| 研究生: |
莫鵬宇 Molnar Gaspar |
|---|---|
| 論文名稱: |
An Empirical Study of Defensive Behaviors on Social Networking Sites: Evidence from the Region of Central Europe An Empirical Study of Defensive Behaviors on Social Networking Sites: Evidence from the Region of Central Europe |
| 指導教授: |
林彣珊
Lin, Wen-Shan |
| 學位類別: |
碩士 Master |
| 系所名稱: |
管理學院 - 國際經營管理研究所碩士在職專班 Institute of International Management (IIMBA--Master)(on the job class) |
| 論文出版年: | 2023 |
| 畢業學年度: | 111 |
| 語文別: | 英文 |
| 論文頁數: | 60 |
| 外文關鍵詞: | Privacy Concerns, Defensive Behaviors, Privacy Calculus Theory, Social Cognitive Theory of Self – Regulation, Communication Privacy Management Theory |
| 相關次數: | 點閱:98 下載:4 |
| 分享至: |
| 查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報 |
In our modern age, a significant portion of our lives is spent on the internet and social networking platforms are providing a place for this new lifestyle. At first glance they appear to be harmless, but they carry numerous risks and potential threats.
Our research examines defensive behaviors on social networking sites, focusing on Facebook. We incorporate four theoretical frameworks—Privacy calculus theory, Institutional trust theory, Social cognitive theory of self-regulation, and Communication privacy management theory— to better understand user behavior in terms of online privacy and protection. We employ Confirmatory Factor Analysis (CFA) and Structural Equation Modeling (SEM) to analyze the data and investigate the relationship between these factors. Additionally, we conduct qualitative interviews and consider the Five Big personality traits as control variables. According to our findings, aside the gender, from the five personality traits examined, only the agreeableness of individuals has a notable influence on their inclination to engage in defensive strategies online.
Results also reveal that the scenario of privacy paradox behavior observed among SNS users wherein they express concerns about their online peers and the platform itself yet demonstrate a willingness to continue using Facebook. Discussions and implications for research and practice are given in the end of the thesis.
Acquisti, A., Brandimarte, L., & Loewenstein, G. (2015). Privacy and human behavior in the age of information. Science, 347(6221), 509-514.
Adjerid, I., Peer, E., & Acquisti, A. (2018). Beyond the privacy paradox: Objective versus relative risk in privacy decision making. MIS Quarterly, 42(2), 465-488.
Aghaei, S., Nematbakhsh, M. A., & Farsani, H. K. (2012). Evolution of the world wide web: From WEB 1.0 TO WEB 4.0. International Journal of Web & Semantic Technology, 3(1), 1-10.
Ajzen, I. (1988). Attitudes, personality, and behavior. Stony Stratford: Open University Press.
Al-Mamary, Y. H., Shamsuddin, A., & Aziati, N. (2015). Investigating the key factors influencing on management information systems adoption among telecommunication companies in Yemen: The conceptual framework development. International Journal of Energy, Information and Communications, 6(1), 59-68.
Albert, B. (1991). Social cognitive theory of self-regulation. Organizational behavior and human decision processes, 50, 248-287.
Altman, I. (1977). Privacy regulation: Culturally universal or culturally specific? Journal of social issues, 33(3), 66-84.
Armstrong, P. I., Day, S. X., McVay, J. P., & Rounds, J. (2008). Holland's RIASEC model as an integrative framework for individual differences. Journal of Counseling Psychology, 55(1), 1.
Attrill, A. (2012). Sharing only parts of me: Selective categorical self-disclosure across internet arenas. International Journal of Internet Science, 7(1).
Ayaburi, E. W., & Treku, D. N. (2020). Effect of penitence on social media trust and privacy concerns: The case of Facebook. International Journal of Information Management, 50, 171-181.
Azucar, D., Marengo, D., & Settanni, M. (2018). Predicting the Big 5 personality traits from digital footprints on social media: A meta-analysis. Personality and individual differences, 124, 150-159.
Bandara, R., Fernando, M., & Akter, S. (2021). Managing consumer privacy concerns and defensive behaviours in the digital marketplace. European Journal of Marketing, 55(1), 219-246.
