Exploring the Security of Information Sharing on Social Networking Sites: The Role of Perceived Control of Information
详细信息    查看全文
  • 作者:Nick Hajli ; Xiaolin Lin
  • 关键词:Perceived control ; Privacy risk ; Information sharing ; Social networking sites ; Gender difference
  • 刊名:Journal of Business Ethics
  • 出版年:2016
  • 出版时间:January 2016
  • 年:2016
  • 卷:133
  • 期:1
  • 页码:111-123
  • 全文大小:457 KB
  • 参考文献:Ahuja, M. K., & Thatcher, J. B. (2005). Moving beyond intentions and toward the theory of trying: Effects of work environment and gender on post-adoption information technology use. MIS Quarterly, 29, 427–459.
    Ajzen, I. (1991). The theory of planned behavior. Organizational Behavior and Human Decision Processes, 50, 179–211.CrossRef
    Ajzen, I. (2001). Nature and operation of attitudes. Annual Review of Psychology, 52, 27–58.CrossRef
    AJZEN, I. 2002. Attitudes. In R. Fernandez Ballesteros (Ed.), Encyclopedia of psychological assessment. London: Sage Publications, 1:110-115
    Arnold, V., Benford, T., Hampton, C., & Sutton, S. G. (2010). Competing pressures of risk and absorptive capacity potential on commitment and information sharing in global supply chains. European Journal of Information Systems, 19, 134–152.CrossRef
    Averill, J. R. (1973). Personal control over aversive stimuli and its relationship to stress. Psychological Bulletin, 80, 286.CrossRef
    Bandura, A. (1982). Self-efficacy mechanism in human agency. American Psychologist, 37, 122.CrossRef
    Bandura, A. (1997). Self-efficacy: The exercise of control. New York: Freeman.
    Barnes, SB. (2006). A privacy paradox: Social networking in the United States. First Monday, 11
    Baronas, A.-M. K., & Louis, M. R. (1988). Restoring a sense of control during implementation: how user involvement leads to system acceptance. Mis Quarterly, 12, 111–124.CrossRef
    Bélanger, F., & Crossler, R. E. (2011). Privacy in the digital age: a review of information privacy research in information systems. MIS Quarterly, 35, 1017–1042.
    Belanger, F., Hiller, J. S., & Smith, W. J. (2002). Trustworthiness in electronic commerce: The role of privacy, security, and site attributes. The Journal of Strategic Information Systems, 11, 245–270.CrossRef
    Berings, D., & Adriaenssens, S. (2012). The role of business ethics, personality, work values and gender in vocational interests from adolescents. Journal of Business Ethics, 106, 325–335.CrossRef
    Betz, M., O’Connell, L., & Shepard, J. M. (1989). Gender differences in proclivity for unethical behavior. Journal of Business Ethics, 8, 321–324.CrossRef
    Bugental, D., Blue, J., & Cruzcosa, M. (1989). Perceived control over caregiving outcomes: Implications for child abuse. Developmental Psychology, 25, 532–539.CrossRef
    Burger, J. M. (1989). Negative reactions to increases in perceived personal control. Journal of Personality and Social Psychology, 56, 246.CrossRef
    Chai, S., Das, S., & Rao, H. R. (2011). Factors affecting bloggers’ knowledge sharing: An investigation across gender. Journal of Management Information Systems, 28, 309–342.CrossRef
    Chiu, C.-M., Hsu, M.-H., & Wang, E. T. (2006). Understanding knowledge sharing in virtual communities: an integration of social capital and social cognitive theories. Decision Support Systems, 42, 1872–1888.CrossRef
    Connell, J. P. (1985). A new multidimensional measure of children’s perceptions of control. Child Development, 56, 1018–1041.CrossRef
    D’arcy, J., & Hovav, A. (2009). Does one size fit all? Examining the differential effects of IS security countermeasures. Journal of Business Ethics, 89, 59–71.CrossRef
    Davenport, T. H., & Pruzak, L. (2000). Working knowledge: How organizations manage what they know. New York: Harvard Business Press.
