one particular tweet.
– I wrote one or several private messages (Filter).
– I changed my privacy settings.
– I have not done any of the above things.
The answer options obviously only included activities that are possible to
perform on the triggering application. Whenever a participant indicated having
engaged in a communicative act (e.g., writing a message, posting a status update,
uploading a picture, etc.), all other situational questions were presented (Questions
2.1 to 2.5). The formulations of Questions 2.4 and 2.5 were adapted to the indicated
audience size (e.g., “The recipients of this message are important to me”). In the case
of status updates or tweets, these questions always referred to the relevant audience
(e.g., “My Facebook friends are important to me” or “The readers of my tweets are
important to me”).
9.4 Main Study 241
2.1 Reciprocity and audience size 2.2. Content and depth of self-disclosure
Q: You have indicated that you wrote one or several Q: What was the content of the message?
messages. Thinking about these most recent messages, did
a. Text
you start a conversation or respond to a message?
b. Picture
a. Started a conversation. c. Video
b. Responded to a message. d. Link
e. Voice message
Q: How many people received that message?
Q: How private was the content of your message?
a. Only one person.
b. Two persons. Slider ranging from
c. Three persons. 0 = not at all private to
d. Four or more persons. 100 = very private
In addition to these items, participants were also asked about their post-disclosure
concerns, perceived level of privacy, and the context of their smartphone use
(location and people present). However, these items were not used in the following
analyses.
242 9 Methods
The post-survey was designed to assess people’s evaluation of the overall ESM
study. Participants only had to answer a few items and were eventually led to a
form in which they were able to provide their bank information anonymously (for
the payment) and take part in the competition.
Intervention of the Study Design Two items were used to assess whether
participants felt that the situational questionnaires somehow affected how they
behaved during the study (“Because of the study, I think a lot more about data
protection and privacy than before,” “Because of the study, I am more deliberate
in posting information or data.”). Both items were measured on a scale ranging
from 1 = strongly disagree to 7 = strongly agree.
Interest in the Study One item was used to assess the extent to which participants
were interested in the study (“Overall, the study was interesting”). It was answered
on scale ranging from 1 = strongly disagree to 7 = strongly agree.
Perceived Effort To measure the extent to which people perceived the study
to be time-consuming and requiring a lot of effort, a single items (“The study
required much effort.”) was answered on scale ranging from 1 = strongly disagree to
7 = strongly agree.
Avoidance Strategy Finally, participants were requested to indicate whether they
purposely changed their smartphone use to avoid having to answer questions (“Did
you limit your app use during the study to receive less questionnaires?”). Answer
options ranged from 1 = never to 7 = always.
The research questions and hypotheses required several analytical steps in order to
be tested and answered. In a preliminary first step, I assessed potential bias in the
ESM sample resulting from the recruiting strategy. I also analyzed the post-survey
data to evaluate participants’ perceptions of the ESM study. In addition, all scales
were furthermore tested for convergent validity and reliability on the basis of the
pre-survey data.
The second step aimed at investigating antecedents of pre-situational privacy
regulation processes as proposed by the theory of situational privacy and self-
disclosure. Research Questions 1 to 5 and Hypothesis 1 were thus analyzed using
the pre-survey data set of N = 1572 participants.
Finally, the last step consisted of the central investigation of situational privacy
and self-disclosure in line with the proposed theory. Accordingly, Research Ques-
tions 6 to 9 and the Hypotheses 2 and 3 were analyzed using the data from n = 164
participants who took part in the ESM study. This analysis was based on the answers
these participants provided in both the pre-survey and the ESM study.
9.4 Main Study 243
Specifically with regard to the last analysis, several preparative steps had to be
taken before the data could by analyzed meaningfully. In this section, I will describe
the analytical strategies applied to appropriately test the proposed hypotheses and
answer the proposed research questions. I will further justify the type of data
preparation I deemed necessary for the analysis conducted in the third step. I
conducted all analyses with R (Version 3.3.3). Data management procedures were
conducting using dplyr (Wickham & Francois, 2016). Graphics were plotted with
ggplot2 (Wickham & Chang, 2016). I will indicate which additional packages were
used for each analysis in the respective portions of the text.
In a first step, all scales used in the pre-survey were subjected to confirmatory factor
analyses (CFA). As all items were measured on a 7-point Likert-type scale and
can thus safely be treated as continuous variables (Babakus, Ferguson, & Joreskog,
1987), standard estimations such as maximum likelihood can be used. However,
several assumptions have to be met (e.g., Finney & DiStefano, 2006, p. 271): (1)
independent observations, (2) large sample size, (3) correctly specified model, and
(4) multivariate normal data. Whereas the first three assumptions were determined to
be met a priori, the assumption of multivariate normality has to be tested explicitly.
First, all variables were examined with regard to their univariate distributions. In
larger samples (> 300), normal distribution should be assessed on the basis of
histograms and the absolute values of the skewness and the kurtosis rather than
by looking at z-scores (Kim, 2013, p. 53). In line with West, Finch, and Curran
(1995), Kim proposes that skewness higher than 2 and kurtosis higher than 7 are
a cause for concern in such samples. In this case, all items were deemed to be
normally distributed on the basis of the psychometric properties of the items (see
Table B.1, B.2, and B.3 the Appendix) and a visual inspection of the histograms.
Second, multivariate normality was tested for each set of items. Mardia’s test for
multivariate normality (Mardia, 2016) revealed that this assumption was not met
in all cases. Consequently, all CFAs were again run with maximum likelihood
estimation with robust (Huber-White) standard errors and a scaled test statistic
that is asymptotically equal to the Yuan-Bentler correction (Yuan & Bentler, 1997,
p. 770). Model fit was then assessed on the basis of the criteria described by
Hair et al. (2010, p. 584): The authors generally argued for using multiple indices
of different types for assessing adequate evidence of model fit, but also suggest
adjusting the index cutoff values based on model characteristics. Drawing on
simulation research (Hu & Bentler, 1999; Marsh, Hau, & Wen, 2004; Sharma,
Mukherjee, Kumar, & Dillon, 2005), they recommend taking into account both
model complexity and sample size.
To assess the factorial validity of the latent variables, I calculated the average
variance extracted (AVE). Values above 0.50 imply good convergent validity,
indicating that more than 50% of the variance is explained by the indicators
rather than by measurement error (Hair et al., 2010, p. 619). Reliability can also
244 9 Methods
6 The first questionnaire received the number 1, the second 2, and so on. This variable thus reflected
The first five Research Questions and Hypothesis 1 were tested using structural
equation modeling (SEM) with latent variables. Missing values were treated with
casewise deletion. As the dependent variables in these models were dichotomous,
I used a weighted least squares (WLS) approach (Muthén, 1993). In particular, a
weighted least squares estimation with mean and variance adjustment (WLSMV)
was used as it represents a robust alternative to the original WLS approach that also
includes an adjustment of the χ 2 and scaled standard errors. This robust approach
also provides a specific fit index that is particularly well-suited for evaluating model
fit for categorical data: the weighted root mean square residual (WRMR). It has
been suggested that values close to or below 1.0 represent good fit (Yu & Muthén,
2002, April, as cited by Finney and DiStefano, 2006, p. 194). Model fits were hence
evaluated by assessing the WRMR in combination with the traditional fit indices.
While initial CFAs were also conducted to assess the factor validity of each scale,
Hair et al. (2010) argue that such separate analyses represent poor practice as it
is easier for single construct to fit the data than the entire model and discriminant
validity and potential item cross-loadings cannot be tested for (p. 583). Hence, these
overall model fits were regarded as the decisive goodness-of-fit measures for this
analysis. As the estimated models included more than 30 manifest variables and
were all based on more than 250 participants, the following criteria were used to
evaluate model fit: CFI > 0.92 in combination with a RMSEA < 0.07 (p. 584).
The procedure described above produced probit coefficients for all paths on
binary dependent variables. Such coefficients estimate in standard deviation units
the amount of change in the dependent variable given a one-unit increase in the
independent variable (Kline, 2016, p. 46). However, the rate of change is not
constant for all values of the independent variable, as the overall relationship is
non-linear (as in logistic regression models). Logistic and probit regression tend to
give similar results in large samples. Although there is no constant scaling factor
for transforming probits into logits, the literature suggest multiplying logits by 1.6
(Gelman & Hill, 2009, p. 119) or 1.7 (Kline, 2016, p. 47). For easier interpretation,
I thus additionally computed odds ratios (OR: EXP(B*1.6)) from the transformed
probit coefficients.7 I tested all hypotheses with a two-tailed p < 0.050 significance
level. The lavaan and semTools packages were once again used to conduct the SEM
analyses.
7 Using a scaling factor of 1.7 as suggested by Kline (2016) did not yield considerably different
results.
246 9 Methods
between non-situational and situational factors (see again Table 7.1 on p. 137). Non-
situational factors refer to personality facets (here: gregariousness and deliberation)
and trait-like characteristics (here: privacy concerns and online privacy literacy),
while situational factors include the dependent variable (depth of self-disclosure) as
well as both personal (need to disclose) and environmental factors (interpersonal:
audience size, trust, psychological closeness, similarity and everyday centrality;
external: visual anonymity, pseudonymity, limited access, and encryption). These
measures are conceptualized in a hierarchical system: communication situations
(Level 1) are nested within persons (Level 2). Whereas scores obtained from
variables on the first level (measured in the ESM study) vary across situations,
scores obtained from variables on the second level (measured in the pre-survey) vary
between individuals. As a result of this nested structure, it must be acknowledged
that both intercepts and effects may vary across participants.
From a statistical point of view, the independence of observations (which is
required for most statistical procedures such as standard regression analysis) was
violated because a particular number of observations can be assigned to one specific
participant. Thus, I used multilevel modeling to account for the nested structure
(Hox, 2010). Using multilevel procedures, however, poses several challenges which
require further preparative steps, which I will discuss in the following sections.
Missing Value Analysis and Data Imputation
The first challenge concerns missing values. In ESM designs such as the one
implemented in this study, participants typically do not provide the same number
of observations due to the sampling strategy. In this study, participants provided
on average M = 6.78 (SD = 5.34; range = 1–32) situational measures for events in
which they disclosed themselves. However, as the range indicates, some participants
only provided one or a few events, whereas others provided more than twenty.
Nevertheless, even one or two observations per person is enough to fit a multilevel
model (Hox, 2010, p. 106): When persons have only one or a few observations,
their intercepts may not be estimated precisely, but they can still provide partial
information for the estimation of the regression coefficients and variance parameters
on both levels (Gelman & Hill, 2009, p. 276). In sum, varying numbers of
observations per person do not represent a problem for my subsequent analysis.
A second type of missing values, however, may significantly impair the power to
draw valuable inferences from the data: participants’ item nonresponse. This type
of missing values can occur on both levels. Most statistical analyses (including most
multilevel procedures implemented in statistical software) treat such missing values
with case-wise deletion. Nonresponse to one item at one measurement point in the
ESM study (i.e., on Level 1) causes the deletion of that communication situation and
leaves that particular participant with fewer observations. Missing values in the pre-
survey (i.e., on Level 2) are even more problematic as they eliminate the respective
participant from the analysis entirely. This is particularly worrying as it also causes
the elimination of valuable data obtained on Level 1. Consequently, treating missing
values with case-wise deletion may severely decrease the power to detect effects on
both levels.
9.4 Main Study 247
similar procedure as described above.8 These factor scores thus represent an overall
interpersonal assessment including trust, psychological closeness, similarity, and
everyday centrality perceptions.
Fourth, audience size was primarily measured at each disclosure event. However,
in one-to-many communication situations (e.g., status updates on Facebook, posts
on Instagram, or tweets on Twitter), audience size is hard to discern (again Litt,
2012). In those situations, the estimated number of contacts or followers measured
in the pre-survey was assigned to the respective disclosure events. These measures
can be regarded as rough estimates of the potential audience a discloser might
have in mind when posting on such platforms. However, due to the large amount
of dyadic or one-to-few communications in the sample, the resulting measure for
audience size was heavily skewed (M = 27.71, SD = 94.54, Median = 1, range = 1–
622, skew. = 4.06, kurt. = 16.62). From a theoretical point of view, such a measure is
also inappropriate for the purpose of this study because audience perceptions change
heavily with increasing size. For example, it might make a huge difference whether
a person communicates with one, two, or three persons. According to the theory
of situational privacy and self-disclosure, adding just one person to the audience
dramatically increases audience diversity and thus should negatively affect the depth
of self-disclosure. However, whether an audience is comprised of 100 or 101 people
does not make much of a difference, although whether the audience includes 100
or 1000 people might still make a difference. In other words, when audiences are
larger, changes must be bigger in order to affect disclosure behavior. Statistically, we
can thus argue that the effect of one additional audience member on self-disclosure
decreases exponentially with increasing audience size. Based on this rationale, I
decided to log-transform the audience size. Consequently, the resulting score was
less skewed (M = 1.25, SD = 1.41, Median = 0.69, range = 0.69–6.43, skew. = 2.63,
kurt. = 5.42) and the resulting coefficient representing the effect of audience size on
depth of self-disclosure should be closer to the effect of participants’ actual audience
perceptions.
Lastly, external environmental factors (i.e., visual anonymity, pseudonymity,
limited access, and end-to-end encryption) were coded as dichotomous items.
Coding was based on the in-depth analyses of each communication application in
Sect. 8.2.2. Values were taken from respondents’ answers in the pre-survey (see
Table 10.5) or assigned when a given factor was either present by design. For
example, with regard to visual anonymity, people were asked in the pre-survey
whether they had uploaded an identifiable profile or cover photo in each application
they used. For example, if a participant indicated having uploaded an unidentifiable
photo in their WhatsApp profile, the situational variable visual anonymity was coded
as 1 for all WhatsApp disclosure events. If the same participant indicated using a
8 Due to the hierarchical data structure, the factor structure may differ between participants, which
is not accounted for in the simple CFA. To control for such between-person variance, a multilevel
CFA was computed in MPlus. However, the results revealed that the factor structure did not vary
between participants.
9.4 Main Study 249
recognizable profile or cover photo on Facebook, the same variable was coded 0 for
all Facebook disclosure events. That being said and as described in Sect. 8.2.2, some
applications do not offer the possibility to upload a profile picture (e.g., Threema or
email services). For disclosure events in those environments, visual anonymity was
coded as 0. The same procedure was used for the variable pseudonymity. Whenever
applications allowed the use of real or fake names, the variable was coded according
to people’s responses in the pre-survey (1 = uses a pseudonym, 0 = uses the real
name). In the case of Threema, again, pseudonymity was coded as 1. With regard to
end-to-end encryption, participants only had to answer whether they used additional
encryption for their email service. With regard to all other environments, coding was
based on the applications’ default settings. Thus, this variable was coded as 1 for
disclosure events in Threema and Skype, which incorporate end-to-end encryption
by design. All remaining disclosure events were coded as 0. Lastly, the factor
limited audience refers to whether people confined their profiles to their friends
or followers. For example, with regard to Twitter, users are able to decide whether
their tweets are visible to anybody (coded as 0 for all respective disclosure events)
or only their followers (coded as 1). Similarly, limited audience was coded as 1 for
disclosure events on Facebook when participants had indicated not having an open
profile. Disclosure events in instant messenger services, on the other hand, always
have a limited audience (selected by the discloser) and were thus consistently coded
as 1.
Analytical Strategy
As mentioned before, the hierarchical structure of the data warrants multilevel
modeling. In particular, I used multilevel linear models9 which can be thought of as
generalizations of classical linear regression models, where intercepts, and possibly
slopes, are allowed to vary per group (Gelman & Hill, 2009, p. 251). Alternatives
would be to either ignore the group-level variable (simple regression, also referred
to as complete pooling) or to estimate separate models for each group (no pooling).
Whereas complete pooling ignores the variation between Level 1 units, the no
pooling approach overstates it (Gelman & Hill, 2009, p. 253).
In this study, participants are the grouping variable as a varying number of
observations can be assigned to each participant. I hence assumed that observations
within one participant were dependent (also expressed as intraclass correlation).
Accordingly, I estimated several multilevel linear models with self-disclosure as
the dependent variable in which predictors were included stepwise. First, the
unconditional model without any predictors was estimated (M0) and used to
estimate the intraclass correlation coefficient (ICC), which indicates the proportion
of the variance explained by differences between persons (Hox, 2010, p. 15). Next,
predictor groups were included stepwise: non-situational personal factors (M1),
followed by situational personal and environmental factors (M2). In the third model,
9 Sometimes also called multilevel regression models, random coefficient models, hierarchical
I tested whether some of the situational effects varied across persons (M3). Next, I
included several same-level interactions on Level 1 and Level 2 (M4). Finally, I
included possible cross-level interactions for those situational effects that varied
between persons (M5).
As the models were nested, they can be compared using the likelihood ratio test
(Snijders & Bosker, 2011, p. 97) which is based on a comparison of the models’
deviances. In general, models with a lower deviance fit better than models with a
higher deviance (Hox, 2010, p. 47). As the difference has a chi-squared distribution,
a conventional chi-squared test can be used to assess whether inclusion of predictors
significantly improved model fit. However, while these parameters can be used to
compare models, they do not provide information about each model’s absolute.
In multilevel analysis, computing the amount of explained variance is complex
and not as straightforward as in non-hierarchical linear regression analysis. Several
parameters have been proposed (e.g., Hox, 2010; Johnson, 2014; LaHuis, Hartman,
Hakoyama, & Clark, 2014; Nakagawa, Schielzeth, & O’Hara, 2013; Raudenbush
and Bryk, 2002). In random-intercept models (i.e., only intercepts are allowed to
vary across participants), most measures are based on the reduction of variance
components. Such an approach allows explained variance to be reported on both
levels (Hox, 2010, pp. 69–78), but is difficult to adapt to random-slope models.
Nakagawa et al. (2013) therefore proposed a marginal and a conditional R2 , which
provide simple measures of the variance explained by fixed effects only and by
both fixed and random factors (i.e. the entire model). Johnson (2014) extended
this approach also to random-slope models. Although these procedures have several
caveats that need to be borne in mind, I reported nevertheless the explained variance
on both levels for random-intercept models (M1 to M2) as well as the measures
proposed by Nakagawa et al. (2013) for all models. The package MuMIn (Bartón,
2016) was used for computation.
Finally, all variables were mean-centered to provide regression coefficients that
can be meaningfully interpreted. Centering is generally used to establish a zero
point on scales that otherwise lack such a value (Enders & Tofighi, 2007, p. 121).
In the context of multilevel modeling, variables on the first level can be centered
around the grand mean or the group mean. I used the guidelines by Enders and
Tofighi (2007, p. 136) and centered non-situational variables (Level 2) around the
grand mean, and situational variables that had no natural zero point (interpersonal
assessment and need to self-disclose) around the group mean (i.e., the individual
person’s mean) as such an approach allows for more meaningful interpretation
of Level 1 relationships. The log-transformed audience measure was additionally
centered around the minimum, which means that the zero point can be interpreted
as the smallest possible audience (= 1 recipient).
I tested all hypotheses with a two-tailed p < 0.050 significance level. The
lme4 package (Bates, Mächler, Bolker, & Walker, 2015) and its extension lmerTest
(Kuznetsova, Brockhoff, & Christensen, 2016) were used to conduct the multilevel
analyses.
Chapter 10
Results
Before I present the results, let us briefly recap the main research questions that I
formulated in the introduction to Part II of this book (Chap. 8). Applying the theory
of situational privacy and self-disclosure to smartphone-based communication, the
following two questions express the main goals of this study:
1. What makes people engage in application-specific privacy regulation behaviors?
More specifically, what personal factors influence people’s decision to choose
certain applications over others and to what extent do these factors also explain
the factors also the use of privacy strategies and settings within these environ-
ments?
2. Under what circumstances do people engage in a high level of self-disclosure
during smartphone-based communication? In particular, which personal and
environmental factors influence the situational depth of self-disclosure?
I take an empirical look at two of the three components of the theory of
situational privacy and self-disclosure: (a) pre-situational privacy regulation pro-
cesses (Sect. 10.2), and (b) situational privacy perceptions and self-disclosure
(Sect. 10.3). It is important to note here that the empirical investigations of these two
components are somewhat disconnected in that they are based on different samples.
Furthermore, the analysis of pre-situational privacy regulation processes is limited
to investigating the relationship between personal factors and long-term preventive
privacy regulation behaviors and thus cannot tell us anything about short-term
preventive, preservative, or corrective privacy regulations behaviors as discussed
in Sect. 6.1.5. Nonetheless, the analyses give us insights into how people regulate
their privacy by selecting and manipulating environments in order to prevent future
intrusions or violations and, furthermore, how this affects subsequent behavior in
these environments.
In the course of this chapter, I will present the results of the empirical analyses
in line with the hypotheses and research questions outlined in Chap. 8. The
presentation of the results will also follow the stepwise analytical strategy described
at the end of the previous chapter. A more comprehensive analysis and interpretation
of the results beyond the individual hypotheses will be conducted in Chap. 11.
Any data analysis depends on the quality of the data. A sophisticated data analysis
cannot make up for biased, incomplete, or badly measured data. Thus, I first assessed
whether the obtained data were adequate for the proposed data analysis strategy.
First, I assessed the quality of the scales used in the pre-survey, conducting several
preliminary scale analyses with the aim of testing the reliability and validity of the
variables of interest. Second, I assessed whether the recruitment strategy somehow
had biased the sample of the ESM study. As participants had to agree to let
movisensXS collect their application use over a period of 14 days, particular types
of people were more likely to participate than others. I further assessed whether
participants themselves felt that the study had somehow affected their behavior.
Additionally, several methods were applied to assess potential unconscious effects
of the study on people’s response behavior were conducted.
Model fit indices, descriptive statistics, and psychometric properties for all scales are
presented in Tables 10.1 and 10.2 (Exact item formulations as well as psychometric
properties can be found in Tables B.1, B.2, and B.3 in the Appendix B, p. 351).
Looking at the skewness and kurtosis, all items and mean indices could be
considered normally distributed. Both personality facets—which were measured
using the subscales developed by Costa and McCrae (1992b)—fit the data satis-
factorily. Convergent validity was likewise satisfactory, although the latent factors
only accounted for less than 50% of the average variance in the items. According
personal data. In contrast, about 14% were very concerned that other users might
get access to or share information about them without their consent.
Table 10.3 compares participants and non-participants in the ESM study with
regard to their smartphone affinity, subjective online privacy literacy, vertical
and horizontal privacy concerns, and personality. Looking at the means of the
two samples, we see that differences turned out to be non-significant. Initially, I
wondered whether people with high smartphone affinity would be more inclined
to participate in the study as they might be more interested in the design and
in evaluating their own smartphone behavior. However, the comparison between
participants and non-participants revealed no significant difference in reported
symbolic smartphone importance. Moreover, people who decided to take part in
the ESM study and thus allowed potentially sensitive usage data to be collected
were not more or less literate about privacy and data protection, nor were they more
concerned about their privacy on either the horizontal or vertical level. Both samples
also had similar scores on the personality measures. In sum, I conclude that the
design of the study did not severely bias the sample.
However, the results of the post-survey measures assessing whether people
perceived the study as an intervention or disturbance reveal that the study might
have slightly influenced people’s behavior and perceptions. On average, participants
were indecisive about whether the study had made them think more about privacy
and data protection (M = 3.97, SD = 1.61). However, as Fig. 10.1 reveals,
about a quarter of the sample (25%) chose a value one point above the scale’s
midpoint (= 5), suggesting that a considerable number of participants indeed felt
that they thought more about data protection and privacy after the study. Likewise,
people were at first glance indecisive about whether the study has made them more
deliberate in disclosing private information (M = 3.84, SD = 1.57). However,
Table 10.3 Comparison between participants and non-participants in the ESM study
Non-participants Participants
M SD M SD t df p
Symbolic smartphone importance 4.17 1.42 4.31 1.30 −1.29 224.15 0.199
Gregariousness 3.80 1.13 3.73 1.03 0.81 226.13 0.419
Deliberation 4.45 0.96 4.38 0.88 1.01 225.28 0.313
Online privacy literacy 4.40 1.32 4.53 1.13 −1.32 234.03 0.189
Vertical privacy concerns 5.08 1.31 4.90 1.29 −1.61 215.91 0.108
Horizontal privacy concerns 4.44 1.31 4.35 1.28 0.83 216.66 0.409
Note: Welch’s two-sample t-tests were computed
10.1 Preliminary Analyses 255
0 0
30 75
20 50
10 25
0 0
2 4 6 2 4 6
Fig. 10.1 Frequency distributions of the post-survey measures. Note: All items were measured on
a 7-point scale ranging from 1 = strongly disagree to 7 = strongly agree, with the exception of the
last item, which was measured on a 7-point scale ranging from 1 = never to 7 = always. Analyses
are based on the post-survey sample (n = 149)
Fig. 10.1 again suggests that a considerable number of participants now reflect more
before disclosing private information.
That being said, participants also indicated that they did not change their behavior
during the study. Aside from a small share of participants who thought that the study
required a great deal of effort, most participants did not consider the study to be
overly time-consuming or laborious (M = 2.84, SD = 1.46). More importantly, 79%
of all participants indicated that they did not use any avoidance strategy or changed
their usual smartphone use in order to receive fewer situational questionnaires (M
= 1.35, SD = 0.78). Figure 10.1 shows that even participants who scored higher on
that last item were below the scale’s midpoint suggesting that they may have tried
to avoid some questionnaires at times, but mostly did not change their behavior.1
These post-survey findings notwithstanding, it could be that participants were
unconsciously affected by the study design. Stone, Kessler, and Haythomthwatte
(1991) noted that diary studies (and ESM studies as well due to their similar
assessment techniques) require respondents to maintain interest over a considerable
period of time. Otherwise, responses to the situational questionnaires might be
of poor quality because people would tend to answer more quickly and with
less reflection over the course of the study. In this study, participants generally
rated the ESM study as rather interesting (M = 5.13, SD = 1.45). This might
1 What is more, even if participants did use their smartphone less and thus received fewer situational
questionnaires, they should still behave as predicted by the theory in the situations which were
captured.
256 10 Results
suggest that people were generally willing to provide truthful answers to the
situational questionnaires. The additional analyses conducted to test whether people
unwittingly changed their response behavior gave no reason for concern either: The
variance in people’s responses, for example, did not decrease over the course of
the study (random-intercept model (RI-M): b = −1.27, SE = 0.94, p = 0.180).
Participants did answer closer to the scale’s midpoint on the self-disclosure scale
(RI-M: b = −0.08, SE = 0.03, p = 0.009). However, the effect was very small,
as the deviation from the scale’s midpoint decreased by 0.08 points with each
additional questionnaire (potential deviation range = 0–50). Nonetheless, I further
tested whether the increasing number of situational questionnaires had an influence
on people’s self-disclosure reports. The results suggested that this was not the case
(RI-M: b = 0.10, SE = 0.03, p = 0.079). As such, the study design should not have
noticeably biased the subsequent analyses of the ESM data. Based on these results,
I considered the effect of the study on people’s response patterns as negligible.
The first set of analyses sought to understand what makes people engage in
preventive privacy regulation behaviors. As proposed by the theory of situational
privacy and self-disclosure, we can differentiate between the initial selection of
an appropriate environment (privacy regulation behavior 1) and the subsequent
manipulation of this chosen environment (privacy regulation behavior 2). Choosing
a certain environment in the context of smartphone-based communication refers to
deciding on, installing, and using a certain communication application. In the first
section, I hence investigate whether non-situational personal factors predict the use
of different communication applications in line with the proposed hypotheses. In
the second section, I investigate whether these same personal factors also predict
the use of privacy strategies and privacy settings within the most frequently used
communication applications.
Before I report the analytical results, it is helpful to look at the data descriptively.
Table 10.4 shows the proportion of users and non-users of the various communica-
tion services. The first two columns represent the distribution of users and non-users
in the pre-survey sample, while the last two columns represent the distribution of
the ESM sample. In the latter, the share of participants who actually used the mobile
version of this service during the ESM study is additionally indicated in parentheses.
10.2 Predicting Pre-situational Preventive Privacy Regulation 257
As the study was disseminated via email, all participants had an email account.
Moreover, 83% of those who participated in the ESM study also assessed their email
via a mobile application. With regard to IMs, the results show a mixed picture.
Whereas almost everybody used WhatsApp (94%) and the majority of participants
also utilized SMS (81%), Skype (64%), and the Facebook Messenger (46%), only
few participants used more privacy-friendly alternatives such as Threema (11%),
Telegram (4%), Signal (1%), or Surespot (0.2%). Similar distributions were found
in the ESM sample. However, looking at the actual usage within the ESM study, we
see that using a certain application does not necessarily mean that this application is
used very often. Whereas WhatsApp, which was installed by 96% of the participants
in the ESM study, was also used by 93% during the 2-week study, only 9% actually
used Skype during that time, although 68% indicated using that application in
258 10 Results
general. With regard to SNSs, it can be seen that most people used Facebook
(71%). Less than half of participants used Google+ (37%). Other SNS that used
to be popular in Germany (Stayfriends, StudiVZ, MeinVZ) were only used by a
few participants. Instagram as a SNS that is primarily used to share photographs
was used by 14%. Only four participants indicated using Ello. Again, similar
distributions were found in the ESM sample. However, considerably fewer people
actually used SNS during the ESM study. For example, although 87% indicated
having installed Facebook on their smartphone, only about 47% actually used
it in the course of the study. The other German SNS were not used during the
study because they do not provide mobile applications that allow the service to be
assessed from a smartphone. Next, 21% of participants used Twitter, with a similar
distribution found in the ESM sample. Finally, only a few people used the dating
application Tinder.
Keeping these results in mind, I will now turn to investigating antecedents
of privacy regulation behavior 1 (choosing certain communication applications).
Figure 10.2 shows the basic SEM that was estimated to investigate the relevant
research questions and hypotheses. All independent variables were modeled as
latent variables. The dependent variables (symbolized by the only rectangle in
the figure) were dichotomous usage items (e.g., 1 = uses Facebook and 0 = does
not use Facebook). In order to retain as much power in the model as possible,
I tested two similar models with different dependent variables. The first model
included all IMs that were used via a smartphone.2 The model was thus based on
all participants who indicated owning a smartphone (n = 970, 5.3% were excluded
due to missing data). The estimated model fit the data well, χ 2 (489) = 730.19,
p < 0.001; CFI = 0.95; TLI = 0.94; RMSEA = 0.02, 90% CI [0.02, 0.03];
WRMR = 0.96. All estimated paths and inferential statistics can be found in
Table B.4 in the Appendix B. Figure 10.3 additionally shows coefficient plots of the
odds ratios (with their 95% confidence intervals) and thus provides a more concise
overview of the results. Relationships are hence significant whenever the confidence
intervals do not include 1 (i.e., no effect).
The second model included all SNSs3 as well as the microblogging service
Twitter as services that can, but do not have to be used without a smartphone.
Thus, this model was based on all participants from the pre-survey (n = 1460,
7.1% were excluded due to missing data). The model likewise fit the data well,
χ 2 (467) = 805.99, p < 0.001; CFI = 0.95; TLI = 0.94; RMSEA = 0.02, 90% CI
[0.02, 0.03]; WRMR = 1.09. Table B.5 in the Appendix B provides an overview
of all path coefficients estimated in the model as well as their inferential statistics.
Figures 10.4 and 10.5 show coefficients plots of the odds ratios (with their 95%
confidence intervals).
2 I excluded all services with less than ten users in the sample. Thus, I excluded Surespot from the
first model.
3 As only four participants indicated using Ello, I excluded Ello from the analysis.
10.2 Predicting Pre-situational Preventive Privacy Regulation 259
Gregarious- RQ1a
ness
…about …about
Provider Instuonal
Pracces Pracces
Vercal
Privacy
H1a RQ4a
Concerns
e Privacy
Online RQ3a Regulaon
Privacy Behavior 1
Literacy (Choosing
e environments)
Horizontal RQ5a
H1b
Privacy
Concerns
…about
…about …about
Unwanted
Unwanted Identy
Informaon
Informaon The
Access
Sharing
Deliberaon
RQ2a
Fig. 10.2 SEM for predictors of privacy regulation behaviors 1. Note: Two structural equation
models with latent variables were estimated. The first model included SNS use (Facebook,
Google+, StudiVZ, MeinVZ, Instagram, and Twitter) as dependent variables. The second model
included IM use (WhatsApp, Facebook-Messenger, Signal, Threema, Telegram, Hangout, Skype
and Snapchat) as dependent variables
Fig. 10.3 Results from the SEM predicting IM use. Note: The original probit coefficients were
multiplied by a scaling factor of 1.6 (Gelman & Hill, 2009, p. 119) and transformed into odds
ratios (OR) for easier interpretation; e.g., each one-unit increase in the latent variable online privacy
literacy decreases the chance of using Whatsapp by 27% (OR = 0.73, value < 1= reduced chance),
whereas each one-unit increase in the latent variable vertical privacy concerns increases the chance
of using Threema by the factor of 1.56 (value >1= enhanced chance). The figure shows the OR all
and 95% confidence intervals
10.2 Predicting Pre-situational Preventive Privacy Regulation 261
Fig. 10.4 Results from the SEM predicting SNS use. Note: Coefficients represent odds ratios
(OR); e.g., with each one-unit increase in the latent variable vertical privacy concerns, the chance
of using Facebook decreases by 33% (OR = 0.67, value < 1= reduced chance), whereas each one-
unit increase in the latent variable gregariousness increases the chance of using Facebook by a
factor of 1.41 (value >1= higher chance)
p < 0.001, OR = 1.41) and StudiVZ (b = 0.17, se = 0.07, 95% CI [0.03, 0.32],
p = 0.021, OR = 1.32). A one-unit increase in the latent variable gregariousness thus
increased the chance of using Facebook by 1.41 times, and of using StudiVZ of by
1.32 times. A similar trend was observed with regard to Instagram (b = 0.10, se =
0.06, 95% CI [−0.01, 0.21], p = 0.071, OR = 1.17) suggesting that gregarious people
are also more likely to use Instagram. However, the effect was again not significant
at the predetermined level of significance.
