186
Views
1
CrossRef citations to date
0
Altmetric
Original Articles

An empirical investigation of the social web gendered privacy model

ORCID Icon
Pages 1254-1267 | Received 07 Apr 2022, Accepted 16 Apr 2023, Published online: 03 May 2023

References

  • Adu, E. K., A. Mills, and N. Todorova. 2021. “Factors Influencing Individuals’ Personal Health Information Privacy Concerns. A Study in Ghana.” Information Technology for Development 27 (2): 208–234. doi:10.1080/02681102.2020.1806018.
  • Amichai-Hamburger, Y., M. Kingsbury, and B. H. Schneider. 2013. “Friendship: An Old Concept with a New Meaning?” Computers in Human Behavior 29 (1): 33–39. doi:10.1016/j.chb.2012.05.025.
  • Anderson, C. 2007. The Long Tail: How Endless Choice is Creating Unlimited Demand. New Jersey: Random House.
  • Appel, L., P. Dadlani, M. Dwyer, K. Hampton, V. Kitzie, Z. A. Matni, P. Moore, and R. Teodoro. 2014. “Testing the Validity of Social Capital Measures in the Study of Information and Communication Technologies.” Information, Communication & Society 17 (4): 398–416. doi:10.1080/1369118X.2014.884612.
  • Banwart, M. C., and D. G. Bystrom. 2022. “Gender and Candidate Communication: An Analysis of Televised Ads in the 2020 US Senate Races.” American Behavioral Scientist. doi:10.1177/00027642211040766.
  • Beltran, J., A. Gallego, A. Huidobro, E. Romero, and L. Padró. 2021. “Male and Female Politicians on Twitter: A Machine Learning Approach.” European Journal of Political Research 60 (1): 239–251. doi:10.1111/1475-6765.12392.
  • Blank, G., and D. Groselj. 2014. “Dimensions of Internet Use: Amount, Variety, and Types.” Information, Communication & Society 17 (4): 417–435. doi:10.1080/1369118X.2014.889189.
  • Bloustein, E. J. 1978. Individual and Group Privacy. New Brunswick: Transaction Publishers.
  • Bolander, B., and M. A. Locher. 2020. “Beyond the Online Offline Distinction: Entry Points to Digital Discourse.” Discourse, Context & Media 35: 100383. doi:10.1016/j.dcm.2020.100383.
  • boyd, d. 2011. “Social Network Sites as Networked Publics: Affordances, Dynamics, and Implications.” In A Networked Self: Identity, Community, and Culture on Social Network Sites, edited by Z. Papacharissi, 39–58. New York: Routledge.
  • boyd, d., and E. Hargittai. 2010. “Facebook Privacy Settings: Who Cares?” First Monday 15 (8). doi:10.5210/fm.v15i8.3086
  • Bronstein, J. 2014. “Creating Possible Selves: Information Disclosure Behaviour on Social Networks.” Information Research: An International Electronic Journal 19 (1).
  • Buchanan, T., C. Paine, A. N. Joinson, and U.-D. Reips. 2007. “Development of Measures of Online Privacy Concern and Protection for Use on the Internet.” Journal of the American Society for Information Science and Technology 58 (2): 157–165. doi:10.1002/asi.20459.
  • Büchi, M., N. Festic, N. Just, and M. Latzer. 2021. “Digital Inequalities in Online Privacy Protection: Effects of Age, Education and Gender.” In Handbook of Digital Inequality, edited by E. Hargittai, 296–310. Edward Elgar Publishing. doi:10.4337/9781788116572.00029.
  • Cameron, J. J., and D. A. Stinson. 2019. “Gender (Mis)Measurement: Guidelines for Respecting Gender Diversity in Psychological Research.” Social and Personality Psychology Compass 13 (11). doi:10.1111/spc3.12506.
  • Chang, C.-W., and J. Heo. 2014. “Visiting Theories That Predict College Students’ Self-Disclosure on Facebook.” Computers in Human Behavior 30: 79–86. doi:10.1016/j.chb.2013.07.059.
