進階搜尋


 
系統識別號 U0026-0812200915120926
論文名稱(中文) Job Seekers Information Privacy Concerns, Trust in Social Networking Sites (SNSs) and Behavioral Intentions to Use SNSs as Job Seeking Tool
論文名稱(英文) Job Seekers Information Privacy Concerns, Trust in Social Networking Sites (SNSs) and Behavioral Intentions to Use SNSs as Job Seeking Tool
校院名稱 成功大學
系所名稱(中) 國際經營管理研究所碩士班
系所名稱(英) Institute of International Management (IIMBA--Master)
學年度 97
學期 2
出版年 98
研究生(中文) 伊芙娜
研究生(英文) Tatiana Lishchenko
學號 ra696730
學位類別 碩士
語文別 英文
論文頁數 52頁
口試委員 口試委員-鄭至甫
指導教授-史習安
召集委員-張紹基
中文關鍵字 none 
英文關鍵字 Job seekers' behavioral intentions  Trust in SNSs  Information privacy concern  Internet social network sites 
學科別分類
中文摘要 none
英文摘要 Internet Social Networking sites (SNSs) are formed on the Internet allowing individuals with similar interests to interact on a social level. Companies regard this platform as a new market place, and its members as current or future customers. Recently companies have started to treat social networking sites as recruitment tool in order to avoid missing out on highly-qualified candidates who frequent these sites. It is believed that SNSs are giving employers the ability to connect with job seekers on a more personal level than before. Due to innovativeness of the topic, previous studies have not combined together recruitment and SNS, and therefore there is no model that would integrate relevant research variables to verify the cause of job seekers’ behavioral intentions to use SNS as job seeking tool. This research was intended to fill in the gap, and investigates influence of information privacy concerns and trust in SNSs on job seekers’ behavioral intentions concerning the use of the SNS as a job source.
This study surveyed and collected 154 questionnaires. The results indicated that trust in SNSs and SNS experience have significant influences on job seekers behavioral intentions in SNSs, while the influence of privacy concern on job seekers behavioral intentions is fully mediated by trust in SNSs.
論文目次 ACKNOWLEDGMENT I
ABSTRACT II
TABLE OF CONTENTS III
LIST OF TABLES VI
LIST OF FIGURES VII
CHAPTER ONE INTRODUCTION 1
1.1 Research Background and Motivation. 1
1.1.1 Job Searching Tools Classifications. 3
1.1.2 Social Networking Sites Definition. 5
1.2 Research Objectives. 8
1.3 Research Project. 9
1.4 Research Procedure. 9
1.5 The Structure of this Study. 10
CHAPTER TWO LITERATURE REVIEW 12
2.1 Definitions of Relevant Research Variables. 12
2.1.1 Information Privacy Concerns. 12
2.1.2 SNS Experience. 14
2.1.3 Trust in SNSs. 14
2.1.4 Job Seekers’ Behavioral Intention in SNS. 15
2.2 Interrelationship among Research Constructs. 16
2.2.1 Influence of Information Privacy Concerns on Trust in SNSs. 16
2.2.2 Influence of SNS Experience on Behavioral Intentions in SNSs. 18
2.2.3 Influence of Trust in SNS on Job Seekers’ Behavioral Intentions in SNSs. 19
2.2.4 Influence of Information Privacy Concerns on Job Seekers’ Behavioral Intentions in SNSs. 20
CHAPTER THREE RESEARCH DESIGN AND METHODOLOGY 22
3.1 The Conceptual Model. 22
3.2 Construct Measurement. 23
3.2.1 Internet Privacy Concerns. 23
3.2.2 SNS Experience. 24
3.2.3 Trust in SNS. 25
3.2.4 Job Seekers’ Behavioral Intentions in SNS. 25
3.3 Hypotheses to Be Tested. 26
3.4 Questionnaire Design. 26
3.5 Sampling Plan. 27
3.6 Data Analysis Procedures. 27
3.6.1 Descriptive Statistics Analysis. 27
3.6.2 Factor Analysis. 27
3.6.3 Structure Equation Modeling (SEM) 28
CHAPTER FOUR RESEARCH FINDINGS 29
4.1 Samples and Data Collection Procedures. 29
4.2 Characteristics of Respondents. 29
4.3 Confirmatory Factor Analysis (CFA). 31
4.4 Descriptive Statistics and Correlation for all Variables. 34
4.5 Structure Equation Modeling (SEM). 35
4.5.1 Overall Model Fit. 38
4.5.2 Path Results. 38
CHAPTER FIVE CONCLUSION AND SUGGESTIONS 40
5.1 Research Conclusion. 40
5.2 Limitation and Future Research. 41
REFERENCES 43
APPENDIX 49
參考文獻 Ajzen, I. (1991). The theory of planned behavior. Organizational Behavior and Human Decision Process, 50(179-211).
