Study of Influence Factors of Mobile Social Network Privacy Security on Usage Intention

  • Wang Xiwei ,
  • Li Jiaxing ,
  • Yang Mengqing ,
  • Zhao Dan
Expand
  • School of Management, Jilin University, Changchun 130022

Received date: 2016-06-08

  Revised date: 2016-07-24

  Online published: 2016-08-05

Abstract

[Purpose/significance] With the increase of users and development of functions of mobile social software, users' privacy issue in the process of use gains more attention. The study of influence factors of mobile social software privacy security on the usage intention will improve the function of service provider' social software and promote the oversight of industry sector on privacy security.[Method/process] This paper establishes the influence factor model of privacy security of mobile social software based on the information ecology perspective. Then it tests the applicability of the model with the empirical research method of structural equation.[Result/conclusion] The data results show that the security of information content is the most key factor to influence users to use mobile social software, then followed that the information quality and information environment have the positive effect on users' attitude to use. The mobile social software technology also has a positive influence on usage intention, but the information technology's influence is not obvious.

Cite this article

Wang Xiwei , Li Jiaxing , Yang Mengqing , Zhao Dan . Study of Influence Factors of Mobile Social Network Privacy Security on Usage Intention[J]. Library and Information Service, 2016 , 60(15) : 21 -27 . DOI: 10.13266/j.issn.0252-3116.2016.15.003

References

[1] KISEKKA V,SEN S,RAO H.Extent of private information disclosure on online social networks:an exploration of Facebook mobile phone users[J].Computers in human behavior,2013,29(11):2722-2729.
[2] CALLANAN C,BLA?I? B J,BLA?I? A J.User awareness and tolerance of privacy abuse on mobile Internet:an exploratory study[J].Telematics and informatics,2016,33(2):109-128.
[3] ELHAIA J,HALL B.Anxiety about internet hacking:results from a community sample[J].Computers in human behavior,2016,54(1):180-185.
[4] 李晶,胡瑞.移动图书馆用户使用意愿的影响因素研究——信息安全感知的视角[J].图书与情报,2014(4):99-105.
[5] 毛剑,李坤,徐先栋.云计算环境下隐私保护方案[J].清华大学学报,2011(10):1357-1362.
[6] 刘建伟,李为宇,孙钰.社交网络安全问题及解决方案[J].中国科学技术大学学报,2011(7):565-575.
[7] 李林容.社交网络的特性及其发展趋势[J].新闻界,2010(5):32-35.
[8] 百度百科.隐私词义解释[EB/OL].[2016-06-27].http://baike.baidu.com/subview/350273/6063252.htm.
[9] 邱均平,李艳红.社交网络中用户安全隐私问题探究[J].情报资料工作,2012(6):34-36.
[10] 王晰巍,李嘉兴,郭宇,等.移动网络团购APP信息采纳行为影响因素研究[J].图书情报工作,2015,59(7):31-35.
[11] PIETRO L D,MUGION R,MATTIA G,et al.The integrated model on mobile payment acceptance (IMMPA):an empirical application to public transport[J].Transportation research part C:emerging technologies,2015,56(7):463-479.
[12] NASRI W,CHARFEDDINE L.Factors affecting the adoption of Internet banking in Tunisia:an integration theory of acceptance model and theory of planned behavior[J].The journal of high technology management research,2012,23(1):1-14.
[13] 明均仁.基于TAM模型的移动图书馆用户接受研究[J].图书馆建设,2013(11):45-50.
[14] LIEN C H,CAO Y.Examining WeChat users' motivations,trust,attitudes,and positive word-of-mouth:evidence from China[J].Computers in human behavior,2014,41(12):104-111.
[15] HUNG S Y,TSAI J A,CHOU S.Decomposing perceived playfulness:a contextual examination of two social networking sites[J].Information&management,2016,50(3).DOI:10.1016/;.im.2016.02.005.
[16] SEDRAKYAN G,WEERDT J D,SNOECK M.Process-mining enabled feedback: "Tell me what I did wrong" vs. "tell me how to do it right"[J].Computers in human behavior,2016,57(4):352-376.
[17] CHEN J,YEN D,KUO W R,et al.The antecedents of purchase and re-purchase intentions of online auction consumers[J].Computers in human behavior,2016,54(1):186-196.
[18] SAFA N S,SOLMS R V,FURNELL S.Information security policy compliance model in organizations[J].Computers&security,2016,56(2):70-82.
[19] CHANG S E,SHEN W C,LIU A Y.Why mobile users trust smart phone social networking services? A PLS-SEM approach[J].Journal of business research,2016,48(4):201-218.
[20] JAFARKARIMI H,SAADATDOOST R,SIM A T H,et al.Behavioral intention in social networking sites ethical dilemmas:an extended model based on theory of planned behavior[J].Computers in human behavior,2016,62(9):545-561.
[21] SIPONEN M,MAHMOOD M A,PAHNILA S.Employees'adherence to information security policies:an exploratory field study[J].Information&management,2014,51(3):217-224.
[22] VOŠNER H B,BOBEK S,KOKOl P,et al.Attitudes of active older Internet users towards online social networking[J].Computers in human behavior,2016,55(2):230-241.
[23] HUJRAN O A,DEBEI M A,CHATFIELD A,et al.The imperative of influencing citizen attitude toward e-government adoption and use[J].Computers in human behavior,2015,53(12):189-203.
[24] 速途研究院.2014年移动社交市场分析报告[EB/OL].[2015-01-23].http://www.sootoo.com/content/547537.shtml.
[25] GHASEMAGHAEI M,HASSANEIN K.A macro model of online information quality perceptions:a review and synthesis of the literature[J].Computers in human behavior,2016,55(2):976-991.
[26] ALHOGAIL A J.Design and validation of information security culture framework[J].Computers in human behavior,2015,49(8):567-575.
[27] MÄKITALO K,WEINBERGER A,HÄKKINEN P,et al.Epistemic cooperation scripts in online learning environments:fostering learning by reducing uncertainty in discourse[J].Computers in human behavior,2005,21(7):603-622.
[28] CHOI Y K,TOTTEN J W.Self-construal's role in mobile TV acceptance:extension of TAM across cultures[J].Journal of business research,2012,65(11):1525-1533.

Outlines

/