메뉴 건너뛰기




Volumn 31, Issue 4, 2012, Pages 355-370

Privacy in instant messaging: An impression management model

Author keywords

impression management; instant messaging (IM); linear structural model; privacy; self presentation; visibility of impression

Indexed keywords

AWARENESS SYSTEMS; COLLABORATIVE WORK; COMMUNICATION PARTNERS; IMPRESSION MANAGEMENT; INSTANT MESSAGING; LINEAR STRUCTURAL MODEL; ONLINE SURVEYS; SELF PRESENTATIONS; STRUCTURAL MODELLING; UNDERLYING CAUSE;

EID: 77957951836     PISSN: 0144929X     EISSN: 13623001     Source Type: Journal    
DOI: 10.1080/01449291003611326     Document Type: Article
Times cited : (31)

References (99)
  • 2
    • 0001807712 scopus 로고    scopus 로고
    • Hanging on the wire: A field study of an audio-only media space
    • Ackerman, M.S., et al., 1997. Hanging on the wire: A field study of an audio-only media space. ACM Transactions in Computer-Human Interaction, 4 (1), 39-66.
    • (1997) ACM Transactions in Computer-Human Interaction , vol.4 , Issue.1 , pp. 39-66
    • Ackerman, M.S.1
  • 4
    • 0007141905 scopus 로고    scopus 로고
    • Privacy issues in ubiquitous multimedia environments: Wake sleeping dogs, or let them lie?
    • Edinburgh
    • Adams, A. and Sasse, M.A., 1999. Privacy issues in ubiquitous multimedia environments: Wake sleeping dogs, or let them lie?. In: Seventh IFIP Conference on Human-Computer Interaction INTERACT '99, Edinburgh: 214-221.
    • (1999) Seventh IFIP Conference on Human-Computer Interaction INTERACT '99 , pp. 214-221
    • Adams, A.1    Sasse, M.A.2
  • 9
    • 84993894931 scopus 로고
    • Privacy regulation: Culturally universal or culturally specific?
    • Altman, I., 1977. Privacy regulation: Culturally universal or culturally specific? Journal of Social Issues, 3 (3), 66-84.
    • (1977) Journal of Social Issues , vol.3 , Issue.3 , pp. 66-84
    • Altman, I.1
  • 11
    • 41449097537 scopus 로고    scopus 로고
    • Impression management in chat rooms: A grounded theory model
    • Becker, J.A.H. and Stamp, G.H., 2001. Impression management in chat rooms: A grounded theory model. Communication Research, 56 (3), 243-260.
    • (2001) Communication Research , vol.56 , Issue.3 , pp. 243-260
    • Becker, J.A.H.1    Stamp, G.H.2
  • 13
    • 0003062691 scopus 로고    scopus 로고
    • What you don't know can hurt you: Privacy in collaborative computing
    • London, UK: Springer-Verlag
    • Bellotti, V., 1996. What you don't know can hurt you: Privacy in collaborative computing. In: HCI '96: Proceedings of HCI on People and Computers XI. London, UK: Springer-Verlag, 241-261.
    • (1996) HCI '96: Proceedings of HCI on People and Computers XI , pp. 241-261
    • Bellotti, V.1
  • 15
    • 33746830836 scopus 로고    scopus 로고
    • Teenage communication in the instant messaging era
    • In: R. Kraut, M. Brynin, and S. Kiesler, eds. Oxford: Oxford University Press
    • Boneva, B., et al., 2004. Teenage communication in the instant messaging era. In: R. Kraut, M. Brynin, and S. Kiesler, eds. Information technology at home. Oxford: Oxford University Press.
    • (2004) Information Technology at Home
    • Boneva, B.1
  • 16
    • 33745168965 scopus 로고    scopus 로고
    • The language of privacy: Learning from video media space analysis and design
    • Boyle, M. and Greenberg, S., 2005. The language of privacy: Learning from video media space analysis and design. ACM Transactions in Computer-Human Interaction, 12 (2), 328-370.
    • (2005) ACM Transactions in Computer-Human Interaction , vol.12 , Issue.2 , pp. 328-370
    • Boyle, M.1    Greenberg, S.2
  • 18
    • 0000949828 scopus 로고
    • Privacy and communication
    • In: M. Burgoon, ed. Beverly Hills, CA: Sage Publications
    • Burgoon, J.K., 1982. Privacy and communication. In: M. Burgoon, ed. Communication yearbook 6. Beverly Hills, CA: Sage Publications, 206-249.