    Davidson, D. J., & Freudenburg, W. R. (1996). Gender and environmental risk concerns a review and analysis of available research. Environment and behavior, 28, 302–339.CrossRef
    Dinev, T., & Hart, P. (2006). An extended privacy calculus model for e-commerce transactions. Information Systems Research, 17, 61–80.CrossRef
    Dwyer, C., Hiltz, SR. & Passerini, K. Trust and privacy concern within social networking sites: A comparison of facebook and mySpace. AMCIS, 2007. p. 339
    Dwyer, P. D., Gilkeson, J. H., & List, J. A. (2002). Gender differences in revealed risk taking: evidence from mutual fund investors. Economics Letters, 76, 151–158.CrossRef
    Fishbein, M. (1963). An investigation of the relationship between beliefs about an object and the attitude toward that object. Human relations, 16, 233–240.CrossRef
    Fishbein, M., & AJZEN, I. (1975). Belief, attitude, intention and behavior: An introduction to theory and research
    Folkman, S. (1984). Personal control and stress and coping processes: A theoretical analysis. Journal of Personality and Social Psychology, 46, 839–852.CrossRef
    Fornell, C., & Larcker, D. F. (1981). Evaluating structural equation models with unobservable variables and measurement error. Journal of Marketing Research, 18, 39–50.CrossRef
    Garbarino, E., & Strahilevitz, M. (2004). Gender differences in the perceived risk of buying online and the effects of receiving a site recommendation. Journal of Business Research, 57, 768–775.CrossRef
    Govani, T., & Pashley, H. (2005). Student awareness of the privacy implications when using Facebook. Unpublished paper presented at the “Privacy Poster Fair” at the Carnegie Mellon University School of Library and Information Science, 9.
    Gustafsod, P. E. (1998). Gender differences in risk perception: Theoretical and methodological erspectives. Risk Analysis, 18, 805–811.CrossRef
    Hair, J. R. F., Black, W., Babin, B., Anderson, R., & Tatham, R. (2006). Multivariate data analysis. Upper Saddle River: Pearson.
    Hajli, M. N. (2014a). The role of social support on relationship quality and social commerce. Technological Forecasting and Social Change, 87, 17–27.CrossRef
    Hajli, N. (2014b). Developing online health communities through digital media. International Journal of Information Management, 34, 311–314.CrossRef
    Hajli, N. (2014c). A study of the impact of social media on consumers. International Journal of Market Research, 56, 95–113.CrossRef
    Hajli, N., Lin, X., Featherman, M., & Wang, Y. (2014). Social word of mouth: How trust develops in the market. International Journal of Market Research, 56, 1–30.CrossRef
    Harman, H. H. (1976). Modern factor analysis. Chicago: University of Chicago Press.
    Hoadley, C. M., Xu, H., Lee, J. J., & Rosson, M. B. (2010). Privacy as information access and illusory control: The case of the Facebook news feed privacy outcry. Electronic Commerce Research and Applications, 9, 50–60.CrossRef
    Hsu, M.-H., & Chiu, C.-M. (2004). Predicting electronic service continuance with a decomposed theory of planned behaviour. Behaviour & Information Technology, 23, 359–373.CrossRef
    Hsu, M.-H., Ju, T. L., Yen, C.-H., & Chang, C.-M. (2007). Knowledge sharing behavior in virtual communities: The relationship between trust, self-efficacy, and outcome expectations. International Journal of Human-Computer Studies, 65, 153–169.CrossRef
    Hsu, C.-L., & Lin, J. C.-C. (2008). Acceptance of blog usage: The roles of technology acceptance, social influence and knowledge sharing motivation. Information & Management, 45, 65–74.CrossRef
    Kamis, A., Koufaris, M., & Stern, T. (2008). Using an attribute-based decision support system for user-customized products online: An experimental investigation. MIS Quarterly, 32, 159–177.
    Keil, M., Tan, BC., Wei, K.-K., Saarinen, T., Tuunainen, V. & Wassenaar, A. (2000). A cross-cultural study on escalation of commitment behavior in software projects. Mis Quarterly, 299–325.
