情报研究

动机视角下社交媒体网络用户链接行为的实证分析

  • 孙建军 ,
  • 顾东晓
展开
  • 1. 南京大学信息管理学院;
    2. 合肥工业大学管理学院
孙建军,南京大学信息管理学院教授,院长,博士生导师。

收稿日期: 2014-01-10

  修回日期: 2014-02-03

  网络出版日期: 2014-02-20

基金资助

本文系国家自然科学基金面上项目“融合范式视角下的链接分析理论集成框架及其实证研究”(项目编号:71273125)和中国博士后科学基金第54批面上项目“基于多案例库协同的老年人健康案例推理评估研究”(项目编号:2013M541651)研究成果之一。

An Empirical Analysis on User Link Behaviors of Social Networks

  • Sun Jianjun ,
  • Gu Dongxiao
Expand
  • 1. School of Information Management, Nanjing University, Nanjing 210093;
    2. School of Management, Hefei University of Technology, Hefei 230009

Received date: 2014-01-10

  Revised date: 2014-02-03

  Online published: 2014-02-20

摘要

基于需求层次理论、沉浸理论和理性行为理论,从动机视角探索中国特定社交网络环境下用户网络链接的内外部动机因素,构建“动机—链接意向—链接行为”模型,并基于460条现实世界数据进行实证研究。结果表明,自我实现需要、沉浸需要、主观规范对社交网络用户链接行为意向的影响较为显著,而自尊需要和社交需要对其的影响则不显著。外部动机中的主观规范对社交网络链接行为意向影响最大,但总体上内部动机的影响大于外部动机。该研究结论对于基于微博等社交媒体的学术推广和网络营销优化均具有重要价值。

本文引用格式

孙建军 , 顾东晓 . 动机视角下社交媒体网络用户链接行为的实证分析[J]. 图书情报工作, 2014 , 58(04) : 71 -78 . DOI: 10.13266/j.issn.0252-3116.2014.04.012

Abstract

Drawing on the hierarchy of needs, flow theory and theory of rational behavior, from the perspective of motivation and the special social user network environment in China, this study investigates internal and external motivation factors of network links behavior and constructs the "motivation-links intention-behavior" model.An empirical study is carried out based on 460 records of real world data.Results indicate that self-actualization needs, immersed needs and subjective norm all have significant positive impact on continuing use intention of network links users, but the impact from self-esteem needs and social needs are not very significant.Subjective norm is the most important impact, whereas the general impact from internal motivations is still bigger than that from external ones.This conclusion has important value for Weibo marketing and other academic promotion and cyber marketing via social media.

