Investigation of Determinants of Social Media User Privacy Paradoxical Behavior

  • Xie Xingzheng ,
  • Tsai Niannchung ,
  • Huang Zhiming ,
  • Wei Wu
Expand
  • 1. School of Management, Fujian University of Technology, Fuzhou 350118;
    2. College of Journalism and Communications, Shih Hsin University, Taipei 116;
    3. School of Humanities, Fujian University of Technology, Fuzhou 350118

Received date: 2018-03-08

  Revised date: 2018-06-05

  Online published: 2018-09-20

Abstract

[Purpose/significance]The personal privacy is frequently leaked by social media, which causes users to concern about the individual information, which further boost the shape of privacy paradoxical behavior. Hence,the topic of determinants for privacy paradoxical behavior is valuable in academic field.[Method/process]Based on the regulatory focus theoryandregulatory fit theory,it conducts the research framework including perceived secondary control, privacy violation experience, collectivism, trust, and privacy concern.The online survey is used to collect data.[Result/conclusion]By analyzing 394 samples, this study finds the perceived secondary control and collectivism cultural orientation are the positive factors of social media trust, which could further affect the social media engagement behaviors. Also, the privacy violation experience would drive the individual privacy concern, which promotes the individual privacy protection behaviors.

Cite this article

Xie Xingzheng , Tsai Niannchung , Huang Zhiming , Wei Wu . Investigation of Determinants of Social Media User Privacy Paradoxical Behavior[J]. Library and Information Service, 2018 , 62(18) : 55 -63 . DOI: 10.13266/j.issn.0252-3116.2018.18.006

