DOI QR코드

DOI QR Code

A Study on the Factors Affecting the User Resistance in Social Network Service

Social Network Service에서의 사용자 저항에 영향을 미치는 요인에 관한 연구

  • Park, Eunkyung (Graduate School of Business Administration, Soongsil University) ;
  • Choi, Jeongil (College of Business Administration, Soongsil University) ;
  • Yeon, Jiyoung (Graduate School of Business Administration, Inha University)
  • 박은경 (숭실대학교 대학원 경영학과) ;
  • 최정일 (숭실대학교 경영학부) ;
  • 연지영 (인하대학교 대학원 경영학과)
  • Received : 2014.07.09
  • Accepted : 2014.08.04
  • Published : 2014.09.30

Abstract

Purpose: The widespread use of social network services (SNS) has caused users concern about the disclosure of their privacy or personal information. The purpose of this study is to analyze the factors of privacy concern and self presentation that affect the user resistance in the use of social network service. Methods: This study verifies the factors that affecting the user resistance in SNS. The research model suggested in this study is tested via a survey of 260 SNS users. SPSS and Smart PLS had been used to test the suggested hypotheses. Results: This study shows that privacy experience, privacy awareness, self esteem, and social desirability significantly influence perceived risk and that privacy awareness, self esteem, self efficacy, and perceived risk significantly influence perceived trust. It also verifies that perceived risk and perceived trust positively affect user resistance. Conclusion: This paper suggests that high awareness on privacy of SNS user encourages the SNS companies to consider the privacy protection mechanism for eliminating various factors that affecting the risk. This study also shows that the privacy calculus model applies to understanding the mechanism on resistance of SNS user.