In sum, the findings suggest that people scoring high on gregariousness are
more likely to use popular communication applications such as Facebook, Facebook
Messenger, and Skype. Conversely, shy people (who have low gregariousness
262 10 Results
se = 0.05, 95% CI [0.18, 0.33], p < 0.001, OR = 1.45) and Signal (b = 0.31,
se = 0.08, 95% CI [0.14, 0.47], p < 0.001, OR = 1.63). However, it also slightly
increased the likelihood of using Skype (b = 0.09, se = 0.04, 95% CI [0.01, 0.17],
p = 0.020, OR = 1.16) and Google Hangout (b = 0.29, se = 0.08, 95% CI [0.14,
0.44], p < 0.001, OR = 1.59). The results further revealed that online privacy
literacy positively predicted the use of certain SNS such as Stayfriends (b = 0.13,
se = 0.04, 95% CI [0.05, 0.21], p = 0.002, OR = 1.23), Instagram (b = 0.12, se =
0.04, 95% CI [0.05, 0.20], p = 0.002, OR = 1.22), and Twitter (b = 0.25, se = 0.03,
95% CI [0.18, 0.31], p < 0.001, OR = 1.48). With each one-unit increase on the
online privacy literacy scale, participants had thus a 48% higher chance of using
Twitter. In conclusion, the findings suggest a very mixed pictures. On the one hand,
online privacy literacy positively predicted the use of some SNSs such as Stayfriend,
Twitter, and Instagram as well as some IMs such as Skype and Google Hangout. At
the same time, it lowered the chances of using WhatsApp and increased the chance
of using privacy-friendly alternatives such as Threema or Signal.
Research Question 4a investigated whether vertical privacy concerns affect the
use of different communication applications. In line with the previous literature
on online privacy concerns more generally, I assumed that higher concerns would
lead to a decreased chance of using privacy-invasive services and conversely to a
higher chance of using privacy-friendly services. People with higher vertical privacy
concerns were moreover less likely to use WhatsApp (b = −0.28, se = 0.09, 95% CI
[−0.30, −0.09], p = 0.001, OR = 0.64) and the Facebook Messenger (b = −0.32,
se = 0.06, 95% CI [−0.42, −0.21], p < 0.001, OR = 0.60), lowering the risk of
using both applications by about 36% and 40%, respectively. On the other hand,
higher vertical privacy concerns significantly predicted the use of more privacy-
friendly IMs such as Threema (b = 0.28, se = 0.08, 95% CI [0.13, 0.42], p < 0.001,
OR = 1.56), Telegram (b = 0.22, se = 0.11, 95% CI [0.01, 0.43], p < 0.001, OR
= 1.43), and Signal (b = 0.37, se = 0.15, 95% CI [0.08, 0.66], p = 0.021, OR =
1.80). In particular, each one-unit increase in the latent variable for vertical privacy
concerns increased the chance of using Threema by 56% and of using Signal by
80%. Most prominently, the results revealed that higher concerns about providers’
and institutions’ data collection practices are related to a lower likelihood of using
Facebook (b = −0.25, se = 0.05, 95% CI [−0.35, −0.16], p < 0.001, OR = 0.67),
Google+ (b = −0.12, se = 0.05, 95% CI [−0.22, −0.03], p = 0.008, OR = 0.82), and
Instagram (b = −0.15, se = 0.06, 95% CI [−0.27, −0.03], p = 0.017, OR = 0.79).
A similar trend was also found for MeinVZ (b = −0.14, se = 0.07, 95% CI [−0.29,
0.00], p = 0.052, OR = 0.80). Vertical privacy concerns, however, had no effect on
using Stayfriends or StudiVZ. These findings suggest that vertical privacy concerns
are negatively correlated with using privacy-invasive and popular IM WhatsApp
and SNSs such as Facebook, Google+, and Instagram. At the same time, users with
higher vertical privacy concerns are also more likely to use more privacy-friendly
IMs such as Threema, Telegram, or Signal.
Finally, Research Question 5a asked whether horizontal privacy concerns like-
wise affect the likelihood of using different communication applications. Concerns
about other users were less powerful in predicting application use. With regard to
264 10 Results
Next, I will investigate what makes people engage in different types of privacy regu-
lation behaviors within their chosen environments. Before discussing the analytical
results, I will again present descriptive results with regard to the use of different
privacy strategies and settings. Table 10.5 shows how many participants in the pre-
survey sample indicated using each privacy strategy or privacy setting offered by
the different services. The table is similarly organized as Table 8.1 (Sect. 8.2.2,
p. 193). It likewise differentiates between strategies that prevent identification and
those prevent unwanted accessibility as proposed by the theory of situational privacy
and self-disclosure. The numbers in parentheses show the proportion of users in the
ESM sample who indicated using each strategy or setting.
In the context of email use, the results show that only a few people actually try
to enhance their level of privacy. Only 16% use a non-identifiable email address and
only 11% used additional software to encrypt their email communication. Notably,
10% of the sample did not know whether their emails are encrypted or not. With
regard to the most used IM WhatsApp, about half of participants did not upload an
identifiable photograph of themselves as their profile picture, making them visually
anonymous. Furthermore, about a third (31%) used a fake name.
On Facebook, 20% had an identifiable cover photo and 67% an identifiable
profile picture (which are both visible to everyone even when the content of their
profile is only visible to friends or specific people). Also about a third (30%)
used a fake name or a pseudonym for their Facebook profile. Furthermore, almost
all respondents (94%) limited their profiles to their friends. Only 5% had an
open profile visible even to non-members of Facebook. Finally, about half of
the participants who used Facebook (56%) implemented friend lists to separate
audiences into smaller groups.
On Google+, on the other hand, most participants had no identifiable cover photo
(83%) and no identifiable profile picture (67%). Slightly more Google+ users used
a pseudonym instead of their real name (38%) compared to Facebook. Furthermore,
fewer people limited their profile to their contacts (64%) and only about a third
(26%) used circles (similar to friend lists) to classify their contacts.
Of those participants who used Skype, 63% had not upload an identifiable profile
picture, and 50% used a pseudonym instead of their real name. On Twitter, even
more users had a non-identifiable profile picture (71%) and a non-identifiable cover
Table 10.5 Privacy regulation strategies and settings in different communication applications
Preventing identification Preventing content accessibility
Visual anonymity Pseudonymity Audience segmentation Encrypting content
Non-ident. profile Non-ident. title Using fake Limiting to Using friend lists End-to-end encryption
photo photo name/address friends/followers
Email services
Yes 16 (15) 11 (8)
No 83 (85) 78 (81)
Dk 1 (0) 10 (11)
WhatsApp
Yes 49 (53) 31 (34)
No 48 (46) 65 (65)
Dk 2 (1) 3 (1)
Facebook/Facebook Messenger
Yes 31 (34) 77 (85) 30 (33) 94 (96) 56 (59)
10.2 Predicting Pre-situational Preventive Privacy Regulation
photo (90%). Furthermore, many users also used fake names on Twitter (67%). On
the other hand, only 34% of all Twitter users in the pre-survey sample limited their
tweets to their followers. Finally, about half of Instagram users were non-identifiable
on their profile picture (52%). Furthermore, the majority used a fake name (78%).
About half limited their profile to their followers (47%).
On the basis of these descriptives findings, we can now move on to examining
the antecedents of privacy regulation behavior 2 (manipulating environments).
Figure 10.6 shows the basic SEM that was estimated to investigate the relevant
research questions and hypotheses. All independent variables were again modeled
as latent variables. The dependent variables (again symbolized by the only rectangle
in the figure) were dichotomous items indicating the use of different privacy
strategies or settings (e.g., 1 = used a non-identifiable profile picture and 0 = used
Gregarious- RQ1b
ness
…about …about
Provider Instuonal
Pracces Pracces
Vercal
Privacy
H1a RQ4b
Concerns
e Privacy
Online RQ3b Regulaon
Privacy Behavior 2
Literacy (Manipulang
e Environments)
Horizontal RQ5b
H1b
Privacy
Concerns
…about
…about …about
Unwanted
Unwanted Identy
Informaon
Informaon The
Access
Sharing
Deliberaon
RQ2b
Fig. 10.6 SEM for predictors of privacy regulation behaviors 2. Note: Three structural equation
models with latent variables were estimated. The first model was estimated based on all participants
and focused on email communication (n = 1440). The second model was based on all WhatsApp
users (n = 796). Dependent variables encompassed the following WhatsApp-specific privacy
regulation strategies: (1) using a non-identifiable profile picture and (2) using a pseudonym instead
of one’s real name. The last model included all Facebook users (n = 713). The dependent variables
were (1) using a non-identifiable profile and cover photo, (2) using a pseudonym instead of one’s
real name, (3) using friend lists, and (4) limiting profile access to friends
268 10 Results
Fig. 10.7 Results from the SEM predicting use of privacy strategies in Email services. Note: The
original probit coefficients were multiplied by a scaling factor of 1.6 (Gelman & Hill, 2009, p. 119)
and transformed into odds ratios (OR) for easier interpretation; e.g., with each one-unit increase
in the latent variable online privacy literacy, the chance of implementing end-to-end encryption
increases by a factor of 1.95 (value > 1= higher chance). The figure shows the OR and the 95%
confidence intervals
10.2 Predicting Pre-situational Preventive Privacy Regulation 269
Fig. 10.8 Results from the SEM predicting use of privacy settings and strategies on WhatsApp.
Note: Coefficients represent Odds Ratios (OR); e.g., with each one-unit increase in the latent
variable online privacy literacy, the chance of using a fake name on WhatsApp increases by a
factor of 1.22 (value > 1= higher chance)
of a non-identifiable cover and profile photo (visual anonymity), using a fake name
(pseudonymity), as well as the use of friend lists and limiting the profile to contacts
(limited access), two items which measured the level of content accessibility. The
model had a good fit, χ 2 (401) = 618.83, p < 0.001; CFI = 0.95; TLI = 0.94;
RMSEA = 0.02, 90% CI [0.02, 0.03]; WRMR = 1.02. Table B.8 in the Appendix B
provides an overview of all path coefficients estimated in the model and Fig. 10.9
shows the odds ratios.
Research Question 1b investigated the effect of gregariousness on the use of
privacy strategies or application-specific settings within the chosen environments.
In the context of email communication, more gregarious people were less likely
to use a non-identifiable email address (b = −0.13, se = 0.05, 95% CI [−0.23,
−0.02], p = 0.015, OR = 0.81). In other words, with one-unit decrease on the
gregariousness subscale, participants had a 21% higher chance of implementing a
pseudonymity strategy when choosing an email address. With regard to WhatsApp,
gregariousness negatively predicted the use of a non-identifiable profile picture
(b = −0.25, se = 0.06, 95% CI [−0.37, −0.13], p < 0.001, OR = 0.67). Thus,
the chance of staying visually anonymous increased by 33% with one-unit decline
on the gregariousness scale. A similar effect was found for Facebook users. Again,
higher gregariousness negatively predicted the use of non-identifiable profile and
cover photos (b = −0.26, se = 0.06, 95% CI [−0.38, −0.14], p < 0.001,
OR = 0.66). In sum, the findings revealed that less gregarious people are more
likely to use pseudonyms in their email addresses and non-identifiable profile and
cover photos on WhatsApp and Facebook.
Research Question 2b analyzed whether deliberation was related to the use of
different privacy strategies and privacy settings in communication applications. I
generally assumed that more deliberate people would be more inclined to engage
in this second type of privacy regulation behavior. However, deliberation turned out
to be a weak predictor. Moreover, higher deliberation negatively predicted the use
of pseudonymization strategies in both WhatsApp (b = −0.23, se = 0.11, 95% CI
270 10 Results
Fig. 10.9 Results from the SEM predicting use of privacy settings and strategies on Facebook.
Note: Coefficients represent Odds Ratios (OR); e.g., with each one-unit increase in the latent
variable vertical privacy concerns, the chance of using a fake name on Facebook increases by
a factor of 1.49 (value > 1= higher chance)
p = 0.054, OR = 1.13). A negative trend was also found for the use of friend lists
(b = −0.08, se = 0.04, 95% CI [−0.15, 0.00], p = 0.053, OR = 0.88). However,
these trends have to be viewed with caution as we cannot be certain whether they
are indeed different from zero according to the predefined level of significance. In
sum, the findings revealed that people who reported greater online privacy literacy
were also more likely to implement end-to-end encryption in the context of email
communication and more likely to use pseudonyms in the context of WhatsApp use.
Regarding Research Question 4b, I found that vertical privacy concerns did
not influence the use of privacy strategies in the context of email communication.
However, higher vertical concerns positively predicted the use of a non-identifiable
profile picture on WhatsApp (b = 0.26, se = 0.06, 95% CI [0.14, 0.38], p < 0.001,
OR = 1.51) and Facebook (b = 0.25, se = 0.06, 95% CI [0.14, 0.36], p < 0.001,
OR = 1.49), and also increased the likelihood of using a pseudonym on Facebook (b
= 0.13, se = 0.06, 95% CI [0.02, 0.25], p = 0.026, OR = 1.24). Vertical privacy
concerns also modestly increased the likelihood of limiting Facebook profile to
one’s friends (b = 0.10, se = 0.06, 95% CI [−0.01, 0.22], p = 0.084, OR = 1.18).
Thus, findings revealed that greater concerns about the data collection practices
of website providers, institutions, or third parties increased the likelihood of using
anonymization strategies on WhatsApp and Facebook.
Next, I investigated Research Question 5b. With regard to horizontal privacy
concerns, I assumed that people who are more concerned about other users
compromising their privacy would be more likely to employ visual anonymization
strategies and audience segmentation strategies (e.g., using friend lists on Face-
book). However, contrary to my assumption, higher horizontal privacy concerns
only negatively predicted the use of a non-identifiable profile picture on WhatsApp
(b = −0.12, se = 0.05, 95% CI [−0.22, −0.02], p = 0.017, OR = 0.83). The
chance of using a non-identifiable profile picture decreased by 17% with each one-
unit increase on the horizontal privacy concerns scale. Horizontal privacy concerns
hence did not influence the use of privacy regulation behaviors, as I had assumed.
In contrast, they were negatively correlated with visual anonymization strategies on
WhatsApp.
Hypotheses 1a and 1b posit that higher online privacy literacy would be
positively related to both vertical and horizontal privacy concerns. Both relations
were estimated in each of the models described above. The relationship between
privacy literacy and vertical privacy concerns was generally positive, but small (β
between 0.03 and 0.10). The relationship was significant in all models except for the
model predicting the use of privacy strategies within WhatsApp, in which it turned
out to be non-significant. However, this model was based on the smallest sample
and hence had probably the weakest power to detect such a small effect. When
comparing all models, the differences between the unstandardized coefficients for
this relationship were not significant. Based on the largest sample with the highest
power, the hypothesis 1a was supported (model predicting the use of different SNS,
see p. 357 in the Appendix B: b = 0.07, se = 0.03, 95% CI [0.02, 0.12], p = 0.005, β =
0.08). With regard to Hypothesis 1b, the results revealed that online privacy literacy
was generally negatively related to horizontal privacy concerns (β between −0.06
272 10 Results
and −0.10). Thus, based on the largest sample with the highest power to detect
such a small relationship, Hypothesis 1b was not supported (model predicting the
use of different SNS: b = −0.08, se = 0.03, 95% CI [−0.14, −0.02], p = 0.009,
β = −0.07).
In the preceding sections, I have analyzed the extent to which stable personal
factors explain why some people engage in preventive privacy regulation behaviors
(both choosing and manipulating environments). In the next step of the analysis,
I investigate whether non-situational and situational factors predict the situational
depth of self-disclosure in different smartphone-based communication situations.
Thus, the following section represents the core analysis testing the major tenets
of the theory of situational privacy and self-disclosure. As outlined in Sect. 8.4,
I will first test the central supposition that self-disclosure indeed varies across
situations. In particular, I will quantify the amount of variance attributable to inter-
and intrapersonal differences in the depth of self-disclosure. Based on this initial
analysis, I will then proceed to investigating the proposed antecedents of the depth
of self-disclosure.
100
75
Depth of self−disclosure
50
25
0
Time
Fig. 10.10 Situational variance in depth of self-disclosure. Note: Each line represents one
participant. Points represent the self-reported depth of self-disclosure at each measurement point
over the course of the study. Light grey lines represent a high average self-disclosure, while darker
grey lines represent a lower average depth of self-disclosure
100
Depth of Self−Disclosure
75 Average
Self−Disclosure
70
60
50
50
40
30
25
Time
Fig. 10.11 Situational variance in depth of self-disclosure (excerpt). Note: Only the first 12
participants’ self-reported measures are shown. Otherwise, the figure is the similar to Figure 10.10
274 10 Results
Before I describe the results, let us shortly revisit some of the fundamentals of the
theory of situational privacy and self-disclosure. First, it is important to keep in mind
that a situation is defined as the entirety of circumstances that affect the behavior of a
person at a given time. These circumstances (or factors) can be divided into personal
and environmental factors (including their interactions). Personal factors, in turn,
can be further differentiated into stable personality facets or trait-like characteristics
and situational needs. Environmental factors, on the other hand, can be differentiated
into interpersonal factors and external factors.
Before we turn to the results of the multilevel analysis, it seems apt to look
at the variables from a descriptive point of view. Table 10.3 already provided a
descriptive overview of the stable personal factors measured in the pre-survey. As
can be seen, the variables were quite normally distributed (including the ESM
sample). Table 10.6 now additionally shows the psychometric properties of the
variables measured as part of the ESM study. As already seen in the previous
figures, depth of self-disclosure varied a lot over the course of the study. On
average, however, depth of self-disclosure was neither high nor particularly low
(M = 46.75, SD = 24.82). In comparison, the motivation to disclose oneself was
quite high on average (M = 64.68, SD = 21.31). The interpersonal factors revealed
a similar picture: In 60% of all situations, participants responded to a message
10.3 Predicting Situational Depth of Self-Disclosure 275
in all, situational personal and environmental factors were able to explain 15%
of the variance on Level 1. Including random slopes for interpersonal assessment
and pseudonymity (M3) further improved the model fit ( deviance (24) = 44.17,
p < 0.001). However, while the explained variance of the overall model was
higher (R2GLMM(c) = 0.49), the amount of explained variance by fixed effects did
not increase (R2GLMM(m) = 0.12). Including level-specific interactions (M4) further
improved the model fit ( deviance (30) = 16.46, p = 0.011) and also increased
the amount of explained variance by fixed effects (R2GLMM(m) = 0.14). Cross-level
interactions, however, did not result in a better model fit (M5). That being said, the
final model explained 50% of the variance in depth of self-disclosure by fixed and
random effects.
Table 10.8—which is organized similarly to Table 10.7—shows the estimated
fixed effects from the multilevel analyses along side their respective random effect
variances. Below, I will first investigate the extent to which the results support
Hypotheses 2 to 3d proposed in Chap. 8 and answer the Research Questions 7 and
8 on the basis of the fourth model (M3), which can be regarded as the best fitting,
yet simplest model. The fixed effects of this multilevel model are also shown in
Fig. 10.12. Subsequently, I will look at models M4 and M5 to answer Research
Question 9. These models explore potential interactions between the factors. It is
thus important to note that these models only provide conditional effects for some
situational and non-situational factors.
Table 10.8 Results from the multilevel-models predicting situational depth of self-disclosure
M0 M1 M2 M3 M4 M5
Fixed effects
(Intercept) 4.65 (0.13)∗∗∗ 3.62 (0.83)∗∗∗ 3.15 (1.84) 3.23 (1.86) 4.43 (22.40) 3.31 (22.65)
Level 2 (non-situational)
Personal factors 1: Traits and trait-like characteristics
Age 0.04 (0.01)∗∗ 0.04 (0.01)∗∗ 0.04 (0.01)∗∗ 0.05 (0.01)∗∗∗ 0.05 (0.01)∗∗∗
Gender (female) 0.16 (0.30) 0.18 (0.29) 0.10 (0.29) −0.03 (0.29) −0.03 (0.29)
Education −0.03 (0.14) −0.09 (0.14) −0.09 (0.14) −0.10 (0.14) −0.10 (0.14)
Online privacy literacy −0.14 (0.14) −0.11 (0.14) −0.14 (0.14) −0.13 (0.14) −0.14 (0.14)
Horizontal privacy concerns −0.04 (0.17) −0.05 (0.16) 0.01 (0.16) 0.02 (0.16) 0.01 (0.16)
Vertical privacy concerns −0.07 (0.17) −0.04 (0.17) −0.11 (0.16) −0.17 (0.17) −0.16 (0.17)
Deliberation 0.03 (0.32) −0.06 (0.31) −0.11 (0.31) −0.12 (0.31) −0.13 (0.31)
Gregariousness −0.09 (0.20) −0.07 (0.19) −0.07 (0.19) −0.09 (0.19) −0.08 (0.19)
Level 1 (situational)
10.3 Predicting Situational Depth of Self-Disclosure
M0 M1 M2 M3 M4 M5
Interactions
Same-level interactions
Perc. audience size X Limited accessibility 1.16 (0.52)∗ 1.15 (0.53)∗
Perc. audience size X Visual anonymity −0.43 (4.85) −0.67 (4.90)
Perc. audience size X Pseudonymity −0.12 (0.10) −0.13 (0.10)
Horizontal priv. conc. X Vertical priv. conc. −0.24 (0.11)∗ −0.24 (0.11)∗
Online priv. lit. X Horizontal priv. conc. 0.13 (0.17) 0.13 (0.17)
Online priv. lit. X Vertical priv. conc. −0.37 (0.18)∗ −0.37 (0.18)∗
Cross-level interactions
Horizontal priv. conc. X Interpersonal assessment −0.02 (0.06)
Gregariousness X Interpersonal assessment 0.01 (0.08)
Vertical priv. conc. X Pseudonymity −0.11 (0.26)
Deliberation X Pseudonymity 0.16 (0.54)
Online. priv. lit. X Pseudonymity 0.12 (0.29)
Random effect variances
σI2ntercept|P erson 1.86 1.92 1.89 2.02 1.95 1.95
2
σResidual 4.45 4.43 3.80 3.35 3.32 3.32
σI2nterpersonalassessment|P erson 0.15 0.15 0.15
σP2 seudonymity|P erson 0.50 0.45 0.59
Note: Fixed effects estimated by restricted maximum likelihood (REML). Numbers in parentheses represent standard errors
Basis: nP articipants = 164; nevents = 1104
∗∗∗ p < 0.001, ∗∗ p < 0.01, ∗ p < 0.05
10 Results
10.3 Predicting Situational Depth of Self-Disclosure 279
Fig. 10.12 Main effects of non-situational and situational personal and situational environmental
factors on situational depth of self-disclosure. Note: This figure shows the fixed effects of the fourth
model (M3) as well as their 95% confidence intervals. As no interactions are included in the model,
the estimates can be interpreted as unstandardized main effects. Please note that the confidence
intervals of the effects of visual anonymity (both upper and lower) and limited accessibility (upper)
are larger than −1 and 1 respectively and are thus not fully shown in the figure
privacy literacy (Research Question 7b) was not related to the dependent variable
either (M3: b = −0.14, p = 0.329). With regard to the Research questions 7c and
7d, neither horizontal privacy concerns (M3: b = 0.01, p = 0.945) nor vertical privacy
concerns (M3: b = −0.11, p = 0.502) were related to depth of self-disclosure. Here,
however, it is questionable, whether the power of the study had sufficient power to
detect such potentially weak relationships (see discussion and limitations in the next
chapter).
Next, I tested Hypothesis 2. According to the theory of situational privacy and
self-disclosure, internal factors should play an important role in determining the
depth of self-disclosure in all situations. I assumed that a higher need to self-
disclose oneself will lead to a higher depth of self-disclosure. The results supported
this hypothesis: A higher need for self-disclosure was indeed positively related to
reported depth of self-disclosure (M3: b = 0.22, SE = 0.03, 95% CI [0.16, 0.29],
p < 0.001). As the predictor was group-mean centered, the slope coefficient
represents the unbiased relationship between need to self-disclose and depth of self-
disclosure, with 10 more points on the predictor scale resulting in a 2.2-point higher
depth of self-disclosure (on the original scale ranging from 1 to 100). As including
a random slope for this predictor did not improve model fit, this relationship can be
regarded as rather robust.
In Hypotheses 3a to 3b, I assumed that a higher interpersonal assessment with
regard to trust and relational closeness would be related to a higher depth of self-
disclosure. As the preliminary results suggested that trust and the three dimensions
of relational closeness were highly correlated, I estimated the relationship between
a latent overall factor and depth of self-disclosure. The results supported both
hypotheses: The more trustworthy, psychologically close, similar, and central to
their everyday life participants rated the recipients of their disclosures, the higher the
depth of self-disclosure (M3: b = 0.23, SE = 0.06, 95% CI [0.13, 0.34], p < 0.001).
The fixed effect revealed that a one-unit increase in the latent variable leads to
a reported depth of self-disclosure 2.3 points higher (again on the original scale
ranging from 1 to 100). However, the relationship between interpersonal assessment
and depth of self-disclosure did vary between participants (σ 2 = 0.15). Figure B.2
in the Appendix B shows the distribution of effects in the sample. Although the
coefficient was positive for most of the sample, a negative relationship could be
observed for some participants.
Hypothesis 3c stated that large audience sizes decrease the depth of self-
disclosure. When participants perceived a larger audience, they indeed engaged
in less deep self-disclosure (M3: b = −0.30, SE = 0.05, 95% CI [0.13, 0.34],
p < 0.001). The log-transformed predictor revealed that the depth of self-disclosure
decreases by about 3 points with each perceivable increase in audience size. The
relationship did not vary significantly among participants, suggesting a robust linear
effect of audience size on depth of self-disclosure.
10.3 Predicting Situational Depth of Self-Disclosure 281
1
privacy concerns on self−disclosure
Conditional effect of vertical
−1
−2 −1 0 1 2
Fig. 10.13 Conditional effects of vertical privacy concerns on situational depth of self-disclosure
moderated by horizontal privacy concerns
concerns (M4: b = −0.24, SE = 0.11, p = 0.023). Thus, with each one-unit increase
on the latent factor for horizontal privacy concerns, the negative relationship
between vertical privacy concerns and depth of self-disclosure becomes stronger,
resulting a decline of 2.4 additional points on the depth of self-disclosure scale.
Figure 10.13 shows the conditional effects over the full range of the moderator. As
can be seen, at particularly high levels of horizontal privacy concerns, the effect of
vertical privacy concerns on self-disclosure even becomes significant (it has to be
noted, however, that only a few people had horizontal concerns this high, as shown
by the histogram at the bottom of the figure). Finally, greater online privacy literacy
further increased the negative relationship between vertical privacy concerns and
depth of self-disclosure (M4: b = −0.37, SE = 0.18, p = 0.037). Figure 10.14
shows the conditional effects for this interaction. Again, the results revealed that the
effect of vertical privacy concerns was significant when online privacy literacy was
particularly high (once again, however, only a few people had such high privacy
literacy, as shown by the histogram).
10.3 Predicting Situational Depth of Self-Disclosure 283
1
privacy concerns on self−disclosure
Conditional effect of vertical
−1
−2
−2 −1 0 1 2
Online privacy literacy (Moderator)
Fig. 10.14 Conditional effects of vertical privacy concerns on situational depth of self-disclosure
moderated by online privacy literacy
The present study applied the theory of situational privacy and self-disclosure to
smartphone-based communication. I presented a theoretical investigation of the
smartphone as a metamedium allowing the installation and launching of various
applications for different purposes and uses. Smartphone-based communication can
thus be characterized as a form of multimodal communication encompassing a
variety of different communication forms on different types of applications. Based
on an in-depth analysis of the most widely-used communication applications, I
identified and divided the external factors in abstract categories as proposed by the
theory of situational privacy and self-disclosure.
Within this setting, this study specifically analyzed what non-situational personal
factors influence people’s engagement with long-term preventive privacy regulations
behaviors, which must be differentiated into the choice of using certain applications
and the manipulation of the environment provided by these applications. This study
further analyzed what non-situational and situational personal factors as well as
situational environmental factors influence the depth of self-disclosure in various
smartphone-based communication situations.
Consequently, this study is the first to investigate privacy and self-disclosure
from a situational point of view, as it examined both pre-situational privacy regu-
lation processes and situational self-disclosure processes within a larger theoretical
framework. Along with a few recent studies, it is also one of the first to employ
an alternative way of collecting behavioral data that should provide more reliable
and ecologically valid insights into people’s communication practices. Specifically,
I developed a multi-method research design that allowed me to explore the entirety
of these factors in numerous communication situations over a longer period of time.
The methodical design included both traditional survey methods (to measure non-
situational personal factors and preventive privacy regulations), and a combination
of logging and experience sampling methods (to measure situationally varying
factors). I implemented an automatic event-contingent sampling technique to survey
participants right after they had used their smartphone to communicate. This study
11.1 Implications
In sum, the empirical investigation revealed that non-situational personal factors are
able to predict privacy regulation behaviors to a varying degree. Vertical privacy
concerns and online privacy literacy turned out to be the most effective predictors of
both types of privacy regulation behaviors. Participants with greater concerns about
providers’ and institutions’ data collection and analysis practices were less likely
to use potentially privacy-invasive IM and SNS applications such as WhatsApp,
Facebook Messenger, Facebook, Google+, and Instagram. At the same time, these
participants were more likely to use applications that have a high level of vertical
privacy by design (e.g., Threema and Telegram) or provide option of limiting
content accessibility to providers (e.g., Signal). Participants with higher online
privacy literacy were likewise less likely to use WhatsApp, but more likely to
use Threema and Signal. However, contrary to the assumptions that higher privacy
literacy leads to the adoption of more privacy-friendly applications, Skype, Google
Hangout, Instagram, and Twitter users were also more literate than nonusers. With
regard to the use of privacy strategies and settings within these applications, a similar
picture emerges: Vertical privacy concerns increased the likelihood of using a non-
identifiable profile picture on WhatsApp and Facebook and the likelihood of using
a fake name on Facebook. Online privacy literacy also increased the likelihood of
using additional encryption software for e-mail communication and a pseudonym
on WhatsApp.
Participants’ level of gregariousness positively predicted their use of popular
applications such as Facebook Messenger, Skype, SnapChat (in trend), Facebook,
Instagram (in trend), and StudiVZ. Deliberate participants, on the other hand, were
only less likely to use Google+. Gregarious people were furthermore less likely to
use visual anonymization strategies in all three types of applications.
Our findings supported the general supposition that the situational depth of self-
disclosure varies considerably across different smartphone-based communication
situations. Only a third of the variance could be explained by individual differences,
11.1 Implications 287
suggesting that the situational variance is much higher. Internal personal factors
and interpersonal environmental factors were particularly powerful predictors of the
depth of self-disclosure. Accordingly, depth of self-disclosure was high when (1)
participants felt the need to disclose themselves, (2) prior interactions necessitated
a reaction, (3) the number of potential recipients was small, and (4) these potential
recipients were considered trustworthy, psychologically close, similar to the respec-
tive participant, and central to the participants’ everyday life in the interpersonal
assessment. Contrary to the assumptions developed in the theory of situational
privacy and self-disclosure, external factors and non-situational personal factors
were not significantly related to situational depth of self-disclosure. As expected,
I found some small interaction effects on Level 2. Vertical privacy concerns had a
stronger negative effect on situational depth of self-disclosure among participants
with greater privacy literacy and greater horizontal concerns. Furthermore, although
the effects of internal assessment and pseudonymity varied across participants, no
cross-level interactions could be identified. Hence, the investigated personal factors
were not able to explain situational variation in these effects.
In the following subsections, I will discuss these results in more detail. I will
ask, on the one hand, why certain factors turned out to be ineffective in predicting
the depth of self-disclosure, and on the other hand, to what extent such findings
falsify some of the assumptions proposed by the theory of situational privacy and
self-disclosure.
The first overarching research question guiding the present study asks what factors
increase or decrease the likelihood of engaging in privacy regulation behaviors. In
line with the theoretical argument that privacy is not an end itself (cf. Johnson,
1974; Westin, 1967), people should be inclined to engage in preventive privacy
regulation behaviors to create situations in which their privacy is indeed ensured,
making it possible for them to more fundamental needs (in this case, self-disclosing
in order to fulfill needs such as relationship maintenance, self-expression, etc.).
However, I also argued that such privacy regulation processes must be seen in the
wider context of media appropriation and technology adoption theories (Sect. 8.3).
Drawing from existing approaches in this field, I suggested that the process of
choosing to install and use a certain communication application is similar to the
appropriation of devices, as individuals pass through different stages in which they
evaluate the costs and benefits of adopting a given application. I argued that privacy
risks and needs are taken into account on the cost side of this mental calculus. In
the theory of situational privacy and self-disclosure, I particularly focused on non-
situational personal factors that should be related to individual privacy needs and
risk assessments.
288 11 Discussion
reflection capabilities and procedural knowledge. The present findings may thus
show that higher online privacy literacy does not necessarily mean that people
always adopt privacy-friendly services. Instead, they suggested that people become
more knowledgeable and competent by using different kinds of services—even
potentially privacy-intrusive ones. The cross-sectional design of the present analyses
does not allow me to draw any conclusion about the direction of a potential effect.
I also assumed that higher online privacy literacy would be positively related
to vertical and horizontal privacy concerns. Whereas the first was supported, the
latter was not. Although people with high online privacy literacy were generally
more concerned about their vertical privacy, they were less concerned about their
horizontal privacy. As such, these findings were closely in line with the results
obtained by Vitak (2015, May). Taking a broader perspective, however, these results
can also be explained differently. In Sect. 6.3, I argued that a lack of knowledge
and skills may explain why people do not understand or are not aware of the
risks of online communication. Specifically, I suggested that lacking awareness and
knowledge might make people uncertain whether they are risking a loss of vertical
privacy when communicating online. Such a rationale makes sense for vertical
privacy. The more people know about data collection practices and information
flows on the Internet, the more they will understand the difficulty of preventing a
vertical privacy loss and the more concerned they will be. This argumentation is
also shared by Matzner, Masur, Ochs, and von Pape (2016). On a horizontal level,
however, the rationale might be different. Although higher privacy literacy makes
people more aware of horizontal privacy risks, it also makes them more aware of
potential ways to protect their horizontal privacy. People with greater online privacy
literacy might know how to use different communication services’ privacy settings.
They might also be aware of environmental characteristics of each service, allowing
them to meaningfully decide which services to use in order to prevent horizontal
privacy intrusions. According to this rationale, the negative relationship between
online privacy literacy and horizontal privacy concerns might not be paradoxical.
In short, understanding the impossibility of preventing vertical privacy intrusions
makes people more concerned about providers’ and institutions’ data collection
and analysis practices, while learning about ways to protect one’s privacy from
being violated by other users makes them less concerned, as they believe that such
violations are less likely to occur.
