簡易檢索 / 詳目顯示

研究生: 文正修
Winursito, Bayu Agung
論文名稱: Privacy Calculus: A Study of Social Network Location Service in Indonesia
Privacy Calculus: A Study of Social Network Location Service in Indonesia
指導教授: 陳正忠
Chen, Jeng-Chung (Victor)
學位類別: 碩士
Master
系所名稱: 管理學院 - 國際經營管理研究所碩士班
Institute of International Management (IIMBA--Master)
論文出版年: 2013
畢業學年度: 101
語文別: 英文
論文頁數: 73
外文關鍵詞: Privacy calculus, Islam, Muslim, Silaturrahim, Privacy concern, Location service, Social network service
相關次數: 點閱:112下載:1
分享至:
查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報
  • In the context of social network location service, privacy concern consisting of three dimensions: collection, control, and awareness, still becomes a major hindrance in location information disclosure intention. Even though privacy concern would inhibit location information disclosure intention, the trend of social network use is still growing in Indonesia. This is because when people want to share their personal information, they also would think about the benefit that they could get. This study finds that usefulness and enjoyment as beneficial factors of disclosing information have a positive effect towards intention to disclose information location. Furthermore, it appears that religious values play a role in affecting information disclosure intention. The finding of this study also shows that one of Islamic values which is silaturrahim values, has a positive indirect relationship toward intention to disclose location information and this relationship is mediated by trusting beliefs. Therefore, despite of concern over privacy, Indonesian Muslims are still willing to disclose their location information because they see that social relationship is more important.

    ABSTRACT I ACKNOWLEDGEMENT II TABLE OF CONTENTS III LIST OF TABLES VI LIST OF FIGURES VII CHAPTER ONE INTRODUCTION 1 1.1 Research Background. 1 1.1.1 Indonesia and Social Network Service. 2 1.1.2 Indonesia as the Largest Muslim Populated Country. 4 1.2 Research Gaps and Objectives. 4 1.3 Research Structure. 5 CHAPTER TWO LITERATURE REVIEW 6 2.1 Social Network Location Service. 6 2.2 Islamic Values. 7 2.3 Privacy Calculus. 8 2.3.1 Cost. 10 2.3.2 Benefit. 11 2.4 Hypothesis Development. 13 2.4.1 Relationship between Privacy Concern, Trusting Beliefs, and Privacy Risk Beliefs. 13 2.4.2 Relationship between Trusting Beliefs and Privacy Risk Beliefs. 14 2.4.3 Relationship between Trusting Beliefs, Privacy Risk Beliefs, and Intention to Disclose Location Information in Social Network Service. 14 2.4.4 Relationship between Usefulness and Intention to Disclose Location Information in Social Network Service. 15 2.4.5 Relationship between Enjoyment and Intention to Disclose Location Information in Social Network Service. 15 CHAPTER THREE RESEARCH DESIGN AND METHODOLOGY 17 3.1 Qualitative Research. 17 3.1.1 Interview. 17 3.1.2 Open Coding Results. 19 3.1.3 Axial Coding Results. 22 3.2 Quantitative Research. 26 3.2.1 Theoretical Framework. 26 3.2.2 Construct Measurement. 29 3.2.3 Sampling Plan. 31 3.2.4 Data Analysis Method. 32 CHAPTER FOUR DATA ANALYSIS RESULT 34 4.1 Descriptive Analysis. 34 4.1.1 Data Collection. 34 4.1.2 Characteristics of Respondents. 34 4.1.3 Measurement Results for Research Variables. 36 4.2 Confirmatory Factor Analysis, Reliability, and Convergent Validity. 38 4.3 Discriminant Validity. 42 4.4 Common Method Variance. 43 4.5 Structural Equation Model (SEM). 43 4.6 Mediation Test. 48 CHAPTER FIVE CONCLUSION AND SUGGESTION 51 5.1 Research Conclusion. 51 5.2 Theoretical Implications. 53 5.3 Managerial Implications. 55 5.4 Limitations and Recommendations. 57 REFERENCES 58 APPENDICES 64 Appendix 1: English Questionnaire. 64 Appendix 2: Indonesian Questionnaire. 68 Appendix 3: Interview Request Letter. 73

    Awad, N. F., & Krishnan, M. S. (2006). The personalization privacy paradox: An empirical evaluation of information transparency and the willingness to be profiled online for personalization. MIS Quarterly, 30(1), 13-28.
