||The Use of Facebook and its Implications: The Motivations for Revisiting and Regular Users’ Ethical Attitude
||The Use of Facebook and its Implications: The Motivations for Revisiting and Regular Users’ Ethical Attitude
||Institute of International Management (IIMBA--Master)
Inter-Personal Privacy Concerns
Ethical Attitude towards Information Posting and Sharing (IPS)
Social Network Sites
Social Network Sites (SNSs) has brought enormous impact to the whole world; it has introduced a new way of socializing via the cyber world. Among all SNSs, Facebook (FB) is one of the most successful SNSs, which has grown exponentially in the last two years. Therefore, FB was chosen as the theme of the study so as to discover insightful details regarding SNSs. Being transparent is how FB works; it is very popular but it also causes a lot of controversy, such as arguments and disagreements regarding privacy. It attracts a lot of attention and garners plenty of criticism, which also entails public concerns about the ethics of information posting and sharing.
This study examined the relationship of six constructs: Social Influence, Perceived Trust, Habit, Inter-Personal Privacy Concerns, Continuance Intention and Ethical Attitude towards IPS. A quantitative survey was conducted in order to: 1. identify whether there are relationships among these constructs; 2. evaluate frequent FB users’ ethical attitude on information sharing and posting; and 3. assess their continuance intention of using FB. Findings indicate there are positive relationships among constructs. The study results also indicate that the continuous use of FB positively influences users’ ethical attitude towards IPS. They deem that what others think about their behavior on FB is important to them. FB users share tacit knowledge on morally sharing and posting information. Meanwhile, they would also judge the others’ FB behavior with a high perception of ethics.
TABLE OF CONTENTS IV
LIST OF TABLES IX
LIST OF FIGURES XI
CHAPTER ONE INTRODUCTION 1
1.1 Research Background. 1
1.2 Research Motivation. 6
1.3 Research Contribution. 7
1.4 Research Objectives. 8
1.5 Research Questions. 8
1.6 Research Flows. 9
1.7 The Structure of the Study. 10
CHAPTER TWO LITERATURE REVIEW 11
2.1 Social Network Sites (SNSs). 11
2.1.1 Charm of SNSs. 11
2.1.2 Threats of SNSs. 12
2.1.3 Characteristics of SNS Users. 13
2.2 Facebook (FB) Background. 13
2.2.1 Very Special Feature of FB – Newsfeed. 14
2.2.2 Facebook Principles. 14
2.2.3 The Characteristics of FB Users. 15
2.3 General Attitudes of Web Users Toward Privacy. 16
2.4 Unified Theory of Acceptance and Use of Technology (UTAUT) and Technology Acceptance Model (TAM) 2. 18
2.5 Research Variables. 21
2.5.1 Social Influence. 21
2.5.2 Habit. 22
2.5.3 Ethical Attitude towards Information Posting and Sharing (IPS). 23
2.5.4 Inter-Personal Privacy Concerns. 24
2.5.5 Perceived Trust. 25
2.5.6 Continuance Intention. 27
2.6 Relationship among Research Constructs. 28
2.6.1 Relationship between Social Influence and Perceived Trust. 28
2.6.2 Relationship between Social Influence and Inter-Personal Privacy Concern. 30
2.6.3 Relationship between Social Influence and Continuance Intention. 31
2.6.4 Relationship between Habit and Continuance Intention. 33
2.6.5 Relationship between Perceived Trust and Continuance Intention. 34
2.6.6 Relationship between Inter-Personal Privacy Concerns and Continuance Intention. 35
2.6.7 Relationship between Habit and Inter-Personal Privacy Concerns. 36
2.6.8 Relationship between Continuance Intention and Ethical Attitude towards IPS. 38
CHAPTER THREE RESEARCH DESIGN AND METHODOLOGY 40
3.1 Conceptual Model. 40
3.2 Construct Measurement. 41
3.2.1 Social Influence. 41
3.2.2 Habit. 42
3.2.3 Inter-Personal Privacy Concerns. 42
3.2.4 Perceived Trust. 43
3.2.5 Continuance Intention. 43
3.2.6 Ethical Attitudes towards Information Posting and Sharing. 43
3.3 Hypotheses to be Tested. 44
3.4 Questionnaire Design. 45
3.5 Sampling Plan. 45
3.6 Data Analysis Procedures. 45
3.6.1 Descriptive Statistics Analysis. 46
3.6.2 Factor Analysis. 46
3.6.3 Reliability Analysis and Validity Analysis. 46
