Browse > Article
http://dx.doi.org/10.7469/JKSQM.2014.42.3.387

A Study on the Factors Affecting the User Resistance in Social Network Service  

Park, Eunkyung (Graduate School of Business Administration, Soongsil University)
Choi, Jeongil (College of Business Administration, Soongsil University)
Yeon, Jiyoung (Graduate School of Business Administration, Inha University)
Publication Information
Abstract
Purpose: The widespread use of social network services (SNS) has caused users concern about the disclosure of their privacy or personal information. The purpose of this study is to analyze the factors of privacy concern and self presentation that affect the user resistance in the use of social network service. Methods: This study verifies the factors that affecting the user resistance in SNS. The research model suggested in this study is tested via a survey of 260 SNS users. SPSS and Smart PLS had been used to test the suggested hypotheses. Results: This study shows that privacy experience, privacy awareness, self esteem, and social desirability significantly influence perceived risk and that privacy awareness, self esteem, self efficacy, and perceived risk significantly influence perceived trust. It also verifies that perceived risk and perceived trust positively affect user resistance. Conclusion: This paper suggests that high awareness on privacy of SNS user encourages the SNS companies to consider the privacy protection mechanism for eliminating various factors that affecting the risk. This study also shows that the privacy calculus model applies to understanding the mechanism on resistance of SNS user.
Keywords
Privacy Calculus Model; Privacy Concern; Self Presentation; SNS; User Resistance;
Citations & Related Records
Times Cited By KSCI : 2  (Citation Analysis)
연도 인용수 순위
1 Chin, W. W. 1998. "The Partial Least Squares Approach to Structural Equation Modeling." Modern Methods for Business Research 295(2):295-336.
2 Cohen, J. 1988. Statistical Power Analysis for the Behavioral Sciences, 2nd ed. New York: Academic Press.
3 Culnan, M. J., and Armstrong, P. K. 1999. "Information Privacy Concerns, Procedural Fairness, and Impersonal Trust: An Empirical Investigation." Organization Science 10(1):104-115.   DOI   ScienceOn
4 Culnan, M. J., and Bies, R. J. 2003. "Consumer privacy: Balancing Economic and Justice Considerations." Journal of Social Issues 59(2):323-342.   DOI   ScienceOn
5 Dinev, T., and Hart, P. 2006. "An Extended Privacy Calculus Model for E-commerce Transactions." Information Systems Research 17(1):61-80.   DOI   ScienceOn
6 Dowling, G. R. 1985. "The Effectiveness of Advertising Explicit Warranties." Journal of Public Policy & Marketing 4:142-152.
7 Efron, B., and Tibshirani, R. 1997. "Improvements on Cross-validation: The 632+ Bootstrap Method." Journal of the American Statistical Association 92(438):548-560.
8 Ellison, N., Heino, R., and Gibbs, J. 2006. "Managing Impressions Online: Self‐presentation Processes in the Online Dating Environment." Journal of Computer‐Mediated Communication 11(2):415-441.
9 Fishbein, M., and Ajzen, I. 1975. Belief, Attitude, Intention and Behavior: An Introduction to Theory and Research, Reading. MA: Addison-Wesley.
10 Gefen, D. 2000. "E-commerce: the Role of Familiarity and Trust." Omega 28(6):725-737.   DOI   ScienceOn
11 Fogel, J., and Nehmad, E. 2009. "Internet Social Network Communities: Risk Taking, Trust, and Privacy Concerns." Computers in Human Behavior 25(1):153-160.   DOI   ScienceOn
12 Fusilier, M. R., and Hoyer, W. D. 1980. "Variables Affecting Perceptions of Invasion of Privacy in a Personnel Selection Situation." Journal of Applied Psychology 65(5):623-626.   DOI
13 Gilroy, F. D., and Desai, H. B. 1986. "Computer Anxiety: Sex, Race and Age." International Journal of Man-Machine Studies 25(6):711-719.   DOI   ScienceOn