Keywords

References

  1. Altman, I. 1975. The Environment and Social Behavior: Privacy, Personal Space, Territory, Crowding. Monterey, CA: Brooks/Cole Publishing Company.
  2. Bandura, A. 1977. "Self-efficacy: Toward a Unifying Theory of Behavioral Change." Psychological Review 84(2):191-215. https://doi.org/10.1037/0033-295X.84.2.191
  3. Bauer, H. H., Grether, M., and Leach, M. 2002. "Building Customer Relations over the Internet." Industrial Marketing Management 31(2):155-163. https://doi.org/10.1016/S0019-8501(01)00186-9
  4. Bellman, S., Johnson, E. J., Kobrin, S. J., and Lohse, G. L. 2004. "International Differences in Information Privacy Concerns: A Global Survey of Consumers." The Information Society 20(5):313-324. https://doi.org/10.1080/01972240490507956
  5. Besmer, A., and Lipford, H. R. 2010. "Moving beyond Untagging: Photo Privacy in a Tagged World." Proceedings of the SIGCHI Conference on Human Factors in Computing Systems:1563-1572.
  6. Boyed, D. M., and Ellison, N. B. 2007. "Social Network Sites: Definition, History, and Scholarship." Journal of Computer‐Mediated Communication 13(1):210-230.
  7. Brod, C. 1982. "Managing technostress: Optimizing the Use of Computer Technology." Personnel Journal 61(10):753-757.
  8. Campbell, W. K., Rudich, E. A., and Sedikides, C. 2002. "Narcissism, Self-esteem, and the Positivity of Self-views: Two Portraits of Self-love." Personality and Social Psychology Bulletin 28(3):358-368. https://doi.org/10.1177/0146167202286007
  9. Chin, W. W. 1998. "The Partial Least Squares Approach to Structural Equation Modeling." Modern Methods for Business Research 295(2):295-336.
  10. Cohen, J. 1988. Statistical Power Analysis for the Behavioral Sciences, 2nd ed. New York: Academic Press.
  11. Cozby, P. C. 1973. "Self-disclosure: A Literature Review." Psychological Bulletin 79(2):73-91. https://doi.org/10.1037/h0033950
  12. Culnan, M. J., and Armstrong, P. K. 1999. "Information Privacy Concerns, Procedural Fairness, and Impersonal Trust: An Empirical Investigation." Organization Science 10(1):104-115. https://doi.org/10.1287/orsc.10.1.104
  13. Culnan, M. J., and Bies, R. J. 2003. "Consumer privacy: Balancing Economic and Justice Considerations." Journal of Social Issues 59(2):323-342. https://doi.org/10.1111/1540-4560.00067
  14. Dinev, T., and Hart, P. 2006. "An Extended Privacy Calculus Model for E-commerce Transactions." Information Systems Research 17(1):61-80. https://doi.org/10.1287/isre.1060.0080
  15. Dowling, G. R. 1985. "The Effectiveness of Advertising Explicit Warranties." Journal of Public Policy & Marketing 4:142-152.
  16. Efron, B., and Tibshirani, R. 1997. "Improvements on Cross-validation: The 632+ Bootstrap Method." Journal of the American Statistical Association 92(438):548-560.
  17. Ellison, N., Heino, R., and Gibbs, J. 2006. "Managing Impressions Online: Self‐presentation Processes in the Online Dating Environment." Journal of Computer‐Mediated Communication 11(2):415-441.
  18. Fishbein, M., and Ajzen, I. 1975. Belief, Attitude, Intention and Behavior: An Introduction to Theory and Research, Reading. MA: Addison-Wesley.
  19. Fogel, J., and Nehmad, E. 2009. "Internet Social Network Communities: Risk Taking, Trust, and Privacy Concerns." Computers in Human Behavior 25(1):153-160. https://doi.org/10.1016/j.chb.2008.08.006
  20. Fusilier, M. R., and Hoyer, W. D. 1980. "Variables Affecting Perceptions of Invasion of Privacy in a Personnel Selection Situation." Journal of Applied Psychology 65(5):623-626. https://doi.org/10.1037/0021-9010.65.5.623
  21. Gardner, H. 1985. Frames of Mind: The Theory of Multiple Intelligences. New York: Basic Books.
  22. Gefen, D. 2000. "E-commerce: the Role of Familiarity and Trust." Omega 28(6):725-737. https://doi.org/10.1016/S0305-0483(00)00021-9
  23. Gilroy, F. D., and Desai, H. B. 1986. "Computer Anxiety: Sex, Race and Age." International Journal of Man-Machine Studies 25(6):711-719. https://doi.org/10.1016/S0020-7373(86)80084-0
  24. Goffman, E. 1959. The Presentation of Self in Everyday Life. Garden City, NY: Doubleday.
  25. Grazioli, S., and Jarvenpaa, S. L. 2000. "Perils of Internet Fraud: An Empirical Investigation of Deception and Trust with Experienced Internet Consumers." IEEE Transactions on Systems, Man and Cybernetics 30(4):395-410. https://doi.org/10.1109/3468.852434
  26. Hair, J. F., Jr. Black, W. C., Bavin, B. J., and Anderson, R. E. 2010. Multivariate Data Analysis, 7th ed. Upper Saddle River, NJ: Prentice Hall.
