JOURNAL BROWSE
Search
Advanced SearchSearch Tips
A Study on the Factors Affecting the User Resistance in Social Network Service
facebook(new window)  Pirnt(new window) E-mail(new window) Excel Download
 Title & Authors
A Study on the Factors Affecting the User Resistance in Social Network Service
Park, Eunkyung; Choi, Jeongil; Yeon, Jiyoung;
  PDF(new window)
 Abstract
Purpose: The widespread use of social network services (SNS) has caused users concern about the disclosure of their privacy or personal information. The purpose of this study is to analyze the factors of privacy concern and self presentation that affect the user resistance in the use of social network service. Methods: This study verifies the factors that affecting the user resistance in SNS. The research model suggested in this study is tested via a survey of 260 SNS users. SPSS and Smart PLS had been used to test the suggested hypotheses. Results: This study shows that privacy experience, privacy awareness, self esteem, and social desirability significantly influence perceived risk and that privacy awareness, self esteem, self efficacy, and perceived risk significantly influence perceived trust. It also verifies that perceived risk and perceived trust positively affect user resistance. Conclusion: This paper suggests that high awareness on privacy of SNS user encourages the SNS companies to consider the privacy protection mechanism for eliminating various factors that affecting the risk. This study also shows that the privacy calculus model applies to understanding the mechanism on resistance of SNS user.
 Keywords
Privacy Calculus Model;Privacy Concern;Self Presentation;SNS;User Resistance;
 Language
Korean
 Cited by
 References
1.
Altman, I. 1975. The Environment and Social Behavior: Privacy, Personal Space, Territory, Crowding. Monterey, CA: Brooks/Cole Publishing Company.

2.
Bandura, A. 1977. "Self-efficacy: Toward a Unifying Theory of Behavioral Change." Psychological Review 84(2):191-215. crossref(new window)

3.
Bauer, H. H., Grether, M., and Leach, M. 2002. "Building Customer Relations over the Internet." Industrial Marketing Management 31(2):155-163. crossref(new window)

4.
Bellman, S., Johnson, E. J., Kobrin, S. J., and Lohse, G. L. 2004. "International Differences in Information Privacy Concerns: A Global Survey of Consumers." The Information Society 20(5):313-324. crossref(new window)

5.
Besmer, A., and Lipford, H. R. 2010. "Moving beyond Untagging: Photo Privacy in a Tagged World." Proceedings of the SIGCHI Conference on Human Factors in Computing Systems:1563-1572.

6.
Boyed, D. M., and Ellison, N. B. 2007. "Social Network Sites: Definition, History, and Scholarship." Journal of Computer‐Mediated Communication 13(1):210-230.

7.
Brod, C. 1982. "Managing technostress: Optimizing the Use of Computer Technology." Personnel Journal 61(10):753-757.

8.
Campbell, W. K., Rudich, E. A., and Sedikides, C. 2002. "Narcissism, Self-esteem, and the Positivity of Self-views: Two Portraits of Self-love." Personality and Social Psychology Bulletin 28(3):358-368. crossref(new window)

9.
Chin, W. W. 1998. "The Partial Least Squares Approach to Structural Equation Modeling." Modern Methods for Business Research 295(2):295-336.

10.
Cohen, J. 1988. Statistical Power Analysis for the Behavioral Sciences, 2nd ed. New York: Academic Press.

11.
Cozby, P. C. 1973. "Self-disclosure: A Literature Review." Psychological Bulletin 79(2):73-91. crossref(new window)

12.
Culnan, M. J., and Armstrong, P. K. 1999. "Information Privacy Concerns, Procedural Fairness, and Impersonal Trust: An Empirical Investigation." Organization Science 10(1):104-115. crossref(new window)

13.
Culnan, M. J., and Bies, R. J. 2003. "Consumer privacy: Balancing Economic and Justice Considerations." Journal of Social Issues 59(2):323-342. crossref(new window)

14.
Dinev, T., and Hart, P. 2006. "An Extended Privacy Calculus Model for E-commerce Transactions." Information Systems Research 17(1):61-80. crossref(new window)

15.
Dowling, G. R. 1985. "The Effectiveness of Advertising Explicit Warranties." Journal of Public Policy & Marketing 4:142-152.