  • Cheng, Y., J. Meng, and S. Liu. 2018. “Personal Network Structure and Perceived Social Support in the Context of Intercultural Adjustment.” Communication Quarterly 66 (5): 576–594. doi:10.1080/01463373.2018.1515782.
  • Child, J. T., and S. C. Starcher. 2016. “Fuzzy Facebook Privacy Boundaries: Exploring Mediated Lurking, Vague-Booking, and Facebook Privacy Management.” Computers in Human Behavior 54: 483–490. doi:10.1016/j.chb.2015.08.035.
  • Cho, V. 2017. “A Study of Negative Emotional Disclosure Behavior in Social Network Media: Will an Unexpected Negative Event and Personality Matter?” Computers in Human Behavior 73: 172–180. doi:10.1016/j.chb.2017.03.026.
  • Culnan, M. J., and P. K. Armstrong. 1999. “Information Privacy Concerns, Procedural Fairness, and Impersonal Trust: An Empirical Investigation.” Organization Science 10 (1): 104–115. doi:10.1111/15404560.00067.
  • Culver, S. H., and A. Grizzle. 2017. Survey on Privacy in Media and Information Literacy with Youth Perspectives. UNESCO Series on Internet Freedom. UNESCO Publishing. https://unesdoc.unesco.org/ark:/48223/pf0000258993.
  • Dinev, T., and P. Hart. 2004. “Internet Privacy Concerns and Their Antecedents – Measurement Validity and a Regression Model.” Behaviour & Information Technology 23 (6): 413–422. doi:10.1080/01449290410001715723.
  • Dormann, C., and M. A. Griffin. 2015. “Optimal Time Lags in Panel Studies.” Psychological Methods 20 (4): 489–505. doi:10.1037/met0000041.
  • Duggan, M., L. Rainie, A. Smith, C. Funk, A. Lenhart, and M. Madden. 2014. Online Harassment. Pew Research Center. https://www.pewinternet.org/wp-content/uploads/sites/9/2014/10/PI_OnlineHarassment_72815.pdf.
  • Durnell, E., K. Okabe-Miyamoto, R. T. Howell, and M. Zizi. 2020. “Online Privacy Breaches, Offline Consequences: Construction and Validation of the Concerns with the Protection of Informational Privacy Scale.” International Journal of Human–Computer Interaction 36 (19): 1834–1848. doi:10.1080/10447318.2020.1794626.
  • Eagly, A. H., and W. Wood. 2012. “Social Role Theory.” In Handbook of Theories of Social Psychology, edited by P. A. M. van Lange, A. W. Kruglanski, and E. T. Higgins, 458–476. Sage. doi:10.4135/9781446249222.n49.
  • Eastlick, M. A., S. L. Lotz, and P. Warrington. 2006. “Understanding Online B-to-C Relationships: An Integrated Model of Privacy Concerns, Trust, and Commitment.” Journal of Business Research 59 (8): 877–886. doi:10.1016/j.jbusres.2006.02.006.
  • Ellison, N. B., J. Vitak, C. Steinfield, R. Gray, and C. Lampe. 2011. “Negotiating Privacy Concerns and Social Capital Needs in a Social Media Environment.” In Privacy Online. Perspectives on Privacy and Self-Disclosure in the Social Web, edited by S. Trepte and L. Reinecke, 19–32. Berlin: Springer.
  • Fairchild, K., and L. A. Rudman. 2008. “Everyday Stranger Harassment and Women’s Objectification.” Social Justice Research 21 (3): 338–357. doi:10.1007/s11211-008-0073-0.
  • Faliagka, E., A. Tsakalidis, and D. Vaikousi. 2011. “Teenagers’ Use of Social Network Websites and Privacy Concerns: A Survey.” In 2011 15th Panhellenic Conference on Informatics. Kastoria.