    Krasnova, H., Spiekermann, S., Koroleva, K., & Hildebrand, T. (2010). Online social networks: Why we disclose. Journal of Information Technology, 25, 109–125.CrossRef
    Langer, E. J. (1975). The illusion of control. Journal of Personality and Social Psychology, 32, 311.CrossRef
    Lee, J. (2012). Components of Medical Service Users’ Dissatisfaction: A Perceived Control Perspective. International Journal of Management and Marketing Research, 5, 53–63.
    Lee, J.-N., & Kim, Y.-G. (1999). Effect of partnership quality on IS outsourcing success: Conceptual framework and empirical validation. Journal of Management Information Systems, 15, 29–61.CrossRef
    Lin, X., Featherman, M., & Brooks, SL. (2013a). Factors affecting online consumer’s behavior: An investigation across gender. AMCIS 2013 Proceedings
    Lin, X., Li, Y., Califf, CB., & Featherman, M. Can social role theory explain gender differences in facebook usage? System sciences (HICSS), 2013 46th Hawaii International Conference on, 2013b. IEEE, 690–699
    Liu, Y., Gummadi, KP., Krishnamurthy, B., & Mislove, A. (2011). Analyzing facebook privacy settings: user expectations vs. reality. Proceedings of the 2011 ACM SIGCOMM Conference on Internet Measurement Conference, ACM, 61–70
    Malhotra, N. K., Kim, S. S., & Agarwal, J. (2004). Internet users’ information privacy concerns (IUIPC): the construct, the scale, and a causal model. Information Systems Research, 15, 336–355.CrossRef
    Miranda, S. M., & Saunders, C. S. (2003). The social construction of meaning: An alternative perspective on information sharing. Information Systems Research, 14, 87–106.CrossRef
    Pavlou, P. A., & Fygenson, M. (2006). Understanding and predicting electronic commerce adoption: An extension of the theory of planned behavior. Mis Quarterly, 30, 115–143.
    Pavlou, P. A., Liang, H., & Xue, Y. (2007). Understanding and mitigating uncertainty in online exchange relationships: A principal-agent perspective. MIS Quarterly, 31, 105–136.
    Perry, R. P., Hladkyj, S., Pekrun, R. H., & Pelletier, S. T. (2001). Academic control and action control in the achievement of college students: A longitudinal field study. Journal of Educational Psychology, 93, 776–789.CrossRef
    Powell, M., & Ansic, D. (1997). Gender differences in risk behaviour in financial decision-making: An experimental analysis. Journal of Economic Psychology, 18, 605–628.CrossRef
    Qureshi, I., & Compeau, D. (2009). Assessing between-group differences in information systems research: A comparison of covariance-and component-based SEM. MIS Quarterly, 33, 197–214.
    Roman, S. (2007). The ethics of online retailing: a scale development and validation from the consumers’ perspective. Journal of Business Ethics, 72, 131–148.CrossRef
    Rotter, J. (1966). Generalized expectancies for internal vs. external control of reinforcement. Psychological Monographs, 80, 1–28.CrossRef
    Schulz, R., & Heckhausen, J. (1996). A lifespan model of successful aging. American Psychologist, 51, 702–714.CrossRef
    Scott, B. G., & Weems, C. F. (2010). Patterns of actual and perceived control: are control profiles differentially related to internalizing and externalizing problems in youth? Anxiety, Stress, & Coping, 23, 515–528.CrossRef
    Seligman, M. E. (1975). Helplessness: On depression, development, and death. London: WH Freeman/Times Books/Henry Holt & Co.
    Skinner, E. A. (1996). A guide to constructs of control. Journal of Personality and Social Psychology, 71, 549.CrossRef
    Skinner, E., Chapman, M., & Baltes, P. (1988). Control, means-ends, and agency beliefs: A new conceptualization and its measurement during childhood. Journal of Personality and Social Psychology, 54, 113–117.CrossRef
    Specht, J., Schmukle, S. C., & Egloff, B. (2013). Everything Under Control? The Effects of Age, Gender, and Education on Trajectories of Perceived Control in a Nationally Representative German Sample. Developmental Psychology, 49, 353–364.CrossRef
    Thompson, S., Sobolew-Shubin, A., Galbraith, M., Schwankovsky, L., & Cruzen, D. (1993). Maintaining perceptions of control: Finding perceived control in low-control circumstances. Journal of Personality and Social Psychology, 64, 293–304.CrossRef
    van Slyke, C., Shim, J., Johnson, R., & Jiang, J. (2006). Concern for information privacy and online consumer purchasing. Journal of the Association for Information Systems, 7, 415–444.