14 Goffman, E. 1959. The Presentation of Self in Everyday Life. Garden City, NY: Doubleday.
15 Grazioli, S., and Jarvenpaa, S. L. 2000. "Perils of Internet Fraud: An Empirical Investigation of Deception and Trust with Experienced Internet Consumers." IEEE Transactions on Systems, Man and Cybernetics 30(4):395-410.   DOI   ScienceOn
16 Hair, J. F., Jr. Black, W. C., Bavin, B. J., and Anderson, R. E. 2010. Multivariate Data Analysis, 7th ed. Upper Saddle River, NJ: Prentice Hall.
17 Harris Interactive. 2002. "Privacy On and Off the Internet: What Consumers Want." Privacy and American Business Study 15229:1-127.
18 Hoadley, C. M., Xu, H., Lee, J. J., and Rosson, M. B. 2010. "Privacy as Information Access and Illusory Control: The Case of the Facebook News Feed Privacy Outcry." Electronic Commerce Research and Applications 9(1): 50-60.   DOI
19 Homans, G. C. 1961. Social Behavior: Its Elementary Forms. Oxford, England: Harcourt Brace.
20 Ko, Honseog, Kim, Chesoong, Jeong, Moonyoung, Oh, Youngjin, and Lee, Sungho. 2011. "The Effect of Social Network Service's Quality Factors on User Satisfaction and the Intention to Continued Use." Journal of the Korean Society for Quality Management 39(4): 543-555.
21 Jarvenpaa, S., and Todd, P. 1998. "An Empirical Examination of the Determinants of Attitudes and Intention toward Shopping on the Internet." Working Paper, University of Texas-Austin.
22 Jarvenpaa, S. L., Tractinsky, N., and Saarinen, L. 1999. "Consumer Trust in an Internet Store: A Cross‐cultural Validation." Journal of Computer‐Mediated Communication 5(2):1-35.
23 Kim, B. 2012. "A Study of Antecedents of Continuance Intention in Mobile Social Network Service: The Role Trust and Privacy Concerns." Knowledge Management Research 13(4):83-100.
24 Lampinen, A., Tamminen, S., and Oulasvirta, A. 2009. All My People Right Here, Right now: Management of Group Co-presence on a Social Networking Site. In Proceedings of the ACM 2009 International Conference on Supporting Group Work:281-290.
25 Lapointe, L., and Rivard, S. 2005. "A Multilevel Model of Resistance to Information Technology Implementation." MIS Quarterly 29(3):461-491.   DOI
26 Laufer, R. S., Proshansky, H. M., and Wolfe, M. 1973. "Some Analytic Dimensions of Privacy." In Third International Architectural Psychology Conference, Lund, Sweden.
27 Leary, M. R., and Kowalski, R. M. 1990. "Impression Management: A Literature Review and Two-component Model." Psychological Bulletin 107(1):34-47.   DOI
28 Lee, D., Bang, Y., and Bae, Y. 2010. "Privacy Calculus and the Role of Information Transparency in Personal Information Disclosure." Informatization Policy 17(2):68-85.
29 Maher, P. M., and Rubenstein, A. H. 1974. "Factors Affecting Adoption of a Quantitative Method for R&D Project Selection." Management Science 21(2):119-129.   DOI   ScienceOn
30 Lee, D., and Lim, S. 2006. "The Motivations and Consequences of Voluntary Self-Disclosure by Blog Users." The Korean Journal of Advertising 17(5):227-240.