    • (1982) Communication Yearbook 6 , pp. 206-249
    • Burgoon, J.K.1
  • 19
    • 84965703890 scopus 로고
    • Maintaining and restoring privacy through communication in different types of relationships
    • Burgoon, J.K., et al., 1989. Maintaining and restoring privacy through communication in different types of relationships. Journal of Social and Personal Relationships, 6, 131-158.
    • (1989) Journal of Social and Personal Relationships , vol.6 , pp. 131-158
    • Burgoon, J.K.1
  • 20
    • 34250017735 scopus 로고    scopus 로고
    • Privacy fears shock facebook
    • Available from: [Accessed 27 March 2010]
    • Calore, M., 2006. Privacy Fears Shock Facebook. Wired News. Available from: Http://www.wired.com/science/discoveries/news/2006/09/71739 [Accessed 27 March 2010].
    • (2006) Wired News
    • Calore, M.1
  • 21
    • 46149119696 scopus 로고    scopus 로고
    • Online privacy control via anonymity and pseudonym: Cross-cultural implications
    • Chen, H.G., et al., 2008. Online privacy control via anonymity and pseudonym: Cross-cultural implications. Behaviour & Information Technology, 27 (3), 229-242.
    • (2008) Behaviour & Information Technology , vol.27 , Issue.3 , pp. 229-242
    • Chen, H.G.1
  • 25
    • 84859793536 scopus 로고
    • DD&eENL [online]. In: Digital Discovery & e-Evidence: Best-Practices and Evolving Law September 2009. Silver Spring, MD: Pike & Fischer. Available from: [Accessed 27 March 2010]
    • Cranor, L.F., 2002. Web privacy with P3P. Sebastopol, CA: O'Reilly & Associates, Inc. DD&eENL, 1993. Instant messages emerging as newest source of e-evidence [online]. In: Digital Discovery & e-Evidence: Best-Practices and Evolving Law 3(9), September 2009. Silver Spring, MD: Pike & Fischer. Available from: Http://sochaconsulting.com/Publications/DDEE%2009.03.pdf. [Accessed 27 March 2010].
    • (1993) Instant Messages Emerging as Newest Source of E-Evidence , vol.3 , Issue.9
  • 27
    • 32244445085 scopus 로고    scopus 로고
    • Managing impressions online: Self-presentation processes in the online dating environment
    • Ellison, N., Heino, R., and Gibbs, J., 2006. Managing impressions online: Self-presentation processes in the online dating environment. Journal of Computer-Mediated Communication, 11 (2), 415-441.
    • (2006) Journal of Computer-Mediated Communication , vol.11 , Issue.2 , pp. 415-441
    • Ellison, N.1    Heino, R.2    Gibbs, J.3
  • 29
    • 58149438481 scopus 로고
    • Informal social communication
    • Festinger, L., 1950. Informal social communication. Psychological Review, 57 (5), 251-282.
    • (1950) Psychological Review , vol.57 , Issue.5 , pp. 251-282
    • Festinger, L.1
  • 30
    • 4644234910 scopus 로고
    • A theory of social comparison processes
    • Festinger, L., 1954. A theory of social comparison processes. Human Relations, 7 (2), 117-140.
    • (1954) Human Relations , vol.7 , Issue.2 , pp. 117-140
    • Festinger, L.1
  • 32
    • 37249082127 scopus 로고    scopus 로고
    • IM=Interruption management? Instant messaging and disruption in the workplace
    • Addison-Wesley. Garrett, R.K. and Danzinger, J.N., 2008. IM=Interruption management? instant messaging and disruption in the workplace. Journal of Computer-Mediated Communication, 13 (1), 23-42.
    • (2008) Journal of Computer-Mediated Communication , vol.13 , Issue.1 , pp. 23-42
    • Garrett, R.K.1    Danzinger, J.N.2
  • 36
    • 0002073370 scopus 로고    scopus 로고
    • Disclosure of chronic illness varies by topic and target: The role of stigma and boundaries in willingness to disclose
    • In: S. Petronio, ed. Mahwah, New Jersey: Lawrence Erlbaum Associates
    • Greene, K., 2000. Disclosure of chronic illness varies by topic and target: The role of stigma and boundaries in willingness to disclose. In: S. Petronio, ed. Balancing the secretes of private disclosures. Mahwah, New Jersey: Lawrence Erlbaum Associates, 123-135.