  • Flaherty, J., and J. Richman. 1989. “Gender Differences in the Perception and Utilization of Social Support: Theoretical Perspectives and an Empirical Test.” Social Science & Medicine 28 (12): 1221–1228. doi:10.1016/0277-9536(89)90340-7.
  • Floridi, L. 2017. “Group Privacy: A Defence and an Interpretation.” In Philosophical Studies Series: Volume 126. Group Privacy: New Challenges of Data Technologies (1st ed., edited by L. Taylor, L. Floridi, and B. van der Sloot, 83–100. Cham: Springer International Publishing AG.
  • Frener, R., and S. Trepte. 2022. “Theorizing Gender in Online Privacy Research.” Journal of Media Psychology: Theories, Methods, and Applications 34 (2): 77–88. doi:10.1027/1864-1105/a000327.
  • Gelman, S. A. 2003. The Essential Child. Oxford University Press. doi:10.1093/acprof:oso/9780195154061.001.0001.
  • Gleason, M. E. J., and M. Iida. 2015. “Social Support.” In APA Handbook of Personality and Social Psychology, Volume 3: Interpersonal Relations, edited by M. Mikulincer, P. R. Shaver, J. A. Simpson, and J. F. Dovidio, 351–370. American Psychological Association. doi:10.1037/14344-013.
  • Glover, D., and C. Kaplan. 2001. Genders (Reprinted.). The New Critical Idiom. London: Routledge.
  • Griffin, E. A., A. Ledbetter, and G. G. Sparks. 2015. A First Look at Communication Theory. 9th ed. New York: McGraw-Hill Education.
  • Gui, M., and M. Büchi. 2019. “From Use to Overuse: Digital Inequality in the Age of Communication Abundance.” Social Science Computer Review 39 (1): 3–19. doi:10.1177/0894439319851163.
  • Hair, J. F., W. C. Black, B. J. Babin, and R. E. Anderson. 2018. Multivariate Data Analysis (8th ed.). Boston: Cengage.
  • Hargittai, E. 2010. “Digital Na(t)ives? Variation in Internet Skills and Uses among Members of the ‘Net Generation’.” Sociological Inquiry 80 (1): 92–113. doi:10.1111/j.1475-682X.2009.00317.x.
  • Hargittai, E., and A. Shaw. 2015. “Mind the Skills Gap: The Role of Internet Know-How and Gender in Differentiated Contributions to Wikipedia.” Information, Communication & Society 18 (4): 424–442. doi:10.1080/1369118X.2014.957711.
  • Hargrave, L., and T. Langengen. 2021. “The Gendered Debate: Do Men and Women Communicate Differently in the House of Commons?” Politics & Gender 17 (4): 580–606. doi:10.1017/S1743923X20000100.
  • Helm, P., and C. Eichenhofer. 2019. “Reflexionen zu einem social turn in den privacy studies.” In Digitalität und Privatheit [Digitality and Privacy], edited by C. Aldenhoff, L. Edeler, M. Hennig, J. Kelsch, L. Raabe, and F. Sobala, 139–166. Transcript. doi:10.14361/9783839446614-009.
  • Hoffmann, C. P., and C. Lutz. 2019. “Digital Divides in Political Participation: The Mediating Role of Social Media Self-Efficacy and Privacy Concerns.” Policy and Internet. Advance online publication. doi:10.1002/poi3.225.
  • Hoffmann, C. P., C. Lutz, and M. Meckel. 2015. “Content Creation on the Internet: A Social Cognitive Perspective on the Participation Divide.” Information, Communication & Society 18 (6): 696–716. doi:10.1080/1369118X.2014.991343.
  • Hu, L., and M. W. Kearney. 2021. “Gendered Tweets: Computational Text Analysis of Gender Differences in Political Discussion on Twitter.” Journal of Language and Social Psychology 40 (4): 482–503. doi:10.1177/0261927X20969752.
  • Hunter, G. L., and S. A. Taylor. 2019. “The Relationship Between Preference for Privacy and Social Media Usage.” Journal of Consumer Marketing. Advance online publication. doi:10.1108/JCM-11-2018-2927.
