Abstract
Consumer-generated self-disclosure is better than firm-generated advertising and sales reports in increasing contact opportunities and also more credible for firms to foster alignment with future market expectations. Previous research mostly assesses online self-disclosure from the rational approach of anticipated benefits and privacy risks without considering the “privacy paradox” phenomenon (users behave contrarily to privacy concern) in social networking sites (SNSs). We develop a theoretical model, grounded in constraint-based (lock-in) and dedication-based (trust-building) mechanisms and social identity theory, to predict online self-disclosure. We test the proposed theoretical model by surveying 395 consumers with participation experience in an online SNS. Different from the rational approach behind personalization, we advance knowledge on how to apply social identity, as well as constraint-based and dedication-based mechanisms, to motivate online self-disclosure induced by consumers. We provide theoretical and practical insights based on our research findings for managing the motivational mechanisms of online self-disclosure.
Similar content being viewed by others
References
Alashoor T and Baskerville R (2015) The privacy paradox: the role of cognitive absorption in the social networking activity. In Proceedings of the 2015 International Conference on Information Systems (ICIS2015), Dec 13–16, Texas, USA.
Alashoor T, Keil M, Liu L and Smith J (2015) How values shape concerns about privacy for self and others. In Proceedings of the 2015 International Conference on Information Systems (ICIS2015), Dec 13–16, Texas, USA.
Ashforth BE and Mael FA (1989) Social identity theory and the organization. Academy of Management Review 14(1), 20–39.
Ashforth BE, Harrison SH and Corley KG (2008) Identification in organizations: an examination of four fundamental questions. Journal of Management 34(3), 325–374.
Awad NF and Krishnan MS (2006) The personalization privacy paradox: an empirical evaluation of information transparency and the willingness to be profiled online for personalization. MIS Quarterly 30(1), 13–28.
Ba S and Pavlou PA (2002) Evidence of the effect of trust building technology in electronic markets: price premiums and buyer behavior. MIS Quarterly 26(3), 243–268.
Bagozzi RP (2000) On the concept of intentional social action in consumer behavior. Journal of Consumer Research 27(3), 388–396.
Bagozzi RP and Dholakia UM (2002) Intentional social action in virtual communities. Journal of Interactive Marketing 16(2), 2–21.
Bagozzi RP and Dholakia UM (2006) Antecedents and purchase consequences of customer participation in small group brand communities. International Journal of Research in Marketing 23(1), 45–61.
Bagozzi RP and Yi Y (1988) On the evaluation of structural equations models. Journal of the Academy of Marketing Science 16(1), 74–94.
Bagozzi RP, Yi Y and Phillips L (1991) Assessing construct validity in organizational research. Administrative Science Quarterly 36(3), 421–458.
Baron RM and Kenny DA (1986) The moderator-mediator variable distinction in social psychological research: conceptual, strategic, and statistical considerations. Journal of Personality and Social Psychology 51(6), 1173–1182.
Bendapudi N and Berry L (1997) Customers’ motivations for maintaining relationships with service providers. Journal of Retailing 73(1), 15–37.
Bendapudi N and Leone RP (2003) Psychological implications of customer participation in co-production. Journal of Marketing 67(1), 14–28.
Blau PM (1964) Exchange and Power in Social Life. Wiley, New York.
Brislin RW, Lonner WJ and Throndike RM (1973) Cross-Cultural Research Methods. Wiley, New York.
Burnham TA, Frels JK and Mahajan V (2003) Consumer switching costs: a topology, antecedents, and consequences. Journal of the Academy of Marketing Science 31(2), 109–126.
Cao J, Basoglu KA, Sheng H and Lowry PB (2015) A systematic review of social networks research in information systems: building a foundation for exciting future research. Communications of the Association for Information Systems 36, 727–758.
Cazier JA, Shao BBM and St. Louis RD (2006) E-business differentiation through value-based trust. Information & Management 43(6), 718–727.
Chen R (2013) Living a private life in public social networks: an exploration of member self-disclosure. Decision Support Systems 55(3), 661–668.
Chen R and Sharma SK (2013) Self-disclosure at social networking sites: an exploration through relational capitals. Information Systems Frontiers 15(2), 269–278
Chen R and Sharma SK (2015) Learning and self-disclosure behavior on social networking sites: the case of Facebook users. European Journal of Information Systems 24(1), 93–106.
Collins NL and Miller LC (1994) Self-disclosure and liking: a meta-analytic review. Psychological Bulletin 116(3), 457–475.
Cook S (2008) The contribution revolution. Harvard Business Review 86(10), 60–69.
Cozby PC (1973) Self-disclosure: a literature review. Psychological Bulletin 79(2), 73–91.
Cyr D, Head M and Larios H (2009) Exploring human images in website design: a multi-method approach. MIS Quarterly 33(3), 539–566.