Bansal, G., Zahedi, F. M., & Gefen, D. (2016). Do context and personality matter? Trust and privacy concerns in disclosing private information online. Information & Management, 53(1), 1-21.
Barnes, S. B. (2006). A privacy paradox: Social networking in the United States. first monday.
Barrick, M. R., Mount, M. K., & Judge, T. A. (2001). Personality and performance at the beginning of the new millennium: What do we know and where do we go next? International Journal of Selection and assessment, 9(1‐2), 9-30.
Bergeman, C. S., Chlpuer, H. M., Plomin, R., Pedersen, N. L., McClearn, G. E., Nesselroade, J. R., . . . McCrae, R. R. (1993). Genetic and environmental effects on openness to experience, agreeableness, and conscientiousness: An adoption/twin study. Journal of personality, 61(2), 159-179.
Beverungen, D., Müller, O., Matzner, M., Mendling, J., & Vom Brocke, J. (2019). Conceptualizing smart service systems. Electronic Markets, 29(1), 7-18.
Black, W., & Babin, B. J. (2019). Multivariate data analysis: Its approach, evolution, and impact The Great Facilitator: Reflections on the Contributions of Joseph F. Hair, Jr. to Marketing and Business Research (pp. 121-130): Springer.
Cain, J. A., & Imre, I. (2022). Everybody wants some: Collection and control of personal information, privacy concerns, and social media use. New Media & Society, 24(12), 2705-2724.
Campos-Moinier, K., Murday, V., & Brunel, L. (2023). Individual differences in social interaction contexts: Examining the role of personality traits in the degree of self-other integration. Personality and Individual Differences, 203, 112002.
Cao, X., Masood, A., Luqman, A., & Ali, A. (2018). Excessive use of mobile social networking sites and poor academic performance: Antecedents and consequences from stressor-strain-outcome perspective. Computers in Human Behavior, 85, 163-174.
Chang, H. H., Wong, K. H., & Lee, H. C. (2022). Peer privacy protection motivation and action on social networking sites: Privacy self-efficacy and information security as moderators. Electronic Commerce Research and Applications, 54, 101176.
Cheng, X., Hou, T., & Mou, J. (2021). Investigating perceived risks and benefits of information privacy disclosure in IT-enabled ride-sharing. Information & Management, 58(6), 103450.
Child, J. T., Pearson, J. C., & Petronio, S. (2009). Blogging, communication, and privacy management: Development of the blogging privacy management measure. Journal of the American Society for Information Science and Technology, 60(10), 2079-2094.
Cho, I. H. (2015). Facebook discontinuance: discontinuance as a temporal settlement of the constant interplay between disturbance and coping. Quality & Quantity, 49(4), 1531-1548.
Choi, H., Park, J., & Jung, Y. (2018). The role of privacy fatigue in online privacy behavior. Computers in Human Behavior, 81, 42-51.
Cichy, P., Salge, T. O., & Kohli, R. (2021). PRIVACY CONCERNS AND DATA SHARING IN THE INTERNET OF THINGS: MIXED METHODS EVIDENCE FROM CONNECTED CARS. MIS Quarterly, 45(4).
Cohen, J. E. (2017). Examined lives: Informational privacy and the subject as object Law and Society Approaches to Cyberspace (pp. 473-538): Routledge.
Costa Jr, P. T., McCrae, R. R., & Dye, D. A. (1991). Facet scales for agreeableness and conscientiousness: A revision of the NEO Personality Inventory. Personality and individual Differences, 12(9), 887-898.
Costa, P. T., McCrae, R. R., & Zonderman, A. B. (1987). Environmental and dispositional influences on well‐being: Longitudinal follow‐up of an American national sample. British journal of Psychology, 78(3), 299-306.
Culnan, M. J. (2000). Protecting privacy online: Is self-regulation working? Journal of Public Policy & Marketing, 19(1), 20-26.
Culnan, M. J., & Bies, R. J. (2003). Consumer privacy: Balancing economic and justice considerations. Journal of social issues, 59(2), 323-342.