  • Hyde, J. S. 2005. “The Gender Similarities Hypothesis.” The American Psychologist 60 (6): 581–592. doi:10.1037/0003-066X.60.6.581.
  • Katell, M. A., S. R. Mishra, and L. Scaff. 2016. “A Fair Exchange: Exploring How Online Privacy is Valued.” In 49th Hawaii International Conference on System Sciences (HICSS), 1881–1891. doi:10.1109/HICSS.2016.239.
  • Khan, N. F., N. Ikram, H. Murtaza, and M. A. Asadi. 2021. “Social Media Users and Cybersecurity Awareness: Predicting Self-Disclosure Using a Hybrid Artificial Intelligence Approach.” Kybernetes. doi:10.1108/K-05-2021-0377.
  • Khemakhem, H., M. Maalej, and R. Fontaine. 2022. “Inside the Black Box: How Can Gender Diversity Make a Difference in the Boardroom?” Equality, Diversity and Inclusion: An International Journal 41 (6): 889–906. doi:10.1108/EDI-07-2021-0178.
  • Kim, Y. 2019. “Predicting Information Self-Disclosure on Facebook: The Interplay Between Concern for Privacy and Need for Uniqueness.” International Journal of Contents, 74–81. doi:10.5392/IJoC.2019.15.4.074.
  • Kim, Y., B. Choi, and Y. Jung. 2018. “Individual Differences in Online Privacy Concern.” Asia Pacific Journal of Information Systems 28 (4): 274–289. doi:10.14329/APJIS.2018.28.4.274.
  • Kim, J. Y., R. Fusaroli, H. W. Park, and A. Bechmann. 2021. “Systemic Gendering in Facebook Group Participation.” Social Media + Society 7 (4): 205630512110649. doi:10.1177/20563051211064906.
  • Kishore, S. 2017. “The Social Web Gendered Privacy Model: A Perspective from Late-Adolescent Females.” Master thesis, University of Auckland, Auckland.
  • Kline, L. M., ed. 2016. Principles and Practice of Structural Equation Modeling. 4th ed. New York: The Guilford Press.
  • Kosciesza, A. J. 2022. “Intersectional Gender Measurement: Proposing a New Metric for Gender Identity and Gender Experience.” Feminist Media Studies, 1–16. doi:10.1080/14680777.2021.2018008.
  • Kurt, M. 2010. “Determination of in Internet Privacy Behaviours of Students.” Procedia - Social and Behavioral Sciences 9: 1244–1250. doi:10.1016/j.sbspro.2010.12.314.
  • Lai, S. S. 2021. “‘She’s the Communication Expert’: Digital Labor and the Implications of Datafied Relational Communication.” Feminist Media Studies, 1–15. doi:10.1080/14680777.2021.1998181.
  • Larsen, R. 2011. “Missing Data Imputation Versus Full Information Maximum Likelihood with Second-Level Dependencies.” Structural Equation Modeling: A Multidisciplinary Journal 18 (4): 649–662. doi:10.1080/10705511.2011.607721.
  • Lee-Won, R. J., T. N. White, and B. Potocki. 2018. “The Black Catalyst to Tweet: The Role of Discrimination Experience, Group Identification, and Racial Agency in Black Americans’ Instrumental use of Twitter.” Information, Communication & Society 21 (8): 1097–1115. doi:10.1080/1369118X.2017.1301516.
  • Lee, H., S. F. Wong, J. Oh, and Y. Chang. 2019. “Information Privacy Concerns and Demographic Characteristics: Data from a Korean Media Panel Survey.” Government Information Quarterly 36 (2): 294–303. doi:10.1016/j.giq.2019.01.002.
  • Li, K., Z. Lin, and X. Wang. 2015. “An Empirical Analysis of Users’ Privacy Disclosure Behaviors on Social Network Sites.” Information and Management 52 (7): 882–891. doi:10.1016/j.im.2015.07.006.
