<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE article PUBLIC "-//NLM//DTD Journal Publishing DTD v2.3 20070202//EN" "journalpublishing.dtd">
<article xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" article-type="research-article" dtd-version="2.3" xml:lang="EN">
<front>
<journal-meta>
<journal-id journal-id-type="publisher-id">Front. Psychol.</journal-id>
<journal-title>Frontiers in Psychology</journal-title>
<abbrev-journal-title abbrev-type="pubmed">Front. Psychol.</abbrev-journal-title>
<issn pub-type="epub">1664-1078</issn>
<publisher>
<publisher-name>Frontiers Media S.A.</publisher-name>
</publisher>
</journal-meta>
<article-meta>
<article-id pub-id-type="doi">10.3389/fpsyg.2022.996512</article-id>
<article-categories>
<subj-group subj-group-type="heading">
<subject>Psychology</subject>
<subj-group>
<subject>Hypothesis and Theory</subject>
</subj-group>
</subj-group>
</article-categories>
<title-group>
<article-title>Theoretical conceptualization of online privacy-related decision making&#x2006;&#x2013;&#x2006;Introducing the tripartite self-disclosure decision model</article-title>
</title-group>
<contrib-group>
<contrib contrib-type="author" corresp="yes">
<name>
<surname>Ostendorf</surname>
<given-names>Sina</given-names>
</name>
<xref rid="aff1" ref-type="aff"><sup>1</sup></xref>
<xref rid="c001" ref-type="corresp"><sup>&#x002A;</sup></xref>
<uri xlink:href="https://loop.frontiersin.org/people/931545/overview"/>
</contrib>
<contrib contrib-type="author">
<name>
<surname>Brand</surname>
<given-names>Matthias</given-names>
</name>
<xref rid="aff1" ref-type="aff"><sup>1</sup></xref>
<xref rid="aff2" ref-type="aff"><sup>2</sup></xref>
<uri xlink:href="https://loop.frontiersin.org/people/88671/overview"/>
</contrib>
</contrib-group>
<aff id="aff1"><sup>1</sup><institution>General Psychology: Cognition and Center for Behavioral Addiction Research (CeBAR), University of Duisburg-Essen</institution>, <addr-line>Duisburg</addr-line>, <country>Germany</country></aff>
<aff id="aff2"><sup>2</sup><institution>Erwin L. Hahn Institute for Magnetic Resonance Imaging</institution>, <addr-line>Essen</addr-line>, <country>Germany</country></aff>
<author-notes>
<fn id="fn0001" fn-type="edited-by"><p>Edited by: Ofir Turel, California State University, Fullerton, United States</p></fn>
<fn id="fn0002" fn-type="edited-by"><p>Reviewed by: Amina Wagner, Technical University of Darmstadt, Germany; Sarah Michele Rajtmajer, The Pennsylvania State University (PSU), United States; Qinghua He, Southwest University, China</p></fn>
<corresp id="c001">&#x002A;Correspondence: Sina Ostendorf, <email>sina.ostendorf@uni-due.de</email></corresp>
<fn id="fn0003" fn-type="other"><p>This article was submitted to Cognition, a section of the journal Frontiers in Psychology</p></fn>
</author-notes>
<pub-date pub-type="epub">
<day>19</day>
<month>10</month>
<year>2022</year>
</pub-date>
<pub-date pub-type="collection">
<year>2022</year>
</pub-date>
<volume>13</volume>
<elocation-id>996512</elocation-id>
<history>
<date date-type="received">
<day>17</day>
<month>07</month>
<year>2022</year>
</date>
<date date-type="accepted">
<day>28</day>
<month>09</month>
<year>2022</year>
</date>
</history>
<permissions>
<copyright-statement>Copyright &#x00A9; 2022 Ostendorf and Brand.</copyright-statement>
<copyright-year>2022</copyright-year>
<copyright-holder>Ostendorf and Brand</copyright-holder>
<license xlink:href="http://creativecommons.org/licenses/by/4.0/"><p>This is an open-access article distributed under the terms of the Creative Commons Attribution License (CC BY). The use, distribution or reproduction in other forums is permitted, provided the original author(s) and the copyright owner(s) are credited and that the original publication in this journal is cited, in accordance with accepted academic practice. No use, distribution or reproduction is permitted which does not comply with these terms.</p>
</license>
</permissions>
<abstract>
<p>Self-disclosures on online social networks have received increased attention in the last two decades. Researchers from different disciplines investigated manifold influencing variables, and studies applied different theories to explain why many users share very sensitive and personal information despite potential risks and negative consequences, whereas others do not. Oftentimes, it is argued that self-disclosure decisions result from a kind of rational &#x201C;calculus&#x201D; of risks and benefits. However, such an assumption of rationality can and has been criticized. Nevertheless, fundamental cognitive and affective mechanisms that underlie self-disclosure decision making on social networks are still under-explored. By building upon previous self-disclosure theories and models, dual-and tripartite-system perspectives of decision making, and former empirical findings, we propose a Tripartite Self-Disclosure Decision (TSDD) model that conceptualizes inner processes of online self-disclosure decision making. Central to this model is the proposed interaction of three neural and cognitive/affective systems: a reflective, an impulsive, and an interoceptive system. We further highlight individual and environmental features, which can impact individuals&#x2019; online self-disclosure decisions by (interactively) influencing the proposed inner decision-making processes targeting the aforementioned three systems. Possible short- and long-term consequences are also discussed, which in turn can affect certain model components in subsequent self-disclosure decision situations. By taking such a neurocognitive perspective, we expand current research and models, which helps to better understand potentially risky information sharing on online social networks and can support attempts to prevent users from incautious self-disclosures.</p>
</abstract>
<kwd-group>
<kwd>self-disclosure</kwd>
<kwd>social media</kwd>
<kwd>social networks</kwd>
<kwd>privacy</kwd>
<kwd>decision making</kwd>
<kwd>dual-process theory</kwd>
<kwd>tripartite model</kwd>
</kwd-group>
<contract-sponsor id="cn1">German Research Foundation<named-content content-type="fundref-id">10.13039/501100001659</named-content>
</contract-sponsor>
<counts>
<fig-count count="3"/>
<table-count count="0"/>
<equation-count count="0"/>
<ref-count count="158"/>
<page-count count="18"/>
<word-count count="15860"/>
</counts>
</article-meta>
</front>
<body>
<sec id="sec1" sec-type="intro">
<title>Introduction</title>
<p>Around the world, a large number of people from diverse backgrounds regularly use online social networks such as Facebook, Instagram, or Twitter. In just 13&#x2009;years after its launch in 2004, Facebook has surpassed two billion active users and reports around 2.93 billion monthly active users in the first quarter of 2022 (<xref ref-type="bibr" rid="ref118">Statista, 2022a</xref>). Instagram and Twitter follow with two billion and 330 million monthly active users, respectively (<xref ref-type="bibr" rid="ref119">Statista, 2022b</xref>, <xref ref-type="bibr" rid="ref120">2022c</xref>). In addition to these &#x2018;Western applications&#x2019;, a big competitor is China&#x2019;s Sina Weibo, with 582 million monthly active users in the first quarter of 2022 (<xref ref-type="bibr" rid="ref121">Statista, 2022d</xref>). Such platforms have three key aspects in common: they enable their users to create unique profiles and individual content available for others, they allow to articulate connections via friends lists, and enable to consume and interact with content of online connections (<xref ref-type="bibr" rid="ref47">Ellison and Boyd, 2013</xref>). Social networks provide many tools with which individuals can fulfill their fundamental need for social connection and belonging and they enable the experience of immense gratification (e.g., <xref ref-type="bibr" rid="ref62">Huang et al., 2014</xref>; <xref ref-type="bibr" rid="ref99">Ostendorf et al., 2020</xref>). By disclosing personal information via profile, posts, or stories, individuals can maintain and strengthen their friendships and relationships, they can receive social support, build new social bonds, present themselves, and increase social capital (e.g., <xref ref-type="bibr" rid="ref75">Krasnova et al., 2010</xref>; <xref ref-type="bibr" rid="ref73">Kr&#x00E4;mer and Haferkamp, 2011</xref>; <xref ref-type="bibr" rid="ref47">Ellison and Boyd, 2013</xref>; <xref ref-type="bibr" rid="ref80">Liu and Brown, 2014</xref>; <xref ref-type="bibr" rid="ref126">Taddicken, 2014</xref>; <xref ref-type="bibr" rid="ref28">Cheung et al., 2015</xref>; <xref ref-type="bibr" rid="ref86">Masur, 2018</xref>; <xref ref-type="bibr" rid="ref82">Lu and Lin, 2022</xref>).</p>
<p>However, although many benefits are associated with the use of online social networks, potential negative aspects have received attention as well. Due to the ubiquity of such services, individuals can, for instance, perceive an increased pressure to always be available to everyone (e.g., <xref ref-type="bibr" rid="ref143">Vorderer et al., 2016</xref>) or experience a reduced well-being, especially when passively using social networks (e.g., <xref ref-type="bibr" rid="ref142">Verduyn et al., 2021</xref>). A growing body of research also addresses a potential loss of privacy associated with the use of these platforms. Social networks such as Facebook or Instagram do not provide their users with unlimited control over their shared information (<xref ref-type="bibr" rid="ref85">Marwick and Boyd, 2014</xref>; <xref ref-type="bibr" rid="ref131">Trepte, 2021</xref>), which can cause negative and undesired consequences of varying severity, especially since access to and aggregation of data can be very easy (<xref ref-type="bibr" rid="ref15">Barth and de Jong, 2017</xref>). On a horizontal level, individual privacy can be violated if personal information is undesirably accessed or used by other members (including friends and co-workers, but also mere acquaintances and strangers). On a vertical level, it can be violated if the platform itself or third parties misuse the shared content (see <xref ref-type="bibr" rid="ref16">Bartsch and Dienlin, 2016</xref>; <xref ref-type="bibr" rid="ref102">Quinn and Epstein, 2018</xref>). Overall, negative consequences due to self-disclosures can occur in both the short- and long-term, reaching from immediate negative feedback from others to sexual online harassment and hostility up to privacy intrusions such as commercial/criminal exploitation or identity theft (e.g., <xref ref-type="bibr" rid="ref35">Debatin et al., 2009</xref>; <xref ref-type="bibr" rid="ref145">Walrave et al., 2012</xref>; <xref ref-type="bibr" rid="ref7">Aharony, 2016</xref>).</p>
<p>However, even if users seem to be concerned about their privacy, a number of studies did not find that this is consistently associated with adequate privacy-related behaviors including reduced information disclosures (e.g., <xref ref-type="bibr" rid="ref3">Acquisti and Gross, 2006</xref>; <xref ref-type="bibr" rid="ref133">Tufekci, 2008</xref>; <xref ref-type="bibr" rid="ref157">Zafeiropoulou, 2014</xref>). This gap between concerns and actual behaviors is also known as <italic>privacy paradox</italic> (e.g., <xref ref-type="bibr" rid="ref14">Barnes, 2006</xref>; <xref ref-type="bibr" rid="ref10">Aivazpour et al., 2017</xref>; <xref ref-type="bibr" rid="ref15">Barth and de Jong, 2017</xref>; <xref ref-type="bibr" rid="ref72">Kokolakis, 2017</xref>). In order to explain why such seemingly paradoxical behaviors occur, researchers take different perspectives for their investigations (e.g., a social psychological or information science perspective). However, in many studies, researchers apply theories and models that cover a quite rational perspective and do not comprehensively include impulsive, intuitive, or even interoceptive processes. By taking a rational choice approach, it is argued that individuals weigh potential risks and benefits and decide to share information if the expected benefits exceed potential risks (e.g., <xref ref-type="bibr" rid="ref35">Debatin et al., 2009</xref>; <xref ref-type="bibr" rid="ref78">Lee et al., 2013</xref>; <xref ref-type="bibr" rid="ref79">Li et al., 2016</xref>). This indicates that individuals are rational decision makers when deciding to self-disclose on social networks, which, however, seems not to be a sufficient explanation for many self-disclosure decision situations. Especially on social networks, risks can be abstract (e.g., privacy violations such as identity theft) and may not always be fully comprehended or processed (e.g., <xref ref-type="bibr" rid="ref86">Masur, 2018</xref>). Hence, different authors also investigate cognitive biases, heuristics, and affective processes that can influence individuals&#x2019; privacy-related decisions online (e.g., <xref ref-type="bibr" rid="ref6">Acquisti and Grossklags, 2007</xref>; <xref ref-type="bibr" rid="ref125">Sundar et al., 2013</xref>; <xref ref-type="bibr" rid="ref2">Acquisti et al., 2015</xref>; <xref ref-type="bibr" rid="ref156">Yu et al., 2015</xref>; <xref ref-type="bibr" rid="ref67">Kehr et al., 2015a</xref>). Researchers highlighted that approaches which assume that individuals (consistently) engage in deliberate analysis when it comes to privacy-related online decisions (i.e., engage in high-effort processing) overlook the probable involvement of low-effort processes which are based on, for instance, affect or heuristics, and they hence directed the focus to such processes (e.g., <xref ref-type="bibr" rid="ref81">Lowry et al., 2012</xref>; <xref ref-type="bibr" rid="ref43">Dinev et al., 2015</xref>).</p>
<p>Nevertheless, the fundamental cognitive and affective mechanisms that underlie individuals&#x2019; self-disclosure decisions on social networks and that may explain behavioral differences between individuals are still under-explored. From a theoretical standpoint, potentially involved inner processes beyond reflective ones and their interplay during self-disclosure decision making need closer examination. Since focusing on a rational &#x201C;calculus&#x201D; appears not to be a sufficient explanation for individual&#x2019;s self-disclosure decisions on social networks, more systematic research on involved intuitive, impulsive, as well as interoceptive processes would enrich research in this area. The purpose of the present paper therefore is to address this theoretical gap. We propose a theoretical framework that illustrates expected inner processes of self-disclosure decision making on social networks by including a tripartite proposition of involved (and interacting) neural systems. Building upon dual-and tripartite-process models of decision making, we elucidate the assumption that the decision to self-disclose can also result from more impulsive and short-term oriented compared to reflective and long-term oriented decision making, which may be amplified by interoceptive processes. Furthermore, we distinguish between and exemplify individual and environmental features that both can (individually and in interaction with each other) influence the inner decision-making processes that form the final decision. Lastly, possible consequences are differentiated with regard to their temporal character and positivity/negativity. By taking a neurocognitive perspective, our tripartite model helps to advance the understanding of why so many individuals provide very sensitive and personal information despite possible privacy violations and other negative consequences, whereas other users do not. We suggest that not only reflective processes can be involved, but that impulsive and intuitive as well as interoceptive processes may also play a crucial role, which helps to complete the picture. We further aim at guiding research in deriving systematic hypotheses on the interplay of different factors predicting self-disclosure decisions and suppose that our theoretical propositions can also help to improve technical options to support individual&#x2019;s self-disclosure decision making on social networks.</p>
<p>In the following, we present prior theoretical assumptions and models which have oftentimes been applied to explain various online privacy-related decisions including self-disclosure decisions on social networks. We outline that a compelling account of how individuals come to different self-disclosure decisions with a focus on inner processes is still lacking. Subsequently, we present key assumptions of dual-and tripartite-process theories of decision making, which serve as basis for our theoretical framework that is presented in detail afterwards. Finally, we discuss our propositions and provide future directions, followed by concluding remarks.</p>
<sec id="sec2">
<title>Theoretical assumptions and models previously used to explain online privacy-related decision making</title>
<p>Different literature reviews (see <xref ref-type="bibr" rid="ref15">Barth and de Jong, 2017</xref>; <xref ref-type="bibr" rid="ref72">Kokolakis, 2017</xref>; <xref ref-type="bibr" rid="ref57">Gerber et al., 2018</xref>) have been published outlining that many investigations on information disclosures in different online contexts including social networks focus on the idea of rather rational or reflective calculations, which is grounded in different theories (often addressing offline contexts) such as the <italic>Expectancy Theory</italic> (<xref ref-type="bibr" rid="ref144">Vroom, 1964</xref>), the <italic>Protection Motivation Theory</italic> (<xref ref-type="bibr" rid="ref104">Rogers, 1975</xref>), the <italic>Theory of Reasoned Action</italic> (<xref ref-type="bibr" rid="ref12">Ajzen and Fishbein, 1980</xref>), the <italic>Theory of Planned Behavior</italic> (<xref ref-type="bibr" rid="ref11">Ajzen, 1985</xref>), or the <italic>Privacy Calculus Theory</italic> (<xref ref-type="bibr" rid="ref32">Culnan and Armstrong, 1999</xref>). For instance, according to the latter, individuals are expected to perform a kind of risk&#x2013;benefit calculation on a rational level as a basis for their behaviors. Applied to self-disclosure decision making on social networks, it is assumed that users weigh the risks and benefits of sharing personal information and engage in self-disclosure if the expected gains outweigh observed potential negative consequences (e.g., <xref ref-type="bibr" rid="ref35">Debatin et al., 2009</xref>; <xref ref-type="bibr" rid="ref78">Lee et al., 2013</xref>; <xref ref-type="bibr" rid="ref79">Li et al., 2016</xref>). Yet, many studies in the field of online privacy and information disclosure have included such theories (e.g., <xref ref-type="bibr" rid="ref42">Dinev and Hart, 2006</xref>; <xref ref-type="bibr" rid="ref75">Krasnova et al., 2010</xref>; <xref ref-type="bibr" rid="ref152">Xu et al., 2011</xref>; <xref ref-type="bibr" rid="ref154">Yao, 2011</xref>; <xref ref-type="bibr" rid="ref41">Dienlin and Trepte, 2015</xref>; <xref ref-type="bibr" rid="ref40">Dienlin and Metzger, 2016</xref>).</p>
<p>However, assuming that there is always a rational weighing of benefits and risks can be challenged, since especially long-term negative consequences (e.g., undesired commercial or criminal use of shared information) are likely more abstract and less salient compared to possible short-term rewards (e.g., immediate gratification due to Likes). This results from the fact that social networks do not provide thorough information about corresponding risks (<xref ref-type="bibr" rid="ref127">Taddicken and Jers, 2011</xref>; <xref ref-type="bibr" rid="ref46">Efroni et al., 2019</xref>). Consequently, this may complicate their evaluation (as part of individual&#x2019;s inner decision-making processes) and possibly leads to more impulsive or intuitive rather than reflective decisions (<xref ref-type="bibr" rid="ref99">Ostendorf et al., 2020</xref>). The assumption of limited rational processes is also represented in other theoretical approaches used to explain privacy-related online behaviors (see also <xref ref-type="bibr" rid="ref15">Barth and de Jong, 2017</xref>; <xref ref-type="bibr" rid="ref72">Kokolakis, 2017</xref>; <xref ref-type="bibr" rid="ref57">Gerber et al., 2018</xref>). For example, different works refer to the notion of <italic>incomplete information</italic> when investigating online information sharing, which goes along with further aspects such as over&#x2212;/underestimation of negative outcomes and benefits (e.g., <xref ref-type="bibr" rid="ref5">Acquisti and Grossklags, 2005</xref>; <xref ref-type="bibr" rid="ref54">Flender and M&#x00FC;ller, 2012</xref>). Besides, the <italic>Theory of Bounded Rationality</italic> (<xref ref-type="bibr" rid="ref111">Simon, 1982</xref>), a well-known concept in cognitive and social psychology, has also been applied to online information sharing (e.g., <xref ref-type="bibr" rid="ref5">Acquisti and Grossklags, 2005</xref>; <xref ref-type="bibr" rid="ref147">Wang and Yan, 2017</xref>). This theory proposes that human beings do not have full access to all relevant information, that they are cognitively limited, and also do not always have sufficient time to make their decisions in a fully rational manner (see <xref ref-type="bibr" rid="ref111">Simon, 1982</xref>), which is also applicable to online self-disclosure decision situations. Moreover, <italic>cognitive biases</italic> and <italic>heuristics</italic> (e.g., <italic>optimism bias</italic>) have also been investigated in different publications (e.g., <xref ref-type="bibr" rid="ref4">Acquisti and Grossklags, 2003</xref>; <xref ref-type="bibr" rid="ref29">Cho et al., 2010</xref>; <xref ref-type="bibr" rid="ref56">Gambino et al., 2016</xref>; see also <xref ref-type="bibr" rid="ref63">Irwin, 1953</xref>; <xref ref-type="bibr" rid="ref112">Slovic et al., 2002</xref>). However, research on non-reflective processes still needs to increase, which especially applies to the investigation of interoceptive processes. Studies on the role of interoceptive processes in the context of social networks are to date very scarce, but appear important for a deeper understanding of individuals&#x2019; online self-disclosure decisions (see section 1.2).</p>
<p>Besides those approaches, there are also a few valuable theoretical models specifically focusing on the concepts of self-disclosure and privacy (offline and online; see also <xref ref-type="bibr" rid="ref86">Masur, 2018</xref>). The <italic>Disclosure Decision Model</italic> by <xref ref-type="bibr" rid="ref97">Omarzu (2000)</xref>, for example, is a process model that incorporates situational cues and individual differences, which are expected to shape the salience of specific (social) goals, as well as three stages of self-disclosure decision making (&#x201C;entering the situation,&#x201D; &#x201C;selecting a strategy and searching for targets,&#x201D; and &#x201C;subjective utility versus subjective risk,&#x201D; pp. 178/179). If one or more (potentially overlapping or even conflicting) goals are salient in stage one, an individual is expected to evaluate in stage two whether self-disclosure would be an appropriate strategy or not (i.e., to reach the goal) and whether a suitable target is available or not (i.e., desired recipients). If both applies, individuals are assumed to enter the third stage in which they decide how much, how long, how intimately, and how broadly they self-disclose. Thereby, the model proposes that there is a weighing of the subjective utility of possible benefits and the subjective probability of risks.</p>
<p>Another framework is the <italic>Disclosure Processes Model</italic> by <xref ref-type="bibr" rid="ref25">Chaudoir and Fisher (2010)</xref>. This model importantly highlights the role of possible long-term outcomes and resulting feedback loops that should not be left behind when conceptualizing individuals&#x2019; self-disclosure decision making on social networks. Besides the consideration of antecedent goals, the resulting disclosure event, and factors mediating between the disclosure event and long-term outcomes, it accentuates the potential influence of long-term outcomes on future disclosure decisions in terms of &#x201C;upward spirals toward greater visibility&#x201D; versus &#x201C;downward spirals toward greater concealment&#x201D; (<xref ref-type="bibr" rid="ref25">Chaudoir and Fisher, 2010</xref>, p. 250). This view of reinforcing mechanisms and feedback is also well known in other theoretical frameworks of risky decision making (e.g., <xref ref-type="bibr" rid="ref21">Brand et al., 2006</xref>; <xref ref-type="bibr" rid="ref107">Schiebener and Brand, 2015</xref>).</p>
<p>Besides, the procedural <italic>Privacy Process Model</italic> by <xref ref-type="bibr" rid="ref38">Dienlin (2014)</xref> is placing special emphasis on the concept of privacy. The privacy context (denoted as being objective) is proposed to be perceived subjectively by an individual and this perception is expected to subsequently influence the respective behavioral decision, namely self-disclosure. Further, as part of an evaluation process, individual&#x2019;s privacy perception and behavior are assumed to be constantly compared to a desired status, whereby a privacy regulation (with regard to the context or the behavior) is taking place if there is an imbalance between the current and the desired status.</p>
