skip to main content
research-article

Does displaying one's IP location influence users' privacy behavior on social media? Evidence from China's Weibo

Published: 17 July 2024 Publication History

Abstract

Internet protocol (IP) addresses are significant information that can reveal users' locations. However, users may not be aware of it since IP-related information is rarely displayed on social media around the globe. In March 2022, China unexpectedly implemented a regulation that compulsorily displays users' IP locations on a wide range of social media platforms such as Weibo. To explore how users perceive the new function and potential consequences of such policies, this study adopts a qualitative approach by applying privacy calculus theory to examine the factors that influence users’ privacy behavior in this context. The results suggest that users hold different privacy perceptions regarding IP location display. Moreover, the perceived costs for many users outweigh the benefits associated with IP location display, leading them to reduce their self-disclosure and prompting the adoption of privacy management strategies on Weibo.

Highlights

Participants perceived IP location display on social media to be a privacy issue.
The perceived costs of self-disclosure outweighed the benefits when IP location is displayed.
Interpersonal relationships were a primary source of privacy concerns for the participants.
Participants held a neutral attitude even though IP location display affected their privacy behavior.

References

[1]
M. Büchi, N. Festic, M. Latzer, The chilling effects of digital Dataveillance: A theoretical model and an empirical research agenda, Big Data & Society 9 (1) (2022),.
[2]
D. Boyd, N.B. Ellison, Social network sites: Definition, history, and scholarship, Journal of Computer-Mediated Communication 13 (1) (2007) 210–230,.
[3]
V. Braun, V. Clarke, Using thematic analysis in psychology, Qualitative Research in Psychology 3 (2) (2006) 77–101,.
[4]
J. Bryce, J. Fraser, The role of disclosure of personal information in the evaluation of risk and trust in young people's online interactions, Computers in Human Behavior 30 (2014) 299–306,.
[5]
H. Chen, Revisiting the privacy paradox on social media with an extended privacy calculus model: The effect of privacy concerns, privacy self-efficacy, and social capital on privacy management, American Behavioral Scientist 62 (10) (2018) 1392–1412,.
[6]
H. Chen, W. Chen, Couldn't or wouldn't? The influence of privacy concerns and self-efficacy in privacy management on privacy protection, Cyberpsychology, Behavior, and Social Networking 18 (1) (2015) 13–19.
[7]
Z. Chen, M. Cheung, Privacy perception and protection on Chinese social media: A case study of WeChat, Ethics and Information Technology 20 (4) (2018) 279–289,.
[8]
M.J. Culnan, P.K. Armstrong, Information privacy concerns, procedural fairness, and impersonal trust: An empirical investigation, Organization Science 10 (1) (1999) 104–115,.
[9]
T. Dienlin, M.J. Metzger, An extended privacy calculus model for SNSs: Analyzing self-disclosure and self-withdrawal in a representative U.S. sample, Journal of Computer-Mediated Communication 21 (5) (2016) 368–383,.
[10]
T. Dinev, M. Bellotto, P. Hart, V. Russo, I. Serra, C. Colautti, Privacy calculus model in e-commerce – a study of Italy and the United States, European Journal of Information Systems 15 (4) (2006) 389–402,.
[11]
T. Dinev, P. Hart, An extended privacy calculus model for E-Commerce transactions, Information Systems Research 17 (1) (2006) 61–80,.
[12]
T. Dinev, H. Xu, J.H. Smith, P. Hart, Information privacy and correlates: An empirical attempt to bridge and distinguish privacy-related concepts, European Journal of Information Systems 22 (3) (2013) 295–316,.
[13]
J. Dong, China's internet censors try a new trick: Revealing users' locations, The New York Times, 2022, https://www.nytimes.com/2022/05/18/business/china-internet-censors-ip-address.html.
[14]
T. Fernandes, N. Pereira, Revisiting the privacy calculus: Why are consumers (really) willing to disclose personal data online?, Telematics and Informatics 65 (2021),.
[15]
A. Gutierrez, S. O'Leary, N.P. Rana, Y.K. Dwivedi, T. Calle, Using privacy calculus theory to explore entrepreneurial directions in mobile location-based advertising: Identifying intrusiveness as the critical risk factor, Computers in Human Behavior 95 (2019) 295–306,.
[16]
G. Hofstede, Culture's consequences: Comparing values, behaviors, institutions, and organizations across nations, 2nd ed., Sage Publications, 2001.
[17]
X. Huang, Wang Luo ping tai gong kai yong hu IP shu di xing wei de fa li fen xi, Youth Journalist (2) (2023) 86–88,.
[18]
