Information disclosure on social networking sites: An intrinsic–extrinsic motivation perspective

Computers in Human Behavior - Tập 44 - Trang 103-117 - 2015
Joshana Shibchurn1, Xiangbin Yan1
1School of Management Science and Engineering, Harbin Institute of Technology, West Dazhi Street, Harbin, Heilongjiang, China#TAB#

Tóm tắt

Từ khóa


Tài liệu tham khảo

Acquisti, A., John, L., & Loewenstein, G. (2009). What is privacy worth?. In Twenty first workshop on information systems and economics (Vol. December). Phoenix, AZ.

Acquisti, 2006, Imagined communities: Awareness, information sharing, and privacy on the Facebook

Ajzen, 1988

Ajzen, 2002, Residual effects of past on later behavior: Habituation and reasoned action perspectives, Personality and Social Psychology Review, 6, 107, 10.1207/S15327957PSPR0602_02

Altman, 1975

Anderson, 1998, Structural equation modeling in practice: A review and recommended two-step approach, Psychological Bulletin, 103, 411, 10.1037/0033-2909.103.3.411

Bagozzi, 2007, The legacy of the technology acceptance model and a proposal for a paradigm shift, Journal of the Association for Information Systems, 8, 244, 10.17705/1jais.00122

Bénabou, 2003, Intrinsic and extrinsic motivation, The Review of Economic Studies, 70, 489, 10.1111/1467-937X.00253

Berridge, 2001, Reward learning: Reinforcement, incentives, and expectations, The Psychology of Learning and Motivation, 40, 223, 10.1016/S0079-7421(00)80022-5

Bhattacherjee, 2000, Acceptance of E-Commerce services: The case of electronic brokerages, Vol. 30, 411

Boyd, 2008, Social network sites: Definition, history, and scholarship, Journal of Computer-Mediated Communication, 13, 210, 10.1111/j.1083-6101.2007.00393.x

Charney, 2001, Uses and gratifications of the Internet, 383

Cheung, 2010, A theoretical model of intentional social action in online social networks, Decision Support Systems, 49, 24, 10.1016/j.dss.2009.12.006

Chin, 1998, Issues and opinion on structural equation modeling, MIS Quarterly, 22, vii

Culnan, 1999, Fairness, and impersonal trust: An empirical investigation, Organization Science, 10, 104, 10.1287/orsc.10.1.104

Culnan, 2003, Consumer privacy: Balancing economic and justice considerations, Journal of Social Issues, 59, 323, 10.1111/1540-4560.00067

Dattalo, 2013

Davis, 1989, Perceived usefulness, perceived ease of use and user acceptance of information technology, MIS Quarterly, 13, 319, 10.2307/249008

Debatin, 2009, Facebook and online privacy: Attitudes, behaviors, and unintended consequences, Journal of Computer-Mediated Communication, 15, 83, 10.1111/j.1083-6101.2009.01494.x

Deci, 1975

Dinev, 2006, Privacy calculus model in e-commerce – A study of Italy and the United States, European Journal of Information Systems, 15, 389, 10.1057/palgrave.ejis.3000590

Dinev, 2004, Internet privacy concerns and their antecedents – Measurement validity and a regression model, Behaviour & Information Technology, 23, 413, 10.1080/01449290410001715723

Fishbein, 1975

Fornell, 1981, Evaluating structural equation models with unobservable variables and measurement error, Journal of Marketing Research, 18, 39, 10.2307/3151312

Frey, 1997

Gefen, D., Pavlou, P. A., Rise, G. M., & Warkentin, M. (2002). E-government adoption. In Eighth Americas conference on information systems. Boston, MA.

Gefen, 2000, The relative importance of perceived ease-of-use in IS adoption: A Study of E-Commerce adoption, Journal of the Association for Information Systems, 1, 1, 10.17705/1jais.00008

Goodwin, 1991, Privacy: Recognition of a consumer right, Journal of Public Policy & Marketing, 10, 149, 10.1177/074391569101000111

Govani, T., & Pashley, H. (2005). Student awareness of the privacy implications when using Facebook. In.

Hair, 1998

Hann, I. H., Hui, K. L., Lee, T. S., & Png, I. P. L. (2002). Online information privacy: Measuring the costbenefit trade-Off. In Twenty-third annual international conference on information systems (pp. 1–10). Barcelona, Spain.

Horst, 2007, Perceived usefulness, personal experiences, risk perception and trust as determinants of adoption of E-Government services in the Netherlands, Computers in Human Behavior, 23, 1838, 10.1016/j.chb.2005.11.003

Hu, 1999, Cutoff criteria for fit indexes in covariance structure analysis: Conventional criteria versus new alternatives, Structural Equation Modeling, 6, 1, 10.1080/10705519909540118

Hui, 2006, Online information disclosure: Motivators and measurements, ACM Transactions on Internet Technology, 6, 415, 10.1145/1183463.1183467

Hui, 2007, The value of privacy assurance: An exploratory field experiment, MIS Quarterly, 31, 19, 10.2307/25148779

IAR (2007). Survey question types. In (Vol. 2013). The University of Texas at Austin <http://www.utexas.edu/academic/ctl/assessment/iar/teaching/plan/method/survey/survey_tables_questiontypes.pdf>.

