1 Internet and Higher Education 5 (2002) The relationship between social presence and online privacy Chih-Hsiung Tu* Educational Technology Leadership, Department of Educational Leadership, Graduate School of Education and Human Development, 2134 G. St., NW, Washington, DC 20052, USA Received 3 May 2002; received in revised form 19 August 2002 Abstract Online privacy may critically impact social presence in an online learning environment. This study examined how online privacy affects social presence in online learning environments and whether e- mail, bulletin board, and real-time discussion affect online privacy. Mixed methods were used to examine the relationship between social presence and privacy. The participants rated computermediated communication (CMC) with a high degree of social presence, but the quantitative correlation between social presence and privacy failed to reach significance. Participants shared personal information on CMC knowing that it was risky because the medium lacked security despite the perceived high levels of social presence. This contradictional phenomenon can be explained as risktaking behavior. Among three CMC systems, was ranked as the most private and followed by one-to-one real-time discussion, then many-to-many real-time discussion. Bulletin board was considered to afford the least privacy. D 2002 Elsevier Science Inc. All rights reserved. Keywords: Online learning; Computer-mediated communication; Social presence; Online privacy; Social environment * Tel.: ; fax: address: (C.-H. Tu) /02/$ see front matter D 2002 Elsevier Science Inc. All rights reserved. PII: S (02)
2 294 C.-H. Tu / Internet and Higher Education 5 (2002) Introduction Social presence is the degree of person-to-person awareness, which occurs in a mediated environment. Multiple publications (McBride & Bazley, 1997; Rice, 1993; Spears & Lea, 1992; Towell & Towell, 1997) have emphasized that social presence is an important construct for future study. Recent studies have shown that social presence impacts online learners online interaction and learning (Gunawardena & Zittle, 1997; Tu & McIsaac, 2002). Short, Williams, and Christie (1976) indicate that social presence is the most important perception that occurs in social context and is an important key to understanding person-to-person telecommunication. Later, Rice (1993) concluded that social presence appears to provide a useful, consistent, meaningful, stable, and discriminating way to characterize computer-mediated communication (CMC). Gunawardena (1995) argued that social presence is necessary to enhance and improve effective instruction in online learning environments. When the level of social presence is low, interaction is also low (Garramone, Harris, & Anderson, 1986). In fact, a lack of social presence may lead to a high level of frustration, a critical attitude toward the instructor s effectiveness, and a lower level of affective learning (Rifkind, 1992). When one perceives an online learning environment to be less private, or they are unable to maintain their privacy online, they would naturally be less interactive in his/her learning process. In other words, privacy may be a critical factor influencing the level of social presence. Therefore, a need exists to examine the relationship between social presence and privacy in an online learning environment Social presence Social presence is defined as the degree of awareness of another person in an interaction and the consequent appreciation of an interpersonal relationship (Rice, 1993; Walther, 1992; Walther & Burgoon, 1992). Biocca (1997) declared that, The amount of social presence is the degree to which a user feels access to the intelligence, intentions, and sensory impressions of another. Tu and McIsaac (2002) redefine it for online learning environments: Social presence is the degree of feeling, perception, and reaction of being connected on CMC to another intellectual entity. Factors that contribute to an appreciable degree of online social presence are social relationship, trust, learners characteristics, learners perceptions on online environments, attributes of communication media, learners computer literacy, use of emoticons and paralanguage, communication styles, task types, privacy, etc. Several studies (Leh, 2001; Polhemus, Shih, & Swan, 2001; Swan, Polhemus, & Shih, 2002) have shown that perception of the degree of social presence in an interaction will vary among users. Therefore, social presence should be viewed as a subjective quality that depends upon the objective quality of the medium (Walther, 1992) Social presence concepts in social psychology Two concepts in social psychology grounded in face-to-face settings are related to social presence are intimacy (Argyle & Dean, 1965) and immediacy (Wiener &
3 Mehrabian, 1968). Traditionally, these two concepts are difficult convey in an online learning environment. Intimacy is a function of eye contact, physical proximity, topic of conversation, etc. Changes in one will produce compensatory changes in the others (Short et al., 1976). A communication with maintained eye contact, close proximity, body leaning forward, and smiling conveys intimacy (Burgoon, Buller, Hale, & deturck, 1984). Equilibrium theory (Short et al., 1976) explains how humans balance the degree of intimacy. In a face-to-face setting, people tend to avoid maintained eye contact and they increase physical distance if personal topics or topics with which a person is uncomfortable are to be discussed. People try to maintain an optimum level of intimacy. That is, when an uncomfortable degree of intimacy is encountered, the participants of the conversation will attempt to alter their behavior to maintain the degree of intimacy at an optimal comfort level. The interaction is unpleasant if behavior cannot be altered to allow an optimal degree of intimacy. Equilibrium theory is applied very differently in online situations. In online environments, learners are authorized to master their online communications to determine when they would like to communicate and about what via certain ideal CMC forms. The attributes of CMC allow learners to manipulate the level of intimacy as they wish, a phenomenon that may lead learners to react to online intimacy with extreme behaviors, embarrassing, flaming, dropout, or lurking (eavesdropping in silence) etc. The second psychological concept involved in social presence is immediacy. This is the psychological distance a communicator places between himself or herself and the recipient of the communication. It includes eye contact, smiling, vocal expressiveness, physical proximity, appropriate touching, leaning toward a person, gesturing, using overall body movements, being relaxed, and spending time with someone. Online immediacy becomes very difficult to deliver because CMC lacks social cues and nonverbal cues, however, this does not negate online immediacy or its importance. Human are social beings and immediacy is still necessary for social contact among online learners. In fact, immediacy in online learning environments is even more critical to affect interaction than in face-to-face learning environments Degree of social presence C.-H. Tu / Internet and Higher Education 5 (2002) Social presence is a dynamic variable. The degree of social presence is based upon the characteristics of the medium and the user s perception. People discern different amounts of social presence in various types of media. Goffman (1959) contended that humans construct their self-presentations and carry them off in front of others either intentionally or unintentionally. Hence, social presence is the internal image the perceiver evokes of a moving, expressive body. Normally, the users are asked to assess the degree of social presence. Short et al. (1976) measured social presence through the semantic differential technique with a series of bipolar scales with a seven-point assessment, sociable/unsociable, personal/impersonal, sensitive/insensitive, and warm/cold. A higher level of presence in a medium confers the attributes of being more sociable, more personal, more sensitive, and warmer.