  • Lin, C., and E. D. Deemer. 2021. “Stereotype Threat and Career Goals among Women in STEM: Mediating and Moderating Roles of Perfectionism.” Journal of Career Development 48 (5): 569–583. doi:10.1177/0894845319884652.
  • Linabary, J. R., and D. J. Corple. 2019. “Privacy for Whom? A Feminist Intervention in Online Research Practice.” Information, Communication & Society 22 (10): 1447–1463. doi:10.1080/1369118X.2018.1438492.
  • Litt, E. 2013. “Understanding Social Network Site Users’ Privacy Tool Use.” Computers in Human Behavior 29 (4): 1649–1656. doi:10.1016/j.chb.2013.01.049.
  • Litt, E., and E. Hargittai. 2014. “Smile, Snap, and Share? A Nuanced Approach to Privacy and Online Photo-Sharing.” Poetics 42: 1–21. doi:10.1016/j.poetic.2013.10.002.
  • Lyvers, M., D. Cutinho, and F. A. Thorberg. 2020. “Alexithymia, Impulsivity, Disordered Social Media Use, Mood and Alcohol Use in Relation to Facebook Self-Disclosure.” Computers in Human Behavior 103: 174–180. doi:10.1016/j.chb.2019.09.004.
  • Malik, A., K. Hiekkanen, and M. Nieminen. 2016. “Privacy and Trust in Facebook Photo Sharing: Age and Gender Differences.” Program 50 (4): 462–480. doi:10.1108/PROG-02-2016-0012.
  • Marwick, A. E., and d. boyd. 2014. “Networked Privacy. How Teenagers Negotiate Context in Social Media.” New Media & Society 16 (7): 1051–1067. doi:10.1177/1461444814543995.
  • Masur, P. K. 2019. Situational Privacy and Self-Disclosure: Communication Processes in Online Environments. Cham: Springer International Publishing.
  • Masur, P. K., and S. Trepte. 2021. “Transformative or not? How Privacy Violation Experiences Influence Online Privacy Concerns and Online Information Disclosure.” Human Communication Research 47 (1): 49–74. doi:10.1093/hcr/hqaa012.
  • Matzner, T., P. K. Masur, C. Ochs, and T. von Pape. 2016. “Do-It-Yourself Data Protection – Empowerment or Burden?” In Law, Governance and Technology Series. Data Protection on the Move, edited by S. Gutwirth, R. Leenes, and P. D. Hert, Vol. 24, 277–305. Springer. doi:10.1007/978-94-017-7376-8_11.
  • McLaughlin, C., and J. Vitak. 2012. “Norm Evolution and Violation on Facebook.” New Media & Society 14 (2): 299–315. doi:10.1177/1461444811412712.
  • Meier, Y., J. Schäwel, E. Kyewski, and N. C. Krämer. 2020. “Applying Protection Motivation Theory to Predict Facebook Users’ Withdrawal and Disclosure Intentions.” In SMSociety'20: International Conference on Social Media and Society, 21–29. doi:10.1145/3400806.3400810.
  • Miles, A. 2017. A Taxonomy of Research Gaps: Identifying and Defining the Seven Research Gaps (No. 1). Dallas, TX.
  • Miller, L. C., J. H. Berg, and R. L. Archer. 1983. “Openers: Individuals Who Elicit Intimate Self-Disclosure.” Journal of Personality and Social Psychology 44 (6): 1234–1244. doi:10.1037/0022-3514.44.6.1234.
  • Money, J. 1955. “Hermaphroditism, Gender and Precocity in Hyperadrenocorticism.” Bulletin of the Johns Hopkins Hospital 96 (6): 253–264.
  • Mou, X., F. Xu, and J. T. Du. 2021. “Examining the Factors Influencing College Students’ Continuance Intention to Use Short-Form Video App.” Aslib Journal of Information Management. Advance online publication. doi:10.1108/AJIM-03-2021-0080.