Debatin, B., Lovejoy, J. P., Horn, A.-K., & Hughes, B. N. (2009). Facebook and online privacy: Attitudes, behaviors, and unintended consequences. Journal of computer-mediated communication, 15(1), 83-108.
Dhir, A., Kaur, P., Chen, S., & Pallesen, S. (2019). Antecedents and consequences of social media fatigue. International Journal of Information Management, 48, 193-202.
Dienlin, T., & Trepte, S. (2015). Is the privacy paradox a relic of the past? An in‐depth analysis of privacy attitudes and privacy behaviors. European journal of social psychology, 45(3), 285-297.
Dinev, T., & Hart, P. (2006). An extended privacy calculus model for e-commerce transactions. Information systems research, 17(1), 61-80.
Fu, S., & Li, H. (2022). Understanding social media discontinuance from social cognitive perspective: Evidence from Facebook users. Journal of Information Science, 48(4), 544-560.
Gosling, S. D., Rentfrow, P. J., & Swann Jr, W. B. (2003). A very brief measure of the Big-Five personality domains. Journal of Research in personality, 37(6), 504-528.
Han, B., & Myers, C. (2018). Perceptions of overuse, underuse, and change of use of a social media site: Definition, measurement instrument, and their managerial impacts. Behaviour & Information Technology, 37(3), 247-257.
Hong, W., & Thong, J. Y. (2013). Internet privacy concerns: An integrated conceptualization and four empirical studies. Mis Quarterly, 275-298.
Huang, H.-C., Cheng, T., Huang, W.-F., & Teng, C.-I. (2018). Who are likely to build strong online social networks? The perspectives of relational cohesion theory and personality theory. Computers in Human Behavior, 82, 111-123.
Ioannou, A., Tussyadiah, I., & Lu, Y. (2020). Privacy concerns and disclosure of biometric and behavioral data for travel. International Journal of Information Management, 54, 102122.
Islam, A. N., Mäntymäki, M., Laato, S., & Turel, O. (2022). Adverse consequences of emotional support seeking through social network sites in coping with stress from a global pandemic. International Journal of Information Management, 62, 102431.
Jiang, Z., Heng, C. S., & Choi, B. C. (2013). Research note—privacy concerns and privacy-protective behavior in synchronous online social interactions. Information Systems Research, 24(3), 579-595.
Joinson, A. N., Paine, C., Buchanan, T., & Reips, U.-D. (2006). Watching me, watching you: privacy attitudes and reactions to identity card implementation scenarios in the United Kingdom. Journal of Information Science, 32(4), 334-343.
Judge, T. A., Heller, D., & Mount, M. K. (2002). Five-factor model of personality and job satisfaction: a meta-analysis. Journal of applied psychology, 87(3), 530.
Junglas, I. A., Johnson, N. A., & Spitzmüller, C. (2008). Personality traits and concern for privacy: an empirical study in the context of location-based services. European Journal of Information Systems, 17, 387-402.
Kock, N. (2015). Common method bias in PLS-SEM: A full collinearity assessment approach. International Journal of e-Collaboration (ijec), 11(4), 1-10.
Krasnova, H., Spiekermann, S., Koroleva, K., & Hildebrand, T. (2010). Online social networks: Why we disclose. Journal of information technology, 25(2), 109-125.
Krasnova, H., Veltri, N. F., & Günther, O. (2012). Self-disclosure and privacy calculus on social networking sites: the role of culture. Business & Information Systems Engineering, 4(3), 127-135.
Kuenzler, A. (2022). On (some aspects of) social privacy in the social media space. International Data Privacy Law, 12(1), 63-73.
Lin, J., Lin, S., Turel, O., & Xu, F. (2020). The buffering effect of flow experience on the relationship between overload and social media users’ discontinuance intentions. Telematics and Informatics, 49, 101374.
Lowry, P. B., Cao, J., & Everard, A. (2011). Privacy concerns versus desire for interpersonal awareness in driving the use of self-disclosure technologies: The case of instant messaging in two cultures. Journal of Management Information Systems, 27(4), 163-200.