16.
Efron, B., and Tibshirani, R. 1997. "Improvements on Cross-validation: The 632+ Bootstrap Method." Journal of the American Statistical Association 92(438):548-560.

17.
Ellison, N., Heino, R., and Gibbs, J. 2006. "Managing Impressions Online: Self‐presentation Processes in the Online Dating Environment." Journal of Computer‐Mediated Communication 11(2):415-441.

18.
Fishbein, M., and Ajzen, I. 1975. Belief, Attitude, Intention and Behavior: An Introduction to Theory and Research, Reading. MA: Addison-Wesley.

19.
Fogel, J., and Nehmad, E. 2009. "Internet Social Network Communities: Risk Taking, Trust, and Privacy Concerns." Computers in Human Behavior 25(1):153-160. crossref(new window)

20.
Fusilier, M. R., and Hoyer, W. D. 1980. "Variables Affecting Perceptions of Invasion of Privacy in a Personnel Selection Situation." Journal of Applied Psychology 65(5):623-626. crossref(new window)

21.
Gardner, H. 1985. Frames of Mind: The Theory of Multiple Intelligences. New York: Basic Books.

22.
Gefen, D. 2000. "E-commerce: the Role of Familiarity and Trust." Omega 28(6):725-737. crossref(new window)

23.
Gilroy, F. D., and Desai, H. B. 1986. "Computer Anxiety: Sex, Race and Age." International Journal of Man-Machine Studies 25(6):711-719. crossref(new window)

24.
Goffman, E. 1959. The Presentation of Self in Everyday Life. Garden City, NY: Doubleday.

25.
Grazioli, S., and Jarvenpaa, S. L. 2000. "Perils of Internet Fraud: An Empirical Investigation of Deception and Trust with Experienced Internet Consumers." IEEE Transactions on Systems, Man and Cybernetics 30(4):395-410. crossref(new window)

26.
Hair, J. F., Jr. Black, W. C., Bavin, B. J., and Anderson, R. E. 2010. Multivariate Data Analysis, 7th ed. Upper Saddle River, NJ: Prentice Hall.

27.
Harris Interactive. 2002. "Privacy On and Off the Internet: What Consumers Want." Privacy and American Business Study 15229:1-127.

28.
Hoadley, C. M., Xu, H., Lee, J. J., and Rosson, M. B. 2010. "Privacy as Information Access and Illusory Control: The Case of the Facebook News Feed Privacy Outcry." Electronic Commerce Research and Applications 9(1): 50-60. crossref(new window)

29.
Homans, G. C. 1961. Social Behavior: Its Elementary Forms. Oxford, England: Harcourt Brace.

30.
Jarvenpaa, S., and Todd, P. 1998. "An Empirical Examination of the Determinants of Attitudes and Intention toward Shopping on the Internet." Working Paper, University of Texas-Austin.

31.
Jarvenpaa, S. L., Tractinsky, N., and Saarinen, L. 1999. "Consumer Trust in an Internet Store: A Cross‐cultural Validation." Journal of Computer‐Mediated Communication 5(2):1-35.

32.
Kim, B. 2012. "A Study of Antecedents of Continuance Intention in Mobile Social Network Service: The Role Trust and Privacy Concerns." Knowledge Management Research 13(4):83-100.

33.
Ko, Honseog, Kim, Chesoong, Jeong, Moonyoung, Oh, Youngjin, and Lee, Sungho. 2011. "The Effect of Social Network Service's Quality Factors on User Satisfaction and the Intention to Continued Use." Journal of the Korean Society for Quality Management 39(4): 543-555.

