Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
article

The effects of trust, security and privacy in social networking: A security-based approach to understand the pattern of adoption

Published: 01 September 2010 Publication History

Abstract

Social network services (SNS) focus on building online communities of people who share interests and/or activities, or who are interested in exploring the interests and activities of others. This study examines security, trust, and privacy concerns with regard to social networking Websites among consumers using both reliable scales and measures. It proposes an SNS acceptance model by integrating cognitive as well as affective attitudes as primary influencing factors, which are driven by underlying beliefs, perceived security, perceived privacy, trust, attitude, and intention. Results from a survey of SNS users validate that the proposed theoretical model explains and predicts user acceptance of SNS substantially well. The model shows excellent measurement properties and establishes perceived privacy and perceived security of SNS as distinct constructs. The finding also reveals that perceived security moderates the effect of perceived privacy on trust. Based on the results of this study, practical implications for marketing strategies in SNS markets and theoretical implications are recommended accordingly.

References

[1]
Imagined communities: awareness, information sharing, and privacy on the Facebook. In: Golle, P., Danezis, G. (Eds.), Proceedings of 6th Workshop on Privacy Enhancing Technologies, Robinson College, Cambridge, UK. pp. 36-58.
[2]
Understanding Attitudes and Predicting Social Behavior. Prentice Hall, Englewood Cliffs, NJ.
[3]
Assessing construct validity in organizational research. Administrative Science Quarterly. v36 i3. 421-458.
[4]
On the evaluation of structural equation models. Journal of the Academy of Marketing Science. v16. 74-94.
[5]
Older adolescents' motivations for social network site use. CyberPsychology and Behavior. v10 i3. 478-481.
[6]
A privacy paradox: social networking in the US. First Monday. v11 i9.
[7]
Always On: Language in an Online and Mobile World. Oxford University Press, Oxford, New York.
[8]
Comparative fit indices in structural models. Psychological Bulletin. v107. 238-246.
[9]
Facebook's privacy trainwreck: exposure, invasion, and social convergence. Convergence. v14 i1. 13-20.
[10]
Facebook's privacy trainwreck. Convergence. v14 i1. 13-20.
[11]
Social network sites: definition, history, and scholarship. Journal of Computer-Mediated Communication. v13 i1.
[12]
Brocke, J., Richter, D., Riemer, K., 2009. Motives for using social network sites: an analysis of SNS adoption among students. In: BLED 2009 Proceedings, Paper 40. <http://aisel.aisnet.org/bled2009/40> (accessed 14.02.09).
[13]
Development of measures of online privacy concern and protection for use on the internet. Journal of the American Society for Information Science and Technology. v58 i2. 157-165.
[14]
Public discourse, community concerns, and civic engagement: exploring black social networking traditions on BlackPlanet.com. Journal of Computer-Mediated Communication. v13 i1.
[15]
A critical review of online purchase behavior: empirical research. Journal of E-Commerce in Organizations. v3 i4. 1-19.
[16]
Online social networks: why do we use Facebook?. Communications in Computer and Information Science. v19. 67-74.
[17]
Consumer trust in Internet shopping in Ireland: towards the development of a more effective trust measurement instrument. Journal of Information Technology. v22. 102-118.
[18]
Building trust in virtual teams. IEEE Transactions on Professional Communication. v47 i2. 95-104.
[19]
Research Design: Qualitative, Quantitative, and Mixed Methods Approaches. second ed. Sage Publications, Thousand Oaks, CA.
[20]
Information privacy concerns, procedural fairness, and impersonal trust: an empirical investigation. Organization Science. v10 i1. 104-115.
[21]
Perceived usefulness, perceived ease of use, and user acceptance of information technology. MIS Quarterly. v13 i3. 319-340.
[22]
Mobile payment adoption in the US. Journal of Information Privacy and Security. v1 i2. 4-28.
[23]
Signals in social supernets. Journal of Computer-Mediated Communication. v13 i1. 231-251.
[24]
Dwyer, C., 2007. Digital relationships in the MySpace generation: results from a qualitative study. In: Proceedings of the 40th Hawaii International Conference on System Sciences (HICSS), Hawaii, 2007.
[25]
Dwyer, C., Hiltz, S., Passerini, K., 2007. Trust and privacy concern within social networking sites: a comparison of Facebook and MySpace. In: Proceedings of the Thirteenth Americas Conference on Information Systems, Keystone, Colorado, August 9-12 2007.
[26]
The benefits of Facebook friends: social capital and college students' use of online social network sites. Journal of Computer-Mediated Communication. v12 i3.
