You are on page 1of 4

CHAPTER II

LITERATURE REVIEW

This chapter discuss about the awareness in posting and sharing of personal information in Facebook. This
review aims on the privacy and information disclosure of users online in terms of private information, private
boundaries, control and ownership, rule-based management system and management dialectics.

 Private Information
Initial researches (2009, Cristofied, Muse, Dasmarais) studied that undergraduate Facebook users
disclose more information about them but is concern about their privacy. Personal information such as
birthdays, e-mail address and photos were shared. They concluded that disclosure and control on
Facebook were not far connected than it is, in the other hand, it is affected by different personalities of
users.
Further analysis (2013, Young, Quan-Haase) used the mixed method approach and concluded that
Facebook users apply different strategies in protecting their privacy, it consists of excluding contact
information, limited profile, un-tagging photos and videos and limiting non-mutual friend requests.
(Gulban, Duffany 2011) there is little awareness and use of existing privacy mechanisms among active
users. Research has offered several explanations for this under-utilization of privacy options, including
poor interface design, permissive default settings, social conformance, and inherent trust in the online
community.

 Private Boundaries
(Wilis 2019) examines the difficulties of obtaining informed consent online through a Facebook case study.
It is proposed that there are at least two ways informed consent could be waived in research: first, if the
data are public, and second, if the data are textual. Accordingly, the publicness of the Facebook News
Feed is considered. Taking account of the wide availability of Facebook users’ data, and reflecting on how
public those users perceive their information to be, this paper argues that some Facebook data are properly
viewed as public to semi-public in nature. A second issue is whether the Facebook News Feed data
collection ought to be classified as document-based or human subjects research. Since the Facebook
News Feed involves social interaction that may elicit ‘ethically important moments’, this paper proposes that
observing it may constitute human subjects research. While informed consent is desirable for human
subjects’ research, it is suggested that Facebook News Feed observations are comparable to observational
research in a public space, and thus waiving informed consent in this online setting could be justifiable.
 Control and Ownership
(Marshall, Shipman 2015) presented the results of a study examining 244 participants’ attitudes about the
value, ownership, and control of social network data. We use Facebook-based scenarios to elicit reactions
to hypothetical statements about saving social network content that belongs to others, reusing,
repurposing, and monetizing social network data, and removing social network content that is not
specifically one’s own. Participants also report on their own practices in each of these areas. Findings not
only address issues related to ownership, but also explore the use of social networks as documentary
records, and the discrepancies between participants’ perceptions of how they would like their social
network content to be used, and how it is actually used.
(Sidlauskas, 2018) stated that personal data of the Facebook user comprise his/her public profile including
user’s photo, age, gender and other public information; a list of friends; e-mail; time zone records;
birthdays; photos; hobbies; etc. Which personal data will be requested from the user depends on the third-
party application. Analysis of the legal protection of personal data in the internet social networks reveals
that is limited to the International and European Union legal regulation on the protection of personal data in
the social networks. Users who make a publicly available a large amount of personal information on the
Facebook social network should decide if they want to share that information with third parties for the use
of their services.

 Rule-based Management System


(Mazumder, Hossain, Andersson 2021) illustrates the system design, the implementation, and the
applications of a Belief Rule-Based Expert System App that can effectively assess the multiple human
reactions hence overall reaction in the context of Facebook posts. The BRB App described in this paper
uses a belief rule base as the knowledge representation schema of the system, which can handle multiple
uncertainties that exist with the currently available reaction assessment system as shown in Table I. It also
considers the knowledge representation parameters such as rule-weights; attribute-weight and belief
degrees. The reliability of the system results a highly affected by these parameters. The performance of
the BRB App described in this paper is better than the expert users' opinion demonstrated in the previous
section. Thus, it can be concluded that the system is a less time consuming, and reliable tool to assess the
overall reaction of users. In the next phase, optimization of rules and training of the BRB will be applied, so
that the system can maintain a self-learning (Self Trained BRB) mechanism for a more accurate result.

 Management Dialectics
(Ellison, Steinfield, Lampe 2016) study assesses whether Facebook users have different ‘connection
strategies,’ a term which describes a suite of Facebook-related relational communication activities, and
explores the relationship between these connection strategies and social capital. Survey data (N = 450)
from a random sample of undergraduate students reveal that only social information-seeking behaviors
contribute to perceptions of social capital; connection strategies that focus on strangers or close friends do
not. We also find that reporting more ‘actual’ friends on the site is predictive of social capital, but only to a
point. We believe the explanation for these findings may be that the identity information in Facebook
serves as a social lubricant, encouraging individuals to convert latent to weak ties and enabling them to
broadcast requests for support or information.
(Frampton, Child 2013) study employs Communication Privacy Management (CPM) theory as a framework
to investigate how working professionals respond to co-worker Facebook friend requests. Overall, 312
individuals with full-time jobs and Facebook accounts completed an online survey. Results confirmed that
most working professionals accepted coworker Facebook friend requests. However, request decisions
varied in conjunction with organizational privacy orientation, current Facebook privacy management
practices, and co-worker communication satisfaction. Results confirm that working professionals’
Facebook linkage choices with other co-workers are best understood when embedded within a framework
which provides a more complete understanding of the functioning of their privacy rules.

2.1 Theoretical Framework

(Petronio, Child 2020) Communication Privacy Management (CPM) theory explains one of the most
important, yet challenging social processes in everyday life, that is, managing disclosing and protecting
private information. The CPM privacy management system offers researchers, students, and the public a
comprehensive approach to the complex and fluid character of privacy management in action.
Sandra Petronio (2002) CPM is evidence-based, providing a reliable understanding of how decisions are
made to disclose and protect private information. This theory uses simple language to understand data
protection management in everyday life. CPM focuses on the relationship that people have in
communicative contexts such as face-to-face interactions, in social networks and in dyads or groups. CPM
theory is based on a communicative perspective, social behavior and not necessarily a legal perspective.
The CPM theory shows that privacy is not paradoxical, but is sustainable through the process of a data
protection management system used in everyday life. The CPM theory has been used in various contexts
to shed light on the precursors, mechanisms and results of private information management.
(DeWolf, Willaert, Pierson 2014) applied the Communication Privacy Management theory (CPM) to
determine the individual and group privacy management strategies in Facebook. They presented a survey
on 900 members of youth organization concerning their online behaviors and membership. Research
concluded that women tend to modify their privacy management strategies, while men have more
tendency to modify group privacy management strategies. In regards to group privacy management, they
found common bond and the role of an individual is attributed within the youth organization to be the
strongest predictors while (2010, Stutzman, Duffield) evaluate undergraduate Facebook users through the
friends-only profile by expectancy violations theory and concluded that it is by weak ties and increased
interpersonal privacy management, users are tended to modify their privacy setting to friends only.
In this case, Petronio’s Communication Privacy Management Theory (CPM) is more relevant in our study
because it aims at understanding privacy and information disclosure. Defining privacy as means to
individual right to own and manage.

You might also like