Ajzen, I., & Fishbein, M. (1980). Understanding attitudes and predicting social behavior. Englewood Cliffs, NJ: Prentice Hall.
Alba, J. W., & Hutchinson, J. W. (1987). Dimensions of consumer expertise. Journal of Consumer Research, 13(March), 411-454.
Anderson, J. C., & Gerbin, D. W. (1988). Structural equation modeling in practice: A review and recommended two-step approach. Psychological Bulletin, 103(3), 411-423.
Andrews, S. (2002). Privacy and human rights 2002: An international survey of privacy laws and developments. Retrieved January, 19, 2009, from http://www.privacyinternational.org/survey/phr2002/
Bagozzi, R. P., & Edwards, J. R. (1998). A general approach for representing constructs in organizational research. Organiational Research Methods, 1, 45-87.
Barak, A. (2008). Psychological Aspects of Cyberspace: Cambridge University Press.
Baumgartner, H., & Homburg, C. (1996). Applications of structural equation modeling in marketing and consumer research: A review. International Journal of Research in Marketing, 13(2), 139-161.
Bentler, P. M. (2007). On tests and indices for evaluating structural model. Personality and Individual Differences, 42(5), 825-829.
Berne, C., Mugica, J. M., & Rivera, P. (2005). The managerial ability to control the varied behavior of regular customers in retailing: Interformat differences. Journal of Retailing and Consumer Services, 12(3), 151-164.
Betts, M. (2001). Turning browsers into buyers. MIT Sloan Management Review(Winter), 8-9.
Beyond.com. (2008). Social networking and its impact on online recruitment Retrieved January 20, 2008, from http://www.careermag.com/articles/i/ad3637/blogs/business-professional/social-networking-its-impact-on-online-recruitment.htm
Blessing, J. (2008). Facing up the talent crunch [Electronic Version]. Taleo. Retrieved January 18, 2009, from http://www.taleo.com/products/media/pdf/FacingUp_advertorial_0308.pdf
Borstorff, P. C., Marker, M. B., & Bennett, D. S. (2007). Online recruitment: Attitudes and behaviors for job seekers. Journal of Strategic E-commerce, 5, 1-23.
Boyd, D. M., & Ellison, N. B. (2008). Social networking sites: Definitions, history, and scholarship. Journal of Computer-Mediated Communication, 13, 210-230.
Byrne, B. M. (2006). Structural equation modeling with AMOS: Basic concepts, applications, and programming. New Jersey: Lawrence Erlbaum Associates.
Cambell, A. J. (1997). Relationship marketing in consumer markets: A comparison of managerial and consumer attitudes about information privacy. Journal of Direct Marketing, 11(3), 44-57.
Chellappa, R. K., & Sin, R. G. (2005). Personalization versus privacy: An empirical examination of the online consumer's dilemma. Information Technology and Management, 6, 181-202.
Chen, C.-C., & Su-Chao, C. (2005). Discussion on the behavior intention model of consumer online shopping. Journal of Business & Management, 11(1), 41-57.
Cooper, D. R., & Schindler, P. S. (2001). Business research methods. New York: McGraw-Hill.
Cooper, D. R., & Schindler, P. S. (2003). Business research methods. New York: McGraw-Hill.
Costello, S. (2001). Surfers balk at providing personal data. PCWorld.
Culnan, M. J. (1995). Consumer awareness of name removal procedures: Implications for direct marketing. Journal of Direct Marketing, 9(2), 10-19.
Culnan, M. J., & Armstrong, P. (1999). Information privacy concerns, procedural fairness, and impersonal trust: An empirical investigation. Organizational Science, 10(1), 104-115.
Culnan, M. J., & Bies, R. J. (2003). Consumer privacy: Balancing economic and justice considerations. The Society for the Psychological Study of Social Issues, 59(2), 323-342.
Dinev, T., & Hart, P. (2003). Privacy concerns and Internet use - A model of trade -off factors. Paper presented at the Annual Academy of Management Conference.
Eagley, A. H., & Chaiken, S. (1993). The psychology of attitudes. Orlando, FL: Harcourt Brace Jovanovich Inc.
Executive job board survey. How can you develop your career and personal brand on the web? [Electronic. (2008). Version]. Harvey Nash. The Power of Talent. Retrieved January 20, 2008, from http://www.exec-appointments.com/images/articles/Executive%20Job%20Board%20Survey%202008.pdf
Farley, J. U., Lehmann, D. R., & Ryan, M. J. (1981). Generalizing from "imperfect" replication. Journal of Business, 54, 597-610.
Fazio, R. H., & Zanna, M. (1978). Attitudinal qualities relating to the strength of the attitude behavior relationship. Journal of Experimental Social Psychology, 14(4), 398-408.