4 296 C.-H. Tu / Internet and Higher Education 5 (2002) Online learners can cultivate social presence by facilitating introductions of the CMC communicators to each other in the initial learning sessions (Johansen, Vallee, & Spangler, 1988). This allows the participants the opportunity to become better acquainted and to develop a trust relationship early in the course. Also, it can be used by the leader to encourage participation by all of the members of the discussion. Gunawardena s (1995) study suggested the student s perception of social presence is impacted by the instructor s skilled use of interaction techniques in initiating online conversations with introductions and salutations that will impact. Consequently, instructors, or moderators, should develop interaction skills that create a sense of social presence Three dimensions of social presence Tu and McIsaac (2002) define social presence into three dimensions: social context, online communication, and interactivity. These three dimensions function as a theoretical framework for research in online social presence Social context Social context is constructed from the CMC users characteristics and their perception of the CMC environment. Social contexts, such as task orientation (Steinfield, 1986), users characteristics and perception on online environment (Steinfield, 1986), recipients/social relationships (Walther, 1992; Williams & Rice, 1983), trust, availability of CMC, CMC access locations, and social process (Walther, 1992) etc., contribute to the degree of social presence. If the participants are unfamiliar with each other and the conversation is task oriented and more public the degree of social presence will degrade. Walther (1992) proposed that different social processes, settings, and purposes are components of social context and affect social presence Online communication Online communication is concerned with the attributes of the language used online and the applications of online language, such as attributes of CMC, computer literacy skills, online immediacy, and online language skills. Because of the technology and its text-based format, CMC requires that users possess some level of computer communication literacy such as typing, reading, and writing. People without these skills develop communication anxiety (Gunawardena, 1991) when text-based communication is required. Therefore, it is suggested that text-based communications should be initiated with some light or casual topics, like introductions. Training students to use the medium and making them comfortable using it is crucial to the success of collaborative learning. Garramone et al. (1986) and Perse, Burton, Kovner, Lears, and Sen (1992) examined students perceptions of social presence and concluded that the degree of social presence on computer bulletin boards was perceived as higher for users who were more interactive than for those who were not. Perse et al. (1992) found a positive relationship between social presence and the student s perception of their own computer expertise. Paralanguage and emoticons used to compensate lacks of social/ nonverbal cues have impacts on social presence. Tu (2001) concluded that students who
5 appreciated uses of paralanguage and emoticons perceive higher level of social presence, even they do not utilize them Interactivity Interactivity includes the activities in which CMC users engage and the communication styles they use, such as responsive time, communication styles, task types, topics (Argyle & Dean, 1965; Walther, 1992), and size of groups. The potential for feedback from the other also contributes to the degree of salience of the other person in the interaction. Immediate response is another component of interactivity. In asynchronous CMC response occurs at a different time, so it takes longer to obtain a response from the other party. When an immediate response is expected and is not received a feeling of low interactivity is created, thus, diminishing the level of social presence. However, Garramone et al. (1986) found that interactivity, allowing for feedback, contributes to the social presence of an electronic bulletin board. Gunawardena (1995) differentiates interactivity and social presence, arguing that social presence requires user s to add one more step to awareness of interactivity; in short, when users notice and appreciate it, there is social presence. In other words, interactivity is the design and strategy to stimulate social presence. When learners appreciate it, ideal social presence is perceived and has a great deal potential to generate interactive learning Privacy Privacy affects the degree of social presence. Research has shown that privacy has an impact on human interaction in media-based communications (Champness, 1973; Christie & Holloway, 1975; Steinfield, 1986; Tu, 2000; Weisband & Reinig, 1995). If a medium is perceived more public, a sense of less privacy will be generated and vice versa. Therefore, the level of privacy is determined by the users perceptions in addition to the actual quality of security. Witmer (1997) identified two factors, feeling of privacy and system privacy, which affect level of privacy. Researchers have been examining the causes of perceived difference in levels of privacy. Illusion of privacy (Neumann, 1995), self-awareness (Archer, Hormuth, & Berg, 1982), nonchalant attitude (Friedman, 1990; Tu, 2001), social norms (Markus, 1994), self-disclosure (Weisband & Reinig, 1995), and risk-taking behaviors (Tu & McIsaac, 2002; Witmer, 1997) have been applied to explain online users different levels of perceived privacy. Weisband and Reinig (1995) examined how affects online users privacy and concluded three majors factors: (a) technology and users knowledge and experience; (b) management policies in an organizational context; and (c) the psychological effects of that encourage self-disclosure, development of interpersonal ties, and new norms of social behavior. These three factors correspond to feeling of privacy, system privacy, and social norms Feeling of privacy C.-H. Tu / Internet and Higher Education 5 (2002) Feeling of privacy refers to online users perception of privacy psychologically, mentally, culturally, or conditionally rather than the actual security. Generally speaking, online users