Derlega VJ, Metts S, Petronio S and Margulis ST (1993) Self-Disclosure. Sage Publication, Newbury Park.
Deutsch M (1973) The Resolution of Conflict: Constructive and Destructive Processes. CT: Yale University Press, New Haven.
Deutsch M and GERARD HB (1955) A study of normative and informational social influences upon individual judgment. Journal of Abnormal and Social Psychology 51(3), 629–636.
Dholakia UM, Bagozzi RP and Pearo LK (2004) A social influence model of consumer participation in network- and small-group-based virtual communities. International Journal of Research in Marketing 21(3), 241–263.
Dick AS and Basu K (1994) Customer loyalty: toward an integrated conceptual framework. Journal of the Academy of Marketing Science 22(2), 99–114.
Dimoka A (2010) What does the brain tell us about trust and distrust? Evidence from a functional neuroimaging study. MIS Quarterly 34(2), 373–396.
Dinev T (2014) Why would we care about privacy? European Journal of Information Systems 23(2), 97–102.
Dinev T and Hart P (2006) An extended privacy calculus model for e-commerce transactions. Information Systems Research 17(1), 61–80.
Dinev T, Xu H, Smith JH and Hart P (2013) Information privacy and correlates: an empirical attempt to bridge and distinguish privacy-related concepts. European Journal of Information Systems 22(3), 295–316.
Doney PM and Cannon JP (1997) An examination of the nature of trust in buyer-seller relationships. Journal of Marketing 61(2), 35–51.
Driscoll R, Davis KE and Lipetz ME (1972) Parental interference and romantic love: the Romeo and Juliet effect. Journal of Personality and Social Psychology 24(1), 1–10.
Dunham RB, Grube JA and Castaneda MB (1994) Organizational commitment: the utility of an integrative definition. Journal of Applied Psychology 79(3), 370–380.
Dutton JE, Dukerich JM and Harquail CV (1994) Organizational images and member identification. Administrative Science Quarterly 39(2), 239–263.
Emerson RM (1976) Social exchange theory. Annual Review of Sociology 2, 335–362.
Fertik M (2013) Welcome to the “Pull Economy”. http://www.inc.com/michael-fertik/welcome-to-the-pull-economy.html (Sep. 2015).
Festinger L, Schacter S and Back K (1950) Social Pressures in Informal Groups: A Study of Human Factors in Housing. Stanford University Press, Palo Alto, CA.
Forman C, Ghose A and Wiesenfeld B (2008) Examining the relationship between reviews and sales: the role of reviewer identity disclosure in electronic markets. Information Systems Research 19(3), 291–313.
Fornell C and Larcker DF (1981) Evaluating structural equation models with unobservable variables and measurement error. Journal of Marketing Research 18(1), 39–50.
Ganesan S (1994) Determinants of long-term orientation in buyer-seller relationships. Journal of Marketing 58(2), 1–19.
Gefen D (2002) Customer loyalty in e-commerce. Journal of the Association for Information Systems 3(1), 27–51.
Hair JF, Black WC, Babin BJ and Anderson RE (2010) Multivariate Data Analysis. (7th ed.). Prentice-Hall, Upper Saddle River, New Jersey.
Hogg MA and Turner JC (1985) Interpersonal attraction, social identification and psychological group formation. European Journal of Social Psychology 15(1), 51–66.
Hollenbaugh EE and Ferris AL (2014) Facebook self-disclosure: examining the role of traits, social cohesion, and motives. Computers in Human Behavior 30, 50–58.
Hui K-L, Tan BCY and Goh C-Y (2006) Online information disclosure: motivators and measurements. ACM Transactions on Internet Technology 6(4), 415–441.
Hui K-L, Teo HH and Lee SYT (2007) The value of privacy assurance: an exploratory field experiment. MIS Quarterly 31(1), 19–33.
Jarvenpaa SL, Knoll K and Leidner DE (1998) Is anybody out there? Antecedents of trust in global virtual teams. Journal of Management Information Systems 14(4), 29–64.
Johnson D and Grayson K (2005) Cognitive and affective trust in service relationships. Journal of Business Research 58(4), 500–507.
Joinson AN, Reips UD, Buchanan T and Schofield CBP (2010) Privacy, trust, and self-disclosure online. Human-Computer Interaction 25(1), 1–24.
Jones MA, Mothersbaugh DL and Beatty SE (2000) Switching barriers and repurchase intentions in services. Journal of Retailing 76(2), 259–274.
Kahneman D and Tversky A (1979) Prospect theory: an analysis of decision under risk. Econometrica 47, 263–291.
Kehr F, Kowatsch T, Wentzel D, Fleisch E (2015) Blissfully ignorant: the effects of general privacy concerns, general institutional trust, and affect in the privacy calculus. Information Systems Journal 25(6), 607–635.