31 Li, H., Sarathy, R., and Xu, H. 2011. "The Role of Affect and Cognition on Online Consumers' Decision to Disclose Personal Information to Unfamiliar Online Vendors." Decision Support Systems 51(3):434-445.   DOI   ScienceOn
32 Lwin, M., Wirtz, J., and Williams, J. D. 2007. "Consumer Online Privacy Concerns and Responses: A Power-responsibility Equilibrium Perspective." Journal of the Academy of Marketing Science 35(4):572-585.   DOI
33 Malhotra, N. K., Kim, S. S., and Agarwal, J. 2004. "Internet Users' Information Privacy Concerns (IUIPC): the Construct, the Scale, and a Causal Model." Information Systems Research 15(4):336-355.   DOI   ScienceOn
34 Mayer, R. C., Davis, J. H., and Schoorman, F. D. 1995. "An Integrative Model of Organizational Trust." Academy of Management Review 20(3):709-734.
35 Mitchell, V. W., Davies, F., Moutinho, L., and Vassos, V. 1999. "Using Neural Networks to Understand Service Risk in the Holiday Product." Journal of Business Research 46(2):167-180.   DOI   ScienceOn
36 Milne, G. R., and Boza, M. E. 1999. "Trust and Concern in Consumers' Perceptions of Marketing Information Management Practices." Journal of Interactive Marketing 13(1):5-24.   DOI
37 Moon, H., Choi, B., and Nae, E. 2011. "Review of Trust Research Trends and Recommendations for Future Research Direction in Korea." Korean Management Review 40(1):139-186.
38 Pavlou, P. A. 2003. "Consumer Acceptance of Electronic Commerce: Integrating Trust and Risk with the Technology Acceptance Model." International Journal of Electronic Commerce 7(3):101-134.
39 Park, S. B., and Chung, N. 2011. "Mediating Roles of Self-presentation Desire in Online Game Community Commitment and Trust Behavior of Massive Multiplayer Online Role-playing Games." Computers in Human Behavior 27(6):2372-2379.   DOI
40 Phelps, J., Nowak, G., and Ferrell, E. 2000. "Privacy Concerns and Consumer Willingness to Provide Personal Information." Journal of Public Policy & Marketing 19(1):27-41.   DOI   ScienceOn
41 Pavlou, P. A., and Gefen, D. 2004. "Building Effective Online Marketplaces with Institution-based Trust." Information Systems Research 15(1):37-59.   DOI   ScienceOn
42 Pavlou, P. A., Liang, H., and Xue, Y. 2007. "Understanding and Mitigating Uncertainty in Online Exchange Relationships: A Principal-agent Perspective." MIS Quarterly 31(1):105-136.   DOI
43 Ram, S. 1987."A Model of Innovation Resistance."Advances in Consumer Research 14:208-212.
44 Rice, R. E., and Love, G. 1987. "Electronic Emotion Socioemotional Content in a Computer-mediated Communication Network." Communication Research 14(1):85-108.   DOI
45 Roth, D. L., Harris, R. N., and Snyder, C. R. 1988. "An Individual Differences Measure of Attributive and Repudiative Tactics of Favorable Self-presentation." Journal of Social and Clinical Psychology 6(2):159-170.   DOI
46 Short, J., Williams, E., and Christie, B. 1976. The Social Psychology of Telecommunications. London: John Wiley & Sons.
47 Tan, Y. H., and Thoen, W. 2000. "An Outline of a Trust Moodel for Electronic Commerce." Applied Artificial Intelligence 14(8):849-862.   DOI
48 Sim, Sun Hee, and Moon, Jae Youn. 2012. "A Study on Mobile SNS Attributes Effects on Information Share, Relationship Formation, and User Satisfaction." Journal of the Korean Society for Quality Management 40(1): 60-72.   과학기술학회마을   DOI   ScienceOn
49 Trammell, K. D., and Keshelashvili, A. 2005. "Examining the New Influencers: A Self-presentation Study of A-list Blogs." Journalism & Mass Communication Quarterly 82(4):968-982.   DOI
50 Suh, B., and Han, I. 2003. "Effect of Trust on Customer Acceptance of Internet Banking." Electronic Commerce Research and Applications 1(3):247-263.