Kaiser, 1974, An index of factorial simplicity, Psychometrika, 39, 31, 10.1007/BF02291575

Kang, 2010, Understanding the role of an IT artifact in online service continuance: An extended perspective of user satisfaction, Computers in Human Behavior, 26, 353, 10.1016/j.chb.2009.11.006

Katz, 1974, Utilization of mass communication by the individual, 19

Kelman, 1974, Social influence and linkages between the individual and the social system: Further thoughts on the processes of compliance, identification, and internalization, 125

Kenny, D.A. (2012). Multiple latent variable models: Confirmatory factor analysis. In <http://davidakenny.net/cm/mfactor.htm>.

Kim, 2007, Value-based adoption of mobile internet: An empirical investigation, Decision Support Systems, 43, 111, 10.1016/j.dss.2005.05.009

Kim, 2011, Cultural difference in motivations for using social network sites: A comparative study of American and Korean college students, Computers in Human Behavior, 27, 365, 10.1016/j.chb.2010.08.015

Kline, 1998

Korgaonkar, 1999, A multivariate analysis of Web usage, Journal of Advertising Research, 39, 53

Laufer, 1977, Privacy as a concept and a social issue: A multidimensional developmental theory, Journal of Social Issues, 33, 22, 10.1111/j.1540-4560.1977.tb01880.x

Lee, 2009, Factors influencing the adoption of internet banking: An integration of TAM and TPB with perceived risk and perceived benefit, Electronic Commerce Research and Applications, 8, 130, 10.1016/j.elerap.2008.11.006

Li, 2010, Understanding situational online information disclosure as a privacy calculus, Journal of Computer Information Systems, 51, 62

Lu, 2005, Personal innovativeness, social influences and adoption of wireless internet services via mobile technology, Journal of Strategic Information Systems, 14, 245, 10.1016/j.jsis.2005.07.003

Milne, 1993, Direct mail privacy-efficiency trade-offs within an implied social contract framework, Journal of Public Policy & Marketing, 12, 206, 10.1177/074391569101200206

Mueller, 1996

Nevitt, 2001, Performance of bootstrapping approaches to model test statistics and parameter standard error estimation in structural equation modeling, Structural Equation Modeling, 8, 353, 10.1207/S15328007SEM0803_2

Nunnaly, 1978

Papacharissi, 2000, Predictors of Internet usage, Journal of Broadcasting and Electronic Media, 44, 175, 10.1207/s15506878jobem4402_2

Park, 2009, Being immersed in social networking environment: Facebook groups, uses and gratifications, and social outcomes, CyberPsychology & Behavior, 12, 729, 10.1089/cpb.2009.0003

Park, 2013, Intensity of social network use by involvement: A study of young Chinese users, International Journal of Business and Management, 8, 22, 10.5539/ijbm.v8n6p22

Pavlou, 2006, Understanding and predicting electronic commerce adoption: An extension of the theory of planned behavior, MIS Quarterly, 30, 115, 10.2307/25148720

PewResearch (2013). Teens, social media, and privacy. In (Vol. 2014) <http://www.pewinternet.org/2013/05/21/teens-social-media-and-privacy/>.

Phelps, 2000, Privacy concerns and consumer willingness to provide personal information, Journal of Public Policy & Marketing, 27, 10.1509/jppm.19.1.27.16941

Rosenblum, D. (2007). What anyone can know: The privacy risks of social networking sites. In IEEE Security and Privacy (pp. 40–49).

Sheehan, 2000, Dimensions of privacy concern among online consumers, Journal of Public Policy & Marketing, 19, 62, 10.1509/jppm.19.1.62.16949

Smith, 1996, Information privacy: Measuring individuals’ concerns about organizational practices, MIS Quarterly, 167, 10.2307/249477

SoJump (2014). Professional survey site. In <http://www.sojump.com/>.

Stone, 1983, A field experiment comparing information-privacy values, beliefs, and attitudes across several types of organizations, Journal of Applied Psychology, 68, 459, 10.1037/0021-9010.68.3.459

Stutzman, 2011, Factors mediating disclosure in social network sites, Computers in Human Behavior, 27, 590, 10.1016/j.chb.2010.10.017

Šumak, 2011, A meta-analysis of e-learning technology acceptance: The role of user types and E-learning technology types, Computers in Human Behavior, 27, 2067, 10.1016/j.chb.2011.08.005

Torkzadeh, 2003, Confirmatory analysis of computer self-efficacy, Structural Equation Modeling, 10, 263, 10.1207/S15328007SEM1002_6

Tufekci, 2008, Can you see me now? Audience and disclosure regulation in online social network sites, Bulletin of Science, Technology & Society, 28, 20, 10.1177/0270467607311484

Venkatesh, 2000, A theoretical extension of the technology acceptance model: Four longitudinal field studies, Management Science, 46, 186, 10.1287/mnsc.46.2.186.11926

Vroom, 1964

Wright, 2006, Researching Internet-based populations: Advantages and disadvantages of online survey research, online questionnaire authoring software packages, and web survey services, Journal of Computer Mediated Communication, 10, 00, 10.1111/j.1083-6101.2005.tb00259.x

Zhang, 2000, Consumers’ responses to web-based data collection efforts and factors influencing the responses, Journal of International Marketing and Market Research, 25, 115