Keith MJ, Thompson SC, Hale J and Lowry PB (2013) Information disclosure on mobile devices: re-examining privacy calculus with actual user behavior. International Journal of Human-Computer Studies 71(12), 1163–1173.
Keith MJ, Babb JS, Lowry PB, Furner CP and Abdullat A (2015) The role of mobile-computing self-efficacy in consumer information disclosure. Information Systems Journal 25(6), 637–667.
Kelman HC (1974) Further thoughts on the processes of compliance, identification, and internalization. (J.T. Tedeschi, Ed.), pp. 126–171, Perspectives on Social Power, IL: Aldines Press, Chicago.
Kelman HC (2006) Interests, relationships, identities: three central issues for individuals and groups in negotiating their social environment. Annual Review of Psychology 59(1), 1–26.
Kim SS and Son J-Y (2009) Out of dedication or constraint? A dual model of post-adoption phenomena and its empirical test in the context of online services. MIS Quarterly 33(1), 49–70.
Klemperer P (1987) Markets with consumer switching costs. The Quarterly Journal of Economics 102(2), 375–394.
Koh J, Kim Y-G, Butler B and Bock G-W (2007) Encouraging participation in virtual communities. Communications of the ACM 50(2), 69–73.
Krasnova H, Spiekermann S, Koroleva K and Hildebrand T (2010) Online social networks: why we disclose? Journal of Information Technology 25(2), 109–125.
Lam SY, Shankar V, Erramilli MK and Murthy B (2004) Customer value, satisfaction, loyalty, and switching costs: an illustration from a business-to-business service context. Journal of the Academy of Marketing Science 32(3), 293–311.
Ledbetter AM, Mazer JP, Degroot JM, Meyer KR, Mao Y and Swafford B (2011) Attitudes toward online social connection and self-disclosure as predictors of Facebook communication and relational closeness. Communication Research 38(1), 27–53.
Lewis JD and Weigert A (1985) Trust as a social reality. Social Forces 63(4), 967–985.
Lewis W, Agarwal, R and Sambamurthy V (2003) Sources of influence on beliefs about information technology use: an empirical study of knowledge workers. MIS Quarterly 27(4), 657–678.
Li Y (2012) Theories in online information privacy research: a critical review and an integrated framework. Decision Support Systems 54(1), 471–481.
Li T and Unger T (2012) Willing to pay for quality personalization? Trade-off between quality and privacy. European Journal of Information Systems 21(6), 621–642.
Li H, Sarathy R and Xu H (2011) The role of affect and cognition on online consumers’ decision to disclose personal information to unfamiliar online vendors. Decision Support Systems 51(3), 434–445.
Lindell MK and Whitney DJ (2001) Accounting for common method variance in cross-sectional research design. Journal of Applied Psychology 86(1), 114–121.
Lowry PB, Vance A, Moody G, Beckman B and Read A (2008) Explaining and predicting the impact of branding alliances and web site quality on initial consumer trust of e-commerce web sites. Journal of Management Information Systems 24(4), 199–224.
Luhmann N (1979) Trust and Power. Wiley, Chichester.
Malhotra NK, Kim SS and Agarwal J (2004) Internet users’ information privacy concerns (IUIPC): the construct, the scale, and a causal model. Information Systems Research 15(4), 336–355.
Maneesriwongul W and Dixon JK (2004) Instrument translation process: a method review. Journal of Advanced Nursing 48(2), 175–186.
Marshall BA, Cardon PW, Norris DT, Goreva N and D’souza R (2008) Social networking websites in India and the United States: a cross-national comparison of online privacy and communication. Issues in Information Systems 9(2), 87–94.
Mcallster DJ (1995) Affect- and cognition-based trust as foundations for interpersonal cooperation in organizations. Academy of Management Journal 38(1), 24–59.
Merlo O, Eisingerich AB and Auh S (2014) Why customer participation matters? MIT Sloan Management Review 55(2), 81–88.
Metzger MJ (2004) Privacy, trust, and disclosure: exploring barriers to electronic commerce. Journal of Computer Mediated Communication 9(4). doi:10.1111/j.1083-6101.2004.tb00292.x.
Moon Y (2000) Intimate exchange: using computers to elicit self-disclosure from consumers. Journal of Consumer Research 26(4), 323–339.
Moorman C, Zaltman G and Deshpandé R (1992) Relationships between providers and users of market research: the dynamics of trust within and between organizations. Journal of Marketing Research 29(3), 314–328.
Nielsen (2011) How social media impacts brand marketing. http://www.nielsen.com/content/corporate/us/en/newswire/2013.html?q=onlinereviews&sortbyScore=false&start=10 (accessed April 2014).
Nunnally J (1978) Psychometric Theory. McGraw-Hill, New York.