<p><xref ref-type="bibr" rid="ref86">Masur (2018)</xref> further introduced his view of <italic>Situational Privacy and Self-Disclosure</italic>. Closely related to <xref ref-type="bibr" rid="ref97">Omarzu (2000)</xref>, he (even stronger) argues that situational circumstances play an important role in the context of self-disclosure. The model presents three procedural stages: &#x201C;(1) pre-situational privacy regulation processes, (2) situational privacy and self-disclosure processes, and (3) post-situational evaluation processes&#x201D; (<xref ref-type="bibr" rid="ref86">Masur, 2018</xref>, p. 177), with a central role of the second stage. It is argued that an individual&#x2019;s self-disclosure extent depends on different personal and environmental features and their interplay. Especially interactions between non-stable personal features and environmental features in a given situation are expected to shape individuals&#x2019; self-disclosures, whereby this is further influenced by trait and trait-like personal features. Subsequently, post-situational evaluation processes (e.g., regarding the efficiency of self-disclosure) are expected to occur. Further, in the pre-situational stage, individuals potentially choose and manipulate the respective environment to achieve a desired privacy level before engaging in self-disclosure.</p>
<p>In summary, the aforementioned models already provide important theoretical and process-oriented assumptions. Important distinctions are made between individual characteristics, situational/context-related factors, and specific decision-making steps (see <italic>Disclosure Decision Model</italic> by <xref ref-type="bibr" rid="ref97">Omarzu, 2000</xref>; <italic>Situational Privacy and Self-Disclosure</italic> by <xref ref-type="bibr" rid="ref86">Masur, 2018</xref>). Further, the role of possible (long-term) outcomes and their potential reinforcing effects with regard to subsequent decision situations (see <italic>Disclosure Processes Model</italic> by <xref ref-type="bibr" rid="ref25">Chaudoir and Fisher, 2010</xref>) and the importance of perception processes and possible privacy regulations in the context of online self-disclosures are highlighted (see <italic>Privacy Process Model</italic> by <xref ref-type="bibr" rid="ref38">Dienlin, 2014</xref>; <xref ref-type="bibr" rid="ref86">Masur, 2018</xref>). However, besides that it is sometimes quite vague what is actually meant by individual differences and situational cues (e.g., in the <italic>Disclosure Decision Model</italic> by <xref ref-type="bibr" rid="ref97">Omarzu, 2000</xref>, as also mentioned by <xref ref-type="bibr" rid="ref86">Masur, 2018</xref>), these frameworks take the perspective of rather strategic self-disclosure decisions and are especially lacking the explicit consideration of underlying non-reflective processes. As highlighted above, processes beyond reflective ones need to be considered for human decision making and thus also for self-disclosure decisions on social networks. From a neurocognitive perspective, it is hence of great importance to provide a compelling account of psychological mechanisms underlying self-disclosure decisions on social networks. However, a theoretical framework that explicitly incorporates potentially involved inner processes and their interplay, and that broadens the perspective by including reflective as well as intuitive/impulsive and interoceptive processes, is still lacking. The aim of the current paper is to fill this gap. Dual-and tripartite-process theories, which focus on processes that are at the core of human decision making, will thereby serve as a basis for our propositions (see next section).</p>
</sec>
<sec id="sec3">
<title>Dual- and tripartite-process theories of decision making</title>
<p>The literature in the fields of (neuro-)cognitive and social psychology holds many dual-process theories with different foci and perspectives (for overviews see <xref ref-type="bibr" rid="ref51">Evans, 2008</xref>; <xref ref-type="bibr" rid="ref52">Evans and Stanovich, 2013</xref>). Although different perspectives exist, there is a common idea which brings those different approaches together: It is expected that two different forms of processing are in place that shape human reasoning and decision making (e.g., <xref ref-type="bibr" rid="ref116">Stanovich, 1999</xref>; <xref ref-type="bibr" rid="ref66">Kahneman and Frederick, 2002</xref>; <xref ref-type="bibr" rid="ref49">Evans, 2003</xref>, <xref ref-type="bibr" rid="ref50">2006</xref>; <xref ref-type="bibr" rid="ref122">Strack and Deutsch, 2004</xref>; <xref ref-type="bibr" rid="ref65">Kahneman, 2011</xref>; <xref ref-type="bibr" rid="ref107">Schiebener and Brand, 2015</xref>). In more detail, it is assumed that processes of, for instance, intuitive, emotional, or impulsive kind, as well as processes of, for instance, strategic, reflective, or analytical kind can be involved when making a decision (e.g., <xref ref-type="bibr" rid="ref65">Kahneman, 2011</xref>; <xref ref-type="bibr" rid="ref107">Schiebener and Brand, 2015</xref>). In this paper, we follow the idea that these two forms of processing involve two neural systems that are not strictly separated from each other but rather interact with one another when forming the final decision (e.g., <xref ref-type="bibr" rid="ref65">Kahneman, 2011</xref>; <xref ref-type="bibr" rid="ref107">Schiebener and Brand, 2015</xref>). The reflective system is considered to function slowly, serially, and cognitively-controlled, and it is also known as system 2 or rational-analytical system (e.g., <xref ref-type="bibr" rid="ref48">Epstein et al., 1996</xref>; <xref ref-type="bibr" rid="ref116">Stanovich, 1999</xref>; <xref ref-type="bibr" rid="ref64">Kahneman, 2003</xref>, <xref ref-type="bibr" rid="ref65">2011</xref>). The impulsive system is considered as a fast and parallel processing system (also termed system 1 or intuitive-experiential system) that draws on past experiences and emotions, and only needs low effort (e.g., <xref ref-type="bibr" rid="ref48">Epstein et al., 1996</xref>; <xref ref-type="bibr" rid="ref64">Kahneman, 2003</xref>). It is also assumed that immediate gratification (or punishment) is processed via the impulsive system and that cognitive control over impulsive responses in order to reach higher long-term goals is enabled by the reflective system (see also <xref ref-type="bibr" rid="ref18">Bechara, 2005</xref>). Thus, if information is processed via the impulsive system, it is likely accompanied with emotional reactions or somatic activity (e.g., increased heart rate), while a reflective information processing involves executive functions and working memory (see <xref ref-type="bibr" rid="ref51">Evans, 2008</xref>; <xref ref-type="bibr" rid="ref107">Schiebener and Brand, 2015</xref>). On a neural level, the impulsive system involves structures associated with the limbic-ventral striatal loop, such as the ventral striatum and the amygdala, and the reflective system involves structures associated with the prefrontal-dorsal striatal loop, such as the dorsolateral prefrontal cortex (<xref ref-type="bibr" rid="ref105">Rogers et al., 1999</xref>; <xref ref-type="bibr" rid="ref77">Labudda et al., 2008</xref>; <xref ref-type="bibr" rid="ref76">K&#x00FC;hn et al., 2011</xref>; <xref ref-type="bibr" rid="ref107">Schiebener and Brand, 2015</xref>). Further, it is assumed that both systems can be active in parallel and can interact with each other during decision making, whereby one of the systems will act as the leading mode (<xref ref-type="bibr" rid="ref107">Schiebener and Brand, 2015</xref>). The balance between these two neural systems is thus essential for the shortsightedness of the respective decision. Moreover, <xref ref-type="bibr" rid="ref107">Schiebener and Brand (2015)</xref>, for example, point out that individual, environmental, and situational features influence the inner decision-making processes and thus trigger a predominant system. This view of different inner processes being involved in human decision making hence appears important to both better understand why individuals provide much personal information despite potential risks and how they can be supported to improve their decision making.</p>
<p>However, neurocognitive research on decision making is not limited to dual-process approaches, but recently also focuses on a tripartite perspective. This perspective suggests that a third system &#x2013; covering interoceptive awareness &#x2013; can alter the balance between the reflective and the impulsive system (<xref ref-type="bibr" rid="ref150">Wood and Bechara, 2014</xref>). On a neural level, previous research found that the interoceptive system is mainly associated with the insula, which is expected to translate somatic states into more conscious states of mind (<xref ref-type="bibr" rid="ref95">No&#x00EB;l et al., 2013</xref>). <xref ref-type="bibr" rid="ref153">Xue et al. (2010)</xref> further found that the activation of the insula during decision making was associated with the personality trait of urgency and influenced the extent of subsequent risky decisions. They concluded that &#x201C;the insula plays an important role in activating representations of homeostatic states associated with the experience of risk, which in turn exerts an influence on subsequent decisions&#x201D; (<xref ref-type="bibr" rid="ref153">Xue et al., 2010</xref>, p. 709). This highlights the additional relevance of an interoceptive system for human decision making. Other research in different contexts also focused on a tripartite approach. For instance, the role of the insula in modulating the balance between the impulsive system and the reflective system has been highlighted and examined in the context of problematic eating and when facing tempting food cues (see <xref ref-type="bibr" rid="ref27">Chen et al., 2018</xref>; <xref ref-type="bibr" rid="ref58">He et al., 2019</xref>). <xref ref-type="bibr" rid="ref148">Wei et al. (2017)</xref> further proposed a tripartite neurocognitive model of Internet Gaming Disorder and <xref ref-type="bibr" rid="ref136">Turel et al. (2021)</xref> found that gamers who were deprived of gaming showed an increased activation of the left insula when being exposed to video gaming cues versus neutral cues. Further, left insula activation was also positively associated with left ventral striatum activation and negatively with left dorsolateral prefrontal cortex activation, supporting the tripartite perspective (<xref ref-type="bibr" rid="ref136">Turel et al., 2021</xref>). Based on research on problematic and addictive behaviors (e.g., <xref ref-type="bibr" rid="ref94">Naqvi et al., 2007</xref>; <xref ref-type="bibr" rid="ref95">No&#x00EB;l et al., 2013</xref>), another study by <xref ref-type="bibr" rid="ref134">Turel and Bechara (2016)</xref> applied assumptions regarding the role of interoceptive processes to the area of general and impulsive information technology use. They investigated a tripartite model with regard to the extent of social networks use (in terms of duration and frequency) and impulsive social networks use. They found that temptations (representing the interoceptive system) strengthened the effect of habit (representing the impulsive system) on the extent of social networks use as well as on impulsive social networks use, while temptations reduced the effect of satisfaction and behavioral expectations (standing for the reflective system) on both the extent and impulsiveness of social networks use. These findings give important indications that not only an impulsive and a reflective system can guide human behavior and decision making, but also an interoceptive system. As stated by the authors, &#x201C;technology use behavior, [&#x2026;], can also often be influenced by salient situational temptations, which violate the balance between users&#x2019; reflective and impulsive information processing processes&#x201D; (<xref ref-type="bibr" rid="ref134">Turel and Bechara, 2016</xref>, p. 7). Consequently, body physiology and visceral status may also play an important role in the context of online self-disclosures. Following the important conceptualizations of dual-and tripartite-process models of decision making, we believe that it is also necessary for research on online self-disclosure to extent the frequently proposed perspective of a rather rational decision maker and to provide an integrative framework that additionally includes intuitive/impulsive as well as interoceptive processes.</p>
</sec>
</sec>
<sec id="sec4">
<title>The tripartite self-disclosure decision (TSDD) model</title>
<p>We now propose the Tripartite Self-Disclosure Decision (TSDD) model, which integrates previous assumptions from both several self-disclosure theories and general decision-making models. It conceptualizes the respective components and inner processes expected to be involved in the decision to self-disclose (or not to self-disclose) on social networks. The main components of the TSDD model are <italic>individual and environmental features</italic>, <italic>inner decision-making processes</italic>, the <italic>self-disclosure decision</italic> stage, <italic>behavior-related consequences</italic>, and <italic>feedback loops</italic>. The main assumption of this model is that different individual and environmental features influence individual&#x2019;s inner decision-making processes including the interplay of three neural systems (an impulsive, reflective, and interoceptive system), which shapes evaluation processes that lead to the final self-disclosure decision, followed by various consequences. Based on this proposed general connection between the model&#x2019;s components, we highlight that for many self-disclosure decisions on social networks, especially the impulsive (and interoceptive) system may play a predominant role due to specific individual (e.g., situational needs, trait impulsivity) and environmental features (e.g., push-notifications of social networks). However, the reflective system may also be triggered by protective features (e.g., the need for privacy or a warning message hinting at potential negative consequences), which could lead to more deliberate self-disclosure decisions that reduce the risk of experiencing negative consequences (e.g., increased hostility or privacy intrusions). The model is illustrated in <xref rid="fig1" ref-type="fig">Figure 1</xref>. In the following, we explain all components in more detail and highlight corresponding and related previous empirical findings.</p>
<fig position="float" id="fig1">
<label>Figure 1</label>
<caption>
<p>The Tripartite Self-Disclosure Decision (TSDD) model with bold arrows representing the main pathway of the self-disclosure decision-making process on social networks.</p>
</caption>
<graphic xlink:href="fpsyg-13-996512-g001.tif"/>
</fig>
<sec id="sec5">
<title>Individual and environmental features</title>
<p>In line with <xref ref-type="bibr" rid="ref107">Schiebener and Brand (2015)</xref>, <xref ref-type="bibr" rid="ref86">Masur (2018)</xref>, and <xref ref-type="bibr" rid="ref97">Omarzu (2000)</xref>, the first component of the TSDD model consists of <italic>individual and environmental features</italic> (see <xref rid="fig2" ref-type="fig">Figure 2</xref>). Previous research has investigated manifold variables and their relations and contributions to individuals&#x2019; online self-disclosure decisions. With respect to our theoretical process model, we try to cover many of these, but do not intend to be exhaustive.</p>
<fig position="float" id="fig2">
<label>Figure 2</label>
<caption>
<p>Selection of individual and environmental features relevant for self-disclosure decision making on social networks.</p>
</caption>
<graphic xlink:href="fpsyg-13-996512-g002.tif"/>
</fig>
<sec id="sec6">
<title>Individual features</title>
<p>Individual features include stable and non-stable aspects that are attributed to the person in a certain self-disclosure decision situation. Categories in which we have arranged the aspects are (i) <italic>general attributes</italic>, (ii) <italic>cognitive attributes</italic>, (iii) <italic>thinking styles, decision-making tendencies, and usage tendencies</italic>, (iv) <italic>privacy-related features</italic>, and (v) <italic>situational induced states</italic> (see <xref rid="fig2" ref-type="fig">Figure 2</xref>).</p>
<p>Under the term <italic>general attributes</italic>, we subsume sociodemographic characteristics, personality facets (e.g., extraversion, trait impulsivity, or reward sensitivity), and general/fundamental needs (e.g., the need to belong). Following previous studies, younger individuals were often found to share more information on social networks than older people (e.g., <xref ref-type="bibr" rid="ref30">Christofides et al., 2012</xref>; <xref ref-type="bibr" rid="ref145">Walrave et al., 2012</xref>) and their shared information was mentioned to be growing (<xref ref-type="bibr" rid="ref83">Madden et al., 2013</xref>). Gender was in general found to be a rather weak predictor, whereby women appear to disclose more broadly and in greater depth than men (see <xref ref-type="bibr" rid="ref57">Gerber et al., 2018</xref>). However, there are also studies reporting men to disclose more demographic details on Facebook (<xref ref-type="bibr" rid="ref7">Aharony, 2016</xref>) and more basic and contact information (<xref ref-type="bibr" rid="ref113">Special and Li-Barber, 2012</xref>) compared to women. Personality characteristics including extraversion or narcissism were related to the disclosure of different kinds of information within Facebook status updates (<xref ref-type="bibr" rid="ref84">Marshall et al., 2015</xref>). Furthermore, a recent study reported motor impulsivity to be positively related to individual&#x2019;s self-reported information disclosure and to moderate the relation between privacy concerns and information disclosure (<xref ref-type="bibr" rid="ref9">Aivazpour and Rao, 2020</xref>), which may indicate the involvement of non-reflective inner processes. In line with possible impacts of different impulsivity facets, neurocognitive studies highlighted the role of individual&#x2019;s reward sensitivity in the context of Likes on social networks (<xref ref-type="bibr" rid="ref110">Sherman et al., 2016</xref>, <xref ref-type="bibr" rid="ref109">2018</xref>) and reported associations with a problematic (addictive) use of the Internet (<xref ref-type="bibr" rid="ref59">He et al., 2017</xref>), which in turn can lead to higher self-disclosure levels (e.g., <xref ref-type="bibr" rid="ref89">Molavi et al., 2018</xref>, see category <italic>thinking styles, decision-making tendencies, and usage tendencies</italic>). Regarding individual&#x2019;s general needs, the need for popularity was shown to impact different social networks usage behaviors including strategic self-presentation, profile enhancement, and the disclosure of feelings (<xref ref-type="bibr" rid="ref137">Utz et al., 2012</xref>), and higher levels of need to belong were positively associated with the depth of self-disclosures (more intimate information) in status updates (<xref ref-type="bibr" rid="ref149">Winter et al., 2014</xref>).</p>
<p>Consistent with neurocognitive models of decision making (e.g., <xref ref-type="bibr" rid="ref107">Schiebener and Brand, 2015</xref>), the category <italic>cognitive attributes</italic> encompasses for example general executive functions, working memory, and the ability to control and regulate oneself, which are important for reflective functioning. <xref ref-type="bibr" rid="ref91">Muscanell (2013)</xref>, for instance, demonstrated that trait self-control can negatively predict the disclosure of self-damaging information (e.g., regarding alcohol consumption) on social networks. <xref ref-type="bibr" rid="ref89">Molavi et al. (2018)</xref> moreover reported that self-regulation was negatively associated with what they called &#x2018;toxic self-disclosure&#x2019;, covering riskier self-disclosures (with regard to a specific culture) compared to only the breadth and depth of disclosure. In an experimental study, <xref ref-type="bibr" rid="ref141">Veltri and Ivchenko (2017)</xref> further investigated the impact of induced cognitive scarcity in the form of ego depletion and cognitive load on the disclosure of sensitive information. They found that both had a significant positive effect on the amount of disclosed information, whereby working memory load was associated with a slightly higher level of information disclosure compared to the ego depletion condition.</p>
<p>Within the category <italic>thinking styles, decision-making tendencies, and usage tendencies</italic>, we refer, for example, to the need for cognition and faith in intuition (indicating a preference for reflective or intuitive processing, respectively), which were highlighted by <xref ref-type="bibr" rid="ref68">Kehr et al. (2015b)</xref> to be differently associated with the thoroughness of weighing risks and benefits of information disclosure. They found that individuals with the tendency for experiential thinking seem to overleap rational considerations and, in contrast, individuals scoring high on rational thinking seem to reflect more on risks and benefits. These results are in line with formerly mentioned dual-process theories (<xref ref-type="bibr" rid="ref18">Bechara, 2005</xref>; <xref ref-type="bibr" rid="ref107">Schiebener and Brand, 2015</xref>) and underline that the <italic>Privacy Calculus</italic> framework might be a useful explanatory approach under specific circumstances, but that it is likely not sufficient to be generally applied. Following this, individual&#x2019;s general decision-making tendencies (e.g., the preference for short-term over long-term choices) constitutes another important individual feature. A recent study highlighted that individual&#x2019;s preference for choosing short-term rewarding options while neglecting long-term (mainly negative) outcomes is associated with an increased extent of self-disclosure within posts on Facebook (<xref ref-type="bibr" rid="ref99">Ostendorf et al., 2020</xref>). In this study, it was also found that specific usage tendencies, namely problematic (addictive) social-networks-use tendencies, were related to higher levels of self-disclosure within posts, which overall provides indications of involved impulsive processes (see <xref ref-type="bibr" rid="ref99">Ostendorf et al., 2020</xref>). In line with this, a problematic (addictive) use of the Internet in general was also found to be significantly associated with higher levels of online self-disclosure (<xref ref-type="bibr" rid="ref89">Molavi et al., 2018</xref>).</p>
<p><italic>Privacy-related features</italic> that can influence online self-disclosure decisions are, for example, general privacy-related attitudes and concerns, privacy self-efficacy, individual&#x2019;s need for privacy, prior experiences, and literacy including knowledge and specific skills. Many studies already investigated the role of concerns and attitudes but found mixed results. Some studies highlighted a direct relation to online self-disclosure and privacy-management behaviors (e.g., <xref ref-type="bibr" rid="ref45">Dwyer et al., 2007</xref>; <xref ref-type="bibr" rid="ref151">Wu et al., 2012</xref>; <xref ref-type="bibr" rid="ref69">Kezer et al., 2016</xref>), whereas many others did not find a stable association (e.g., <xref ref-type="bibr" rid="ref3">Acquisti and Gross, 2006</xref>; <xref ref-type="bibr" rid="ref133">Tufekci, 2008</xref>; <xref ref-type="bibr" rid="ref103">Reynolds et al., 2011</xref>; <xref ref-type="bibr" rid="ref157">Zafeiropoulou, 2014</xref>; <xref ref-type="bibr" rid="ref101">Quan-Haase and Elueze, 2018</xref>) or specifically investigated the interplay of concerns and other factors in the prediction of privacy-related online behaviors, such as self-efficacy in privacy management, perceived social relevance of social web applications, or impulsivity facets (e.g., <xref ref-type="bibr" rid="ref126">Taddicken, 2014</xref>; <xref ref-type="bibr" rid="ref26">Chen and Chen, 2015</xref>; <xref ref-type="bibr" rid="ref9">Aivazpour and Rao, 2020</xref>). These results again emphasize the need for a better understanding of psychological processes underlying privacy-related decisions. Regarding the need for privacy, <xref ref-type="bibr" rid="ref132">Trepte and Masur (2020)</xref> argued that it &#x201C;may be a buffering factor against unhealthy and unsecure uses of online communication&#x201D; (p. 3), which would also include incautious self-disclosures on social networks. Further, prior experiences with privacy invasions, (declarative and procedural) knowledge, and skills can also act as protective factors (for example by translating into privacy-management behaviors), which was already highlighted by authors focusing on different online disclosures (e.g., <xref ref-type="bibr" rid="ref35">Debatin et al., 2009</xref>; <xref ref-type="bibr" rid="ref13">Bansal et al., 2010</xref>; <xref ref-type="bibr" rid="ref100">Park, 2013</xref>; <xref ref-type="bibr" rid="ref16">Bartsch and Dienlin, 2016</xref>; <xref ref-type="bibr" rid="ref69">Kezer et al., 2016</xref>; <xref ref-type="bibr" rid="ref22">B&#x00FC;chi et al., 2017</xref>).</p>