6 298 C.-H. Tu / Internet and Higher Education 5 (2002) perceive different communication media with different levels of privacy in different circumstances. A less private setting results in a decreased perception of social presence by users. In a videoconferencing environment, Champness (1972) reported that users felt more public and perceived less social presence. By and large, a camera in operation may be seen as intrusive. Attitudes toward the use of TV in public broadcasting may carry over into the laboratory causing concerns of electronic eavesdropping and producing negative reactions (Ryan, 1976). Steinfield (1986) examined the social presence of in organizational settings, and reported that users were reluctant to employ for confidential matters. Feeling of privacy may be an unstable and dynamic factor because it is subjective and socially constructed in online communication messages. Weisband and Reinig (1995) argued that online communications could result in two different areas, individual and organization levels. However, Finholt and Sproull (1990) concluded that it was difficult to distinguish work-related message from nonwork-related ones because users mixed subjects during communications. Although these two studies resulted in different arguments, both studies agreed with that CMC allows online users to modify the social constraints by reducing the social context cues, such as information about social hierarchy, social differences, social relationships, and personal meaning and implications of interaction (Sproull & Kiesler, 1986). Online users tend to lose the sense of self-awareness and perceive they are invisible and anonymous because of the absence of social context cues and visualization; therefore, they felt free to express themselves and allow self-disclosure System privacy System privacy refers to the actual security of CMC technologies and considers the likelihood that someone may read, send, or resend a message to or from you. Some users are not familiar with CMC system security and think that CMC technologies are private because in some cases user s name and password are required to conduct online communication, such as communications. In Kerr and Hiltz s (1982) study, it was found that more than a third of the online users agreed with the statements that information can come into the wrong hands and outsiders can see private messages. Generally, online users who have better knowledge of computer systems and CMC technologies will perceive low privacy because of the systems not being secure. It appears that online privacy cannot be predicted because of the many complicated human psychological and social behaviors that are difficult to explain. A few activities have been examined by researchers and are discussed below to facilitate a better understanding of the relationship between online users behaviors and privacy Illusion of privacy Convenience may override privacy risk because users are unable to visualize the negative impacts although less private environments may decrease user s tendency to online interaction. This is called Illusion of Privacy (Neumann, 1995). Oftentimes less communication cues are presented; therefore, users lose the sense of who else is in the virtual environment
7 and the size of the audience, such as lurkers (people who only observe activities and never participate in them). Users feel psychologically secure in their communication. It is difficult for some users to consider negative consequences that they can t actually see in their minds, and the sharing of information about them is hard to visualize. Therefore, people do not ask themselves what negative things could happen to them as a result of people possessing knowledge about them. Consequently, the illusion created is that users think their communications are much more private than they really are. In other words, certain users think that they are invisible if they participate in the online activities. Online users continue to say things that they wouldn t say in regular communication settings, even though they are warned (Denning & Lin, 1994) Social norms CMC technologies change rapidly; therefore, few social norms are speculated for different circumstances and environments. CMC applications are influenced by social norms in organizations (Markus, 1994) and the adoption of CMC policies (Weisband & Reinig, 1995). If organizations fail to articulate organizational CMC policy to employee, it may lead CMC users to believe that they are allowed to express whatever they want to. Additionally, CMC users observe online communication of what seems to be private disclosure of others or the free expression permitted online, they perceive that such open communication is the norm, not the exception. Adopting appropriate social norms is necessary and perhaps as users become more acquainted with the computer systems and CMC technologies, social norms will stabilize and management policies will be more effective Self-disclosure Some users express personal and sensitive information online because it is easier to disclose when no one is present to respond to the communication. Archer et al. (1982) concluded that it is more unpleasant for subjects disclosing in the presence of a large mirror than disclosing without a mirror in a psychological experimental study. This experimental result can be explained as reduced self-awareness online due to the absence of social context cues; as a result, users feel safe to express private matters and personal information. In other words, other users have potential opportunities to alter/foster selfdisclosure benefits such as through esteem support, informational support, instrumental support, and motivational support (Derlega, Metts, Petronio, Hendrick, & Margulis, 1993) Nonchalant attitude C.-H. Tu / Internet and Higher Education 5 (2002) Some educational online users express nonchalant attitudes towards online privacy because they think that all class-related communications are class work, nothing personal (Friedman, 1990) or confidential. Online students take for granted that no one would be interested in their personal information, even though they do deliver it online. In fact, by
8 300 C.-H. Tu / Internet and Higher Education 5 (2002) collaborating and examining each other s work, some instructors thought that students learned from each other, teacher actively structured students computer use so that files were largely public (Friedman, 1990), such as applications of online student publishing and peer evaluation (Tu & Blocher, 2000) Risk-taking behavior Online users possess conflicting perceptions of online privacy. This phenomenon is explained as risk-taking behavior (Witmer, 1997). It was found that online users feel personally and technically secure in CMC, and felt that they had little or nothing to lose if their activities were discovered by unintended others. This, then, indicates that the perceived risk is low among users who engage in risky CMC behaviors in these newsgroups. In fact, some users may think, it won t be me if it does occur More private, the better? Is a more private online environment always better? It seems that more private environment is always the desired level of social presence for a learning environment. However, some instructional strategies may disagree with it. Online student publishing and peer evaluation that situate students in more public and less private situation have positive impacts on students online learning (Tu & Blocher, 2000). In fact, in an extremely private online learning environment, there may be little interaction because of the lack of social interaction between learners and between teachers and students. In other words, the degree of online privacy is a dynamic variable; online learners may feel and need various levels of online privacy under different circumstances. 