Again, due to the cross-sectional design, it is also possible that greater vertical
privacy concerns make people more prone to learning about potential risks and
privacy-related issues in online communication. Thus, greater privacy concerns
might cause people to become more privacy literate. Here again, we cannot draw
any conclusions about the direction of the relationship found.
Next, I assumed that both vertical and horizontal privacy concerns would explain
why people use more privacy-friendly communication services and why they
implement privacy strategies and settings within these services. As outlined in
Sect. 8.3, only a few studies have analyzed whether privacy concerns influence
the likelihood of using or opting out of certain communication services. Studies
focusing on Facebook use have nonetheless found that greater privacy concerns
11.1 Implications 291
were positively related to Facebook nonuse (Rainie, Smith, & Duggan, 2013;
Vitak, 2015, May). That said, those studies did not differentiate between vertical
and horizontal privacy concerns (the measures used tended to represent vertical
concerns). The results of the present study confirm these initial observations.
Participants with greater privacy concerns about providers’ and institutions’ data
collection and analysis practices were indeed less likely to use privacy-invasive IM
and SNS services such as WhatsApp, Facebook Messenger, Facebook, Google+,
and Instagram. Furthermore, greater vertical concerns were positively related to
the use of applications that have a high level of vertical privacy by design (e.g.,
Threema, Signal) or provide the option of limiting content accessibility to providers
(e.g., Signal). These results can be regarded as further evidence against the privacy
paradox, as privacy concerns are indeed related to this first type of privacy regulation
behavior—choosing environments with high levels of vertical privacy.
Horizontal privacy concerns were less effective in predicting communication
service use. People with greater horizontal concerns were only slightly less likely
to use Twitter and slightly more likely to use Google+. As Twitter is a rather public
platform, it makes sense that people who fear privacy intrusions by other people
are less inclined to use it. Google+, on the other hand, was the first SNS to provide
audience segmentation options (circles, a similar feature to Facebook’s friend lists).
When it was launched, Google+ was seen as an alternative to Facebook because it
provided a means of protecting against a loss of privacy resulting from increasing
context collapse (cf. Sect. 2.3 as well as Marwick & Boyd, 2010; Vitak, 2012).
However, it seems unlikely that this explains the positive relationship found in the
current study. Further research is needed to shed light on this unexpected finding.
However, I would speculate that many Google+ users do not necessarily use this
SNS as their primary communication tool. Instead, they are only members because
of the Google Hangout feature which is often a frequently used alternative to Skype
video calls in professional contexts. The positive correlation may thus have only
been found because people who work in a professional context in which a lot of
online communication takes place (particularly via video conference) also know
more about potential privacy violations and are thus more concerned generally.
However, this line of reasoning is highly speculative and would need further
empirical support.
With regard to the implementation of privacy strategies and settings within
communication services, vertical privacy concerns increased the likelihood of using
visual anonymization strategies. In the context of Facebook use, it also positively
predicted the use of pseudonymization strategies. Thus, users of the vertically
privacy-invasive platform Facebook tried to mitigate their concerns by using two
types of strategies to make them less identifiable to the provider. Again, these
findings extend prior research, which found that general privacy concerns do relate
to the use of protection measures (Baruh, Secinti, & Cemalcilar, 2017).
The findings further extend prior research on the influence of privacy concerns
on privacy regulation behaviors by differentiating between concerns on a vertical
and horizontal level. Although prior qualitative research suggests that people are
292 11 Discussion
primarily concerned about privacy threats stemming from other users (Raynes-
Goldie, 2010), causing them to engage in the second type of privacy regulation
behavior (manipulating environments by using privacy settings and strategies), this
study revealed that vertical privacy concerns are more influential in explaining why
people choose privacy-friendly services over privacy-invasive ones and predicting
the use of privacy strategies within these services—contradicting the findings by
Raynes-Goldie (2010).
In sum, the findings partly confirm and extend insights from prior research.
However, they also reveal some peculiarities. Most prominently, they uncover differ-
ences in privacy regulation behaviors resulting from the multimodal communication
practices characteristic of smartphone-based communication: The relationships
between non-situational personal factors and privacy regulation behaviors manifest
themselves differently for each type of communication service. This supports the
frequent calls of researchers that we need to analyze more than just one platform,
particularly when investigating smartphone-based communication (cf. Sect. 2.2 and
also Lampinen, 2016). But why do we find different patterns with regard to the
antecedents of using different communication services? Why do vertical privacy
concerns negatively predict the use of WhatsApp, but not the use of SnapChat or
Google Hangout, when all three companies collect and use the data provided by their
clients? Why does greater online privacy literacy decrease the likelihood of using
WhatsApp, but not the use of the Facebook Messenger, when both are provided
by the same company and similarly used to collect data from its users? Several
explanations can be brought forward, which could be considered first speculations
requiring further empirical investigation: First and as mentioned before, some
of these differences may stem from the unequal discussion and coverage of
different applications and communication services in the media (Teutsch, 2013; von
Pape, Trepte, & Mothes, 2017). Although only a few content analyses of media
discussions of this topic exist, it is apparent that the big players such as Facebook
or Google are mentioned most frequently. Many articles in the past focused on
threats arising from data collection and usage practices of SNS providers such as
Facebook (Teutsch & Niemann, 2016, pp. 10–11). People might be influenced by
these public debates and thus be more concerned about particular providers than
about the general loss of vertical privacy that can arise from any provider. This could
explain, for example, why the current study found that vertical privacy concerns are
particularly related to the use of Facebook, Facebook Messenger, WhatsApp, and
Instagram (all provided by Facebook Inc.) as media coverage of these applications
and services is simply more frequent.
A second explanation might be the huge popularity of some services compared to
others. Looking again at the descriptive results, it is clear that WhatsApp is the most
popular IM (94% of sample participants use this application). Similarly, the SNS
Facebook is used by more than two-thirds of participants (71%). People are probably
a lot more knowledgeable about these services compared to the alternatives, which
are used by barely more than 5% of the sample. Particularly privacy-friendly
alternatives such as Threema, Telegram, Signal, and Surespot were only used by a
very small number of participants in the sample, suggesting that many people do not
11.1 Implications 293
know about these services. This might explain why privacy literacy (remember that
it was measured using self-reports about how much one knows about data protection
and privacy on the Internet) was particularly high among participants who used such
alternatives.
As a concluding remark, the findings also provide evidence that people do indeed
try to regulate their level of privacy in future situations, supporting the notion that
privacy is only a means for fulfilling more fundamental needs. Nevertheless, it
should be noted that only a few people actually engaged in active privacy regulation
behaviors in the context of smartphone-based communication. Less than 10% of
the sample used IMs providing privacy-by-design (e.g., Threema, Telegram, or
Signal) and almost nobody indicated using the alternative SNS Ello (0.2%). The
positive relationship between online privacy literacy and the use of privacy-friendly
services suggests that many people simply lack knowledge about these alternatives.
Likewise, only 8% of respondents reported to encrypt their e-mails. On the other
hand, a large number of users of SNS such as Facebook, Google+, or Instagram
limited their profiles to their followers and applied different types of strategies to
prevent identification. Thus, it seems that choosing an environment depends more
on the perceived benefits of a certain service (a claim that is backed up by many
studies focusing on the perceived and obtained gratifications of social media use;
e.g., Joinson, 2008; Smock, Ellison, Lampe, & Wohn, 2011; Tosun, 2012). After
a service has been chosen, vertical concerns resulting from greater knowledge
and skills concerning data protection and online information flows are mitigated
by using only privacy strategies available, which primarily focus on preventing
identification (visual anonymity and pseudonymity).
(DDM; p. 83), which posits that different situations make different goals salient,
and different circumstances ultimately lead to different types and levels of self-
disclosure (Omarzu, 2000, pp. 177–178). Furthermore, along with the findings of
other experience sampling and tracking studies (see Sect. 9.1), the present study
substantiates the need to look at behavioral measures from a situational perspective.
Behaviors are inherently functions of both the person and the environment, and
both sets of factors must be considered when attempting to explain individuals’
behavioral patterns.
Drawing upon the theory of situational privacy and self-disclosure, I measured
both non-situational personal factors (assessed in the online survey before the
actual ESM study) and situational personal and environmental factors (assessed
primarily in the situational questionnaires). The findings revealed that people feel
able to disclose themselves when the potential audience is small and perceived
as trustworthy, psychologically close, similar to oneself, and central to one’s
everyday life. The need to self-disclose and prior interactions are also positively
related to depth of self-disclosure. In contrast, external environmental factors (level
of identification and content accessibility) and stable personal factors were not
significantly related to depth of self-disclosure. Interpersonal factors thus play the
most important role in determining the level of (horizontal) privacy needed to feel
comfortable self-disclosing. It seems that users primarily assess the recipients of
their disclosures in determining whether or not they should open up and reveal
themselves. This lends further support to recent claims that trust plays a pivotal
role in online privacy (e.g., Marwick & Boyd, 2014; Teutsch, Masur, & Trepte,
2018). When people communicate information about themselves to other persons,
they often cannot control further dissemination or use of this information by other
persons, groups, or entities (Trepte, 2016a) and in many cases do not want to
either. Trust is the buffering factor helping to mitigate the risks associated with
such behavior because it is the result of a rational assessment that the recipients
will behave as agreed upon or at least remain loyal to the discloser in the future (cf.
definition of interpersonal trust by Kassebaum, 2004, p. 21).
The pivotal role played by interpersonal assessments meshes well with the
existing theories of privacy and self-disclosure discussed earlier. As the measures
implemented in this study represent broad concepts subsuming a variety of specific
aspects of interpersonal relationships, the associations found with depth of self-
disclosure support Petronio’s argument that people create privacy boundaries within
which the flow of private information is based on collectively negotiated rules
(Petronio, 2002). My findings support the claim that people expect the recipient(s)
of their disclosures to behave as agreed upon or in other words as prescribed by
the established rules. They also lend credence to Westin’s concept of privacy as a
state of small-group intimacy, without neglecting the notion that privacy is a matter
of degree rather than a fixed state. Accordingly, the theory proposes that privacy
can be a form of seclusion of (a few) trusted people, which is similar to Petronio’s
concept of privacy boundaries: The level of privacy increases as the number of
people inside these boundaries decreases. My findings also indicate that the level
of privacy depends on the people involved in the transaction of information. Higher
11.1 Implications 295
only a few situations of this type were actually sampled. The majority of events were
small-group interpersonal communication situations, which are often conducted in
environments where anonymity is less important (at least on a horizontal level).
Participants were actually fully anonymous (= visual anonymity and pseudonymity)
in only 17% of all sampled situations. As such, most sampled situations took
place in environments where anonymity is not as important. As noted by Westin
(1967), anonymity is a state of privacy that allows to perform public acts and still
find freedom from surveillance and identification (p. 34). Consequently, it seems
likely that I would have found an effect of anonymity on depth of self-disclosure
had I focused particularly on public communication situations (e.g., health forums,
comments on public newspaper websites, etc.).
A similar rationale can be applied to the level of protection against unwanted con-
tent accessibility. Most sampled situations took place in small-group interpersonal
environments, in which content accessibility at the horizontal level was limited by
design. Settings such as friend lists on Facebook, circles on Google+ or generally
limiting the accessibility of one’s profile to approved contacts are particularly
important when individuals communicate to larger audiences (e.g., in semipublic
situations such as posting a status update on Facebook). Although the sampled
events included such semipublic or public situations, they were in the minority.
Instead, participants generally limited their audience to followers or contacts (in
99% of events) making it almost impossible to find the assumed effect. End-to-end
encryption was similarly only applied in 4% of the events (mostly when people used
Threema or anyone of the 8% of the participants in the ESM sample who used end-
to-end e-mail encryption) making it almost impossible to detect a significant effect.
Future studies investigating the effect of encryption on people’s self-disclosure
should hence focus on sampling more heterogeneous situations so that such external
factors actually vary.
Another explanation may further be found in the sequential order of privacy
regulation and self-disclosure processes in the theory of situational privacy and
self-disclosure. Originally, I assumed that people pre-situationally choose and
manipulate certain environments, thus determining the external factors that should
in principle affect the level of self-disclosure in those environments at any given
time. However, an alternative argument would be that choosing or manipulating
environments preventively, in accordance with stable privacy needs or concerns
in that stage of the privacy regulation process, makes it unnecessary to reassess
the level of privacy every time one communicates within these environments.
In the context of smartphone-based communication, this means that after people
have decided to use a certain application on the basis of a rational cost-benefit
assessment of this service including risks evaluations (see again Wirth, von Pape,
and Karnowski, 2008), they no longer need to assess external factors every time they
use this application to communicate with other people. Their initial decision to use
a certain environment (the pre-situational privacy regulation process) has provided
a solid foundation, making them now able to disclose themselves (situational self-
disclosure process).
11.1 Implications 297
1 In Sect. 12.2, I discuss heuristics as a possible extension of the theory of situational privacy and
self-disclosure.
298 11 Discussion
The fact that interpersonal assessment determines primarily the ability to disclose
private information in smartphone-based communication might indicate that people
are still uncertain about the external circumstances of these types of online
communication. They might lack the literacy to understand these environments,
ultimately rendering such external factors ineffective in guiding their behavior.
A potential implication would be to include feelings of uncertainty as situational
personal factors in future studies and investigate the extent to which emotional
responses to situational circumstances guide people’s behavior. Assessing potential
recipients, on the other hand, is often just as quick and easy in online communication
as in offline communication (as seen in reactions to physical intrusions, as noted
by Acquisti et al., 2015). Preventing horizontal privacy violations by assessing
11.2 Limitations and Reflections 299
In this section, I discuss several limitations and constraints of the present study
that should be taken into account when interpreting the results. These simultane-
ously provide avenues for future research on privacy and self-disclosure from a
situational perspective. First, I will evaluate the extent to which the present study
fits the subjective definition of a situation. Specifically, I will critically assess the
(im)possibility of measuring the environment as subjective perceptions. Second, I
will discuss the constraints of my research design with regard to its power to test the
proposed hypotheses, and particularly elaborate on the limitation that some external
factors have almost no variance. Third, I will offer some further considerations
of a methodological nature which seem important for future studies attempting to
implement a similar research design. Lastly, I will reflect on some ethical aspects
that need to be taken into account when conducting a study with this type of multi-
method research design.
2 At least when potential recipients are perceivable. As the literature on the context collapse
(Binder, Howes, & Sutcliffe, 2009; Vitak, 2012) and imagined audiences (Litt, 2013) shows, such
assessments in fact may become more difficult in online environments.
300 11 Discussion
his or her behavior. We can now critically ask to what extent the present study meets
the criteria set by such a definition. More specifically, we can critically evaluate
whether the methods to measure the different types of factors correspond to the
assumption that only what people perceive drives their behavior.
With regard to the interpersonal and internal factors, the research design aligns
well with the proposed processing principle. Internal factors such as motives (as
well as the rather broad concept of need to self-disclose that was measured in the
study) are accessible to individual introspection and thus by nature representative of
individuals’ idiosyncratic perceptions of their internal needs. Interpersonal environ-
mental factors and thus also assessments of (potential) recipients’ trustworthiness
or relational closeness are likewise individual perceptions of some external reality
which may vary from person to person. Even the number of (potential) recipients
(log-transformed in the final multilevel analysis) should be a somewhat good esti-
mate of peoples’ individual perceptions of the audience size. However, it should also
be noted that this measure strongly depends on how biased people are in estimating
larger audiences. Scholars have emphasized that in situations with a potentially
large audience, individuals become dependent on their imagination (e.g., Litt, 2013,
p. 331). A study by Moll, Lücke, and Bromme (2016, September) demonstrated that
users varied in the accuracy of their assessments of actual audience size. Moreover,
the findings suggest that people assess audience in online environments differently
than in offline environments. Although the log transformation should at least partly
mitigate such biases, it nonetheless renders the measurement less precise.
That being said, the measurement of internal and interpersonal factors generally
aligned well with the processing principle that guided the definition of the subjective
situation. The measurement of external factors, however, deserves closer inspection.
First, it needs to be taken into account that the values of the external factors were
partially computed from participants’ self-reports in the pre-survey (in cases in
which they can be manipulated in a given environment, e.g., whether participants
used a pseudonym or not) and partially ascribed on the basis of the characteristics
of each environment (e.g., end-to-end encryption is integrated into the design of
Threema). In both cases, however, the measurement of these external factors did
not account for whether participants actually thought about or perceived these
characteristics of the environment in a given situations. By computing the values
of external factors, they are rather measurements of the physical reality (as denoted
by Rauthmann, Sherman, & Funder, 2015, p. 368) or physico-biological cues (Block
& Block, 1981, p. 85). They represent an objective perspective on the physical cues
(in the case of smartphone-based communication not necessarily physical in a literal
sense, but rather virtual cues that can be described similar to actual physical cues)
of an environment. For this reason, we must ask whether the finding that external
factors were not related to depth of self-disclosure is a result of this deviation from
the processing principle.
An alternative would have been to ask participants in each situation about their
perceptions of these factors and whether or not they reflected upon them before
disclosing. Although such a design would closely match the proposed subjective
definition of a situation, it is problematic for other reasons: First, asking participants
11.2 Limitations and Reflections 301
or Threema use). Given the limitations of the data collected in this study, it is still an
open question whether significant effects of external factors might be detected with
a more appropriate sampling design.
A fourth and related limitation refers to the study’s power to test some of the
assumptions it set out to test. The study had enough power to detect small to
moderate situational effects (based on the number of situations: n = 1104 disclosure
events), but only weak power to detect small non-situational effects (based on the
number of participants: n = 164): Assuming a β-error probability of 20% and a
α-error probability of 5%, the study had enough power to detect situational effects
greater than 0.084, but only non-situational effects greater than 0.215. The study
design thus did not have had enough power to detect small relationships regarding
variables at the personal level and we cannot make sensible inferences in this
regard. Even the significant interactions found on Level 2 need to be confirmed
by studies with greater power. Future studies should hence recruit larger samples
(particularly on Level 2) in order to have enough power to investigate the effects
of non-situational personal factors, such as privacy concerns, privacy literacy, and
personality facets and their interactions on depth of self-disclosure.
Due to these limitations, the findings of this study do not necessarily falsify the
claims derived from the theory of situational privacy and self-disclosure. As the
study represents a first attempt to quantify various situations and prior research on
the prevalence of situational factors was not available, I was not able to consider
more appropriate sampling strategies a priori. However, future studies investigating
similar processes should decide prior to data collection which types of factors they
want to focus on and what sampling strategy is best to achieve enough variance in
these factors resulting in enough power to detect the relationships of interest.
pre- and post-situational questionnaires would allow for a longitudinal study of each
situation and thus also allow causal relationships to be tested instead of correlations.
On the other hand, non-situational effects on situational self-disclosure can already
be interpreted as causal effects. As the non-situational factors were measured in the
pre-survey, they precede the situational measures and can thus be regarded the cause
for self-disclosure (given that the study’s design has enough power, as discussed in
the previous section).
Second, an inherent constraint of ESM studies is the necessity of using short
scales or even single items as measurement instruments. Although I took great care
to develop reliable and valid single items on the basis of the results of the pre-
study (see Sect. 9.3), such instruments are likely to contain measurement error,
which can only be eliminated by using multi-item scales. I chose to use short
single-item measures because a large number of factors needed to be assessed and
I did not want to overburden participants. In general, researchers implementing an
ESM design should take care to construct short situational questionnaires. However,
when a smaller number of variables needs to be measured, researchers should
consider implementing well-designed and validated short scales (e.g., 3 to 5 items
per construct) and model them as latent variables (or at least compute factor scores
to eliminate the item-specific variance).
Thirdly, although all scales measured in the pre-survey exhibited satisfactorily
model fits, they can be improved further. In particular, the subscales measuring
the two personality facets of gregariousness and deliberation only explained small
amounts of the average variance in the items (AVE < 0.40), despite their use in many
prior studies. Future research should hence implement more refined scales, probably
also including more items. My measurement of online privacy literacy can also be
criticized. Masur, Teutsch, and Trepte (2017) argued that subjective measurements
of privacy literacy can be biased, as people over- or even underestimate their skills
and knowledge. Their online privacy literacy scale (OPLIS), in contrast, represents
a multidimensional knowledge test that could have been used to assess people’s
online privacy literacy more objectively. However, as mentioned before, OPLIS
focuses only on vertical online privacy literacy. With this study, I wanted to include
both vertical and horizontal aspects of online privacy in the measurement of overall
online privacy literacy. This, along with economic constraints in the construction of
the pre-survey, was the reason why I decided to rely on people’s self-reported level
of online privacy literacy. Nonetheless, future studies should consider implementing
more objective measures of this variable, particularly given that the study by Masur,
Teutsch, and Trepte (2017) found that subjective and objective online privacy
literacy are only moderately correlated (β = 0.34). The other measures used in the
survey, however, particularly the newly developed online privacy concerns scale,
represent comprehensive measure of both horizontal and vertical privacy concerns
with good reliability and factorial validity. They should thus be applicable to a
variety of research fields.
304 11 Discussion
The findings of the present study generally support the assumptions of the theory
of situational privacy. With regard to pre-situational privacy regulation processes,
the results suggest that greater vertical privacy concerns and greater online privacy
literacy increase the likelihood of choosing more privacy-friendly smartphone
communication applications and using privacy strategies and settings within one’s
chosen environments. Horizontal privacy concerns, on the other hand, are less
powerful in predicting application use. Personality facets such as gregariousness
and deliberation are less likely to affect this type of privacy regulation behavior
and when they do, it is to a varying degree depending on the specific application.
That being said, people generally do not engage much in either type of privacy
regulation behavior as only a few participants actually chose to use privacy-friendly
communication applications such as Threema, Telegram, Signal, or Ello.
The most important finding is that the central supposition of the theory of
situational privacy and self-disclosure—that privacy and self-disclosure vary con-
siderably across situations—was supported. Furthermore, the results from the
multi-method study revealed that people generally feel able to disclose themselves
when the potential audience is small and is perceived as trustworthy, psychologically
close, similar to oneself, and central to one’s everyday life. When the need to self-
disclose is high and prior interactions have already occurred, people engage in a
high level of self-disclosure. The study further suggests that for people with higher
online privacy literacy, vertical privacy concerns may help to reinforce information
control. Non-situational personal factors such as vertical privacy concerns may
hence only influence the level of self-disclosure when people are literate enough
to have awareness of and understand the consequences of data collection practices.
Part III
Implications and Future Perspectives
Chapter 12
Overall Discussion
I began this book with the argument that privacy and self-disclosure must be
investigated from a situational perspective. The initial starting point was the
observation that much theoretical work acknowledges the situationality of both
concepts and provides valuable rationales for such a claim, but the corresponding
empirical work has often taken a more general approach. For several reasons
outlined in Sect. 6.1, scholars have primarily focused on broader concepts such
as privacy concerns, for example. Survey studies hence have often focused on
explaining people’s general behavior as a consequence of privacy concerns or other
general measures. Intrapersonal variance in individuals’ perceptions and behaviors
and the situationally varying antecedents of both have largely been neglected. Of
course, researchers have conducted experiments designed to capture situational
processes, but as previously discussed, an inherent limitation of such experimental
work is the limited generalizability of their findings.
I have further argued that a situational perspective is particularly warranted since
the widespread use of smartphones and the corresponding emergence of multimodal
communication practices. Interpersonal communication increasingly takes place in
a variety of applications, individuals today are confronted with novel and constantly
changing environments, which determine the prevailing level of privacy and, in turn,
the psychologically perceived adequacy for engaging in self-disclosure. From this
point of view, identifying the environmental factors that influence these perceptions
and decisions situationally is an important endeavor.
Thus, the first major aim of this work was to provide a theoretical foundation
for understanding privacy and self-disclosure from a situational point of view. In
order to be applicable to various research interests, such a theory must ideally
allow situational processes to become the subject of empirical investigation—not by
focusing on particular situations, but by investigating general patterns across varying
situations. In light of the exponential growth of new information and communication
technologies, such an approach should particularly provide the tools and concepts
to make the specific characteristics of the various new media environments people
nowadays use to communicate and socialize amendable to empirical analyses.
I therefore proposed the theory of situational privacy and self-disclosure, which
allows for the investigation of processes of revealing and concealing in various
non-mediated and mediated environments. The corresponding empirical study
illustrated how this theory can be used to measure these processes and situational
effects without losing the possibility of quantitatively detecting general patterns
of behavior. The theory has a particular focus on interpersonal communication,
specifically on self-disclosure processes. Understanding this focus and its limits is
important. For example, the theory cannot be used to explain why people relinquish
person-related information such as their name or address when registering for online
services (although the suggested perspective might also be valuable for analyzing
such processes; see also Sect. 13.1.1). It is not a comprehensive theory of privacy
that can be used to investigate all potential aspects. Due to its neutral character,
for example, it does not necessarily help with normative decisions about how much
privacy individuals should have. That being said, it provides a valuable perspective
on privacy and self-disclosure that is helpful in understanding and empirically
analyzing people’s interpersonal communication behavior from a psychological
point of view. The theory thereby deliberately consists of abstract concepts and
factors that were derived from the current status quo, yet hopefully will also be
adaptable to future trends and developments in the media industry.
In this chapter, I will first summarize the main tenets of the theory and
then proceed to discuss potential modifications and extensions. Thereby, I will
particularly evaluate whether the proposed theory needs to be modified on the basis
of the results obtained in the empirical study. As the empirical data did not support
some of the assumptions of the theory, whether these assumptions are still justified
needs to be critically evaluated. Subsequently, I will reflect on some broader points
of criticism: As any theory can be challenged with regard to its underlying scientific
paradigms, I will address two such foundational critiques, which simultaneously
provide opportunities for further extensions or modifications of the theory. More
specifically, I reflect on two novel perspectives on privacy and self-disclosure which
are currently regarded as promising approaches in the scientific community: (1)
heuristics as an explanation for seemingly irrational behavior and (2) the affordance
perspective as a means of overcoming the material-social dichotomy in studying
technology use.
I began the development of the theory with an extensive review of the predominant
approaches to privacy and self-disclosure. I found that in the social sciences,
researchers’ goals can be more or less subsumed under four overarching research
questions (as identified in Sect. 3.2):
12.1 Summary and Theoretical Implications 311
The first question asks what privacy is from the individual’s point of view.
My discussion of multidisciplinary discourses on privacy has shown that privacy
can be and has been conceptualized very differently (Sect. 3.1). Depending on
the focus of scholarship, privacy has been conceptualized as negative freedom
(discourse in political philosophy), treated as a residual category of the public sphere
(discourse in sociology), defined as a form of seclusion or condition of limited
access (legal discourse), and finally described as selective or secondary control
312 12 Overall Discussion
The second question asks why people need privacy. The proposed theory once
again aligns with classical approaches positing that privacy is not an end in itself
(e.g., Altman, 1974; Johnson, 1974; Nissenbaum, 2010; Westin, 1967). In line with
Supposition 2, it is instead regarded as a condition or the necessary circumstances
enabling the satisfaction of more fundamental needs or the performances of other
behaviors (e.g., self-disclosure), which, in turn, allow for the satisfaction of more
fundamental needs (Trepte & Masur, 2017a). What level of privacy is appropriate is
hence closely tied to the goals an individual wants to achieve. Combining this with
the answer to the first question, we can argue that the psychological value of privacy
stems from its ability to facilitate satisfaction of the fundamental need.
Again, the proposed theory focuses specifically on self-disclosure as one behav-
ior that requires privacy in order to be performed. It also draws on literature focusing
on information control and the risks of self-disclosure (Sect. 4.3), which suggests
that people only disclose when they feel it is appropriate to do so. As such, it
emphasizes the role of privacy for the satisfaction of those needs that require
314 12 Overall Discussion
The third question asks how individuals achieve privacy and what makes them do
so. In line with Supposition 4, the theory proposes that people actively engage
in different types of privacy regulation behaviors in order to create situations in
which they feel their privacy is sufficient and they are thus able to self-disclose.
Through privacy regulation behaviors, people exert choice and further control over
access and stimulation, as proposed by Laufer, Proshansky, and Wolfe (1973; see
also Sect. 3.3.3). In general, I postulate that it is fruitful to differentiate between
preventive, preservative, and corrective privacy regulation behaviors as privacy
regulation happens on many levels and at different points in the process of fulfilling
fundamental needs. Although people try to regulate their privacy preventively on
the basis of their stable needs and experiences, they simply cannot foresee every
potential privacy invasions or violations. Thus, preservative and corrective measures
are equally important.
The theory of situational privacy and self-disclosure places particular focus
on long-term preventive privacy regulation behaviors which can be further distin-
guished into choosing and manipulating environments with regard to their level of
privacy. People thereby actively influence the level of protection against identifi-
cation and unwanted accessibility in future self-disclosure situations. Accordingly,
the present work is one of the first to acknowledge the role of choosing particular
media in determining the level of privacy and hence answers recent calls for a
more multimodal perspective on media use (Hasebrink & Schmidt, 2013; Lampinen,
2016).
12.1 Summary and Theoretical Implications 315
The theory furthermore identified several personality facets and trait-like char-
acteristics that influence people’s likelihood of engaging in privacy regulation
behaviors. The results of the empirical study indicated that the level of online pri-
vacy literacy and vertical privacy concerns were particularly effective in predicting
whether people engage in such behaviors. In contrast to prior research, the findings
suggest that stable personal factors affect whether people engage in active privacy
regulation behavior but are less powerful in influencing the situational decision to
self-disclose.
Finally, the theory posits that people constantly learn from their experiences by
evaluating the effectiveness of their decisions and adapting their future behavior as
a result of these evaluations (Supposition 5). Although this third component of the
theory was not tested empirically, I believe that future research will find support
for such processes. Moreover, I believe that using prior experiences with situational
processes to model future situational processes will be more successful than testing
whether negative experiences explain differences in behavior between individuals.
Finally, the fourth question asks about the circumstances in which people perceive
high or low levels of privacy and the extent to which this perception affects their
behavior. The theory of situational privacy and self-disclosure aims specifically at
providing a framework for understanding and analyzing this question. In line with
Supposition 3, it suggests that self-disclosure and privacy are inherently connected
such that high levels of privacy allow for self-disclosure and low levels of privacy
can be mitigated by choosing to not disclose the self. It is assumed that people
perceive interpersonal and external factors, evaluate them with regard to the level
of privacy they generate, and rationally decide whether this level of privacy is
sufficient for them to fulfill their need to disclose themselves. This view is again
closely related to the ideas of Altman (1974) who argued that people constantly
evaluate their achieved and desired level of privacy and seek to achieve an optimal
balance between the two. Such a view is also similar to the ideas expressed in
privacy calculus theory (e.g., Dienlin & Metzger, 2016; Dinev & Hart, 2006; Laufer
& Wolfe, 1977), as it acknowledges that people weigh the inherent benefits of
self-disclosure against the costs (i.e., privacy risks). However, in contrast to prior
empirical work on the privacy calculus, I did not investigate this weighing process
as a general pattern, but rather as a situational decision-making process. As such the
theory and the empirical investigation extend prior research on the privacy calculus
by providing insights from a situational perspective.
Furthermore, it is clear from the theory and the empirical results that high levels
of privacy arise when the number of recipients is small, and they are rated as
trustworthy and psychologically close. Furthermore, the study’s findings show that
people self-disclose whenever they have a high need to disclose themselves or prior
interactions with the recipient(s) require them to disclose themselves in return.
316 12 Overall Discussion
Third, I have shown that the theory can be applied to smartphone-based communica-
tion. The findings of the empirical study revealed that people do indeed choose and
manipulate certain environments (communication applications) on the basis of their
privacy preferences and their personality. It was further shown that the depth of self-
disclosure within smartphone-based communication situations depends primarily on
internal and interpersonal factors related to the specific situation.
There are many ways in which the theory of situational privacy and self-disclosure
can be extended or modified. As already highlighted in several instances throughout
the book, the number of factors chosen was deliberately small and represents what
I considered to be the most important predictors of self-disclosure in the existing
literature. The statistical model estimated in this study, however, explained only a
moderate amount of variance in the primary dependent variable. As a result, several
other factors seem worth including to increase the explained variance. The proposed
framework of personal and environmental factors is deliberately open-ended and can
easily be refined and advanced in order to better explain a given behavioral outcome.
With regard to non-situational personal factors, for example, it should be self-
evident that including perceived benefits would strengthen the predictive power.
Such an extension would also bring empirical research based on the proposed
theory closer to the existing literature on the privacy calculus (e.g., Dienlin &
Metzger, 2016; Krasnova, Veltri, & Günther, 2012). Furthermore, much research
has focused on the relationship between privacy attitudes and intentions (as
more bidirectional concepts than privacy concerns) and privacy regulation or self-
disclosure, often revealing that they mediate the relationship between concerns and
behavior (e.g., Burns & Roberts, 2013; Dienlin & Trepte, 2015; Niemann, 2016).
Other psychological variables might be interesting to incorporate, too: A study by
Hesse and Rauscher (2013), for example, revealed that alexithymia—an individual’s
inability to understand and communicate emotions—moderated the effect of privacy
orientations on the behavioral outcome of concealing. In the study, I focused
particularly on personality and privacy-related measures as trait-like characteristics.
However, in developing the theory, I also acknowledged the effects of chronic needs
on self-disclosure. Including these—and perhaps particularly the need to belong—
may provide further insights into these processes. Incorporating such concepts as
additional non-situational personal factors might hence be useful in increasing the
amount of explained variance at the second level.
With regard to situational personal factors, the empirical study can be criticized
for being too superficial. It treated internal factors almost as control variables
compared to, for example, interpersonal factors. Differentiating between several
motives or including other internal processes such as situational feelings and emo-
tions would provide a more detailed picture of how these varying personal factors
affect situational self-disclosure. Several other types of situational environmental
318 12 Overall Discussion
factors could also be considered. For example, interpersonal factors could also
include expectations with regard to the receiver, the perceived role the discloser
thinks he or she has to adopt, or prevailing norms that are implicitly shared
among the people present (see also Sect. 13.1.2). This could also involve including
notions of negotiated rules (Petronio, 2002) or transmission principles (Nissenbaum,
2010). In general, I deem it important to investigate how communicative processes
can be integrated in order to account for the networked nature of privacy in
networked environments (Marwick & Boyd, 2014). Finally, as I only investigated
two components of the model (pre-situational privacy regulation behaviors and
situational self-disclosure processes), it is also important to test the suggested
evaluation processes and analyze their effects on future privacy regulation and self-
disclosure.