<p>Besides trait or trait-like features, specific <italic>situational induced states</italic> (see also <xref ref-type="bibr" rid="ref107">Schiebener and Brand, 2015</xref>; <xref ref-type="bibr" rid="ref87">Masur et al., 2018</xref>) are also considered. For example, individual&#x2019;s current mood (e.g., excitement), stress level, further states of mind (e.g., boredom), situational needs, motives, and goals, or norms can influence individual&#x2019;s online self-disclosures. It was, for instance, found that people in a positive mood disclosed more intimate and more positive information during a computer-mediated interaction than those in a negative or neutral mood (<xref ref-type="bibr" rid="ref55">Forgas, 2011</xref>). Further, arguing from the theoretical perspective of general decision making, perceived stress (also closely related to extreme mood such as depressive state) may affect cognitive processes, for instance by directing individual&#x2019;s attention to short-term rewarding options and probably risky alternatives, which can in turn result in the respective behavior (see also <xref ref-type="bibr" rid="ref117">Starcke and Brand, 2012</xref>). Moreover, the experience of boredom may also be an important state of mind (by triggering non-reflective processes), particularly for younger individuals (e.g., <xref ref-type="bibr" rid="ref34">Davis, 2012</xref>). Thus, situational-specific states and temporary emotional experiences could play an elementary role which needs to be investigated more deeply in future studies. Besides, it was argued that for achieving specific goals and for fulfilling current motives or situational needs (e.g., information sharing to benefit others, managing/maintaining specific relationships), varying depths and breadths of self-disclosure may be required for which differently safe environments may be chosen (e.g., instant messenger chats versus status updates and wall posts; see <xref ref-type="bibr" rid="ref17">Bazarova and Choi, 2014</xref>; <xref ref-type="bibr" rid="ref86">Masur, 2018</xref>). Another aspect that can influence self-disclosure decision-making processes on social networks are norms, which are situation- and context-specific and can be differentiated into descriptive and injunctive norms (<xref ref-type="bibr" rid="ref31">Cialdini et al., 1991</xref>). <xref ref-type="bibr" rid="ref158">Zlatolas et al. (2015)</xref>, for instance, found that privacy social norms, representing the perception that persons close to oneself expect a specific privacy-enhancing behavior (thus injunctive norms), were significantly related to lower levels of self-disclosure on social networks. In a recent study, <xref ref-type="bibr" rid="ref98">Ostendorf et al. (2022)</xref> further found that being confronted with posts from other users in which much information is shared (i.e., descriptive norms) can lead participants to disclose significantly more than those participants who are confronted with other users&#x2019; posts which contain only little personal information, indicating the involvement of intuitive and heuristic processes.</p>
</sec>
<sec id="sec7">
<title>Environmental features</title>
<p>Several environmental features can also play an important role for individual&#x2019;s decision making (e.g., <xref ref-type="bibr" rid="ref97">Omarzu, 2000</xref>; <xref ref-type="bibr" rid="ref107">Schiebener and Brand, 2015</xref>; <xref ref-type="bibr" rid="ref86">Masur, 2018</xref>). Those we consider relevant for users&#x2019; self-disclosure decisions on social networks are subsumed under <italic>application-related features</italic> and <italic>decision situation-related features</italic>. With regard to <italic>application-related features</italic>, we include applications&#x2019; notifications (push notifications), cues (e.g., application icons), affordances (e.g., Like-buttons, design aspects), the complexity of the respective system, privacy settings as well as audience characteristics and size. Following <xref ref-type="bibr" rid="ref130">Trepte (2015)</xref>, cues and affordances that are familiar to the user (termed warm affordances) stand in contrast to cold affordances (which are sparsely familiar to the user, e.g., the platform&#x2019;s privacy conditions) in the way that they encourage individuals to provide and share content and are easier accessible than cold affordances. Thus, specific application-related cues and affordances can challenge each other and can thereby influence individuals&#x2019; self-disclosure decisions on social networks. <xref ref-type="bibr" rid="ref96">Nyshadham and Van Loon (2014)</xref> further stated that it can depend on the design of a website whether privacy-related decisions are more likely made by relying on cognitive ease (i.e., effortless intuitive processes) or on cognitive strain (i.e., effortful reflective processes). Moreover, notifications may also constitute an important factor, since they likely affect individuals&#x2019; social media use (see <xref ref-type="bibr" rid="ref44">Du et al., 2019</xref>) and an increased usage of social media applications was in turn found to lead to a greater self-disclosure tendency (<xref ref-type="bibr" rid="ref145">Walrave et al., 2012</xref>; <xref ref-type="bibr" rid="ref24">Chang and Heo, 2014</xref>). Another noteworthy aspect that may affect individuals&#x2019; self-disclosure decisions on social networks is the structural complexity of the respective platforms. Given that social networks live from the data their users provide them, their information and data dissemination model is quite complex and often not easy to understand. Due to the multitude of integrated third party applications, their growing interconnections, and the way that these connections &#x201C;are (not) communicated can make it hard to understand and manage how personal information is shared and stored online&#x201D; (<xref ref-type="bibr" rid="ref70">King et al., 2011</xref>, p. 3). Thus, this complexity may influence individuals&#x2019; self-disclosures by influencing inner decision-making processes, which is outlined in greater depth in the next section. Along with the structural complexity of social networks, the scope of possible privacy settings and the degree of difficulty or intricateness to manage them needs also to be taken into account. Following the study of <xref ref-type="bibr" rid="ref108">Shane-Simpson et al. (2018)</xref>, differences in available privacy settings can create (in combination with other factors such as provided communication modes, privacy concerns, or personality characteristics) preferences for different social networks (i.e., Twitter, Instagram, or Facebook) and can thereby elicit different levels of self-disclosure. Further, the social sphere that is able to access one&#x2019;s shared information, meaning the audience with its characteristics and size, can impact the extent to which an individual self-discloses. For example, using smaller sub-networks of desired people was found to be associated with increasing self-disclosures since it can strengthen the experience of bonding and bridging social capital (e.g., <xref ref-type="bibr" rid="ref124">Stutzman et al., 2012</xref>). However, other works also reported that preferring a specific network (i.e., Twitter) was associated with having a public profile rather than a private one (thus having no audience restrictions) and subsequently also high levels of self-disclosure as well as high experienced bridging social capital (<xref ref-type="bibr" rid="ref108">Shane-Simpson et al., 2018</xref>).</p>
<p>With regard to <italic>decision situation-related features</italic>, explicit information about positive and negative short- and long-term consequences (thus their perceptibility) and information about the riskiness (including severity and probability of risk occurrence; see <xref ref-type="bibr" rid="ref106">Rohrmann, 2008</xref>) attributable to a specific self-disclosure decision situation can also play an important role. The level of perceptibility is closely related to design and complexity of the respective service and is likely not balanced in terms of positive/negative and short-/long-term consequences, meaning that long-term (negative) consequences are rather intangible compared to short-term (positive) consequences (e.g., <xref ref-type="bibr" rid="ref127">Taddicken and Jers, 2011</xref>; <xref ref-type="bibr" rid="ref46">Efroni et al., 2019</xref>). However, providing information on possible negative short- and long-term consequences within a warning message was recently shown to be able to reduce the likelihood that a post is created on a (fictitious) social network, indicating the triggering of reflective processes (<xref ref-type="bibr" rid="ref98">Ostendorf et al., 2022</xref>). In general, a varying amount or kind of information that is provided in a specific decision-situation (for instance, percentages on the likelihood of specific risks when sharing the phone number with different audiences or the potential severity of specific risks when sharing one&#x2019;s personal address or religious views) can be relevant for individual&#x2019;s self-disclosure decision making. Nevertheless, such environmental features and their impact on individuals&#x2019; self-disclosure decisions on social networks still need to be investigated in more detail. Moreover, the structure and functionalities of those manifold platforms vary greatly, which can further impact individual&#x2019;s inner decision-making processes to different extents.</p>
</sec>
</sec>
<sec id="sec8">
<title>Inner decision-making processes including a tripartite structure of involved neural systems</title>
<p>After reviewing individual and environmental features that can impact self-disclosure decisions on social networks, one aspect still remains not sufficiently understood: the mechanisms that underlie the decision for or against the disclosure of personal information. In the following, we therefore describe the inner decision-making processes that are assumed to be central to such decisions.</p>
<p>We argue that, based on individual and environmental features, individuals subsequently perceive specific self-disclosure situations differently (see also <italic>Privacy Process Model</italic> by <xref ref-type="bibr" rid="ref38">Dienlin, 2014</xref>). That means that the <italic>perception</italic> of, for example, specific internal and external triggers (e.g., current mood and notifications), possible short- and long-term benefits and risks (e.g., reduction of negative mood), or one&#x2019;s personal control (e.g., over personal information) is subjective, which then influences the interplay of the impulsive, reflective, and interoceptive system. In accordance with this notion, an individual who has, for instance, in general a high need to belong and in a specific situation feels socially isolated may perceive this feeling as highly unpleasant and may especially perceive the expected benefits associated with the decision to self-disclose on social networks as salient. Hence, the individual may perceive an incoming notification as a welcome distraction and may react with increased attention towards this notification or further cues on social networks (e.g., the possibility to mention others in posts and to receive Likes). Thus, the subjective perception of a situation may be accompanied by specific affective and cognitive responses and subsequently, it can influence the triggering of a leading processing system and the resulting evaluation of possible options. This is in line with a recent study by <xref ref-type="bibr" rid="ref44">Du et al. (2019)</xref>, showing that an increased attention towards notifications (including perceived distraction frequency) can increase individuals&#x2019; failure to control the desire to use social media, which in turn could increase individuals&#x2019; self-disclosure tendency (see <xref ref-type="bibr" rid="ref145">Walrave et al., 2012</xref>; <xref ref-type="bibr" rid="ref24">Chang and Heo, 2014</xref>). In the depicted example, an individual&#x2019;s lacking perception of possible negative consequences and their riskiness may be common in everyday life and may additionally lead to an increased self-disclosure tendency. The complexity of social networks and veiled negative (long-term) consequences may influence users&#x2019; perception in the way that they may not fully conceive the riskiness of self-disclosing, which in turn can influence their respective decisions. Consistently, other authors noted that possible negative (long-term) consequences are in principle not mentioned and thus not perceivable (<xref ref-type="bibr" rid="ref127">Taddicken and Jers, 2011</xref>; <xref ref-type="bibr" rid="ref46">Efroni et al., 2019</xref>), whereas social networks are primarily designed to fulfill their users&#x2019; needs and to let them experience immediate gratification (<xref ref-type="bibr" rid="ref127">Taddicken and Jers, 2011</xref>).</p>
<p>Regarding the interplaying processing modes, cognitive control functions (such as inhibitory control) and the weighing of perceived short-/long-term benefits and risks associated with a specific disclosure decision (i.e., the core concept of the <italic>Privacy Calculus Theory</italic>, see <xref ref-type="bibr" rid="ref32">Culnan and Armstrong, 1999</xref>; <xref ref-type="bibr" rid="ref40">Dienlin and Metzger, 2016</xref>) can be allocated to the reflective system. In contrast, deciding based on gut feelings, heuristics, anticipated rewards, or urges would be attributed to the impulsive system (<xref ref-type="bibr" rid="ref19">Bechara and Damasio, 2005</xref>; <xref ref-type="bibr" rid="ref107">Schiebener and Brand, 2015</xref>). Due to the fact that social networks lack indications for strategic decisions (i.e., information and immediate feedback on possible negative consequences), which probably increases the relative degree of uncertainty of the respective decision situation, reflective processing can be complicated and the involvement of the impulsive system can be increased, similar to what is found for effects of stress on decision making in situations with increasing uncertainty (see <xref ref-type="bibr" rid="ref117">Starcke and Brand, 2012</xref>). Furthermore, prior research also found that self-disclosures were related to neural responses ascribed to the impulsive system (including limbic structures). <xref ref-type="bibr" rid="ref128">Tamir and Mitchell (2012)</xref>, for instance, noted that self-disclosure may hold an intrinsic value due to the chance to introspect about oneself and to share this information with other people. This was supported by empirical data: neural regions that are associated with reward processing and part of the mesolimbic dopamine system (i.e., the nucleus accumbens, belonging to the ventral striatum, and the ventral tegmental area) have solidly been activated during self-disclosures (<xref ref-type="bibr" rid="ref128">Tamir and Mitchell, 2012</xref>). This supports our critical questioning of the often proposed rational &#x201C;calculus&#x201D; for self-disclosure decisions, which would require especially prefrontal control. Actually, the decision to self-disclose can also be guided by the impulsive system since the respective situation may hinder cognitive control, which probably also explains other researchers&#x2019; remark that users often appear to be unhesitant when they share abundant information about themselves online (<xref ref-type="bibr" rid="ref133">Tufekci, 2008</xref>; <xref ref-type="bibr" rid="ref72">Kokolakis, 2017</xref>).</p>
<p>As noted above, individual and environmental features and resulting perceptions can impact the interplay of the inner systems so that individuals may decide rather reflectively or impulsively. For instance, knowledge about possible risks, which would actually support deliberation and controlled processes (reflective system), may be passed over by a strong anticipation of rewards and gratification, thus resulting in a shift towards impulsive processes as the leading mode. However, a high fear of risks (impulsive system) may also trigger the reflective system by exerting self-control and inhibition (see also <xref ref-type="bibr" rid="ref107">Schiebener and Brand, 2015</xref>). Besides the interplay of the impulsive and reflective system, the interoceptive system is assumed to additionally interact with both systems. By processing bodily stages (e.g., in the form of sensing temptations resulting from an increased heart rate) it can be seen as a kind of mediator between the reflective and the impulsive system (<xref ref-type="bibr" rid="ref150">Wood and Bechara, 2014</xref>), whereby it is expected to often lead to &#x201C;the promotion of impulsive behaviors and the hijacking of decision-making processes concerned with the control of these impulses&#x201D; (<xref ref-type="bibr" rid="ref135">Turel and Bechara, 2017</xref>, p. 92; based on <xref ref-type="bibr" rid="ref93">Naqvi and Bechara, 2010</xref>). In the case of self-disclosures on social networks, individuals could, for example, consciously experience urgent temptations and desires (e.g., the temptation to share a picture when being in a state of arousal) that augment an impulsive information processing and reduce possible reflective processes (e.g., the usage of knowledge about the probability of privacy risks). This interaction can then influence the evaluation of possible options (<italic>level of evaluation</italic>). The resulting evaluation processes can thereby take place very quickly (depending on the leading processing mode) and may also be dynamic and iterative (see also <xref ref-type="bibr" rid="ref33">Cunningham et al., 2007</xref>; <xref ref-type="bibr" rid="ref138">Van Bavel et al., 2012</xref>). For instance, an individual may evaluate, predominantly driven by the impulsive system, that sharing specific information is the favorable option, and thus (quickly) decides to self-disclose. However, this option might also be checked via the reflective system before the decision is made (e.g., deliberate consideration of potential risks), which illustrates that both systems may also continue to interact during the final evaluation. Further, additional information (e.g., negative or positive comments in other posts) can also be integrated, so that further options may be evaluated and the level of evaluation may be deepened.</p>
<p>The propositions presented in this section can help to better understand self-disclosure decisions on social networks. It is likely that the impulsive system is predominantly involved in many self-disclosure decision situations &#x2013; potentially strengthened by bodily awareness &#x2013; while reflective processes may be diminished. Even if research on a behavioral and neurocognitive level regarding such a tripartite decision-making model is generally scarce, it is notably progressing and thus underpins our effort to also apply such propositions to the area of self-disclosure on social networks. In this area, we are not aware of any work that has theoretically conceptualized such a tripartite structure of inner decision-making processes in detail yet.</p>
</sec>
<sec id="sec9">
<title>Self-disclosure decision, behavior-related consequences, and feedback loops</title>
<p>Following the evaluation of possible options, an individual is expected to make a respective <italic>self-disclosure decision.</italic> A person can, without further adjusting any privacy-related environmental aspects, decide to self-disclose with regard to different dimensions, including an informational and psychological dimension (see <xref ref-type="bibr" rid="ref23">Burgoon, 1982</xref>), and with regard to, for instance, a certain depth or breadth (see also <italic>Disclosure Decision Model</italic> by <xref ref-type="bibr" rid="ref97">Omarzu, 2000</xref>). For example, an individual could share very intimate information (e.g., feelings with regard to a new romantic relationship) within a post on social networks which is not restricted to a specific audience and can thus be seen and further shared by anyone. This case may arise if the impulsive system is triggered as the leading mode, for instance, if risks are mainly intangible and the individual has to rely on gut feelings and is led by anticipated short-term gratification, which is potentially fortified by bodily states (e.g., a fast heartbeat). Here, the interoceptive system could amplify impulsive processes and may alleviate reflective ones (see <xref ref-type="bibr" rid="ref134">Turel and Bechara, 2016</xref>). Thus, the decision to share very intimate or extensive information without further adjustments may predominantly be led by the impulsive system that is potentially amplified by interoceptive processes. Apart from that, the decision to self-disclose without any privacy adjustments may also be the result of rather reflective processes, if an individual is, for example, quite aware of possible negative consequences and the lack of control over personal information, but strategically hazards the consequences in order to achieve specific long-term outcomes (e.g., increased popularity and impact on social networks). However, even if this might hold true for some users, we argue that most users are probably engaging in extensive self-disclosures on social networks due to the prospect of short-term rewards (such as positive feedback from friends), which appear more salient than possible negative long-term consequences and thus complicate reflective weighing processes.</p>
<p>Moreover, individuals may also decide to self-disclose (e.g., to a certain depth or valence) on condition that privacy-related environmental aspects are adjusted (i.e., preservative/corrective privacy regulations), for instance by changing the visibility of a post (see also <italic>Privacy Process Model</italic> by <xref ref-type="bibr" rid="ref38">Dienlin, 2014</xref>; <italic>Situational Privacy and Self-Disclosure</italic> by <xref ref-type="bibr" rid="ref86">Masur, 2018</xref>). Especially here, the proposed interaction between the different neural systems appears to be quite observable. Such a self-disclosure decision making is also in line with studies reporting that some users indeed restrict access to their information (on a horizontal level) by defining the audience, which is, however, not necessarily accompanied by lower self-disclosure levels (<xref ref-type="bibr" rid="ref124">Stutzman et al., 2012</xref>, <xref ref-type="bibr" rid="ref123">2013</xref>). Further, a study by <xref ref-type="bibr" rid="ref146">Wang et al. (2013)</xref> used different nudges including one that was meant to remind users of who would be able to see the post they are currently creating and the authors concluded that with this supporting information, users can be encouraged to (at least in some situations) change their privacy settings before posting. Thus, reflective processes may be triggered by such additional information and could lead, whilst also taking into account further intuitive or impulsive as well as interoceptive processes, to more deliberate self-disclosures.</p>
<p>Finally, individuals may also decide not to engage in self-disclosure on social networks. An individual may evaluate that self-disclosing would be too risky in a given situation (even though specific cues may also hint at potential benefits) and based on mainly reflective processes including monitoring and inhibitory control the individual decides not to self-disclose. Of course, it can also be argued that such decisions can as well be guided by the impulsive system &#x2013; for example, if an individual is in general very risk-averse and perceives many situations as risky, thus also the respective self-disclosure decision situation, and the individual is then, for instance, led by strong emotions such as fear, which leads to the decision not to disclose. An individual could also generally (meaning in a rather automatic way based on past experiences and negative attitudes) not engage in self-disclosures across various situations. However, we argue that in many cases, the decision not to self-disclose on social networks is probably resulting from mainly reflective processes triggered by specific factors (e.g., the presence of profound skills or a warning message; e.g., <xref ref-type="bibr" rid="ref22">B&#x00FC;chi et al., 2017</xref>; <xref ref-type="bibr" rid="ref98">Ostendorf et al., 2022</xref>) which may lead to a correspondingly strong risk perception, although the impulsive system (and interoceptive processes) can be involved as well.</p>