2. Research on impacts of social presence Recent studies have found that social relationship (Tu, 2002a), task types (Tu, 2002a), attributes of CMC, and confidence, choice, and involvement (Blocher, 1997) have impacts on the degree of social presence while social presence has impacts on online interaction (Tu & McIsaac, 2002), user satisfaction (Gunawardena & Zittle, 1997), depth of online discussions (Polhemus et al., 2001), online language learning (Leh, 2001), critical thinking (Tu & Corry, 2002), and Chinese students online learning interaction (Tu, 2001). Different social relationships and task types demonstrated both positive and negative impacts on the levels of social presence. Love, information, familiarity, and trust social relationships exert a positive impact on social presence while service, status, assertive/ acquiescent, and conflict relationships exert a negative impact (Tu, 2002a). Task types, generate, choose, and social tasks appear to exert a positive impact on social presence while negotiating/conflict tasks exert a negative impact (Tu, 2002a). Online learners perceive different levels of social presence in various CMC systems, e- mail, bulletin board, and real-time discussion. Tu (in press) concluded that students perceived
9 C.-H. Tu / Internet and Higher Education 5 (2002) one-to-one with the highest social presence followed by one-to-one real-time discussion, one-to-many , many-to-many real-time discussion, and one-to-many bulletin board. From a learner-centered aspect, Blocher (1997) concluded that confidence, choice, and involvement had impacts on the levels of social presence. When learners feel more confident, are able to make learning choices, and actively are engaged in learning activities, it demonstrated higher level of social presence. While researchers have identified different various variables that affected the level of social presence, they also examined how social presence affect various online learning effects, such as online interaction, satisfactions, language learning, critical thinking and Chinese online interaction, etc. Tu and McIsaac (2002) studied the relations of social presence and online interaction and concluded that three dimensions of social presence (social context, online communication, and interactivity) have impacts on online interaction. Additionally, it was concluded that social presence had influences on Chinese students online interaction (Tu, 2001). Social presence is a significant predictor of the user s satisfaction of CMC (Gunawardena & Zittle, 1997). CMC provides the students with the ability to use emoticons to create socioemotional experiences although some learners do not use them. It is suggested that the teacher/moderator must create a sense of social presence, which greatly impacts the user s satisfaction of the medium used in the classroom. Polhemus et al. (2001) studies the relations of social presence and complexity of online discussions and the findings revealed that postings with a high degree of social presence were likely to initiate more complex discussions than postings with a low degree of social presence. To foster high-level social presence to promote complexity of online discussion, researchers suggest that online instructors should develop a rapport with learners by creating a trustworthy community-like environment with use of high amount of affective languages. These strategies will encourage and motivate learners to model similar online communication. Social presence additionally was found as a critical factor that affects online language learning. Leh (2001) examined Spanish learning via pen-pal design with native Spanish speaking learners. She concluded that higher social presence would enhance students to learn Spanish via various CMC forms. In preliminary analysis, Tu and Corry (2002) found that there was a relation between social presence and critical thinking. Three dimensions of social presence (Tu & McIsaac, 2002) related to five factors of critical thinking (Bullen, 1998). However, the exact relations were not reported in this study. Further examinations are indicated to examine what the relations between social presence and critical thinking are and whether social presence is a critical factor affecting learners critical thinking. Social presence has impacts on non-english speaking learners in English speaking classroom. Chinese students responded that social presence has impacts on their online interaction; even they were unable to gather nonverbal cues, like in traditional communication (Tu, 2001).
10 302 C.-H. Tu / Internet and Higher Education 5 (2002) Research questions By examining the learner s perception of social presence and privacy in three CMC systems, , bulletin board, and real-time discussion, the following questions were asked: 1. What are the relations between social presence and online privacy? 2. Do , bulletin board, and real-time discussion affect online privacy? 3. Method Both quantitative and qualitative methods were used to gain a better understanding of the relations of between social presence, privacy, and text-based CMC ( , bulletin boards, and real-time discussion). Fifty-one students enrolled in a graduate level course at a 4-year university in Southwest of the US were the subjects. The course was offered in two formats, one was televised and the other was face-to-face. Both classes were taught by the same instructor with exactly the same course content, lectures, assignments, and class requirements Qualitative method Participant observation was used to understand the issues social presence, privacy in three CMC forms from the student s point of view. FirstClass, a computer conferencing system, was used for class communication among the instructor, teaching assistants, and students. It provides , bulletin board, and real-time discussion functions. Each student was assigned a username and a password to access FirstClass. Pseudo identity was not allowed. Participant observation was the primary procedure used to capture the students perceptions of social presence and privacy and as a way to determine how they make sense out of the class activities in which they participate via different CMC systems. The data were collected through casual conversation, in-depth interview, direct observation, and document analysis. The casual conversation was conducted between the researcher and the subjects in different settings, the researcher s office, the classroom, or any convenient location. The questions were casual, free flowing, and unencumbered by preconceptions of how the topics should be discussed. Observations were conducted in the classroom, the computer laboratory, and through online asynchronous and synchronous class discussions. At the 12th week of the semester, eight semistructured in-depth interviews were conducted with participants to explore particular concepts in social presence and privacy to collect elaborate and comprehensive details. Document analysis included all messages delivered on FirstClass and outside received by the instructor and the teaching assistant. The analysis began after some of the data was acquired which gave the researcher a better idea of where to focus further data collection. This helped to develop interview questions and to decide which students to interview.