Overall, I am convinced that the theory of situational privacy and self-disclosure
will be strengthened through its application. It allows for the incorporation of a mul-
titude of factors, concepts, and potentially also other micro-theoretical approaches.
In the long run, the application of the theory will show what factors are particularly
important to consider in predicting situational self-disclosure. The present study
might not be able to determine beyond the shadow of a doubt whether the proposed
factors are actually important or not. In this sense, I hope that researchers will find
the theory useful for their empirical work as continuous use and applications will
make it more versatile and adaptable to different research areas.
The potential contributions of the proposed theory notwithstanding, it is vulnera-
ble to challenges with regard to its basic underlying paradigms. Theories are always
developed on the basis of specific axioms and ways of thinking. It is thus important
to critically examine the consequences of such types of thinking and whether
alternatives exist. In the following sections, I will discuss two major paradigms
that serve as the basis of the theory. For each paradigm, I will discuss alternative
perspectives which could provide fruitful starting points for future investigations
and refinements of the theory.
The theory of situational privacy and self-disclosure posits that both privacy regu-
lation behaviors and self-disclosure are goal-directed behaviors. More specifically,
it postulates that people actively engage in privacy regulation behaviors in order
to generate the environments necessary for them to be able to perform self-
disclosure with the aim of fulfilling fundamental needs. It moreover implicitly
assumes that individuals are consciously aware of the interpersonal and external
factors in different situations, interpret them with regard to their influence on the
level of privacy, and evaluate the potential risks associated with disclosure under
such circumstances.
The theory is thus based on the rational choice paradigm, which regards
the individual as rational agent who generally evaluates given information, the
12.2 First Paradigm: Individuals as Rational Agents 319
probabilities of events and possible consequences, and the potential costs and
benefits of behavior in order to decide on the best course of action. Indeed, most
studies of privacy have viewed individuals as rational economic agents. From that
perspective, “individuals are forward lookers, utility maximizers, Bayesian updaters
who are fully informed or base their decisions on probabilities coming from know
random distributions” (Acquisti & Grossklags, 2005, p. 1).
Originally developed in the economic sciences, rational choice theory is actually
a family of theories with many versions. According to Boudon (2009), it can
be summarized into six postulates (p. 180): The first postulate is that individual
decisions, actions, attitudes and so forth lie at the roots of all social phenomena.
This principle has come to be known as methodological individualism. The second
postulate refers to the principle of understanding, which states that any individual
actions can be understood and described as the results of understandable motivations
or reasons. Third, all behavior (often also referred to as action) is rooted in cognitive
processes or reasons within the individual. This principle of rationality represents
the core of rational choice theory. The fourth postulate states that these reasons
are derived from a consideration of the consequences of various actions. Fifth, it
is assumed that actors are mainly concerned with the consequences for themselves.
Finally, the sixth postulate posits that individuals are able to “distinguish the costs
and benefits of alternative lines of action and choose the line of action with the
most favorable balance” (p. 180). This last postulate is also the reason why rational
choice theories are often also called theories of utility maximization (cf. Becker,
1996; Coleman, 1994) and why humans are understood as homo oeconomicus in
neoclassical economics.
Although this general form of rational choice theory has been used to predict
individuals’ behavior, it has been even more influential in shaping how behavior
is explained in general. Many scholars have gone so far as to say that the rational
choice paradigm is the only reliable basis for a comprehensive social (and thus also
psychological) theory. For example, Coleman, (1994) argued that “[r]ational actions
of individuals have a unique attractiveness as the basis for social theory. If [. . . ] a
social process can be accounted for in terms of the rational choices of individuals,
then and only then can we say that is has been explained” (p. 1). Or as Hollis
(1977) put it: “rational action is its own explanation” (p. 21). According to Elster
(1988), the rational choice explanation is characterized by three steps: Explaining
human behavior based on the rational choice paradigm means (1) showing that it
derives from the intention of the individual (principle of intentionality), (2) showing
that these intentions stem from desires and beliefs that are themselves rational
(principle of rationality), and (3) predicting behavioral outcomes by assuming that
they represent the best means of accomplishing the individual’s goal (principle
of optimality). This way of explaining human behavior is hence based on the
methodological individualism mentioned above, meaning that scholars begin by
considering individuals’ actions and then try to understand the origins of these
actions. Individuals are seen as motivated by specific goals, and “[t]hey act within
specific, given constraints and on the basis of the information that they have about
the conditions under which they are acting” (Scott, 2010).
320 12 Overall Discussion
Many theories in different disciplines have adopted the rational choice paradigm.
In particular, it seems to be the most prominent approach toward explaining human
behavior in the social sciences because it allows predictions to be made on the basis
of relatively few variables. If human action is reducible to individuals’ rational cost-
benefit calculations, mathematical models of human behavior can be developed, and
these can be tested with empirical data. Although the benefits of such an approach
are evident, many scholars have expressed concern about the overall usability of the
paradigm and voiced criticisms of its fundamental claims.
Most notably, scholars have criticized rational choice theory for taking rationality
as the unquestioned starting point for the analysis of individual behavior. One of the
more fundamental criticisms is that rational choice theory is reductionistic and thus
falsely represents human behavior. Its own claims are said to be not objective and the
product of individual rational thinking. Elster (1988), for example, discusses several
caveats of the rational choice paradigm, particularly with regard to its inability to
explain irrational human behavior:
Rational-choice explanation may fail because the situation does not allow a unique
behavioral prediction from the hypothesis that agents behave rationally. But we should
not forget that it sometimes fails simply because people act irrationally. They yield to
wishful thinking, in the sense of letting their desires determine their beliefs or the amount
of evidence they collect before forming their beliefs (assuming that the result is below
the lower bound). Or they succumb to weakness of will, in the sense of acting for the
sake of a desire which they themselves value less highly than the remaining set of desires.
Finally, their intentions and beliefs may be subject to various inconsistencies that are also
incompatible with rational choice (pp. 63–64).
Although it should already be apparent from the answers to the overarching research
questions summarized earlier, I will now investigate more explicitly the extent to
12.2 First Paradigm: Individuals as Rational Agents 321
which the proposed theory rests on the rational choice paradigm in explaining
human behavior. I will do so by analyzing the extent to which the assumptions
derived from the theory align with the three characteristics of rational choice
explanations suggested by Elster (1988).
The proposed theory aligns with the principle of intentionality, because it
establishes the individual as agent, several types of behavior (privacy regulation,
self-disclosure, and evaluation) as actions, and it sees these behaviors as a function
of desires (needs or motives) and cognitions (perception of environmental factors)
(cf. Elster, 1988, p. 51). With regard to pre-situational privacy regulation processes,
for example, I argued that people choose Threema (behavior) because they want
a means of communicating with other people that simultaneously allow them to
remain inaccessible to providers (set of desires) and because they perceive all other
alternatives as violating their vertical privacy and thus offering less protection (set
of cognitions). In line with the principle of intentionality, the theory thus posits
that given this specific set of cognitions, choosing Threema is the best means of
realizing this specific set of desires. In other words, the combination of cognition
and desires caused the behavior (cf. Elster, 1988, pp. 51–52). Consequently, the
theory also aligns with the principle of rationality and the principle of optimality. It
assumes that given a certain set of cognitions and desires, people rationally decide
the best options among several alternative actions to realize their desires (e.g., using
Threema instead of WhatsApp).
A similar explanation can be applied to situational self-disclosure processes.
Individuals want to disclose themselves in order to satisfy specific needs (e.g.,
relationship initiation). What Elster (1988) calls desires are described in the theory
as internal personal factors and encompass motives and needs. Individuals perceive
interpersonal and external environmental factors (cognitions) and rationally evaluate
them with regard to the level of privacy they generate. Based on the combination of
these desires (internal factors) and cognitions (environmental factors), they choose
the best available option and act accordingly (in this case, via a two-step process of
first regulating privacy and then choosing to either self-disclose or to stay reserved).1
I thus once again assume that people evaluate all available information in a situation
and rationally weigh the costs and benefits of different behavioral alternatives before
finally choosing the best available option.
The theory of situational privacy and self-disclosure thus indeed adopts a rational
choice paradigm to explain people’s privacy regulation behavior and self-disclosure.
This should not be too surprising, as it deliberately builds upon existing approaches
and empirical studies adopting the privacy calculus framework (see Sect. 6.3.1).
The assessments of benefits (in the theory subsumed under internal factors that
enforce the willingness to self-disclose) and risks (subsumed under the perception
Obviously, the cognitions that influence behavior in a given situation include not only people’s
perceptions of environmental factors but also, for example, people’s knowledge about how to
achieve certain goals and prior experiences with such situations.
322 12 Overall Discussion
and evaluation of environmental factors) are hence inherent aspects of the decision-
making process described in the theory.
Based on the critique described above, we must now ask whether such an
idealized rational decision-making process is actually warranted. First of all,
the empirical findings suggest that this way of explaining behavior is able to
meaningfully predict the behavioral outcome (of course with a certain probability
including quantifiable uncertainty). According to the empirical findings, privacy
regulation behaviors can indeed be predicted by individuals’ cognitions (measured
more broadly via more general concepts such as online privacy concerns) and
desires (measured by personality facets). Moreover, self-disclosure can be predicted
based on individuals’ desires (the situational need to self-disclose) and cognitions
(situational assessments of the potential recipients). On the other hand, the empirical
results also seem to indicate that people do not behave rationally with regard to the
threats arising from external environmental factors. The level of protection against
identification and accessibility was theoretically assumed to be relevant for depth of
self-disclosure, but the relationship turned out to be nonsignificant in the empirical
analyses. But does that mean people’s behavior is not rational?
In the limitations section of the discussion in Part II (Sect. 11.2), I argued that it
remains unclear whether people’s perceptions of these external factors differ from
what is objectively the case. In accordance with this rationale, it could be argued that
people simply do not have access to all necessary information, and their rationality
in such situations is limited by cognitive limitations of the mind. Furthermore, as
online communication is often quick, individuals might generally not have enough
time to make a rational decision (cf. the concept of bounded rationality as advanced
by Simon, 1955). Such an interpretation was already advanced by Acquisti and
Grossklags (2005) arguing that “[t]he individual decision process with respect to
privacy is affected and hampered by multiple factors. Among those, incomplete
information, bounded rationality, and systematic psychological deviations from
rationality suggest that the assumption of perfect rationality might not adequately
capture the nuances of an individual’s privacy-sensitive behavior” (p. 27). We
can assume that people do not have access to all information necessary to make
an informed decision (particularly with regard to the rather intangible external
factors of a situation), that they may not be able to process this information
even if available (e.g., because they lack online privacy literacy), and that they
might otherwise deviate from rationality by overestimating the perceived benefits,
cognitively misrepresenting the trade-offs between costs and benefits, or because
social norms suggest alternative behavioral actions. As Laufer and Wolfe (1977)
rightly conclude, the problem is that “the individual is often unable to predict the
nature of that which has to be managed [. . . ] in fact, in advanced industrial societies
there is a growing certainty about the unknowableness of the future” (p. 37).
12.2 First Paradigm: Individuals as Rational Agents 323
As mentioned already in the discussion in Chap. 11, the bubble heuristic may be a
valuable explanation of the empirical results: because people decided to use a certain
environment in the past (e.g., they choose Threema over WhatsApp), they feel safe
now every time they use this environment to communicate with other people.
Furthermore, a recent study investigated whether Facebook users indeed feel that
they themselves are less susceptible to privacy risks than other people (Metzger
& Suh, 2017). Based on 1156 Facebook users, the authors found that many
users did exhibit this kind of comparative optimism. However, this bias did not
significantly affect people’s average self-disclosure. I would nonetheless argue that
such heuristics may still account for situational variance in self-disclosure, but
future studies implementing meaningful measures of these cognitive heuristics to
study situational effects are needed.
In sum, individuals may not navigate networked environments as rationally
as they themselves think. It thus seems fruitful to adopt a heuristic approach
when investigating people’s privacy perceptions and related behavior, as this might
provide further explanations of why users’ behavior often does not react rationally
to objective privacy threats. The work of Carey and Burkell (2009), Sundar et al.
(2013), Gambino et al. (2016), and Metzger and Suh (2017) can be considered as
promising starting points for future investigations.
The theory of situational privacy and self-disclosure argues that people’s behavior
can only be meaningfully affected by what they actually perceive (Sect. 7.1). It thus
assumes that the situation “as it is perceived” rather than “as it is” influences peo-
ple’s behavior (cf. also Magnusson, 1981b, pp. 3–5). This view can be challenged
for denying the autonomy or constraining power of social structures (cf. Scott,
2010). As Faraj and Azad (2012) noted, such a paradigm results in “psychological
12.3 Second Paradigm: Subjective Reality 325
While subjective situationalism forms the basis of the proposed theory and its
application to the study of person-environment interaction, the materiality of the
environment is not totally neglected. The theory requires an analysis of the features
of the studied environment and, in turn, how these affect the perceived level of
privacy that is assumed to influence people’s behavior. However, it simply posits
that certain features determine the level of privacy in a certain, predefined way.
For example, end-to-end encryption—which can be regarded as a feature of some
IM services—is said to determine the level of content accessibility, which is in turn
(more or less) said to affect the perceived level of privacy. Or similarly, being able to
upload a profile picture is a typical feature of SNS and thus a distinct characteristic
of this type of environment. The theory posits that the type of picture uploaded
matters in defining the level of visual anonymity.
So, on the one hand, the theory takes a materialist view by describing specific
features of environments and assuming that these features determine the level
of perceived privacy, which in turn affects subsequent behavior such as self-
disclosure. On the other hand, it takes a constructivist view by arguing that only what
326 12 Overall Discussion
people perceive can meaningfully affect their behavior. As noted in the limitations
section of the previous chapter, this discrepancy is both evident and problematic
in the empirical investigation of such factors. From a materialist point of view,
we should measure the features of the environment. From a constructivist point
of view, we need to measure people’s perceptions of these features. As noted
before, both perspectives are problematic as they deny either the agency of the
individual or the agency of the social structure. As a result, the theory still remains
underspecified when it comes to the relationship between external factors and
individuals’ perception and behavior, which also makes the empirical investigation
less meaningful in this regard (cf. again Sect. 11.2).
We may thus ask whether alternative perspectives and approaches to understand-
ing the environment-person relation exist. The question is whether this relation
can be better understood by redefining or reinventing the theoretical link between
social relations and technology (Faraj & Azad, 2012, p. 237). One approach that has
recently sparked considerable scholarly interest is the affordance perspective.
The term affordance was originally coined by the perceptual psychologist Gibson
(1986), who argued that animals do not perceive the qualities (or properties) of an
object, but rather what type of activities the object would be useful for (p. 119).
From this it follows that although the features of an object are common to each
person or animal who encounters them, the affordances of that object can be
different. Affordances must hence be understood as relative to the person or animal
at hand, and thus depend on the posture and behavior of the actor (pp. 118–
119). Gibson further noted that affordances—sometimes also called offerings of
the environment—can be beneficial or injurious (p. 127). In contrast to prior
theories of perception, which emphasized an organism-centric processing model
of cognition, Gibson developed the affordance concept to emphasize the reciprocal
and immediate relation between the environment and an organism (Faraj & Azad,
2012, p. 249). The concept has since been adopted and further refined in various
disciplines, and has been used in design and human-computer interaction research to
understand how technologies can be better designed (e.g., Norman, 1990). However,
the perspective developed in this area was often very narrowly focused on the object
that needed to be designed in a particular way in order to foster a certain type of
behavior.
Today, a relational view of affordances is more prevalent. Affordances are
thus neither properties of people nor artifacts of the environment. Instead, they
are constituted in relationships between people and the materiality of the things
(whether physical or virtual) with which they come in contact (Treem & Leonardi,
2012, p. 146). Affordances are hence not independent of people, but also not
independent of materiality. Because people are different and have different goals
and possible actions, they perceive an object as affording different possibilities for
12.3 Second Paradigm: Subjective Reality 327
action (Evans et al., 2016; Treem & Leonardi, 2012). More explicitly, Faraj and
Azad (2012) suggest that
An affordance is a multifaceted relational structure, not just a single attribute or property
or functionality of the technology artifact or the actor. That is, affordance is often realized
via the enactment of several mutuality relations between the technology artifact and the
actor (i.e., mutuality is the existence of reciprocal relations among role, line-of-action,
practice/routine, and artifact material/functional bundle) (p. 254).
2I use the term materiality here in line with Treem and Leonardi (2012), who argued that it refers
to the features of an artifact regardless of whether it is a piece of hardware or software (p. 146).
328 12 Overall Discussion
Based on the results of this study and the existing literature on online privacy
literacy, it seems that only a few people are actually knowledgeable or self-reflective,
and consequently engage in effective privacy regulation behavior. A peculiar finding
of this study is that external environmental factors (i.e., those that need to be
assessed in order to identify one’s level of protection against identification and
unwanted access by third parties) are not necessarily very powerful in shaping
people’s behavior. Although more privacy-literate people are more likely to adapt
their self-disclosure to their (vertical) privacy concerns, it nonetheless seems that
many individuals behave in networked environments just as they do in offline
environments: they mostly rely on interpersonal assessments to evaluate the risks
associated with self-disclosure. At the same time, these findings emphasize the
pivotal role of online privacy literacy. In light of the overall findings of this
theoretical and empirical investigation of online privacy and self-disclosure, it is
evident that people may generally lack the literacy to confront the privacy-related
dynamics discussed in Chap. 2.
From a normative point of view, we need to engage with this finding and ask
ourselves what we can do to make individuals less uncertain and more empowered
in new media environments. This last chapter thus offers important prospects
for future research and more importantly suggests some practical implications
for individuals and for society as a whole. Although the theory of situational
privacy and self-disclosure provides a framework for studying and consequently
understanding privacy and self-disclosure processes, it is nonetheless up to future
research to further validate its claims and assumptions. The following reflections
and considerations should therefore be taken into account when doing so.
Although I have already provided a number of prospects for future research in the
previous chapters drawn from limitations of the empirical study and general points
of criticism, I will now offer some considerations regarding the future of privacy
research and how the proposed theory can support the investigation of privacy issues
in new areas.
In the present work, I attempted to provide a comprehensive psychological
theory that aids in understanding and predicting privacy regulation behavior and
self-disclosure. The theory was deliberately composed of rather abstract concepts
and components in order to ensure their long-term applicability. In the empirical
investigation, I focused on smartphone-based communication the analysis of which
I deemed particularly important for today. In the future, however, new dynamics,
societal changes, platforms, communication services, and devices will need to be
examined as they will present new threats or modifications to individuals’ handling
of information and online behavior. Most likely, they will further challenge concepts
and theories of privacy and self-disclosure.
Large social media companies such as Snapchat and Facebook have recently
announced that they will further develop and integrate augmented and virtual reality
features into their portfolio in the near future (Barrett, 2017, April 18; Flynn, 2017,
April 18; Hautala, 2017, April 18). Furthermore, many companies are likely to
increasingly use artificial intelligence to enhance usability through conversational
agents such as so-called chatbots (The Economist, 2016, April 09). All of these
technological developments may compromise individuals’ privacy in a number of
ways. For example, augmented reality, which refers to systems or applications that
combine real and virtual objects in a real environment, register (or align) real and
virtual objects with each other, and run interactively, in three dimensions, and in
real-time (Azuma, 1997; Krevelen & Poelman, 2010), require access to a variety
of sensor data, including video and audio feeds, GPS data, accelerometer readings,
and so on to deliver their intended functionality (Roesner, Kohno, & Molnar, 2014,
p. 91). Users thus automatically give providers large amounts of personalized data
when they use such systems. Privacy risks also arise for other people or bystanders,
as the sensors may randomly record them and pass that information to providers or
other third parties as well (Roesner et al., 2014, p. 91).
Another example are conversational agents such as Apple’s Siri, Microsoft’s
Cortana, or Amazon’s Alexa, which can also become privacy-invasive. These chat-
based computer programs are often designed to exhibit human-like behavior based
on artificial intelligence and have the with the ultimate goal of performing various
tasks for their users (Vassallo, Pilato, Augello, & Gaglio, 2010, p. 357). Research
has started to investigate the persuasive potential of such programs (Fogg, 2003).
As a result, scholars have recently discussed conversational agents’ potential to
violate people’s privacy (CPDPconferences, 2017). In particular, they warn that
conversational agents might be designed to elicit self-disclosure from individuals.
Research is needed to investigate this notion (see also Braun, 2017).
13.1 Prospects for Future Research 333
These two examples provide only a brief outlook into the future of mediated
interpersonal communication. In what follows, I will discuss three broader privacy-
related aspects which I believe will be pivotal for understanding and also for safely
adopting any of these technological developments. In doing so, I will highlight
how the situational perspective proposed in this work may help us understand and
analyze these issues.
In the theory of situational privacy and self-disclosure, I set out to combine research
on privacy and self-disclosure. I argued that linking the two research areas would
provide a more comprehensive picture of great use to current investigations of
interpersonal communication. Although the present work suggests that such a
focus is warranted, it should nevertheless be borne in mind that such an approach
neglects other privacy-related behaviors. As argued earlier, such a strong emphasis
on self-disclosure is inherently one-sided and potentially also positively biased (see
Sect. 4.3 and in particular Crowley, 2017; Parks, 1982). Because self-disclosure is
defined as the intentional sharing of information about the self to another person
or group of people, it primarily refers to interpersonal communication processes.
However, many of the current scientific and societal debates around online privacy
emphasize the threats of non-interpersonal information transfer processes such as
the provision of personal information to providers and institutions.
By personal information, I refer to “any information relating to an identified or
identifiable natural person (‘data subject’); an identifiable person is one who can
be identified, directly or indirectly, in particular by reference to an identification
number or to one or more factors specific to his physical, physiological, mental,
economic, cultural or social identity”.1 Personal information thus also includes
so-called meta-data which can be described as data that provides information
about other data (see Sect. 2.1.1). I deem continuous research on people’s personal
information disclosure particularly important for the following reasons:
First, most vertical privacy threats do not (only) arise from individuals exhibiting
high levels of self-disclosure. Instead, they originate from the socio-technical
infrastructure of online services, which allow providers of all types as well as gov-
ernmental institutions to access and record an unprecedented amount of information
about individual users. Specifically, since former NSA contractor Edward Snowden
revealed the extent to which the NSA has been collecting and analyzing personal
information about US citizens as well as monitoring communication worldwide
(Greenwald, 2014), scholars should investigate why people seem to “give away”
their personal information to providers and institutions.
1 I here refer to the definition provided by the European Union Directive (European Parliament and
By accepting the terms and conditions of use, individuals accept that they will
constantly provide personal information and meta-data, which can then be combined
into elaborate client profiles from which a variety of inferences about specific
individuals can be drawn. In fact, most websites, applications, or other online
service providers are less interested in the content of a particular communication,
but more interested in personal information such as addresses, preferences, shopping
records, web searches, phone logs, surfing behavior, location information, media
consumption, and the meta-data related to it, which is when, where, with what
device, and with what software individuals performed any of the listed online
activities. As Acquisti (2014) noted, “progresses in data mining, business analytics,
and so-called big data, have the potential for magnifying the size and augmenting
the scope of economic benefits and dangers alike” (p. 77). Through large-scale
analyses of consumer or surfing behavior, companies are able to offer individuals
the right product at exactly the right time, adapt product prices to individual
spending capacities, and draw inferences about preferences and present content on
that basis. As noted in Sect. 2.3.2, they may be able to manipulate the individual
without him or her being aware of it (see also Calo, 2014). Lyon (2014) has further
shown that big data tendencies in this regard are also supportive of expanded and
intensified surveillance. From a general point of view, I hence suggest that future
research should adopt a more holistic view of horizontal and vertical privacy and
develop theories that incorporate both self-disclosure and information disclosure
(or conversely also information control as defined by Crowley, 2017).
Second, in comparison to self-disclosure processes, the disclosure of personal
information and meta-data is often less conscious or even ignored by individuals.
Previous research has shown that people seldom take the time to read online
service provider’s terms and conditions or the privacy policies. Steinfeld (2016),
for example, found in an experiment with 128 graduate students that presenting
a website privacy policy by default significantly increases the time and effort
participants put into reading it. However, when participants had the option of
accepting website terms and conditions without reading the policy (which seems
to be the predominant practice of online service providers), they will generally
forgo reading the document. Another recent study with 717 participants showed
that interactive privacy policies are more likely to affect users’ trusts in the provider
(Aïmeur, Lawani, & Dalkir, 2016), revealing that people show greater trust in
providers when they can opt in or opt out of each term in the privacy policy
(p. 376). I hence suggest that future research focuses particularly on theorizing
and analyzing the psychological processes of information and meta-data disclosure.
Although a few studies—who mostly adopted a privacy calculus perspective and
used experimental designs—have investigated information disclosure in the context
of electronic commerce (e.g., Dinev & Hart, 2006; Metzger, 2004, 2006), such
empirical investigations are highly underrepresented (compared to research focusing
on self-disclosure on SNSs).
The situational perspective advocated by the theory of situational privacy and
self-disclosure represents a promising starting point for such investigations. For
example, website registration processes can be studied in a similar way as self-
13.1 Prospects for Future Research 335
But how can it be incorporated in the theory of situational privacy and self-
disclosure? One approach would be to integrate the concept of contextual integrity
(Nissenbaum, 2010). As noted earlier, contexts are stable sets of characteristics
which shape perceptions of privacy and are culturally developed and negotiated.
Situations, on the other hand, refer to the individual’s perspective on the self
and the environment. From this, it follows that contextual characteristics become
the circumstances of a given situation. Context-relative informational norms—
the key concept of Nissenbaum’s theory—may thus guide people’s behavior and
could hence be integrated as interpersonal environmental factors in the theory
of situational privacy and self-disclosure. Through communication and societal
discussion, we must establish norms which include the notion reflecting individuals’
privacy can be endangered by the behavior of others. If norms guide people’s
behavior, the negotiation of such a norm may protect individuals against these types
of privacy invasions.
A last consideration refers to the role of online privacy literacy, which also relates
to the previous two aspects and might offer a useful direction for future research
and studies. The present study has shown that people with higher online privacy
literacy also tend to use more privacy-friendly communication applications. At the
same time, the study also revealed that only a few people use such applications
(e.g., less than 10% who use Threema, Signal or Telegram). Moreover, the findings
of the ESM study showed that external factors—whether they impair or protect
people’s privacy—do not significantly influence people’s self-disclosure. Although
the previously described limitations also have to be taken into account, these
findings may be explained by a lack of knowledge, as discussed in Sect. 6.3. The
findings further revealed that for people with greater online privacy literacy, vertical
privacy concerns became a significant negative predictor of self-disclosure.
Based on such a rationale, the findings could be interpreted in the following
way: Because people are not very knowledgeable about application providers’
data collection practices and know little about the socio-technical infrastructure
of these online applications, they simply are not aware of these environmental
characteristics, meaning that their behavior in these environments is not influenced
by them. In light of these results (and also based on the work of Hoofnagle, King, Li,
& Turow, 2010; Masur, Teutsch, & Trepte, 2017; Park, 2013; Trepte et al., 2015),
it seems that online privacy literacy is a pivotal factors in fostering more privacy
regulation behavior and more conscious self-disclosure.
That being said, the existing literature on the relationship between online privacy
literacy and privacy regulation behavior—which is often only cross-sectional—
does not conclusively reveal whether higher literacy actually enables people to use
certain privacy regulation strategies (e.g., Hoofnagle et al., 2010; Masur, Teutsch, &
Trepte, 2017; Park, 2013). Masur, Teutsch, Dienlin, and Trepte (2017) have recently
338 13 Overall Conclusion and Outlook
In this final section of this book, I want to address perhaps the most important
question in research on privacy and self-disclosure: What do the insights gained
from scientific work imply for the individual and for society at large? Nissenbaum
(2010) noted that we are currently living through a discontinuity, a disruption which
resulted from the rapid adoption and infiltration of digital information technologies
and which is characterized by schisms that are often experienced as violations of
privacy (p. 231). Several authors have argued that we are currently witnessing the
advent of information capitalism, which is slowly reducing the value of privacy by
supporting and encouraging the disclosure of more and more information (Castells,
2009; Sevignani, 2016).
We thus have to ask ourselves how we want to react to this disruption. We need to
reflect what privacy is worth to us and what we want to do to protect it. In line with
the rationale provided in this book, I argue that we need privacy in order to fulfill
certain fundamental needs that are important for our psychological well-being (e.g.,
Trepte and Reinecke, 2011a), but also for the flourishing of democratic societies
(e.g., Seubert, 2016). In the most basic terms, it is clear that both individuals and
society have to engage with privacy much more than ever before. We have to talk
about it, engage in a two-sided debate, negotiate the norms and rules related to it,
and try to better understand how privacy serves as a precondition for individual self-
determination. We have to engage in this discussion more deeply and with more
foresight regarding potential technical and cultural developments (Trepte, 2016a,
pp. 167–169). Most importantly, we have to do so in a way that includes everyone
at all levels of society (p. 167).
In my opinion, increasing online privacy literacy is the fundamental requirement
for this outlined process to take place. From my point of view and in line with
the process model of online privacy literacy developed by Masur, Teutsch, Dienlin,
et al. (2017), the purpose of a comprehensively conceptualization of online privacy
literacy is to empower individuals to make their own decisions about what they want
to disclose to other people, providers, and institutions, instead of simply reacting
to the propositions of online services providers. They need to be able to protect
their information and data against horizontal and vertical access or violations in
line with their individual privacy needs. They need to be able to use simple as
well as sophisticated privacy regulation strategies (which includes being able to
choose the communication media that best fit their individual needs, being able
to further manipulate it via provided options and settings, and using particular
software or extensions to implement more complex technical procedures such as
encryption or anonymization), and finally to reflect on the societal status quo
and actively participate in democratic processes, thereby contributing to a socio-
technical environment based on negotiated and democratically accepted values.
However, the development of such a comprehensive form of online privacy
literacy is difficult for several reasons: First and as already discussed in Part II,
communication in networked environments is becoming increasingly multifaceted.
340 13 Overall Conclusion and Outlook
2 As research in this area is scarce, these considerations reflect my personal views, and future
research is needed to substantiate the claims made. For the time being, I advise the interested
reader to take my suggestions as initial thoughts aimed at inspiring individual and societal debates.
13.2 Societal and Practical Implications 341
such as computers and other digital devices), and ensuring that appropriate curricula
are developed. Experts on online privacy and data protection need to be hired,
work as constant consultants, and offer in-service training for teachers. Relatedly,
professional organizations have to be founded to connect researchers, educational
authorities, teachers and parents, offer conferences and workshops, and establish
evaluation instruments in order to constantly improve related efforts.
Third, I encourage software developers and online service providers to think
about how they can provide education and information about online privacy and
data protection when designing products and applications. The results of the present
study suggest that it will be necessary to make external constraints and factors that
influence the perceived level of privacy more salient. As discussed above, one way
would be to implement features or nudges that raise people’s awareness about the
risks or consequences of their online behavior. I would not advocate a departure
from providing people fast and efficient ways of communication. Instead, I believe
that a successful instant messenger is one that allows both privacy protection and
effective communication—not one or the other. On the other hand, Sevignani (2016)
argues that we also need a general de-commodification of privacy: Services need to
be non-commercial rather than rooted in the surveillance-based advertising business
models of current platforms (p. 219). Role models could be platforms such as
the online encyclopedia Wikipedia (Firer-Blaess & Fuchs, 2014) or SNSs such as
Diaspora (Sevignani, 2015), or Ello (2016).
Fourth, I further encourage online service providers whose business models are
based on collecting, analyzing, or selling their users’ information to revisit their
company goals and reflect on how they align with principles such as appropriation,
consent, transparency, external control, and confidentiality (Grimm & Bräunlich,
2015). It is their duty to inform and explain the information flows and uses to their
clients and provide possibilities for users to give consent, or alternatively options
to opt out. I agree with the US Department of Health, Education and Welfare
(1973), which posited that “a record containing information about an individual
in identifiable form must, therefore, be governed by procedures that afford the
individual a right to participate in deciding what the content of the record will
be, and what disclosure and use will be made of the identifiable information in
it” (p. 40). I would also add that it must be the companies’ duty to propagate and
explain these procedures in a simple and digestible form to their clients.
Fifth, I advocate for greater political and financial support of research in this area.
Politicians have to acknowledge the necessity of increasing online privacy literacy
and thus provide the financial and structural means to conduct related research and
implement related educational systems and programs at all levels of society. Many
of the structural transformations outlined in the second point can only be established
with rigorous support from politicians and policymakers.
13.2 Societal and Practical Implications 343
13.3 Conclusion
In this work, I have argued that we must take a situational perspective on privacy
and self-disclosure in order to understand them from a psychological point of view.
To provide a theoretical foundation for this claim, I have advanced the theory of
situational privacy and self-disclosure. Yet, as Solove (2008) noted, “[theories] are
not lifeless pristine abstractions but organic and dynamic beings. They are meant to
live, breathe and grow. Throughout their lifetimes, they will, it is hoped, be tested,
doubted, criticized, amended, supported, and reinterpreted” (p. ix). One day, they
might even be rejected. Nevertheless, a theory—however fallible it may be—may be
useful in addressing particular problems and gaining deeper understanding, which,
in turn, might facilitate the development of newer and more refined theories.
Empirical findings likewise never perfectly reflect the real world. Our statistical
models are based on predictions, and such predictions come with many assumptions
and uncertainties. Accordingly, they must be understood as general patterns, as
small insights into the complex mechanisms of the world, rendering certain events
(in this case a particular form of human behavior) more likely than others.
Nonetheless, collected data can be misleading. As human beings (and certainly
as researchers), we tend to think that we are better at predictions than we really
are. Even worse, we might see patterns where there is just noise. Nonetheless, by
collecting data and running models in order to test our assumptions, we may from
time to time find support for our theories and thus discover certain truths about the
world or about us, which again helps us to progress, to understand, and consequently
to collectively shape a different, hopefully better world.