H. Kang, J. Oh, Communication privacy management for smart speaker use: Integrating the role of privacy self-efficacy and the multidimensional view, New Media & Society (2021),.
[19]
M.J. Keith, S.C. Thompson, J. Hale, P.B. Lowry, C. Greer, Information disclosure on mobile devices: Re-Examining privacy calculus with actual user behavior, International Journal of Human-Computer Studies 71 (12) (2013) 1163–1173,.
[20]
B.P. Knijnenburg, E.M. Raybourn, D. Cherry, D. Wilkinson, S. Sivakumar, H. Sloan, Death to the privacy calculus?, Social Science Research Network (2017),.
[21]
S. Kokolakis, Privacy attitudes and privacy behaviour: A review of current research on the privacy paradox phenomenon, Computers & Security 64 (2017) 122–134,.
[22]
R.S. Laufer, M. Wolfe, Privacy as a concept and a social issue: A multidimensional developmental theory, Journal of Social Issues 33 (3) (1977) 22–42,.
[23]
J. Li, China's internet platforms are revealing user location—and embarrassing nationalist bloggers, Quartz, 2022, https://qz.com/2163704/chinas-internet-platforms-are-revealing-user-ip-locations.
[24]
P. Li, H. Cho, Z.H. Goh, Unpacking the process of privacy management and self-disclosure from the perspectives of regulatory focus and privacy calculus, Telematics and Informatics 41 (2019) 114–125,.
[25]
J.P. Lilgendahl, D.P. McAdams, Constructing stories of self-growth: How individual differences in patterns of autobiographical reasoning relate to well-being in midlife, Journal of Personality 79 (2) (2011) 391–428,.
[26]
Z. Liu, Q. Min, Q. Zhai, R. Smyth, Self-disclosure in Chinese micro-blogging: A social exchange theory perspective, Information & Management 53 (1) (2016) 53–63,.
[27]
Z. Liu, J. Shan, R. Bonazzi, Y. Pigneur, Privacy as a tradeoff: Introducing the notion of privacy calculus for context-aware mobile applications, in: 2014 47th Hawaii International Conference on system sciences, 2014, pp. 1063–1072,.
[28]
Y.L. Liu, W. Yan, B. Hu, Resistance to facial recognition payment in China: The influence of privacy-related factors, Telecommunications Policy 45 (5) (2021),.
[29]
J. Liu, H. Zhao, Privacy lost: Appropriating surveillance technology in China's fight against COVID-19, Business Horizons 64 (6) (2021) 743–756,.
[30]
S. Lu, As China tightens controls on social media, some users seek refuge under the radar, The Wallstreet Journal (2022, August 4) https://www.wsj.com/articles/as-china-tightens-controls-on-social-media-some-users-seek-refuge-under-the-radar-11659551841.
[31]
Y.H. Lv, Privacy and data privacy issues in contemporary China, Ethics and Information Technology 7 (1) (2005) 7–15,.
[32]
Y. Ma, Relational privacy: Where the East and the West could meet, Proceedings of the Association for Information Science and Technology 56 (1) (2019) 196–205,.
[33]
P.K. Masur, M. Scharkow, Disclosure management on social network sites: Individual privacy perceptions and user-directed privacy strategies, Social Media and Society 2 (1) (2016),.
[34]
F. Morando, R. Iemma, E. Raiteri, Privacy evaluation: What empirical research on users' valuation of personal data tells us, Internet Policy Review 3 (2) (2014),. Scopus.
[35]
M. Ojeda, A. Dodaj, K. Sesar, R. Del Rey, “Some voluntarily and some under pressure”: Conceptualization, reasons, attitudes, and consequences of sexting among adolescents, Telematics and Informatics 75 (2022),.
[36]
W.J. Orlikowski, C.S. Iacono, Research commentary: Desperately seeking the “IT” in IT research—a call to theorizing the IT artifact, Information Systems Research 12 (2) (2001) 121–134,.
[37]
Penney, J. (2017). Internet Surveillance, Regulation, and chilling Effects Online: A comparative case study. (May 27, 2017), 6(2). https://papers.ssrn.com/sol3/papers.cfm?abstract_id=2959611.
[38]
S. Petronio, Boundaries of privacy: Dialectics of disclosure, State University of New York Press, 2012.
[39]
I. Poese, S. Uhlig, M.A. Kaafar, B. Donnet, B. Gueye, IP geolocation databases: Unreliable?, ACM SIGCOMM - Computer Communication Review 41 (2) (2011) 53–56.
[40]
L.W. Pye, The state and the individual: An overview Interpretations.st interpretation, The China Quarterly 127 (1991) 443–466,. Scopus.
[41]
F. Rabiee, Focus-group interview and data analysis, Proceedings of the Nutrition Society 63 (4) (2004) 655–660,.
[42]
Reuters, China's Weibo shows user locations to combat ‘bad behavior, CNN, 2022, https://edition.cnn.com/2022/04/28/tech/weibo-user-location-bad-behavior/index.html.
[43]
R.W. Rogers, Cognitive and physiological processes in fear appeals and attitude change: A revised theory of protection motivation, in: J.T. Cacioppo, R.E. Petty, R.E. Petty (Eds.), Social psychophysiology: A sourcebook, Guilford Press, New York, 1983, pp. 153–177.
[44]