    Bansal, G., Zahedi, F. M., & Gefen, D. (2010). The impact of pesonal dispositions on information sensitivity, privacy concern and trust in disclosing health information online. Decision Support Systems, 49(2), 138-150.
    Berend, B., Gunther, O., & Spiekermann, S. (2005). Privacy in e-commerce: Stated preferences vs actual behaviour. Communication of the ACM, 48(4), 101-106.
    Boyd, D. M., & Elisson, N. B. (2007). Social network sites: Definition, history, and scholarship. Journal of Computer Mediated Communication, 13(1), 210-230.
    Business Software Alliance. (2012). Country report: Indonesia. Retrieved November 28, 2012, from http://portal.bsa.org/cloudscorecard2012/assets/pdfs/country_reports/Country_Report_Indonesia.pdf
    Chaitrong, W. (2012). ASEAN economies posed for growth despite global difficulties. Retrieved November 27, 2012, from http://www.nationmultimedia.com/business/Asean-economies-poised-for-growth-despite-global-d-30186040.html
    Choi, J., & Geistfeld, L. V. (2004). A cross-cultural investigation of consumer e-shopping adoption. Journal of Economic Psychology, 25(2004), 821-838.
    Culnan, M. J., & Armstong, P. K. (1999). Information privacy concerns, procedural fairness, and impersonal trust: An empirical investigation. Organization Science, 10(1), 104-115.
    Culnan, M. J., & Bies, R. J. (2003). Consumer privacy: Balancing economic and justice considerations. Journal of Social Issues, 59(2), 323-342.
    Davis, F. D., Bagozzi, R. P., & Warshaw, P. R. (1989). User acceptance of computer technology: A comparison of two theoretical models. Management Science, 35(8), 982-1003.
    Davis, F. D., Bagozzi, R. P., & Warshaw, P. R. (1992). Extrinsic and intrinsic motivation to use computers in the workplace. Journal of Applied Social Psychology, 22(14), 1111-1132.
    Desilver, D. (2013). World's Muslim population more widespread than you might think. Retrieved June 21, 2013, from http://www.pewresearch.org/fact-tank/2013/06/07/worlds-muslim-population-more-widespread-than-you-might-think/
    Diamantopoulos, A., & Siguaw, J. A. (2000). Introducing LISREL, a guide for the uninitiated. London: SAGE Publication.
    Dinev, T., Bellotto, M., Hart, P., Russo, V., Serra, I., & Colautti, C. (2006). Privacy calculus model in e-commerce - A study of Italy and the United States. European Journal of Information Systems, 15(2006), 389-402.
    Dinev, T., & Hart, P. (2006). An extended privacy calculus model for e-commerce transactions. Information Systems Research, 17(1), 61-80.
    Eecke, P. V., & Truyens, M. (2010). Privacy and social networks. Computer Law & Security Review, 26(5), 535-546.
    Ellison, N. B., Steinfield, C., & Lampe, C. (2007). The benefits of Facebook “friends:” Social capital and college students’ use of online social network sites. Journal of Computer Mediated Communication, 12(4), 1143-1168.
    Enders, A., Hungenberg, H., Denker, H.-P., & Mauch, S. (2008). The long tail fo social networking. Revenue models of social networking sites. European Management Journal, 26(2008), 199-211.
    Esposito, J. L. (1998). Islam: The straight path. New York: Oxford University Press.
    Essoo, N., & Dibb, S. (2004). Relgious influences on shopping behavior: An exploratory study. Journal of Marketing Management, 20(7-8), 683-712.