With these considerations in mind, I believe that the proposed theory of
situational privacy and self-disclosure is a valuable approach for investigating the
complexities of privacy and self-disclosure in varying situations and particularly in
mediated or networked environments. Applied to the context of smartphone-based
communication, the theory has proven to be useful for investigating a variety of
antecedents of both pre-situational preventive privacy regulation behaviors and situ-
ational self-disclosure processes. A novel multi-method approach combining survey,
tracking and experience sampling methods was found to be an ideal approach
towards collecting empirical data to test the assumptions of the theory. Overall, the
findings suggest the following: Vertical privacy concerns and online privacy literacy
are important predictors of both types of preventive privacy regulation behaviors,
yet are less powerful in explaining situational self-disclosure. Instead, particularly
internal personal factors and interpersonal environmental factors were able to
predict the depth of self-disclosure in varying situations. Individuals thus performed
deeper levels of self-disclosure when they felt the need to disclose themselves, prior
interactions necessitated a reaction, the number of recipients was small, and they
perceived them as trustworthy, psychologically close, similar, and central to their
everyday lives. Neither external environmental factors (e.g., level of anonymity),
nor non-situational personal factors (e.g., privacy concerns) were significantly
correlated with depth of self-disclosure. However, interaction analyses showed that
13.3 Conclusion 345
Table A.1 Psychometric properties of the pre-study items measuring depth of self-disclosure
(Bazarova, 2012)
Item M SD Range Skew. Kurt. λ
How would you rate the information that you
have shared with your Facebook friends/this
person? (α = 0.83, ω = 0.84, AVE = 0.57)
Not at all intimate–very intimate 2.20 1.54 1–7 1.10 0.07 0.79
Not at all private–very private 3.12 1.82 1–7 0.46 −0.89 0.87
Not at all personal–very personal 3.51 1.83 1–7 0.21 −1.19 0.67
Not at all confidential–very confidential 2.36 1.59 1–7 0.96 −0.19 0.67
Note: M = Mean, SD = Standard deviation, Skew. = Skewness, Kurt. = Kurtosis, λ = Factor
loadings in the confirmatory factor analysis. All items were measured on a 7-point scale (e.g., in
the case of the first item: 1 = not all private to 7 = very private)
Table A.3 Psychometric properties of the pre-study items measuring need to disclose
Item M SD Range Skew. Kurt.
When I shared the post/message. . .
. . . I had a strong need to disclose something. 2.93 1.37 1–5 −0.13 −1.36
. . . I didn’t have to disclose something (reversed). 3.07 1.36 1–5 0.10 −1.32
. . . I desired to communicate with other people. 2.66 1.35 1–5 0.17 −1.32
. . . I didn’t have necessarily have a desire to say 3.36 1.30 1–5 −0.19 −1.21
something (reversed).
In general, my need to disclose something was. . . 50.60 27.66 1–101 −0.28 −1.14
Note: M = Mean, SD = Standard deviation, Skew. = Skewness, Kurt. = Kurtosis. All items were
measured on a 5-point scale ranging from 1 = strongly disagree to 5 = strongly agree, except for
the last generic item which was measured on a scale ranging from 1 = very low to 7 = very high
Table A.4 Psychometric properties of the pre-study items measuring interpersonal trust
(Larzelere & Huston, 1980)
Item M SD Range Skew. Kurt. λ
Overall scale
(α = 0.96, ω = 0.96, AVE = 0.82)
My Facebook friends/this person are/is 3.54 1.61 1–5 −1.05 0.14
primarily interested in their/his/her own welfare
(reversed).*
There are times when my Facebook friends/this 3.43 1.64 1–5 −0.82 −0.41
person cannot be trusted (reversed).*
My Facebook friends/this person are/is always 3.04 1.52 1–5 −0.60 −0.55 0.94
honest and truthful.
I feel that I can trust my Facebook friends/this 2.91 1.62 1–5 −0.31 −1.01 0.94
person completely.
My Facebook friends/this person keep/keeps 3.09 1.48 1–5 −0.69 −0.16 0.89
their/his/her promises.
I feel that my Facebook friends/this person 3.70 1.57 1–5 −1.23 0.59
do/does not show me enough consideration
(reversed).*
My Facebook friends/this person treat/treats me 3.42 1.52 1–5 −1.02 0.18 0.82
fairly and justly.
I feel that my Facebook friends/this person can 3.21 1.60 1–5 −0.65 −0.64 0.92
be counted on to help me.
Generic item
How much do you trust your Facebook 54.88 37.80 1–101 −0.30 −1.40
friends/this person?
Note: M = Mean, SD = Standard deviation, Skew. = Skewness, Kurt. = Kurtosis, λ = Factor
loadings in the confirmatory factor analysis. All items were measured on a 5-point scale ranging
from 1 = strongly disagree to 5 = strongly agree, except for the generic item which was measured
on a slider ranging from 1 = not at all to 101 = very much
* Removed during factor analysis due to low factor loading resulting from reversed coding
350 A Additional Tables and Figures to Chap. 9
Table A.5 Psychometric properties of the pre-study items measuring relational closeness (Vange-
listi & Caughlin, 1997)
Item M SD Range Skew. Kurt. λ
Factor 1: Psychological closeness
(α = 0.93, ω = 0.93, AVE = 0.77)
I feel close to my Facebook friends/this 2.83 1.62 1–5 −0.20 −1.14 0.85
person.
I like my Facebook friends/this person. 3.71 1.46 1–5 −1.43 1.25 0.86
My Facebook friends’/this person’s opinion 2.96 1.57 1–5 −0.40 −1.00 0.91
is important to me.
My Facebook friends/this person are/is 3.26 1.53 1–5 −0.73 −0.32 0.89
important to me.
Factor 2: Similarity
(α = 0.94, ω = 0.94, AVE = 0.75)
My Facebook friends/this person and I like 2.88 1.36 1–5 −0.52 −0.40 0.89
a lot of the same things.
My Facebook friends/this person and I share 2.77 1.36 1–5 −0.38 −0.52 0.93
a lot of the same attitudes about things.
My Facebook friends/this person and I have 3.04 1.40 1–5 −0.65 −0.25 0.90
very different values (reversed).
My Facebook friends/this person and I are 2.66 1.34 1–5 −0.28 −0.61 0.72
very similar.
My Facebook friends/this person and I have 2.71 1.35 1–5 −0.40 −0.65 0.90
a similar outlook on life.
Factor 3: Everyday centrality
(α = 0.93, ω = 0.93, AVE = 0.82)
I see my Facebook friends/this person very 2.74 1.46 1–5 −0.10 −0.77 0.92
often.
My Facebook friends/this person are/is 2.87 1.51 1–5 −0.21 −0.88 0.92
important in my daily life.
I talk very often with my Facebook 2.92 1.56 1–5 −0.23 −0.93 0.87
friends/this person.
Generic items
How much do you like your Facebook 67.53 31.88 1–101 −1.08 0.09
friends/this person?
How similar are/is your Facebook 45.57 32.18 1–101 −0.22 −1.35
friends/this person to you?
How often are you in contact with your 51.11 35.86 1–101 −0.11 −1.38
Facebook friends/this person?
Note: M = Mean, SD = Standard deviation, Skew. = Skewness, Kurt. = Kurtosis, λ = Factor
loadings in the confirmatory factor analysis. All items were measured on a 5-point scale ranging
from 1 = strongly disagree to 5 = strongly agree, except for the generic items, for which the
answers ranged from 1 to 101 and were formulated as appropriate responses to the respective
questions (e.g., in the case of the first question: 1 = not very much to 101 = very much)
Appendix B
Additional Tables and Figures to
Chap. 10
See Tables B.1, B.2, B.3, B.4, B.5, B.6, B.7, and B.8; Figs. B.1, B.2, and B.3.
Table B.1 Psychometric properties of items measuring smartphone affinity and online privacy
literacy in the pre-survey
Item M SD Range Skew. Kurt. λ
Smartphone affinity (Lee, Karnowski, von Pape, and Cionea, 2016)
(α = 0.85, ω = 0.86, AVE = 0.61)
When I forget my cellphone at 3.49 1.85 1–7 0.22 −1.13 0.76
home, I feel incomplete.
My cellphone is an important part 4.15 1.79 1–7 −0.21 −1.03 0.88
of me.
My cellphone is an extension of 3.95 1.74 1–7 −0.01 −1.00 0.78
me.
I like to use my cellphone. 5.18 1.35 1–7 −0.82 0.56 0.66
Subjective online privacy literacy
(α = 0.91, ω = 0.92, AVE = 0.75)
I am able to understand and 4.68 1.41 1–7 −0.49 −0.27 0.83
evaluate questions about data
protection and privacy on the
Internet.
I feel like I understand the most 4.60 1.43 1–7 −0.49 −0.38 0.91
important things related to data
protection.
I know a lot about data protection 4.32 1.46 1–7 −0.22 −0.62 0.91
and online privacy.
I feel like I know more about 4.11 1.51 1–7 −0.10 −0.53 0.80
data protection and privacy on the
Internet than most other people.
Note: M = Mean, SD = Standard deviation, Skew. = Skewness, Kurt. = Kurtosis, λ = Factor
loadings in the confirmatory factor analysis. All items were measured on a 7-point scale ranging
from 1 = strongly disagree to 7 = strongly agree
Table B.6 Antecedents of using certain privacy settings and strategies on email services: overview
of all regression coefficients
95% CI
b se Lower Upper p β
Research Question 1b
Pseudonymity ← Gregariousness −0.13 0.05 −0.23 −0.02 0.015
End-to-end encryption ← Gregarious- 0.02 0.06 −0.09 0.13 0.729
ness
Research Question 2b
Pseudonymity ← Deliberation −0.01 0.10 −0.20 0.19 0.942
End-to-end encryption ← Deliberation −0.11 0.11 −0.32 0.10 0.299
Research Question 3b
Pseudonymity ← Online priv. lit. 0.04 0.04 −0.04 0.11 0.335
End-to-end encryption ← Online priv. 0.42 0.03 0.35 0.48 <0.001
lit.
Research Question 4b
Pseudonymity ← Vertical priv. conc. 0.06 0.06 −0.05 0.18 0.280
End-to-end encryption ← Vertical priv. 0.08 0.06 −0.04 0.19 0.197
conc.
Research Question 5b
Pseudonymity ← Horizontal priv. conc. −0.03 0.05 −0.12 0.06 0.449
End-to-end encryption ← Horizontal −0.04 0.05 −0.13 0.06 0.476
priv. conc.
Hypotheses 1a and 1b
Vertical priv. conc. ← Online priv. lit. 0.09 0.03 0.04 0.14 0.001 0.10
Horizontal priv. conc. ← Online priv. −0.06 0.03 −0.12 0.00 0.042 −0.06
lit.
Correlations
Vertical priv. conc. ↔ Horizontal priv. 0.73 0.06 0.60 0.85 <0.001 0.58
conc.
Online priv. lit. ↔ Deliberation 0.10 0.02 0.06 0.14 0.001 0.18
Online priv. lit. ↔ Gregariousness −0.02 0.03 −0.08 0.04 0.591 −0.02
Deliberation ↔ Gregariousness −0.09 0.02 −0.12 −0.05 <0.001 −0.21
Note: Whenever the outcome variable is binary, b represents probit coefficients. WLSMV; χ 2 (357)
= 613.42, p < 0.001; CFI = 0.96; TLI = 0.95; RMSEA = 0.02, 90% CI [0.02, 0.03]; WRMR =
1.15, n = 1440
360 B Additional Tables and Figures to Chap. 10
Table B.7 Antecedents of using certain privacy settings and strategies on WhatsApp: overview of
all regression coefficients
95% CI
b se Lower Upper p β
Research Question 1b
Visual anonymity ← Gregariousness −0.25 0.06 −0.37 −0.14 <0.001
Pseudonymity ← Gregariousness 0.00 0.06 −0.12 0.12 0.994
Research Question 2b
Visual anonymity ←Deliberation −0.08 0.11 −0.30 0.14 0.471
Pseudonymity ← Deliberation −0.23 0.11 −0.46 −0.01 0.043
Research Question 3b
Visual anonymity ← Online priv. lit. 0.02 0.04 −0.06 0.10 0.659
Pseudonymity ← Online priv. lit. 0.12 0.04 0.04 0.21 0.004
Research Question 4b
Visual anonymity ← Vertical priv. concerns 0.26 0.06 0.14 0.38 <0.001
Pseudonymity ← Vertical priv. conc. 0.06 0.06 −0.07 0.19 0.353
Research Question 5b
Visual anonymity ← Horizontal priv. conc. −0.12 0.05 −0.22 −0.02 0.017
Pseudonymity ← Horizontal priv. conc. −0.05 0.05 −0.16 0.06 0.350
Hypotheses 1a and 1b
Vertical priv. conc. ← Online priv. lit. 0.03 0.03 −0.04 0.10 0.419 0.03
Horizontal priv. conc. ← Online priv. lit. −0.11 0.04 −0.19 −0.03 0.004 −0.10
Correlations
Vertical priv. conc. ↔ Horizontal priv. 0.69 0.08 0.53 0.85 <0.001 0.58
conc.
Online priv. lit. ↔ Deliberation 0.08 0.02 0.04 0.13 <0.001 0.16
Online priv. lit. ↔ Gregariousness −0.07 0.04 −0.14 0.01 0.088 −0.07
Deliberation ↔ Gregariousness −0.09 0.02 −0.13 −0.04 <0.001 −0.21
Note: Whenever the outcome variable is binary, b represents probit coefficients. WLSMV; χ 2 (357)
= 520.83, p < 0.001; CFI = 0.95; TLI = 0.95; RMSEA = 0.02, 90% CI [0.02, 0.03]; WRMR =
1.00, n = 871
B Additional Tables and Figures to Chap. 10 361
Table B.8 Antecedents of using certain privacy settings and strategies on Facebook: overview of
all regression coefficients
95% CI
b se Lower Upper p β
Research Question 1b
Visual anonymity ← Gregariousness −0.26 0.06 −0.38 −0.14 <0.001
Pseudonymity ← Gregariousness 0.09 0.06 −0.03 0.21 0.124
Using friend lists ← Gregariousness 0.02 0.06 −0.09 0.13 0.723
Limiting access ← Gregariousness 0.12 0.08 −0.04 0.27 0.144
Research Question 2b
Visual anonymity ← Deliberation −0.01 0.11 −0.23 0.20 0.896
Pseudonymity ← Deliberation −0.25 0.11 −0.48 −0.03 0.027
Using friend lists ← Deliberation 0.14 0.11 −0.07 0.36 0.185
Limiting access ← Deliberation 0.10 0.13 −0.14 0.35 0.404
Research Question 3b
Visual anonymity ← Online priv. lit. 0.08 0.04 0.00 0.15 0.054
Pseudonymity ← Online priv. lit. −0.03 0.04 −0.11 0.06 0.543
Using friend lists ← Online priv. lit. −0.08 0.04 −0.15 0.00 0.053
Limiting access ← Online priv. lit. 0.04 0.04 −0.04 0.12 0.328
Research Question 4b
Visual anonymity ← Vertical priv. conc. 0.25 0.06 0.14 0.36 <0.001
Pseudonymity ← Vertical priv. conc. 0.13 0.06 0.02 0.25 0.026
Using friend lists ← Vertical priv. conc. −0.05 0.06 −0.16 0.07 0.434
Limiting access ← Vertical priv. conc. 0.10 0.06 −0.01 0.22 0.084
Research Question 5b
Visual anonymity ← Horizontal priv. −0.01 0.05 −0.10 0.08 0.825
conc.
Pseudonymity ← Horizontal priv. conc. −0.01 0.05 −0.10 0.09 0.898
Using friend lists ← Horizontal priv. 0.06 0.05 −0.03 0.16 0.196
conc.
Limiting access ← Horizontal priv. −0.05 0.06 −0.16 0.06 0.367
conc.
Hypotheses 1a and 1b
Vertical priv. conc. ← Online priv. lit. 0.06 0.03 0.00 0.12 0.068 0.07
Horizontal priv. conc. ← Online priv. −0.10 0.04 −0.18 −0.03 0.007 −0.09
lit.
Correlations
Vertical priv. conc. ↔ Horizontal priv. 0.71 0.08 0.56 0.87 <0.001 0.56
conc.
Online priv. lit. ↔ Deliberation 0.13 0.03 0.08 0.18 <0.001 0.23
Online priv. lit. ↔ Gregariousness −0.01 0.04 −0.08 0.06 0.812 −0.01
Online priv. lit. ↔ Gregariousness −0.08 0.02 −0.13 −0.04 <0.001 −0.20
Note: Whenever the outcome variable is binary, b represents probit coefficients. WLSMV; χ 2 (401)
= 618.38, p < 0.001; CFI = 0.95; TLI = 0.94; RMSEA = 0.02, 90% CI [0.02, 0.03]; WRMR =
1.02, n = 922
362 B Additional Tables and Figures to Chap. 10
.55
Vertical Horizontal
privacy privacy
concerns concerns
1a 1b 2a 2b 2c
.82 .79 .89 .87 .84 .90 .82 .77 .85 .90 .86 .89 .58 .91 .92
Item 01
Item 02
Item 03
Item 04
Item 05
Item 06
Item 07
Item 08
Item 09
Item 10
Item 11
Item 12
Item 13
Item 14
Item 15
Fig. B.1 Confirmatory factor analysis of the online privacy concerns scale. Note: Robust maxi-
mum likelihood estimation: χ 2 (84) = 497.08, p <0.001; CFI = 0.97; TLI = 0.96; RMSEA = 0.06,
90% CI [0.05, 0.06]. Numbers represent standardized factor loadings
10.0
Depth of self−disclosure
7.5 30
5.0 20
Frequency
2.5
10
0.0
0
−6 −4 −2 0 2 4 −0.5 0.0 0.5
Fig. B.2 Random slopes and random effect distribution of the effect of interpersonal assessment
on depth of self-disclosure
B Additional Tables and Figures to Chap. 10 363
40
7.5
Depth of self−Disclosure
30
Frequency
5.0
20
2.5
10
0.0 0
0 1 −1.5 −1.0 −0.5 0.0 0.5 1.0 1.5
Pseudonymity Random effect distribution
Fig. B.3 Random slopes and random effect distribution of the effect of pseudonymity on depth of
self-disclosure
References
Abeele, M. V., Beullens, K., & Roe, K. (2013). Measuring mobile phone use: Gender, age and real
usage level in relation to the accuracy and validity of self-reported mobile phone use. Mobile
Media & Communication, 1(2), 213–236. https://doi.org/10.1177/2050157913477095
Abramova, O., Wagner, A., Krasnova, H., & Buxmann, P. (2017). Understanding self-disclosure on
social networking sites: A literature review. In Proceedings of the 23rd Americas Conference
on Information Systems.
acatech. (2013). Internet privacy: Options for adequate realisation. Heidelberg: Springer.
Acquisti, A. (2009). Nudging privacy: The behavioral economics of personal information. IEEE
Security & Privacy Magazine, 7(6), 82–85. https://doi.org/10.1109/MSP.2009.163
Acquisti, A. (2014). From the economics of privacy to the economics of big data. In J. Lane,
V. Stodden, S. Bender, & H. F. Nissenbaum (Eds.), Privacy, big data, and the public good
(pp. 76–95). Cambridge: University Press.
Acquisti, A., Brandimarte, L., & Loewenstein, G. (2015). Privacy and human behavior in the age
of information. Science, 347(6221), 509–514. https://doi.org/10.1126/science.aaa1465
Acquisti, A., & Gross, R. (2006). Imagined communities: Awareness, information sharing, and
privacy on the Facebook. In G. Danezis & P. Golle (Eds.), Privacy enhancing technologies
(Vol. 4258, pp. 36–58). Lecture notes in computer science. Berlin: Springer. https://doi.org/10.
1007/11957454_3
Acquisti, A., & Grossklags, J. (2004). Privacy attitudes and privacy behavior: Losses, gains, and
hyberbolic discounting. In J. Camp & R. Lewis (Eds.), The economies of information security
(pp. 179–186). New York: Springer.
Acquisti, A., & Grossklags, J. (2005). Privacy and rationality in individual decision making. IEEE
Security and Privacy Magazine, 3(1), 26–33. https://doi.org/10.1109/MSP.2005.22
Acquisti, A., Taylor, C. R., & Wagman, L. (2016). The Economics of privacy. Journal of Economic
Literature, 52(2), 1–64. https://doi.org/10.2139/ssrn.2580411
Afifi, T. A., & Afifi, W. A. (Eds.). (2009). Uncertainty, information management, and disclosure
decisions: Theories and applications. New York: Routledge.
Afifi, T. A., & Steuber, K. (2009). The revelation risk model (RRM): Factors that predict the
revelation of secrets and the strategies used to reveal them. Communication Monographs, 76(2),
144–176. https://doi.org/10.1080/03637750902828412
Aïmeur, E., Lawani, O., & Dalkir, K. (2016). When changing the look of privacy policies affects
user trust: An experimental study. Computers in Human Behavior, 58, 368–379. https://doi.org/
10.1016/j.chb.2015.11.014
Ajzen, I. (1985). From intentions to actions: A theory of planned behavior. In J. Kuhl & J.
Beckmann (Eds.), Action control (pp. 11–39). Berlin: Springer.
Allen, A. L. (1988). Uneasy access: Privacy for woman in a free society. Lanham: Rowman &
Littlefield.
Almuhimedi, H., Schaub, F., Sadeh, N., Adjerid, I., Acquisti, A., Gluck, J., . . . Agarwal, Y. (2015).
Your location has been shared 5398times! A field study on mobile app privacy nudging. In
Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems
(CHI’15) (pp. 787–796). New York, NY: ACM. https://doi.org/10.1145/2702123.2702210
Altman, I. (1974). Privacy: A conceptual analysis. In D. H. Carson (Ed.), Man-environment
interactions (pp. 3–28). Washington, DC: Environmental Design Research Association. https://
doi.org/10.1177/001391657600800108
Altman, I. (1975). The environment and social behavior: Privacy, personal space, territory,
crowding. Monterey: Brooks/Cole.
Altman, I., & Taylor, D. (1973). Social penetration: The development of interpersonal relation-
ships. New York: Holt, Rinehart and Winston.
Amichai-Hamburger, Y., & Vinitzky, G. (2010). Social network use and personality. Computers in
Human Behavior, 26(6), 1289–1295. https://doi.org/10.1016/j.chb.2010.03.018
Amoore, L. (2011). Data derivatives: On the emergence of a security risk calculus for our times.
Theory, Culture & Society, 28, 24–43.
Arendt, H. (1958/1998). The human condition (2nd ed.). Chicago: University of Chicago Press.
Azuma, R. T. (1997). A survey of augmented reality. Presence: Teleoperators and Virtual
Environments, 6(4), 355–385. https://doi.org/10.1162/pres.1997.6.4.355
Babakus, E., Ferguson, C. E., & Joreskog, K. G. (1987). The sensitivity of confirmatory maximum
likelihood factor analysis to violations of measurement scale and distributional assumptions.
Journal of Marketing Research, 24(2), 222. https://doi.org/10.2307/3151512
Baek, Y. M. (2014). Solving the privacy paradox: A counter-argument exper-imental approach.
Computers in Human Behavior, 38, 33–42. https://doi.org/10.1016/j.chb.2014.05.006
Balebako, R., & Cranor, L. (2014). Improving app privacy: Nudging app developers to protect user
privacy. IEEE Security & Privacy, 12(4), 55–58. https://doi.org/10.1109/MSP.2014.70
Banks, J. (2017). Multimodal, multiplex, multispatial: A network model of the self. New Media &
Society, 19(3), 419–438. https://doi.org/10.1177/1461444815606616
Bansal, G. (2017). Distinguishing between privacy and security concerns: An empirical examina-
tion and scale validation. Journal of Computer Information Systems, 57(4), 330–343. https://
doi.org/101080/08874417.2016.1232981
Bansal, G., Zahedi, F. M., & Gefen, D. (2010). The impact of personal dispositions on information
sensitivity, privacy concern and trust in disclosing health information online. Decision Support
Systems, 49(2), 138–150.
Barabási, A.-L. (2003). Linked. How everything is connected to everything else and what it means
for business, science, and everyday life. London: Plume.
Barabási, A.-L. (2011). Introduction and keynote to a networked self. In Z. Papacharissi (Ed.), A
networked self (pp. 1–14). New York: Routledge.
Barnes, S. B. (2006). A privacy paradox: Social networking in the United States. First Monday,
11(9). https://doi.org/10.5210/fm.v11i9.1394
Barrett, B. (2016, December 23). The year encryption won. Wired. Retrieved from https://www.
wired.com/2016/12/year-encryption-won/
Barrett, B. (2017, April 18). In Facebook’s future, you live through your phone. Wired. Retrieved
from https://www.wired.com/2017/04/facebooks-future-live-phone/
Barrett, L. F., & Barrett, D. J. (2001). An introduction to computerized experience sampling
in psychology. Social Science Computer Review, 19(2), 175–185. https://doi.org/10.1177/
089443930101900204
Bartón, K. (2016). Package ‘MuMIn’. Retrieved from https://cran.r-project.org/web/packages/
MuMIn/MuMIn.pdf
Bartsch, M., & Dienlin, T. (2016). Control your Facebook: An analysis of online privacy literacy.
Computers in Human Behavior, 56, 147–154. https://doi.org/10.1016/j.chb.2015.11.022
Baruh, L., & Popescu, M. (2015). Big data analytics and the limits of privacy self-management.
New Media & Society. https://doi.org/10.1177/1461444815614001
References 367
Baruh, L., Secinti, E., & Cemalcilar, Z. (2017). Online privacy concerns and privacy management:
A meta-analytical review. Journal of Communication. https://doi.org/10.1111/jcom.12276
Bates, A. P. (1964). Privacy – A useful concept? Social Forces, 42(4), 429–434. https://doi.org/10.
2307/2574986
Bates, D., Mächler, M., Bolker, B. M., & Walker, S. C. (2015). Fitting linear mixed-effects models
using lme4. Journal of Statistical Software, 67(1), 1–48. https://doi.org/10.18637/jss.v067.i01
Baumann, E., & Link, E. (2016). Onlinebasierte Gesundheitskommunikation: Nutzung und Aus-
tausch von Gesundheitsinformationen über das Internet [Online-based health communication:
Use and exchange of health information on the Internet]. In F. Fischer & A. Kraemer (Eds.),
eHealth in Deutschland [eHealth in Germany] (pp. 385–406). Berlin: Springer.
Baumeister, R. F. (1982). A self-presentational view of social phenomena. Psychological Bulletin,
91(1), 3–26. https://doi.org/10.1037/0033-2909-91.1.3
Baumeister, R. F., & Leary, M. R. (1995). The need to belong: Desire for interpersonal attachments
as a fundamental human motivation. Psychological Bulletin, 117(3), 497–529. https://doi.org/
10.1037/0033-2909.117.3.497
Baumer, E. P., Adams, P., Khovanskaya, V. D., Liao, T. C., Smith, M. E., Schwanda Sosik, V., &
Williams, K. (2013). Limiting, leaving, and (re)lapsing: An exploration of facebook non-use
practices and experiences. In W. E. Mackay, S. Brewster, & S. Bødker (Eds.), Proceedings of
the SIGCHI Conference on Human Factors in Computing Systems (CHI’13) (pp. 3257–3266).
https://doi.org/10.1145/2470654.2466446
Baxter, L. A., & Montgomery, B. M. (1996). Relating: Dialogues and dialectics. The Guilford
communication series. New York: Guilford Press.
Baxter, L. A., & Wilmot, W. W. (1985). Taboo topics in close relationships. Journal of Social and
Personal Relationships, 11, 171–202.
Bayer, J., Ellison, N. B., Schoenebeck, S., Brady, E., & Falk, E. B. (2016). Facebook in context(s):
Measuring emotional responses across time and space. New Media & Society. https://doi.org/
10.1177/1461444816681522
Bazarova, N. N. (2012). Public intimacy: Disclosure interpretation and social judg-
ments on Facebook. Journal of Communication, 62(5), 815–832. https://doi.org/10.1111/j.
14602466201201664.x
Bazarova, N. N., & Choi, Y. H. (2014). Self-Disclosure in social media: Extending the functional
approach to disclosure motivations and characteristics on social network sites. Journal of
Communication, 64(4), 635–657. https://doi.org/10.1111/jcom.12106
Beck, K. (2010). Soziologie der Online-Kommunikation [Sociology of online communication].
In W. Schweiger & K. Beck (Eds.), Handbuch Online-Kommunikation [Handbook of online
communication] (pp. 15–35). Wiesbaden: Springer.
Becker, G. S. (1996). Accounting for tastes. Retrieved from http://search.ebscohost.com/login.
aspx?direct=true&scope=site&db=e00xat&AN=282687
Beer, K. (2016, March 21). Twitter nennt erste Zahlen zur Nutzung in Deutschland [Twitter reveals
first user numbers in Germany]. Heise Online. Retrieved from https://www.heise.de/newsticker/
meldung/Twitter-nennt-erste-Zahlen-zur-Nutzung-in-Deutschland-3145228.html
Bélanger, F., & Crossler, R. E. (2011). Privacy in the digital age: A review of information privacy
research in information systems. MIS Quarterly, 35(4), 1017–1041.
Benhabib, S., & Nicholson, L. (1988). Politische Philosophie und die Frauenfrage [Political
philosophy and the question of women]. In H. Münkler & I. Fetscher (Eds.), Pipers Handbuch
der politischen Ideen [Piper’s hand-book of political ideas]. München: Piper.
Ben-Ze’ev, A. (2003). Privacy, emotional closeness, and openness in cyberspace. Computers in
Human Behavior, 19, 451–467. https://doi.org/10.1016/S0747-5632(02)00078-X
Berg, J. H., & Clark, M. S. (1986). Differences in social exchange between intimate and other
relationships: Gradually evolving or quickly apparent? In V. J. Derlega & B. A. Winstead
(Eds.), Friendship and social interaction (pp. 1101–1128). New York: Springer.
Berlin, I. (1969). Four essays on liberty. Oxford: Oxford University Press.
Bier, W. C. (1980). Privacy, a vanishing value? New York: Fordham University Press.
368 References
Binder, J., Howes, A., & Sutcliffe, A. (2009). The problem of conflicting social spheres: Effects of
network structure on experienced tension in social network sites. In Proceedings of the Twenty-
Seventh Annual SIGCHI Conference on Human Factors in Computing Systems (CHI’09) (pp.
965–974).
Bitkom. (2016). Smartphone-Markt: Konjunktur und Trends. Retrieved from https://www.bitkom.
org/Presse/Anhaenge-an-PIs/2016/Bitkom-Pressekonferenz-Smartphone-Markt-Konjunktur-
und-Trends-16-02-2016-Praesentation-final.pdf
Block, J., & Block, J. H. (1981). Studying situational dimension: A grand perspective and some
limited empiricism. In D. Magnusson (Ed.), Toward a psychology of situations (pp. 85–102).
Hillsdale, NJ: Erlbaum.
Boase, J. (2013). Implications of software-based mobile media for social research. Mobile Media
& Communication, 1(1), 57–62. https://doi.org/10.1177/2050157912459500
Boase, J., & Ling, R. (2013). Measuring mobile phone use: Self-report versus log data. Journal of
Computer-Mediated Communication, 18(4), 508–519. https://doi.org/10.1111/jcc4.12021
Bok, S. (1983). Secrets: On the ethics of concealment and revelation. New York: Vintage Books.
Boudon, R. (2009). Rational choice theory. In B. S. Turner (Ed.), The new Blackwell companion to
social theory (pp. 179–197). Blackwell companions to sociology. Chichester: Wiley-Blackwell.
Bourdieu, P. (1984). Distinction: A social critique of the judgement of taste (trans. Richard Nice).
Routledge classics. Cambridge: Harvard University Press.
Boyd, D. (2008a). Facebook’s privacy trainwreck: Exposure, invasion, and social convergence.
Convergence: The International Journal of Research into New Media Technologies, 14(1),
13–20. https://doi.org/10.1177/1354856507084416
Boyd, D. (2008b). Why youth (heart) social network sites: The role of networked publics in
teenage social life. In D. Buckingham (Ed.), Youth, identity, and digital media (pp. 119–142).
Cambridge, MA: MIT Press.
Boyd, D. (2010a). Risk reduction strategies on Facebook. Retrieved from http://www.zephoria.org/
thoughts/archives/2010/11/08/risk-reduction-strategies-on-facebook.html
Boyd, D. (2010b). Social steganography: Learning to hide in plain sight. Retrieved
from http://www.zephoria.org/thoughts/archives/2010/8/23/social-steganography-learning-to-
hide-in-plain-sight.html
Boyd, D. (2011). Social network sites as networked publics: Affordances, dynamics, and implica-
tions. In Z. Papacharissi (Ed.), A networked self (pp. 39–58). New York: Routledge.
Boyd, D., & Ellison, N. B. (2007). Social network sites: Definition, history, and scholarship.
Journal of Computer-Mediated Communication, 13(1), 210–230. https://doi.org/10.1111/j.
1083-6101-2007.00393.x
Bradburn, N. M., Rips, L., & Shevell, S. (1987). Answering autobiographical questions: The
impact of memory and inference on surveys. Science, 236(4798), 157–161. https://doi.org/10.
1126/science.3563494
Brandimarte, L., Acquisti, A., & Loewenstein, G. (2013). Misplaced confidences: Privacy and the
control paradox. Social Psychological and Personality Science, 4(3), 340–347. https://doi.org/
10.1177/1948550612455931
Brandtzæg, P. B. (2010). Towards a unified media-user typology (MUT): A meta-analysis and
review of the research literature on media-user typologies. Computers in Human Behavior,
26(5), 940–956. https://doi.org/10.1016/j.chb.2010.02.008
Braun, M. (2017). Chatting with bots: Disclosing the Self to Chatbots. University of Hohenheim,
Dissertation in preparation.
Brosius, H.-B., Haas, A., & Koschel, F. (2016). Methoden der empirischen Kommunikations-
forschung: Eine Einführung [Methods of empirical communication science: An introduction].
Wiesbaden: Springer. https://doi.org/10.1007/978-3-531-19996-2
Brown, W. (2004). The subject of privacy. In B. Rössler (Ed.), Privacies (pp. 133–141). Palo Alto,
CA: Stanford University Press.
Brunton, F., & Nissenbaum, H. F. (2015). Obfuscation: A user’s guide for privacy and protest.
Cambridge, MA: MIT Press.
