Abstract

Social norms are powerful determinants of human behaviors in offline and online social worlds. While previous research established a correlational link between norm perceptions and self-reported disclosure on social network sites (SNS), questions remain about downstream effects of prevalent behaviors on perceived norms and actual disclosure on SNS. We conducted two preregistered studies using a realistic social media simulation. We further analyzed buffering effects of critical media literacy and privacy nudging. The results demonstrate a disclosure behavior contagion, whereby a critical mass of posts with visual disclosures shifted norm perceptions, which, in turn, affected perceivers' own visual disclosure behavior. Critical media literacy was negatively related and moderated the effect of norms on visual disclosure behavioral intentions. Neither critical media literacy nor privacy nudge affected actual disclosure behaviors, however. These results provide insights into how behaviors may spread on SNS through triggering changes in perceived social norms and subsequent disclosure behaviors.

Highlights

  • People are susceptible to social influence through behaviors of others around them [1,2,3]

  • In line with our predictions, the data revealed a strong effect of the collective norm on social norm perceptions (F(2,567) = 342.81, p

  • Based on Tukey’s honestly significant difference (HSD) tests, there was a significant difference across all levels of posts with faces presented in the activity feed (0%, 20%, and 80%)

Read more

Summary

Introduction

People are susceptible to social influence through behaviors of others around them [1,2,3]. The behavioral influence can extend both in positive and negative directions: either nudging ethical and responsible actions, personal growth, and deliberation, or, in contrast, discouraging rationality, forming bad habits, and increasing risk factors [4]. In online environments and in particular social network sites (SNS), it has become widespread to share private information publicly with other users and often by extension, with third parties, service providers, and institutions [6].

Objectives
Methods
Results
Discussion
Conclusion
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call