34.
Lampinen, A., Tamminen, S., and Oulasvirta, A. 2009. All My People Right Here, Right now: Management of Group Co-presence on a Social Networking Site. In Proceedings of the ACM 2009 International Conference on Supporting Group Work:281-290.

35.
Lapointe, L., and Rivard, S. 2005. "A Multilevel Model of Resistance to Information Technology Implementation." MIS Quarterly 29(3):461-491.

36.
Laufer, R. S., Proshansky, H. M., and Wolfe, M. 1973. "Some Analytic Dimensions of Privacy." In Third International Architectural Psychology Conference, Lund, Sweden.

37.
Leary, M. R., and Kowalski, R. M. 1990. "Impression Management: A Literature Review and Two-component Model." Psychological Bulletin 107(1):34-47. crossref(new window)

38.
Lee, D., Bang, Y., and Bae, Y. 2010. "Privacy Calculus and the Role of Information Transparency in Personal Information Disclosure." Informatization Policy 17(2):68-85.

39.
Lee, D., and Lim, S. 2006. "The Motivations and Consequences of Voluntary Self-Disclosure by Blog Users." The Korean Journal of Advertising 17(5):227-240.

40.
Li, H., Sarathy, R., and Xu, H. 2011. "The Role of Affect and Cognition on Online Consumers' Decision to Disclose Personal Information to Unfamiliar Online Vendors." Decision Support Systems 51(3):434-445. crossref(new window)

41.
Lwin, M., Wirtz, J., and Williams, J. D. 2007. "Consumer Online Privacy Concerns and Responses: A Power-responsibility Equilibrium Perspective." Journal of the Academy of Marketing Science 35(4):572-585. crossref(new window)

42.
Malhotra, N. K., Kim, S. S., and Agarwal, J. 2004. "Internet Users' Information Privacy Concerns (IUIPC): the Construct, the Scale, and a Causal Model." Information Systems Research 15(4):336-355. crossref(new window)

43.
Maher, P. M., and Rubenstein, A. H. 1974. "Factors Affecting Adoption of a Quantitative Method for R&D Project Selection." Management Science 21(2):119-129. crossref(new window)

44.
Mayer, R. C., Davis, J. H., and Schoorman, F. D. 1995. "An Integrative Model of Organizational Trust." Academy of Management Review 20(3):709-734.

45.
Mitchell, V. W., Davies, F., Moutinho, L., and Vassos, V. 1999. "Using Neural Networks to Understand Service Risk in the Holiday Product." Journal of Business Research 46(2):167-180. crossref(new window)

46.
Milne, G. R., and Boza, M. E. 1999. "Trust and Concern in Consumers' Perceptions of Marketing Information Management Practices." Journal of Interactive Marketing 13(1):5-24. crossref(new window)

47.
Moon, H., Choi, B., and Nae, E. 2011. "Review of Trust Research Trends and Recommendations for Future Research Direction in Korea." Korean Management Review 40(1):139-186.

48.
Park, S. B., and Chung, N. 2011. "Mediating Roles of Self-presentation Desire in Online Game Community Commitment and Trust Behavior of Massive Multiplayer Online Role-playing Games." Computers in Human Behavior 27(6):2372-2379. crossref(new window)

49.
Pavlou, P. A. 2003. "Consumer Acceptance of Electronic Commerce: Integrating Trust and Risk with the Technology Acceptance Model." International Journal of Electronic Commerce 7(3):101-134.

50.
Pavlou, P. A., and Gefen, D. 2004. "Building Effective Online Marketplaces with Institution-based Trust." Information Systems Research 15(1):37-59. crossref(new window)

51.
Pavlou, P. A., Liang, H., and Xue, Y. 2007. "Understanding and Mitigating Uncertainty in Online Exchange Relationships: A Principal-agent Perspective." MIS Quarterly 31(1):105-136.