  • Müller-Bloch, C., and J. Kranz. 2015. “A Framework for Rigorously Identifying Research Gaps in Qualitative Literature Reviews.” Undefined. https://www.semanticscholar.org/paper/A-Framework-for-Rigorously-Identifying-Research-in-M%C3%BCller-Bloch-Kranz/73596c4957deab7c7a3fd1d4261994e47be1508c.
  • Newman, M. L., C. J. Groom, L. D. Handelman, and J. W. Pennebaker. 2008. “Gender Differences in Language Use: An Analysis of 14,000 Text Samples.” Discourse Processes 45 (3): 211–236. doi:10.1080/01638530802073712.
  • Nielsen, M. B., B. Bjørkelo, G. Notelaers, and S. Einarsen. 2010. “Sexual Harassment: Prevalence, Outcomes, and Gender Differences Assessed by Three Different Estimation Methods.” Journal of Aggression, Maltreatment & Trauma 19 (3): 252–274. doi:10.1080/10926771003705056.
  • Park, Y. J. 2015. “Do Men and Women Differ in Privacy? Gendered Privacy and (In)equality in the Internet.” Computers in Human Behavior 50: 252–258. doi:10.1016/j.chb.2015.04.011.
  • Park, G., D. B. Yaden, H. A. Schwartz, M. L. Kern, J. C. Eichstaedt, M. Kosinski, D. Stillwell, L. H. Ungar, and M. E. P. Seligman. 2016. “Women Are Warmer but No Less Assertive Than Men: Gender and Language on Facebook.” PloS One 11 (5): e0155885. doi:10.1371/journal.pone.0155885.
  • Patel, U., and R. Roesch. 2020. “The Prevalence of Technology-Facilitated Sexual Violence: A Meta-Analysis and Systematic Review.” Trauma, Violence & Abuse. doi:10.1177/1524838020958057.
  • Petronio, S. 2002. Boundaries of Privacy. Albany: State University of New York Press.
  • Pew Research Center. 2018. Sexual Harassment at Work in the Era of #MeToo. https://www.pewsocialtrends.org/2018/04/04/sexual-harassment-at-work-in-the-era-of-metoo/.
  • Purushothaman, A., L. D. Holmfeld, and M. Kuruvilla. 2019. “Second Order Divide in Internet Usage in Developing Countries.” In Gender and Diversity: Concepts, Methodologies, Tools, and Applications, edited by I. R. Management Association, 38–51. Information Science Reference, an imprint of IGI Global. doi:10.4018/978-1-5225-6912-1.ch003.
  • Rodríguez-Priego, N., R. van Bavel, and S. Monteleone. 2016. “The Disconnection Between Privacy Notices and Information Disclosure: An Online Experiment.” Economia Politica 33 (3): 433–461. doi:10.1007/s40888-016-0040-4.
  • Rubin, J. D., L. Blackwell, and T. D. Conley. 2020. “Fragile Masculinity: Men, Gender, and Online Harassment.” In ACM Digital Library, Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems, edited by R. Bernhaupt, 1–14. Association for Computing Machinery. doi:10.1145/3313831.3376645.
  • Rui, J., and M. A. Stefanone. 2013. “Strategic Self-Presentation Online: A Cross-Cultural Study.” Computers in Human Behavior 29 (1): 110–118. doi:10.1016/j.chb.2012.07.022.
  • Scheibling, C. 2020. “‘Real Heroes Care’: How Dad Bloggers Are Reconstructing Fatherhood and Masculinities.” Men and Masculinities 23 (1): 3–19. doi:10.1177/1097184X18816506.
  • Shukla, A., and K. Bhasin. 2022. “Social Media Usage in Higher Education: Role in Marketing and Communication During COVID-19.” Transnational Marketing Journal 10 (1): 87–101. doi:10.33182/tmj.v10i1.1807.
  • Solove, D. J. 2008. Understanding Privacy. London: Harvard University Press.
  • Song, J., K. Han, D. Lee, and S. Kim. 2018. “‘Is a Picture Really Worth a Thousand Words?’: A Case Study on Classifying User Attributes on Instagram.” PloS One 13 (10): e0204938. doi:10.1371/journal.pone.0204938.