References 369
Buchanan, T., Joinson, A. N., Paine, C., & Reips, U.-D. (2007). Development of measures of
online privacy concern and protection for use on the internet. Journal of the American Society
for Information Science and Technology, 58(2), 157–165. https://doi.org/10.1002/asi.20459
Bucher, H.-J., Erlhofer, S., Kallass, K., & Liebert, W.-A. (2008). Netzwerkkom-munikation und
Internet-Diskurse: Grundlagen eines netzwerkorien-tierten Kommunikationsbegriffs [Network
communication and Internet discourses: Fundamentals of a network-oriented communication
definition]. In A. Zerfaß, M. Welker, & J.-H. Schmidt (Eds.), Kommu-nikation, Partizipation
und Wirkungen im Social Web [Communication, participation and effects on the social web]
(Vol. 2, pp. 41–61). Neue Schriften zur Online-Forschung. Köln: Herbert von Halem.
Buckingham, D. (2008). Introducing identity. In D. Buckingham (Ed.), Youth, identity, and digital
media (pp. 1–24). Cambridge, MA: MIT Press. https://doi.org/10.1162/dmal.9780262524834.
001
Bukatko, D. (2008). Child and adolescent development: A chronological approach. Princeton, NJ:
Recording for the Blind & Dyslexic.
Burgoon, J. K. (1982). Privacy and communication. In M. Burgoon (Ed.), Communication
yearbook (Vol. 6, pp. 206–249). Beverly Hills, CA: Sage.
Burgoon, J. K., Parrott, R., LePoire, B. A., Kelley, D. L., Walther, J. B., & Perry, D. (1989).
Maintaining and restoring privacy through communication in different types of relation-
ships. Journal of Social and Personal Relationships, 6, 131–158. https://doi.org/10.1177/
026540758900600201
Burns, S., & Roberts, L. (2013). Applying the theory of planned behaviour to predicting online
safety behaviour. Crime Prevention and Community Safety, 15(1), 48–64. https://doi.org/10.
1057/cpcs.2012.13
Calo, R. (2014). Digital market manipulation. The George Washington Law Review, 82(4),
995–1051. http://dx.doi.org/10.2139/ssrn.2309703
Campbell, S. W. (2013). Mobile media and communication: A new field, or just a new journal?
Mobile Media & Communication, 1(1), 8–13. https://doi.org/10.1.177/2050157912459495
Carey, R., & Burkell, J. (2009). A heuristics approach to understanding privacy-protecting
behaviors. In I. Kerr, V. M. Steeves, & C. Lucock (Eds.), Lessons from the identity trail
(pp. 65–82). London: Oxford University Press.
Castells, M. (2009). The rise of the network society: The information age. Oxford: Wiley-
Blackwell.
Caughlin, J. P., & Sharabi, L. L. (2013). A communicative interdependence perspective of close
relationships: The connections between mediated and unmediated interactions matter. Journal
of Communication. https://doi.org/10.1111/jcom.12046
Caughlin, J. P., & Vangelisti, A. L. (2009). Why people conceal or reveal secrets: A multiple goals
perspective. In T. A. Afifi & W. A. Afifi (Eds.), Uncertainty, information management, and
disclosure decisions (pp. 279–299). New York: Routledge.
Chambers, D. (2017). Networked intimacy: Algorithmic friendship and scalable sociality. Euro-
pean Journal of Communication, 32(1), 26–36. https://doi.org/10.1177/0267323116682792
Chang, Y.-J., Paruthi, G., & Newman, M. W. (2015). A field study comparing approaches to
collecting annotated activity data in real-world settings. In K. Mase, M. Langheinrich, D.
Gatica-Perez, H. Gellersen, T. Choudhury, & K. Yatani (Eds.), Proceedings of the 2015ACM
International Joint Conference (pp. 671–682). https://doi.org/10.1145/2750858.2807524
Chaudoir, S. R. (2009). HIV/AIDS Disclosure Decision-Making and Outcomes: A Longitudinal,
Event-Based Analysis. Doctoral dissertation, University of Connecticut, Storrs, CT.
Chaudoir, S. R., & Fisher, J. D. (2010). The disclosure processes model: Understanding disclosure
decision making and postdisclosure outcomes among people living with a concealable stigma-
tized identity. Psychological Bulletin, 136(2), 236–256. https://doi.org/10.1037/a0018193
Chellappa, R. K., & Sin, R. G. (2005). Personalization versus privacy: An empirical examination
of the online consumer’s dilemma. Information Technology and Management, 6(2), 181–202.
https://doi.org/101007/s10799-005-5879-y
Chelune, G. J. (1975). Self-Disclosure: An elaboration of its basic dimensions. Psychological
Reports, 36, 79–85. https://doi.org/10.2466/pr0.1975.36.1.79
370 References
Csikszentmihalyi, M., & Larson, R. (1987). Validity and reliability of the experience-sampling
method. The Journal of Nervous and Mental Disease, 175(9), 526–536.
Cui, D. (2016). Beyond “connected presence”: Multimedia mobile instant messaging in close
relationship management. Mobile Media & Communication, 4(1), 19–36. https://doi.org/10.
1177/2050157915583925
Culnan, M. J., & Armstrong, P. K. (1999). Information privacy concerns, procedural fairness, and
impersonal trust: An empirical investigation. Organization Science, 10(1), 104–115. https://doi.
org/10.1287/orsc.10.1.104
Currall, S. C., & Judge, T. A. (1995). Measuring trust between organizational boundary role
persons. Organizational Behavior and Human Decision Processes, 64(2), 151–170. https://
doi.org/10.1006/obhd.1995.1097
Czienskowski, U. (1996). Wissenschaftliche Experimente: Planung, Auswertung, Interpretation
[Scientific experiments: Planning, analysis, interpretation]. Weinheim: Beltz, Psychologie-
Verl.-Union.
Dailey, R. M., & Palomares, N. A. (2004). Strategic topic avoidance: An investigation of topic
avoidance frequency, strategies used, and relational correlates. Communication Monographs,
71(4), 471–496. https://doi.org/10.1080/0363452042000307443
Davis, F. D. (1989). Perceived usefulness, perceived ease of use, and user acceptance of
information technology. MIS Quarterly, 13(3), 319. https://doi.org/10.2307/249008
Dawson, C. P., & Hammitt, W. E. (1996). Dimensions of wilderness pri-vacy for Adirondack Forest
Preserve Hikers. International Journal of Wilderness, 2(1), 37–41.
de Abreu, B. S., & Mihailidis, P. (2014). Media literacy education in action: Theoretical and
pedagogical perspectives. New York: Routledge.
Debatin, B. (2011). Ethics, privacy, and self-restraint in social networking. In S. Trepte & L.
Reinecke (Eds.), Privacy online (pp. 47–60). Berlin: Springer.
Debatin, B., Lovejoy, J. P., Horn, A.-K., & Hughes, B. N. (2009). Facebook and online
privacy: Attitudes, behaviors, and unintended consequences. Journal of Computer-Mediated
Communication, 15(1), 83–108. https://doi.org/10.1111/j.1083-6101.2009.01494.x
DeCew, J. W. (1997). In pursuit of privacy: Law, ethics, and the rise of technology. Ithaca: Cornell
University Press.
Derlega, V. J. (1987). Self-Disclosure: Inside or outside the mainstream of social psychological
research. Journal of Social Behavior and Personality, 3(2), 27–34.
Derlega, V. J., & Chaikin, A. L. (1977). Privacy and self-disclosure in social relationships. Journal
of Social Issues, 33(3), 102–115.
Derlega, V. J., & Grzelak, J. (1979). Appropriateness of self-disclosure. In G. J. Chelune (Ed.),
Self-Disclosure (pp. 151–176). San Francisco: Jossey-Bass.
Derlega, V. J., Metts, S., Petronio, S., & Margulis, S. T. (1993). Self-disclosure. Sage series on
close relationships. Newbury Park: Sage Publications.
Deutsch, M. (1958). Trust and suspicion. Journal of Conflict Resolution, 2(4), 265–279. https://
doi.org/10.1177/002200275800200401
Dienlin, T. (2015). The privacy process model. In S. Garnett, S. Halft, M. Herz, & J.-M. Mönig
(Eds.), Medien und Privatheit [Media and privacy] (pp. 105–122). Passau: Stutz.
Dienlin, T., & Metzger, M. J. (2016). An extended privacy calculus model for SNSs: Analyzing
self-disclosure and self-withdrawal in a representative U.S. sample. Journal of Computer-
Mediated Communication. https://doi.org/10.1111/jcc412163
Dienlin, T., & Metzger, M. J. (2017). “Nothing to hide”: Predicting the desire for privacy.
Manuscript in preparation.
Dienlin, T., & Trepte, S. (2015). Is the privacy paradox a relic of the past? An in-depth analysis
of privacy attitudes and privacy behaviors. European Journal of Social Psychology, 45(3),
285–297. https://doi.org/10.1002/ejsp.2049
Dindia, K. (2000). Sex differences in self-disclosure, reciprocity of self-disclosure, and self-
disclosure and liking: Three meta-analyses re-viewed. In S. Petronio (Ed.), Balancing the
secrets of private disclosures (pp. 21–35). LEA’s communication series. Mahwah, NJ:
Lawrence Erlbaum Associates.
372 References
Dindia, K., & Allen, M. (1995, June). Reciprocity of self-disclosure: A meta-analysis. Paper
presented at the International Network on Personal Relationships conference, Williamsburg,
VA.
Dinev, T., & Hart, P. (2004). Internet privacy concerns and their antecedents – measurement validity
and a regression model. Behaviour & Information Technology, 23(6), 413–422. https://doi.org/
10.1080/01449290410001715723
Dinev, T., & Hart, P. (2006). An extended privacy calculus model for e-commerce transactions.
Information Systems Research, 17(1), 61–80. https://doi.org/10.1287/isre.1060.0080
Do Thi Duc, H. (2017). Data selfie. Retrieved from https://dataselfie.it/#/
Doney, P. M., & Cannon, J. P. (1997). An examination of the nature of trust in buyer-seller
relationships. Journal of Marketing, 61(2), 35. https://doi.org/10.2307/1251829
Doyal, L., & Gough, I. (1991). A theory of human need. Basingstoke: MacMillan.
Duggan, M. (2015). Mobile messaging and social media 2015. Retrieved from http://www.
pewinternet.org/2015/08/19/mobile-messaging-and-social-media-2015/
Dunleavy, K. N., & Dougherty, K. (2013). Marital partners’ perceptions of effective message
repair. Qualitative Research Reports in Communication, 14(1), 44–52. https://doi.org/10.1080/
17459435.2013.835341
Einspänner-Pflock, J. (2016). Privatheit im Netz [Privacy on the Internet]: Konstruktions-
und Gestaltungsstrategien von Online-Privatheit bei Jugendlichen [Configurations of online
privacy among adolescents]. Wiesbaden: Springer.
Ekman, P., & Friesen, W. V. (1969). The repertoire of nonverbal behavior: Categories, origins,
usage and codings. Semiotica, 1(1), 49–97.
Elias, N. (1939/1969). Über den Prozess der Zivilisation [About the process of civilization].
Frankfurt am Main: Suhrkamp.
Ellison, N. B., & Boyd, D. (2013). Sociality through social network sites. In W. H. Dutton (Ed.),
The Oxford handbook of internet studies (pp. 151–172). Oxford handbooks in business and
management. Oxford: Oxford University Press.
Ellison, N. B., Lampe, C., Steinfield, C., & Vitak, J. (2011). With a little help from my friends:
How social network sites affect social capital processes. In Z. Papacharissi (Ed.), A networked
self (pp. 124–145). New York: Routledge.
Ellison, N. B., Steinfield, C., & Lampe, C. (2007). The benefits of Facebook “friends”: Social
capital and college students’ use of online social network sites. Journal of Computer-Mediated
Communication, 12(4), 1143–1168. https://doi.org/10.1111/j.1083-6101.2007.00367.x
Ellison, N. B., & Vitak, J. (2015). Social network sites affordances and their relationship to social
capital processes. In S. S. Sundar (Ed.), The handbook of the psychology of communication
technology (pp. 205–227). Chichester: Wiley.
Ello. (2016). Ello privacy policy. Retrieved from https://ello.co/wtf/policies/privacy-policy/
Elster, J. (1988). The nature and scope of rational-choice explanation. In E. Ullmann-Margalit
(Ed.), Science in reflection (Vol. 110, pp. 51–65). Boston Studies in the Philosophy of Science.
Dordrecht: Springer. https://doi.org/10.1007/978-94-009-2957-9_5
eMarketer. (2015). Mobile messaging to reach 14billion worldwide in 2015. Retrieved from https://
www.emarketer.com/Article/Mobile-Messaging-Reach-14-Billion-Worldwide-2015/1013215
Enders, C. K., & Tofighi, D. (2007). Centering predictor variables in cross-sectional multilevel
models: A new look at an old issue. Psychological Methods, 12(2), 121–138. https://doi.org/
10.1037/1082-989X.12.2.121
European Commission. (2011). Special Eurobarometer 359: Attitudes on data protection and
electronic identity in the European Union. Retrieved from http://ec.europa.eu/public_opinion/
archives/ebs/ebs_359_en.pdf
European Commission. (2015). Special Eurobarometer 431: Data protection. Retrieved from http://
ec.europa.eu/commfrontoffice/publicopinion/archives/ebs/ebs_431_en.pdf
European Parliament and Council of the European Union. (1995). Directive 95/46/EC of the
European Parliament and of the Council of 24 October 1995 on the protection of individuals
with regard to the processing of personal data and on the free movement of such data. Official
References 373
Journal of the European Communities, November 23, L. 281. Retrieved from https://cdt.org/
files/privacy/eudirective/EU_Directive_.html#HD_NM_28
Evans, S. K., Pearce, K. E., Vitak, J., & Treem, J. W. (2016). Explicating affordances: A conceptual
framework for understanding affordances in communication research. Journal of Computer-
Mediated Communication. https://doi.org/10.1111/jcc4.12180
Facebook. (2017). Secret conversations. Retrieved from https://en-gb.facebook.com/help/
messenger-app/1084673321594605/?helpref=hc_fnav
Faraj, S., & Azad, B. (2012). The materiality of technology: An affordance perspective. In P.
M. Leonardi, B. A. Nardi, & J. Kallinikos (Eds.), Materiality and organizing (pp. 237–258).
Oxford, UK: Oxford University Press.
Farber, B. A. (2003). Patient self-disclosure: A review of the research. Journal of Clinical
Psychology, 59(5), 589–600. https://doi.org/101002/jclp.10161
Finney, S. J., & DiStefano, C. (2006). Non-normal and categorical data in structure equation mod-
eling. In G. R. Hancock & R. O. Mueller (Eds.), Structural equation modeling (pp. 269–314).
Quantitative methods in education and the behavioral sciences. Charlotte, NC: Information Age
Pub.
Firer-Blaess, S., & Fuchs, C. (2014). Wikipedia: A info-communist manifesto. Television & New
Media, 15(2), 87–103. https://doi.org/10.1177/1527476412450193
Fishbein, M. (1980). Understanding attitudes and predicting social behavior. Englewood Cliffs,
NJ: Prentice-Hall.
Fishbein, M., & Ajzen, I. (2010). Predicting and changing behavior: The reasoned action
approach. New York: Psychology Press.
Floyd, D. L., Prentice-Dunn, S., & Rogers, R. W. (2000). A meta-analysis of research on protection
motivation theory. Journal of Applied Social Psychology, 30(2), 407–429. https://doi.org/10.
1111/j.1559-1816.2000.tb02323.x
Flynn, K. (2017, April 18). Snapchat explores the power of your phone’s rear-facing
camera. Retrieved from http://mashable.com/2017/04/18/snapchat-new-world-lenses-3d/#
vFiNs2MzqOqi
Fogg, B. J. (2003). Persuasive technology: Using computers to change what we think and do. The
Morgan Kaufman series in interactive technologies. San Francisco, CA: Morgan Kaufmann.
Forgas, J. P. (1976). The perception of social episodes: Categorical and dimensional representations
in two different social milieus. Journal of Personality and Social Psychology, 34(2), 199–209.
https://doi.org/10.1037/0022-3514.34.2.199
Fried, C. (1968). Privacy: A moral analysis. The Yale Law Journal, 77(1), 475–493. https://doi.org/
10.2307/794941
Fried, C. (1990). Privacy: A rational context. In M. D. Ermann, M. B. Williams, & Gutiérrez C. C.
(Eds.), Computers, ethics, and society (pp. 50–63). New York: Oxford University Press.
Gambino, A., Kim, J., Sundar, S. S., Ge, J., & Rosson, M. B. (2016). User disbelief in privacy
paradox: Heuristics that determine disclosure. In J. Kaye, A. Druin, C. Lampe, D. Morris, & J.
P. Hourcade (Eds.), CHI 2016(pp. 2837–2843). New York, NY: The Association for Computing
Machinery. https://doi.org/10.1145/2851581.2892413
Gaver, W. W. (1991). Technology affordances. In S. P. Robertson (Ed.), Proceedings of the SIGCHI
Conference on Human Factors in Computing Systems (pp. 79–84). New York, NY: ACM.
https://doi.org/10.1145/108844.108856
Gavison, R. (1980). Privacy and the limits of law. The Yale Law Journal, 89(3), 421–471.
Gelman, G., & Hill, J. (2009). Data analysis using regression and multilevel/hierarchical models:
Analytical methods for social research (11th ed.). Cambridge: Cambridge University Press.
Geminn, C., & Roßnagel, A. (2015). “Privatheit” und “Privatsphäre” aus der Perspektive des
Rechts – ein Überblick [“Privacy” and the “private sphere” from a legal perspective – an
overview]. JuristenZeitung, 70(14), 703–708.
Geuss, R. (2013). Privatheit: Eine Genealogie [Privacy: A genealogy]. Frankfurt am Main:
Suhrkamp.
Gibson, J. J. (1986). The ecological approach to visual perception. New York: Psychology Press.
374 References
Goffman, E. (1959). The presentation of self in everyday life. New York, NJ: Doubleday Anchor
Books.
Goffman, E. (1963a). Behavior in public places: Notes on the social organization of gatherings.
New York: Free Press of Glencoe.
Goffman, E. (1963b). Stigma: Notes on the management of spoiled identity. Englewood Cliffs, NJ:
Prentice-Hall.
Goggin, G. (2009). Adapting the mobile phone: The iPhone and its consumption. Continuum: Jour-
nal of Media & Cultural Studies, 24(2), 231–244. https://doi.org/10.1080/10304310802710546
Goggin, G. (2012). Google phone rising: The Android and the politics of open source. Continuum:
Journal of Media & Cultural Studies, 26(5), 741–752. https://doi.org/10.1080/10304312.2012.
706462
Goldberg, L. R. (1981). Language and individual differences: The search for universals in
personality lexicons. In L. Wheeler (Ed.), Review of personality and social psychology
(pp. 141–165). Beverly Hills, CA: Sage Publications.
Goldberg, L. R. (1990). An alternative “description of personality”: The big-five factor structure.
Journal of Personality and Social Psychology, 59(6), 1216–1229.
Golson, J. (2016). Apple’s App Store now has 2million apps. Retrieved from http://www.theverge.
com/2016/6/13/11922926/apple-apps-2million-wwdc-2016
Görland, S. (2017). Surveys go mobile: Experience Sampling Method als methodischer Ansatz für
mobile Rezeptionssituationen [Surveys go mobile: Experience sampling method as method-
ological approach to mobile reception situations]. In G. Hooffacker & C. Wolf (Eds.),
Technische Innovationen -Medieninnovationen? (pp. 247–258). Wiesbaden: Springer.
Goulet, L., & Hampton, K. (2012, May). The accuracy of self-reports of social network site use:
Comparing Survey Responses to Server Logs. Paper presented at the 2012 ICA conference,
Phoenix, AZ.
Greasley, A. E., & Lamont, A. (2011). Exploring engagement with music in everyday life using
experience sampling methodology. Musicae Scientiae, 15(1), 45–71. https://doi.org/10.1177/
1029864910393417
Greene, K. (2009). An integrated model of health disclosure decision-making. In T. A. Afifi & W.
A. Afifi (Eds.), Uncertainty, information management, and disclosure decisions (pp. 226–253).
New York: Routledge.
Greene, K., Derlega, V. K., & Mathews, A. (2006). Self-Disclosure in personal relationships. In
A. L. Vangelisti & D. Perlman (Eds.), The Cambridge handbook of personal relationships
(pp. 409–427). New York: Cambridge University Press.
Greenwald, G. (2014). No place to hide: Edward Snowden, the NSA and the surveillance state.
London: Hamish Hamilton.
Grimm, R., & Bräunlich, K. (2015). Vertrauen und Privatheit: Anwendungen des Referenzmodells
für Vertrauen auf die Prinzipien des Datenschutzes [Trust and privacy: Applications of the
reference model for trust on principles of data protection]. Datenschutz und Datensicherheit, 5,
289–294.
Gross, R., & Acquisti, A. (2005). Information revelation and privacy in online social networks.
Gusy, C., Eichenhofer, J., & Schulte, L. (2016). e-privacy: Von der Digitalisierung der Kom-
munikation zur Digitalisierung der Privatsphäre [From digitalization of communication to
digitalization of the private sphere]. In S. Bear, O. Lepsius, C. Schönberger, C. Waldhoff, &
C. Walter (Eds.), Jahrbuch des öffentlichen Rechts der Gegenwart (pp. 386–409). Tübingen:
Mohr Siebeck.
Gutwirth, S., Leenes, R., & de Hert, P. (Eds.). (2015). Reforming European data protection law.
Dordrecht: Springer. https://doi.org/10.1007/978-94-017-9385-8
Gutwirth, S., Leenes, R., & de Hert, P. (Eds.). (2016). Data protection on the move. Law,
Governance and Technology Series. Dordrecht: Springer. https://doi.org/10.1007/978-94-017-
7376-8
Habermas, J. (1962/1990). Strukturwandel der Öffentlichkeit [The structural transformation of the
public sphere]. Frankfurt am Main: Suhrkamp.
References 375
Hair, J. F., Black, W., Babin, B., & Andersen, R. (2010). Multivariate data analysis (7th ed.). Upper
Saddle River, NJ: Pearson Prentice Hall.
Hammitt, W. E. (1982). Cognitive dimensions of wilderness solitude. Environment and Behavior,
14(4), 478–493.
Hammitt, W. E. (2000). The relation between being away and privacy in urban forest recreation
environments. Environment and Behavior, 32(4), 521–540.
Harris, P. B., Brown, B. B., & Ingebritsen, D. (1995). Relocation and privacy regulation: A cross-
cultural analysis. Journal of Environmental Psychology, 15, 311–320.
Harris, P. B., Brown, B. B., & Werner, C. M. (1996). Privacy regulation and place attachment: Pre-
dicting attachments to a student family housing facility. Journal of Environmental Psychology,
16(4), 287–301.
Harter, S. (1999). The construction of the self: Developmental and sociocultural foundations. New
York: The Guilford Press.
Harvey, J. H., & Omarzu, J. (1997). Minding the close relationship. Personality and Social
Psychology Review, 1(1), 223–239. https://doi.org/10.1207/s15327957pspr0103_3
Hasebrink, U., & Schmidt, J.-H. (2013). Medienübergreifende Information-srepertoires
[Transmedia information repertoires]. Media Perspektiven, 1, 2–12. Retrieved from http://
www.ard-werbung.de/download.php?file=fileadmin/user_upload/media-perspektiven/pdf/
2013/012013_Hasebrink_Schmidt.pdf
Hautala, L. (2017, April 18). Facebook Spaces makes virtual reality a social experi-
ence. Retrieved from https://www.cnet.com/news/f8-facebook-spaces-makes-virtual-reality-
a-social-experience/
Heirman, W., Walrave, M., & Ponnet, K. (2013). Predicting adolescents’ disclosure of personal
information in exchange for commercial incentives: An application of an extended theory of
planned behavior. Cyberpsychology, Behavior, and Social Networking, 16(2), 81–87. https://
doi.org/10.10.89/cyber.2012.0041
Hektner, J. M., Schmidt, J. A., & Csikszentmihalyi, M. (2007). Experience sampling method:
Measuring the quality of everyday life. Thousand Oaks, CA: Sage Publications.
Hess, T., & Schreiner, M. (2012). Ökonomie der Privatsphäre [Economy of privacy]. Datenschutz
und Datensicherheit - DuD, 36(2), 105–109. https://doi.org/10.1007/s11623-012-0026-5
Hesse, C., & Rauscher, E. A. (2013). Privacy tendencies and revealing/concealing: The moderating
role of emotional competence. Communication Quarterly, 61(1), 91–112. https://doi.org/10.
1080/01463373.2012.720344
Ho, K., Nistala, A., & Tu, K. (2016). End-to-end encryption for Tinder. Retrieved from https://
courses.csail.mit.edu/6857/2016/files/19.pdf
Hobbes, T. (1651/2011). Leviathan. Washington, DC: Pacific Publishing Studio.
Hodas, N. O., Butner, R., & Corley, C. (2016). How a user’s personality influences content
engagement in social media. In E. Spiro & Y.-Y. Ahn (Eds.), Social informatics (Vol. 10046,
pp. 481–493). Cham: Springer.
Hofmann, W., & Patel, P. V. (2015). SurveySignal: A convenient solution for experience sam-
pling research using participants’ own smartphones. Social Science Computer Review, 33(2),
235–253. https://doi.org/10.1177/0894439314525117
Hofstra, B., Corten, R., & van Tubergen, F. (2016). Understanding the privacy behavior of
adolescents on Facebook: The role of peers, popularity and trust. Computers in Human
Behavior, 60, 611–621. https://doi.org/10.1016/j.chb.2016.02.091
Hogan, B. (2010). The presentation of self in the age of social media: Distinguishing performances
and exhibitions online. Bulletin of Science, Technology & Society, 30(6), 377–386. https://doi.
org/10.1177/0270467610385893
Hollenbaugh, E. E., & Everett, M. K. (2013). The effects of anonymity on self-disclosure
in blogs: An application of the online disinhibition effect. Journal of Computer-Mediated
Communication, 18(3), 283–302. https://doi.org/10.1111/jcc4.12008
Hollenbaugh, E. E., & Ferris, A. L. (2014). Facebook self-disclosure: Examining the role of traits,
social cohesion, and motives. Computers in Human Behavior, 30, 50–58. https://doi.org/10.
1016/j.chb.2013.07.055
376 References
Hollis, M. (1977). Models of man: Philosophical thoughts on social action. Cambridge: Cambridge
University Press.
Honaker, J., & King, G. (2010). What to do about missing values in time-series cross-section data.
American Journal of Political Science, 54(2), 561–581.
Honaker, J., King, G., & Blackwell, M. (2011). Amelia II: A program for missing data. Journal of
Statistical Software, 45(7), 1–47.
Hoofnagle, C. J., King, J., Li, S., & Turow, J. (2010). How different are young adults from older
dults when it comes to information privacy attitudes and policies? SSRN Electronic Journal.
https://doi.org/10.2139/ssrn.1589864
Horvát, E.-Á., Hanselmann, M., Hamprecht, F. A., & Zweig, K. A. (2012). One plus one makes
three (for social networks). PLoS ONE, 7(4). https://doi.org/101371/annotation/c2a07195-
0843-4d98-a220-b1c5b77a7e1a
Hosek, A. M., & Thompson, J. (2009). Communication privacy management and college
instruction: Exploring the rules and boundaries that frame instructor private disclosures.
Communication Education, 58(3), 327–349. https://doi.org/10.1080/03634520902777585
Hotter, M. (2011). Privatsphäre: Der Wandel eines liberalen Rechts im Zeitalter des Internets
[Privacy: The transformation of a liberal right in the age of the internet]. Frankfurt am Main:
Campus.
Hox, J. J. (2010). Multilevel analysis: Techniques and applications (2nd ed.). Quantitative
methodology series. New York: Routledge.
Hoyle, R. H., Harris, M. J., & Judd, C. M. (2008). Research methods in social relations (7th ed.,
[Reprint.]). Fort Worth, TX: Wadsworth.
Hu, L. T., & Bentler, P. M. (1999). Cutoff criteria for fit indexes in covariance structure
analysis: Conventional criteria versus new alternatives. Structural Equation Modeling: A
Multidisciplinary Journal, 6(1), 1–55. https://doi.org/10.1080/10705519909540118
Huston, T. L., & Ashmore, R. D. (1986). Women and men in personal relationships. In R. D. Ash-
more & F. K. DelBoca (Eds.), The social psychology of female-male relations (pp. 167–209).
Orlando: Academic Press.
IDC. (2016). Smartphone OS Market Share, 2016Q3. Retrieved from http://www.idc.com/promo/
smartphone-market-share/os
Instagram. (2016). 600million and counting. Retrieved from https://instagram-press.com/2016/12/
21/600-million-and-counting/
Ito, M., Davidson, C., Jenkins, H., Lee, C., Eisenberg, M., & Weiss, J. (2008). Foreword. In D.
Buckingham (Ed.), Youth, identity, and digital media (pp. vii–ix). Cambridge, MA: MIT Press.
Jenkins, H. (2008). Convergence culture: Where old and new media collide. New York NY: New
York University Press.
Jensen, C., Potts, C., & Jensen, C. (2005). Privacy practices of internet users: Self-reports versus
observed behavior. International Journal of Human-Computer Studies, 63, 203–227.
Jensen, K. B. (2010). Media convergence: The three degrees of network, mass and interpersonal
communication (1st ed.). London: Routledge.
Jensen, K. B., Rothenbuhler, E. W., Pooley, J. D., & Craig, R. T. (Eds.). (2016). The international
encyclopedia of communication theory and philosophy. Hoboken, NJ: Wiley.
Johnson, C. A. (1974). Privacy as personal control. In D. H. Carson (Ed.), Man-environment
interactions (pp. 83–100). Washington, DC: Environmental Design Research Association.
Johnson, P. C. D. (2014). Extension of Nakagawa & Schielzeth’s R2GLMM to random slopes
models. Methods in Ecology and Evolution, 5(9), 944–946. https://doi.org/10.1111/2041-210X.
12225
Joinson, A. N. (2001). Self-Disclosure in computer-mediated communication: The role of self-
awareness and visual anonymity. European Journal of Social Psychology, 31, 177–192.
Joinson, A. N. (2008). ‘Looking at’, ‘looking up’ or ‘keeping up with’ people? Motives and uses
of Facebook. In Proceedings of CHI 2008. New York: ACM.
Joinson, A. N., Houghton, D. J., Vasalou, A., & Marder, B. L. (2011). Digital crowding: Privacy,
self-disclosure, and technology. In S. Trepte & L. Reinecke (Eds.), Privacy online (pp. 33–45).
Berlin: Springer.
References 377
Joinson, A. N., & Paine, C. B. (2007). Self-Disclosure, privacy and the internet. In A. N. Joinson,
McKenna, K. Y. A., T. Postmes, & U.-D. Reips (Eds.), Oxford handbook of Internet psychology
(pp. 237–252). Oxford: Oxford University Press.
Joinson, A. N., Reips, U.-D., Buchanan, T., Schofield, C. B., & Paine, C. (2010). Privacy, trust,
and self-disclosure online. Human-Computer Interaction, 25(1), 1–24. https://doi.org/10.1080/
07370020903586662
Jourard, S. M. (1961a). Religious denomination and self-disclosure. Psychological Bulletin, 8, 446.
Jourard, S. M. (1961b). Self-Disclosure patterns in British and American college females. Journal
of Social Psychology, 59, 315–320.
Jourard, S. M. (1961c). Self-disclosure scores and grades in nursing college. Journal of Applied
Psychology, 45(4), 244–247.
Jourard, S. M. (1971a). Self-Disclosure: An experimental analysis of the transparent self. New
York: Wiley-Interscience.
Jourard, S. M. (1971b). The transparent self. New York: Van Nostrand Reinhold.
Jourard, S. M., & Lasakow, P. (1958). Some factors in self-disclosure. The Journal of Abnormal
and Social Psychology, 56(1), 91–98. https://doi.org/101037/h0043357
Junco, R. (2013). Comparing actual and self-reported measures of Facebook use. Computers in
Human Behavior, 29(3), 626–631. https://doi.org/10.1016/j.chb.2012.11.007
Junglas, I. A., Johnson, N. A., & Spitzmüller, C. (2008). Personality traits and concern for privacy:
An empirical study in the context of location-based services. European Journal of Information
Systems, 17(4), 387–402. https://doi.org/101057/ejis.2008.29
Kant, I. (1785/2015). Grundlegung zur Metaphysik der Sitten [Groundwork of the metaphysics of
morals]. Stuttgart: Reclam.
Kant, I. (1793/1992). Über den Gemeinspruch [On the common saying]. Hamburg: F. Meiner.
Karaboga, M., Masur, P. K., Matzner, T., Mothes, C., Nebel, M., Ochs, C., . . . Fhom, H. S. (2014).
White Paper Selbstdatenschutz [White paper do-it-yourself data protection]. In P. Zoche, R.
Ammicht-Quinn, J. Lamla, A. Roßnagel, S. Trepte, & M. Waidner (Eds.), Forum Privatheit und
selbstbestimmtes Leben in der digitalen Welt (pp. 1–44). Karlsruhe: ISI Fraunhofer. Retrieved
from http://www.forum-privatheit.de/forum-privatheit-de/texte/veroeffentlichungen-des-
forums/themenpapiere-white-paper/Forum_Privatheit_White_Paper_Selbstdatenschutz_2.
Auflage.pdf
Karnowski, V. (2013). Befragung in situ: Die Mobile Experience Sampling Method (MESM) [Sur-
vey in situ: The mobile experience sampling method (MESM)]. In W. Möhring & D. Schlütz
(Eds.), Handbuch standardisierte Erhebungsverfahren in der Kommunikationswissenschaft
(pp. 235–247). Wiesbaden: Springer. https://doi.org/10.1007/978-3-531-18776-1_13
Karnowski, V., & Doedens, S. (2010). Mobile Experience Sampling: Eine Methode zur Unter-
suchung mobilen Mediennutzungsverhaltens [Mobile experience sampling: A method to
investigate mobile media use]. In N. Jackob, T. Zerback, O. Jandura, & M. Maurer (Eds.), Das
Internet als Forschungsinstrument und -gegenstand in der Kommunikationswissenschaft [The
internet as research instrument and subject in communication science] (Vol. 6, pp. 211–226).
Methoden und Forschungslogik der Kommu-nikationswissenschaft. Köln: Herbert von Halem.
Karnowski, V., & von Pape, T. (2009). Mobile TV im Alltag der Nutzer: Ergebnisse einer
dreimonatigen Panelstudie [Mobile TV in the everyday life of the user: Results from a three-
month panel study]. In J. Krone (Ed.), Fernsehen im Wandel (pp. 241–255). Baden-Baden:
Nomos.
