Unpacking Privacy Practices in SNSs: Users’ Protection Strategies to Enforce Privacy Boundaries

Thumbnail Image

Date

Journal Title

Journal ISSN

Volume Title

Publisher

Abstract

With the emergence of Social Networking Sites (SNSs), privacy management has become a great area of concern. Many of the studies in this area reach contradictory findings regarding how people make and regulate their online privacy decisions; it remains unclear how privacy management is enacted and how online privacy choices are made by different populations within varying contexts. This lack of clarity around behaviours and attitudes makes creating legislation and designing new systems to protect privacy challenging. Consequently, this study set out to investigate and observe how privacy in SNSs is dynamically regulated through the usage of the social and technological strategies that users apply to build online imaginary boundaries, or barriers, around their private information. Our research highlights the dynamic privacy-management practices through which privacy and interpersonal boundaries are maintained and preserved in SNSs. Moreover, we have examined the impact of gender, age, privacy concerns and turbulence on the protection behaviour of our sample. Cultural impact was also explored through the lenses of a western and a non-western perspective, specifically the UK and the Saudi Arabian cultures. We integrate both quantitative and qualitative methods to answer our research questions, where a comprehensive view of the proposed framework was created through a concurrent mixed methods approach. In the first phase of this study, a systematic literature review was carried out to present a comprehensive review of the literature related to privacy protection strategies in order to create a framework of those strategies and to highlight where evidence may be lacking. The second phase involved interviews with experts to verify and validate the suggested framework. Twelve experts in the privacy field were involved and they approved the proposed framework and confirmed the significance of its measures. In the third phase, our framework was used as the basis for an online questionnaire to explore the popularity of those strategies. The sample size was 681 members, of which 187 represent the UK culture and 494 represent the Saudi Arabian culture. We were then able to classify users in our sample based on their usage of the different privacy strategies. The last phase of this study was aimed at justifying the findings of the online questionnaire. Follow-up interviews were developed and undertaken with 20 people from both cultures to gain a deeper understanding on why some privacy strategies in the survey have received more usage than the others. In this study, evidence was found that SNSs’ users indeed engage in a variety of protective selfpresentations’ strategies to manage their identities online. Most of our proposed strategies were used to a statically higher extent by Saudi users. We were able to classify users based on their usage of these strategies into one of three clusters. Two of these clusters displayed similar behaviours across both cultures, with either a high usage of all strategies or no usage at all. However, the second cluster uncovered some important differences between cultures where Saudi sample incorporated three distinct strategies (segment audience, self-censoring and deletion) which indicates a balance between the most used privacy strategies. On the other hand, the UK sample in this cluster combined a remarkable choice of strategies where (falsification, multiple profiles, social steganography and advanced strategic sharing) have emerged as strategies used by the second cluster in the UK sample (that we named falsifiers). The results indicate that UK users are more concerned about their privacy when compared to Saudi users. The results indicate that UK users are more concerned about their privacy when compared to Saudi users. Moreo

Description

Keywords

Citation

Endorsement

Review

Supplemented By

Referenced By

Copyright owned by the Saudi Digital Library (SDL) © 2025