11 3.2. Quantitative method Quantitative methods were used to examine the relationship between social presence and online privacy and impacts of three CMC systems on privacy. At the 12th week of the semester, 51 participants were asked to answer the CMC Questionnaire (Tu, 2002b). This questionnaire, evaluating , bulletin board, and realtime discussion, contains 17 social presence items and 13 privacy items each with a five-point Likert scale, and 12 demographic identities. Participation in this survey was voluntary. Fortythree responses were returned with 84.31% return rate. Bartlett s test of sphericity (Bartlett, 1950) was applied to increase the validity because of the small number of participants. This tested whether the correlation was statistically different from zero by comparing the correlation matrix (R) and identity matrix (I). If R 6¼ I, the correlation was significant then factor analysis could follow (Pedhazur & Schmelkin, 1991). The power of the Bartlett s test of sphericity is that it is sensitive to the sample size (Knapp & Swoyer, 1967). Therefore, if the zero correlation is rejected by a small sample, there is greater validity. Exploratory factor analysis was utilized to examine the dimensions of social presence and privacy. Items producing eigenvalues greater than 1.00 were considered to be the significant factors. Scree testing with visual inspections was used to support and determine the number of factors/clusters to be extracted. Exploratory factor analysis was utilized. Humphrey-llgen Parallel Analysis was applied, two data matrices are analyzed simultaneously, and their Eigenvalues were plotted. Additionally, Cattell s scree test and Kaiser s criterion were used to determine the number of factors to extract. Pearson correlation was computed to explain the relationship of privacy and the social presence Triangulation C.-H. Tu / Internet and Higher Education 5 (2002) Triangulation was not used as a validation process in this study. Rather, it was considered a means to achieve a better understanding about the students perceptions of social presence. The rationale for using different methods of triangulation is that the flaws of one method are often the strengths of another; by combining methods observers can achieve the best of each while overcoming their unique deficiencies (Denzin, 1989). It was not expected that the findings generated by different methods would fall into a coherent picture (Lincoln & Guba, 1985; Patton, 1980). 4. Results Forty-three of 51 subjects responded to the online questionnaire. More than half of the subjects 28 (65.12%) were female, 15 (34.88%) males comprised the remainder of the study group. The Ethnic mix was composed of 31 Caucasian (72.09%), 4 Latinos (9.30%), 4 African Americans (9.30%), and 4 Asians and Pacific Islanders (9.30%). Subjects estimated their computer expertise as intermediate (29, 67.44%), novice (9, 20.93%), and expert (5,
12 304 C.-H. Tu / Internet and Higher Education 5 (2002) %). In other words, more than half of subjects felt that their computer expertise was intermediate or higher. Of the 43 subjects, most accessed computers at home (40, 93.02%), followed by computer laboratories (30, 69.77%), classrooms (19, 44.19%), office (18, 41.86%), and library or media center (14, 32.56%). Subjects had been using longer than bulletin board and real-time discussion. Slightly less than 75% of the students had been using from 1 to 6 years, while more than a half of them had less than 1-year experience in bulletin board and real-time discussions. Subjects experiences were 1 2 (27.91%), 5 6 (25.58%), and 3 4 years (20.93%), respectively. More than the half of students had been using bulletin board (55.81%) and real-time discussion (60.47%) less than 1 year. The majority of the subjects had less than 1 year s experience using the bulletin board (55.81%) followed by 1 2 (20.93%), 3 4 (11.63%), 5 6 (4.65%), and 7 10 years (6.98%), respectively; while experience in real-time discussion was, predominately, less than 1 year (60.47%) followed by 1 2 (25.58%), 3 4, 5 6, and 7 10 years (4.65%), respectively. This group of subjects had more experience with than with bulletin board and real-time discussion; but their experience on bulletin board and real-time discussion was equivalent Quantitative results Because of the small number of participants (n = 43), it was necessary to conduct Bartlett s test of sphericity to examine the validity of the results, c 2 = with df = 44. The hypothesis that the correlation matrix was an identity matrix was rejected at the.01 of a level. The correlation matrix produced a significant chi-square by this test; therefore, factor analysis proceeded. An exploratory factor analysis was performed on 30 questionnaire items concerning social presence (social context, online communication, and interactivity) and computer privacy (system privacy and perception of privacy). These five factors accounted for 76.74% of the variance. The five factors were extracted using varimax rotation. With a cutoff of.45, three items were removed from the loading, item numbers 15, 17, and 29, respectively. These five factors were social context, online communication, interactivity, system privacy, and feeling of privacy. Cronbach s coefficient a for these five factors were.82,.88,.73,.76, and.71, respectively. The five variables that loaded on the first factor, social context, were: CMC as a social form, CMC as an informal and casual way to communicate, CMC is personal, CMC as a sensitive means of communication, and comfort with familiar persons. The second factor, system privacy, included system operator and someone may repost messages sent to or from you, someone may accidentally send and receive messages to and from individuals other than the intended recipients, CMC as technically reliable, possibility of embarrassment, and identity concerns. The third factor, interactivity, consisted of five variables: CMC as pleasant, immediate, responsive, and comfortable with familiar topics. The fourth factor, online communication, included four variables: CMC conveys feeling and emotion, CMC as stimulating, expressive, meaningful, and easily understood. The fifth factor, feeling of privacy, included feeling of confidentiality, feeling of privacy, perception of privacy,