3.6.4 Confirmatory Factor Analysis. 47
3.6.5 Structural Equation Model. 48
CHAPTER FOUR RESEARCH RESULTS 49
4.1 Descriptive Analysis. 49
4.1.1 Data Collection. 49
4.1.2 Characteristics of Respondents. 50
4.1.3 Measurement Result of Research Variables. 51
4.2 Reliability Tests and Validity Tests. 55
4.2.1 Social Influence. 55
4.2.2 Habit. 56
4.2.3 Perceived Trust. 57
4.2.4 Inter-Personal Privacy Concerns. 58
4.2.5 Continuance Intention. 59
4.2.6 Ethical Attitude towards IPS. 60
4.3 Descriptive Statistics and Correlation Matrix of All Variables. 61
4.4 Confirmatory Factor Analysis (CFA). 62
4.4.1 CFA of Social Influence (SI). 62
4.4.2 CFA of Habit (HB). 64
4.4.3 CFA of Perceived Trust (PT). 65
4.4.4 CFA of Inter-Personal Privacy Concern (IPC). 67
4.4.5 CFA of Continuance Intention (BI). 68
4.4.6 CFA of Ethical Attitude towards IPS(PE). 70
4.5 Structural Equation Model (SEM). 71
CHAPTER FIVE CONCLUSION AND SUGGESTIONS 79
5.1 Research Conclusions. 79
5.1.1 Relationships among Motivated Elements and FB users’ Continuance Intention of Using FB. 80
5.1.2 Mediating effect 83
5.1.3 Impacts on FB users’ Ethical Attitude towards Information Posting and Sharing After Revisiting FB. 86
5.2 Recommendations and Implications. 87
5.2.1 Social Influence and Perceived Trust. 87
5.2.2 Habit and Inter-personal Privacy Concerns. 88
5.2.3 Implications of FB users’ Ethical Attitude towards Information Posting and Sharing. 89
5.2.4 Recommendation on FB Users’ Ethical Attitude towards Information Posting and Sharing. 89
5.2.5 Mandatory Implications. 90
5.3 Research Limitations. 90
5.4 Future Research. 91
Appendix 1: List of questionnaire for “Facebook(FB) members” in English. 100
Aarts, H., Verplanken, B., & Knippenberg, A. (1998). Predicting behavior from actions in the past: repeated decision making or a matter of habit? Journal of Applied Social Psychology, 28(15), 1355-1374.
Ackerman, M. S., Cranor, L. F., & Reagle, J. (1999). Privacy in e-commerce: examining user scenarios and privacy preferences. Paper presented at the Proceedings of the 1st ACM conference on Electronic commerce.
Ajzen, I. (1985). From intentions to action: a theory of planned behaviour. In J. Kuhl & J. Beckman (Eds.), Action-control: from cognition to behaviour (pp. 11-39). Heidelberg: Springer-Verlag.
Ajzen, I., & Fishbein, M. (1980). Understanding attitudes and predicting social behavior New Jersey: Prentice-Hall.
Asherman, I., Bob, P., & Randall, J. (2001). The negotiation source book (2 revised ed.): Human Resource Development Press.
Awad, N. F., & Krishnan, M. S. (2006). The personalization privacy paradox: an empirical evaluation of information transparency and the willingness to be profiled online for personalization. MIS Quarterly, 30(1), 13-28.
Azjen, I. (1991). The theory of planned behavior. Organizational Behavior and Human Decision Processes, 50(2), 179-212.
Barkuus, L., & Dey, A. (2003). Location-based services for mobile telephony: a study of users’ privacy concerns. Paper presented at the Proceedings of the interact 2003, 9TH IFIP TC13 international conference on human-computer interaction.
Bernal, G. (2007). Customers' perceived trust, perceived usefulness, attitudes towards advertising, attitudes towards the use of legal services, and behavioral intention in Panama. NCKU, Tainan.
Bowen, J. T., & Chen, S. L. (2001). The relationship between customer loyalty and customer satisfaction. International Journal of Contemporary Hospitality Management, 13(5), 213-217.
Boyd, D. (2003). Reflections on friendster, trust and intimacy. In Intimate (Ubiquitous) Computing Workshop, Ubicomp 2003(October 12-15).
Brass, D. J., Butterfield, K. D., & Skaggs, B. c. (1998). Relationships and unethical behavior: a social network perspective. The Academy of Management Review, 23(1), 14-31.
Caruana, L. (2000). Habits and explanation [Electronic Version], from http://www.bu.edu/wcp/Papers/Cogn/CognCaru.htm
CaverLee, J., & Webb, S. (2008). A large-scale study of MySpace: observations and implications for online social networks. Association for the Advancement of Artificial Intelligence, 36-44.