Kassebaum, U. B. (2004). Interpersonelles Vertrauen: Entwicklung eines In-ventars zur Erfassung
spezifischer Aspekte des Konstrukts [Interpersonal Trust: Development of a Inventory to
Measure Specific Aspects of the Construct]. Doctoral dissertation, Universität Hamburg,
Germany. Retrieved from http://ediss.sub.uni-hamburg.de/volltexte/2004/2125
Kato, F. (2014). Learning with mobile phones. In G. Goggin & L. Hjorth (Eds.), The Routledge
companion to mobile media (pp. 235–247). New York, NY: Routledge.
Kay, A., & Goldberg, A. (1977). Personal dynamic media. Computer, 10(3), 31–41. https://doi.org/
10.1109/C-M.1977.217672
378 References
Kaya, N., & Weber, M. J. (2003). Cross-cultural differences in the perception of crowding and
privacy regulation: American and Turkish students. Journal of Environmental Psychology,
23(3), 301–309. https://doi.org/10.1016/S0272-4944(02)00087-7
Kelvin, P. (1973). A social-psychological examination of privacy. British Journal of Social and
Clinical Psychology, 12(3), 248–261. https://doi.org/10.1111/j.2044-8260.1973.tb00065.x
Kennedy-Lightsey, C. D., Martin, M. M., Thompson, M., Himes, K. L., & Clingerman, B.
Z. (2012). Communication privacy management theory: Exploring coordination and own-
ership between friends. Communication Quarterly, 60(5), 665–680. https://doi.org/10.1080/
01463373.2012.725004
Kiesler, S., Siegel, J., & McGuire, T. W. (1984). Social psychological aspects of computer-
mediated communication. American Psychologist, 39(10), 1123–1134.
Kim, H.-Y. (2013). Statistical notes for clinical researchers: Assessing normal distribution (2) using
skewness and kurtosis. Restorative Dentistry & Endodontics, 38(1), 52–54. https://doi.org/10.
5395/rde.2013.38.1.52
Kline, R. B. (2016). Principles and practice of structural equation modeling (4th ed.). Methodol-
ogy in the social sciences. New York: The Guilford Press.
Knapp, M. L., & Vangelisti, A. L. (1991). Interpersonal communication and human relationships.
Boston, MA: Allyn & Bacon.
Knobel, M., & Lankshear, C. (Eds.). (2007). A new literacies sampler. New literacies and digital
epistemologies. New York, NY: Peter Lang.
Krämer, N., & Haferkamp, N. (2011). Online self-presentation: Balancing privacy concerns and
impression construction on social networking sites. In S. Trepte & L. Reinecke (Eds.), Privacy
online (pp. 127–142). Berlin: Springer.
Kramer-Duffield, J. (2010). Beliefs and Uses of Tagging Among Undergraduates. Doctoral
dissertation, University of North California, Petaluma, CA. Retrieved from http://bit.ly/97bJQI
Krasnova, H., Spiekermann, S., Koroleva, K., & Hildebrand, T. (2010). Online social networks:
Why we disclose. Journal of Information Technology, 25(2), 109–125. https://doi.org/10.1057/
jit.2010.6
Krasnova, H., Veltri, N. F., & Günther, O. (2012). Self-Disclosure and privacy calculus on social
networking sites: The role of culture. Business & Information Systems Engineering, 4(3), 127–
135. https://doi.org/10.1007/s12599-012-0216-6
Krevelen, D., & Poelman, R. (2010). A survey of augmented reality: Technologies, applications
and limitations. The International Journal of Virtual Reality, 9(2), 1–20.
Krotz, F. (2014). Augmented Reality und informelle Vereinbarungen: Über-legungen zu einer
Theorie des Smartphones [Augmented reality and informal agreements: Considerations for
a smartphone theory]. In T. C. Bächle & C. Thimm (Eds.), Mobile Medien - mobiles Leben
(Vol. 3, pp. 19–40). Bonner Beiträge zur Onlineforschung. Berlin: LIT.
Kubey, R., & Larson, R. (1990). The use and experience of the new video media among children
and young adolescents. Communication Research, 17(1), 107–130. https://doi.org/10.1177/
009365090017001006
Kubey, R., Larson, R., & Csikszentmihalyi, M. (1996). Experience sampling method applications
to communication research questions. Journal of Communication, 46(2), 99–120. https://doi.
org/10.1111/j.14602466.1996.tb01476.x
Kupritz, V. W. (2000a). Privacy management at work: A conceptual model. Journal of Architectural
and Planning Research, 17(1), 47–63.
Kupritz, V. W. (2000b). The role of the physical environment in maximizing opportunities for the
aging workforce. Journal of Industrial Teacher Education, 37(2), 66–88.
Kuznetsova, A., Brockhoff, P. B., & Christensen, R. H. B. (2016). lmerTest - Tests in linear mixed
effects models. Retrieved from https://cran.r-project.org/web/packages/lmerTest/lmerTest.pdf
LaHuis, D. M., Hartman, M. J., Hakoyama, S., & Clark, P. C. (2014). Explained variance measures
for multilevel models. Organizational Research Methods, 17(4), 433–451. https://doi.org/10.
1177/1094428114541701
Lampinen, A. (2016). Why we need to examine multiple social network sites. Communication and
the Public, 1(4), 489–493. https://doi.org/10.1177/2057047316681171
References 379
Lampinen, A., Lehtinen, V., Lehmuskallio, A., & Tamminen, S. (2011). We’re in it together:
Interpersonal management of disclosure in social network services. In D. Tan, G. Fitzpatrick,
C. Gutwin, B. Begole, & W. A. Kellogg (Eds.), The 2011 Annual Conference (p. 3217). https://
doi.org/10.1145/1978942.1979420
Landes, J. B. (Ed.). (1998). Feminism: The public and the private. Oxford readings in feminism.
New York: Oxford University Press.
LaRose, R. (2010). The problem of media habits. Communication Theory, 20(2), 194–222. https://
doi.org/10.1111/j.1468-2885.2010.01360.x
Larson, R. (1977). The significance of solitude in adolescents’ life. Chicago: University of Chicago
Press.
Larson, R., & Csikszentmihalyi, M. (2014). The experience sampling method. In M. Csikszentmi-
halyi (Ed.), Flow and the foundations of positive psychology: The collected works of Mihaly
Csikszentmihalyi (pp. 21–34). Dordrecht: Springer.
Larzelere, R. E., & Huston, T. L. (1980). The dyadic trust scale: Toward understanding interper-
sonal trust in close relationships. Journal of Marriage and the Family, 42(3), 595. https://doi.
org/10.2307/351903
Laucken, U. (2000). Sozialkonstruktivismus und die semantische Wissenschaft vom Menschen
[Social constructivism and the semantic science of human beings]. Handlung Kultur Interpre-
tation, 9, 37–65.
Laufer, R. S., Proshansky, H. M., & Wolfe, M. (1973). Some analytic dimensions of privacy. Paper
presented at the meeting of the Third International Architectural Psychology Conference, Lund,
Sweden.
Laufer, R. S., & Wolfe, M. (1977). Privacy as a concept and social issue: A multidimensional
developmental theory. Journal of Social Issues, 33(3), 22–42.
Laurenceau, J. P., Barrett, L. F., & Pietromonaco, P. R. (1998). Intimacy as an interpersonal process:
The importance of self-disclosure, partner disclosure, and perceived partner responsiveness in
interpersonal exchanges. Journal of Personality and Social Psychology, 74(5), 1238–1251.
Lea, M. (Ed.). (1992). Contexts in computer-mediated communication. London: Harvester Wheat-
sheaf.
Lee, F. L. F., Leung, L., Qiu, J. L., & Chu, D. S. C. (Eds.). (2012). Frontiers in new media research.
New York: Routledge Taylor & Francis.
Lee, R. M., & Renzetti, C. M. (2016). The problems of researching sensitive topics. American
Behavioral Scientist, 33(5), 510–528. https://doi.org/10.1177/0002764290033005002
Lee, S. K., Karnowski, V., von Pape, T., & Cionea, I. A. (2016). An English scale for measuring
mobile phone appropriation: Translation and assessment. Studies in Communication and
Media, 5(4), 397–426. https://doi.org/10.5771/2192-4007-2016-4-397
Leenes, R., Gutwirth, S., & de Hert, P. (2017). Data protection and privacy: (In)visibilities and
infrastructures. Law, Governance and Technology Series. Dordrecht: Springer.
Leiner, D. J. (2012). SoSci Panel: The noncommercial online access panel. Retrieved from https://
www.soscisurvey.de/panel/download/SoSciPanel.GOR2012.pdf
Leiner, D. J. (2016). Our research’s breadth lives on convenience samples. A case study of the
online respondent pool “SoSci Panel”. Studies in Communication and Media, 5(4), 367–396.
https://doi.org/10.5771/2192-4007-2016-4-36769--134
Lemay, D. J., Doleck, T., & Bazelais, P. (2017). “Passion and concern for privacy” as factors
affecting Snapchat use: A situated perspective on technology acceptance. Computers in Human
Behavior. https://doi.org/10.1016/j.chb.2017.05.022
Leonardi, P. M. (2013). Theoretical foundations for the study of sociomateriality. Information and
Organization, 23(2), 59–76. https://doi.org/10.1016/j.infoandorg.2013.02.002
Leonardi, P. M., & Barley, S. R. (2008). Materiality and change: Challenges to building better
theory about technology and organizing. Information and Organization, 18(3), 159–176.
https://doi.org/10.1016/j.infoandorg.2008.03.001
Levinger, G. (1983). Development and change. In H. H. Kelley, E. Berscheid, A. Christensen, R.
L. Harvey, T. L. Huston, G. Levinger, E. McClintock, L. A. Peplau, & D. R. Peterson (Eds.),
380 References
Close relationships (pp. 315–359). Foundations of psychology. Clinton Corners, NY: Percheron
Press.
Lewin, K. (1951). Field theory in social science: Selected theoretical papers. New York: Harper &
Brothers.
Lewin, K. (2012). Feldtheorie in den Sozialwissenschaften: Ausgewählte theoretische Schriften (2.
Aufl.). Bern: Huber. Retrieved from http://subhh.ciando.com/book/?bok_id=471896
Li, Y. (2011). Empirical studies on online information privacy concerns: Literature review and an
integrative framework. Communications of the Association for Information Systems, 28(28),
453–496.
Li, Y. (2012). Theories in online information privacy research: A critical review and an integrated
framework. Decision Support Systems, 54(1), 471–481. https://doi.org/101016/j.dss.2012.06.
010
Licoppe. (2003). Two modes of maintaining interpersonal relations through telephone: From the
domestic to the mobile phone. In J. E. Katz (Ed.), Machines that become us (pp. 171–186).
New Brunswick, NJ: Transaction Publishers.
Ling, R., & Donner, J. (2013). Mobile communication. Hoboken: Wiley. Retrieved from http://gbv.
eblib.com/patron/FullRecord.aspx?p=1295230
Litt, E. (2012). Knock, knock. Who’s there? The imagined audience. Journal of Broadcasting &
Electronic Media, 56(3), 330–345. https://doi.org/10.1080/08838151.2012.705195
Litt, E. (2013). Understanding social network site users’ privacy tool use. Computers in Human
Behavior, 29(4), 1649–1656. https://doi.org/10.1016/j.chb.2013.01.049
Livingstone, S. (2005). Audiences and publics: When cultural engagement matters for the public
sphere. New York, NY: Intellect.
Locke, J. (1689/2005). A letter concerning toleration. Stillwell, KS: Digireads.com Publishing.
Loiselle, C. G., & Dawson, C. (1988). Toronto alexithymia scale: Relationships with measures
of patient self-disclosure and private self-consciousness. Psychotherapy and Psychosomatics,
50(2), 109–116. https://doi.org/10.1159/000288108
Lu, Y., Tan, B. C. Y., & Hui, K.-L. (2004). Inducing customers to disclose personal information
to internet businesses with social adjustment benefits. In Proceedings of the 25th International
Conference on Information Systems (pp. 272–281).
Lutz, C., & Ranzini, G. (2017). Where dating meets data: Investigating social and institutional
privacy concerns on tinder. Social Media + Society, 3(1), 205630511769773. https://doi.org/10.
1177/2056305117697735
Lyon, D. (2014). Surveillance, Snowden, and big data: Capacities, conse-quences, critique. Big
Data & Society, 1(2). https://doi.org/10.1177/2053951714541861
Madden, M., & Rainie, L. (2015). Americans’ attitudes about privacy, security and surveillance.
Retrieved from http://www.pewinternet.org/files/2015/05/Privacy-and-Security-Attitudes-5.19.
15_FINAL.pdf
Madianou, M. (2014). Smartphones as polymedia. Journal of Computer-Mediated Communica-
tion, 19(3), 667–680. https://doi.org/10.1111/jcc412069
Magnusson, D. (1981a). Problems in environmental analyses – An introduction. In D. Magnusson
(Ed.), Toward a psychology of situations (pp. 3–7). Hillsdale, NJ: Erlbaum.
Magnusson, D. (Ed.). (1981b). Toward a psychology of situations: An international perspective.
Hillsdale, NJ: Erlbaum.
Mai, J.-E. (2016). Big data privacy: The datafication of personal information. The Information
Society, 32(3), 192–199. https://doi.org/10.1080/01972243.2016.1153.010
Malhotra, N. K., Kim, S. S., & Agarwal, J. (2004). Internet users’ information privacy concerns
(IUIPC): The construct, the scale, and a causal model. Information Systems Research, 15(4),
336–355. https://doi.org/10.1287/isre.1040.0032
Mardia, K. V. (2016). Tests of univariate and multivariate normality. In V. N. Gudivada, V. V.
Raghavan, V. Govindaraju, & C. R. Rao (Eds.), Cognitive computing: Theory and applications
(Vol. 35, pp. 279–320). Handbook of statistics. Amsterdam: Elsevier.
Margulis, S. T. (Ed.). (1974). Privacy. Stony Brook, NW: Environmental Design Research
Association.
References 381
Margulis, S. T. (1977). Conceptions of privacy: Current status and next steps. Journal of Social
Issues, 33(3), 5–21.
Margulis, S. T. (2003). On the status and contribution of Westin’s and Altman’s theories of privacy.
Journal of Social Issues, 59(2), 411–429. https://doi.org/10.1111/1540-4560.00071
Margulis, S. T. (2011). Three theories of privacy: An overview. In S. Trepte & L. Reinecke (Eds.),
Privacy online (pp. 9–17). Berlin: Springer.
Marsh, H. W., Hau, K. T., & Wen. Z. (2004). In search of golden rules: Comment on hypothesis
testing approaches to setting cutoff values for fit indexes and dangers in overgeneralizing Hu
and Bentler’s (1999) findings. Structural Equation Modeling: A Multidisciplinary Journal,
11(3), 320–341.
Marshall, N. J. (1974). Dimensions of privacy preferences. Multivariate Behavioral Research, 9(3),
255–271. https://doi.org/10.1207/s15327906mbr0903_1
Marthews, A., & Tucker, C. E. (2015). Government surveillance and Internet search behavior.
SSRN Electronic Journal. https://doi.org/10.2139/ssrn.2412564
Marvin, C. (1999). When old technologies were new: Implementing the future. In H. Mackay & T.
O’Sullivan (Eds.), The media reader: Continuity and transformation (pp. 58–72). New York,
NY: Sage Publications.
Marwick, A. E., & Boyd, D. (2010). I tweet honestly, I tweet passionately: Twitter users, context
collapse, and the imagined audience. New Media & Society, 13(1), 114–133. https://doi.org/10.
1177/1461444810365313
Marwick, A. E., & Boyd, D. (2014). Networked privacy: How teenagers negotiate context in social
media. New Media & Society, 16(7), 1051–1067. https://doi.org/10.1177/1461444814543995
Mascheroni, G., & Vincent, J. (2016). Perpetual contact as a communicative affordance: Opportu-
nities, constraints, and emotions. Mobile Media & Communication, 4(3), 310–326. https://doi.
org/10.1177/2050157916639347
Masur, P. K., & Scharkow, M. (2016). Disclosure management on social network sites: Individual
privacy perceptions and user-directed privacy strategies. Social Media + Society, 2(1). https://
doi.org/10.1177/2056305116634368
Masur, P. K., Teutsch, D., & Dienlin, T. (2018). Privatheit in der Online-Kommunikation
[Privacy in online communication]. In W. Schweiger & K. Beck (Eds.), Handbuch Online-
Kommunikation. Wiesbaden: Springer.
Masur, P. K., Teutsch, D., Dienlin, T., & Trepte, S. (2017). Online-Privatheitskompetenz und deren
Bedeutung für demokratische Gesellschaften [Online privacy literacy and its importance for
democratic societies]. Forschungsjournal Soziale Bewegungen, 30(2), 180–189.
Masur, P. K., Teutsch, D., & Trepte, S. (2017). Entwicklung und Validierung der Online-
Privatheitskompetenzskala (OPLIS) [Development and validation of the online privacy literacy
scale (OPLIS)]. Diagnostia, 63, 256–268. https://doi.org/10.1026/0012-1924/a000179
Masur, P. K., Trepte, S., & Wolfers, L. N. (2018, May). Mehr als Bewusstsein für Privatheit-
srisiken: Eine prozessorientierte Rekonzeptualisierung der Online-Privatheitskompetenz [More
than privacy risks awareness: A process-orientated reconceptualization of online privacy
literacy]. Paper presented at the 63rd annual conference of the German Association of Com-
munication Science (Deutsche Gesellschaft für Publizistik und Kommunikationswissenschaft;
DGPuK), Mannheim (Germany).
Matzner, T. (2014). Why privacy is not enough privacy in the context of “ubiquitous computing”
and “big data”. Journal of Information, Communication and Ethics in Society, 12(2), 93–106.
https://doi.org/10.1108/JICES-08-2013-0030
Matzner, T., Masur, P. K., Ochs, C., & von Pape, T. (2016). Do-it-yourself data protection -
Empowerment or burden? In S. Gutwirth, R. Leenes, & P. de Hert (Eds.), Data protection on
the move (pp. 277–305). Law, governance and technology series. Dordrecht: Springer. https://
doi.org/10.1007/978-94-017-7376-8_11
Mayer, R. C., & Davis, J. H. (1999). The effect of the performance appraisal system on trust for
management: A field quasi-experiment. Journal of Applied Psychology, 84(1), 123–136. https://
doi.org/10.1037/0021-9010.84.1.123
382 References
McDonald, R. P. (1999). Test theory: A unified treatment. Mahwah, NJ: Lawrence Erlbaum Asso-
ciates. Retrieved from http://site.ebrary.com/lib/alltitles/docDetail.action?docID=10333567
McKenna, K., & Bargh, J. A. (2000). Plan 9 from cyberspace: The implications of the internet for
personality and social psychology. Personality and Social Psychology Review, 4(1), 57–75.
McKenzie, C. R. M., Liersch, M. J., & Finkelstein, S. R. (2006). Recommendations implicit in
policy defaults. Psychological Science, 17(5), 414–420. https://doi.org/10.1111/j.1467-9280.
2006.01721.x
Metts, S. (1989). An exploratory investigation of deception in close relationships. Journal of Social
and Personal Relationships, 6, 159–179. https://doi.org/10.1177/026540758900600202
Metzger, M. J. (2004). Privacy, trust, and disclosure: Exploring barriers to electronic commerce.
Journal of Computer-Mediated Communication, 9(4). Retrieved from http://jcmc.indiana.edu/
vol9/issue4/metzger.html
Metzger, M. J. (2006). Effects of site, vendor, and consumer characteristics on website
trust and disclosure. Communication Research, 33(3), 155–179. https://doi.org/10.1177/
0093650206287076
Metzger, M. J. (2016, December). I’m ok but you’re not: The role of cognitive heuristics in privacy
decision-making. Talk given at the University of Hohenheim, Stuttgart, Germany.
Metzger, M. J., & Suh, J. J. (2017). Comparative optimism about privacy risks on Facebook.
Journal of Communication, 67(2), 203–232. https://doi.org/10.1111/jcom.12290
Meyrowitz, J. (1985). No sense of place: The impact of electronic media on social behavior. New
York: Oxford University Press.
Mill, J. S. (1859/2015). On liberty. Middletown, DE: CreateSpace.
Miller, A. R. (1971). The assault on privacy: Computers, data banks, and dossiers. Ann Arbor:
University of Michigan Press.
Miller, D., Costa, E., Haynes, N., McDonald, T., Nicolescu, R., Sinanan, J., . . . Wang, X. (2016).
How the world changed social media. London: UCL Press.
Miller, J. (2014). The fourth screen: Mediatization and the smartphone. Mobile Media &
Communication, 2(2), 209–226. https://doi.org/10.1177/2050157914521412
Miller, L. C., Berg, J. H., & Archer, R. L. (1983). Openers: Individuals who elicit intimate self-
disclosure. Journal of Personality and Social Psychology, 44(6), 1234–1244. https://doi.org/10.
1037/0022-3514.44.6.1234
Miller, L. C., & Read, S. J. (1987). Why am I telling you this? Self-Disclosure in a goal-based
model of personality. In V. J. Derlega & Berg J. (Eds.), Self-Disclosure (pp. 35–58). New York,
NY: Plenum.
Miller, S. (2001). Social action: A teleological account. Cambridge: Cambridge University Press.
Millham, M. H., & Atkin, D. (2016). Managing the virtual boundaries: Online social networks,
disclosure, and privacy behaviors. New Media & Society, 20(1), 50–67. https://doi.org/10.1177/
1461444816654465
Milne, G. R., & Rohm, A. J. (2000). Consumer privacy and pame removal across direct marketing
channels: Exploring opt-in and opt-out alternatives. Journal of Public Policy & Marketing,
19(2), 238–249. https://doi.org/10.1509/jppm.19.2.238.17136
Moll, R., Lücke, A. J., & Bromme, R. (2016, September). Wie viel sind “viele Leute” auf
Facebook? Die Interpretation von Quantifiern bei der Nutzung von sozialen Netzwerkseiten
[How many are “many people” on Facebook? The interpretaiton of quantifiers on social
network sites]. Presentation at the annual conference of the German Psychological Association,
Leipzig.
Moore, B. (1984). Privacy: Studies in social and cultural history. New York: Pantheon Books.
Morrison, B. (2012). Do we know what we think we know? An exploration of online social network
users’ privacy literacy. In Proceedings of the 42nd Atlantic Schools of Business Conference
(pp. 419–438). Halifax, NS: Dalhousie University.
movisens GmbH. (2017). movisensXS. Experience sampling for android. Retrieved from https://
xs.movisens.com/
References 383
Muthén, B. O. (1993). Goodness of fit with categorical and other non-normal variables. In K. A.
Bollen & J. S. Long (Eds.), Testing structural equation models (pp. 205–243). Newbury Park,
CA: Sage Publications.
Muthén, B. O. (1998–2004). Mplus technical appendices. Los Angeles, CA: Muthén & Muthén.
Retrieved from https://www.statmodel.com/download/techappen.pdf
Nakagawa, S., Schielzeth, H., & O’Hara, R. B. (2013). A general and simple method for obtaining
R2 from generalized linear mixed-effects models. Methods in Ecology and Evolution, 4(2),
133–142. https://doi.org/10.1111/j.2041-210x.2012.00261.x
Nathanson, A. I. (1999). Identifying and explaining the relationship between parental mediation
and children’s aggression. Communication Research, 26(2), 124–143. https://doi.org/10.1177/
009365099026002002
Nathanson, A. I. (2001). Parent and child perspectives on the presence and meaning of parental
television mediation. Journal of Broadcasting & Electronic Media, 45(2), 201–220. https://doi.
org/101207/s15506878jobem4502_1
Nathanson, A. I. (2002). The unintended effects of parental mediation of television on adolescents.
Media Psychology, 4(3), 207–230. https://doi.org/101207/S1532785XMEP0403_01
Nathanson, A. I., & Cantor, J. (2010). Reducing the aggression-promoting effect of violent
cartoons by increasing children’s fictional involvement with the victim: A study of active
mediation. Journal of Broadcasting & Electronic Media, 44(1), 125–142. https://doi.org/
101207/s15506878jobem4401_9
Negroponte, N. (1996). Being digital. New York, NY: Vintage Books.
Nell, E. J., & Errouaki, K. (2013). Rational econometric man: Transforming structural economet-
rics. Cheltenham: Elgar.
Newell, P. B. (1995). Perspectives on privacy. Journal of Environmental Psychology, 15, 87–104.
Niemann, J. (2016). Risiken und Nutzen der Kommunikation auf Social Networking Sites: The-
oretische Modellierung und empirische Befunde auf Basis der “Theory of Reasoned Action”
[Risks and uses of communicating on social network sites: Theoretical modelling and empirical
results on the basis of the “theory of reasoned action”]. Köln: Herbert von Halem.
Nippert-Eng, C. E. (2010). Islands of privacy. Chicago, IL: University of Chicago Press.
Nisbett, R. E., & Ross, L. (1980). Human inference: Strategies and shortcomings of social
judgment. Englewood Cliffs, NJ: Prentice-Hall, Inc.
Nissenbaum, H. F. (2010). Privacy in context: Technology, policy, and the integrity of social life.
Stanford: Stanford Law Books.
Norberg, P. A., Horne, D. R., & Horne, D. A. (2007). The privacy paradox: Personal information
disclosure intentions versus behaviors. Journal of Consumer Affairs, 41(1), 100–126. https://
doi.org/10.1111/j.1745-6606.2006.00070.x
Norman, D. A. (1990). The design of everyday things. New York: Doubleday.
Oakes, G. (2003). Max Weber on value rationality and value spheres: Critical remarks. Journal of
Classical Sociology, 3(1), 27–45.
Olson, F. (1991). A finger to the devil: Abortion, privacy and equality. Dissent, Summer 1991.
Retrieved from https://www.dissentmagazine.org/article/a-finger-to-the-devil
Omarzu, J. (2000). A disclosure decision model: Determining how and when individuals will self-
disclose. Personality and Social Psychology Review, 4(2), 174–185. https://doi.org/101207/
S15327957PSPR0402_05
Oolo, E., & Siibak, A. (2013). Performing for one’s imagined audience: Social steganography and
other privacy strategies of Estonian teens on networked publics. Cyberpsychology: Journal of
Psychosocial Research on Cyberspace, 7(1). https://doi.org/105817/CP2013-1-7
Orlikowski, W. J. (2000). Using technology and constituting structures: A practices lens
for studying technology in organizations. Organization Science, 11(4). Retrieved from
http://www.jstor.org/stable/2640412
Oulasvirta, A., Pihlajamaa, A., Perkiö, J., Ray, D., Vähäkangas, T., Hasu, T., . . . Myllymäki,
P. (2012). Long-term effects of ubiquitous surveillance in the home. In A. K. Dey (Ed.),
Proceedings of the 2012ACM Conference on Ubiquitous Computing (pp. 41–50). New York,
NY: ACM. https://doi.org/10.1145/2370216.2370224
384 References
Padyab, A., Päivärinta, T., Ståhlbröst, A., & Bergvall-Kåreborn, B. (2016). Facebook user attitudes
towards secondary use of personal information. In Thirty Seventh International Conference on
Information Systems.
Páez, D., Velasco, C., & González, J. L. (1999). Expressive writing and the role of alexythimia as
a dispositional deficit in self-disclosure and psychological health. Journal of Personality and
Social Psychology, 77(3), 630–641.
Papacharissi, Z. (2010). A private sphere: Democracy in a digital age. Digital media and society.
Cambridge: Polity Press.
Papacharissi, Z. (Ed.). (2011a). A networked self: Identity, community and culture on social
network sites. New York: Routledge.
Papacharissi, Z. (2011b). Conclusion: A networked self. In Z. Papacharissi (Ed.), A networked self
(pp. 304–318). New York: Routledge.
Papacharissi, Z. (2012). A networked self: Identity performance and sociability on social network
sites. In F. L. F. Lee, L. Leung, J. L. Qiu, & D. S. C. Chu (Eds.), Frontiers in new media research
(pp. 207–221). New York: Routledge Taylor & Francis.
Papacharissi, Z., & Gibson, P. L. (2011). Fifteen minutes of privacy: Privacy, sociality, and
publicity on social network sites. In S. Trepte & L. Reinecke (Eds.), Privacy online (pp. 75–90).
Berlin: Springer.
Parent, W. A. (1983). Privacy, morality, and the law. Philosophy & Public Affairs, 12(4), 269–288.
Park, Y. J. (2013). Digital literacy and privacy behavior online. Communication Research, 40(2),
215–236. https://doi.org/101177/0093650211418338
Park, Y. J., & Mo Jang, S. (2014). Understanding privacy knowledge and skill in mobile
communication. Computers in Human Behavior, 38, 296–303. https://doi.org/10.1016/j.chb.
2014.05.041
Parks, M. R. (1982). Ideology in interpersonal communication: Off the couch and into the world.
Communication Yearbook, 5, 79–107. https://doi.org/10.1080/23808985.1981.11923840
Parks, M. R., & Floyd, K. (1996). Making friends in cyberspace. Journal of Communication, 46(1),
80–97. https://doi.org/10.1111/j.1460-2466.1996.tb01462.x
Pastalan, L. A., & Carson, D. H. (Eds.). (1970). Spatial behavior of older people. Ann Arbor:
University of Michigan Press.
Pateman, C. (1989). Feminist critiques of the public/private dichotomy. In C. Pateman (Ed.), The
disorder of women (pp. 155–160). Stanford: Stanford University Press.
Pearce, W. B., & Sharp, S. M. (1973). Self-disclosing communication. Journal of Communication,
23(4), 409–425. https://doi.org/10.1111/j.1460-2466.1973.tb00958.x
Peddinti, S. T., Ross, K. W., & Cappos, J. (2014). “On the internet, nobody knows you’re a dog”:
A case study on anonymity in social networks. In A. Sala, A. Goel, & K. Gummadi (Eds.),
COSN’14(pp. 83–94). New York, NY: Association for Computing Machinery. https://doi.org/
10.1145/2660460.2660467
Pedersen, D. M. (1979). Dimensions of privacy. Perceptual and Motor Skills, 48, 1291–1297.
https://doi.org/10.2466/pms.1979.48.3c.1291
Pedersen, D. M. (1997). Psychological functions of privacy. Journal of Environmental Psychology,
17, 147–156. https://doi.org/10.1006/jevp.1997.0049
Pedersen, D. M. (1999). Model for types of privacy by privacy functions. Journal of Environmental
Psychology, 19(4), 397–405. https://doi.org/10.1006/jevp.1999.0140
Pedersen, D. M., & Breglio, V. J. (1968). Personality correlates of actual self-disclosure.
Psychological Reports, 22, 495–501. https://doi.org/10.2466/pr0.1968.22.2.495
Pennebaker, J. W. (1990). Opening up: The healing power of confiding in others (1st ed.). New
York: W. Morrow.
Pennebaker, J. W., & O’Heeron, R. C. (1984). Confiding in others and illness rate among spouses of
suicide and accidental-death victims. Journal of Abnormal Psychology, 93(4), 473–476. https://
doi.org/10.1037/0021-843X.93.4.473
Peter, J., & Valkenburg, P. M. (2011). Adolescents’ online privacy: Toward a developmental
perspective. In S. Trepte & L. Reinecke (Eds.), Privacy online (pp. 221–234). Berlin: Springer.
References 385
Reis, H. T. (2008). Reinvigorating the concept of situation in social psychology. Personality and
Social Psychology Review, 12(4), 311–329. https://doi.org/10.1177/1088868308321721
Revelle, W., & Zinbarg, R. E. (2009). Coefficients alpha, beta, omega, and the glb: Comments on
Sijtsma. Psychometrika, 74(1), 145–154. https://doi.org/10.1007/S11336-008-9102-Z
Roesner, F., Kohno, T., & Molnar, D. (2014). Security and privacy for augmented reality systems.
Communications of the ACM, 57(4), 88–96. https://doi.org/10.1145/2580723.2580730
Rogers, E. M. (1962). Diffusion of innovations. New York: Free Press.
Rogers, E. M. (2003). Diffusion of innovations (5th ed.). New York: Free Press.
Rogers, R. W. (1975). A protection motivation theory of fear appeals and attitude change. The
Journal of Psychology, 91(1), 93–114. https://doi.org/10.1080/00223980.1975.9915803
Roloff, M. E., & Ifert, D. (1998). Antecedents and consequences of explicit agreements to declare
a topic taboo in dating relationships. Personal Relationships, 5(2), 191–205. https://doi.org/10.
1111/j.1475-6811.1998.tb00167.x
Rosenfeld, L. B. (2000). Overview of the ways privacy, secrecy, and self-disclosure are balanced
in today’s society. In S. Petronio (Ed.), Balancing the secrets of private disclosures (pp. 3–17).
LEA’s communication series. Mahwah, NJ: Lawrence Erlbaum Associates.
Rosenfeld, L. B., & Kendrick, W. L. (1984). Choosing to be open: An empirical investigation
of subjective reasons for self–disclosing. Western Journal of Speech Communication, 48(4),
326–343. https://doi.org/10.1080/10570318409374168
Rosenfeld, L. R. (1979). Self-Disclosure avoidance: Why I am afraid to tell you who I am.
Communication Monographs, 46, 63–74. https://doi.org/10.1080/03637757909375991
Ross, C., Orr, E. S., Sisic, M., Arseneault, J. M., Simmering, M. G., & Orr, R. R. (2009).
Personality and motivations associated with Facebook use. Computers in Human Behavior,
25(2), 578–586. https://doi.org/10.1016/j.chb.2008.12.024
Ross, L. (1977). The intuitive psychologist and its shortcomings. In L. Berkowitz (Ed.), Advances
in experimental social psychology. New York: Academic Press.
Ross, L., & Nisbett, R. E. (2011). The person and the situation: Perspectives of social psychology.
London: Pinter & Martin.
Rosseel, Y. (2012). lavaan: An R package for structural equation modeling. Journal of Statistical
Software, 48(2), 1–36. Retrieved from http://www.jstatsoft.org/v48/i02/
Rössler, B. (2001). Der Wert des Privaten [The value of the private]. Frankfurt am Main:
Suhrkamp.