<p>After a self-disclosure decision has been made and individuals engaged in the respective behavior, various consequences can occur. These can be categorized as follows: <italic>short-term positive</italic>, <italic>short-term negative</italic>, <italic>long-term positive</italic>, and <italic>long-term negative</italic>. Depending on the self-disclosure extent, these consequences can also differ in their scope. An exemplary classification of possible consequences can be found in <xref rid="fig3" ref-type="fig">Figure 3</xref>. For instance, individuals may experience high immediate gratification or an increased reduction of negative mood (<italic>short-term positive</italic>) due to high self-disclosure on social networks, but may also in some situations experience an increased amount of negative reactions or dislike (<italic>short-term negative</italic>). In turn, both can - as a form of <italic>feedback</italic> - impact specific individual features (e.g., stabilizing individual&#x2019;s reward sensitivity or broadening personal experiences), but also the inner decision-making processes in subsequent self-disclosure decision situations. It can further be argued that, for instance, the recurring experience of gratification due to individual&#x2019;s self-disclosure on social networks could, in turn, lead to habitual disclosing behaviors that may automatically take place in specific situations. Following <xref ref-type="bibr" rid="ref107">Schiebener and Brand (2015)</xref>, risk-reinforcing feedback (e.g., experienced rewards) can promote a processing via the impulsive system, while risk-punishing feedback (e.g., negative comments from others) can promote a processing via the reflective system (see also <xref ref-type="bibr" rid="ref53">Figner et al., 2009</xref>). Since risk-reinforcing feedback is probably most frequently experienced in the context of self-disclosures on social networks, a subsequent processing via the impulsive system (including an increased disregard of long-term consequences) may be amplified (<italic>cf.</italic> <xref ref-type="bibr" rid="ref107">Schiebener and Brand, 2015</xref>; <xref ref-type="bibr" rid="ref90">M&#x00FC;ller et al., 2017</xref>), which can in turn be associated with the development of habituated and automatic behaviors (<italic>cf.</italic> <xref ref-type="bibr" rid="ref134">Turel and Bechara, 2016</xref>). Moreover, the sensitivity towards specific cues (e.g., an application&#x2019;s logo) as part of conditioning processes can be an important factor that may increasingly contribute to inconsiderate self-disclosing decisions on social networks (<italic>cf.</italic> <xref ref-type="bibr" rid="ref107">Schiebener and Brand, 2015</xref>). This is also in line with research focusing on usage behaviors in media-rich environments (e.g., <xref ref-type="bibr" rid="ref92">Naab and Schnauber, 2016</xref>; <xref ref-type="bibr" rid="ref60">Hofmann et al., 2017</xref>; <xref ref-type="bibr" rid="ref140">van Koningsbruggen et al., 2017</xref>, <xref ref-type="bibr" rid="ref139">2018</xref>). Further, certain <italic>positive long-term</italic> consequences (e.g., strengthened relationships) and <italic>negative long-term</italic> outcomes (e.g., increased vulnerability for unintended usage of personal content) due to extensive self-disclosures can also act as a form of positive or negative <italic>feedback</italic> (see also <italic>Disclosure Processes Model</italic> by <xref ref-type="bibr" rid="ref25">Chaudoir and Fisher, 2010</xref>), whereby especially <italic>negative long-term</italic> effects may often not be recognized as being induced by the specific behavior. Thus, their impact on subsequent decisions may be lower than the impact of <italic>short-term</italic>, especially <italic>short-term positive</italic>, consequences. However, this still needs to be investigated more deeply in future studies. Overall, positive and negative short- and long-term consequences may also lead to the <italic>initiation of subsequent environmental adjustments</italic> (e.g., changing general privacy settings, deactivating push-notifications). For example, an individual may have posted a picture visible for the public (e.g., anyone on or off Facebook) and self-disclosed without modifying any environmental aspects. Subsequently, due to the experience of hostile comments, the individual may change default settings (e.g., who can comment their public posts) and further aspects (e.g., general profile visibility). On the contrary, experiencing positive comments and approval may also lead to a change from a previously limited post visibility (e.g., friends only) to the default of a public visibility for subsequent posting situations.</p>
<fig position="float" id="fig3">
<label>Figure 3</label>
<caption>
<p>Classification of potential consequences related to the extent of individual&#x2019;s self-disclosure on social networks (positive/ negative short- and long-term consequences can increase or decrease, depending on, for instance, the amount, duration, depth, or breadth of information disclosure). These potential consequences are exemplary and do not claim to be exhaustive.</p>
</caption>
<graphic xlink:href="fpsyg-13-996512-g003.tif"/>
</fig>
</sec>
</sec>
<sec id="sec10">
<title>Discussion and future directions</title>
<p>Research on causes and effects of individuals&#x2019; self-disclosures on social networks has been growing notably over the last years. However, there are still substantive gaps of knowledge, especially with regard to psychological mechanisms underlying self-disclosure decisions. The question of why so many people engage in extensive self-disclosures on social networks, although this can be accompanied with severe consequences, whereas others do not, has so far often been explained by proposing a rather strategic and calculative user. As highlighted here and by dual-and tripartite-system approaches that serve as a theoretical basis, such a view can be questioned since human decision making can also be guided by intuitive or impulsive processes. Furthermore, the perception and awareness of bodily stages (associated with the interoceptive system) may also be a relevant aspect that has not been investigated sufficiently by now, especially in the context of self-disclosure decision making on social networks. Consequently, previous findings that have been interpreted in light of the <italic>Privacy Calculus</italic> may need to be critically reinterpreted, especially since many studies did not directly provide evidence for a weighing process of benefits and risks (see also <xref ref-type="bibr" rid="ref71">Knijnenburg et al., 2017</xref>; <xref ref-type="bibr" rid="ref39">Dienlin et al., 2020</xref>). It therefore appears necessary to increasingly apply neuroimaging methods (e.g., functional magnetic resonance imaging, fMRI) when examining individuals&#x2019; self-disclosure decisions in order to receive a clearer picture of underlying mechanisms and involved neural systems based on respective brain activity. From a neuropsychological perspective, research should thus closer investigate the proposed involved systems, whereby especially a deeper exploration of the role of the insula and the interoceptive system may provide helpful new insights. However, it has to be taken into account that a specific construct or variable cannot be mapped clearly onto only one specific brain area and complex (impulsive, reflective, and interoceptive) processes involve multiple brain regions, which can be interconnected (see also <xref ref-type="bibr" rid="ref134">Turel and Bechara, 2016</xref>). More research is still needed here to get a clearer picture of associations between behavioral and neural processes. Consequently, our proposed model is not meant to be final, but needs to be tested systematically in order to derive a better understanding of self-disclosure decisions - particularly in view of the fact that (a) there may of course be further noteworthy features that we do not explicitly mention in this manuscript, and (b) previous results are sometimes mixed (e.g., regarding the impact of individual or environmental features), as mentioned in the respective sections.</p>
<p>Nevertheless, we think that the TSDD model can strongly promote future research, especially due to the provision of theoretical assumptions regarding inner decision-making processes and also by outlining that specific constructs can interact with each other and thereby influence inner decision-making processes to different extends. This, as a whole, can help to disentangle seemingly paradoxical behaviors subsumed under the term <italic>privacy paradox</italic> (e.g., <xref ref-type="bibr" rid="ref14">Barnes, 2006</xref>; <xref ref-type="bibr" rid="ref15">Barth and de Jong, 2017</xref>). Future studies should therefore investigate interactions and interrelations between different features more systematically and also how these are associated with perception processes, neural activations, evaluation processes, and finally the respective decision. Systematic variations of the decision situation and experimentally manipulating different proposed features will help to better understand individuals&#x2019; decisions under different circumstances (see also <xref ref-type="bibr" rid="ref98">Ostendorf et al., 2022</xref>). Moreover, by focusing on actual behavior rather than self-disclosure intentions, and by conducting longitudinal investigations by, for instance, applying ambulatory assessment tools, casual relationships can be better understood and protective approaches can be optimized. Interventions in the form of nudges or warning messages to prevent users from incautious information sharing online (by triggering reflective processes) could be optimized and also more systematically validated (i.e., which approaches work particularly well for which groups of people and under which circumstances). The general need for user support is also highlighted in several recent works (e.g., <xref ref-type="bibr" rid="ref1">Acquisti et al., 2017</xref>; <xref ref-type="bibr" rid="ref115">Spottswood and Hancock, 2017</xref>; <xref ref-type="bibr" rid="ref8">A&#x00EF;meur et al., 2019</xref>; <xref ref-type="bibr" rid="ref36">D&#x00ED;az Ferreyra et al., 2019</xref>, <xref ref-type="bibr" rid="ref37">2022</xref>; <xref ref-type="bibr" rid="ref46">Efroni et al., 2019</xref>; <xref ref-type="bibr" rid="ref74">Kr&#x00E4;mer and Sch&#x00E4;wel, 2020</xref>; <xref ref-type="bibr" rid="ref88">Meier et al., 2020</xref>) and protective approaches likely need to be dynamic in order to react to dynamic changes within the user and the environment. With our suggested process model, we can aid in facing such challenges (e.g., what kind of warning message supports whom in what situation?) and in solving further remaining research questions. The TSDD model enables researchers from different disciplines to formulate concrete hypotheses of interest including moderation and mediation hypotheses on potentially preventive features and factors that may complicate the triggering of reflective processes as well as more complex hypotheses (e.g., addressed using structural equation modeling) on the involvement of the proposed neural systems. One example may be: The positive relationship between trait impulsivity and the extent of shared information on social networks can be reduced by the presentation of warning messages. Researchers may also be interested in more complex hypotheses including interoceptive processes, for example: With increasing temptation to use social networks (indicating the triggering of the interoceptive system), people share an increased amount of information on social networks; the temptation to use social networks further strengthens the positive effect of trait impulsivity (expected to trigger the impulsive system) and weakens the negative effect of self-control (expected to trigger the reflective system) on the amount of shared information on social networks. In order to test such hypotheses, researchers can apply different measurements and experimental designs.</p>
<p>As exemplary specifications of the more generic hypotheses just mentioned, researchers could derive the following assumptions regarding the first one: Given that the motor impulsivity facet (e.g., to act on impulse) was found to be positively related to the extent of online information disclosure (<xref ref-type="bibr" rid="ref9">Aivazpour and Rao, 2020</xref>), this relationship is also likely observable in the specific context of social networks. Individuals with high motor impulsivity may lack inhibitory control that is necessary to counteract or suppress rather spontaneous and reflexive reactions to those many input and interaction possibilities provided on social networks (<xref ref-type="bibr" rid="ref9">Aivazpour and Rao, 2020</xref>), which may result in broad self-disclosures. Besides, research has shown that warning messages with information on potential negative consequences can support more deliberate self-disclosure decisions, thus likely triggering reflective processes. For instance, for individuals who received a warning message on a fictitious social network that informed about possible short- and long-term negative consequences, the likelihood of creating a post (rather than not creating a post) was lower compared to those who did not receive a warning message (<xref ref-type="bibr" rid="ref98">Ostendorf et al., 2022</xref>). For those who proceeded creating a post, however, the presentation of this warning message did not reduce the amount of shared information within the post, thus calling for more research. Specified and more dynamic warning messages may be helpful for individuals with certain characteristics, such as high levels of motor impulsivity. Receiving content-dependent warning messages in temporal proximity to information sharing decisions (i.e., popping up when clicking on the button &#x2018;post&#x2019;) may support those individuals by triggering reflective processes and reducing impulsive ones. For such research purposes, specific tools (e.g., the app ENAGRAM as introduced by <xref ref-type="bibr" rid="ref37">D&#x00ED;az Ferreyra et al., 2022</xref>) may be used and adapted in order to manipulate experimental conditions (e.g., post-dependent warning messages versus no warnings) and to collect and analyze behavioral data (e.g., by implementing content analysis techniques into ENAGRAM, the breadth of users&#x2019; disclosures via posts could be assessed). Thus, a specified hypothesis may be: The positive relationship between motor impulsivity (assessed with the Barratt Impulsiveness Scale, BIS-15, <xref ref-type="bibr" rid="ref114">Spinella, 2007</xref>) and the breadth of shared information via posts (measured with an adapted version of the app ENAGRAM by <xref ref-type="bibr" rid="ref37">D&#x00ED;az Ferreyra et al., 2022</xref>) is reduced by the presentation of warning messages with post-dependent information on possible short- and long-term consequences.</p>
<p>Regarding the more complex hypothesis, researchers may derive the following specification: With increasing temptation to use social networks in boredom/idle time situations (measured with items proposed by <xref ref-type="bibr" rid="ref134">Turel and Bechara, 2016</xref>), people share an increased breadth of information on social networks (measured with a modified version of the Revised Self-Disclosure Scale, see <xref ref-type="bibr" rid="ref61">Hollenbaugh and Ferris, 2014</xref>); the temptation to use social networks in boredom/idle time situations further strengthens the positive effect of motor impulsivity (assessed with the BIS-15, <xref ref-type="bibr" rid="ref114">Spinella, 2007</xref>) and weakens the negative effect of self-control (assessed with the Self-Control Scale, <xref ref-type="bibr" rid="ref129">Tangney et al., 2004</xref>) on the breadth of shared information on social networks. As highlighted in previous work, boredom or idle time may be a key driver of social networks usage by creating a strong sense of temptation (<xref ref-type="bibr" rid="ref134">Turel and Bechara, 2016</xref>). Social networks usage is further positively associated with the tendency toward self-disclosure (e.g., <xref ref-type="bibr" rid="ref145">Walrave et al., 2012</xref>), so that the temptation to use social networks in boredom/idle time situations likely increases individuals&#x2019; extent of information sharing. Further, this temptation may perturb the balance between impulsive and reflective processes, so that it strengthens the involvement of impulsive ones and reduces the involvement of reflective ones (see also <xref ref-type="bibr" rid="ref134">Turel and Bechara, 2016</xref>). As argued above, individuals with increasing levels of motor impulsivity may lack necessary inhibitory control and thus share broader information about themselves on social networks. This relationship may be further amplified by temptation in boredom/idle time situations. In contrast, an increased ability for self-control can be a buffering factor and was found to be related to lower self-disclosure on Facebook (<xref ref-type="bibr" rid="ref155">Yu, 2014</xref>). Thus, for individuals with higher levels of self-control, the reflective system may predominantly guide decision making, which may manifest in a reduced breadth of shared information. However, strong temptation in boredom/idle time situations may impair the involvement of the reflective system so that the effect of self-control is weakened. Finally, in addition to deriving various hypotheses from the TSDD model and specifying them, as outlined here by way of example, future research may also build upon our propositions and embed them into a wider framework which also considers a group level of information sharing (see, for instance, the theory of multilevel information privacy by <xref ref-type="bibr" rid="ref20">B&#x00E9;langer and James, 2020</xref>).</p>
</sec>
<sec id="sec11" sec-type="conclusions">
<title>Conclusion</title>
<p>The Tripartite Self-Disclosure Decision (TSDD) model is a theoretical framework developed to explain and conceptualize individuals&#x2019; self-disclosure decisions on social networks. It contains different components, whereby individual and environmental features are proposed to (interactively) influence inner decision-making processes that subsequently lead to the final behavioral decision and corresponding short- and long-term consequences, which, in turn, can reinforce certain components in subsequent decision situations. Subjective perception processes, the interplay of three neural systems, and evaluation processes are thereby components of the inner decision-making processes. A reflective, an impulsive, as well as an interoceptive system are considered as important interplaying neural systems. Based on dual-and tripartite-system perspectives and current progression in neurocognitive research on decision-making, this model focuses on potential mechanisms underlying the decision to self-disclose on social networks, which may result in negative consequences including privacy breaches. By taking such a neurocognitive perspective, we expand current research and existing models on privacy-related decisions online. Although the TSDD model is already based on theoretical assumptions and empirical results from different disciplines, its hypothesized constructs and processes should be examined systematically in future studies. This will help to better understand seemingly paradoxical behaviors and may clear up why individuals provide large amounts of personal information on social networks, although this can be accompanied by severe negative consequences on various levels. Finally, this model could also help to develop more effective support measures that prevent users from incautious information sharing once the underlying and complex mechanisms have been examined in greater detail.</p>
</sec>
<sec id="sec12" sec-type="data-availability">
<title>Data availability statement</title>
<p>All original contributions are included in the article, further inquiries can be directed to the corresponding author.</p>
</sec>
<sec id="sec13">
<title>Author contributions</title>
<p>All authors contributed to conceptualization and visualization. SO wrote the first draft of the manuscript. MB supervised the work and reviewed and edited the manuscript. All authors reviewed and commented on previous versions of the manuscript. All authors contributed to the article and approved the submitted version.</p>
</sec>
<sec id="sec14" sec-type="funding-information">
<title>Funding</title>
<p>This work was supported by the German Research Foundation (DFG) under grant no. [GRK 2167] Research Training Group &#x201C;User-Centred Social Media.&#x201D; We acknowledge support by the Open Access Publication Fund of the University of Duisburg&#x2013;Essen.</p>
</sec>
<sec id="conf1" sec-type="COI-statement">
<title>Conflict of interest</title>
<p>The authors declare that the research was conducted in the absence of any commercial or financial relationships that could be construed as a potential conflict of interest.</p>
</sec>
<sec id="sec100" sec-type="disclaimer">
<title>Publisher&#x2019;s note</title>
<p>All claims expressed in this article are solely those of the authors and do not necessarily represent those of their affiliated organizations, or those of the publisher, the editors and the reviewers. Any product that may be evaluated in this article, or claim that may be made by its manufacturer, is not guaranteed or endorsed by the publisher.</p>
</sec>
</body>
<back>
<ack>
<p>We thank Dr. Silke M&#x00FC;ller, Dr. Elisa Wegmann, and Christina Koessmeier for their valuable suggestions.</p>
</ack>
<ref-list>
<title>References</title>
<ref id="ref1"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Acquisti</surname> <given-names>A.</given-names></name> <name><surname>Adjerid</surname> <given-names>I.</given-names></name> <name><surname>Balebako</surname> <given-names>R.</given-names></name> <name><surname>Brandimarte</surname> <given-names>L.</given-names></name> <name><surname>Cranor</surname> <given-names>L. F.</given-names></name> <name><surname>Komanduri</surname> <given-names>S.</given-names></name> <etal/></person-group>. (<year>2017</year>). <article-title>Nudges for privacy and security: understanding and assisting users&#x2019; choices online</article-title>. <source>ACM Comput. Surv.</source> <volume>50</volume>, <fpage>1</fpage>&#x2013;<lpage>41</lpage>. doi: <pub-id pub-id-type="doi">10.1145/3054926</pub-id></citation></ref>
<ref id="ref2"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Acquisti</surname> <given-names>A.</given-names></name> <name><surname>Brandimarte</surname> <given-names>L.</given-names></name> <name><surname>Loewenstein</surname> <given-names>G.</given-names></name></person-group> (<year>2015</year>). <article-title>Privacy and human behavior in the age of information</article-title>. <source>Science</source> <volume>347</volume>, <fpage>509</fpage>&#x2013;<lpage>514</lpage>. doi: <pub-id pub-id-type="doi">10.1126/science.aaa1465</pub-id>, PMID: <pub-id pub-id-type="pmid">25635091</pub-id></citation></ref>
<ref id="ref3"><citation citation-type="book"><person-group person-group-type="author"><name><surname>Acquisti</surname> <given-names>A.</given-names></name> <name><surname>Gross</surname> <given-names>R.</given-names></name></person-group> (<year>2006</year>). &#x201C;<article-title>Imagined communities: awareness, information sharing, and privacy on the Facebook</article-title>,&#x201D; in <source>Lecture notes in computer science: Vol. 4258. Privacy enhancing technologies</source>. eds. <person-group person-group-type="editor"><name><surname>George</surname> <given-names>D.</given-names></name> <name><surname>Golle</surname> <given-names>P.</given-names></name></person-group> (<publisher-loc>Berlin</publisher-loc>: <publisher-name>Springer</publisher-name>)</citation></ref>
<ref id="ref4"><citation citation-type="other"><person-group person-group-type="author"><name><surname>Acquisti</surname> <given-names>A.</given-names></name> <name><surname>Grossklags</surname> <given-names>J.</given-names></name></person-group> (<year>2003</year>). Losses, gains, and hyperbolic discounting: An experimental approach to information security attitudes and behavior. In proceedings of the second annual workshop on economics and information security (pp. 29&#x2013;30). Robert H. Smith School of Business. Available at: <ext-link xlink:href="http://www.infosecon.net/workshop/downloads/2003/pdf/Final_session6_acquisti.pdf" ext-link-type="uri">http://www.infosecon.net/workshop/downloads/2003/pdf/Final_session6_acquisti.pdf</ext-link></citation></ref>