参考文献

[1] Ratkiewicz J, Flammini A, Menczer F.Traffic in social media I: Paths through information networks[C]//IEEE International Conference on Social Computing, 2010:452-458.
[2] Kretschmer H.Author productivity and geodesic distance in bibliographic co-authorship networks and visibility on the Web[J].Scientometrics, 2004, 60(3):409-420.
[3] Wilkinson D, Thelwall M, Li Xuemei.Exploiting hyperlinks to study academic Web use[J].Social Science Computer Review, 2003, 21(3):340-351.
[4] Cothey V.A longitudinal study of World Wide Web users' information searching behavior[J].Journal of the American Society for Information Science and Technology, 2002, 53(2):67-78.
[5] Thelwall M, Vaughan L, Bjrneborn L.Webometrics[J].Annual Review of Information Science and Technology, 2005, 39: 81-135.
[6] Wilkinson D, Harries G, Thelwall M, et al.Motivations for academic Web site interlinking: Evidence for the Web as a novel source of information on informal scholarly communication[J].Journal of Information Science, 2003, 29(1): 59-66.
[7] Kim H J.Motivations for hyperlinking in scholarly electronic articles: A qualitative study[J].Journal of the American Society for Information Science, 2000, 51(10): 887-899.
[8] 张红霞, 谢毅.动机过程对青少年网络游戏行为意向的影响模型[J].心理学报, 2008, 40(12): 1275-1286.
[9] Csikszentmihalyi M.Beyond boredom and anxiety[M].San Francisco:Jossey-Bass, 1975.
[10] Webster J, Trevino L K, Ryan L.The dimensionality and correlates of flow in human-computer interactions[J], Computers in Human Behavior, 1993, 9(4): 411-426.
[11] Ghani J A, Deshpande S P.Task characteristics and the experience of optimal flow in human[J].Computer Interaction, 1994, 128(4): 381-391.
[12] Novak T P, Hoffman D L, Yung Y F.Measuring the customer experience in online environments: A structural modeling approach[J].Marketing Science, 2000, 19 (1): 22-42.
[13] 王莉, 方澜, 顾峰.客户网上参与产品开发的动机研究[J].研究与发展管理, 2007, 19(6):17-23.
[14] Bock G W, Zmud R W, Kim Y G, et al.Behavioral intention formation in knowledge sharing: Examining the roles of extrinsic motivators, social-psychological forces, and organizational climate[J].MIS Quarterly, 2005, 29(1): 87-111.
[15] Anderson J R, Corbett A T, Koedinger K R, et al.Cognitive tutors: Lessons learned[J].Journal of the Learning Sciences, 1995, 4(2): 167-207.
[16] Remedios F.Fuller's project of humanity: Social sciences orsociobiology?[J].History of the Human Sciences, 2009, 22(2):115-120.
[17] Cyr D, Head M, Larios H, et al.Exploring human images in website design: A multi-method approach[J], MIS Quarterly, 2009, 33(3): 539-566.
[18] Pavlou P, Liang Xue.Understanding and mitigating uncertainty in online exchange relationships: A principal-agent perspective[J].MIS Quarterly, 2007, 31(1):105-136.
[19] Dawson S.Four motivations for charitable giving: Implications for marketing strategy to attract monetary donations for medical research[J].Journal of Health Care Marketing, 1988, 8(2):31-37.
[20] Webster J, Trevino K L, Ryan L.The dimensionality and correlates of flow in human computer interactions[J].Computers in Human Behavior, 1993, 9(4): 411-426.
[21] Grove J R, Lewis A M E.Hypnotic susceptibility and the attainmentof flow like states during exercise[J].Journal of Sport and Exercise Psychology, 1996, 18 (4): 380-391.
[22] Mathwick C, Rigdon E.Play, flow, and the video search experience[J].Journal of Consumer Research, 2004, 31 (2): 324-332.
[23] Ajzen I, Fishbein M.Understanding attitudes and predicting social behavior[M].Englewood Cliffs: Prentice Hall, 1980:38-78.
[24] Kleijnen M, Wetzels M, de Ruyter K.Consumer acceptance of wireless finance[J].Journal of Financial Services Marketing, 2004, 8(3): 206-217.
[25] Louis W, Davies S, Smith J, et al.Pizza and pop and student identity: The role of referent group norms in healthy and unhealthy eating[J].The Journal of Social Psychology, 2007, 147(1): 57-74.
[26] Bennett R.Impulsive donation decisions during online browsing of charity Websites[J].Journal of Consumer Behavior, 2009(8): 116-134.
[27] Srite M, Karahanna E.The role of espoused national cultural values in technology acceptance[J].MIS Quarterly, 2006, 30(3): 679-704.
[28] Hsieh J J, Rai A, Keil M.Understanding digital inequality: Comparing continued use behavioral models of the socio-economically advantaged and disadvantaged[J].MIS Quarterly, 2008, 32(1):97-126.
[29] Maslow A H.Motivation and personality[M]//New York:Harper & Bros, 1954.
[30] Nambisan S.Designing virtual customer environments for new product development: Toward a theory[J].Academy of Management Review, 2002, 27(3):392-413.
[31] Rossi M A.Decoding the "Free/Open Source (F/OSS) Software Puzzle" a survey of theoretical and empirical contributions[J].Quaderni, 2004, 1(424).
[32] Giovanni B M.The flow of model of intrinsic motivations in Chinese: Culture and personal moderators[J].Journal of Happiness Studies, 2004, 5(2): 181-217.
[33] Abrahamse W, Steg L, Gifford R, et al.Factors influencing car use for commuting and the intention to reduce it: A question of self-interest or morality?[J].Transportation Research(Part F), 2009, 12(4): 317-324.
[34] Taylor S, Todd P A.Understanding information technology usage:A test of competing models[J].Information Systems Research, 1995, 6(4):144-176.
[35] Davis F D, Bagozzi R P, Warshaw P R.User acceptance of computer technology: A comparison of two theoretical models[J].Management Science, 1989, 35(8): 982-1003.
[36] Tamara D, Hu Q.The centrality of awareness in the formation of user behavioral intention toward protective information technologies[J].Journal of the Association for Information Systems, 2007, 8(7): 386-407.
[37] Rodell J B.Antecedents and consequences of employee volunteerism, doctoral dissertation, University of Florida, 2010.
[38] Agarwal R.Assessing a firm's Web presence[J].Information Systems Research, 2002, 13(2):168-186.
[39] Nunnally J C.Psychometric theory[M].New York: McGraw Hill, 1978.
[40] Carmines E G, Zeller R A.Reliability and validity assessment[M].Newbury Park: Sage Publications, 1979.
[41] Fornell C, Larcker D F.Evaluating structural equation models with unobservable variables and measurement error[J].Journal of Marketing Research, 1981, 18(1):39-50.
[42] Hair J F, Anderson R E, Tatham R L, et al.Multivariate data analysis.New York: Prentice Hall, 1998.
[43] Johnston A C, Warkentin M.Fear appeals and information security behaviors: An empirical study[J].MIS Quarterly, 2010, 34(3):549-566.
[44] Bhattacherjee A, Premkumar G.Changes in belief and attitudetoward IT usage[J]. MIS Quarterly, 2004, 28(2): 229-254.
[45] Choudhury V, Karahanna E.The relative advantage of electronic channels: A multidimensional view[J].MIS Quarterly, 2008, 32(1): 179-200.

文章导航

/