Malhotra, N. K., Kim, S. S., & Agarwal, J. (2004). Internet users' information privacy concerns (IUIPC): The construct, the scale, and a causal model. Information systems research, 15(4), 336-355.
Maqableh, M., Shannak, R., Jaradat, M., & Karajeh, H. (2023). Facebook continuance intention and its impact on addiction: the mediating role of users’ security concerns. International Journal of Data and Network Science, 7(1), 369-380.
Masood, A., Feng, Y., Rasheed, M. I., Ali, A., & Gong, M. (2021). Smartphone-based social networking sites and intention to quit: self-regulatory perspective. Behaviour & Information Technology, 40(11), 1055-1071.
McCrae, R. R., & Costa, P. T. (1987). Validation of the five-factor model of personality across instruments and observers. Journal of personality and social psychology, 52(1), 81.
McKnight, D. H., & Chervany, N. L. (2001). What trust means in e-commerce customer relationships: An interdisciplinary conceptual typology. International journal of electronic commerce, 6(2), 35-59.
McKnight, D. H., Choudhury, V., & Kacmar, C. (2002). Developing and validating trust measures for e-commerce: An integrative typology. Information systems research, 13(3), 334-359.
Metzger, M. J. (2007). Communication privacy management in electronic commerce. Journal of Computer-Mediated Communication, 12(2), 335-361.
Mlaiki, A., Walsh, I., & Kalika, M. (2017). Why do we continue using social networking sites? The giving loop that feeds computer-mediated social ties. Systemes d'information management, 22(2), 5-47.
Neves, J., Turel, O., & Oliveira, T. (2022). SNS use reduction: a two-facet privacy concern perspective. Internet Research(ahead-of-print).
Niu, G., Yao, L., Tian, Y., Sun, X., & Zhou, Z. (2020). Information overload and the intention to reduce SNS usage: the mediating roles of negative social comparison and fatigue. Current Psychology, 1-8.
Obar, J. A., & Wildman, S. S. (2015). Social media definition and the governance challenge-an introduction to the special issue. Obar, JA and Wildman, S.(2015). Social media definition and the governance challenge: An introduction to the special issue. Telecommunications policy, 39(9), 745-750.
Osatuyi, B., & Turel, O. (2020). Conceptualisation and validation of system use reduction as a self-regulatory IS use behaviour. European Journal of Information Systems, 29(1), 44-64.
Ozdemir, Z. D., Jeff Smith, H., & Benamati, J. H. (2017). Antecedents and outcomes of information privacy concerns in a peer context: An exploratory study. European Journal of Information Systems, 26(6), 642-660.
Park, Y. J. (2015). Do men and women differ in privacy? Gendered privacy and (in) equality in the Internet. Computers in Human Behavior, 50, 252-258.
Paul, M., Maglaras, L., Ferrag, M. A., & AlMomani, I. (2023). Digitization of healthcare sector: A study on privacy and security concerns. ICT Express.
Pavlou, P. A. (2011). State of the information privacy literature: Where are we now and where should we go? MIS quarterly, 977-988.
Pavlou, P. A., & Gefen, D. (2005). Psychological contract violation in online marketplaces: Antecedents, consequences, and moderating role. Information systems research, 16(4), 372-399.
Petronio, S. (2002). Boundaries of privacy: Dialectics of disclosure: Suny Press.
Pitkänen, O., & Tuunainen, V. K. (2012). Disclosing personal data socially—An empirical study on Facebook users' privacy awareness. Journal of Information Privacy and Security, 8(1), 3-29.
Raff, S., Wentzel, D., & Obwegeser, N. (2020). Smart products: conceptual review, synthesis, and research directions. Journal of product innovation management, 37(5), 379-404.
Ravindran, T., Yeow Kuan, A. C., & Hoe Lian, D. G. (2014). Antecedents and effects of social network fatigue. Journal of the Association for Information Science and Technology, 65(11), 2306-2320.
Raynes-Goldie, K. (2010). Aliases, creeping, and wall cleaning: Understanding privacy in the age of Facebook. First Monday.