51 Tenenhaus, M., Vinzi, V. E., Chatelin, Y. M., and Lauro, C. 2005. "PLS Path Modeling." Computational Statistics & Data Analysis 48(1):159-205.   DOI   ScienceOn
52 Trumbo, C. W. 1999. "Heuristic‐Systematic Information Processing and Risk Judgment." Risk Analysis 19(3):391-400.
53 Van Slyke, C., Shim, J. T., Johnson, R., and Jiang, J. 2006. "Concern for Information Privacy and Online Consumer Purchasing." Journal of the Association for Information Systems 7(6):415-444.
54 Vroom, V. H. 1964. Work and Motivation. New York: John Wiley & Sons.
55 Walther, J. B., and Burgoon, J. K. 1992. "Relational communication in computer‐mediated interaction." Human Communication Research 19(1):50-88.   DOI   ScienceOn
56 Wan, L., Zhang, C., and Min, D. 2013. "Antecendents to privacy concern over ubiquitous service in china." Journal of International & Commerce 9(2):171-194.   DOI
57 Yao, M. Z., and Linz, D. G. 2008. "Predicting Self-protections of Online Privacy." CyberPsychology & Behavior 11(5):615-617.   DOI
58 Warren, S. D., and Brandeis, L. D. 1890. "The Right to Privacy." Harvard Law Review 4(5):193-220.   DOI   ScienceOn
59 Westin, A. F. 1967. Privacy and Freedom. New York: Atheneum.
60 Xu, H., Dinev, T., Smith, H. J., and Hart, P. 2008. Examining the Formation of Individual's Privacy Concerns: Toward an Integrative View. Proceedings of the International Conference on Information Systems, ICIS 2008, Paris, France.
61 Zaltman, G., and Wallendorf, M. 1979. Consumer Behavior: Basic Findings and Management Implications. New York: John Wiley & Sons.
62 Bauer, H. H., Grether, M., and Leach, M. 2002. "Building Customer Relations over the Internet." Industrial Marketing Management 31(2):155-163.   DOI   ScienceOn
63 Bellman, S., Johnson, E. J., Kobrin, S. J., and Lohse, G. L. 2004. "International Differences in Information Privacy Concerns: A Global Survey of Consumers." The Information Society 20(5):313-324.   DOI   ScienceOn
64 Altman, I. 1975. The Environment and Social Behavior: Privacy, Personal Space, Territory, Crowding. Monterey, CA: Brooks/Cole Publishing Company.
65 Bandura, A. 1977. "Self-efficacy: Toward a Unifying Theory of Behavioral Change." Psychological Review 84(2):191-215.   DOI   ScienceOn
66 Besmer, A., and Lipford, H. R. 2010. "Moving beyond Untagging: Photo Privacy in a Tagged World." Proceedings of the SIGCHI Conference on Human Factors in Computing Systems:1563-1572.
67 Boyed, D. M., and Ellison, N. B. 2007. "Social Network Sites: Definition, History, and Scholarship." Journal of Computer‐Mediated Communication 13(1):210-230.
68 Brod, C. 1982. "Managing technostress: Optimizing the Use of Computer Technology." Personnel Journal 61(10):753-757.
69 Cozby, P. C. 1973. "Self-disclosure: A Literature Review." Psychological Bulletin 79(2):73-91.   DOI   ScienceOn
70 Campbell, W. K., Rudich, E. A., and Sedikides, C. 2002. "Narcissism, Self-esteem, and the Positivity of Self-views: Two Portraits of Self-love." Personality and Social Psychology Bulletin 28(3):358-368.   DOI
71 Gardner, H. 1985. Frames of Mind: The Theory of Multiple Intelligences. New York: Basic Books.
72 Smith, H. J., Milberg, S. J., and Burke, S. J. 1996. "Information Privacy: Measuring Individuals' Concerns About Organizational Practices." MIS Quarterly 20(2):167-196.   DOI   ScienceOn