  27. Harris Interactive. 2002. "Privacy On and Off the Internet: What Consumers Want." Privacy and American Business Study 15229:1-127.
  28. Hoadley, C. M., Xu, H., Lee, J. J., and Rosson, M. B. 2010. "Privacy as Information Access and Illusory Control: The Case of the Facebook News Feed Privacy Outcry." Electronic Commerce Research and Applications 9(1): 50-60. https://doi.org/10.1016/j.elerap.2009.05.001
  29. Homans, G. C. 1961. Social Behavior: Its Elementary Forms. Oxford, England: Harcourt Brace.
  30. Jarvenpaa, S., and Todd, P. 1998. "An Empirical Examination of the Determinants of Attitudes and Intention toward Shopping on the Internet." Working Paper, University of Texas-Austin.
  31. Jarvenpaa, S. L., Tractinsky, N., and Saarinen, L. 1999. "Consumer Trust in an Internet Store: A Cross‐cultural Validation." Journal of Computer‐Mediated Communication 5(2):1-35.
  32. Kim, B. 2012. "A Study of Antecedents of Continuance Intention in Mobile Social Network Service: The Role Trust and Privacy Concerns." Knowledge Management Research 13(4):83-100.
  33. Ko, Honseog, Kim, Chesoong, Jeong, Moonyoung, Oh, Youngjin, and Lee, Sungho. 2011. "The Effect of Social Network Service's Quality Factors on User Satisfaction and the Intention to Continued Use." Journal of the Korean Society for Quality Management 39(4): 543-555.
  34. Lampinen, A., Tamminen, S., and Oulasvirta, A. 2009. All My People Right Here, Right now: Management of Group Co-presence on a Social Networking Site. In Proceedings of the ACM 2009 International Conference on Supporting Group Work:281-290.
  35. Lapointe, L., and Rivard, S. 2005. "A Multilevel Model of Resistance to Information Technology Implementation." MIS Quarterly 29(3):461-491. https://doi.org/10.2307/25148692
  36. Laufer, R. S., Proshansky, H. M., and Wolfe, M. 1973. "Some Analytic Dimensions of Privacy." In Third International Architectural Psychology Conference, Lund, Sweden.
  37. Leary, M. R., and Kowalski, R. M. 1990. "Impression Management: A Literature Review and Two-component Model." Psychological Bulletin 107(1):34-47. https://doi.org/10.1037/0033-2909.107.1.34
  38. Lee, D., Bang, Y., and Bae, Y. 2010. "Privacy Calculus and the Role of Information Transparency in Personal Information Disclosure." Informatization Policy 17(2):68-85.
  39. Lee, D., and Lim, S. 2006. "The Motivations and Consequences of Voluntary Self-Disclosure by Blog Users." The Korean Journal of Advertising 17(5):227-240.
  40. Li, H., Sarathy, R., and Xu, H. 2011. "The Role of Affect and Cognition on Online Consumers' Decision to Disclose Personal Information to Unfamiliar Online Vendors." Decision Support Systems 51(3):434-445. https://doi.org/10.1016/j.dss.2011.01.017
  41. Lwin, M., Wirtz, J., and Williams, J. D. 2007. "Consumer Online Privacy Concerns and Responses: A Power-responsibility Equilibrium Perspective." Journal of the Academy of Marketing Science 35(4):572-585. https://doi.org/10.1007/s11747-006-0003-3
  42. Malhotra, N. K., Kim, S. S., and Agarwal, J. 2004. "Internet Users' Information Privacy Concerns (IUIPC): the Construct, the Scale, and a Causal Model." Information Systems Research 15(4):336-355. https://doi.org/10.1287/isre.1040.0032
  43. Maher, P. M., and Rubenstein, A. H. 1974. "Factors Affecting Adoption of a Quantitative Method for R&D Project Selection." Management Science 21(2):119-129. https://doi.org/10.1287/mnsc.21.2.119
  44. Mayer, R. C., Davis, J. H., and Schoorman, F. D. 1995. "An Integrative Model of Organizational Trust." Academy of Management Review 20(3):709-734.
  45. Mitchell, V. W., Davies, F., Moutinho, L., and Vassos, V. 1999. "Using Neural Networks to Understand Service Risk in the Holiday Product." Journal of Business Research 46(2):167-180. https://doi.org/10.1016/S0148-2963(98)00020-4
  46. Milne, G. R., and Boza, M. E. 1999. "Trust and Concern in Consumers' Perceptions of Marketing Information Management Practices." Journal of Interactive Marketing 13(1):5-24. https://doi.org/10.1002/(SICI)1520-6653(199924)13:1<5::AID-DIR2>3.0.CO;2-9
  47. Moon, H., Choi, B., and Nae, E. 2011. "Review of Trust Research Trends and Recommendations for Future Research Direction in Korea." Korean Management Review 40(1):139-186.