<ref id="ref5"><citation citation-type="other"><person-group person-group-type="author"><name><surname>Acquisti</surname> <given-names>A.</given-names></name> <name><surname>Grossklags</surname> <given-names>J.</given-names></name></person-group> (<year>2005</year>). Uncertainty, ambiguity and privacy. In proceedings of the fourth annual workshop on economics and information security (pp. 1&#x2013;21). Harvard University. Available at: <ext-link xlink:href="http://infosecon.net/workshop/pdf/64.pdf" ext-link-type="uri">http://infosecon.net/workshop/pdf/64.pdf</ext-link></citation></ref>
<ref id="ref6"><citation citation-type="book"><person-group person-group-type="author"><name><surname>Acquisti</surname> <given-names>A.</given-names></name> <name><surname>Grossklags</surname> <given-names>J.</given-names></name></person-group> (<year>2007</year>). <article-title>What can behavioral economics teach us about privacy</article-title>. In <person-group person-group-type="editor"><name><surname>Acquisti</surname> <given-names>A.</given-names></name> <name><surname>Gritzalis</surname> <given-names>S.</given-names></name> <name><surname>Lambrinoudakis</surname> <given-names>C.</given-names></name> <name><surname>di Vimercati</surname> <given-names>S.</given-names></name></person-group> (Eds.), <source>Digital privacy: Theory, technology, and practices</source> (pp. <fpage>363</fpage>&#x2013;<lpage>377</lpage>). <publisher-loc>United States</publisher-loc>: <publisher-name>Auerbach Publications</publisher-name>.</citation></ref>
<ref id="ref7"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Aharony</surname> <given-names>N.</given-names></name></person-group> (<year>2016</year>). <article-title>Relationships among attachment theory, social capital perspective, personality characteristics, and Facebook self-disclosure</article-title>. <source>Aslib J. Inf. Manag.</source> <volume>68</volume>, <fpage>362</fpage>&#x2013;<lpage>386</lpage>. doi: <pub-id pub-id-type="doi">10.1108/AJIM-01-2016-0001</pub-id></citation></ref>
<ref id="ref8"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>A&#x00EF;meur</surname> <given-names>E.</given-names></name> <name><surname>D&#x00ED;az Ferreyra</surname> <given-names>N.</given-names></name> <name><surname>Hage</surname> <given-names>H.</given-names></name></person-group> (<year>2019</year>). <article-title>Manipulation and malicious personalization: exploring the self-disclosure biases exploited by deceptive attackers on social media</article-title>. <source>Front. Artif. Intell.</source> <volume>2</volume>:<fpage>26</fpage>. doi: <pub-id pub-id-type="doi">10.3389/frai.2019.00026</pub-id>, PMID: <pub-id pub-id-type="pmid">33733115</pub-id></citation></ref>
<ref id="ref9"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Aivazpour</surname> <given-names>Z.</given-names></name> <name><surname>Rao</surname> <given-names>V. S.</given-names></name></person-group> (<year>2020</year>). <article-title>Information disclosure and privacy paradox: the role of impulsivity</article-title>. <source>Data Base Adv. Inf. Syst.</source> <volume>51</volume>, <fpage>14</fpage>&#x2013;<lpage>36</lpage>. doi: <pub-id pub-id-type="doi">10.1145/3380799.3380803</pub-id></citation></ref>
<ref id="ref10"><citation citation-type="other"><person-group person-group-type="author"><name><surname>Aivazpour</surname> <given-names>Z.</given-names></name> <name><surname>Valecha</surname> <given-names>R.</given-names></name> <name><surname>Rao</surname> <given-names>H. R.</given-names></name></person-group> (<year>2017</year>). Unpacking privacy paradox: a dual process theory approach. In proceedings of the 23rd Americas conference on information systems (pp. 1&#x2013;5). Association for Information Systems. Available at: <ext-link xlink:href="http://aisel.aisnet.org/amcis2017/InformationSystems/Presentations/41" ext-link-type="uri">http://aisel.aisnet.org/amcis2017/InformationSystems/Presentations/41</ext-link></citation></ref>
<ref id="ref11"><citation citation-type="book"><person-group person-group-type="author"><name><surname>Ajzen</surname> <given-names>I.</given-names></name></person-group> (<year>1985</year>). &#x201C;<article-title>From intentions to actions: A theory of planned behavior</article-title>,&#x201D; in <source>Action-control: From cognition to behavior</source>. eds. <person-group person-group-type="editor"><name><surname>Kuhl</surname> <given-names>J.</given-names></name> <name><surname>Beckman</surname> <given-names>J.</given-names></name></person-group> (<publisher-loc>Berlin</publisher-loc>: <publisher-name>Springer</publisher-name>), <fpage>11</fpage>&#x2013;<lpage>39</lpage>.</citation></ref>
<ref id="ref12"><citation citation-type="book"><person-group person-group-type="author"><name><surname>Ajzen</surname> <given-names>I.</given-names></name> <name><surname>Fishbein</surname> <given-names>M.</given-names></name></person-group> (<year>1980</year>). <source>Understanding attitudes and predicting social behavior</source>. <publisher-loc>United States</publisher-loc>: <publisher-name>Prentice-Hall</publisher-name>.</citation></ref>
<ref id="ref13"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Bansal</surname> <given-names>G.</given-names></name> <name><surname>Zahedi</surname> <given-names>F. M.</given-names></name> <name><surname>Gefen</surname> <given-names>D.</given-names></name></person-group> (<year>2010</year>). <article-title>The impact of personal dispositions on information sensitivity, privacy concern and trust in disclosing health information online</article-title>. <source>Decis. Support. Syst.</source> <volume>49</volume>, <fpage>138</fpage>&#x2013;<lpage>150</lpage>. doi: <pub-id pub-id-type="doi">10.1016/j.dss.2010.01.010</pub-id></citation></ref>
<ref id="ref14"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Barnes</surname> <given-names>S. B.</given-names></name></person-group> (<year>2006</year>). <article-title>A privacy paradox: social networking in the United States</article-title>. <source>First Monday</source> <volume>11</volume>:<fpage>1394</fpage>. doi: <pub-id pub-id-type="doi">10.5210/fm.v11i9.1394</pub-id></citation></ref>
<ref id="ref15"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Barth</surname> <given-names>S.</given-names></name> <name><surname>de Jong</surname> <given-names>M. D. T.</given-names></name></person-group> (<year>2017</year>). <article-title>The privacy paradox &#x2013; investigating discrepancies between expressed privacy concerns and actual online behavior &#x2013; A systematic literature review</article-title>. <source>Telematics Inform.</source> <volume>34</volume>, <fpage>1038</fpage>&#x2013;<lpage>1058</lpage>. doi: <pub-id pub-id-type="doi">10.1016/j.tele.2017.04.013</pub-id></citation></ref>
<ref id="ref16"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Bartsch</surname> <given-names>M.</given-names></name> <name><surname>Dienlin</surname> <given-names>T.</given-names></name></person-group> (<year>2016</year>). <article-title>Control your Facebook: an analysis of online privacy literacy</article-title>. <source>Comput. Hum. Behav.</source> <volume>56</volume>, <fpage>147</fpage>&#x2013;<lpage>154</lpage>. doi: <pub-id pub-id-type="doi">10.1016/j.chb.2015.11.022</pub-id></citation></ref>
<ref id="ref17"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Bazarova</surname> <given-names>N. N.</given-names></name> <name><surname>Choi</surname> <given-names>Y. H.</given-names></name></person-group> (<year>2014</year>). <article-title>Self-disclosure in social media: extending the functional approach to disclosure motivations and characteristics on social networking sites</article-title>. <source>J. Commun.</source> <volume>64</volume>, <fpage>635</fpage>&#x2013;<lpage>657</lpage>. doi: <pub-id pub-id-type="doi">10.1111/jcom.12106</pub-id></citation></ref>
<ref id="ref18"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Bechara</surname> <given-names>A.</given-names></name></person-group> (<year>2005</year>). <article-title>Decision making, impulse control and loss of willpower to resist drugs: A neurocognitive perspective</article-title>. <source>Nat. Neurosci.</source> <volume>8</volume>, <fpage>1458</fpage>&#x2013;<lpage>1463</lpage>. doi: <pub-id pub-id-type="doi">10.1038/nn1584</pub-id></citation></ref>
<ref id="ref19"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Bechara</surname> <given-names>A.</given-names></name> <name><surname>Damasio</surname> <given-names>A. R.</given-names></name></person-group> (<year>2005</year>). <article-title>The somatic marker hypothesis: a neural theory of economic decision</article-title>. <source>Games and Economic Behavior</source> <volume>52</volume>, <fpage>336</fpage>&#x2013;<lpage>372</lpage>. doi: <pub-id pub-id-type="doi">10.1016/j.geb.2004.06.010</pub-id></citation></ref>
<ref id="ref20"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>B&#x00E9;langer</surname> <given-names>F.</given-names></name> <name><surname>James</surname> <given-names>T. L.</given-names></name></person-group> (<year>2020</year>). <article-title>A theory of multilevel information privacy management for the digital era</article-title>. <source>Inf. Syst. Res.</source> <volume>31</volume>, <fpage>510</fpage>&#x2013;<lpage>536</lpage>. doi: <pub-id pub-id-type="doi">10.1287/ISRE.2019.0900</pub-id></citation></ref>
<ref id="ref21"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Brand</surname> <given-names>M.</given-names></name> <name><surname>Labudda</surname> <given-names>K.</given-names></name> <name><surname>Markowitsch</surname> <given-names>H. J.</given-names></name></person-group> (<year>2006</year>). <article-title>Neuropsychological correlates of decision-making in ambiguous and risky situations</article-title>. <source>Neural Netw.</source> <volume>19</volume>, <fpage>1266</fpage>&#x2013;<lpage>1276</lpage>. doi: <pub-id pub-id-type="doi">10.1016/j.neunet.2006.03.001</pub-id>, PMID: <pub-id pub-id-type="pmid">16942857</pub-id></citation></ref>
<ref id="ref22"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>B&#x00FC;chi</surname> <given-names>M.</given-names></name> <name><surname>Just</surname> <given-names>N.</given-names></name> <name><surname>Latzer</surname> <given-names>M.</given-names></name></person-group> (<year>2017</year>). <article-title>Caring is not enough: the importance of internet skills for online privacy protection</article-title>. <source>Inf. Commun. Soc.</source> <volume>20</volume>, <fpage>1261</fpage>&#x2013;<lpage>1278</lpage>. doi: <pub-id pub-id-type="doi">10.1080/1369118X.2016.1229001</pub-id></citation></ref>
<ref id="ref23"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Burgoon</surname> <given-names>J. K.</given-names></name></person-group> (<year>1982</year>). <article-title>Privacy and communication</article-title>. <source>Ann. Int. Commun. Assoc.</source> <volume>6</volume>, <fpage>206</fpage>&#x2013;<lpage>249</lpage>. doi: <pub-id pub-id-type="doi">10.1080/23808985.1982.11678499</pub-id></citation></ref>
<ref id="ref24"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Chang</surname> <given-names>C. W.</given-names></name> <name><surname>Heo</surname> <given-names>J.</given-names></name></person-group> (<year>2014</year>). <article-title>Visiting theories that predict college students&#x2019; self-disclosure on Facebook</article-title>. <source>Comput. Hum. Behav.</source> <volume>30</volume>, <fpage>79</fpage>&#x2013;<lpage>86</lpage>. doi: <pub-id pub-id-type="doi">10.1016/j.chb.2013.07.059</pub-id></citation></ref>
<ref id="ref25"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Chaudoir</surname> <given-names>S. R.</given-names></name> <name><surname>Fisher</surname> <given-names>J. D.</given-names></name></person-group> (<year>2010</year>). <article-title>The disclosure processes model: understanding disclosure decision making and postdisclosure outcomes among people living with a concealable stigmatized identity</article-title>. <source>Psychol. Bull.</source> <volume>136</volume>, <fpage>236</fpage>&#x2013;<lpage>256</lpage>. doi: <pub-id pub-id-type="doi">10.1037/a0018193</pub-id>, PMID: <pub-id pub-id-type="pmid">20192562</pub-id></citation></ref>
<ref id="ref26"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Chen</surname> <given-names>H. T.</given-names></name> <name><surname>Chen</surname> <given-names>W.</given-names></name></person-group> (<year>2015</year>). <article-title>Couldn&#x2019;t or wouldn&#x2019;t? The influence of privacy concerns and self-efficacy in privacy management on privacy protection</article-title>. <source>Cyberpsychol. Behav. Soc. Netw.</source> <volume>18</volume>, <fpage>13</fpage>&#x2013;<lpage>19</lpage>. doi: <pub-id pub-id-type="doi">10.1089/cyber.2014.0456</pub-id></citation></ref>
<ref id="ref27"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Chen</surname> <given-names>R.</given-names></name> <name><surname>Li</surname> <given-names>D. P.</given-names></name> <name><surname>Turel</surname> <given-names>O.</given-names></name> <name><surname>S&#x00F8;rensen</surname> <given-names>T. A.</given-names></name> <name><surname>Bechara</surname> <given-names>A.</given-names></name> <name><surname>Li</surname> <given-names>Y.</given-names></name> <etal/></person-group>. (<year>2018</year>). <article-title>Decision making deficits in relation to food cues influence obesity: a triadic neural model of problematic eating</article-title>. <source>Front. Psychiatry</source> <volume>9</volume>:<fpage>264</fpage>. doi: <pub-id pub-id-type="doi">10.3389/fpsyt.2018.00264</pub-id>, PMID: <pub-id pub-id-type="pmid">29962976</pub-id></citation></ref>
<ref id="ref28"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Cheung</surname> <given-names>C.</given-names></name> <name><surname>Lee</surname> <given-names>Z. W. Y.</given-names></name> <name><surname>Chan</surname> <given-names>T. K. H.</given-names></name></person-group> (<year>2015</year>). <article-title>Self-disclosure in social networking sites: the role of perceived cost, perceived benefits and social influence</article-title>. <source>Internet Res.</source> <volume>25</volume>, <fpage>279</fpage>&#x2013;<lpage>299</lpage>. doi: <pub-id pub-id-type="doi">10.1108/IntR-09-2013-0192</pub-id></citation></ref>
<ref id="ref29"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Cho</surname> <given-names>H.</given-names></name> <name><surname>Lee</surname> <given-names>J. S.</given-names></name> <name><surname>Chung</surname> <given-names>S.</given-names></name></person-group> (<year>2010</year>). <article-title>Optimistic bias about online privacy risks: testing the moderating effects of perceived controllability and prior experience</article-title>. <source>Comput. Hum. Behav.</source> <volume>26</volume>, <fpage>987</fpage>&#x2013;<lpage>995</lpage>. doi: <pub-id pub-id-type="doi">10.1016/j.chb.2010.02.012</pub-id></citation></ref>
<ref id="ref30"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Christofides</surname> <given-names>E.</given-names></name> <name><surname>Muise</surname> <given-names>A.</given-names></name> <name><surname>Desmarais</surname> <given-names>S.</given-names></name></person-group> (<year>2012</year>). <article-title>Hey mom, what&#x2019;s on your Facebook? Comparing Facebook disclosure and privacy in adolescents and adults</article-title>. <source>Soc. Psychol. Personal. Sci.</source> <volume>3</volume>, <fpage>48</fpage>&#x2013;<lpage>54</lpage>. doi: <pub-id pub-id-type="doi">10.1177/1948550611408619</pub-id></citation></ref>
<ref id="ref31"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Cialdini</surname> <given-names>R. B.</given-names></name> <name><surname>Kallgren</surname> <given-names>C. A.</given-names></name> <name><surname>Reno</surname> <given-names>R. R.</given-names></name></person-group> (<year>1991</year>). <article-title>A focus theory of normative conduct: A theoretical refinement and reevaluation of the role of norms in human behavior</article-title>. <source>Adv. Exp. Soc. Psychol.</source> <volume>24</volume>, <fpage>201</fpage>&#x2013;<lpage>234</lpage>. doi: <pub-id pub-id-type="doi">10.1016/S0065-2601(08)60330-5</pub-id></citation></ref>
<ref id="ref32"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Culnan</surname> <given-names>M. J.</given-names></name> <name><surname>Armstrong</surname> <given-names>P. K.</given-names></name></person-group> (<year>1999</year>). <article-title>Information privacy concerns, procedural fairness, and impersonal trust: an empirical investigation</article-title>. <source>Organ. Sci.</source> <volume>10</volume>, <fpage>104</fpage>&#x2013;<lpage>115</lpage>. doi: <pub-id pub-id-type="doi">10.1287/orsc.10.1.104</pub-id></citation></ref>
<ref id="ref33"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Cunningham</surname> <given-names>W. A.</given-names></name> <name><surname>Zelazo</surname> <given-names>P. D.</given-names></name> <name><surname>Packer</surname> <given-names>D. J.</given-names></name> <name><surname>Van Bavel</surname> <given-names>J. J.</given-names></name></person-group> (<year>2007</year>). <article-title>The iterative reprocessing model: a multi-level framework for attitudes and evaluation</article-title>. <source>Soc. Cogn.</source> <volume>25</volume>, <fpage>736</fpage>&#x2013;<lpage>760</lpage>. doi: <pub-id pub-id-type="doi">10.1521/soco.2007.25.5.736</pub-id></citation></ref>
<ref id="ref34"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Davis</surname> <given-names>K.</given-names></name></person-group> (<year>2012</year>). <article-title>Friendship 2.0: adolescents&#x2019; experiences of belonging and self-disclosure online</article-title>. <source>J. Adolesc.</source> <volume>35</volume>, <fpage>1527</fpage>&#x2013;<lpage>1536</lpage>. doi: <pub-id pub-id-type="doi">10.1016/j.adolescence.2012.02.013</pub-id>, PMID: <pub-id pub-id-type="pmid">22475444</pub-id></citation></ref>
<ref id="ref35"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Debatin</surname> <given-names>B.</given-names></name> <name><surname>Lovejoy</surname> <given-names>J. P.</given-names></name> <name><surname>Horn</surname> <given-names>A. K.</given-names></name> <name><surname>Hughes</surname> <given-names>B. N.</given-names></name></person-group> (<year>2009</year>). <article-title>Facebook and online privacy: attitudes, behaviors, and unintended consequences</article-title>. <source>J. Comput.-Mediat. Commun.</source> <volume>15</volume>, <fpage>83</fpage>&#x2013;<lpage>108</lpage>. doi: <pub-id pub-id-type="doi">10.1111/j.1083-6101.2009.01494.x</pub-id></citation></ref>
<ref id="ref36"><citation citation-type="other"><person-group person-group-type="author"><name><surname>D&#x00ED;az Ferreyra</surname> <given-names>N. E.</given-names></name> <name><surname>Meis</surname> <given-names>R.</given-names></name> <name><surname>Heisel</surname> <given-names>M.</given-names></name></person-group> (<year>2019</year>). Learning from online regrets: from deleted posts to risk awareness in social network sites. In UMAP&#x2019;19 Adjunct: adjunct publication of the 27th conference on user modeling, adaptation and personalization (pp.117&#x2013;125). Association for Computing Machinery. doi: <pub-id pub-id-type="doi">10.1145/3314183.3323849</pub-id></citation></ref>
<ref id="ref37"><citation citation-type="other"><person-group person-group-type="author"><name><surname>D&#x00ED;az Ferreyra</surname> <given-names>N. E.</given-names></name> <name><surname>Ostendorf</surname> <given-names>S.</given-names></name> <name><surname>A&#x00EF;meur</surname> <given-names>E.</given-names></name> <name><surname>Heisel</surname> <given-names>M.</given-names></name> <name><surname>Brand</surname> <given-names>M.</given-names></name></person-group> (<year>2022</year>). ENAGRAM: an app to evaluate preventative nudges for Instagram. In Euro USEC&#x2019;22: proceedings of the 2022 European symposium on usable security. Association for Computing Machinery, 53&#x2013;63. doi: <pub-id pub-id-type="doi">10.1145/3549015.3555674</pub-id></citation></ref>
<ref id="ref38"><citation citation-type="book"><person-group person-group-type="author"><name><surname>Dienlin</surname> <given-names>T.</given-names></name></person-group> (<year>2014</year>). &#x201C;<article-title>The privacy process model</article-title>,&#x201D; in <source>Medien und Privatheit</source>. eds. <person-group person-group-type="editor"><name><surname>Garnett</surname> <given-names>S.</given-names></name> <name><surname>Halft</surname> <given-names>S.</given-names></name> <name><surname>Herz</surname> <given-names>M.</given-names></name> <name><surname>M&#x00F6;nig</surname> <given-names>J.-M.</given-names></name></person-group> (<publisher-loc>United States</publisher-loc>: <publisher-name>Stutz</publisher-name>), <fpage>105</fpage>&#x2013;<lpage>122</lpage>.</citation></ref>
<ref id="ref39"><citation citation-type="book"><person-group person-group-type="author"><name><surname>Dienlin</surname> <given-names>T.</given-names></name> <name><surname>Braeunlich</surname> <given-names>K.</given-names></name> <name><surname>Trepte</surname> <given-names>S.</given-names></name></person-group> (<year>2020</year>). <source>How do like and dislike buttons affect communication? Testing the privacy calculus in a preregistered one-week field experiment</source>. <publisher-name>SocArXiv</publisher-name>. <publisher-loc>United States</publisher-loc>. doi: <pub-id pub-id-type="doi">10.31235/osf.io/7kjf2</pub-id></citation></ref>
<ref id="ref40"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Dienlin</surname> <given-names>T.</given-names></name> <name><surname>Metzger</surname> <given-names>M. J.</given-names></name></person-group> (<year>2016</year>). <article-title>An extended privacy calculus model for SNSs: analyzing self-disclosure and self-withdrawal in a representative U.S. sample</article-title>. <source>J Comput.-Mediat. Commun.</source> <volume>21</volume>, <fpage>368</fpage>&#x2013;<lpage>383</lpage>. doi: <pub-id pub-id-type="doi">10.1111/jcc4.12163</pub-id></citation></ref>
<ref id="ref41"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Dienlin</surname> <given-names>T.</given-names></name> <name><surname>Trepte</surname> <given-names>S.</given-names></name></person-group> (<year>2015</year>). <article-title>Is the privacy paradox a relic of the past? An in-depth analysis of privacy attitudes and privacy behaviors</article-title>. <source>Eur. J. Soc. Psychol.</source> <volume>45</volume>, <fpage>285</fpage>&#x2013;<lpage>297</lpage>. doi: <pub-id pub-id-type="doi">10.1002/ejsp.2049</pub-id></citation></ref>
<ref id="ref42"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Dinev</surname> <given-names>T.</given-names></name> <name><surname>Hart</surname> <given-names>P.</given-names></name></person-group> (<year>2006</year>). <article-title>An extended privacy calculus model for e-commerce transactions</article-title>. <source>Inf. Syst. Res.</source> <volume>17</volume>, <fpage>61</fpage>&#x2013;<lpage>80</lpage>. doi: <pub-id pub-id-type="doi">10.1287/isre.1060.0080</pub-id></citation></ref>
<ref id="ref43"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Dinev</surname> <given-names>T.</given-names></name> <name><surname>McConnell</surname> <given-names>A. R.</given-names></name> <name><surname>Smith</surname> <given-names>H. J.</given-names></name></person-group> (<year>2015</year>). <article-title>Informing privacy research through information systems, psychology, and behavioral economics: thinking outside the &#x201C;APCO&#x201D; box</article-title>. <source>Inf. Syst. Res.</source> <volume>26</volume>, <fpage>639</fpage>&#x2013;<lpage>655</lpage>. doi: <pub-id pub-id-type="doi">10.1287/isre.2015.0600</pub-id></citation></ref>
<ref id="ref44"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Du</surname> <given-names>J.</given-names></name> <name><surname>Kerkhof</surname> <given-names>P.</given-names></name> <name><surname>van Koningsbruggen</surname> <given-names>G. M.</given-names></name></person-group> (<year>2019</year>). <article-title>Predictors of social media self-control failure: immediate gratifications, habitual checking, ubiquity, and notification</article-title>. <source>Cyberpsychol. Behav. Soc. Netw.</source> <volume>22</volume>, <fpage>477</fpage>&#x2013;<lpage>485</lpage>. doi: <pub-id pub-id-type="doi">10.1089/cyber.2018.0730</pub-id>, PMID: <pub-id pub-id-type="pmid">31295024</pub-id></citation></ref>