Chiaramonte, P., & Martinez, E. (2006). Jerks in space. The New York Post, New York, 2006, pp.6.
Cho. (2006). A study of roles of trusts and risks in information-oriented online legal services using an integrated model. Information and Management, 43, 502-520.
Cho, J. (2006). The mechanism of trust and distrust formation and their relational outcomes. Journal of Retailing, 82(1), 25-35.
Cialdini, R. B., & Goldstein, N. J. (2004). Social Influence: compliance and conformity. Annual Review of Psychology 55, 591-621.
comScore, & GSMA. (2010, February 15). GSM Association mobile media metrics (MMM) mobile world congress seminar from http://www.comscore.com/Press_Events/Presentations_Whitepapers/2010/GSMA_Mobile_Media_Metrics_Mobile_World_Congress_Seminar
Coppola, N., Hiltz, S. R., & Rotter, N. (2004). Building trust in virtual teams. IEEE Transactions on Professional Communication, 47(2), 95-104.
Crawford, W. (2008). Ethics online. EContent (May 2008), 39.
Cronan, T. P., Leonard, L. N. K., & Kreie, J. (2005). An empirical validation of perceived importance and behavior intention in IT ethics. Journal of Business Ethics, 56, 231-238.
Cutler, B., & Schimmel, K. (1998). A relationship marketing perspective for direct marketing in the legal services industry. Journal of Professional Services Marketing, 17(1), 141-151.
Das, T. K., & Teng, B.-S. (2004). The risk-based view of trust: A conceptual framework. Journal of Business and Psychology, 19(1), 85-115.
Davis, F. (1989a). Perceived usefulness, perceived ease of use, and user acceptance of information technology. MIS Quarterly, 13(3), 319-340.
Davis, F. (2000). A theoretical extension of the technology acceptance model: four longitudinal field studies. Management Science, 46(2), 186-204.
Davis, F., Bagozzi, R., & Warshaw, P. (1989b). User acceptance of computer technology: A comparison of two theoretical models. Management Science, 35(8), 982-1003.
Deutsh, M., & Gerard, H. B. (1955). A study of normative and informational social influences upon individual judgment. Journal of Abnormal and Social Psychology, 51, 629-636.
DiMicco, J., Millen, D. R., Geyer, W., Dugan, C., Brownholtz, B., & Muller, M. (2008). Motivations for social networking at work. Computer Supported Cooperative Work November 8–12.
Donath, J., & Boyd, D. (2004). Public displays of connection. BT Technology Journal, 22, 71-82.
Dwyer. (2007). Digital relationships in the 'MySpace' generation: results from a qualitative study. Paper presented at the Proceedings of the 40th Hawaii International Conference on System Sciences (HICSS).
Dwyer, Hiltz, S. R., & Passerini, K. (2007). Trust and privacy concern within social networking sites: A comparison of Facebook and MySpace. Paper presented at the Proceedings of the Thirteenth Americas Conference on Information Systems.
Earp, J. B., & Payton, F. C. (2000). Dirty laundry: privacy issues for IT professionals. IEEE(Mar/Apr), 51-54.
Facebook.com. (2009). Facebook principles. Retrieved Jan 27, 2009, from http://www.facebook.com/home.php#/policy.php?ref=pf
Fishbein, M., & Ajzen, I. (1980). Understanding Attitudes and Predicting Social Behavior. Englewood Cliffs: Prentice Hall.
Fornell, C., & Larcker, D. F. (1981). Evaluating structural equation models with unobservable variables and measurement error. Journal of Marketing Research, 18, 39-50.
Geller, S. (1998). Behavioral intervention: designing the approach to fit your purpose. ISHN, 12, 1-15.
Grimmelmann, J. (2008). Facebook and the social dynamics of privacy (Legal studies). New York: New York Law School.
Gross, R., & Acquisti, A. (2005). Information revelation and privacy in online soical networks (the Facebook case). ACM Workshop on privacy in the electronic Society.
Gross, R., & Acquisti, A. (2006). Imagined communities: Awareness, information sharing, and privacy on the Facebook. Privacy Enhancing Technologies Workshop, 1-16.
Hair, J., Black, B., Babin, B., Anderson, R. E., & Tatham, R. L. (2006). Multivariate data analysis (6 ed.). New Jersey: Prentice Hall.
Hasib, A. A. (2008). Threats of online social networks. TKK, T-110.5190 Seminar on internetworking (April 28-29).
Hass, N. (2006, January 8). In your facebook.com. The New York Times, Education Life Supplement, pp. 30-31.