    • (2000) Balancing the Secretes of Private Disclosures , pp. 123-135
    • Greene, K.1
  • 38
    • 33846019288 scopus 로고    scopus 로고
    • Chatting with teenagers: Considering the place of chat technologies in teen life
    • Grinter, R.E., Palen, L., and Eldridge, M., 2006. Chatting with teenagers: Considering the place of chat technologies in teen life. ACM Transactions in Computer-Human Interaction, 13 (4), 423-447.
    • (2006) ACM Transactions in Computer-Human Interaction , vol.13 , Issue.4 , pp. 423-447
    • Grinter, R.E.1    Palen, L.2    Eldridge, M.3
  • 39
    • 0035593401 scopus 로고    scopus 로고
    • Impression formation in computer-mediated communication revisited: An analysis of the breadth and intensity of impressions
    • Hancock, J.T. and Dunham, P.J., 2001. Impression formation in computer-mediated communication revisited: An analysis of the breadth and intensity of impressions. Communication Research, 28 (3), 325-347.
    • (2001) Communication Research , vol.28 , Issue.3 , pp. 325-347
    • Hancock, J.T.1    Dunham, P.J.2
  • 40
    • 3142696536 scopus 로고    scopus 로고
    • The appropriate use of computer-based information technologies: An impression management framework
    • In: J.W. Beard, ed. Westport, CT: Quantum Books
    • Harrington, K.V. and Beard, J.W., 1996. The appropriate use of computer-based information technologies: An impression management framework. In: J.W. Beard, ed. Impression management and information technology. Westport, CT: Quantum Books, 133-157.
    • (1996) Impression Management and Information Technology , pp. 133-157
    • Harrington, K.V.1    Beard, J.W.2
  • 42
    • 10044248787 scopus 로고    scopus 로고
    • Privacy risk models for designing privacy-sensitive ubiquitous computing systems
    • New York, NY: ACM Press
    • Hong, J.I., et al., 2004. Privacy risk models for designing privacy-sensitive ubiquitous computing systems. In: DIS'04: Proceedings of the 2004 Conference on Designing Interactive Systems. New York, NY: ACM Press, 91-100.
    • (2004) DIS'04: Proceedings of the 2004 Conference on Designing Interactive Systems , pp. 91-100
    • Hong, J.I.1
  • 43
    • 38149035174 scopus 로고    scopus 로고
    • Field deployment of IMBuddy : A study of privacy control and feedback mechanisms for contextual IM
    • In: J. Krumm, et al.eds Innsbruck, Austria. Springer Verlag
    • Hsieh, G., et al., 2007. Field deployment of IMBuddy : A study of privacy control and feedback mechanisms for contextual IM. In: J. Krumm, et al.eds. UbiComp 2007: Ubiquitous Computing, 9th International Conference, Innsbruck, Austria. Springer Verlag: 91-108.
    • (2007) UbiComp 2007: Ubiquitous Computing, 9th International Conference , pp. 91-108
    • Hsieh, G.1
  • 45
    • 84861294968 scopus 로고    scopus 로고
    • Privacy and proportionality: Adapting legal evaluation techniques to inform design in ubiquitous computing
    • New York, NY: ACM Press
    • Iachello, G. and Abowd, G.D., 2005. Privacy and proportionality: Adapting legal evaluation techniques to inform design in ubiquitous computing. In: CHI'05: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. New York, NY: ACM Press, 91-100.
    • (2005) CHI'05: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems , pp. 91-100
    • Iachello, G.1    Abowd, G.D.2
  • 50
    • 84937268216 scopus 로고    scopus 로고
    • Privacy and the computer: Why we need privacy in the information society
    • Introna, L.D., 1997. Privacy and the computer: Why we need privacy in the information society. Metaphilosophy, 28 (3), 259-275.
    • (1997) Metaphilosophy , vol.28 , Issue.3 , pp. 259-275
    • Introna, L.D.1
  • 51
    • 0033547152 scopus 로고    scopus 로고
    • Privacy in the information age: Stakeholders, interests and values
    • Introna, L.D. and Pouloudi, A., 1999. Privacy in the information age: Stakeholders, interests and values. Journal of Business Ethics, 22 (1), 27-38.
    • (1999) Journal of Business Ethics , vol.22 , Issue.1 , pp. 27-38
    • Introna, L.D.1    Pouloudi, A.2
  • 53
    • 0009337634 scopus 로고
    • Privacy and the judgement of others
    • Johnson, J.L., 1989. Privacy and the judgement of others. The Journal of Value Inquiry, 23 (15), 157-168.
