

Publisher: Emerald Group Publishing Ltd
E-ISSN: 1468-4535|39|7|923-938
ISSN: 1468-4527
Source: Online Information Review, Vol.39, Iss.7, 2015-11, pp. : 923-938
Disclaimer: Any content in publications that violate the sovereignty, the constitution or regulations of the PRC is not accepted or approved by CNPIEC.
Abstract
<title content-type="abstract-heading">Purpose</title>– The purpose of this paper is to examine how users in an anonymous virtual environment react to an offer to trade in access to their social network profile.<title content-type="abstract-heading">Design/methodology/approach</title>– The experiment was conducted in Second Life (SL). Participants were offered varied sums of money in exchange for access to their Facebook profile, effectively undermining their anonymity.<title content-type="abstract-heading">Findings</title>– Even in an anonymous environment, money plays a role in users’ decisions to disclose their offline identity, but a closer look at the findings reveals that users also use deception to enjoy the benefits of the offer without paying the costs. The results illustrate three types of users according to the strategies they employ: abstainers, traders, and deceivers.<title content-type="abstract-heading">Research limitations/implications</title>– The implications to the field of online information disclosure lie at the ability to illustrate and distinguish between the different strategies users choose with regard to online information disclosure, as the study design simulates a common information disclosure trade offer in online environments.<title content-type="abstract-heading">Originality/value</title>– Unlike previous studies that focussed on trades with specific pieces of information, this study examines willingness to sell access to a user’s entire profile, by thus better simulating online services conduct. This is also the first privacy experiment conducted in the anonymous environment of SL, and the first to study deception as a privacy protection strategy.
Related content






Information Management & Computer Security, Vol. 3, Iss. 1, 1995-01 ,pp. :




JOURNAL OF THE ASSOCIATION FOR INFORMATION SCIENCE AND TECHNOLOGY, Vol. 66, Iss. 4, 2015-04 ,pp. :