DOI QR코드

DOI QR Code

When in danger, who will help you? Two types of trust in technical coping on online platforms

  • Lee, Saerom (Kyungpook National University, School of Business Administration)
  • Received : 2023.11.10
  • Accepted : 2023.12.02
  • Published : 2023.12.31

Abstract

Purpose Social networking service (SNS) platforms employ distinct networking strategies to meet the varying needs of their users, resulting in divergent sets of technological functionalities offered by each platform. Consequently, unique features on various SNSs give rise to distinct social issues. Moreover, the available technical coping mechanisms for users vary significantly across platforms. Design/methodology/approach Therefore, this study analyzes the factors affecting technical coping intention based on technical functions of SNSs for users exposed to cybercrime, such as sexual harassment. We divide coping intention into active and passive coping intention. Furthermore, this research focuses on trust as an antecedent of coping intention and verifies how human and system-like trust affects two coping intentions in different directions. Findings Findings reveal that system-like trust significantly affects both active and passive coping intention as a belief in whether the technology will work properly. However, in the case of human-like trust, trust in the platform provider was found to negatively affect passive coping, which is considered unsocialized behavior on SNS platforms. Therefore, both human-like and system-like trust for the platform must be appropriately applied to cope with the problem while activating the platform.

Keywords

Acknowledgement

This work was supported by the Ministry of Education of the Republic of Korea, the National Research Foundation of Korea (NRF-2023S1A5A8079952)