13 Table 1 Multivariate tests among three CMC systems for privacy factor a CMC effect Value F df Error df Significance h 2 Noncent. parameter Observed power b Pillai s trace c Wilks l c Hotelling s trace c Roy s largest root c Within subjects design: privacy factor. a Design: intercept. b Computed using a=.05. c Exact statistic. C.-H. Tu / Internet and Higher Education 5 (2002) importance of privacy, level of security/secret, risk of sharing personal topics. The items of user relationship, and being unfamiliar with persons and topics did not load on any of the factors (smaller than.45) Relationship of social presence and privacy Correlations between social presence (social context, online communication, and interactivity) and privacy (system privacy and perception of privacy) were computed, and the result was insignificant with r=.286. In this study group, there was no significant relationship between social presence and privacy Differences of privacy in CMC systems One-way repeated measures, ANOVA, were computed for three CMC systems, , bulletin board, and real-time discussion on the level of privacy. The result indicated a significant difference in the level of privacy among these three CMC systems, Wilks l = 0.67, F(2,41) = 10.32, P <.05 (see Table 1). received the highest rate on the level of social presence (M = 3.15, S.D. = 0.58), followed by the real-time discussion (M = 3.13, S.D. = 0.49) and bulletin board (M = 2.97, S.D. = 0.48). was perceived as more private medium, while bulletin board was perceived as less private. Because the ANOVA overall test yielded a significant result, three pairwise comparisons among , bulletin board, and real-time discussion were conducted to assess which means differed from each other (see Table 2). Two of the three pairwise comparisons were Table 2 Paired samples test among three CMC systems for privacy factor Paired differences t df Significance M S.D. S.E.M. 95% confidence interval of the difference Lower Upper board * discussion Board discussion * * P <.05, two-tailed.
14 306 C.-H. Tu / Internet and Higher Education 5 (2002) Table 3 Multivariate tests among three CMC systems for system privacy a CMC effect Value F df Error df Significance h 2 Noncent. parameter Observed power b Pillai s trace c Wilks l c Hotelling s trace c Roy s largest root c Within subjects design: system privacy. a Design: intercept. b Computed using a=.05. c Exact statistic. significant controlling for familywise error rate across the three tests at the.05 level, using the Holm s sequential Bonferroni procedure. The smallest P-value was for the comparison of bulletin board and real-time discussion, and its value of.001 was less than the P-value of.05/3=.0167 and, therefore, the differences between the means for these two systems were significant. The next smallest P-value is for the comparison of and bulletin board, and its value of.004 was less than the P-value of.05/2=.025 and, therefore, the differences between the means for these two systems were significant. The last comparison, between and real-time discussion, was not significant at System privacy and three CMC systems One-way repeated measures, ANOVA, were computed for three CMC systems, , bulletin board, and real-time discussion on the level of system privacy. The result indicated a significant difference in the level of system privacy among these three CMC systems, Wilks l = 0.82, F(2,41) = 4.44, P <.05 (see Table 3). Real-time discussion received the highest rate on the level of system privacy (M = 3.30, S.D. = 0.66), followed by the bulletin board (M = 3.14, S.D. = 0.67) and (M = 3.13, S.D. = 0.70). Real-time discussion was perceived as a medium with more system privacy, while was perceived as having less system privacy. Because the ANOVA overall test yielded a significant result, three pairwise comparisons among , bulletin board, and real-time discussion were conducted to assess, which means differed from each other (see Table 4). Two of the three pairwise comparisons were Table 4 Paired samples test among three CMC systems for system privacy Paired differences t df Significance M S.D. S.E.M. 95% confidence interval of the difference Lower Upper board discussion * Board discussion * * P <.05, two-tailed.
15 Table 5 Multivariate tests among three CMC feeling of privacy a CMC effect Value F df Error df Significance h 2 Noncent. parameter Observed power b Pillai s trace c Wilks l c Hotelling s trace c Roy s largest root c Within subjects design: privacy factor. a Design: intercept. b Computed using a=.05. c Exact statistic. C.-H. Tu / Internet and Higher Education 5 (2002) significant controlling for familywise error rate across the three tests at the.05 level, using the Holm s sequential Bonferroni procedure. The smallest P-value was for the comparison of bulletin board and real-time discussion, and its value of.005 was less than the P-value of.05/3=.0167 and, therefore, the differences between the means for these two systems were significant. The next smallest P-value was for the comparison of and real-time discussion, and its value of.019 was less than the P-value of.05/2=.025 and, therefore, the differences between the means for these two systems were significant. The last comparison, between and bulletin board, was not significant at Feeling of privacy and three CMC systems One-way repeated measures, ANOVA, were computed for three CMC systems, , bulletin board, and real-time discussion on the level of feeling of privacy. The result indicated a significant difference in the level of feeling of privacy among these three CMC systems, Wilks l= 0.48, F(2,41) = 22.09, P <.05 (see Table 5). received the highest rate on the level of feeling of privacy (M = 3.06, S.D. = 0.68), followed by the real-time discussion (M = 2.46, S.D. = 0.58) and bulletin board (M = 2.23, S.D. = 0.59). was perceived as a medium with a greater feeling of privacy while bulletin board perceived as a medium with less feeling of privacy. Because the ANOVA overall test yielded a significant result, three pairwise comparisons among , bulletin board, and real-time discussion were conducted to assess which means differed from each other (see Table 6). All three pairwise comparisons were significant Table 6 Paired samples test among three CMC systems for feeling of privacy Paired differences t df Significance M S.D. S.E.M. 95% confidence interval of the difference Lower Upper board * discussion * Board discussion * * P <.05, two-tailed.