<ref id="ref45"><citation citation-type="other"><person-group person-group-type="author"><name><surname>Dwyer</surname> <given-names>C.</given-names></name> <name><surname>Hiltz</surname> <given-names>S. R.</given-names></name> <name><surname>Passerini</surname> <given-names>K.</given-names></name></person-group> (<year>2007</year>). Trust and privacy concern within social networking sites: a comparison of Facebook and MySpace. In proceedings of the 13th Americas conference on information systems (pp. 339&#x2013;350). Association for Information Systems. Available at: <ext-link xlink:href="https://aisel.aisnet.org/amcis2007/339" ext-link-type="uri">https://aisel.aisnet.org/amcis2007/339</ext-link></citation></ref>
<ref id="ref46"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Efroni</surname> <given-names>Z.</given-names></name> <name><surname>Metzger</surname> <given-names>J.</given-names></name> <name><surname>Mischau</surname> <given-names>L.</given-names></name> <name><surname>Schirmbeck</surname> <given-names>M.</given-names></name></person-group> (<year>2019</year>). <article-title>Privacy icons: a risk-based approach to visualisation of data processing</article-title>. <source>Eur. Data Prot. Law Rev.</source> <volume>5</volume>, <fpage>352</fpage>&#x2013;<lpage>366</lpage>. doi: <pub-id pub-id-type="doi">10.21552/edpl/2019/3/9</pub-id></citation></ref>
<ref id="ref47"><citation citation-type="book"><person-group person-group-type="author"><name><surname>Ellison</surname> <given-names>N. B.</given-names></name> <name><surname>Boyd</surname> <given-names>D. M.</given-names></name></person-group> (<year>2013</year>). &#x201C;<article-title>Sociality through social network sites</article-title>,&#x201D; in <source>The Oxford handbook of internet studies</source>. ed. <person-group person-group-type="editor"><name><surname>Dutton</surname> <given-names>W. H.</given-names></name></person-group> (<publisher-loc>Oxford</publisher-loc>: <publisher-name>Oxford University Press</publisher-name>), <fpage>151</fpage>&#x2013;<lpage>172</lpage>.</citation></ref>
<ref id="ref48"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Epstein</surname> <given-names>S.</given-names></name> <name><surname>Pacini</surname> <given-names>R.</given-names></name> <name><surname>Denes-Raj</surname> <given-names>V.</given-names></name> <name><surname>Heier</surname> <given-names>H.</given-names></name></person-group> (<year>1996</year>). <article-title>Individual differences in intuitive-experiential and analytical-rational thinking styles</article-title>. <source>J. Pers. Soc. Psychol.</source> <volume>71</volume>, <fpage>390</fpage>&#x2013;<lpage>405</lpage>. doi: <pub-id pub-id-type="doi">10.1037/0022-3514.71.2.390</pub-id>, PMID: <pub-id pub-id-type="pmid">8765488</pub-id></citation></ref>
<ref id="ref49"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Evans</surname> <given-names>J. S. B.</given-names></name></person-group> (<year>2003</year>). <article-title>In two minds: dual-process accounts of reasoning</article-title>. <source>Trends Cogn. Sci.</source> <volume>7</volume>, <fpage>454</fpage>&#x2013;<lpage>459</lpage>. doi: <pub-id pub-id-type="doi">10.1016/j.tics.2003.08.012</pub-id>, PMID: <pub-id pub-id-type="pmid">14550493</pub-id></citation></ref>
<ref id="ref50"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Evans</surname> <given-names>J. S. B.</given-names></name></person-group> (<year>2006</year>). <article-title>The heuristic-analytic theory of reasoning: extension and evaluation</article-title>. <source>Psychon. Bull. Rev.</source> <volume>13</volume>, <fpage>378</fpage>&#x2013;<lpage>395</lpage>. doi: <pub-id pub-id-type="doi">10.3758/BF03193858</pub-id>, PMID: <pub-id pub-id-type="pmid">17048720</pub-id></citation></ref>
<ref id="ref51"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Evans</surname> <given-names>J. S. B.</given-names></name></person-group> (<year>2008</year>). <article-title>Dual-processing accounts of reasoning, judgment, and social cognition</article-title>. <source>Annu. Rev. Psychol.</source> <volume>59</volume>, <fpage>255</fpage>&#x2013;<lpage>278</lpage>. doi: <pub-id pub-id-type="doi">10.1146/annurev.psych.59.103006.093629</pub-id>, PMID: <pub-id pub-id-type="pmid">18154502</pub-id></citation></ref>
<ref id="ref52"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Evans</surname> <given-names>J. S. B.</given-names></name> <name><surname>Stanovich</surname> <given-names>K. E.</given-names></name></person-group> (<year>2013</year>). <article-title>Dual-process theories of higher cognition: advancing the debate</article-title>. <source>Perspect. Psychol. Sci.</source> <volume>8</volume>, <fpage>223</fpage>&#x2013;<lpage>241</lpage>. doi: <pub-id pub-id-type="doi">10.1177/1745691612460685</pub-id>, PMID: <pub-id pub-id-type="pmid">26172965</pub-id></citation></ref>
<ref id="ref53"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Figner</surname> <given-names>B.</given-names></name> <name><surname>Mackinlay</surname> <given-names>R. J.</given-names></name> <name><surname>Wilkening</surname> <given-names>F.</given-names></name> <name><surname>Weber</surname> <given-names>E. U.</given-names></name></person-group> (<year>2009</year>). <article-title>Affective and deliberative processes in risky choice: age differences in risk taking in the Columbia Card Task</article-title>. <source>J. Exp. Psychol. Learn. Mem. Cogn.</source> <volume>35</volume>, <fpage>709</fpage>&#x2013;<lpage>730</lpage>. doi: <pub-id pub-id-type="doi">10.1037/a0014983</pub-id>, PMID: <pub-id pub-id-type="pmid">19379045</pub-id></citation></ref>
<ref id="ref54"><citation citation-type="book"><person-group person-group-type="author"><name><surname>Flender</surname> <given-names>C.</given-names></name> <name><surname>M&#x00FC;ller</surname> <given-names>G.</given-names></name></person-group> (<year>2012</year>). &#x201C;<article-title>Type indeterminacy in privacy decisions: the privacy paradox revisited</article-title>,&#x201D; in <source>Quantum interaction</source>. eds. <person-group person-group-type="editor"><name><surname>Busemeyer</surname> <given-names>J. R.</given-names></name> <name><surname>Dubois</surname> <given-names>F.</given-names></name> <name><surname>Lambert-Mogiliansky</surname> <given-names>A.</given-names></name> <name><surname>Melucci</surname> <given-names>M.</given-names></name></person-group> (<publisher-loc>Berlin</publisher-loc>: <publisher-name>Springer</publisher-name>), <fpage>148</fpage>&#x2013;<lpage>159</lpage>.</citation></ref>
<ref id="ref55"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Forgas</surname> <given-names>J. P.</given-names></name></person-group> (<year>2011</year>). <article-title>Affective influences on self-disclosure: mood effects on the intimacy and reciprocity of disclosing personal information</article-title>. <source>J. Pers. Soc. Psychol.</source> <volume>100</volume>, <fpage>449</fpage>&#x2013;<lpage>461</lpage>. doi: <pub-id pub-id-type="doi">10.1037/a0021129</pub-id>, PMID: <pub-id pub-id-type="pmid">21171788</pub-id></citation></ref>
<ref id="ref56"><citation citation-type="other"><person-group person-group-type="author"><name><surname>Gambino</surname> <given-names>A.</given-names></name> <name><surname>Kim</surname> <given-names>J.</given-names></name> <name><surname>Sundar</surname> <given-names>S. S.</given-names></name> <name><surname>Ge</surname> <given-names>J.</given-names></name> <name><surname>Rosson</surname> <given-names>M. B.</given-names></name></person-group> (<year>2016</year>). User disbelief in privacy paradox: heuristics that determine disclosure. In CHI EA&#x2019;16: proceedings of the 2016 CHI conference extended abstracts on human factors in computing systems (pp. 2837&#x2013;2843). Association for Computing Machinery. doi: <pub-id pub-id-type="doi">10.1145/2851581.2892413</pub-id></citation></ref>
<ref id="ref57"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Gerber</surname> <given-names>N.</given-names></name> <name><surname>Gerber</surname> <given-names>P.</given-names></name> <name><surname>Volkamer</surname> <given-names>M.</given-names></name></person-group> (<year>2018</year>). <article-title>Explaining the privacy paradox: a systematic review of literature investigating privacy attitude and behavior</article-title>. <source>Comput. Secur.</source> <volume>77</volume>, <fpage>226</fpage>&#x2013;<lpage>261</lpage>. doi: <pub-id pub-id-type="doi">10.1016/j.cose.2018.04.002</pub-id></citation></ref>
<ref id="ref58"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>He</surname> <given-names>Q.</given-names></name> <name><surname>Huang</surname> <given-names>X.</given-names></name> <name><surname>Zhang</surname> <given-names>S.</given-names></name> <name><surname>Turel</surname> <given-names>O.</given-names></name> <name><surname>Ma</surname> <given-names>L.</given-names></name> <name><surname>Bechara</surname> <given-names>A.</given-names></name></person-group> (<year>2019</year>). <article-title>Dynamic causal modeling of insular, striatal, and prefrontal cortex activities during a food-specific Go/NoGo task</article-title>. <source>Biol. Psychiatry Cogn. Neurosci. Neuroimaging</source> <volume>4</volume>, <fpage>1080</fpage>&#x2013;<lpage>1089</lpage>. doi: <pub-id pub-id-type="doi">10.1016/j.bpsc.2018.12.005</pub-id>, PMID: <pub-id pub-id-type="pmid">30691967</pub-id></citation></ref>
<ref id="ref59"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>He</surname> <given-names>W.</given-names></name> <name><surname>Qi</surname> <given-names>A.</given-names></name> <name><surname>Wang</surname> <given-names>Q.</given-names></name> <name><surname>Wu</surname> <given-names>H.</given-names></name> <name><surname>Zhang</surname> <given-names>Z.</given-names></name> <name><surname>Gu</surname> <given-names>R.</given-names></name> <etal/></person-group>. (<year>2017</year>). <article-title>Abnormal reward and punishment sensitivity associated with internet addicts</article-title>. <source>Comput. Hum. Behav.</source> <volume>75</volume>, <fpage>678</fpage>&#x2013;<lpage>683</lpage>. doi: <pub-id pub-id-type="doi">10.1016/j.chb.2017.06.017</pub-id></citation></ref>
<ref id="ref60"><citation citation-type="book"><person-group person-group-type="author"><name><surname>Hofmann</surname> <given-names>W.</given-names></name> <name><surname>Reinecke</surname> <given-names>L.</given-names></name> <name><surname>Meier</surname> <given-names>A.</given-names></name></person-group> (<year>2017</year>). &#x201C;<article-title>Of sweet temptations and bitter aftertaste: self-control as a moderator of media use on well-being</article-title>,&#x201D; in <source>The Routledge handbook of media use and well-being: International perspectives on theory and research on positive media effects</source>. eds. <person-group person-group-type="editor"><name><surname>Reinecke</surname> <given-names>L.</given-names></name> <name><surname>Oliver</surname> <given-names>M. B.</given-names></name></person-group> (<publisher-loc>England</publisher-loc>: <publisher-name>Routledge</publisher-name>), <fpage>211</fpage>&#x2013;<lpage>222</lpage>.</citation></ref>
<ref id="ref61"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Hollenbaugh</surname> <given-names>E. E.</given-names></name> <name><surname>Ferris</surname> <given-names>A. L.</given-names></name></person-group> (<year>2014</year>). <article-title>Facebook self-disclosure: examining the role of traits, social cohesion, and motives</article-title>. <source>Comput. Hum. Behav.</source> <volume>30</volume>, <fpage>50</fpage>&#x2013;<lpage>58</lpage>. doi: <pub-id pub-id-type="doi">10.1016/j.chb.2013.07.055</pub-id></citation></ref>
<ref id="ref62"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Huang</surname> <given-names>L.-Y.</given-names></name> <name><surname>Hsieh</surname> <given-names>Y.-J.</given-names></name> <name><surname>Wu</surname> <given-names>Y.-C. J.</given-names></name></person-group> (<year>2014</year>). <article-title>Gratifications and social network service usage: the mediating role of online experience</article-title>. <source>Inf. Manag.</source> <volume>51</volume>, <fpage>774</fpage>&#x2013;<lpage>782</lpage>. doi: <pub-id pub-id-type="doi">10.1016/J.IM.2014.05.004</pub-id></citation></ref>
<ref id="ref63"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Irwin</surname> <given-names>F. W.</given-names></name></person-group> (<year>1953</year>). <article-title>Stated expectations as functions of probability and desirability of outcomes</article-title>. <source>J. Pers.</source> <volume>21</volume>, <fpage>329</fpage>&#x2013;<lpage>335</lpage>. doi: <pub-id pub-id-type="doi">10.1111/j.1467-6494.1953.tb01775.x</pub-id>, PMID: <pub-id pub-id-type="pmid">13053388</pub-id></citation></ref>
<ref id="ref64"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Kahneman</surname> <given-names>D.</given-names></name></person-group> (<year>2003</year>). <article-title>A perspective on judgment and choice: mapping bounded rationality</article-title>. <source>Am. Psychol.</source> <volume>58</volume>, <fpage>697</fpage>&#x2013;<lpage>720</lpage>. doi: <pub-id pub-id-type="doi">10.1037/0003-066X.58.9.697</pub-id>, PMID: <pub-id pub-id-type="pmid">14584987</pub-id></citation></ref>
<ref id="ref65"><citation citation-type="book"><person-group person-group-type="author"><name><surname>Kahneman</surname> <given-names>D.</given-names></name></person-group> (<year>2011</year>). <source>Thinking, fast and slow</source>. <publisher-name>Farrar</publisher-name>, <publisher-loc>Straus and Giroux</publisher-loc>.</citation></ref>
<ref id="ref66"><citation citation-type="book"><person-group person-group-type="author"><name><surname>Kahneman</surname> <given-names>D.</given-names></name> <name><surname>Frederick</surname> <given-names>S.</given-names></name></person-group> (<year>2002</year>). &#x201C;<article-title>Representativeness revisited: attribute substitution in intuitive judgment</article-title>,&#x201D; in <source>Heuristics and biases: The psychology of intuitive judgment</source>. eds. <person-group person-group-type="editor"><name><surname>Gilovich</surname> <given-names>T.</given-names></name> <name><surname>Griffin</surname> <given-names>D.</given-names></name> <name><surname>Kahneman</surname> <given-names>D.</given-names></name></person-group> (<publisher-loc>Cambridge</publisher-loc>: <publisher-name>Cambridge University Press</publisher-name>), <fpage>49</fpage>&#x2013;<lpage>81</lpage>.</citation></ref>
<ref id="ref67"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Kehr</surname> <given-names>F.</given-names></name> <name><surname>Kowatsch</surname> <given-names>T.</given-names></name> <name><surname>Wentzel</surname> <given-names>D.</given-names></name> <name><surname>Fleisch</surname> <given-names>E.</given-names></name></person-group> (<year>2015a</year>). <article-title>Blissfully ignorant: the effects of general privacy concerns, general institutional trust, and affect in the privacy calculus</article-title>. <source>Inf. Syst. J.</source> <volume>25</volume>, <fpage>607</fpage>&#x2013;<lpage>635</lpage>. doi: <pub-id pub-id-type="doi">10.1111/isj.12062</pub-id></citation></ref>
<ref id="ref68"><citation citation-type="other"><person-group person-group-type="author"><name><surname>Kehr</surname> <given-names>F.</given-names></name> <name><surname>Kowatsch</surname> <given-names>T.</given-names></name> <name><surname>Wentzel</surname> <given-names>D.</given-names></name> <name><surname>Fleisch</surname> <given-names>E.</given-names></name></person-group> (<year>2015b</year>). Thinking styles and privacy decisions: need for cognition, faith in intuition, and the privacy calculus. In 12th international conference on Wirtschaftsinformatik (pp. 1&#x2013;10). Osnabr&#x00FC;ck University.</citation></ref>
<ref id="ref69"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Kezer</surname> <given-names>M.</given-names></name> <name><surname>Sevi</surname> <given-names>B.</given-names></name> <name><surname>Cemalcilar</surname> <given-names>Z.</given-names></name> <name><surname>Baruh</surname> <given-names>L.</given-names></name></person-group> (<year>2016</year>). <article-title>Age differences in privacy attitudes, literacy and privacy management on Facebook</article-title>. <source>Cyberpsychology</source> <volume>10</volume>:<fpage>1</fpage>. doi: <pub-id pub-id-type="doi">10.5817/CP2016-1-2</pub-id></citation></ref>
<ref id="ref70"><citation citation-type="other"><person-group person-group-type="author"><name><surname>King</surname> <given-names>J.</given-names></name> <name><surname>Lampinen</surname> <given-names>A.</given-names></name> <name><surname>Smolen</surname> <given-names>A.</given-names></name></person-group> (<year>2011</year>). Privacy: is there an app for that? In SOUPS&#x2019;11: proceedings of the seventh symposium on usable privacy and security (pp. 1&#x2013;20). Association for Computing Machinery. doi: <pub-id pub-id-type="doi">10.1145/2078827.2078843</pub-id></citation></ref>
<ref id="ref71"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Knijnenburg</surname> <given-names>B.</given-names></name> <name><surname>Raybourn</surname> <given-names>E.</given-names></name> <name><surname>Cherry</surname> <given-names>D.</given-names></name> <name><surname>Wilkinson</surname> <given-names>D.</given-names></name> <name><surname>Sivakumar</surname> <given-names>S.</given-names></name> <name><surname>Sloan</surname> <given-names>H.</given-names></name></person-group> (<year>2017</year>). <article-title>Death to the privacy calculus?</article-title> <source>SSRN Electron. J.</source> doi: <pub-id pub-id-type="doi">10.2139/ssrn.2923806</pub-id></citation></ref>
<ref id="ref72"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Kokolakis</surname> <given-names>S.</given-names></name></person-group> (<year>2017</year>). <article-title>Privacy attitudes and privacy behaviour: a review of current research on the privacy paradox phenomenon</article-title>. <source>Comput. Secur.</source> <volume>64</volume>, <fpage>122</fpage>&#x2013;<lpage>134</lpage>. doi: <pub-id pub-id-type="doi">10.1016/j.cose.2015.07.002</pub-id></citation></ref>
<ref id="ref73"><citation citation-type="book"><person-group person-group-type="author"><name><surname>Kr&#x00E4;mer</surname> <given-names>N. C.</given-names></name> <name><surname>Haferkamp</surname> <given-names>N.</given-names></name></person-group> (<year>2011</year>). &#x201C;<article-title>Online self-presentation: balancing privacy concerns and impression construction on social networking sites</article-title>,&#x201D; in <source>Privacy online</source>. eds. <person-group person-group-type="editor"><name><surname>Trepte</surname> <given-names>S.</given-names></name> <name><surname>Reinecke</surname> <given-names>L.</given-names></name></person-group> (<publisher-loc>Berlin</publisher-loc>: <publisher-name>Springer</publisher-name>), <fpage>127</fpage>&#x2013;<lpage>142</lpage>.</citation></ref>
<ref id="ref74"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Kr&#x00E4;mer</surname> <given-names>N. C.</given-names></name> <name><surname>Sch&#x00E4;wel</surname> <given-names>J.</given-names></name></person-group> (<year>2020</year>). <article-title>Mastering the challenge of balancing self-disclosure and privacy in social media</article-title>. <source>Curr. Opin. Psychol.</source> <volume>31</volume>, <fpage>67</fpage>&#x2013;<lpage>71</lpage>. doi: <pub-id pub-id-type="doi">10.1016/j.copsyc.2019.08.003</pub-id>, PMID: <pub-id pub-id-type="pmid">31520852</pub-id></citation></ref>
<ref id="ref75"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Krasnova</surname> <given-names>H.</given-names></name> <name><surname>Spiekermann</surname> <given-names>S.</given-names></name> <name><surname>Koroleva</surname> <given-names>K.</given-names></name> <name><surname>Hildebrand</surname> <given-names>T.</given-names></name></person-group> (<year>2010</year>). <article-title>Online social networks: why we disclose</article-title>. <source>J. Inf. Technol.</source> <volume>25</volume>, <fpage>109</fpage>&#x2013;<lpage>125</lpage>. doi: <pub-id pub-id-type="doi">10.1057/jit.2010.6</pub-id></citation></ref>
<ref id="ref76"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>K&#x00FC;hn</surname> <given-names>S.</given-names></name> <name><surname>Schmiedek</surname> <given-names>F.</given-names></name> <name><surname>Schott</surname> <given-names>B.</given-names></name> <name><surname>Ratcliff</surname> <given-names>R.</given-names></name> <name><surname>Heinze</surname> <given-names>H. J.</given-names></name> <name><surname>D&#x00FC;zel</surname> <given-names>E.</given-names></name> <etal/></person-group>. (<year>2011</year>). <article-title>Brain areas consistently linked to individual differences in perceptual decision-making in younger as well as older adults before and after training</article-title>. <source>J. Cogn. Neurosci.</source> <volume>23</volume>, <fpage>2147</fpage>&#x2013;<lpage>2158</lpage>. doi: <pub-id pub-id-type="doi">10.1162/jocn.2010.21564</pub-id>, PMID: <pub-id pub-id-type="pmid">20807055</pub-id></citation></ref>
<ref id="ref77"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Labudda</surname> <given-names>K.</given-names></name> <name><surname>Woermann</surname> <given-names>F. G.</given-names></name> <name><surname>Mertens</surname> <given-names>M.</given-names></name> <name><surname>Pohlmann-Eden</surname> <given-names>B.</given-names></name> <name><surname>Markowitsch</surname> <given-names>H. J.</given-names></name> <name><surname>Brand</surname> <given-names>M.</given-names></name></person-group> (<year>2008</year>). <article-title>Neural correlates of decision making with explicit information about probabilities and incentives in elderly healthy subjects</article-title>. <source>Exp. Brain Res.</source> <volume>187</volume>, <fpage>641</fpage>&#x2013;<lpage>650</lpage>. doi: <pub-id pub-id-type="doi">10.1007/s00221-008-1332-x</pub-id>, PMID: <pub-id pub-id-type="pmid">18320179</pub-id></citation></ref>
<ref id="ref78"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Lee</surname> <given-names>H.</given-names></name> <name><surname>Park</surname> <given-names>H.</given-names></name> <name><surname>Kim</surname> <given-names>J.</given-names></name></person-group> (<year>2013</year>). <article-title>Why do people share their context information on social network services? A qualitative study and an experimental study on users&#x2019; behavior of balancing perceived benefit and risk</article-title>. <source>Int. J. Hum. Comput. Stud.</source> <volume>71</volume>, <fpage>862</fpage>&#x2013;<lpage>877</lpage>. doi: <pub-id pub-id-type="doi">10.1016/J.IJHCS.2013.01.005</pub-id></citation></ref>
<ref id="ref79"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Li</surname> <given-names>K.</given-names></name> <name><surname>Wang</surname> <given-names>X.</given-names></name> <name><surname>Li</surname> <given-names>K.</given-names></name> <name><surname>Che</surname> <given-names>J.</given-names></name></person-group> (<year>2016</year>). <article-title>Information privacy disclosure on social network sites: an empirical investigation from social exchange perspective</article-title>. <source>Nankai Bus. Rev. Int.</source> <volume>7</volume>, <fpage>282</fpage>&#x2013;<lpage>300</lpage>. doi: <pub-id pub-id-type="doi">10.1108/NBRI-02-2015-0005</pub-id></citation></ref>
<ref id="ref80"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Liu</surname> <given-names>D.</given-names></name> <name><surname>Brown</surname> <given-names>B. B.</given-names></name></person-group> (<year>2014</year>). <article-title>Self-disclosure on social networking sites, positive feedback, and social capital among Chinese college students</article-title>. <source>Comput. Hum. Behav.</source> <volume>38</volume>, <fpage>213</fpage>&#x2013;<lpage>219</lpage>. doi: <pub-id pub-id-type="doi">10.1016/j.chb.2014.06.003</pub-id></citation></ref>
<ref id="ref81"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Lowry</surname> <given-names>P. B.</given-names></name> <name><surname>Moody</surname> <given-names>G.</given-names></name> <name><surname>Vance</surname> <given-names>A.</given-names></name> <name><surname>Jensen</surname> <given-names>M.</given-names></name> <name><surname>Jenkins</surname> <given-names>J.</given-names></name> <name><surname>Wells</surname> <given-names>T.</given-names></name></person-group> (<year>2012</year>). <article-title>Using an elaboration likelihood approach to better understand the persuasiveness of website privacy assurance cues for online consumers</article-title>. <source>J. Am. Soc. Inf. Sci. Technol.</source> <volume>63</volume>, <fpage>755</fpage>&#x2013;<lpage>776</lpage>. doi: <pub-id pub-id-type="doi">10.1002/asi.21705</pub-id></citation></ref>
<ref id="ref82"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Lu</surname> <given-names>J.-D. E.</given-names></name> <name><surname>Lin</surname> <given-names>J.-S. E.</given-names></name></person-group> (<year>2022</year>). <article-title>Exploring uses and gratifications and psychological outcomes of engagement with Instagram stories</article-title>. <source>Comput. Hum. Behav.</source> <volume>6</volume>:<fpage>100198</fpage>. doi: <pub-id pub-id-type="doi">10.1016/j.chbr.2022.100198</pub-id></citation></ref>