Feldman, D. C., & Klaas, B. S. (2002). Internet job hunting: A field study of applicant experiences with on-line recruiting. Human Resource Management, 41(2), 175.
Fishbein, M., & Ajzen, I. (1975). Understanding attitudes and predicting social behavior. Englewood Cliffs, NJ: Prentice-Hall.
Flicker, M. H. (2004). Securities trading on the Internet. In H. Bidgoli (Ed.), The Internet encyclopedia (pp. 944): John Wiley and Sons.
Fox, S. (2000). Trust and privacy online: Why Americans want to rewrite the rules: The Pew Internet and American Life Project.
Fukuyama, F. (1996). Trust still counts in a virtual world. Forbes ASAP Supplement, No. 01227051, 33-69.
Gefen, D. (2000). E-commerce: The role of familiarity and trust. Omega, 28(6), 725.
Gefen, D., Karahanna, E., & Straub, D. W. (2003). Trust and TAM in online shopping: An intergative model. MIS Quarterly, 27(1), 51-90.
George, J. F. (2002). Influence on the intent to make Internet purchases. Internet Research, 12(2), 165-180.
Golob, R. D. (2003). Assesing the adequacy of structural equation models: Golden rules and editorial policies. Transportation Research: Part B, 37(1), 1-25.
Grazioli, S., & Jarvenpaa, S. L. (2000). Perils of internet fraud: An empirical investigation of deception and trust with experienced Internet consumers. IEEE Transaction on Systems, Man, and Cybernetics, Part A: Systems and Humans, 30(4), 395-410.
Hair Jr., B., Black, W., Babin, B. J., Andrews, R. E., & Tatham, R. L. (2006). Multivariate data analysis (6th.ed). New Jersey: Prentice Hall.
Hamilton, B. (2006). Internet becomes primary hiring source. Expansion Management, 21(3), 4.
Hoffman, R. D., & Novak, T. (2002). Building consumer trust online. Communications of the Association for Computing Machinery, 42(4), 80-85.
Jarvenpaa, S. L., & Leidner, D. (1998). Communication and trust in global virtual teams. Journal of Computer-Mediated Communication, 3, 4.
Joreskog, K. G., & Sorbom, D. (1982). Recent developments in structural equation modelling. Journal of Marketing Research, 19(4), 404-416.
Khosrow-Pour, M. (2007). Web technologies for commerce and services online: Idea Group Inc.
Kim, H., Xu, Y., & Koh, J. (2004). A comparison of online trust building factors between potential customers and repeat customers. Journal of Association for Information Systems, 5(10), 392-420.
Lin, B., & Staisnskaya, V. S. (2002). Data warehousing management issues in online recruiting. Human Systems Management, 21, 1-8.
Liu, C., Marchewka, J. T., Lu, J., & Yu, C.-S. (2005). Beyond concern - a privacy-trust-behavioral intention model of electronic commerce. Information Management, 42(2), 289-304.
Malhotra, N. K., Kim, S. S., & Agarwal, J. (2004). Internet user' information privacy concerns (IUIPC): The construct, the scale, and a causal model. Information Systems Research, 15(4), 336-355.
Mayer, R. C., Davis, J. H., & Schoorman, F. D. (1995). An integrative model of organizational trust. The Academy of Management Review, 20(3), 709-734.
McIntosh, C. N. (2007). Rethinking fit assessment in structural equation modelling: A commentary and elaboration of Barrett. Personality and Individual Differences, 42(5), 859-867.
McKnight, D. H., Cummings, L. L., & Chervany, N. L. (1998). Initial trust formation in new organizational relationships. Academy of Management Review, 23(3), 473-490.
McLean, C. (2006). A foot in the door: IT. Certification Magazine, 8(4), 38-40.
Metzger, M. J. (2004). Privacy, trust and disclosure: Exploring barriers to electoronic commerce. Journal of Computer-Mediated Communication, 9(4).
Metzger, M. J. (2006). Privacy, trust, and disclosure: Exploring barriers to electronic commerce, Journal of Computer-Mediated Communication (Vol. 9).
Meyerson, D., Weick, K. E., & Kramer, R. M. (1996). "Shift trust and temporary groups", in R.M. Kramer, Tyler, T.R.(Ed.) Trust in organizations: Frontiers of theory and research. Thousands Oacks, CA: Sage Publications.
Milberg, S. J., Burke, S. J., Smith, H. J., & Kallman, E. A. (1995). Values, personal information privacy concerns, and regulatory approaches. Communications of the Association for Computing Machinery, 38(12), 65-74.
News, N. M. (2007). Internet job hunting - utilizing social media [Electronic Version]. Retrieved January 6, 2009, from http://www.newmedia.org/articles/91/1/Internet-Job-Hunting---Utilizing-Social-Media/Page1.html
Nysveen, H., & Pedersen, P. E. (2003). An exploratory study of customers' perception of company web sites offering various interactive applications: moderating effects of customer's Internet experience. Decision Support Systems, 27(1).