    Venkatesh, V., & Morris, M. G. (2000). Why don’t men ever stop to ask for directions? Gender, social influence, and their role in technology acceptance and usage behavior. Mis Quarterly, 24, 115–139.CrossRef
    Venkatesh, V., Thong, J., & Xu, X. (2012). Consumer acceptance and use of information technology: Extending the unified theory of acceptance and use of technology. MIS Quarterly, 36, 157–178.
    Wallhagen, M. (1992). Perceived control and adaptation in elder caregivers: Development of an explanatory model. International Journal of Aging and Human Development, 36, 219–237.CrossRef
    Wallston, K. A., Wallston, K. A., & Devellis, R. (1978). Development of the multidimensional health locus of control scales. Health Education Monographs, 6, 161–170.
    Weisz, J. R., & Stipek, D. J. (1982). Competence, contingency, and the development of perceived control. Human Development, 25, 250–281.CrossRef
    Westin, A. F. (1968). Privacy and freedom. Washington and Lee Law Review, 25, 166.
    Xu, H., Dinev, T., Smith, H. J., & Hart, P. (2008). Examining the formation of individual’s privacy concerns: Toward an integrative view
    Xu, H. The Effects of Self-Construal and Perceived Control on Privacy Concerns. ICIS, 2007. Citeseer, 125
    Xu, H., & Teo, H.-H. (2004). Alleviating Consumers’ Privacy Concerns in Location-based Services: A Psychological Control Perspective. ICIS, 793–806
    Xu, H., Teo, H.-H., Tan, B. C., & Agarwal, R. (2012). Research note—effects of individual self-protection, industry self-regulation, and government regulation on privacy concerns: A study of location-based services. Information Systems Research, 23, 1342–1363.CrossRef
    Acquisti, A., & Gross, R. (2006) Imagined communities: Awareness, information sharing, and privacy on the Facebook. Privacy Enhancing Technologies, Springer, 36–58
    Yin, G., & Cheng, X. (2011). & ZHU, L. A Theoretical Model and Empirical Study of the Chinese Context: Understanding continuance usage of social networking services.
    Zhang, K. Z., Lee, M. K., Cheung, C. M., & Chen, H. (2009). Understanding the role of gender in bloggers’ switching behavior. Decision Support Systems, 47, 540–546.CrossRef
  • 作者单位:Nick Hajli (1)
    Xiaolin Lin (2)

    1. Newcastle University Business School, 5 Barrack Road, Newcastle upon Tyne, NE1 4SE, UK
    2. Department of Management, Information Systems, and Entrepreneurship (MISE), College of Business, Washington State University, Todd Hall 442, Pullman, WA, 99164-4743, USA
  • 刊物类别:Humanities, Social Sciences and Law
  • 刊物主题:Philosophy
    Ethics
    Economic Growth
    Management
    Quality of Life Research
  • 出版者:Springer Netherlands
  • ISSN:1573-0697
文摘
Social networking sites (SNS) have challenged ethical issues about users’ information security and privacy. SNS users are concerned about their privacy and need to control the information they share and its use. This paper examines the security of SNS by taking a look at the influence of users’ perceived control of information over their information-sharing behaviors. Employing an empirical study, this paper demonstrates the importance of perceived control in SNS users’ information-sharing behaviors. Specifically, perceived control has been found to be negatively related to perceived privacy risk and attitude toward information sharing, which in turn has an impact on their information-sharing behaviors. In addition, gender has been shown to be an important factor that moderates the influences of both perceived control and perceived privacy risk on SNS users’ attitudes toward information sharing. Theoretical and practical implications are discussed.

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700