Rosenthal, S., Wasenden, O.-C., Gronnevet, G.-A., & Ling, R. (2020). A tripartite model of trust in Facebook: acceptance of information personalization, privacy concern, and privacy literacy. Media Psychology, 23(6), 840-864.
Saeri, A. K., Ogilvie, C., La Macchia, S. T., Smith, J. R., & Louis, W. R. (2014). Predicting Facebook users’ online privacy protection: Risk, trust, norm focus theory, and the theory of planned behavior. The Journal of social psychology, 154(4), 352-369.
Salo, M., Pirkkalainen, H., & Koskelainen, T. (2019). Technostress and social networking services: Explaining users' concentration, sleep, identity, and social relation problems. Information Systems Journal, 29(2), 408-435.
Sanchez, O. R., Torre, I., & Knijnenburg, B. P. (2020). Semantic-based privacy settings negotiation and management. Future Generation Computer Systems, 111, 879-898.
Shapiro, S. P. (1987). The social control of impersonal trust. American journal of Sociology, 93(3), 623-658.
Smith, H. J., Dinev, T., & Xu, H. (2011). Information privacy research: an interdisciplinary review. MIS quarterly, 989-1015.
Son, J.-Y., & Kim, S. S. (2008). Internet users' information privacy-protective responses: A taxonomy and a nomological model. MIS quarterly, 503-529.
Sønderskov, K. M., & Dinesen, P. T. (2016). Trusting the state, trusting each other? The effect of institutional trust on social trust. Political Behavior, 38, 179-202.
Stone, E. F., Gueutal, H. G., Gardner, D. G., & McClure, S. (1983). A field experiment comparing information-privacy values, beliefs, and attitudes across several types of organizations. Journal of applied psychology, 68(3), 459.
Turel, O., & Qahri-Saremi, H. (2016). Problematic use of social networking sites: Antecedents and consequence from a dual-system theory perspective. Journal of Management Information Systems, 33(4), 1087-1116.
Vaghefi, I., Qahri-Saremi, H., & Turel, O. (2020). Dealing with social networking site addiction: a cognitive-affective model of discontinuance decisions. Internet Research, 30(5), 1427-1453.
Vraga, E. K., & Tully, M. (2021). News literacy, social media behaviors, and skepticism toward information on social media. Information, Communication & Society, 24(2), 150-166.
Wei, H., Zhang, F., Yuan, N. J., Cao, C., Fu, H., Xie, X., . . . Ma, W.-Y. (2017). Beyond the words: Predicting user personality from heterogeneous information. Paper presented at the Proceedings of the tenth ACM international conference on web search and data mining.
Westin, A. F. (2003). Social and political dimensions of privacy. Journal of social issues, 59(2), 431-453.
Wissinger, C. L. (2017). Privacy literacy: From theory to practice. Communications in Information Literacy, 11(2), 378-389.
Xu, H., Dinev, T., Smith, J., & Hart, P. (2011). Information privacy concerns: Linking individual perceptions with institutional privacy assurances. Journal of the Association for Information Systems, 12(12), 1.
Xu, H., Teo, H.-H., Tan, B. C., & Agarwal, R. (2009). The role of push-pull technology in privacy calculus: the case of location-based services. Journal of management information systems, 26(3), 135-174.
Yang, H.-L., & Lin, C.-L. (2014). Why do people stick to Facebook web site? A value theory-based view. Information Technology & People, 27(1), 21-37.
York, C., & Turcotte, J. (2015). Vacationing from Facebook: Adoption, temporary discontinuance, and readoption of an innovation. Communication Research Reports, 32(1), 54-62.
Young, A. L., & Quan-Haase, A. (2009). Information revelation and internet privacy concerns on social network sites: a case study of facebook. Paper presented at the Proceedings of the fourth international conference on Communities and technologies.
Yu, L., Li, H., He, W., Wang, F.-K., & Jiao, S. (2020). A meta-analysis to explore privacy cognition and information disclosure of internet users. International Journal of Information Management, 51, 102015.
Zhang, N. A., Wang, C. A., Karahanna, E., & Xu, Y. (2022). PEER PRIVACY CONCERN: CONCEPTUALIZATION AND MEASUREMENT. MIS Quarterly, 46(1).