International Journal of Academic Research in Business and Social Sciences

search-icon

Key Drivers of Privacy Protection Behavior in Social Networking Sites: A Motivational Perspective

Open access
The increasing prevalence of social networking sites (SNSs) has raised concerns about users' privacy protection behavior. Despite the presence of privacy settings and policies, users often engage in behaviors that expose them to potential privacy breaches. This study investigates the key determinants influencing privacy protection behavior on SNSs, guided by the Protection Motivation Theory (PMT). Specifically, the study examines the role of perceived severity, perceived vulnerability, response efficacy, self-efficacy, and information privacy concerns in shaping users’ privacy protection strategies. A quantitative research approach was employed, utilizing a structured questionnaire distributed to undergraduate students in Malaysia. A total of 485 valid responses were analyzed using Structural Equation Modeling (SEM) to assess the relationships between the variables. The findings reveal that perceived severity, perceived vulnerability, self-efficacy, and response efficacy significantly influence information privacy concerns, which, in turn, drive users to adopt privacy protection behaviors. However, reward was found to have no significant impact on information privacy concern. These results underscore the importance of enhancing users’ awareness and confidence in managing their online privacy. The study contributes to both theory and practice by offering insights into how SNS users perceive and respond to privacy threats, thereby informing the development of more effective privacy education and intervention strategies.
Adhikari, K., & Panda, R. K. (2017). Users’ information privacy concerns and privacy protection behaviors in social networks: Evidence from India.
Ary, D., Jacobs, L. C., Sorensen, C., & Razavieh, A. (2010). Introduction to research in education (8th ed.). Wadsworth Cengage Learning.
Boyd, D. (2008). Facebook’s privacy trainwreck: Exposure, invasion, and social convergence. Convergence: The International Journal of Research into New Media Technologies, 14(1), 13–20. https://doi.org/10.1177/1354856507084416
Chen, H., Beaudoin, C. E., & Hong, T. (2017). Securing online privacy: An empirical test on Internet scam victimization, online privacy concerns, and privacy protection behaviors. Computers in Human Behavior, 70, 291–302. https://doi.org/10.1016/j.chb.2017.01.014
Compeau, D., Higgins, C. A., & Huff, S. (1999). Social cognitive theory and individual reactions to computing technology: A longitudinal study. MIS Quarterly, 23(2), 145–158. https://doi.org/10.2307/249749
Grindley, E. J., Zizzi, S. J., & Nasypany, A. M. (2008). Use of protection motivation theory, affect, and barriers to understand and predict adherence to outpatient rehabilitation. Physical Therapy: Journal of the American Physical Therapy Association, 88(12), 1529–1540. https://doi.org/10.2522/ptj.20070318
Johnston, B. A. C., & Warkentin, M. (2010). Fear appeals and information security behaviors: An empirical study. Journal of the Ministry of Education Official Website, 34(3), 549–566.
Kim, A. Y., & Kim, T. S. (2016). Factors influencing the intention to adopt identity theft protection services: Severity vs. vulnerability. In Proceedings of the Pacific Asia Conference on Information Systems (PACIS) (p. 68).
Kokolakis, S. (2017). Privacy attitudes and privacy behavior: A review of current research on the privacy paradox phenomenon. Computers & Security, 64, 122–134. https://doi.org/10.1016/j.cose.2015.07.002
Malaysian Communications and Multimedia Commission (MCMC). (2014). Communications & multimedia pocket book of statistics.
Marett, K., McNab, A. L., & Harris, R. B. (2011). Social networking websites and posting personal information: An evaluation of protection motivation theory. AIS Transactions on Human-Computer Interaction, 3(3), 170–188.
Martin, K. D., Borah, A., & Palmatier, R. W. (2017). Data privacy: Effects on customer and firm performance. Journal of Marketing, 81(1), 36–58. https://doi.org/10.1509/jm.15.0497
Nemec Zlatolas, L., Welzer, T., Heri?ko, M., & Hölbl, M. (2015). Privacy antecedents for SNS self-disclosure: The case of Facebook. Computers in Human Behavior, 45, 158–167. https://doi.org/10.1016/j.chb.2014.12.012
Palladino, B. E., Menesini, E., Nocentini, A., Luik, P., Naruskov, K., Ucanok, Z., ... & Scheithauer, H. (2017). Perceived severity of cyberbullying: Differences and similarities across four countries. Frontiers in Psychology, 8, 1524. https://doi.org/10.3389/fpsyg.2017.01524
Salleh, N., Hussein, R., Mohamed, N., Abdul, N. S., Ahlan, A. R., & Aditiawarman, U. (2012). Examining information disclosure behavior on social network sites using protection motivation theory, trust, and risk. Journal of Internet Social Networking & Virtual Communities, 2012, 1–12.
Schoeman, F. (Ed.). (1984). Philosophical dimensions of privacy: An anthology. Cambridge University Press.
Sedek, M., Mahmud, R., Jalil, H. A., & Daud, S. M. (2012). Types and levels of ubiquitous technology use among ICT undergraduates. Procedia - Social and Behavioral Sciences, 64, 255–264. https://doi.org/10.1016/j.sbspro.2012.11.030
Sedek, M., & Mohd, C. K. N. C. K. (2025). Exploring Educators’ Perception of and Readiness for Hybrid Flexible Learning in Technical and Vocational Education and Training (TVET) in Higher Education. Scientific Journal of King Faisal University: Humanities and Management Sciences.
Vithessonthi, C. (2010). Knowledge sharing, social networks, and organizational transformation. The Business Review, Cambridge, 15(2), 99–109.
Warren, S. D., & Brandeis, L. D. (1890). The right to privacy. Harvard Law Review, 4(5), 193–220.
Sedek, M., Raus, T. Z. M., & Othman, N. fadzilah. (2025). Key Drivers of Privacy Protection Behavior in Social Networking Sites: A Motivational Perspective. International Journal of Academic Research in Business and Social Sciences, 15(3), 2130–2139.