16 308 C.-H. Tu / Internet and Higher Education 5 (2002) controlling for familywise error rate across the three tests at the.05 level, using the Holm s sequential Bonferroni procedure. The smallest P-value was for the comparison of -bulletin board, and -real-time discussion, and its value of.000 were less than the P-value of.05/3=.0167 and, therefore, the differences between the means for these two systems were significant. The next smallest P- value was for the comparison of bulletin board and real-time discussion, and its value of.001 was less than the P-value of.05/3=.017 and, therefore, the differences between the means for these two systems were significant Qualitative results The results of qualitative explained that why the correlation between social presence and privacy was insignificant and refined the how different CMC forms influencing online privacy Privacy The privacy factor included system privacy and feeling of privacy. Students responses to CMC privacy were inconsistent and were subject to individual differences. Many students were not familiar with the preservation of privacy in the CMC environment. Some students thought that there was no difference in privacy among three CMC systems, while others felt there were differences. It appeared that is the most private and followed by one-to-one real-time discussion, then many-to-many real-time discussion, and the bulletin board was considered to be the least private System privacy System privacy referred to the security of CMC technologies regarding the likelihood that someone may read, send, or resend a message to or from you. Students were aware that CMC systems are not private. However, some were more cautious than the others. Some students were aware of it but they thought that they were fine with the degree of privacy. Salena, a Hispanic female, expressed her feeling about the privacy: . I am pretty sure...i know that it is not very secure. But, I don t think about that. I think it s fine. Students experienced less concern about CMC privacy on FirstClass because a password was required for access. In fact, one student used someone else s account to send the TA an message. Obviously, students were not that much concerned about privacy. Cheng, female Chinese student, expressed about her feeling about privacy: I don t have problems with the privacy issue at all. I believe that message I sent only goes to the person I intend to. Students were concerned that the messages they posted might appear in public despite being posted in a more private format. They felt that the recipients could very easily print the messages, pass them around, or repost them to more public areas. Judy expressed her concerns: It doesn t matter how secure the lines are you should never say anything that could be you know printed out by someone and then misinterpret it, pass around...and...i didn t see any difference between , real-time discussion, and bulletin board.
17 C.-H. Tu / Internet and Higher Education 5 (2002) Feeling of privacy Feeling of privacy referred to student s perception of the extent of privacy on CMC media. When students perceived a medium to be more private, they would express more openly. Adversely, when students perceived a medium to be more public, they would be more cautious in expressing their feelings Public feeling Bulletin board was considered by students to be a less private (more public) medium, even more public than a many-to-many real-time discussion. Students thought the bulletin board messages were permanent after they were posted, although FirstClass allowed users to remove their own bulletin board messages. Additionally, accessing the messages was easy for someone who had access to the system. Sven, a Swedish male in his early thirties, expressed his feeling about the bulletin board: No I think the bulletin board is even less secure because the bulletin board if I post something today it may stay for like a week or a month or until whoever decides to take it down. It may be there for a long while. Messages on the bulletin board were very task-oriented and less personal information was exchanged because it was perceived as being more public. Salena described her feeling about the bulletin board: Because everybody is going to see (the bulletin board messages) I don t talk something more personal... Students responded that when many people are involved in the real-time discussions (more than two persons in a real-time discussion) they were more public. Some students were aware that real-time discussion messages could be permanent and less private. Some students felt that the real-time discussion messages were deleted after the real-time discussion unless they were saved. When students developed the sense that the medium was more public, the message was less personal. Therefore, if a personal message appeared in a more public arena, it could be extremely embarrassing and created discomfort for either the sender or the recipient. In other words, learners are unable to modify their online intimacy to comfortable level. A dispute in one of the groups in the study resulted in a letter of apology, which was addressed personally to the other party involved and copied to the other group members and to group bulletin board. This could create extreme embarrassment and pressure for this particular student. One team member posted her dissatisfaction with team project on the class bulletin board in another instance. Another team member felt that it should not appear on a public bulletin board because it was a more private message. In this instance, that message caused others to feel uncomfortable. Ling, a female Chinese student, described her feeling about the message: She said she has difficulties to get in touch with us. She was not very happy. She complained that the subject was not familiar with her. So she just does it perfunctory. The group forming is not formed in organizationally. I feel very strange!! She posted this message on the bulletin board.