References

  1. 이서현, 이새롬, 곽동헌 "언제 나 자신을 보호하는가? 소셜 미디어에서 온라인 성희롱 에 대한 회피 동기: 위협 회피 이론을 기반으로," 지식경영연구, 23권, 3호, 2022, pp. 45-64.  https://doi.org/10.15813/KMR.2022.23.3.003
  2. Buchwald, P., and Schwarzer, C. (2003). "The exam-specific strategic approach to coping scale and interpersonal resources," Anxiety, Stress & Coping, Vol. 16, No. 3, pp. 281-291. https://doi.org/10.1080/1061580031000095434
  3. Califf, C. B., Brooks, S., and Longstreet, P. "Human-like and system-like trust in the sharing economy: The role of context and humanness," Technological Forecasting and Social Change, Vol. 154, 2020, 119968.
  4. Camacho, S., Hassanein, K., and Head, M. M. The impact of cyberbullying on users' continuance intention: the roles of perceived cyberbullying severity and coping mechanisms. In Proceedings of European Conference on Information Systems, 2013, p. 4.
  5. Carver, C. S., Scheier, M. F., and Weintraub, J. K. "Assessing coping strategies: a theoretically based approach," Journal of Personality and Social Psychology, Vol. 56, No. 2, 1989, 267.
  6. Chan, T. K., Cheung, C. M., and Wong, R. Y. "Cyberbullying on social networking sites: The crime opportunity and affordance perspectives," Journal of Management Information Systems, Vol. 36, No. 2, 2019, pp. 574-609. https://doi.org/10.1080/07421222.2019.1599500
  7. Chan, T. K., Cheung, C. M., and Lee, Z. W. 2021. "Cyberbullying on social networking sites: A literature review and future research directions," Information & Management, Vol. 58, No. 2, 2021, 103411.
  8. Chaudhuri, A., and Holbrook, M. B. "The chain of effects from brand trust and brand affect to brand performance: the role of brand loyalty," Journal of Marketing, Vol. 65, No. 2, 2001, pp. 81-93. https://doi.org/10.1509/jmkg.65.2.81.18255
  9. Chen, A., Lu, Y., Chau, P. Y., and Gupta, S. "Classifying, measuring, and predicting users' overall active behavior on social networking sites," Journal of Management Information Systems, Vol. 31, No. 3, 2014, pp. 213-253. https://doi.org/10.1080/07421222.2014.995557
  10. Chen, Y., Luo, X. R., and Li, H. "Beyond adaptive security coping behaviors: Theory and empirical evidence," Information & Management, Vol. 59, No. 2, 2022, 103575.
  11. Del Rey, R., Lazuras, L., Casas, J. A., Barkoukis, V., Ortega-Ruiz, R., and Tsorbatzoudis, H. "Does empathy predict (cyber) bullying perpetration, and how do age, gender and nationality affect this relationship?," Learning and Individual Differences, Vol. 45, 2016, pp. 275-281. https://doi.org/10.1016/j.lindif.2015.11.021
  12. Frison, E., Subrahmanyam, K., and Eggermont, S., "The short-term longitudinal and reciprocal relations between peer victimization on Facebook and adolescents' well-being," Journal of Youth and Adolescence, Vol. 45, No. 9, 2016, pp. 1755-1771. https://doi.org/10.1007/s10964-016-0436-z
  13. Fornell, C., and Larcker, D. F. "Evaluating structural equation models with unobservable variables and measurement error," Journal of Marketing Research, Vol. 18, No. 1, 1981, pp. 39-50. https://doi.org/10.1177/002224378101800104
  14. Fox, J., and Tang, W. Y. "Women's Experiences with general and sexual harassment in online video games: Rumination, organizational responsiveness, withdrawal, and coping strategies," New Media & Society, Vol. 19, No. 8, 2017, pp. 1290-1307. https://doi.org/10.1177/1461444816635778
  15. Furneaux, B., and Wade, M. R. "An exploration of organizational level information systems discontinuance intentions," MIS Quarterly, 2011, pp. 573-598.
  16. Gefen, D., Karahanna, E., and Straub, D. W. "Trust and TAM in online shopping: An integrated model," MIS Quarterly, 2003, pp. 51-90.
  17. Geng, S., Yang, P., Gao, Y., Tan, Y., & Yang, C. "The effects of AD social and personal relevance on consumer AD engagement on social media: The moderating role of platform trust," Computers in Human Behavior, Vol. 122, 2021, 106834.
  18. Giumetti, G. W., & Kowalski, R. M. "Cyberbullying via social media and well-being," Current Opinion in Psychology, Vol. 45, 2022, 101314.
  19. Hair, J. F., Risher, J. J., Sarstedt, M., and Ringle, C. M. "When to use and how to report the reults of PLS-SEM," European Business Review, Vol. 31, No. 1, 2019, pp. 2-24. https://doi.org/10.1108/EBR-11-2018-0203
  20. Harrison, A., Mirsadikov, A., and Luu, T. "Influence of media capabilities on trust in the sharing economy," Journal of Management Information Systems, Vol. 40, No. 3, 953-982.
  21. Hu, P., and Lu, Y. (2021). "Dual humanness and trust in conversational AI: A person-centered approach," Computers in Human Behavior, 119, 2023, 106727.
  22. Jonason, P. K., Talbot, D., Cunningham, M. L., and Chonody, J. "Higher-order coping strategies: who uses them and what outcomes are linked to them," Personality and Individual Differences, Vol. 155, No. 5, 2020, 109755.
  23. Katzer, C., Fetchenhauer, D., and Belschak, F. "Cyberbullying: Who are the victims? A comparison of victimization in Internet chatrooms and victimization in school," Journal of Media Psychology, Vol. 21, No. 1, 2009, pp. 25-36. https://doi.org/10.1027/1864-1105.21.1.25
  24. De Kimpe, L., Ponnet, K., Walrave, M., Snaphaan, T., Pauwels, L., and Hardyns, W. "Help, I need somebody: examining the antecedents of social support seeking among cybercrime victims," Computers in Human Behavior, Vol. 108, 2020, 106310.
  25. Knapp, D. E., Faley, R. H., Ekeberg, S. E., and Dubois, C. L. "Determinants of target responses to sexual harassment: A conceptual framework," Academy of Management Review, Vol. 22, No. 3, 1997, pp. 687-729. https://doi.org/10.5465/amr.1997.9708210723
  26. Krasnoff, B., How to hide, unfriend, or block someone on Facebook. The Verge. https://www.theverge.com/21431074/facebook-how-to-hide-unfriend-block-posts., (2020, September 11)
  27. Lankton, N. K., McKnight, D. H., and Tripp, J. "Technology, humanness, and trust: rethinking trust in technology," Journal of the Association for Information Systems, Vol. 16, No. 10, 2015, p. 1.
  28. Lewicki, R.J. and Wiethoff, C. Trust, Trust Development, and Trust Repair. In E.C. Marcus, M. Deutsch, and P.T. Coleman, (eds.), The Handbook of Conflict Resolution: Theory and Practice, 2000, pp. 86-107.