<ref id="ref83"><citation citation-type="other"><person-group person-group-type="author"><name><surname>Madden</surname> <given-names>M.</given-names></name> <name><surname>Lenhart</surname> <given-names>A.</given-names></name> <name><surname>Cortesi</surname> <given-names>S.</given-names></name> <name><surname>Gasser</surname> <given-names>U.</given-names></name> <name><surname>Duggan</surname> <given-names>M.</given-names></name> <name><surname>Smith</surname> <given-names>A.</given-names></name> <etal/></person-group>. (<year>2013</year>). Teens, social media, and privacy. Pew Research Center. Available at: <ext-link xlink:href="https://assets.pewresearch.org/wp-content/uploads/sites/14/2013/05/PIP_TeensSocialMediaandPrivacy_PDF.pdf" ext-link-type="uri">https://assets.pewresearch.org/wp-content/uploads/sites/14/2013/05/PIP_TeensSocialMediaandPrivacy_PDF.pdf</ext-link></citation></ref>
<ref id="ref84"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Marshall</surname> <given-names>T. C.</given-names></name> <name><surname>Lefringhausen</surname> <given-names>K.</given-names></name> <name><surname>Ferenczi</surname> <given-names>N.</given-names></name></person-group> (<year>2015</year>). <article-title>The big five, self-esteem, and narcissism as predictors of the topics people write about in Facebook status updates</article-title>. <source>Personal. Individ. Differ.</source> <volume>85</volume>, <fpage>35</fpage>&#x2013;<lpage>40</lpage>. doi: <pub-id pub-id-type="doi">10.1016/j.paid.2015.04.039</pub-id></citation></ref>
<ref id="ref85"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Marwick</surname> <given-names>A. E.</given-names></name> <name><surname>boyd</surname> <given-names>D. M.</given-names></name></person-group> (<year>2014</year>). <article-title>Networked privacy: how teenagers negotiate context in social media</article-title>. <source>New Media Soc.</source> <volume>16</volume>, <fpage>1051</fpage>&#x2013;<lpage>1067</lpage>. doi: <pub-id pub-id-type="doi">10.1177/1461444814543995</pub-id></citation></ref>
<ref id="ref86"><citation citation-type="book"><person-group person-group-type="author"><name><surname>Masur</surname> <given-names>P. K.</given-names></name></person-group> (<year>2018</year>). <source>Situational privacy and self-disclosure: Communication processes in online environments</source>. <publisher-loc>Berlin</publisher-loc>: <publisher-name>Springer</publisher-name>.</citation></ref>
<ref id="ref87"><citation citation-type="book"><person-group person-group-type="author"><name><surname>Masur</surname> <given-names>P. K.</given-names></name> <name><surname>Teutsch</surname> <given-names>D.</given-names></name> <name><surname>Dienlin</surname> <given-names>T.</given-names></name></person-group> (<year>2018</year>). &#x201C;<article-title>Privatheit in der Online-Kommunikation,</article-title>&#x201D; in <source>Handbuch Online-Kommunikation</source> eds. <person-group person-group-type="editor"><name><surname>Schweiger</surname> <given-names>W.</given-names></name> <name><surname>Beck</surname> <given-names>K.</given-names></name></person-group> (<publisher-loc>Berlin</publisher-loc>: <publisher-name>Springer</publisher-name>), <fpage>337</fpage>&#x2013;<lpage>365</lpage>.</citation></ref>
<ref id="ref88"><citation citation-type="other"><person-group person-group-type="author"><name><surname>Meier</surname> <given-names>Y.</given-names></name> <name><surname>Sch&#x00E4;wel</surname> <given-names>J.</given-names></name> <name><surname>Kyewski</surname> <given-names>E.</given-names></name> <name><surname>Kr&#x00E4;mer</surname> <given-names>N. C.</given-names></name></person-group> (<year>2020</year>). &#x201C;<article-title>Applying protection motivation theory to predict Facebook users&#x2019; withdrawal and disclosure intentions</article-title>,&#x201D; in <source>SMSociety&#x2019;20: international conference on social media and society</source>, eds. <person-group person-group-type="editor"><name><surname>Gruzd</surname> <given-names>A.</given-names></name> <name><surname>Mai</surname> <given-names>P.</given-names></name> <name><surname>Recuero</surname> <given-names>R.</given-names></name> <name><surname>Lee</surname> <given-names>C. S.</given-names></name> <name><surname>Cook</surname> <given-names>J.</given-names></name> <name><surname>Hodson</surname> <given-names>J.</given-names></name> <etal/></person-group>. (pp. 21&#x2013;29). Association for Computing Machinery. doi: <pub-id pub-id-type="doi">10.1145/3400806.3400810</pub-id></citation></ref>
<ref id="ref89"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Molavi</surname> <given-names>P.</given-names></name> <name><surname>Mikaeili</surname> <given-names>N.</given-names></name> <name><surname>Ghaseminejad</surname> <given-names>M. A.</given-names></name> <name><surname>Kazemi</surname> <given-names>Z.</given-names></name> <name><surname>Pourdonya</surname> <given-names>M.</given-names></name></person-group> (<year>2018</year>). <article-title>Social anxiety and benign and toxic online self-disclosures an investigation into the role of rejection sensitivity, self-regulation, and internet addiction in college students</article-title>. <source>J. Nerv. Ment. Dis.</source> <volume>206</volume>, <fpage>598</fpage>&#x2013;<lpage>605</lpage>. doi: <pub-id pub-id-type="doi">10.1097/NMD.0000000000000855</pub-id>, PMID: <pub-id pub-id-type="pmid">30020206</pub-id></citation></ref>
<ref id="ref90"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>M&#x00FC;ller</surname> <given-names>S. M.</given-names></name> <name><surname>Schiebener</surname> <given-names>J.</given-names></name> <name><surname>St&#x00F6;ckigt</surname> <given-names>G.</given-names></name> <name><surname>Brand</surname> <given-names>M.</given-names></name></person-group> (<year>2017</year>). <article-title>Short-and long-term consequences in decision-making under risk: immediate feedback about long-term prospects benefits people tending to impulsive processing</article-title>. <source>J. Cogn. Psychol.</source> <volume>29</volume>, <fpage>217</fpage>&#x2013;<lpage>239</lpage>. doi: <pub-id pub-id-type="doi">10.1080/20445911.2016.1245660</pub-id></citation></ref>
<ref id="ref91"><citation citation-type="other"><person-group person-group-type="author"><name><surname>Muscanell</surname> <given-names>N. L.</given-names></name></person-group> (<year>2013</year>). Fired for what you post online? A self-regulatory perspective on inappropriate online self-presentation [doctoral dissertation, University of Alabama]. Available at: <ext-link xlink:href="https://ir.ua.edu/handle/123456789/1811" ext-link-type="uri">https://ir.ua.edu/handle/123456789/1811</ext-link></citation></ref>
<ref id="ref92"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Naab</surname> <given-names>T. K.</given-names></name> <name><surname>Schnauber</surname> <given-names>A.</given-names></name></person-group> (<year>2016</year>). <article-title>Habitual initiation of media use and a response-frequency measure for its examination</article-title>. <source>Media Psychol.</source> <volume>19</volume>, <fpage>126</fpage>&#x2013;<lpage>155</lpage>. doi: <pub-id pub-id-type="doi">10.1080/15213269.2014.951055</pub-id></citation></ref>
<ref id="ref93"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Naqvi</surname> <given-names>N. H.</given-names></name> <name><surname>Bechara</surname> <given-names>A.</given-names></name></person-group> (<year>2010</year>). <article-title>The insula and drug addiction: an interoceptive view of pleasure, urges, and decision-making</article-title>. <source>Brain Struct. Funct.</source> <volume>214</volume>, <fpage>435</fpage>&#x2013;<lpage>450</lpage>. doi: <pub-id pub-id-type="doi">10.1007/s00429-010-0268-7</pub-id>, PMID: <pub-id pub-id-type="pmid">20512364</pub-id></citation></ref>
<ref id="ref94"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Naqvi</surname> <given-names>N. H.</given-names></name> <name><surname>Rudrauf</surname> <given-names>D.</given-names></name> <name><surname>Damasio</surname> <given-names>H.</given-names></name> <name><surname>Bechara</surname> <given-names>A.</given-names></name></person-group> (<year>2007</year>). <article-title>Damage to the insula disrupts addiction to cigarette smoking</article-title>. <source>Science</source> <volume>315</volume>, <fpage>531</fpage>&#x2013;<lpage>534</lpage>. doi: <pub-id pub-id-type="doi">10.1126/science.1135926</pub-id>, PMID: <pub-id pub-id-type="pmid">17255515</pub-id></citation></ref>
<ref id="ref95"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>No&#x00EB;l</surname> <given-names>X.</given-names></name> <name><surname>Brevers</surname> <given-names>D.</given-names></name> <name><surname>Bechara</surname> <given-names>A.</given-names></name></person-group> (<year>2013</year>). <article-title>A neurocognitive approach to understanding the neurobiology of addiction</article-title>. <source>Curr. Opin. Neurobiol.</source> <volume>23</volume>, <fpage>632</fpage>&#x2013;<lpage>638</lpage>. doi: <pub-id pub-id-type="doi">10.1016/j.conb.2013.01.018</pub-id>, PMID: <pub-id pub-id-type="pmid">23395462</pub-id></citation></ref>
<ref id="ref96"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Nyshadham</surname> <given-names>E. A.</given-names></name> <name><surname>Van Loon</surname> <given-names>G.</given-names></name></person-group> (<year>2014</year>). <article-title>An affect primary framework for privacy decision making</article-title>. <source>Southern Association of Information Systems Conference Proceedings</source> <volume>1</volume>:<fpage>533</fpage>. doi: <pub-id pub-id-type="doi">10.2139/ssrn.2419533</pub-id></citation></ref>
<ref id="ref97"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Omarzu</surname> <given-names>J.</given-names></name></person-group> (<year>2000</year>). <article-title>A disclosure decision model: determining how and when individuals will self-disclose</article-title>. <source>Personal. Soc. Psychol. Rev.</source> <volume>4</volume>, <fpage>174</fpage>&#x2013;<lpage>185</lpage>. doi: <pub-id pub-id-type="doi">10.1207/S15327957PSPR0402_05</pub-id></citation></ref>
<ref id="ref98"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Ostendorf</surname> <given-names>S.</given-names></name> <name><surname>Meier</surname> <given-names>Y.</given-names></name> <name><surname>Brand</surname> <given-names>M.</given-names></name></person-group> (<year>2022</year>). <article-title>Self-disclosure on social networks: more than a rational decision-making process</article-title>. <source>Cyberpsychology: Journal of Psychosocial Research on Cyberspace</source> <volume>16</volume>:<fpage>2</fpage>. doi: <pub-id pub-id-type="doi">10.5817/CP2022-4-2</pub-id></citation></ref>
<ref id="ref99"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Ostendorf</surname> <given-names>S.</given-names></name> <name><surname>M&#x00FC;ller</surname> <given-names>S. M.</given-names></name> <name><surname>Brand</surname> <given-names>M.</given-names></name></person-group> (<year>2020</year>). <article-title>Neglecting long-term risks: self-disclosure on social media and its relation to individual decision-making tendencies and problematic social-networks-use</article-title>. <source>Front. Psychol.</source> <volume>11</volume>:<fpage>543388</fpage>. doi: <pub-id pub-id-type="doi">10.3389/fpsyg.2020.543388</pub-id>, PMID: <pub-id pub-id-type="pmid">33192787</pub-id></citation></ref>
<ref id="ref100"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Park</surname> <given-names>Y. J.</given-names></name></person-group> (<year>2013</year>). <article-title>Digital literacy and privacy behavior online</article-title>. <source>Commun. Res.</source> <volume>40</volume>, <fpage>215</fpage>&#x2013;<lpage>236</lpage>. doi: <pub-id pub-id-type="doi">10.1177/0093650211418338</pub-id></citation></ref>
<ref id="ref101"><citation citation-type="other"><person-group person-group-type="author"><name><surname>Quan-Haase</surname> <given-names>A.</given-names></name> <name><surname>Elueze</surname> <given-names>I.</given-names></name></person-group> (<year>2018</year>). &#x201C;<article-title>Revisiting the privacy paradox: concerns and protection strategies in the social media experiences of older adults</article-title>,&#x201D; in <source>SMSociety&#x2019;18: proceedings of the ninth international conference on social media and society</source> (pp. 150&#x2013;159). Association for Computing Machinery. doi: <pub-id pub-id-type="doi">10.1145/3217804.3217907</pub-id></citation></ref>
<ref id="ref102"><citation citation-type="other"><person-group person-group-type="author"><name><surname>Quinn</surname> <given-names>K.</given-names></name> <name><surname>Epstein</surname> <given-names>D.</given-names></name></person-group> (<year>2018</year>). &#x201C;<article-title>MyPrivacy: how users think about social media privacy</article-title>,&#x201D; in <source>SMSociety&#x2019;18: proceedings of the ninth international conference on social media and society</source> (pp. 360&#x2013;364). Association for Computing Machinery. doi: <pub-id pub-id-type="doi">10.1145/3217804.3217945</pub-id></citation></ref>
<ref id="ref103"><citation citation-type="other"><person-group person-group-type="author"><name><surname>Reynolds</surname> <given-names>B.</given-names></name> <name><surname>Venkatanathan</surname> <given-names>J.</given-names></name> <name><surname>Gon&#x00E7;alves</surname> <given-names>J.</given-names></name> <name><surname>Kostakos</surname> <given-names>V.</given-names></name></person-group> (<year>2011</year>). &#x201C;<article-title>Sharing ephemeral information in online social networks: privacy perceptions and behaviours</article-title>,&#x201D; in <source>INTERACT&#x2019;11- Lecture notes in computer science: proceedings of the 13th IFIP TC13 international conference on human-computer interaction</source>. eds. <person-group person-group-type="editor"><name><surname>Campos</surname> <given-names>P.</given-names></name> <name><surname>Graham</surname> <given-names>N.</given-names></name> <name><surname>Jorge</surname> <given-names>J.</given-names></name> <name><surname>Nunes</surname> <given-names>N.</given-names></name> <name><surname>Palanque</surname> <given-names>P.</given-names></name> <name><surname>Winckler</surname> <given-names>M.</given-names></name></person-group> (pp. 204&#x2013;215). Springer. doi: <pub-id pub-id-type="doi">10.1007/978-3-642-23765-2_14</pub-id></citation></ref>
<ref id="ref104"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Rogers</surname> <given-names>R. W.</given-names></name></person-group> (<year>1975</year>). <article-title>A protection motivation theory of fear appeals and attitude change</article-title>. <source>J. Psychol.</source> <volume>91</volume>, <fpage>93</fpage>&#x2013;<lpage>114</lpage>. doi: <pub-id pub-id-type="doi">10.1080/00223980.1975.9915803</pub-id>, PMID: <pub-id pub-id-type="pmid">28136248</pub-id></citation></ref>
<ref id="ref105"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Rogers</surname> <given-names>R. D.</given-names></name> <name><surname>Owen</surname> <given-names>A. M.</given-names></name> <name><surname>Middleton</surname> <given-names>H. C.</given-names></name> <name><surname>Williams</surname> <given-names>E. J.</given-names></name> <name><surname>Pickard</surname> <given-names>J. D.</given-names></name> <name><surname>Sahakian</surname> <given-names>B. J.</given-names></name> <etal/></person-group>. (<year>1999</year>). <article-title>Choosing between small, likely rewards and large, unlikely rewards activates inferior and orbital prefrontal cortex</article-title>. <source>J. Neurosci.</source> <volume>19</volume>, <fpage>9029</fpage>&#x2013;<lpage>9038</lpage>. doi: <pub-id pub-id-type="doi">10.1523/JNEUROSCI.19-20-09029.1999</pub-id>, PMID: <pub-id pub-id-type="pmid">10516320</pub-id></citation></ref>
<ref id="ref106"><citation citation-type="other"><person-group person-group-type="author"><name><surname>Rohrmann</surname> <given-names>B.</given-names></name></person-group> (<year>2008</year>). Risk perception, risk attitude, risk communication, risk management: a conceptual appraisal. In TIEMS&#x2019;08: proceedings of the 15th annual conference of the international emergency management society (pp. 1&#x2013;10). Available at: <ext-link xlink:href="https://cdn-nrspp.s3.ap-southeast-2.amazonaws.com/wp-content/uploads/sites/4/2020/08/31175520/TIEMS_2008_Bernd_Rohrmann_Keynote.pdf" ext-link-type="uri">https://cdn-nrspp.s3.ap-southeast-2.amazonaws.com/wp-content/uploads/sites/4/2020/08/31175520/TIEMS_2008_Bernd_Rohrmann_Keynote.pdf</ext-link></citation></ref>
<ref id="ref107"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Schiebener</surname> <given-names>J.</given-names></name> <name><surname>Brand</surname> <given-names>M.</given-names></name></person-group> (<year>2015</year>). <article-title>Decision making under objective risk conditions &#x2013; A review of cognitive and emotional correlates, strategies, feedback processing, and external influences</article-title>. <source>Neuropsychol. Rev.</source> <volume>25</volume>, <fpage>171</fpage>&#x2013;<lpage>198</lpage>. doi: <pub-id pub-id-type="doi">10.1007/s11065-015-9285-x</pub-id>, PMID: <pub-id pub-id-type="pmid">25894847</pub-id></citation></ref>
<ref id="ref108"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Shane-Simpson</surname> <given-names>C.</given-names></name> <name><surname>Manago</surname> <given-names>A. M.</given-names></name> <name><surname>Gaggi</surname> <given-names>N.</given-names></name> <name><surname>Gillespie-Lynch</surname> <given-names>K.</given-names></name></person-group> (<year>2018</year>). <article-title>Why do college students prefer Facebook, Twitter, or Instagram? Site affordances, tensions between privacy and self-expression, and implications for social capital</article-title>. <source>Comput. Hum. Behav.</source> <volume>86</volume>, <fpage>276</fpage>&#x2013;<lpage>288</lpage>. doi: <pub-id pub-id-type="doi">10.1016/j.chb.2018.04.041</pub-id></citation></ref>
<ref id="ref109"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Sherman</surname> <given-names>L. E.</given-names></name> <name><surname>Greenfield</surname> <given-names>P. M.</given-names></name> <name><surname>Hernandez</surname> <given-names>L. M.</given-names></name> <name><surname>Dapretto</surname> <given-names>M.</given-names></name></person-group> (<year>2018</year>). <article-title>Peer influence via Instagram: effects on brain and behavior in adolescence and young adulthood</article-title>. <source>Child Dev.</source> <volume>89</volume>, <fpage>37</fpage>&#x2013;<lpage>47</lpage>. doi: <pub-id pub-id-type="doi">10.1111/cdev.12838</pub-id>, PMID: <pub-id pub-id-type="pmid">28612930</pub-id></citation></ref>
<ref id="ref110"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Sherman</surname> <given-names>L. E.</given-names></name> <name><surname>Payton</surname> <given-names>A. A.</given-names></name> <name><surname>Hernandez</surname> <given-names>L. M.</given-names></name> <name><surname>Greenfield</surname> <given-names>P. M.</given-names></name> <name><surname>Dapretto</surname> <given-names>M.</given-names></name></person-group> (<year>2016</year>). <article-title>The power of the like in adolescence: effects of peer influence on neural and behavioral responses to social media</article-title>. <source>Psychol. Sci.</source> <volume>27</volume>, <fpage>1027</fpage>&#x2013;<lpage>1035</lpage>. doi: <pub-id pub-id-type="doi">10.1177/0956797616645673</pub-id>, PMID: <pub-id pub-id-type="pmid">27247125</pub-id></citation></ref>
<ref id="ref111"><citation citation-type="book"><person-group person-group-type="author"><name><surname>Simon</surname> <given-names>H. A.</given-names></name></person-group> (<year>1982</year>). <source>Models of bounded rationality</source>. <publisher-loc>Cambridge</publisher-loc>: <publisher-name>MIT Press</publisher-name>.</citation></ref>
<ref id="ref112"><citation citation-type="book"><person-group person-group-type="author"><name><surname>Slovic</surname> <given-names>P.</given-names></name> <name><surname>Finucane</surname> <given-names>M.</given-names></name> <name><surname>Peters</surname> <given-names>E.</given-names></name> <name><surname>Mac Gregor</surname> <given-names>D. G.</given-names></name></person-group> (<year>2002</year>). &#x201C;<article-title>The affect heuristic</article-title>,&#x201D; in <source>Heuristics and biases: The psychology of intuitive judgment</source>. eds. <person-group person-group-type="editor"><name><surname>Gilovich</surname> <given-names>T.</given-names></name> <name><surname>Griffin</surname> <given-names>D.</given-names></name> <name><surname>Kahneman</surname> <given-names>D.</given-names></name></person-group> (<publisher-loc>Cambridge</publisher-loc>: <publisher-name>Cambridge University Press</publisher-name>), <fpage>397</fpage>&#x2013;<lpage>420</lpage>.</citation></ref>
<ref id="ref113"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Special</surname> <given-names>W. P.</given-names></name> <name><surname>Li-Barber</surname> <given-names>K. T.</given-names></name></person-group> (<year>2012</year>). <article-title>Self-disclosure and student satisfaction with Facebook</article-title>. <source>Comput. Hum. Behav.</source> <volume>28</volume>, <fpage>624</fpage>&#x2013;<lpage>630</lpage>. doi: <pub-id pub-id-type="doi">10.1016/j.chb.2011.11.008</pub-id></citation></ref>
<ref id="ref114"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Spinella</surname> <given-names>M.</given-names></name></person-group> (<year>2007</year>). <article-title>Normative data and a short form of the Barratt Impulsiveness Scale</article-title>. <source>Int. J. Neurosci.</source> <volume>117</volume>, <fpage>359</fpage>&#x2013;<lpage>368</lpage>. doi: <pub-id pub-id-type="doi">10.1080/00207450600588881</pub-id>, PMID: <pub-id pub-id-type="pmid">17365120</pub-id></citation></ref>
<ref id="ref115"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Spottswood</surname> <given-names>E. L.</given-names></name> <name><surname>Hancock</surname> <given-names>J. T.</given-names></name></person-group> (<year>2017</year>). <article-title>Should I share that? Prompting social norms that influence privacy behaviors on a social networking site</article-title>. <source>J. Comput.-Mediat. Commun.</source> <volume>22</volume>, <fpage>55</fpage>&#x2013;<lpage>70</lpage>. doi: <pub-id pub-id-type="doi">10.1111/jcc4.12182</pub-id></citation></ref>
<ref id="ref116"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Stanovich</surname> <given-names>K. E.</given-names></name></person-group> (<year>1999</year>). <article-title>Who is rational? Studies of individual differences in reasoning</article-title>. <source>Erlbaum.</source> doi: <pub-id pub-id-type="doi">10.4324/9781410603432</pub-id></citation></ref>
<ref id="ref117"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Starcke</surname> <given-names>K.</given-names></name> <name><surname>Brand</surname> <given-names>M.</given-names></name></person-group> (<year>2012</year>). <article-title>Decision making under stress: a selective review</article-title>. <source>Neurosci. Biobehav. Rev.</source> <volume>36</volume>, <fpage>1228</fpage>&#x2013;<lpage>1248</lpage>. doi: <pub-id pub-id-type="doi">10.1016/j.neubiorev.2012.02.003</pub-id>, PMID: <pub-id pub-id-type="pmid">22342781</pub-id></citation></ref>
<ref id="ref118"><citation citation-type="other"><person-group person-group-type="author"><collab id="coll1">Statista</collab></person-group>. (<year>2022a</year>). Number of monthly active Facebook users worldwide as of 1st quarter 2022. Available at: <ext-link xlink:href="https://www.statista.com/statistics/264810/number-of-monthly-active-facebook-users-worldwide/" ext-link-type="uri">https://www.statista.com/statistics/264810/number-of-monthly-active-facebook-users-worldwide/</ext-link></citation></ref>
<ref id="ref119"><citation citation-type="other"><person-group person-group-type="author"><collab id="coll2">Statista</collab></person-group>. (<year>2022b</year>). Number of monthly active Instagram users from January 2013 to December 2021. Available at: <ext-link xlink:href="https://www.statista.com/statistics/253577/number-of-monthly-active-instagram-users/" ext-link-type="uri">https://www.statista.com/statistics/253577/number-of-monthly-active-instagram-users/</ext-link></citation></ref>
<ref id="ref120"><citation citation-type="other"><person-group person-group-type="author"><collab id="coll3">Statista</collab></person-group>. (<year>2022c</year>). Number of monthly active Twitter users worldwide from 1st quarter 2010 to 1st quarter 2019. Available at: <ext-link xlink:href="https://www.statista.com/statistics/282087/number-of-monthly-active-twitter-users/" ext-link-type="uri">https://www.statista.com/statistics/282087/number-of-monthly-active-twitter-users/</ext-link></citation></ref>