18 310 C.-H. Tu / Internet and Higher Education 5 (2002) The locations where students access CMC exert major influences on private feeling. When the location is more public, students felt less private, even though some computer laboratories were designed to enhance privacy. Several students, whose only access to CMC was in computer laboratory, expressed major concerns about their privacy in a public computer workstation. However, the observation of students in the classroom laboratory revealed that they were not much concerned about privacy when they were engaged in CMC conversations despite the fact that its design allowed very limited privacy. The layout was in straight rows, allowing an easy view of the computer monitor at the station in front of any particular station. One student felt that no one would be interested in her CMC messages since she was not a wellknow public figure. She did not acknowledge privacy as a problem in public CMC laboratory Private feeling Students felt that a message was more private when it was posted to a one-to-one format, i.e., one-to-one or one-to-one real-time discussion. It was more comfortable for students to share personal information in a one-to-one communication because they believed that no one would read their messages, or that no one would be interested in their personal conversation. One-to-one and real-time discussion are perceived as the most private within all three CMC systems. It can be embarrassing if a more personal message appears in public area. However, this depends upon the contents of the personal messages. If the contents are more positive, such as an expression of admiration, the subject of the commentary may feel comfortable having it posted in a more public area Importance of privacy Students reported that online privacy was important to them; but were unconcerned about this issue in conversations about their class because they felt that no one would be interested in their messages. Even so, it would take someone s time to break into the system to retrieve the messages. Risk-taking clearly emerged in the online environment. Cheng expressed her feeling about privacy: I think that no one is interested in my personal . Sven had similar thought: But you feel more secure sending an because it takes an effort to find your e- mail... who s going to care about my to classmates. Nobody!! I mean who s going to care to dig that up. Students perceived that the privacy of each CMC system was different. Therefore, students viewed the different CMC systems as providing different solutions for divergent needs with different levels of privacy. 5. Discussion In this study, the results revealed that the correlation between social presence and privacy was insignificant although participants perceived text-based CMC systems with high social
19 presence. In factor analysis, system privacy and feeling of privacy emerged. Based on qualitative data analysis, three CMC systems appeared as not the appropriate way to measure social presence and privacy because the uses of different CMC systems are more critical than types of CMC. It is suggested that it should be measuring as one-to-one , one-to-one real-time discussion, one-to-many bulletin board, and many-to-many real-time discussion formats rather than forms of , bulletin board, and real-time discussions Relationship of social presence and privacy Social presence and privacy factor do not correlate clearly in the findings. The correlation results between social presence and privacy showed insignificance. This result matched the qualitative results that students perceived that the level of social presence was inconsistent with the perceived level of online privacy. In the qualitative data analysis, students were aware of the insecurity of online communication, and students showed their concerns about online privacy in both the quantitative data analysis. Although students perceived CMC systems with high levels of social presence, they responded that it was risky to share personal information on CMC. The qualitative data analysis from the interviews, and review of the online messages did not agree with the observations at the computer laboratory and the classroom laboratory and the online postings. Students appeared very open in online learning environment although they addressed their concerns on privacy and security. This reaction can be explained as risk-taking behavior (Witmer, 1997). Participants perceptions on privacy are not stable. Online learners perceive the different levels of privacy in different online situations. It is very hard to determine when online users would perceive what degree of privacy. It is clear that, in some situations, levels of social presence have impacts on privacy Privacy C.-H. Tu / Internet and Higher Education 5 (2002) System privacy and a perception of privacy emerged as major variables from evaluation of data from both methods. System privacy included a system operator and someone who may repost messages sent to or from you, someone who may accidentally send and receive messages to and from individuals other than the intended recipients, CMC as technically reliable, possibility of embarrassment, and identity concerns. The perception of privacy included importance of privacy, level of security/secret, risk of sharing personal topics. Quantitative data analysis provided what was associated with the privacy factors, while qualitative data analysis addressed how students perceived online privacy issues. Among three CMC systems, was ranked as the most private and followed by oneto-one real-time discussion, then many-to-many real-time discussion, and bulletin board was considered to be the least private. These findings were supported by both quantitative and qualitative data analysis. In quantitative data analysis, it appeared that there were significant differences between and bulletin, and bulletin board and real-time discussion in the level of privacy. There was no significant difference between and real-time discussion. This can be explained by the fact that bulletin board was considered to be more public
20 312 C.-H. Tu / Internet and Higher Education 5 (2002) because more people have access to it, unlike and real-time discussion which seemed to occur in a more private setting, especially in one-to-one and in one-to-one real-time discussion. The qualitative data revealed that it was necessary to divide and real-time discussions into two different categories, one-to-one and one-to-many ; and one-to-one discussion and many-to-many discussion, because the style of the discussions imposed a very different level of privacy. It was concluded that one-to-one discussion was a more personal form of communication, like ; therefore, it was more private. Many-tomany discussions have a more public access; therefore, it was perceived as less private. This conclusion was not shared by the quantitative method because the different real-time discussions were not separated System privacy System privacy referred to the security of CMC technologies regarding the likelihood that someone may read, send, or resend a message to or from you. Most students thought that no privacy existed in computer systems. They reported that CMC was not secure because they have been told that it was not secure. Students believed that a system administrator or someone might break into the system and post/resend messages from/to you. But, on the other hand, the students responded that no one would be interested in their messages because it was just class work. It was difficult to determine if students really knew about the privacy and security of CMC systems from this study. Therefore, students perceptions on the security of CMC appeared to be a critical issue and an important area for investigation. Real-time discussion was perceived as possessing the highest degree of system privacy while had the least. A one-way ANOVA indicated that there were significant differences among the three CMC systems. The differences between each two systems were examined and demonstrated significant differences between and real-time discussion, and bulletin board and real-time discussion. In other words, and bulletin board appeared to have a similar level of system privacy. The explanation was that real-time discussion occurred all at one time and all of the messages disappeared when the discussion ended, unlike bulletin board and messages that were more permanent. Also, all of the participant s names were listed when they entered the discussion room and which made it easier to determine who was present at any given time. Therefore, students perceived that it was less likely for anyone to resend/ repost messages from/to someone during a real-time discussion Feeling of privacy Feeling of privacy referred to the student s perception of how private they felt while using the CMC media. When students perceived the medium to be more private, they would express themselves more openly. The opposite was true when the medium was perceived as more public. was rated as the most private medium and the bulletin board was the least private. This result was the same as overall privacy. The one-way ANOVA indicated that there were