    Facebook. (2013). Facebook reports first quarter 2013 results. Retrieved June 21, 2013, from http://investor.fb.com/releasedetail.cfm?ReleaseID=761090
    Fam, K. S., Waller, D. S., & Erdogan, B. Z. (2004). The influence of religion on attitudes towards the advertising of controversial products. European Journal of Marketing, 38(5), 537-555.
    Fishbein, M., & Ajzen, I. (1975). Belief, attitude, intention, and behavior: An introduction to theory and research. Reading: Addison-Wesley.
    Fogel, J., & Nehmad, E. (2009). Internet social network communities: Risk taking, trust, and privacy concerns. Computers in Human Behavior, 25(1), 153-160.
    Fornell, C., & Larcker, D. F. (1981). Evaluationg structural equation models with unboservable variables and measurement error. Journal of Marketing Research, 18(1), 39-50.
    Geertz, C. (1966). Religion as a cultural system. In M. Banton (Ed.), Anthropological approaches to the study of religion. London: Routledge.
    Gefen, D., Karahanna, E., & Straub, D. W. (2003). Trust and TAM in online shopping: An integrated model. MIS Quarterly, 27(1), 51-90.
    Gilbert, D., & Abdullah, J. (2004). Holidaytaking and sense of well-being. Annals of Tourism Research, 31(1), 103-121.
    Grazella, M. (2012). Yahoo! drops Koprol in global overhaul. Retrieved November 27, 2012, from http://www.thejakartapost.com/news/2012/06/30/yahoo-drops-koprol-global-overhaul.html
    Grazioli, S., & Jarvenpaa, S. L. (2000). Perils of Internet fraud: An empirical investigation of deception and trust with experienced Internet consumers. IEEE Transactions on Systems, Man and Cybernetics, Part A: Systems and Humans, 30(4), 395-410.
    Hair, J. R., Black, W. C., Babin, B. J., & Anderson, R. E. (2010). Multivariate data analysis. New Jersey: Pearson Prentice Hall.
    Hayat, M. A. (2007). Privacy and Islam: From the Quran to data protection in Pakistan. Information & Communication Technology Law, 16(2), 137-148.
    Heijden, H. V. D. (2004). User acceptance of hedonic information systems. MIS Quarterly, 28(4), 695-704.
    Hofstede, G., & Hofstede, G. J. (2005). Cultures and organizations software of the mind. New York: McGraw-Hill.
    Hosmer, L. T. (1995). The connection link between organizational theory and philosophical ethics. Academy of Management Review, 20(3), 213-237.
    Jarvenpaa, S. L., Tractinsky, N., & Saarinen, L. (1999). Consumer trust in an internet store: A cross cultural validation. Journal of Computer Mediated Communication, 5(2), 1-35.
    Junglas, I. A., Johnson, N. A., & Spitzmuller, C. (2008). Personality traits and concern for privacy: An empirical study in the context of location-based services. European Journal of Information Systems, 2008(17), 387-402.
    Kang, Y. S., & Lee, H. (2010). Understanding the role of an IT artifact in online service continuance: An extended perspective of user satisfaction. Computers in Human Behavior, 27(3), 1152-1161.
    Kim, H.-W., Chan, H. C., & Gupta, S. (2007). Value-based adoption of mobile internet: An empirical investigation. Decision Support Systems, 43(1), 111-126.
    KPCB. (2012). 2012 Internet trends report. Retrieved November 26, 2012, from www.kpcb.com/file/kpcb-internet-trends-2012
    Kwon, O., & Wen, Y. (2010). An empirical study of the factors affecting social network service use. Computers in Human Behavior, 26(2), 254-263.
    Laufer, R. S., & Wolfe, M. (1977). Privacy as a concept and a social issue: A multidimensional development theory. Journal of Social Issues, 33(3), 22-42.