  • Spiliotopoulos, T., and I. Oakley. 2021. “Altruistic and Selfish Communication on Social Media: The Moderating Effects of Tie Strength and Interpersonal Trust.” Behaviour & Information Technology 40 (3): 320–336. doi:10.1080/0144929X.2019.1688392.
  • Stark, L., A. Stanhaus, and D. L. Anthony. 2020. “‘I Don't Want Someone to Watch Me While I'm Working’: Gendered Views of Facial Recognition Technology in Workplace Surveillance.” Journal of the Association for Information Science and Technology 71 (9): 1074–1088. doi:10.1002/asi.24342.
  • Stoller, R. J. 1964. “The Hermaphroditic Identity of Hermaphrodites.” The Journal of Nervous and Mental Disease 139: 453–457. doi:10.1097/00005053-196411000-00005.
  • Sundaram, V., K. Helweg-Larsen, B. Laursen, and P. Bjerregaard. 2004. “Physical Violence, Self Rated Health, and Morbidity: Is Gender Significant for Victimisation?” Journal of Epidemiology and Community Health 58 (1): 65–70. doi:10.1136/jech.58.1.65.
  • Tajfel, H., and J. Turner. 1979. “An Integrative Theory of Intergroup Conflict.” In The Social Psychology of Intergroup Relations, edited by J. A. Williams and S. Worchel, 33–47. Belmont: Wadsworth.
  • Tang, J., B. Zhang, and S. Xiao. 2022. “Examining the Intention of Authorization via Apps: Personality Traits and Expanded Privacy Calculus Perspectives.” Behavioral Sciences 12 (7). doi:10.3390/bs12070218.
  • Tenenboim-Weinblatt, K., and C. Baden. 2021. “Gendered Communication Styles in the News: An Algorithmic Comparative Study of Conflict Coverage.” Communication Research 48 (2): 233–256. doi:10.1177/0093650218815383.
  • Thelwall, M. 2011. “Privacy and Gender in the Social Web.” In Privacy Online. Perspectives on Privacy and Self-Disclosure in the Social Web, edited by S. Trepte and L. Reinecke, 251–266. Berlin: Springer.
  • Tifferet, S. 2019. “Gender Differences in Privacy Tendencies on Social Network Sites: A Meta-Analysis.” Computers in Human Behavior 93: 1–12. doi:10.1016/j.chb.2018.11.046.
  • Tifferet, S. 2020. “Gender Differences in Social Support on Social Network Sites: A Meta-Analysis.” Cyberpsychology, Behavior and Social Networking 23 (4): 199–209. doi:10.1089/cyber.2019.0516.
  • Toften, S., S. Pallesen, M. Hrozanova, F. Moen, and J. Grønli. 2020. “Validation of Sleep Stage Classification Using Non-Contact Radar Technology and Machine Learning (Somnofy®).” Sleep Medicine 75: 54–61. doi:10.1016/j.sleep.2020.02.022.
  • Trepte, S. 2021. “The Social Media Privacy Model: Privacy and Communication in the Light of Social Media Affordances.” Communication Theory 31 (4): 549–570. doi:10.1093/ct/qtz035.
  • Trepte, S., T. Dienlin, and L. Reinecke. 2014. “Influence of Social Support Received in Online and Offline Contexts on Satisfaction with Social Support and Satisfaction with Life. A Longitudinal Study.” Media Psychology 18 (1): 74–105. doi:10.1080/15213269.2013.838904.
  • Trepte, S., and P. K. Masur. 2017. “Need for Privacy.” In Encyclopedia of Personality and Individual Differences, edited by V. Zeigler-Hill and T. K. Shakelford. Springer. doi:10.1007/978-3-319-28099-8_540-1.
  • Trepte, S., and L. Reinecke. 2011. “The Social Web as Shelter for Privacy and Authentic Living.” In Privacy Online. Perspectives on Privacy and Self-Disclosure in the Social Web, edited by S. Trepte and L. Reinecke, 61–74. Berlin: Springer.