  29. Lowry, P. B., Zhang, J., Wang, C., and Siponen, M. "Why do adults engage in cyberbullying on social media? An integration of online disinhibition and deindividuation effects with the social structure and social learning model," Information Systems Research, Vol. 27, No. 4, 2016, pp. 962-986. https://doi.org/10.1287/isre.2016.0671
  30. Malamut, A. B., and Offermann, L. R. "Coping with sexual harassment: personal, environmental, and cognitive determinants." Journal of Applied Psychology, Vol. 86, No. 6, 2001, 1152.
  31. Mayer, R. C., Davis, J. H., and Schoorman, F. D. "An integrative model of organizational trust," Academy of Management Review, Vol. 20, No. 3, 1995, pp. 709-734. https://doi.org/10.5465/amr.1995.9508080335
  32. McHugh, B. C., Wisniewski, P., Rosson, M. B., and Carroll, J. M. "When social media traumatizes teens: The roles of online risk exposure, coping, and post-traumatic stress," Internet Research. 2018,
  33. McKnight, D. H., Choudhury, V., and Kacmar, C. (2002). "Developing and validating trust measures for e-commerce: An integrative typology," Information Systems Research, Vol. 13, No. 3, pp. 334-359.
  34. Mcknight, D. H., Carter, M., Thatcher, J. B., and Clay, P. F. "Trust in a specific technology: An investigation of its components and measures," ACM Transactions on Management Information Systems, Vol. 2, No. 2, 2011, pp. 1-25. https://doi.org/10.1145/1985347.1985353
  35. Merten, L. "Block, hide or follow-personal news curation practices on social media," Digital Journalism, Vol. 9, No. 8, 2021, pp. 1018-1039. https://doi.org/10.1080/21670811.2020.1829978
  36. Mickelson, K.D., Lyons, R.F., Sullivan, M.J.L. and Coyne, J.C. (2001). Yours, Mine, Ours: the Relational Context of Communal Coping. In: Sarason, B.R. and Duck, S.W. (Eds.), Personal Relationships: Implications for Clinical and Community Psychology, pp. 181/200. Wiley & Sons, Sussex"
  37. Mosteller, J., and Poddar, A. "To share and protect: using regulatory focus theory to examine the privacy paradox of consumers' social media engagement and online privacy protection behaviors," Journal of Interactive Marketing, Vol. 39, No. 1, 2017, pp. 27-38. https://doi.org/10.1016/j.intmar.2017.02.003
  38. Oguz, A., Mehta, N., and Palvia, P. "Cyberbullying in the workplace: a novel framework of routine activities and organizational control," Internet Research, Vol. 33, No. 6., 2023, pp. 2276-2307. https://doi.org/10.1108/INTR-05-2021-0288
  39. Partouche-Sebban, J., Rezaee Vessal, S., Sorio, R., Castellano, S., Khelladi, I., and Orhan, M. A. "How death anxiety influences coping strategies during the COVID-19 pandemic: Investigating the role of spirituality, national identity, lockdown and trust," Journal of Marketing Management, Vol. 37, No. 17-18, 2021, pp. 1815-1839. https://doi.org/10.1080/0267257X.2021.2012232
  40. Pearlin, L. I., and Schooler, C. "The structure of coping," Journal of Health and Social Behavior, 1978, pp. 2-21.
  41. Podskoff, R.M. and Organ, D.W. "Self-reports in organizational research: problems an prospects", Journal of Management, Vol. 12 No. 4, 1986, pp. 531-544. https://doi.org/10.1177/014920638601200408
  42. Santre, S., and Pumpaibool, T. "Effects of blended learning program for cyber sexual harassment prevention among female high school students in Bangkok, Thailand," International Journal of Environmental Research and Public Health, Vol.19, No. 13, 2022, 8209.
  43. Scarduzio, J. A., Sheff, S. E., and Smith, M. "Coping and sexual harassment: how victims cope across multiple settings," Archives of Sexual Behavior, Vol. 47, 2018, pp. 327-340. https://doi.org/10.1007/s10508-017-1065-7
  44. Schwarzer, C., and Buchwald, P. "Examination stress: measurement and coping," Anxiety, Stress & Coping, Vol. 16, No. 3, 2003, pp. 247-249. https://doi.org/10.1080/1061580031000095407
  45. Shambhavee, H. M. "Cyber-stalking: threat to people or bane to technology," International Journal on Trend in Scientific Research and Development, Vol. 3, No. 2, 2019, pp. 350-355. https://doi.org/10.31142/ijtsrd21354
  46. Slonje, R., Smith, P. K., and Frisen, A. "The nature of cyberbullying, and strategies for prevention," Computers in Human Behavior, Vol. 29, No. 1, 2013, pp. 26-32. https://doi.org/10.1016/j.chb.2012.05.024
  47. Soomro, T. R., and Hussain, M. "Social media-related cybercrimes and techniques for their prevention," Applied Computer Systems, Vol. 24, No. 1, 2019, pp. 9-17. https://doi.org/10.2478/acss-2019-0002
  48. Tokunaga, R. S. "Following you home from school: A critical review and synthesis of research on cyberbullying victimization," Computers in Human Behavior, Vol. 26, No. 3, 2010, pp. 277-287. https://doi.org/10.1016/j.chb.2009.11.014
  49. Trekels, J., Ward, L. M., and Eggermont, S. I "like" the way you look: how appearance-focused and overall facebook use contribute to adolescents' self-sexualization, Computers in Human Behavior, Vol. 81, 2018, pp. 198-208. https://doi.org/10.1016/j.chb.2017.12.020
  50. Vance, A., Elie-Dit-Cosaque, C., and Straub, D. W. "Examining trust in information technology artifacts: the effects of system quality and culture," Journal of Management Information Systems, Vol. 24, No. 4, 2008, pp. 73-100. https://doi.org/10.2753/MIS0742-1222240403
  51. Vandoninck, S., and d'Haenens, L. "Women's experiences with general and sexual harassment in online video games: rumination, organizational responsiveness, withdrawal, and coping strategies," New Media & Society, Vol. 19, No. 8, 2015, pp. 1290-1307.
  52. Wachs, S., Gamez-Guadix, M., Wright, M. F., Gorzig, A., and Schubarth, W. "How do adolescents cope with cyberhate? psychometric properties and socio-demographic differences of a coping with cyberhate scale," Computers in Human Behavior, Vol. 104, 2020, pp. 106167.
  53. Wu, T. Y., Xu, X., and Atkin, D. "The alternatives to being silent: exploring opinion expression avoidance strategies for discussing politics on Facebook," Internet Research, Vol. 30, No. 6, 2020, pp. 1709-1729. https://doi.org/10.1108/INTR-06-2018-0284