    Li, H., Sarathy, R., & Xu, H. (2011). The role of affect and cognition on online consumers' decision to disclose personal information to unfamiliar online vendors. Decision Support Systems, 51(3), 434-445.
    Li, Y. (2012). Theories in online information privacy research: A critical review and an integrated framework. Decision Support Systems, 54(1), 471-481.
    Lin, K.-Y., & Lu, H.-P. (2011). Why people use social networking sites: An empirical study integrating network externalities and motivation theory. Computers in Human Behavior, 27(3), 1152-1161.
    Lowry, P. B., Cao, J., & Everard, A. (2011). Privacy concerns versus desire for interpersonal awareness in driving the use self-disclosure technologies: The case of instant messaging in two cultures. Journal of Management Information Systems, 27(4), 163-200.
    Luqmani, M., Yavas, U., & Quraeshi, Z. (1989). Advertising in Saudi Arabia: Content and regulation. International Marketing Review, 6(1), 59-71.
    Malhotra, N. K., Kim, S. S., & Agarwal, J. (2004). Internet users’ information privacy concerns (IUIPC): The construct, the scale, and a causal model. Information Systems Research, 15(4), 336-355.
    Maslow, A. H. (1968). Toward a psychology of being. New York: Van Nostrand.
    McKnight, D. H., Cummings, L. L., & Chervany, N. L. (1998). Initial trust formation in new organizational relationship. Academy of Management Review, 23(3), 473-490.
    Mediabistro. (2013). Facebook, Twitter, Pinterest, Instagram - Social media user demographic 2013 [infographic]. Retrieved June 17, 2013, from http://www.mediabistro.com/alltwitter/social-user-demographics_b39963
    Microsoft. (2010). Location based service usage and perceptions survey presentation. Retrieved November 25, 2012, from http://www.microsoft.com/en-us/download/details.aspx?id=3250
    Nadkarni, A., & Hofmann, S. G. (2012). Why do people use Facebook? Personality and Individual Differences, 52(3), 243-249.
    Park, N., Jin, B., & Jin, S.-A. A. (2011). Effects of self-disclosure on relational intimacy in Facebook. Computers in Human Behavior, 27(5), 1974-1983.
    Pfeil, U., Arjan, R., & Zaphiris, P. (2009). Age differences in online social networking – A study of user profiles and the social capital divide among teenagers and older users in MySpace. Computers in Human Behavior, 25(3), 643-654.
    Preacher, K. J., & Hayes, A. F. (2004). SPSS and SAS procedures for estimating indirect effects in simple mediation models. Behavior Research Methods, Instruments, & Computers, 36(4), 717-731.
    Pring, C. (2012). 100 more social media statistics for 2012. Retrieved November 26, 2012, from http://thesocialskinny.com/100-more-social-media-statistics-for-2012/
    Putrevu, S., & Swimberghek, K. (2013). The influence of religiosity on consumer ethical judgments and responses toward sexual appeals. Journal of Business Ethics, 115(2), 351-365.
    Rao, M. (2012). Mobile Southeast Asia report 2012: Crossroads of innovation. Retrieved November 26, 2012, from http://www.mobilemonday.net/reports/SEA_Report_2012.pdf
    Rau, P.-L. P., Gao, Q., & Ding, Y. (2008). Relationship between the level of intimacy and lurking in online social network services. Computers in HUman Behavior, 24(6), 2757-2770.
    Renneboog, L., & Spaenjers, C. (2012). Religion, economic attitudes, and household finance. Oxford Economic Papers, 64(2012), 103-127.
    Saunders, M., Lewis, P., & Thornhill, A. (2009). Research methods for business students (5th ed.). England: Pearson Education Limited.
    Schoorman, F. D., Mayer, R. C., & Davis, J. H. (2007). An intergrative model of organizational trust: Past, present, and future. Academy of Management Review, 32(2), 344-354.
