Information privacy concerns, antecedents and privacy measure use in social networking sites: Evidence from Malaysia

被引:168
作者
Mohamed, Norshidah [1 ]
Ahmad, Ili Hawa [2 ]
机构
[1] Univ Teknol Malaysia, Int Business Sch, Kuala Lumpur 50300, Malaysia
[2] Int Islamic Univ Malaysia, Fac Informat & Commun Technol, Kuala Lumpur 50728, Malaysia
关键词
Social Cognitive Theory; Protection Motivation Theory; Information privacy; Self-efficacy; Social networking; PROTECTION MOTIVATION THEORY; ONLINE PRIVACY; FEAR APPEALS; INTERNET; DETERMINANTS; TECHNOLOGY; BEHAVIORS; SAFE;
D O I
10.1016/j.chb.2012.07.008
中图分类号
B84 [心理学];
学科分类号
04 ; 0402 ;
摘要
The research aims at gaining insights into information privacy concerns, its antecedents and privacy measure use in social networking sites. The Social Cognitive, Protection Motivation theories and gender factor were used as a basis to develop and confirm a research model. Using a cross-sectional survey design and cluster sampling technique, four-hundred thirteen questionnaires were distributed to undergraduates at a public Malaysian university: three-hundred forty were included in analyses. Data was analyzed using structural equation modeling technique. Results suggest that in order of importance only perceived severity, self-efficacy, perceived vulnerability, and gender are antecedents of information privacy concerns with social networking sites; response efficacy and rewards were not significant antecedents contrary to many past findings in the literature that used Social Cognitive and Protection Motivation Theory as a theoretical basis. Information privacy concerns explain privacy measure use in social networking sites. The implications of these results and study limitations are discussed. (C) 2012 Elsevier Ltd. All rights reserved.
引用
收藏
页码:2366 / 2375
页数:10
相关论文
共 69 条
  • [21] [Anonymous], ETH SURV CONS ATT HL
  • [22] Babbie E.R., 2012, PRACTICE SOCIAL RES
  • [23] Bagozzi R. P., 1988, Journal of the Academy of Marketing Science, V16, P74, DOI [DOI 10.1007/BF02723327, 10.1007/bf02723327]
  • [24] REGULATION OF COGNITIVE-PROCESSES THROUGH PERCEIVED SELF-EFFICACY
    BANDURA, A
    [J]. DEVELOPMENTAL PSYCHOLOGY, 1989, 25 (05) : 729 - 735
  • [25] Bandura A, 1986, Social Foundations of Thought and Action: A Social Cognitive Theory, DOI DOI 10.5465/AMR.1987.4306538
  • [26] Boyd DanaMichele., 2004, CHI 2004
  • [27] Boyle M., 2005, ACM Transactions on Computer-Human Interaction, V12, P328, DOI 10.1145/1067860.1067868
  • [28] Internet and Online Information Privacy: An Exploratory Study of Preteens and Early Teens
    Chai, Sangmi
    Bagchi-Sen, Sharmistha
    Morrell, Claudia
    Rao, H. R.
    Upadhyaya, Shambhu J.
    [J]. IEEE TRANSACTIONS ON PROFESSIONAL COMMUNICATION, 2009, 52 (02) : 167 - 182
  • [29] Chen TC, 2009, PROC EUR SOLID-STATE, P1
  • [30] Social cognitive theory and individual reactions to computing technology: A longitudinal study
    Compeau, D
    Higgins, CA
    Huff, S
    [J]. MIS QUARTERLY, 1999, 23 (02) : 145 - 158