52.
Phelps, J., Nowak, G., and Ferrell, E. 2000. "Privacy Concerns and Consumer Willingness to Provide Personal Information." Journal of Public Policy & Marketing 19(1):27-41. crossref(new window)

53.
Ram, S. 1987."A Model of Innovation Resistance."Advances in Consumer Research 14:208-212.

54.
Rice, R. E., and Love, G. 1987. "Electronic Emotion Socioemotional Content in a Computer-mediated Communication Network." Communication Research 14(1):85-108. crossref(new window)

55.
Roth, D. L., Harris, R. N., and Snyder, C. R. 1988. "An Individual Differences Measure of Attributive and Repudiative Tactics of Favorable Self-presentation." Journal of Social and Clinical Psychology 6(2):159-170. crossref(new window)

56.
Short, J., Williams, E., and Christie, B. 1976. The Social Psychology of Telecommunications. London: John Wiley & Sons.

57.
Sim, Sun Hee, and Moon, Jae Youn. 2012. "A Study on Mobile SNS Attributes Effects on Information Share, Relationship Formation, and User Satisfaction." Journal of the Korean Society for Quality Management 40(1): 60-72. crossref(new window)

58.
Smith, H. J., Milberg, S. J., and Burke, S. J. 1996. "Information Privacy: Measuring Individuals' Concerns About Organizational Practices." MIS Quarterly 20(2):167-196. crossref(new window)

59.
Suh, B., and Han, I. 2003. "Effect of Trust on Customer Acceptance of Internet Banking." Electronic Commerce Research and Applications 1(3):247-263.

60.
Tan, Y. H., and Thoen, W. 2000. "An Outline of a Trust Moodel for Electronic Commerce." Applied Artificial Intelligence 14(8):849-862. crossref(new window)

61.
Tenenhaus, M., Vinzi, V. E., Chatelin, Y. M., and Lauro, C. 2005. "PLS Path Modeling." Computational Statistics & Data Analysis 48(1):159-205. crossref(new window)

62.
Trammell, K. D., and Keshelashvili, A. 2005. "Examining the New Influencers: A Self-presentation Study of A-list Blogs." Journalism & Mass Communication Quarterly 82(4):968-982. crossref(new window)

63.
Trumbo, C. W. 1999. "Heuristic‐Systematic Information Processing and Risk Judgment." Risk Analysis 19(3):391-400.

64.
Van Slyke, C., Shim, J. T., Johnson, R., and Jiang, J. 2006. "Concern for Information Privacy and Online Consumer Purchasing." Journal of the Association for Information Systems 7(6):415-444.

65.
Vroom, V. H. 1964. Work and Motivation. New York: John Wiley & Sons.

66.
Walther, J. B., and Burgoon, J. K. 1992. "Relational communication in computer‐mediated interaction." Human Communication Research 19(1):50-88. crossref(new window)

67.
Wan, L., Zhang, C., and Min, D. 2013. "Antecendents to privacy concern over ubiquitous service in china." Journal of International & Commerce 9(2):171-194. crossref(new window)

68.
Warren, S. D., and Brandeis, L. D. 1890. "The Right to Privacy." Harvard Law Review 4(5):193-220. crossref(new window)

69.
Westin, A. F. 1967. Privacy and Freedom. New York: Atheneum.

70.
Xu, H., Dinev, T., Smith, H. J., and Hart, P. 2008. Examining the Formation of Individual's Privacy Concerns: Toward an Integrative View. Proceedings of the International Conference on Information Systems, ICIS 2008, Paris, France.

71.
Yao, M. Z., and Linz, D. G. 2008. "Predicting Self-protections of Online Privacy." CyberPsychology & Behavior 11(5):615-617. crossref(new window)

72.
Zaltman, G., and Wallendorf, M. 1979. Consumer Behavior: Basic Findings and Management Implications. New York: John Wiley & Sons.