[27]
A structural model of end user computing satisfaction and user performance. Information and Management. v30 i2. 65-73.
[28]
Consumer trust, perceived security and privacy policy: three basic elements of loyalty to a web site. Industrial Management and Data Systems. v106 i5. 601-620.
[29]
Internet social network communities: risk taking, trust, and privacy concerns. Computers in Human Behavior. v25. 153-160.
[30]
Evaluating structural equation models with unobservable variables and measurement error. Journal of Marketing Research. v18. 39-50.
[31]
Gambi, S., 2009. The development of trust within close relationships formed within social network sites. In: Proceedings of the WebSci'09: Society On-Line, Athens, Greece, March 18-20 2009.
[32]
Web merchants' privacy and security statements: how reassuring are they for consumers? A two-sided approach. Journal of Electronic Commerce Research. v5 i3. 181-198.
[33]
Consumer trust in B2C e-commerce and the importance of social presence: experiments in e-Products and e-Services. Omega. v32 i6. 407-424.
[34]
Multivariate Data Analysis. fifth ed. Prentice Hall, Englewood Cliffs, NJ.
[35]
Whose space? Differences among users and non-users of social network sites. Journal of Computer-Mediated Communication. v13 i1.
[36]
Manipulating social presence through the web interface and its impact on consumer attitude towards online shopping. International Journal of Human-Computer Studies. v64 i12. 1230-1242.
[37]
Building consumer trust online. Communications of the ACM. v42 i4. 80-85.
[38]
Social phishing. Communications of the ACM. v50 i10. 94-100.
[39]
Communication and trust in global virtual teams. Journal of Computer-Mediated Communication. v3 i4.
[40]
Consumer trust in an Internet store. Information Technology and Management. v1. 45-71.
[41]
Looking at, looking up or keeping up with people? Motives and use of Facebook. In: Proc. CHI 2008, ACM Press. pp. 1027-1036.
[42]
LISREL 8: Users reference guide. Scientific Software International, Chicago.
[43]
Applying the technology acceptance model and flow theory to Cyworld user behavior. CyberPsychology and Behavior. v11 i3. 378-382.
[44]
Cying for me, Cying for us: relational dialectics in a Korean social network site. Journal of Computer-Mediated Communication. v13 i1.
[45]
Revisiting the role of web assurance seals in business-to-consumer electronic commerce. Decision Support Systems. v44 i4. 1000-1015.
[46]
Linck, K., Pousttchi, K., Wiedemann, D.G., 2006. Security issues in mobile payment from the customer viewpoint. In: Proceedings of the 14th European Conference on Information Systems (ECIS 2006), Gothenburg, Sweden.
[47]
Beyond concern: a privacy-trust-behavioral intention model of electronic commerce. Information and Management. v41 i2. 289-304.
[48]
Maheswaran, M., Tang, H.C., Ghunaim, A., 2007. Towards a gravity-based trust model for social networking systems. In: 27th International Conference on Distributed Computing Systems Workshops, June, 2007, pp. 24-34.
[49]
Developing and validating trust measures for e-commerce: an integrative typology. Information Systems Research. v13 i3. 334-359.
[50]
Privacy, trust, and disclosure: exploring barriers to electronic commerce. Journal of Computer-Mediated Communication. v9 i4.
[51]
Consumer perceptions of privacy and security risks for online shopping. The Journal of Consumer Affairs. v35 i1. 27-44.
[52]
Structural equation modeling of factors that influence consumer internet purchase intentions of services. Journal of Services Research. v5 i1. 43-59.
[53]
The role of intermediaries in the development of trust on the WWW. Journal of Computer-Mediated Communication. v5 i3.
[54]
Applying virtual reality for trust-building e-commerce environments. Virtual Reality. v11 i2. 107-127.
[55]
Building effective online marketplaces with institution-based trust. Information Systems Research. v15 i1. 37-59.
[56]
Trust and the unintended effects of behavior control in virtual teams. MIS Quarterly. v27 i3. 365-395.
[57]
Pousttchi, K., 2003. Conditions for acceptance and usage of mobile payment procedures. In: Proceedings of the International Conference on Mobile Business, Vienna, Austria, pp. 201-210.
[58]
The importance of perceived trust, security and privacy in online trading systems. Information Management and Computer Security. v17 i2. 96-113.
[59]
Rosen, P., Sherman, P., 2006. Hedonic information systems: acceptance of social networking websites. In: Americas Conference on Information Systems, AMCIS 2006 Proceedings, pp. 1218-1223.
[60]
Multi-channel consumer perceptions. Journal of Electronic Commerce Research. v8 i1. 18-31.
[61]
The effects of trust and enjoyment on intention to play online games. Journal of Electronic Commerce Research. v8 i2. 128-140.
[62]
Perceived security determinants in e-commerce among Turkish University students. Behaviour and Information Technology. v24 i4. 259-274.