  48. Park, S. B., and Chung, N. 2011. "Mediating Roles of Self-presentation Desire in Online Game Community Commitment and Trust Behavior of Massive Multiplayer Online Role-playing Games." Computers in Human Behavior 27(6):2372-2379. https://doi.org/10.1016/j.chb.2011.07.016
  49. Pavlou, P. A. 2003. "Consumer Acceptance of Electronic Commerce: Integrating Trust and Risk with the Technology Acceptance Model." International Journal of Electronic Commerce 7(3):101-134.
  50. Pavlou, P. A., and Gefen, D. 2004. "Building Effective Online Marketplaces with Institution-based Trust." Information Systems Research 15(1):37-59. https://doi.org/10.1287/isre.1040.0015
  51. Pavlou, P. A., Liang, H., and Xue, Y. 2007. "Understanding and Mitigating Uncertainty in Online Exchange Relationships: A Principal-agent Perspective." MIS Quarterly 31(1):105-136. https://doi.org/10.2307/25148783
  52. Phelps, J., Nowak, G., and Ferrell, E. 2000. "Privacy Concerns and Consumer Willingness to Provide Personal Information." Journal of Public Policy & Marketing 19(1):27-41. https://doi.org/10.1509/jppm.19.1.27.16941
  53. Ram, S. 1987."A Model of Innovation Resistance."Advances in Consumer Research 14:208-212.
  54. Rice, R. E., and Love, G. 1987. "Electronic Emotion Socioemotional Content in a Computer-mediated Communication Network." Communication Research 14(1):85-108. https://doi.org/10.1177/009365087014001005
  55. Roth, D. L., Harris, R. N., and Snyder, C. R. 1988. "An Individual Differences Measure of Attributive and Repudiative Tactics of Favorable Self-presentation." Journal of Social and Clinical Psychology 6(2):159-170. https://doi.org/10.1521/jscp.1988.6.2.159
  56. Short, J., Williams, E., and Christie, B. 1976. The Social Psychology of Telecommunications. London: John Wiley & Sons.
  57. Sim, Sun Hee, and Moon, Jae Youn. 2012. "A Study on Mobile SNS Attributes Effects on Information Share, Relationship Formation, and User Satisfaction." Journal of the Korean Society for Quality Management 40(1): 60-72. https://doi.org/10.7469/JKSQM.2012.40.1.060
  58. Smith, H. J., Milberg, S. J., and Burke, S. J. 1996. "Information Privacy: Measuring Individuals' Concerns About Organizational Practices." MIS Quarterly 20(2):167-196. https://doi.org/10.2307/249477
  59. Suh, B., and Han, I. 2003. "Effect of Trust on Customer Acceptance of Internet Banking." Electronic Commerce Research and Applications 1(3):247-263.
  60. Tan, Y. H., and Thoen, W. 2000. "An Outline of a Trust Moodel for Electronic Commerce." Applied Artificial Intelligence 14(8):849-862. https://doi.org/10.1080/08839510050127588
  61. Tenenhaus, M., Vinzi, V. E., Chatelin, Y. M., and Lauro, C. 2005. "PLS Path Modeling." Computational Statistics & Data Analysis 48(1):159-205. https://doi.org/10.1016/j.csda.2004.03.005
  62. Trammell, K. D., and Keshelashvili, A. 2005. "Examining the New Influencers: A Self-presentation Study of A-list Blogs." Journalism & Mass Communication Quarterly 82(4):968-982. https://doi.org/10.1177/107769900508200413
  63. Trumbo, C. W. 1999. "Heuristic‐Systematic Information Processing and Risk Judgment." Risk Analysis 19(3):391-400.
  64. Van Slyke, C., Shim, J. T., Johnson, R., and Jiang, J. 2006. "Concern for Information Privacy and Online Consumer Purchasing." Journal of the Association for Information Systems 7(6):415-444.
  65. Vroom, V. H. 1964. Work and Motivation. New York: John Wiley & Sons.
  66. Walther, J. B., and Burgoon, J. K. 1992. "Relational communication in computer‐mediated interaction." Human Communication Research 19(1):50-88. https://doi.org/10.1111/j.1468-2958.1992.tb00295.x
  67. Wan, L., Zhang, C., and Min, D. 2013. "Antecendents to privacy concern over ubiquitous service in china." Journal of International & Commerce 9(2):171-194. https://doi.org/10.16980/jitc.9.2.201305.171
  68. Warren, S. D., and Brandeis, L. D. 1890. "The Right to Privacy." Harvard Law Review 4(5):193-220. https://doi.org/10.2307/1321160
  69. Westin, A. F. 1967. Privacy and Freedom. New York: Atheneum.
  70. Xu, H., Dinev, T., Smith, H. J., and Hart, P. 2008. Examining the Formation of Individual's Privacy Concerns: Toward an Integrative View. Proceedings of the International Conference on Information Systems, ICIS 2008, Paris, France.
  71. Yao, M. Z., and Linz, D. G. 2008. "Predicting Self-protections of Online Privacy." CyberPsychology & Behavior 11(5):615-617. https://doi.org/10.1089/cpb.2007.0208
  72. Zaltman, G., and Wallendorf, M. 1979. Consumer Behavior: Basic Findings and Management Implications. New York: John Wiley & Sons.