Rotter, J. B. (1967). A new scale for the measurement of interpersonal trust. Journal of Personality
and Social Psychology, 35(4), 651–665. https://doi.org/10.1111/j.1467-6494.1967.tb01454.x
Rotter, J. B. (1971). Generalized expectancies for interpersonal trust. American Psychologist,
26(5), 443–452. https://doi.org/10.1037/h0031464
Rotter, J. B. (1980). Interpersonal trust, trustworthiness, and gullibility. American Psychologist,
35(1), 1–7. https://doi.org/10.1037/0003-066X.35.1.1
Rütten, C. (2007, February 07). Skype liest BIOS-Daten aus. Heise Online. Retrieved from https://
www.heise.de/newsticker/meldung/Skypeliest-BIOS-Daten-aus-143633.html
Ryan, R. M., & Deci, E. L. (2000). Self-determination theory and the facilitation of intrinsic
motivation, social development, and well-being. American Psychologist, 55(1), 68–78. http://
dx.doi.org/10.1037/0003-066X.55.1.68
Saucier, G., Bel-Bahar, T., & Fernandez, C. (2007). What modifies the expression of personality
tendencies? Defining basic domains of situation variables. Journal of Personality, 75(3),
479–503. https://doi.org/10.1111/j.1467-6494-2007.00446.x
Scharkow, M. (2016). The accuracy of self-reported internet use—A validation study using
client log data. Communication Methods and Measures, 10(1), 13–27. https://doi.org/10.1080/
19312458.2015.1118446
Schenk, M., Niemann, J., Reinmann, G., & Roßnagel, A. (2012). Digitale Privatsphäre: Her-
anwachsende und Datenschutz auf sozialen Netzwerkplattformen [Digital privacy: Adolescents
and data protection on social network sites]. Schriftenreihe Medienforschung der Lan-
desanstalt für Medien Nordrhein-Westfalen. Berlin: Vistas Verlag.
References 387
Scherer, H., & Schlütz, D. (2002). Gratifikation à la minute: Die zeitnahe Erfassung von
Gratifikationen [Gratification à la minute: The realtime measurement of gratifications]. In P.
Rössler, S. Kubisch, & V. Gehrau (Eds.), Empirische Perspektiven der Rezeptionsforschung
(Vol. 23, pp. 133–152). Angewandte Medienforschung. München: Fischer.
Scherer, K. R. (2016). What are emotions? And how can they be measured? Social Science
Information, 44(4), 695–729. https://doi.org/10.1177/0539018405058216
Schlütz, D. (2002). Bildschirmspiele und ihre Faszination: Zuwendungsmotive, Gratifikationen
und Erleben interaktiver Medienangebote [Video games and their fascination: Motives,
gratifications, and experiencing interactive media content]. München: Reinhard Fischer.
Schmidt, J.-H. (2009). Das neue Netz: Merkmale, Praktiken und Folgen des Web 2.0 [The new net:
Characteristics, practices, and consequences of the web 2.0]. Konstanz: UVK.
Schmidt, J.-H. (2011). (Micro)blogs: Practices of privacy management. In S. Trepte & L. Reinecke
(Eds.), Privacy online (pp. 159–174). Berlin: Springer.
Schmitt, N. (1996). Uses and abuses of coefficient alpha. Psychological Assessment, 8(4), 350–353.
http://dx.doi.org/10.1037/1040-3590.8.4.350
Schoeman, F. D. (1984). Philosophical dimensions of privacy: An anthology. New York: Cam-
bridge University Press.
Schroeder, R. (2010). Mobile phones and the inexorable advance of multimodal connectedness.
New Media & Society, 12(1), 75–90. https://doi.org/10.1177/1461444809355114
Schwartz, B. (1968). The social psychology of privacy. American Journal of Sociology, 73(6),
741–752. https://doi.org/10.1086/224567
Schwartz, J. E., & Stone, A. A. (2007). The analysis of real-time momentary data: A practical
guide. In A. A. Stone, S. Shiffman, A. A. Atienza, & L. Nebeling (Eds.), The science of real-
time data capture (pp. 76–113). Oxford: Oxford University Press.
Scollon, C. N., Kim-Prieto, C., & Diener, E. (2003). Experience sampling: Promises and pitfalls,
strengths and weaknesses. Journal of Happiness Studies, 4(1), 5–34. https://doi.org/10.1023/A:
1023605205115
Scott, J. (2010). Rational choice theory. In G. K. Browning, A. Halcli, & F. Webster (Eds.),
Understanding contemporary society (pp. 126–138). London: Sage Publications.
Seidman, G. (2013). Self-presentation and belonging on Facebook: How personality influences
social media use and motivations. Personality and Individual Differences, 54(3), 402–407.
https://doi.org/10.1016/j.paid.2012.10.009
semTools Contributors. (2016). semTools: Useful tools for structural equation modeling. Retrieved
from https://CRAN.R-project.org/package=semTools
Sennett, R. (1976/1992). The fall of public man. New York: Norton.
Seubert, S. (2016). Zwischen Emanzipation und Beherschung. Das Private im digitalen Zeitalter
[Between emancipation and governing. The private in the digital age]. WestEnd - Neue
Zeitschrift für Sozialforschung, 01(89–102).
Sevignani, S. (2015). The problem of privacy in capitalism and the alternative social networking
site Diaspora. In C. Fuchs & V. Mosco (Eds.), Marx in the age of digital capitalism
(pp. 413–446). Leiden: Brill.
Sevignani, S. (2016). Privacy and capitalism in the age of social media (1st ed.). Routledge
research in information technology and society. New York: Routledge Taylor & Francis Group.
Sharma, S., Mukherjee, S., Kumar, A., & Dillon, W. R. (2005). A simulation study to investigate the
use of cutoff values for assessing model fit in covariance structure models. Journal of Business
Research, 58(7), 935–943. https://doi.org/10.1016/j.jbusres.2003.10.007
Sheehan, K. B. (1999). An investigation of gender differences in online privacy concerns and
resultant behaviors. Journal of Interactive Marketing, 13(4), 24–38.
Shiffman, S. (2007). Designing protocols for ecological momentary assessment. In A. A. Stone,
S. Shiffman, A. A. Atienza, & L. Nebeling (Eds.), The science of real-time data capture
(pp. 27–53). Oxford: Oxford University Press.
Shils, E. (1956/1996). The torment of secrecy. Chicago: Ivan R. Dee.
Sijtsma, K. (2009). On the use, the misuse, and the very limited usefulness of Cronbach’s alpha.
Psychometrika, 74(1), 107–120. https://doi.org/10.1007/s11336-008-9101-0
388 References
Simon, H. A. (1955). A behavioral model of rational choice. The Quarterly Journal of Economics,
69(1), 99–118. http://dx.doi.org/10.2307/1884852
Sloboda, J. A., O’Neill, S. A., & Ivaldi, A. (2001). Functions of music in everyday life: An
exploratory study using the experience sampling method. Musicae Scientiae, 5(1), 9–32. https://
doi.org/10.1177/102986490100500102
Slovic, P., Finucane, M. L., Peters, E., & MacGregor, D. G. (2004). Risk as analysis and risk
as feelings: Some thoughts about affect, reason, risk, and rationality. Risk Analysis, 24(2),
311–322. https://doi.org/10.1111/j.0272-4332.2004.00433.x
Smith, A. (2013). Smartphone ownership - 2013 update. Retrieved from http://www.pewinternet.
org/~/media//Files/Reports/2013/PIP_Smartphone_adoption_2013_PDF.pdf
Smith, A. (2015). U.S. smartphone use in 2015. Retrieved from http://www.pewinternet.org/2015/
04/01/us-smartphone-use-in-2015/
Smith, H. J., Dinev, T., & Xu, H. (2011). Information privacy research: An interdisciplinary review.
MIS Quarterly, 35(4), 989–1015.
Smith, H. J., Milberg, S. J., & Burke, S. J. (1996). Information privacy: Measuring individual’s
concerns about organizational practices. MIS Quarterly, 20(2), 167–196. Retrieved from http://
www.jstor.org/stable/249477
Smock, A. D., Ellison, N. B., Lampe, C., & Wohn, D. Y. (2011). Facebook as a toolkit: A uses
and gratification approach to unbundling feature use. Computers in Human Behavior, 27(6),
2322–2329. https://doi.org/101016/j.chb.2011.07.011
Snijders, T., & Bosker, R. J. (2011). Multilevel analysis: An introduction to basic and advanced
multilevel modeling. Los Angeles, CA: Sage Publications.
Sokolov, D. A. J. (2008, July 24). Spekulationen um Backdoor in Skype [Speculations about
backdoor in Skype]. Heise Online. Retrieved from https://www.heise.de/security/meldung/
Spekulationen-um-Backdoor-in-Skype-189880.html
Solove, D. J. (2008). Understanding privacy. London: Harvard University Press.
Spears, R., & Lea, M. (1994). Panacea or panopticon? The hidden power in computer-
mediated communication. Communication Research, 21(4), 427–459. https://doi.org/10.1177/
009365094021004001
Spiegel Online. (2015, January 30). Tinder hat zwei Millionen Nutzer in Deutschland [Tinder
has two million users in Germany]. Retrieved from http://www.spiegel.de/netzwelt/web/tinder-
dating-app-hatzwei-millionen-nutzer-in-deutschland-a-1015930.html
Spiekermann, S., Grossklags, J., & Berendt, B. (2001). Eprivacy in 2nd generation e-commerce:
Privacy preferences versus actual behavior. In 3rd ACM Conference on Electronic Commerce
-EC’01 (pp. 38–47).
Sprecher, S., Treger, S., & Wondra, J. D. (2012). Effects of self-disclosure role on liking,
closeness, and other impressions in get-acquainted interactions. Journal of Social and Personal
Relationships, 30(4), 497–514. https://doi.org/10.1177/0265407512459033
Sprecher, S., Treger, S., & Wondra, J. D. (2013). Effects of self-disclosure role on liking,
closeness, and other impressions in get-acquainted interactions. Journal of Social and Personal
Relationships, 30(4), 497–514. https://doi.org/10.1177/0265407512459033
Statista. (2015). Leading 10e-mail providers in Germany in 2015. Retrieved from https://www.
statista.com/statistics/446418/most-popular-e-mail-providers-germany/
Statista. (2016). Number of active Gmail users worldwide from January 2012 to February 2016.
Retrieved from https://www.statista.com/statistics/432390/active-gmail-users/
Statista. (2017). Number of available applications in the Google Play Store from December
2009 to December 2016. Retrieved from https://www.statista.com/statistics/266210/number-
of-available-applications-in-the-google-play-store/
Steinfeld, N. (2016). “I agree to the terms and conditions”: (How) do users read privacy policies
online? An eye-tracking experiment. Computers in Human Behavior, 55, 992–1000. https://doi.
org/10.1016/j.chb.2015.09.038
Steuber, K. R., & McLaren, R. M. (2015). Privacy recalibration in personal relationships: Rule
usage before and after an incident of privacy turbulence. Communication Quarterly, 63(3),
345–364. https://doi.org/10.1080/01463373.2015.1039717
References 389
Stewart, K. A., & Segars, A. H. (2002). An empirical examination of the concern for information
privacy instrument. Information Systems Research, 13(1), 36–49. Retrieved from http://www.
jstor.org/stable/23015822
Stieger, S., Burger, C., Bohn, M., & Voracek, M. (2013). Who commits virtual identity suicide?
Differences in privacy concerns, Internet addiction, and personality between Facebook users
and quitters. Cyberpsychology, Behavior, and Social Networking, 16(9), 629–634. https://doi.
org/10.1089/cyber.2012.0323
Stone, A. A., Kessler, R. C., & Haythomthwatte, J. A. (1991). Measuring daily events and
experiences: Decisions for the researcher. Journal of Personality, 59(3), 575–607. https://doi.
org/10.1111/j.1467-6494.1991.tb00260.x
Stone, A. A., & Shiffman, S. (2007). Appendix: Capturing momentary, self-report data: A proposal
for reporting guidelines. In A. A. Stone, S. Shiffman, A. A. Atienza, & L. Nebeling (Eds.), The
science of real-time data capture (pp. 371–386). Oxford: Oxford University Press.
Stone, A. A., Shiffman, S., Atienza, A. A., & Nebeling, L. (2007). Historical roots and rationale
of ecological momentary assessment (EMA). In A. A. Stone, S. Shiffman, A. A. Atienza, & L.
Nebeling (Eds.), The science of real-time data capture (pp. 3–10). Oxford: Oxford University
Press.
Sudman, S., Bradburn, N. M., & Schwarz, N. (1996). Thinking about answers: The application of
cognitive processes to survey methodology (1st ed.). San Francisco, CA: Jossey-Bass.
Sundar, S. S., Kang, H., Wu, M., Go, E., & Zhang, B. (2013). Unlocking the privacy paradox: Do
cognitive heuristics hold the key? In W. E. Mackay (Ed.), CHI’13 extended abstracts on human
factors in computing systems (pp. 811–816). ACM Digital Library. New York, NY: ACM.
Surespot. (2017). How surespot works. Retrieved from https://www.surespot.me/documents/how_
surespot_works.html
Taddei, S., & Contena, B. (2013). Privacy, trust and control: Which relationships with online
self-disclosure? Computers in Human Behavior, 29(3), 821–826. https://doi.org/10.1016/j.chb.
2012.11.022
Taddicken, M. (2014). The ‘privacy paradox’ in the social web: The impact of privacy concerns,
individual characteristics, and the perceived social relevance on different forms of self-
disclosure. Journal of Computer-Mediated Communication, 19(2), 248–273. https://doi.org/10.
1111/jcc4.12052
Taddicken, M., & Jers, C. (2011). The uses of privacy online: Trading a loss of privacy for social
web gratifications? In S. Trepte & L. Reinecke (Eds.), Privacy online (pp. 143–156). Berlin:
Springer.
Tavani, H. T. (2007). Philosophical theories of privacy: Implications for an adaquate online privacy
policy. Metaphilosophy, 38(1), 1–22. https://doi.org/10.1111/j.1467-9973.2006.00474.x
Tavani, H. T., & Moor, J. H. (2001). Privacy protection, control of information, and privacy-
enhancing technologies. Computers and Society, 31(1), 6–11. https://doi.org/10.1145/572277.
572278
Taylor, D. A. (1979). Motivational bases. In G. J. Chelune (Ed.), Self-Disclosure (pp. 110–150).
San Francisco: Jossey-Bass.
Teutsch, D. (2013). Von Datenkraken, Selbstenthüllung und sozialer Teilhabe: Medien-Frames
in der Berichterstattung ausgewählter deutscher Printmedien über Privatsphäre auf sozialen
Netzwerkplattformen. Unveröffentlichte Master-Arbeit, Universität Hohenheim.
Teutsch, D., Masur, P. K., & Trepte, S. (2018). Privacy in mediated and non-mediated interpersonal
communication: How subjective concepts and situational perceptions influence behaviors.
Social Media + Society, 4(2), 1–14. https://doi.org/10.1177/2056305118767134
Teutsch, D., & Niemann, J. (2016). Social network sites as a threat to users’ self-determination
and security: A framing analysis of German newspapers. The Journal of International
Communication, 22(1), 22–41. https://doi.org/10.1080/13216597.2015.1111841
Thaler, R. H., & Sunstein, C. R. (2009). Nudge: Improving decisions about health, wealth and
happiness (New internat. ed.). London: Penguin. Retrieved from http://www.gbv.de/dms/faz-
rez/FD1200904062216205.pdf
390 References
The Economist. (2016, April 9). Bots, the next frontier. Retrieved from http://www.economist.
com/news/business-and-finance/21696477-market-apps-maturing-now-one-text-based-
services-or-chatbotslooks-poised
Thomas, W. I., & Thomas, D. W. (1928). The child in America: Behavior problems and programs.
New York: Knopf.
Threema. (2017). What is a Threema ID? Retrieved from https://threema.ch/en/faq/threema_id
Tosun, L. P. (2012). Motives for Facebook use and expressing “true self” on the Internet.
Computers in Human Behavior, 28(4), 1510–1517. https://doi.org/10.1016/j.chb.2012.03.018
Tourangeau, R., Rips, L. J., & Rasinski, K. (2000). The psychology of survey response (1st ed.).
Cambridge: Cambridge University Press.
Treem, J. W., & Leonardi, P. M. (2012). Social media use in organizations: Exploring the
affordances of visibility, editability, persistence, and association. Communication Yearbook,
36, 143–189. https://doi.org/10.1080/23808985.2013.11679130
Trepte, S. (2012). Privatsphäre aus psychologischer Sicht [Privacy from a psychological point of
view]. In J.-H. Schmidt & T. Weichert (Eds.), Datenschutz. Grundlagen, Entwicklungen und
Kontroversen [Data protection. Fundamentals, developments, and controversies] (pp. 59–66).
Bonn: Schriftenreihe der Bundeszentral für politische Bildung.
Trepte, S. (2015). Social media, privacy, and self-disclosure: The turbulence caused by
social media’s affordances. Social Media + Society, 1(1), 1–2. https://doi.org/10.1177/
2056305115578681
Trepte, S. (2016a). Die Zukunft der informationellen Selbstbestimmung – Kontrolle oder Kom-
munikation? [The future of information self-determination: Control or communication?] In N.
Horn (Ed.), Die Zukunft der informationellen Selbstbestimmung [The future of informational
self-determination] (pp. 159–170). Berlin: Bundesstiftung für Daten-schutz.
Trepte, S. (2016b). The paradoxes of online privacy. In M. Walrave, K. Ponnet, E. Vanderhoven, J.
Haers, & B. Segaert (Eds.), Youth 2.0: Social media and adolescence: Connecting, sharing and
empowering (pp. 103–115). Cham: Springer. https://doi.org/10.1007/978-3-319-27893-3_6
Trepte, S., & Dienlin, T. (2014). Privatsphäre im Internet [Privacy on the internet]. In T. Prosch &
S. Pieschl (Eds.), Neue Medien und deren Schatten. Göttingen: Hofgrefe.
Trepte, S., Dienlin, T., & Reinecke, L. (2013). Privacy, self-disclosure, social support, and
social network site use. Research report of a three-year panel study. Stuttgart: University of
Hohenheim. Retrieved from http://opus.uni-hohenheim.de/volltexte/2013/889/
Trepte, S., Dienlin, T., & Reinecke, L. (2014). Risky behaviors: How online experiences influence
privacy behaviors. In B. Stark, O. Quiring, & N. Jackob (Eds.), Von der Gutenberg-Galaxis zur
Google-Galaxis (Vol. 41, pp. 225–244). Konstanz: UVK.
Trepte, S., & Masur, P. K. (2016). Cultural differences in social media use, privacy, and
self-disclosure: Research report on a multicultural study. Stuttgart: University of Hohen-
heim. Retrieved from http://opus.uni-hohenheim.de/volltexte/2016/1218/pdf/Trepte_Masur_
ResearchReport.pdf
Trepte, S., & Masur, P. K. (2017a). Need for privacy. In V. Zeigler-Hill & T. K. Shakelford (Ed.),
Encyclopedia of personality and individual differences. London: Springer. https://doi.org/10.
1007/978-3-319-28099-8_540-1
Trepte, S., & Masur, P. K. (2017b). Privacy attitudes, perceptions, and behaviors of the German
population. In M. Friedewald, R. Ammicht-Quinn, M. Hansen, J. Heesen, T. Hess, J. Lamla,
C. Matt, A. Roßnagel, S. Trepte, M. Waidner (Eds.), Forum Privatheit und selbstbestimmtes
Leben in der digitalen Welt. Karlsruhe: Fraunhofer ISI. Retrieved from https://www.forum-
privatheit.de/forum-privatheit-de/publikationen-und-downloads/veroeffentlichungen-des-
forums/Trepte_Masur_2017_Research_Report_Hohenheim.pdf
Trepte, S., Masur, P. K., & Scharkow, M. (2017). Mutual friend’s social support and self-disclosure
in face-to-face and instant messenger communication: How online social support changes self-
disclosure. The Journal of Social Psychology. https://doi.org/10.1080/00224545.2017.1398707
Trepte, S., & Reinecke, L. (Eds.). (2011a). Privacy online: Perspectives on privacy and self-
disclosure in the social web. Berlin: Springer.
References 391
Trepte, S., & Reinecke, L. (2011b). The social web as a shelter for privacy and authentic living. In
S. Trepte & L. Reinecke (Eds.), Privacy online (pp. 61–73). Berlin: Springer.
Trepte, S., & Reinecke, L. (2013a). Medienpsychologie (1. Aufl.). Grundriss der Psychologie.
Stuttgart: Kohlhammer.
Trepte, S., & Reinecke, L. (2013b). The reciprocal effects of social network site use and the
disposition for self-disclosure: A longitudinal study. Computers in Human Behavior, 29(3),
1102–1112. https://doi.org/10.1016/j.chb.2012.10.002
Trepte, S., Reinecke, L., Ellison, N. B., Quiring, O., Yao, M. Z., & Ziegele, M. (2017). A cross-
cultural perspective on the privacy calculus. Social Media + Society, 3(1). https://doi.org/10.
1177/2056305116688035
Trepte, S., & Teutsch, D. (2016). Privacy paradox. In N. C. Krämer, S. Schwan, & D. Unz
(Eds.), Medienpsychologie: Schlüsselbegriffe und Konzepte [Media psychology: Keywords and
concepts] (pp. 372–377). Stuttgart: Kohlhammer.
Trepte, S., Teutsch, D., Masur, P. K., Eicher, C., Fischer, M., Hennhöfer, A., & Lind, F. (2015).
Do people know about privacy and data protection strategies? Towards the “Online Privacy
Literacy Scale” (OPLIS). In S. Gutwirth, R. Leenes, & P. de Hert (Eds.), Reforming European
data protection law (Vol. 20). Dordrecht: Springer. https://doi.org/10.1007/978-94-017-9385-8
Tsai, J. Y., Egelman, S., Cranor, L., & Acquisti, A. (2011). The effect of online privacy
information on purchasing behavior: An experimental study. Information Systems Research,
22(2), 254–268. https://doi.org/10.1287/isre.1090.0260
Tsay-Vogel, M., Shanahan, J., & Signorielli, N. (2016). Social media cultivating perceptions of
privacy: A 5-year analysis of privacy attitudes and self-disclosure behaviors among Facebook
users. New Media & Society. https://doi.org/10.1177/1461444816660731
Tufekci, Z. (2008). Can you see me now? Audience and disclosure regulation in online social
network sites. Bulletin of Science, Technology & Society, 28(1), 20–36. https://doi.org/10.
1177/0270467607311484
Tupes, E. C., & Christal, R. E. (1992). Recurrent personality factors based on trait ratings. Journal
of Personality, 60(2), 225–251. https://doi.org/10.1111/j.1467-6494.1992.tb00973.x
Turkle, S. (2008). Always-on/Always-on-you: The tethered self. In J. E. Katz (Ed.), Handbook of
mobile communication studies (pp. 121–138). Cambridge, MA: MIT Press.
Turow, J. (2003). Americans online privacy: The system is broken. Retrieved from
http://repository.upenn.edu/asc_papers/401/
Turow, J., Feldman, L., & Meltzer, K. (2005). Open to exploitation: America’s shoppers online
and offline. Retrieved from http://repository.upenn. edu/asc_papers/35
Tversky, A., & Kahnemann, D. (1975). Judgement under uncertainty: Heuristics and biases.
Science, 185(4157), 1124–1131. https://doi.org/10.1126/science.185.4157.1124
Twitter. (2017). Twitter usage/company facts. Retrieved from https://about.twitter.com/company
US Department of Health, Education and Welfare. (1973). Records, computers and the rights of
citizens: Report of the Secretary’s Advisory Committee on automated personal data systems.
Cambridge, MA: MIT Press.
Utz, S., Tanis, M., & Vermeulen, I. (2012). It is all about being popular: The effects of need for
popularity on social network site use. Cyberpsychology, Behavior, and Social Networking,
15(1), 37–42. https://doi.org/101089/cyber.2010.0651
van Buuren, S., & Groothuis-Oudshoorn, K. (2011). mice: Multivariate imputation by chained
equations in R. Journal of Statistical Software, 45(3), 1–67.
VandenBos, G. R. (2007). APA dictionary of psychology (1st ed.). Washington: American
Psychological Association.
Vandewater, E. A., & Lee, S.-J. (2009). Measuring children’s media use in the digital age: Issues
and challenges. The American Behavioral Scientist, 52(8), 1152–1176. https://doi.org/10.1177/
0002764209331539
Vangelisti, A. L. (1994). Family secrets: Forms, functions and correlates. Journal of Social and
Personal Relationships, 11(1), 113–135. https://doi.org/10.1177/0/265407594111007
392 References
Vangelisti, A. L., & Caughlin, J. P. (1997). Revealing family secrets: The influence of topic,
function, and relationships. Journal of Social and Personal Relationships, 14(5), 679–705.
https://doi.org/10.1177/0265407597145006
Vasalou, A., Joinson, A. N., & Houghton, D. (2015). Privacy as a fuzzy concept: A new
conceptualization of privacy for practitioners. Journal of the Association for Information
Science and Technology, 66(5), 918–929. https://doi.org/10.1002/asi.23220
Vassallo, G., Pilato, G., Augello, A., & Gaglio, S. (2010). Phase coherence in conceptual spaces
for conversational agents. In P. C.-Y. Sheu, H. Yu, C. V. Ramamoorthy, A. K. Joshi, & L. A.
Zadeh (Eds.), Semantic computing (pp. 357–371). Hoboken, NJ: Wiley.
Venkatesh, V., & Davis, F. D. (2000). A theoretical extension of the technology acceptance model:
Four longitudinal field studies. Management Science, 46(2), 186–204. https://doi.org/101287/
mnsc.46.2.186.11926
Venkatesh, V., Morris, M. G., Davis, G. B., & Davis, F. D. (2003). User acceptance of information
technology: Toward a unified view. MIS Quarterly, 27(3), 425–478.
Vitak, J. (2012). The impact of context collapse and privacy on social network site disclosures.
Journal of Broadcasting & Electronic Media 56(4), 451–470. https://doi.org/10.1080/
08838151.2012.732140
Vitak, J. (2015, May). Facebook’s privacy perception problem: Unpacking motivations for social
media non-adoption. Paper presented at the 65th annual conference of the International
Communication Association in San Juan (Puerto Rico).
Vitak, J., Blasiola, S., Patil, S., & Litt, E. (2015). Balancing audience and privacy tensions on
social network sites. International Journal of Communication, 9, 1–20.
Vitak, J., & Kim, J. (2014). “You can’t block people offline”: Examining how Facebook’s
affordances shape the disclosure process. In CSCW. Baltimore, MD.
von Humboldt, W. (1851/1967). Ideen zu einem Versuch, die Grenzen der Wirk-samkeit des Staats
zu bestimmen [On the limits of state action]. Stuttgart: Reclam.
von Pape, T. (2008). Aneignung neuer Kommunikationstechnologien in sozialen Netzwerken: Am
Beispiel des Mobiltelefons unter Jugendlichen [Appropriation of communication technologies
in social networks: The mobile phone among adolescents] (1. Aufl.). Wiesbaden: Springer.
https://doi.org/10.1007/978-3-531-91214-1
von Pape, T., Trepte, S., & Mothes, C. (2017). Privacy by disaster? Press coverage of privacy and
digital technology. European Journal of Communication, 10(4), 026732311768999. https://
doi.org/10.1177/0267323117689994
Vorderer, P. (2015). Der mediatisierte Lebenswandel - Permanently Online, Permanently
connected. Publizistik, 60(3), 259–276. https://doi.org/101007/s11616-015-0239-3
Vorderer, P., & Kohring, M. (2013). Permanently online: A challenge of media and communication
research. International Journal of Communication, 7, Feature, 188–196.
Walsh, W. B., Craig, K. H., & Price, R. H. (Eds.). (2000). Person-environment psychology: New
directions and perspectives. Mahwah, NJ: Lawrence Erlbaum Associates.
Walther, J. B. (1995). Relational aspects of computer-mediated communication: Experimental
observations over time. Organization Science, 6(2), 186–203. https://doi.org/10.1287/orsc.6.2.
186
Walther, J. B. (1996). Computer-mediated communication: Impersonal, interpersonal, and
hyperpersonal interaction. Communication Research, 23(1), 3–43. https://doi.org/10.1177/
009365096023001001
Walther, J. B. (2011). Introduction to privacy online. In S. Trepte & L. Reinecke (Eds.), Privacy
online (pp. 3–7). Berlin: Springer.
Walzer, M. (1984). Spheres of justice: A defense of pluralism and equality. New York: Basic Books.
Wang, Y., Leon, P. G., Scott, K., Chen, X., Acquisti, A., & Cranor, L. F. (2013). Privacy nudges
for social media: An exploratory Facebook study. In Proceedings of the 22nd International
Conference on World Wide Web (pp. 763–770). New York, NY: ACM. https://doi.org/10.1145/
2487788.2488038
Warren, S. D., & Brandeis, L. D. (1890). The right to privacy. Harvard Law Review, 4(5), 193–220.
References 393
Waters, S., & Ackerman, J. (2011). Exploring privacy management on Face-book: Motivations
and perceived consequences of voluntary disclosure. Journal of Computer-Mediated
Communication, 17(1), 101–115. https://doi.org/10.1111/j.1083-6101.2011.01559.x
Webster, F. (2000). Information, capitalism, and uncertainty. Information, Communication &
Society, 3(1), 69–90. https://doi.org/10.1080/136911800359428
Webster, F. (2014). Theories of the information society (4th ed.). International library of sociology.
Abingdon, Oxon: Routledge.
Weiss, A. G. (1999). Self-Disclosure and psychological privacy. In A. C. Richards & T. Schumrum
(Eds.), Invitations to dialogue (pp. 201–217). Dubuque, Iowa: Kendall/Hunt Pub. Co.
Weller, K., Bruns, A., Burgess, J. E., Mahrt, M., & Puschmann, C. (2014). Twitter and society: An
introduction. In K. Weller, A. Bruns, J. E. Burgess, M. Mahrt, & C. Puschmann (Eds.), Twitter
and society (Vol. 89, pp. xxix–xxxviii). Digital formations. New York, NY: Peter Lang.
West, S. G., Finch, J. F., & Curran, P. J. (1995). Structural equation models with non-normal
variables: Problems and remedies. In R. H. Hoyle (Ed.), Structural equation modeling
(pp. 56–75). Thousand Oaks: Sage Publications.
Westin, A. F. (1967). Privacy and freedom. New York: Atheneum.
Westin, A. F. (2003). Social and political dimensions of privacy. Journal of Social Issues, 59(2),
431–453. https://doi.org/10.1111/1540-4560.00072
WhatsApp. (2016). Privacy Policy. Retrieved from https://www.whatsapp.~com/legal/?l=en#
privacy-policy-information-we-collect
Wheeless, L. R. (1976). Self-Disclosure and interpersonal solidarity: Measurement, validation,
and relationships. Human Communication Research, 3(1), 47–61. https://doi.org/10.1111/j.
1468-2958.1976.tb00503.x
Wheeless, L. R. (1978). A follow-up study of relationships among trust, disclosure, and
interpersonal solidarity. Human Communication Research, 4(2), 143–157. https://doi.org/10.
1111/j.1468-2958.1978.tb00604.x
Wheeless, L. R., & Grotz, J. (1977). The measurement of trust and its relationship to self-
disclosure. Human Communication Research, 3(3), 250–257. https://doi.org/10.1111/j.1468-
2958.1977.tb00523.x
Wickham, H., & Chang, W. (2016). ggplot2-Create Elegant Data Visualisations Using the Gram-
mar of Graphics. Retrieved from https://cran.rproject.org/web/packages/ggplot2/ggplot2.pdf
Wickham, H., & Francois, R. (2016). Package ‘dplyr’: A grammar of data manipulation. Retrieved
from https://cran.r-project.org/web/packages/dplyr/dplyr.pdf
Williams, R. (1974). Television: Technology and cultural form. Glasgow: Fontana.
Winter, S., Neubaum, G., Eimler, S. C., Gordon, V., Theil, J., Herrmann, J., . . . Krämer, N. C.
(2014). Another brick in the Facebook wall – How personality traits relate to the content of
status updates. Computers in Human Behavior, 34, 194–202. https://doi.org/10.1016/j.chb.
2014.01.048
Wirth, W., von Pape, T., & Karnowski, V. (2008). An integrative model of mo-bile phone
appropriation. Journal of Computer-Mediated Communication, 13(3), 593–617. https://doi.
org/10.1111/j.1083-6101.2008.00412.x
Wittgenstein, L. (1953/2008). Philosophische Untersuchungen [Philosophical investigations] (4.
Aufl.). Frankfurt am Main: Suhrkamp.
Wolfe, M., & Laufer, R. S. (1974). The concept of privacy in childhood and adolescence. In
D. H. Carson (Ed.), Man-environment interactions. Washington, DC: Environmental Design
Research Association.
Wonneberger, A., & Irazoqui, M. (2013, June). Tell it Like it Is? Inaccuracies of Self-reported TV
Exposure in Comparison to People-Meter Data. Paper presented at the annual conference of
the International Communication Association in London, UK.
Xu, H. (2007). The effects of self-construal and perceived control on privacy concerns. In Proceed-
ings of the 28th International Conference on Information Systems (pp. 1–14). Retrieved from
http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.6511514&rep=rep1&type=pdf
394 References
Yang, C., Nay, S., & Hoyle, R. H. (2010). Three approaches to using lengthy ordinal scales
in structural equation models: Parceling, latent Scoring, and shortening Scales. Applied
Psychological Measurement, 34(2), 122–142. https://doi.org/10.1177/0146621609338592
Yu, C., & Muthén, B. O. (2002, April). Evaluation of Model Fit Indices for Latent Variable
Models with Categorical and Continuous Outcomes. Paper presented at the annual meeting of
the America Educational Research Association, New Orleans, USA.
Yuan, K.-H., & Bentler, P. M. (1997). Mean and covariance structure analysis: Theoretical and
practical improvements. Journal of the American Statistical Association, 92(438), 767–774.
https://doi.org/10.1080/01621459.1997.10474029
Zhao, S., Grasmuck, S., & Martin, J. (2008). Identity construction on Face-book: Digital
empowerment in anchored relationships. Computers in Human Behavior, 24(5), 1816–1836.
https://doi.org/10.1016/j.chb.2008.02.012
Zlatolas, L. N., Welzer, T., Heričko, M., & Hölbl, M. (2015). Privacy antecedents for SNS
self-disclosure: The case of Facebook. Computers in Human Behavior, 45, 158–167. https://
doi.org/10.1016/j.chb.2014.12.012