    • (1989) The Journal of Value Inquiry , vol.23 , Issue.15 , pp. 157-168
    • Johnson, J.L.1
  • 56
    • 0002708274 scopus 로고    scopus 로고
    • Subordinate reactions to the use of impression management tactics and feedback by the supervisor
    • Kacmar, K.M., Wayne, S.J., and Wright, P.M., 1996. Subordinate reactions to the use of impression management tactics and feedback by the supervisor. Journal of Managerial Issues, 8 (1), 35-53.
    • (1996) Journal of Managerial Issues , vol.8 , Issue.1 , pp. 35-53
    • Kacmar, K.M.1    Wayne, S.J.2    Wright, P.M.3
  • 57
    • 34547459644 scopus 로고    scopus 로고
    • Privacy-enhanced personalization
    • Kobsa, A., 2007a. Privacy-enhanced personalization. Communications of the ACM, 50 (8), 24-33.
    • (2007) Communications of the ACM , vol.50 , Issue.8 , pp. 24-33
    • Kobsa, A.1
  • 58
    • 38849161575 scopus 로고    scopus 로고
    • Privacy-enhanced web personalization
    • In: P. Brusilovsky, A. Kobsa, and W. Nejdl, eds. Berlin Heidelberg, NewYork: Springer Verlag
    • Kobsa, A., 2007b. Privacy-enhanced web personalization. In: P. Brusilovsky, A. Kobsa, and W. Nejdl, eds. The adaptive web: Methods and strategies of web personalization. Berlin Heidelberg, NewYork: Springer Verlag, 628-670.
    • (2007) The Adaptive Web: Methods and Strategies of Web Personalization , pp. 628-670
    • Kobsa, A.1
  • 62
    • 0002557991 scopus 로고
    • Impression management: A literature review and two-component model
    • Leary, M.R. and Kowalski, R.M., 1990. Impression management: A literature review and two-component model. Psychological Bulletin, 107 (1), 34-47.
    • (1990) Psychological Bulletin , vol.107 , Issue.1 , pp. 34-47
    • Leary, M.R.1    Kowalski, R.M.2
  • 63
    • 19944367736 scopus 로고    scopus 로고
    • Personal privacy through understanding and action: Five pitfalls for designers
    • Lederer, S., et al., 2004. Personal privacy through understanding and action: Five pitfalls for designers. Personal Ubiquitous Computing, 8 (6), 440-454.
    • (2004) Personal Ubiquitous Computing , vol.8 , Issue.6 , pp. 440-454
    • Lederer, S.1
  • 64
  • 70
    • 54049109580 scopus 로고    scopus 로고
    • IM, not IP (information pollution)
    • Nielsen, J., 2003. IM, not IP (information pollution). ACM Queue, 1 (8), 76-77.
    • (2003) ACM Queue , vol.1 , Issue.8 , pp. 76-77
    • Nielsen, J.1
  • 74
    • 36549012512 scopus 로고    scopus 로고
    • Instant messaging and privacy
    • Available from
    • Patil, S. and Kobsa, A., 2004. Instant messaging and privacy. In: Proceedings of HCI 2004, Leeds, 85-88. Available from: Http://www.ics.uci.edu/ kobsa/papers/2004-HCIkobsa.pdf.
    • (2004) Proceedings of HCI 2004, Leeds , pp. 85-88
    • Patil, S.1    Kobsa, A.2
  • 77
    • 70349571535 scopus 로고    scopus 로고
    • Privacy considerations in awareness systems: Designing with privacy in mind
    • In: P. Markopoulos, B. de Ruyter, and W. Mackay, eds. London: SpringerVerlag, DOI 10.1007/978-1-84882-477-5-8
    • Patil, S. and Kobsa, A., 2009. Privacy considerations in awareness systems: Designing with privacy in mind. In: P. Markopoulos, B. de Ruyter, and W. Mackay, eds. Awareness systems: Advances in theory, methodology and design. London: Springer Verlag, 187-206, DOI 10.1007/978-1-84882-477-5-8.
    • (2009) Awareness Systems: Advances in Theory, Methodology and Design , pp. 187-206
    • Patil, S.1    Kobsa, A.2
  • 78
    • 77549088252 scopus 로고    scopus 로고
    • Enhancing privacy management support in instant messaging
    • Patil, S. and Kobsa, A., 2010. Enhancing privacy management support in instant messaging. Interacting with Computers, 22 (3), 206-217.