  • Trepte, S., and M. Scharkow. 2016. “Friends and Lifesavers: How Social Capital and Social Support Received in Media Environments Contribute to Well-Being.” In The Routledge Handbook of Media Use and Well-Being, edited by L. Reinecke and M. B. Oliver, 304–316. New York: Taylor & Francis.
  • Trepte, S., M. Scharkow, and T. Dienlin. 2020. “The Privacy Calculus Contextualized: The Influence of Affordances.” Computers in Human Behavior 104: 106115. doi:10.1016/j.chb.2019.08.022.
  • Trepte, S., D. Teutsch, P. K. Masur, C. Eicher, M. Fischer, A. Hennhöfer, and F. Lind. 2015. “Do People Know About Privacy and Data Protection Strategies? Towards the ‘Online Privacy Literacy Scale’ (OPLIS).” In Law, Governance and Technology Series: Volume 20. Reforming European Data Protection Law, edited by S. Gutwirth, R. Leenes, and P. D. Hert, 333–365. Dordrecht: Springer.
  • van Deursen, A. J. A. M., and E. J. Helsper. 2015. “A Nuanced Understanding of Internet Use and Non-Use Among the Elderly.” European Journal of Communication 30 (2): 171–187. doi:10.1177/0267323115578059.
  • Verhofstadt, L. L., A. Buysse, and W. Ickes. 2007. “Social Support in Couples: An Examination of Gender Differences Using Self-Report and Observational Methods.” Sex Roles 57 (3–4): 267–282. doi:10.1007/s11199-007-9257-6.
  • Vitak, J., K. Chadha, L. Steiner, and Z. Ashktorab. 2017. “Identifying Women's Experiences with and Strategies for Mitigating Negative Effects of Online Harassment.” In CSCW 17, Proceedings of the 2017 ACM Conference on Computer Supported Cooperative Work and Social Computing, 1231–1245. Association for Computing Machinery. doi:10.1145/2998181.2998337.
  • Wang, Q., Y. Liu, and K. Mati. 2020. “Bully Victimization is a Correlate of Sleep Loss Over Worry (SLOW) among Adolescents in Four South-East Asian Countries.” Sleep Medicine 69: 179–188. doi:10.1016/j.sleep.2020.01.022.
  • Warren, S. D., and L. D. Brandeis. 1890. “The Right to Privacy.” Harvard Law Review 4 (5): 193–220. doi:10.2307/1321160.
  • Wawra, D. 2015. “Digital Communication and Privacy: Is Social Web Use Gendered?” Arbeiten Aus Anglistik Und Amerikanistik 40: 219–245.
  • Westin, A. F. 1967. Privacy and Freedom. New York: Atheneum.
  • Wood, J. T. 1995. “Feminist Scholarship and the Study of Relationships.” Journal of Social and Personal Relationships 12: 147–178. doi:10.1177/0265407595121011.
  • Wright, P. J. 2020. “Pornography and Sexual Behavior: Do Sexual Attitudes Mediate or Confound?” Communication Research 47 (3): 451–475. doi:10.1177/0093650218796363.
  • Xie, W., and C. Kang. 2015. “See You, See Me: Teenagers’ Self-Disclosure and Regret of Posting on Social Network Site.” Computers in Human Behavior 52: 398–407. doi:10.1016/j.chb.2015.05.059.
  • Yildirim, M., and S. Uslu. 2018. “Investigation of Reasons of Social Media Usage of Physical Education and Sports School Students.” International Journal of Higher Education 7 (6): 129–138. doi:10.5430/ijhe.v7n6p129. https://eric.ed.gov/?id=EJ1201256.
  • Zhang, R., and J. S. Fu. 2020. “Privacy Management and Self-Disclosure on Social Network Sites: The Moderating Effects of Stress and Gender.” Journal of Computer-Mediated Communication 25 (3): 236–251. doi:10.1093/jcmc/zmaa004.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.