F. Schauer, Fear, risk and the first amendment: Unraveling the chilling effect, BUL rev. 58 (1978) 685.
[45]
H.J. Smith, T. Dinev, H. Xu, Information privacy research: An interdisciplinary review, MIS Quarterly 35 (4) (2011) 989–1015,.
[46]
E.F. Stone, H.G. Gueutal, D.G. Gardner, S.L. McClure, A field experiment comparing information-privacy values, beliefs, and attitudes across several types of organizations, Journal of Applied Psychology 68 (3) (1983) 459–468,.
[47]
Y. Sun, N. Wang, X.L. Shen, J.X. Zhang, Location information disclosure in location-based social network services: Privacy calculus, benefit structure, and gender differences, Computers in Human Behavior 52 (2015) 278–292,.
[48]
J. Swain, A hybrid approach to thematic analysis in qualitative research: Using a practical example, SAGE Publications Ltd, 2018.
[49]
S. Trepte, The social media privacy model: Privacy and communication in the light of social media affordances, Communication Theory 31 (4) (2020) 549–570,.
[50]
S. Trepte, L. Reinecke, N.B. Ellison, O. Quiring, M.Z. Yao, M. Ziegele, A cross-cultural perspective on the privacy calculus, Social Media+ Society 3 (1) (2017),.
[51]
J. Vitak, The impact of context collapse and privacy on social network site disclosures, Journal of Broadcasting & Electronic Media 56 (4) (2012) 451–470,.
[52]
D. Wang, Wang Luo ping tai gong kai yong hu IP shu di xin xi de shi fa xing fen xi, Social Science in Xinjiang 240 (5) (2022) 123–130,. +180.
[53]
G. Wang, Z. Liu, What collective? Collectivism and relationalism from a Chinese perspective, Chinese Journal of Communication 3 (1) (2010) 42–63,.
[54]
Y. Wang, G. Norice, L.F. Cranor, Who is concerned about what? A study of American, Chinese and Indian users’ privacy concerns on social network sites, Trust and Trustworthy Computing (2011) 146–153,.
[55]
S.D. Warren, L.D. Brandeis, The right to privacy, Harvard Law Review 4 (5) (1890) 193,.
[56]
A.F. Westin, Privacy and freedom, 1st ed., Atheneum, 1967.
[57]
H. Xu, The Effects of self-construal and perceived control on privacy concerns, in: International conference on information systems (ICIS), 2007, 125 http://aisel.aisnet.org/cgi/viewcontent.cgi?article=1282&context=icis2007.
[58]
H. Xu, T. Dinev, H.J. Smith, P. Hart, Examining the formation of individual's privacy concerns: Toward an integrative view, ICIS 2008 Proceedings 6 (2008).
[59]
H. Xu, H.-H. Teo, B.C.Y. Tan, R. Agarwal, The role of push-pull technology in privacy calculus: The case of location-based services, Journal of Management Information Systems 26 (3) (2009) 135–174,.
[60]
Y. Yan, The individualization of Chinese society, 1st ed., Routledge, 2009,.
[61]
C. Yan, The legal attribution of IP location and platform liability review, Network and ZhangInformation Security 41 (5) (2022) 59–65,. 59-65. (11.
[62]
W. Yip, China’s social media platforms, including the country’s TikTok and its version of Instagram, are set to show users’ locations based on their IP addresses, Business Insider (2022, April 18) https://www.insider.com/china-social-platforms-to-make-user-locations-visible-ip-addresses-2022-4.
[63]
E.J. Yuan, M. Feng, J.A. Danowski, “Privacy” in semantic networks on Chinese social media: The case of Sina Weibo, Journal of Communication 63 (6) (2013) 1011–1031,.
[64]
R. Zhang, J.S. Fu, Privacy management and self-disclosure on social network sites: The moderating effects of stress and gender, Journal of Computer-Mediated Communication 25 (3) (2020) 236–251.
[65]
C. Zhang, G. Wang, Legal attributes of IP attribution information under China's PIPL: Clarification of identifiability terminology and operationalisation of identifiability criteria, Beijing Law Review 13 (3) (2022) 626–639.
[66]
L. Zhao, Y. Lu, S. Gupta, Disclosure intention of location-related information in location-based social network services, International Journal of Electronic Commerce 16 (4) (2012) 53–90,.
[67]
Zhiwei Data, Weibo quanliang kaifang IPshudi gongneng, 2022, https://ef.zhiweidata.com/eventOverview/c18c6b2a54b6ce4a10065101.html.

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image Telecommunications Policy
Telecommunications Policy  Volume 48, Issue 5
Jun 2024
194 pages

Publisher

Pergamon Press, Inc.

United States

Publication History

Published: 17 July 2024

Author Tags

  1. IP location display
  2. Self-disclosure
  3. Privacy management
  4. Privacy calculus theory
  5. Weibo

Qualifiers

  • Research-article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • 0
    Total Citations
  • 0
    Total Downloads
  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 10 Nov 2024

Other Metrics

Citations

View Options

View options

Get Access

Login options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media