Hoffman, D. L., Novak, T. P., & Peralta, M. (1999). Building consumer trust in online environments: the case for information privacy. Communications of the ACM, 42(April 4), 80-85.
Hogben, G. (2007). Security issues and recommendations for online social networks. European Network and Information Security Agency (October), 1-36.
Jagatic, T., N.Jakobsson, & M.Menczer. (2006). Social phishing. Communications of the ACM Forthcoming.
Jarvenpaa, S., & Leidner, D. (1998). Communication and trust in global virtual teams. Journal of Computer-Mediated Communication, 3(4), 16.
Johnson, B. (2008). Facebook information should be regulated, survey says [Electronic Version]. The Guardian, from http://www.guardian.co.uk/technology/2008/jun/05/privacy.socialnetworking
Kelman, H. C. (2001). Ethical limits on the use of influence in hierarchical relationships. Social influences on ethical behavior in organizations, 11-20.
Kelman, H. C. (2006). Interests, relationships, identities: three central issues for individuals and groups in negotiating their social environment. Annual Review of Psychology, 57, 1-26.
Kerkvliet, A. (2008). Feel bad not accepting one's invitation. Tainan.
Kessler, A. (2007). Weekend interview with Facebook's Mark Zuckerberg. Wall Street Journal, Mar.
Kim, W. G., Lee, C., & Hiemstra, S. J. (2004). Effects of an online virtual community on customer loyalty and travel product purchases. Tourism Management, 25(2), 343-355.
Kyung, H. K., & Yong, M. J. (2007). Website evaluation factors and virtual community loyalty in Korea. Advances In International Marketing, 18, 231-252.
Lampe, C., Ellison, N., & Steinfield, C. (2007). A face(book) in the crowd: social searching versus social browsing. Paper presented at the Proceedings of the 20th Anniversary Conference on Computer Supported Cooperative Work.
Langer, E. J., & Moldoveanu, M. (2000). The construct of mindfulness. Journal of Social Issues, 56(1), 1-9.
Lessig, L. (1998). The architecture of privacy [Electronic Version], from http://lessig.org/content/articles/works/architecture_priv.pdf
Limayem, M., Hirt, S. G., & Cheung, C. M. K. (2003). Habit in the context of IS continuance: theory extension and scale development. Paper presented at the Proceedings of the Eleventh European Conference on Information Systems (ECIS 2003).
Lin, H.-F. (2007). The role of online and offline features in sustaining virtual communities: an empirical study. Internet Research, 17(2), 119-138.
Lipsman, A. (2008, Aug 12). Social networking explodes worldwide as sites increase their focus on cultural relevance: Facebook and Hi5 more than double global visitor bases during past year. from http://www.comscore.com/press/release.asp?press=2396
Liu, H., & Maes, P. (2005). Interest map: harvesting social network profiles for recommendations. Beyond Personalization, IUI 2005 (January 9).
Luo, X. (2002). Trust production and privacy concerns on the Internet: A framework based on relationship marketing and social exchange theory. Industrial Marketing Management, 31(2002), 111-118.
Lustig, C., Konkel, A., & Jacoby, L. L. (2004). Which route to recovery? Controlled retrieval and accessibility bias in retroactive interference. American Psychological Society, 15(Nov), 729-735.
Mannan, M., & Oorscho, P. C. v. (2008). Privacy-enhanced sharing of personal content on the web. Paper presented at the International World Wide Web Conference.
Margulis, S. T. (2003). Contemporary perspectives on privacy: social, psychological, political. Journal of Social Issues, 59(2), 243-262.
Mayer, R. C., Davis, J. H., & Schoorman, D. (1995). An integrative model of organizational trust. Academy of Management Review, 20(3), 709-734.
McMillan, D. W., & Chavis, D. M. (1986). Sense of community: a definition and theory. Journal of Community Psychology, 14(1), 6-23.
Metzger, M. J. (2004). Privacy, trust, and disclosure: exploring barriers to electronic commerce. Journal of Computer-Mediated Communication (Vol. 9), 4.
Meyerson, D., Weick, K. E., & Kramer, R. M. (1996). Swift trust and temporary groups,” in R. M. Kramer. Thousand Oaks, CA: Sage.
Mintz, H. (2005). Friendster's 'eww' moment” The Wall Street Journal, B.1.
Morgan, R. M., & Hunt, S. D. (1994). The commitment-trust theory of relationship marketing. Journal of Marketing, 58(3), 20-38.