    Semiocast. (2012). Twitter reaches half a billion accounts more than 140 millions in the U.S. Retrieved November 26, 2012, from http://semiocast.com/publications/2012_07_30_Twitter_reaches_half_a_billion_accounts_140m_in_the_US
    Shin, D.-H. (2010). The effects of trust, security, and privacy in social networking: A security-based approach to understand the pattern of adoption. Interacting with Computers, 25(5), 428-438.
    Socialbakers. (2012). Facebook statistics by country. Retrieved November 26, 2012, from http://www.socialbakers.com/facebook-statistics/
    Socialbakers. (2013). Indonesia Facebook statistics. Retrieved June 15, 2013, from http://www.socialbakers.com/facebook-statistics/indonesia
    Stewart, K. A., & Segars, A. H. (2002). An empirical examination of the concern for information privacy instrument. Information Systems Research, 13(1), 36-49.
    Tempo. (2012). Jumlah pengguna Internet Indonesia terus melonjak [The number of Indonesia Internet users keeps increasing]. Retrieved July 17, 2013, from http://www.tempo.co/read/news/2012/12/12/072447763/Jumlah-Pengguna-Internet-Indonesia-Terus-Melonjak
    The Jakarta Post. (2011). Yahoo! Koprol sees users increas 20-fold in a year. Retrieved November 27, 2012, from http://www.thejakartapost.com/news/2011/07/08/yahoo-koprol-sees-users-increase-20-fold-a-year.html
    Traynor, D., & Curran, K. (2012). Location-based social networks. In M. M. Islam & M. Ehsan (Eds.), From government to e-governance: Public administration in the digital age (pp. 243). United States: Idea Group.
    Venkatesh, V., & Bala, H. (2008). Technology acceptance model 3 and a research agenda on interventions. Decision Sciences, 39(2), 2008.
    Venkatesh, V., & Davis, F. D. (2000). A theoretical extension of the technology acceptance model: Four longitudinal field studies. Management Science, 46(2), 186-204.
    Vitell, S. J., & Paolillo, J. G. P. (2003). Consumer ethics: The role of religiosity. Journal of Business Ethics, 46(2003), 151-162.
    Vitell, S. J., Singh, J. J., & Paolillo, J. (2007). Consumers' ethical beliefs: The roles of money, religiosity, and attitude toward business. Journal of Business Ethics, 73(2007), 369-379.
    Wallendorf, M., & Arnould, E. J. (1991). "We gather together": Consumption rituals of thanksgiving day. Jounral of Consumer Research, 18(1), 13-31.
    Wu, K.-W., Huang, S. Y., Yen, D. C., & Popova, I. (2012). The effect of online privacy policy on consumer privacy concern and trust. Computers in Human Behavior, 28(3), 889-897.
    Xu, H., Luo, X. R., Carroll, J. M., & Rosson, M. B. (2011). The personalization privacy paradox: An exploratory study of decision making process of location-aware marketing. Decision Support Systems, 51(1), 42-52.
    Xu, H., Teo, H.-H., Tan, B. C. Y., & Agarwal, R. (2010). The role of push-pull technology in privacy calculus: The case of location-based services. Journal of Management Information Systems, 26(3), 135-173.
    Yang, M.-H., Chandlrees, N., Lin, B., & Chao, H.-Y. (2009). The effect of perceived ethical performance of shopping websites on consumer trust. Journal of Computer Information Systems, 50(1), 15-24.
    Yau, O. H. M. (1988). Chinese cultural values: Their dimensions and marketing implications. European Journal of Marketing, 22(5), 44-57.
    Zheng, Y. (2011). Location-based social networks: Users. In Computing with Spatial Trajectories (pp. 243-276). New York: Springer.
    Zheng, Y. (2012). Tutorial on location-based social networks. Paper presented at the WWW 2012, Lyon, France.
    Zhou, T. (2011). The impact of privacy concern on user adoption of location-based services. Industrial Management & Data Systems, 111(2), 212-226.

    下載圖示 校內:2018-08-07公開
    校外:2018-08-07公開
    QR CODE