<ref id="ref121"><citation citation-type="other"><person-group person-group-type="author"><collab id="coll4">Statista</collab></person-group>. (<year>2022d</year>). Number of monthly active users of Weibo corporation from 1st quarter of 2018 to 1st quarter of 2022. Available at: <ext-link xlink:href="https://www.statista.com/statistics/795303/china-mau-of-sina-weibo/" ext-link-type="uri">https://www.statista.com/statistics/795303/china-mau-of-sina-weibo/</ext-link></citation></ref>
<ref id="ref122"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Strack</surname> <given-names>F.</given-names></name> <name><surname>Deutsch</surname> <given-names>R.</given-names></name></person-group> (<year>2004</year>). <article-title>Reflective and impulsive determinants of social behavior</article-title>. <source>Personal. Soc. Psychol. Rev.</source> <volume>8</volume>, <fpage>220</fpage>&#x2013;<lpage>247</lpage>. doi: <pub-id pub-id-type="doi">10.1207/s15327957pspr0803_1</pub-id>, PMID: <pub-id pub-id-type="pmid">15454347</pub-id></citation></ref>
<ref id="ref123"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Stutzman</surname> <given-names>F.</given-names></name> <name><surname>Gross</surname> <given-names>R.</given-names></name> <name><surname>Acquisti</surname> <given-names>A.</given-names></name></person-group> (<year>2013</year>). <article-title>Silent listeners: the evolution of privacy and disclosure on Facebook</article-title>. <source>J. Priv. Confid.</source> <volume>4</volume>, <fpage>7</fpage>&#x2013;<lpage>41</lpage>. doi: <pub-id pub-id-type="doi">10.29012/jpc.v4i2.620</pub-id></citation></ref>
<ref id="ref124"><citation citation-type="other"><person-group person-group-type="author"><name><surname>Stutzman</surname> <given-names>F.</given-names></name> <name><surname>Vitak</surname> <given-names>J.</given-names></name> <name><surname>Ellison</surname> <given-names>N. B.</given-names></name> <name><surname>Gray</surname> <given-names>R.</given-names></name> <name><surname>Lampe</surname> <given-names>C.</given-names></name></person-group> (<year>2012</year>). <article-title>Privacy in interaction: exploring disclosure and social capital in Facebook</article-title>. <italic>Proceedings of the Sixth International AAAI Conference on Weblogs and Social Media</italic> <volume>6</volume>, <fpage>330</fpage>&#x2013;<lpage>337</lpage>.</citation></ref>
<ref id="ref125"><citation citation-type="other"><person-group person-group-type="author"><name><surname>Sundar</surname> <given-names>S. S.</given-names></name> <name><surname>Kang</surname> <given-names>H.</given-names></name> <name><surname>Zhang</surname> <given-names>B.</given-names></name> <name><surname>Go</surname> <given-names>E.</given-names></name> <name><surname>Wu</surname> <given-names>M.</given-names></name></person-group> (<year>2013</year>). Unlocking the privacy paradox: do cognitive heuristics hold the key? In CHI `13: proceedings of the 2013 CHI conference on human factors in computing systems (pp. 811&#x2013;816). Association for Computing Machinery. doi: <pub-id pub-id-type="doi">10.1145/2468356.2468501</pub-id></citation></ref>
<ref id="ref126"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Taddicken</surname> <given-names>M.</given-names></name></person-group> (<year>2014</year>). <article-title>The &#x201C;privacy paradox&#x201D; in the social web: the impact of privacy concerns, individual characteristics, and the perceived social relevance on different forms of self-disclosure</article-title>. <source>J. Comput.-Mediat. Commun.</source> <volume>19</volume>, <fpage>248</fpage>&#x2013;<lpage>273</lpage>. doi: <pub-id pub-id-type="doi">10.1111/jcc4.12052</pub-id></citation></ref>
<ref id="ref127"><citation citation-type="book"><person-group person-group-type="author"><name><surname>Taddicken</surname> <given-names>M.</given-names></name> <name><surname>Jers</surname> <given-names>C.</given-names></name></person-group> (<year>2011</year>). &#x201C;<article-title>The uses of privacy online: trading a loss of privacy for social web gratifications?</article-title>&#x201D; in <source>Privacy online</source>. eds. <person-group person-group-type="editor"><name><surname>Trepte</surname> <given-names>S.</given-names></name> <name><surname>Reinecke</surname> <given-names>L.</given-names></name></person-group> (<publisher-loc>Berlin</publisher-loc>: <publisher-name>Springer</publisher-name>), <fpage>143</fpage>&#x2013;<lpage>156</lpage>.</citation></ref>
<ref id="ref128"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Tamir</surname> <given-names>D. I.</given-names></name> <name><surname>Mitchell</surname> <given-names>J. P.</given-names></name></person-group> (<year>2012</year>). <article-title>Disclosing information about the self is intrinsically rewarding</article-title>. <source>Proc. Natl. Acad. Sci.</source> <volume>109</volume>, <fpage>8038</fpage>&#x2013;<lpage>8043</lpage>. doi: <pub-id pub-id-type="doi">10.1073/pnas.1202129109</pub-id>, PMID: <pub-id pub-id-type="pmid">22566617</pub-id></citation></ref>
<ref id="ref129"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Tangney</surname> <given-names>J. P.</given-names></name> <name><surname>Boone</surname> <given-names>A. L.</given-names></name> <name><surname>Baumeister</surname> <given-names>R. F.</given-names></name></person-group> (<year>2004</year>). <article-title>High self-control predicts good adjustment, less pathology, better grades, and interpersonal success</article-title>. <source>J. Pers.</source> <volume>72</volume>, <fpage>271</fpage>&#x2013;<lpage>324</lpage>. doi: <pub-id pub-id-type="doi">10.4324/9781315175775</pub-id>, PMID: <pub-id pub-id-type="pmid">15016066</pub-id></citation></ref>
<ref id="ref130"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Trepte</surname> <given-names>S.</given-names></name></person-group> (<year>2015</year>). <article-title>Social media, privacy, and self-disclosure: the turbulence caused by social media&#x2019;s affordances</article-title>. <source>Social Media + Society</source> <volume>1</volume>. doi: <pub-id pub-id-type="doi">10.1177/2056305115578681</pub-id></citation></ref>
<ref id="ref131"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Trepte</surname> <given-names>S.</given-names></name></person-group> (<year>2021</year>). <article-title>The social media privacy model: privacy and communication in the light of social media affordances</article-title>. <source>Commun. Theory</source> <volume>31</volume>, <fpage>549</fpage>&#x2013;<lpage>570</lpage>. doi: <pub-id pub-id-type="doi">10.1093/ct/qtz035</pub-id></citation></ref>
<ref id="ref132"><citation citation-type="book"><person-group person-group-type="author"><name><surname>Trepte</surname> <given-names>S.</given-names></name> <name><surname>Masur</surname> <given-names>P. K.</given-names></name></person-group> (<year>2020</year>). &#x201C;<article-title>Need for privacy</article-title>&#x201D; in <source>Encyclopedia of personality and individual differences</source>. eds. <person-group person-group-type="editor"><name><surname>Zeigler-Hill</surname> <given-names>V.</given-names></name> <name><surname>Shakelford</surname> <given-names>T. K.</given-names></name></person-group> (<publisher-loc>Berlin</publisher-loc>: <publisher-name>Springer</publisher-name>), <fpage>3132</fpage>&#x2013;<lpage>3135</lpage>.</citation></ref>
<ref id="ref133"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Tufekci</surname> <given-names>Z.</given-names></name></person-group> (<year>2008</year>). <article-title>Can you see me now? Audience and disclosure regulation in online social network sites</article-title>. <source>Bull. Sci. Technol. Soc.</source> <volume>28</volume>, <fpage>20</fpage>&#x2013;<lpage>36</lpage>. doi: <pub-id pub-id-type="doi">10.1177/0270467607311484</pub-id></citation></ref>
<ref id="ref134"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Turel</surname> <given-names>O.</given-names></name> <name><surname>Bechara</surname> <given-names>A.</given-names></name></person-group> (<year>2016</year>). <article-title>A triadic reflective-impulsive-interoceptive awareness model of general and impulsive information system use: behavioral tests of neuro-cognitive theory</article-title>. <source>Front. Psychol.</source> <volume>7</volume>:<fpage>601</fpage>. doi: <pub-id pub-id-type="doi">10.3389/fpsyg.2016.00601</pub-id>, PMID: <pub-id pub-id-type="pmid">27199834</pub-id></citation></ref>
<ref id="ref135"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Turel</surname> <given-names>O.</given-names></name> <name><surname>Bechara</surname> <given-names>A.</given-names></name></person-group> (<year>2017</year>). <article-title>Effects of motor impulsivity and sleep quality on swearing, interpersonally deviant and disadvantageous behaviors on online social networking sites</article-title>. <source>Personal. Individ. Differ.</source> <volume>108</volume>, <fpage>91</fpage>&#x2013;<lpage>97</lpage>. doi: <pub-id pub-id-type="doi">10.1016/j.paid.2016.12.005</pub-id></citation></ref>
<ref id="ref136"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Turel</surname> <given-names>O.</given-names></name> <name><surname>He</surname> <given-names>Q.</given-names></name> <name><surname>Wei</surname> <given-names>L.</given-names></name> <name><surname>Bechara</surname> <given-names>A.</given-names></name></person-group> (<year>2021</year>). <article-title>The role of the insula in internet gaming disorder</article-title>. <source>Addict. Biol.</source> <volume>26</volume>:<fpage>e12894</fpage>. doi: <pub-id pub-id-type="doi">10.1111/adb.12894</pub-id>, PMID: <pub-id pub-id-type="pmid">32147952</pub-id></citation></ref>
<ref id="ref137"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Utz</surname> <given-names>S.</given-names></name> <name><surname>Tanis</surname> <given-names>M.</given-names></name> <name><surname>Vermeulen</surname> <given-names>I.</given-names></name></person-group> (<year>2012</year>). <article-title>It is all about being popular: the effects of need for popularity on social network site use</article-title>. <source>Cyberpsychol. Behav. Soc. Netw.</source> <volume>15</volume>, <fpage>37</fpage>&#x2013;<lpage>42</lpage>. doi: <pub-id pub-id-type="doi">10.1089/cyber.2010.0651</pub-id>, PMID: <pub-id pub-id-type="pmid">21988765</pub-id></citation></ref>
<ref id="ref138"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Van Bavel</surname> <given-names>J. J.</given-names></name> <name><surname>Xiao</surname> <given-names>Y. J.</given-names></name> <name><surname>Cunningham</surname> <given-names>W. A.</given-names></name></person-group> (<year>2012</year>). <article-title>Evaluation is a dynamic process: moving beyond dual system models</article-title>. <source>Soc. Personal. Psychol. Compass</source> <volume>6</volume>, <fpage>438</fpage>&#x2013;<lpage>454</lpage>. doi: <pub-id pub-id-type="doi">10.1111/j.1751-9004.2012.00438.x</pub-id></citation></ref>
<ref id="ref139"><citation citation-type="book"><person-group person-group-type="author"><name><surname>van Koningsbruggen</surname> <given-names>G. M.</given-names></name> <name><surname>Hartmann</surname> <given-names>T.</given-names></name> <name><surname>Du</surname> <given-names>J.</given-names></name></person-group> (<year>2018</year>). &#x201C;<article-title>Always on? Explicating impulsive influences on media use</article-title>&#x201D; in <source>Permanently online, permanently connected: Living and communicating in a POPC world</source>. eds. <person-group person-group-type="editor"><name><surname>Vorderer</surname> <given-names>P.</given-names></name> <name><surname>Hefner</surname> <given-names>D.</given-names></name> <name><surname>Reinecke</surname> <given-names>L.</given-names></name> <name><surname>Klimmt</surname> <given-names>C.</given-names></name></person-group> (<publisher-loc>England</publisher-loc>: <publisher-name>Routledge</publisher-name>), <fpage>51</fpage>&#x2013;<lpage>60</lpage>.</citation></ref>
<ref id="ref140"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>van Koningsbruggen</surname> <given-names>G. M.</given-names></name> <name><surname>Hartmann</surname> <given-names>T.</given-names></name> <name><surname>Eden</surname> <given-names>A.</given-names></name> <name><surname>Veling</surname> <given-names>H.</given-names></name></person-group> (<year>2017</year>). <article-title>Spontaneous hedonic reactions to social media cues</article-title>. <source>Cyberpsychol. Behav. Soc. Netw.</source> <volume>20</volume>, <fpage>334</fpage>&#x2013;<lpage>340</lpage>. doi: <pub-id pub-id-type="doi">10.1089/cyber.2016.0530</pub-id>, PMID: <pub-id pub-id-type="pmid">28422519</pub-id></citation></ref>
<ref id="ref141"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Veltri</surname> <given-names>G. A.</given-names></name> <name><surname>Ivchenko</surname> <given-names>A.</given-names></name></person-group> (<year>2017</year>). <article-title>The impact of different forms of cognitive scarcity on online privacy disclosure</article-title>. <source>Comput. Hum. Behav.</source> <volume>73</volume>, <fpage>238</fpage>&#x2013;<lpage>246</lpage>. doi: <pub-id pub-id-type="doi">10.1016/j.chb.2017.03.018</pub-id></citation></ref>
<ref id="ref142"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Verduyn</surname> <given-names>P.</given-names></name> <name><surname>Gugushvili</surname> <given-names>N.</given-names></name> <name><surname>Kross</surname> <given-names>E.</given-names></name></person-group> (<year>2021</year>). <article-title>The impact of social network sites on mental health: distinguishing active from passive use</article-title>. <source>World Psychiatry</source> <volume>20</volume>, <fpage>133</fpage>&#x2013;<lpage>134</lpage>. doi: <pub-id pub-id-type="doi">10.1002/wps.20820</pub-id>, PMID: <pub-id pub-id-type="pmid">33432746</pub-id></citation></ref>
<ref id="ref143"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Vorderer</surname> <given-names>P.</given-names></name> <name><surname>Kr&#x00F6;mer</surname> <given-names>N.</given-names></name> <name><surname>Schneider</surname> <given-names>F. M.</given-names></name></person-group> (<year>2016</year>). <article-title>Permanently online - permanently connected: explorations into university students&#x2019; use of social media and mobile smart devices</article-title>. <source>Comput. Hum. Behav.</source> <volume>63</volume>, <fpage>694</fpage>&#x2013;<lpage>703</lpage>. doi: <pub-id pub-id-type="doi">10.1016/j.chb.2016.05.085</pub-id></citation></ref>
<ref id="ref144"><citation citation-type="book"><person-group person-group-type="author"><name><surname>Vroom</surname> <given-names>V. H.</given-names></name></person-group> (<year>1964</year>). <source>Work and motivation</source>. <publisher-loc>Netherlands</publisher-loc>: <publisher-name>Wiley</publisher-name>.</citation></ref>
<ref id="ref145"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Walrave</surname> <given-names>M.</given-names></name> <name><surname>Vanwesenbeeck</surname> <given-names>I.</given-names></name> <name><surname>Heirman</surname> <given-names>W.</given-names></name></person-group> (<year>2012</year>). <article-title>Connecting and protecting? Comparing predictors of self-disclosure and privacy settings use between adolescents and adults</article-title>. <source>Cyberpsychology</source> <volume>6</volume>, <fpage>1</fpage>&#x2013;<lpage>16</lpage>. doi: <pub-id pub-id-type="doi">10.5817/CP2012-1-3</pub-id></citation></ref>
<ref id="ref146"><citation citation-type="other"><person-group person-group-type="author"><name><surname>Wang</surname> <given-names>Y.</given-names></name> <name><surname>Leon</surname> <given-names>P. G.</given-names></name> <name><surname>Scott</surname> <given-names>K.</given-names></name> <name><surname>Chen</surname> <given-names>X.</given-names></name> <name><surname>Acquisti</surname> <given-names>A.</given-names></name> <name><surname>Cranor</surname> <given-names>L. F.</given-names></name></person-group> (<year>2013</year>). &#x201C;<article-title>Privacy nudges for social media: an exploratory Facebook study</article-title>,&#x201D; In <source>WWW&#x2019;13 Companion: proceedings of the 22nd international conference on world wide web</source>. eds. <person-group person-group-type="editor"><name><surname>Schwabe</surname> <given-names>D.</given-names></name> <name><surname>Almeida</surname> <given-names>V.</given-names></name> <name><surname>Glaser</surname> <given-names>H.</given-names></name> <name><surname>Baeza-Yates</surname> <given-names>R.</given-names></name> <name><surname>Moon</surname> <given-names>S.</given-names></name></person-group>, (pp. 763&#x2013;770). Association for Computing Machinery. doi: <pub-id pub-id-type="doi">10.1145/2487788.2488038</pub-id></citation></ref>
<ref id="ref147"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Wang</surname> <given-names>L.</given-names></name> <name><surname>Yan</surname> <given-names>J.</given-names></name></person-group> (<year>2017</year>). <article-title>The dual effects of bounded rationality on self-disclosure intention</article-title>. <source>Acad. Manag. Proc.</source> <volume>2017</volume>:<fpage>10754</fpage>. doi: <pub-id pub-id-type="doi">10.5465/AMBPP.2017.10754abstract</pub-id></citation></ref>
<ref id="ref148"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Wei</surname> <given-names>L.</given-names></name> <name><surname>Zhang</surname> <given-names>S.</given-names></name> <name><surname>Turel</surname> <given-names>O.</given-names></name> <name><surname>Bechara</surname> <given-names>A.</given-names></name> <name><surname>He</surname> <given-names>Q.</given-names></name></person-group> (<year>2017</year>). <article-title>A tripartite neurocognitive model of internet gaming disorder</article-title>. <source>Front. Psychiatry</source> <volume>8</volume>:<fpage>285</fpage>. doi: <pub-id pub-id-type="doi">10.3389/fpsyt.2017.00285</pub-id>, PMID: <pub-id pub-id-type="pmid">29312016</pub-id></citation></ref>
<ref id="ref149"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Winter</surname> <given-names>S.</given-names></name> <name><surname>Neubaum</surname> <given-names>G.</given-names></name> <name><surname>Eimler</surname> <given-names>S. C.</given-names></name> <name><surname>Gordon</surname> <given-names>V.</given-names></name> <name><surname>Theil</surname> <given-names>J.</given-names></name> <name><surname>Herrmann</surname> <given-names>J.</given-names></name> <etal/></person-group>. (<year>2014</year>). <article-title>Another brick in the Facebook wall - how personality traits relate to the content of status updates</article-title>. <source>Comput. Hum. Behav.</source> <volume>34</volume>, <fpage>194</fpage>&#x2013;<lpage>202</lpage>. doi: <pub-id pub-id-type="doi">10.1016/j.chb.2014.01.048</pub-id></citation></ref>
<ref id="ref150"><citation citation-type="book"><person-group person-group-type="author"><name><surname>Wood</surname> <given-names>S. M. W.</given-names></name> <name><surname>Bechara</surname> <given-names>A.</given-names></name></person-group> (<year>2014</year>). &#x201C;<article-title>The neuroscience of dual (and triple) system in decision making</article-title>,&#x201D; in <source>The neuroscience of risky decision making</source>. eds. <person-group person-group-type="editor"><name><surname>Reyna</surname> <given-names>V. F.</given-names></name> <name><surname>Zayas</surname> <given-names>V.</given-names></name></person-group> (<publisher-loc>United States</publisher-loc>: <publisher-name>American Psychological Association</publisher-name>), <fpage>177</fpage>&#x2013;<lpage>202</lpage>.</citation></ref>
<ref id="ref151"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Wu</surname> <given-names>K. W.</given-names></name> <name><surname>Huang</surname> <given-names>S. Y.</given-names></name> <name><surname>Yen</surname> <given-names>D. C.</given-names></name> <name><surname>Popova</surname> <given-names>I.</given-names></name></person-group> (<year>2012</year>). <article-title>The effect of online privacy policy on consumer privacy concern and trust</article-title>. <source>Comput. Hum. Behav.</source> <volume>28</volume>, <fpage>889</fpage>&#x2013;<lpage>897</lpage>. doi: <pub-id pub-id-type="doi">10.1016/j.chb.2011.12.008</pub-id></citation></ref>
<ref id="ref152"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Xu</surname> <given-names>H.</given-names></name> <name><surname>Luo</surname> <given-names>X.</given-names></name> <name><surname>Carroll</surname> <given-names>J. M.</given-names></name> <name><surname>Rosson</surname> <given-names>M. B.</given-names></name></person-group> (<year>2011</year>). <article-title>The personalization privacy paradox: an exploratory study of decision making process for location-aware marketing</article-title>. <source>Decis. Support. Syst.</source> <volume>51</volume>, <fpage>42</fpage>&#x2013;<lpage>52</lpage>. doi: <pub-id pub-id-type="doi">10.1016/j.dss.2010.11.017</pub-id></citation></ref>
<ref id="ref153"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Xue</surname> <given-names>G.</given-names></name> <name><surname>Lu</surname> <given-names>Z.</given-names></name> <name><surname>Levin</surname> <given-names>I. P.</given-names></name> <name><surname>Bechara</surname> <given-names>A.</given-names></name></person-group> (<year>2010</year>). <article-title>The impact of prior risk experiences on subsequent risky decision-making: the role of the insula</article-title>. <source>Neuro Image</source> <volume>50</volume>, <fpage>709</fpage>&#x2013;<lpage>716</lpage>. doi: <pub-id pub-id-type="doi">10.1016/j.neuroimage.2009.12.097</pub-id>, PMID: <pub-id pub-id-type="pmid">20045470</pub-id></citation></ref>
<ref id="ref154"><citation citation-type="book"><person-group person-group-type="author"><name><surname>Yao</surname> <given-names>M. Z.</given-names></name></person-group> (<year>2011</year>). &#x201C;<article-title>Self-protection of online privacy: A behavioral approach,</article-title>&#x201D; in <source>Privacy online</source>. eds. <person-group person-group-type="editor"><name><surname>Trepte</surname> <given-names>S.</given-names></name> <name><surname>Reinecke</surname> <given-names>L.</given-names></name></person-group> (<publisher-loc>Berlin</publisher-loc>: <publisher-name>Springer</publisher-name>), <fpage>111</fpage>&#x2013;<lpage>125</lpage>.</citation></ref>
<ref id="ref155"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Yu</surname> <given-names>S.</given-names></name></person-group> (<year>2014</year>). <article-title>Does low self-control explain voluntary disclosure of personal information on the internet?</article-title> <source>Comput. Hum. Behav.</source> <volume>37</volume>, <fpage>210</fpage>&#x2013;<lpage>215</lpage>. doi: <pub-id pub-id-type="doi">10.1016/j.chb.2014.04.055</pub-id></citation></ref>
<ref id="ref156"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Yu</surname> <given-names>J.</given-names></name> <name><surname>Hu</surname> <given-names>P. J. H.</given-names></name> <name><surname>Cheng</surname> <given-names>T. H.</given-names></name></person-group> (<year>2015</year>). <article-title>Role of affect in self-disclosure on social network websites: a test of two competing models</article-title>. <source>J. Manag. Inf. Syst.</source> <volume>32</volume>, <fpage>239</fpage>&#x2013;<lpage>277</lpage>. doi: <pub-id pub-id-type="doi">10.1080/07421222.2015.1063305</pub-id></citation></ref>
<ref id="ref157"><citation citation-type="other"><person-group person-group-type="author"><name><surname>Zafeiropoulou</surname> <given-names>A.-M.</given-names></name></person-group> (<year>2014</year>). A paradox of privacy: unravelling the reasoning behind online location sharing [doctoral dissertation, University of Southampton]. Available at: <ext-link xlink:href="https://eprints.soton.ac.uk/id/eprint/376477" ext-link-type="uri">https://eprints.soton.ac.uk/id/eprint/376477</ext-link></citation></ref>
<ref id="ref158"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Zlatolas</surname> <given-names>L. N.</given-names></name> <name><surname>Welzer</surname> <given-names>T.</given-names></name> <name><surname>Heri&#x010D;ko</surname> <given-names>M.</given-names></name> <name><surname>H&#x00F6;lbl</surname> <given-names>M.</given-names></name></person-group> (<year>2015</year>). <article-title>Privacy antecedents for SNS self-disclosure: the case of Facebook</article-title>. <source>Comput. Hum. Behav.</source> <volume>45</volume>, <fpage>158</fpage>&#x2013;<lpage>167</lpage>. doi: <pub-id pub-id-type="doi">10.1016/j.chb.2014.12.012</pub-id></citation></ref></ref-list></back></article>