Niyaz. (2008). Should Facebook information should be regulated, survey says [Electronic Version], from http://initialm.wordpress.com/2008/06/08/facebook-information-should-be-regulated-survey-says/?referer=sphere_related_content/
O'Malley, G. (2009). Privacy a major concern among web surfers [Electronic Version]. Online Media Daily. Retrieved April 20th, 2009, from http://www.mediapost.com/publications/?fa=Articles.showArticle&art_aid=100617
O'Reilly, T. (2007). Changing attitudes towards privacy [Electronic Version], from http://blogs.oreilly.com/cgi-bin/mt/mt-t.cgi/5372
O’Murchu, I., Breslin, J. G., & Decker, S. (2004). Online social and business networking communities. Galway, Ireland: Digital Enterprise Research Instituteo.
Owyang, J. (2010, January 19). A Collection of Social Network Statistics for 2010. from http://www.web-strategist.com/blog/2010/01/19/a-collection-of-social-network-stats-for-2010/
Pérez, R. L. (2005). Reciprocity, social Influence, and trust. Universitat Autònoma de Barcelona, Barcelona.
Pan, P.-L. (2006). The effects of habit and social influence on the Blog user's use intention in Taiwan. NCKU, Tainan.
PCC research: public concern about social networking and privacy. (2008). Paper presented at the Press complaints commission. from http://www.pcc.org.uk/news/index.html?article=NTEzMg==
Perez, S. (2008). Should social networks be regulated? UK says yes, EU says considering, is US Next? [Electronic Version]. Read Write Web, from http://www.readwriteweb.com/archives/should_social_networks_be_regulated.php
Piccoli, G., & Ives, B. (2003). Trust and the unintended effects of behavior control in virtual teams. MIS Quarterly 27(3), 365-395.
Read, B. (2006). Think before you share: students' online socializing can have unintended consequences. Washington, DC: Chronicle of Higher Education.
Ritter, B. A. (2006). Can business ethics be trained? A study of the ethical decision-making process in business students. Journal of Business Ethics 68, 153-164.
Robin, D. P., Reidenbach, R. E., & Forrest, P. J. (1996). The perceived importance of an ethical issue as an influence on the ethical decision-making of ad managers. Journal of Business Research, 35, 17-28.
Roloff, M. E. (1981). Interpersonal communication: the social exchange approach. Beverly Hills, CA: Sage Publications Inc.
Rose, J. M. (2007). Corporate directors and social responsibility; ethics versus shareholder value. Journal of Business Ethics, 73, 319-331.
Rosenblum, D. (2007). What anyone can know: the privacy risks of social networking sites. Institute of Electrical and Electronics Engineers (July), 40-49.
Rotenbergr, M., Verdi, J., Nguyen, K., Kaprove, J., Phillips, M., & McCall, G. (Dec 17, 2009). Complaint, request for investigation, injunction, and other relief. Electronic privacy information center, Federal Trade Commission. Washington, DC
Sergio, R. (2007). The ethics of online retailing: a scale development and validation from the consumers' perspective. Journal of Business Ethics, 72, 131-148.
Shih, J. C., & Farn, C. K. (2008). Behavior and social influence in knowledge sharing: intention formation and the moderating role of knowledge type. Springer-Verlag Berlin Heidelberg, Practical Aspects of Knowledge Management (LNAI 5345), 3-13.
Sirdeshmukh, D., Singh, J., & Sabol, B. (2002). Consumer trust, value, and loyalty in relational exchanges. Journal of Marketing, 66(1), 15-37.
Stutzman, F. (2006). An evaluation of identity-sharing behavior in social network communities. In: proceedings of the 2006 iDMAa and IMS code conference, Oxford, Ohio
Thompson, R. L., Higgins, C. A., & Howell, J. M. (1994). Influence of experience on personal computer utilization: Testing a conceptual model. Journal of Management Information System, 11(1), 167-187.
Venkatesh, V., Morris, M., Davis, G., & Davis, F. (2003). User acceptance of information technology: Toward a unified view. MIS Quarterly, 27(3), 425-478.
Wan, Y., Kumar, V., & Bukhari, A. (2008). Will the overseas expansion of Facebook succeed? IEEE Computer Society, May/June, 69-73.
Wikipedia. (2010). Social Networking Websites. from http://en.wikipedia.org/wiki/Social_networking_websites
Wong, P. Y. (2008). Factors affecting individual’s intention to continue participating in a social networking site. Hong Kong Baptist University Hong Kong.
Youn, S. (2009). Determinants of online privacy concern and its influence on privacy protection behaviors among young adolescents. Journal of Consumer Affairs, 43(3), (Fall), 386-418.