References

[1] 微博. 2017微博用户发展报告[EB/OL].[2018-02-10].http://www.chinaz.com/news/2017/1226/841664.shtml.
[2] 腾讯. 2017年微信数据报告[EB/OL].[2018-02-10].https://www.sohu.com/a/203437993_667510.
[3] BARNES S B. A privacy paradox:social networking in the United States[EB/OL].[2018-02-20].http://firstmonday.org/article/view/1394/1312#author.
[4] DIENLIN T, TREPTE S. Is the privacy paradox a relic of the past? an in-depth analysis of privacy attitudes and privacy behaviors[J]. European journal of social psychology, 2015, 45(3):285-297.
[5] TSAI J Y, EGELMAN S, CRANOR L, et al. The effect of online privacy information on purchasing behavior:an experimental study[J]. Information systems research, 2011, 22(2):254-268.
[6] MOSTELLER J, PODDAR A. To share and protect:using regulatory focus theory to examine the privacy paradox of consumers' social media engagement and online privacy protection behaviors[J]. Journal of interactive marketing, 2017, 39(1):27-38.
[7] 管家娃, 张玥, 朱庆华,等. 国外社交网站隐私悖论问题研究综述与国内研究建议[J]. 图书情报工作, 2016,60(22):126-134.
[8] 张玥, 朱庆华. 国外信息隐私研究述评[J]. 图书情报工作,2014,58(13):140-148.
[9] 薛可, 何佳, 余明阳. 社会化媒体中隐私悖论的影响因素研究[J]. 当代传播(汉文版), 2016(1):34-38.
[10] HIGGINS E T. Beyond pleasure and pain[J]. American psychologist, 1997, 52(12):1280-1300.
[11] HIGGINS E T. Making a good decision:value from fit[J]. American psychologist, 2000, 55(11):1217-1230.
[12] SMITH H J, DINEV T, XU H. Information privacy research:an interdisciplinary review[J]. MIS quarterly, 2011, 35(4):989-1016.
[13] MOURALI M, BÖCKENHOLT U, LAROCHE M. Compromise and attraction effects under prevention and promotion motivations[J]. Journal of consumer research, 2007, 34(2):234-247.
[14] BRODIE R J, ILIC A, JURIC B, et al. Consumer engagement in a virtual brand community:an exploratory analysis[J]. Journal of business research, 2013, 66(1):105-114.
[15] DOORN J V, LEMON K N, MITTAL V, et al. Customer engagement behavior:theoretical foundations and research directions[J]. Social science electronic publishing, 2010, 13(3):253-266.
[16] 张晓娟, 李贞贞. 基于社会认知理论的智能手机用户信息安全行为意愿研究[J]. 现代情报, 2017, 37(9):16-22.
[17] STEWART K A, SEGARS A H. An empirical examination of the concern for information privacy instrument[J]. Information systems research, 2002, 13(1):36-49.
[18] TAYLOR D G, LEWIN J E, STRUTTON D. Friends, fans, and followers:do ads work on social networks?:how gender and age shape receptivity[J]. Journal of advertising research, 2011, 51(1):258-275.
[19] SHEEHAN K B, HOY M G. Flaming, complaining, abstaining:how online users respond to privacy concerns[J]. Journal of advertising, 1999, 28(3):37-51.
[20] COOK K S, EMERSON R M. Power, equity and commitment in exchange networks[J]. American sociological review, 1978,43(5):721-739.
[21] ROTHBAUM F, WWEISZ J R, SNYDER S S. Changing the world and changing the self:a two-process model of perceived control[J]. Journal of personality and social psychology, 1982, 42(1):5-37.
[22] MORLING B, EVERED S. Secondary control reviewed and defined[J]. Psychological bulletin, 2006, 132(2):269-296.
[23] 杨沈龙, 郭永玉, 李静,等. 控制还是适应:次级控制研究的两种取向[J]. 心理科学进展, 2013, 21(5):857-866.
[24] HAJLI M. Information sharing on social networking sites:the role of perceived control of information and gender[C]//Proceedings of the eighth precis workshop on information security and privacy.Milano:AISel,2013:1-20.
[25] TSAI H Y S, JIANG M, ALHABASH S, et al. Understanding online safety behaviors:a protection motivation theory perspective[J]. Computers & security, 2016, 59(1):138-150.
[26] BANDURA A. Social learning theory of aggression[J]. Journal of communication, 1978, 28(3):12-29.
[27] PODDAR A, MOSTELLER J, ELLEN P S. Consumers' rules of engagement in online information exchanges[J]. Journal of consumer affairs, 2009, 43(3):419-448.
[28] BANSAL G, ZAHEDI F M. Trust violation and repair:the information privacy perspective[J]. Decision support systems, 2015, 71(1):62-77.
[29] MALHOTRA N K, KIM S S, AGARWAL J. Internet users' information privacy concerns (IUIPC):the construct, the scale, and a causal model[J]. Information systems research, 2004, 15(4):336-355.
[30] HOFSTEDE G. Culture's consequences:international differences in work-related values[M]. London:Sage, 1984.
[31] HALL E T. Beyond culture[M]. New Jersey:Anchor Books, 1989.
[32] JAMES T L, WALLACE L, WARKENTIN M, et al. Exposing others' information on online social networks (OSNs):perceived shared risk, its determinants, and its influence on OSN privacy control use[J]. Information & management, 2017, 54(7):851-865.
[33] PETRONIO S. Boundaries of privacy[M]. New York:State University of New York Press, 2002.
[34] ALTMAN I. Privacy regulation:culturally universal or culturally specific?[J]. Journal of social issues, 1977, 33(3):66-84.
[35] LAUFER R S, WOLFE M. Privacy as a concept and a social issue:a multidimensional developmental theory[J]. Journal of social Issues, 1977, 33(3):22-42.
[36] DINEV T, BELLOTTO M, HART P, et al. Privacy calculus model in e-commerce-a study of Italy and the United States[J]. European journal of information systems, 2006, 15(4):389-402.
[37] HSEE C K, WEBER E U. Cross-national differences in risk preference and lay predictions[J]. Journal of behavioral decision making,1999, 12(2):165-179.
[38] WARKENTIN M, CHARLES-PAUVERS B, CHAU P Y K. Cross-cultural IS research:perspectives from eastern and western traditions[J]. European journal of information systems, 2015, 24(3):229-233.
[39] XU H, TEO H H. Alleviating consumers' privacy concerns in location-based services:a psychological control perspective[C]//ICIS 2004 proceedings. Washington:AISel,2004:793-806.
[40] SMITH H J, MILBERG S J, BURKE S J. Information privacy:measuring individuals' concerns about organizational practices[J]. MIS quarterly, 1996, 20(2):167-196.
[41] ZHAO L, LU Y B, GUPTA S. Disclosure intention of location-related information in location-based social network services[J]. International journal of electronic commerce, 2012, 16(4):53-90.
[42] MCKNIGHT D H, CHOUDHURY V, KACMAR C. Developing and validating trust measures for e-commerce:an integrative typology[J]. Information systems research, 2002, 13(3):334-359.
[43] BROWN J D. Likert items and scales of measurement[J]. Statistics, 2011, 15(1):10-14.
[44] HAIR JR J F, BLACK W C, BABIN B J, et al. Multivariate data analysis, a global perspective[M]. New Jersey:Pearson education, 2010.
[45] FORNELL C, LARCKER D F. Evaluating structural equation models with unobservable variables and measurement error[J]. Journal of marketing research, 1981,18(1):39-50.
[46] KOLLAT J, FARACHE F. Achieving consumer trust on Twitter via CSR communication[J]. Journal of consumer marketing, 2017, 34(6):505-514.
[47] CHUNG Y W, MOON H K. The moderating effects of collectivistic orientation on psychological ownership and constructive deviant behavior[J]. International journal of business and management, 2011, 6(12):65-77.
Outlines

/