    • (2010) Interacting with Computers , vol.22 , Issue.3 , pp. 206-217
    • Patil, S.1    Kobsa, A.2
  • 82
    • 0141907688 scopus 로고    scopus 로고
    • Common method biases in behavioral research: A critical review of the literature and recommended remedies
    • Podsakoff, P., et al., 2003. Common method biases in behavioral research: A critical review of the literature and recommended remedies. Journal of Applied Psychology, 88, 879-903.
    • (2003) Journal of Applied Psychology , vol.88 , pp. 879-903
    • Podsakoff, P.1
  • 83
    • 51649088942 scopus 로고    scopus 로고
    • Designing for privacy and self-presentation in social awareness
    • Raento, M. and Oulasvirta, A., 2008. Designing for privacy and self-presentation in social awareness. Personal and Ubiquitous Computing, 12 (7), 527-542.
    • (2008) Personal and Ubiquitous Computing , vol.12 , Issue.7 , pp. 527-542
    • Raento, M.1    Oulasvirta, A.2
  • 85
    • 2542553531 scopus 로고    scopus 로고
    • Evaluating the fit of structural equation models: Tests of significance and descriptive goodness-of-fit measures
    • Schermelleh-Engel, K., Moosbrugger, H., and Müller, H., 2003. Evaluating the fit of structural equation models: Tests of significance and descriptive goodness-of-fit measures. Methods of Psychological Research Online, 8 (2), 23-74.
    • (2003) Methods of Psychological Research Online , vol.8 , Issue.2 , pp. 23-74
    • Schermelleh-Engel, K.1    Moosbrugger, H.2    Müller, H.3
  • 86
    • 0002154614 scopus 로고
    • Tactical self-presentations: Toward a broader conception
    • In: J.T. Tschi, ed. New York: Academic Press
    • Schneider, D.J., 1981. Tactical self-presentations: Toward a broader conception. In: J.T. Tschi, ed. Impression management: Theory and social psychological research. New York: Academic Press, 23-40.
    • (1981) Impression Management: Theory and Social Psychological Research , pp. 23-40
    • Schneider, D.J.1
  • 87
    • 0036045758 scopus 로고    scopus 로고
    • Conceptualizing privacy
    • Available from
    • Solove, D.J., 2002. Conceptualizing privacy. California Law Review, 90, 1087-1115. Available from: Http://ssrn.com/abstract=313103.
    • (2002) California Law Review , vol.90 , pp. 1087-1115
    • Solove, D.J.1
  • 89
    • 64849113360 scopus 로고    scopus 로고
    • Cambridge, MA: Harvard University Press
    • Solove, D.J., 2008. Understanding privacy. Cambridge, MA: Harvard University Press.
    • (2008) Understanding Privacy
    • Solove, D.J.1
  • 91
    • 16444372472 scopus 로고    scopus 로고
    • Impacts of user privacy preferences on personalized systems: A comparative study
    • In: C.M. Karat, J. Blom, and J. Karat, eds. Dordrecht, Netherlands: Kluwer Academic Publishers
    • Teltzrow, M. and Kobsa, A., 2004. Impacts of user privacy preferences on personalized systems: A comparative study. In: C.M. Karat, J. Blom, and J. Karat, eds. Designing personalized user experiences for eCommerce. Dordrecht, Netherlands: Kluwer Academic Publishers, 315-332.
    • (2004) Designing Personalized User Experiences for Ecommerce , pp. 315-332
    • Teltzrow, M.1    Kobsa, A.2
  • 97
    • 84859800109 scopus 로고
    • In: J.B. Young, ed. Privacy. Chichester, New York: John Wiley & Sons
    • Young, J.B., 1978. Introduction: A look at privacy. In: J.B. Young, ed. Privacy. Chichester, New York: John Wiley & Sons.
    • (1978) Introduction: A Look at Privacy
    • Young, J.B.1
  • 98
    • 85010510040 scopus 로고    scopus 로고
    • Characteristics of Internet users and their privacy concerns: A comparative study between China and the United States
    • Zhang, Y.J., Chen, J.Q., and Wen, K.W., 2002. Characteristics of Internet users and their privacy concerns: A comparative study between China and the United States. Journal of Internet Commerce, 1-16 (2), 1.
    • (2002) Journal of Internet Commerce , vol.1-16 , Issue.2 , pp. 1
    • Zhang, Y.J.1    Chen, J.Q.2    Wen, K.W.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.