Olivero, N., & Lunt, P. (2004). Privacy versus willingness to disclose in e-commerce exchanges: The effect of risk awareness on the relative role of trust and control. Journal of Economic Psychology, 25(243-262).
Pavlou, P. A. (2002). What drives electronic commerce? A theory of planned behavior perspective [Electronic Version]. Academy of Management Proceedings, A1-A6, from http://search.ebscohost.com/login.aspx?direct=true&db=bth&AN=7517579&lang=zh-tw&site=ehost-live
Pavlou, P. A., & Fygenson, M. (2006). Understanding and predicting electronic commerce adoption: An extension of theory of planned behavior. MIS Quarterly, 30(1), 115-143.
Piccoli, G., & Ives, B. (2003). Trust and the unintended effects of behavioral control in virtual teams. MIS Quarterly, 27(3), 365-339.
Schofield, C. B., Joinson, A. N., Reips, U.-D., & Buchanan, T. (2008). Privacy, trust, disclosure and the Internet. In A. Barak (Ed.), Phychological Aspects of Cyberspace Theory, Research Applications (pp. 13-31). UK: Cambridge University Press.
Sheeran, P. (2002). Intention-behavior relations: A conceptual and empirical review. In W. Stroebe & M. Hewstone (Eds.), European Review of Social Psychology (Vol. 2, pp. 1-36). New York: John Wiley & Sons, Ltd.
Smith, H. J., Milberg, S. J., & Burke, S. J. (1996). Information privacy: Measuring individuals' concerns about organizational practices. MIS Quarterly, 20, 167-196.
Stewart, K. A., & Segars, A. H. (2002). An empirical examination of the concern for information privacy instrument. Information Systems Research, 13, 36-49.
Stone, E. F., Gueutal, H. G., Gamdner, D. G., & McClure, S. (1983). A field experiment comparing information-privacy values, beliefs and attitudes across several types of organizations. Journal of Applied Psychology, 68(3), 459-468.
Study of recruiting practices. Insight from the nation's hiring managers. (2008). Portland, OR: Inavero Institute for Service Research o. Document Number)
Subramanian, R. (2008). Computer security, privacy, and politics: Current issues, challenges and solutions. Retrieved April 10th, from http://books.google.com/books?id=aOemIlnXKXIC
Taylor, S., & Todd, P. (1995). Assessing IT usage: The role of prior experience. MIS Quarterly, 19(4), 561-570.
Taylor, S., & Todd, P. A. (1995). Understanding information technology usage: A test of competing models. Information Systems Research, 6, 144-176.
Thomas, S. L., & Ray, K. (2000). Recruiting and the web: High-tech hiring. Business Horizons, 43(3), 43.
Types of online social networks. (2009). Retrieved January 20, 2009, from http://onlinebrandmanager.org/social-media/social-network-types/
Van, D. T. P., Midha, V., & Nemati, H. (2007). The effect of consumer privacy empowerment on trust and privacy concerns in e-commerce. Electronic Markets, 17, 68-81.
Vople, L., & Tucekr, J. (2004). Third-party recruiting (Publication. Retrieved May 18, 2005, from Wiley Interscience database:
Warsaw, P. R., & Davis, F. D. (2001). The accuracy of behavioral intention versus predicting behavioral goals. The Journal of Psychology, 119(6), 599-602.
Warshaw, P. R., & Davis, F. D. (1985). Disentangling behavioral intention and behavioral expectation. Journal of Experimental Social Psychology, 21(3), 213-228.
Wellman, B., & Haythornthwaite, C. A. (2002). The Internet in everyday life: Blackwell Publishing.
Westin, A. F. (1967). Privacy and Freedom. New York: Athenueum.
Westin, A. F. (2003). Social and political dimensions of privacy. Journal of Social Issues, 59(2), 431-453.
Young, R. (2008). How social networks are changing job search and career management. Retrieved January 6, 2009, from http://mn.iabc.com/?p=555
Zhang, A., & Reichgelt, H. (2007). Product complexity as a determinant of transaction governance structure: An empirical comparison of Web-only and traditional banks. In M. Khosrow-Pour (Ed.), Web Technologies for Commerce and Service Online (pp. 40-109): Idea Group Inc.
論文全文使用權限
  • 同意授權校內瀏覽/列印電子全文服務,於2009-07-01起公開。
  • 同意授權校外瀏覽/列印電子全文服務,於2009-07-01起公開。


  • 如您有疑問,請聯絡圖書館
    聯絡電話:(06)2757575#65773
    聯絡E-mail:etds@email.ncku.edu.tw