Cited By

View all
  • (2024)Assessing Continuance Intention to Use Digital WalletJournal of Global Information Management10.4018/JGIM.36112032:1(1-29)Online publication date: 13-Dec-2024
  • (2024)Uncovering the Neural Processes of PrivacyInformation Systems Research10.1287/isre.2021.055035:2(727-746)Online publication date: 1-Jun-2024
  • (2024)How do people make decisions in disclosing personal information in tourism group recommendations in competitive versus cooperative conditions?User Modeling and User-Adapted Interaction10.1007/s11257-023-09375-w34:3(549-581)Online publication date: 1-Jul-2024
  • Show More Cited By
  1. The effects of trust, security and privacy in social networking: A security-based approach to understand the pattern of adoption

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image Interacting with Computers
    Interacting with Computers  Volume 22, Issue 5
    September, 2010
    127 pages
    ISSN:0953-5438
    EISSN:1873-7951
    Issue’s Table of Contents

    Publisher

    Elsevier Science Inc.

    United States

    Publication History

    Published: 01 September 2010

    Author Tags

    1. Perceived privacy
    2. Perceived security
    3. Social network services
    4. Trust
    5. Web2.0

    Qualifiers

    • Article

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)0
    • Downloads (Last 6 weeks)0
    Reflects downloads up to 09 Feb 2025

    Other Metrics

    Citations

    Cited By

    View all
    • (2024)Assessing Continuance Intention to Use Digital WalletJournal of Global Information Management10.4018/JGIM.36112032:1(1-29)Online publication date: 13-Dec-2024
    • (2024)Uncovering the Neural Processes of PrivacyInformation Systems Research10.1287/isre.2021.055035:2(727-746)Online publication date: 1-Jun-2024
    • (2024)How do people make decisions in disclosing personal information in tourism group recommendations in competitive versus cooperative conditions?User Modeling and User-Adapted Interaction10.1007/s11257-023-09375-w34:3(549-581)Online publication date: 1-Jul-2024
    • (2024)What makes consumers trust and adopt fintech? An empirical investigation in ChinaElectronic Commerce Research10.1007/s10660-021-09527-324:1(3-35)Online publication date: 1-Mar-2024
    • (2023)Are People Addicted to Social Networks?Journal of Global Information Management10.4018/JGIM.32277831:1(1-23)Online publication date: 5-May-2023
    • (2023)Are Perceptions About Government and Social Media Providers Related to Protection Motivation Online?International Journal of Cyber Behavior, Psychology and Learning10.4018/IJCBPL.32408513:1(1-19)Online publication date: 8-Jun-2023
    • (2023)A privacy preservation data collection and access control using entropy-based conic curveJournal of Intelligent & Fuzzy Systems: Applications in Engineering and Technology10.3233/JIFS-22314144:5(7629-7642)Online publication date: 1-Jan-2023
    • (2023)Embodying algorithms, enactive artificial intelligence and the extended cognitionJournal of Information Science10.1177/016555152098549549:1(18-31)Online publication date: 1-Feb-2023
    • (2023)Understanding user misrepresentation behavior on social appsDecision Support Systems10.1016/j.dss.2022.113881165:COnline publication date: 1-Feb-2023
    • (2023)Unveiling the Golden Thread: Unmasking the Power of Blockchain for Sustainable ConsumptionNew Sustainable Horizons in Artificial Intelligence and Digital Solutions10.1007/978-3-031-50040-4_20(265-276)Online publication date: 9-Nov-2023
    • Show More Cited By

    View Options

    View options

    Figures

    Tables

    Media

    Share

    Share

    Share this Publication link

    Share on social media