Pavlou PA and Gefen D (2004) Building effective online marketplaces with institution-based trust. Information Systems Research 15(1), 37–59.
Petronio S (2002) Boundaries of Privacy: Dialectics of Disclosure. State University of New York Press, Albany.
Podsakoff PM, Mackenzie SB, Lee J-Y and Podsakoff NP (2003) Common method biases in behavioral research: a critical review of the literature and recommended remedies. Journal of Applied Psychology 88(5), 879–903.
Porter CE and Donthu N (2008) Cultivating trust and harvesting value in virtual communities. Management Science 54(1), 113–128.
Posey C, Lowry PB, Roberts TL and Ellis TS (2010) Proposing the online community self-disclosure model: the case of working professionals in France and the U.K. who use online communities. European Journal of Information Systems 19(2), 181–195.
Preacher KJ and Hayes AF (2004) SPSS and SAS procedures for estimating indirect effects in simple mediation models. Behavior Research Methods, Instruments, & Computers 36(4), 717–731.
Prentice DA, Miller DT and Lightdale JR (1994) Asymmetries in attachments to groups and to their members: distinguishing between common-identity and common-bond groups. Personality and Social Psychology Bulletin 20(5), 484–493.
Rempel JK, Holmes JG and Zanna MD (1985) Trust in close relationships. Journal of Personality and Social Psychology 49(1), 95–112.
Ren Y, Kraut R and Kiesler S (2007) Applying common identity and bond theory to design of online communities. Organization Studies 28(3), 377–408.
Rotter JB (1980) Interpersonal trust, trustworthiness, and gullibility. American Psychologist 35(1), 1–7.
Rust RT and Lemon KN (2001) E-service and the customer. International Journal of electronic Commerce 5(3), 85–101.
Sassenberg K (2002) Common bond and common identity groups on the Internet: attachment and normative behavior in on-topic and off-topic chats. Group Dynamics: Theory, Research, and Practice 6(1), 27–37.
Shapiro C and Varian HR (1999) Information Rules: A Strategic Guide to the New Economy. Harvard Business School Press, Boston.
Sharma R, Yetton P and Crawford J (2009) Estimating the effect of common method variance: the method-method pair technique with an illustration from TAM research. MIS Quarterly 33(3), 473–490.
Sheth JN and Parvatiyar A (1995) Relationship marketing in consumer markets: antecedents and consequences. Journal of the Academy of Marketing Science 23(4), 255–271.
Stanley SM and Markman HJ (1992) Assessing commitment in personal relationships. Journal of Marriage and the Family 54(3), 595–608
Staples DN and Webster J (2008) Exploring the effects of trust, task interdependence and virtualness on knowledge sharing in teams. Information Systems Journal 18, 617–640.
Straub DW (1989) Validating instruments in MIS research. MIS Quarterly 13(2), 147–169.
Straub DW, Boudreau M-C and Gefen D (2004) Validation guidelines for IS positivist research. Communications of the Association for Information Systems 13, 380–427.
Tajfel H (1978) Interindividual behavior and intergroup behavior. In Differentiation Between Groups: Studies in the Social Psychology of Intergroup Relations (H. Taifel, Ed.), pp. 27–60, Academic Press, London.
Teger A (1980) Too Much Invested to Quit. Pergamon Press, New York.
Tversky A and Kahneman D (1991) Loss aversion in riskless choice: a reference-dependent model. Quarterly Journal of Economics 106(4), 1039–1061.
Wakefield RL, Wakefield KL, Baker J and Wang LC (2011) How website socialness leads to website use. European Journal of Information Systems 20(1), 118–132.
Wattal S, Racherla P and Mandviwalla M (2010) Network externalities and technology use: a quantitative analysis of intraorganizational blogs. Journal of Management Information Systems 27(1), 151–180.
Wheaton B, Muthén B, Alwin DF and Summers GF (1977) Assessing reliability and stability in panel models. Sociological Methodology 8, 84–136.
Xu H, Teo HH, Tan BCY and Agarwal R (2009) The role of push-pull technology in privacy calculus: the case of location-based services. Journal of Management Information Systems 26(3), 135–173.
Zhao X, Lynch JG and Chen Q (2010) Reconsidering Baron and Kenny: myths and truths about mediation analysis. Journal of Consumer Research 37(2), 197–206.
Zhou Z, Fang Y, Vogel DR, Jin X-L and Zhang X (2012) Attracted to or locked in? Predicting continuance intention in social virtual world services. Journal of Management Information Systems 29(1), 273–305.
Zimmer JC, Arsal R, Al-Marzouq M, Moore D and Grover V (2010) Knowing your customers: using a reciprocal relationship to enhance voluntary information disclosure. Decision Support Systems 48(2), 395–406.
Zlatolas LN, Welzer T, Heričko M and Hölbl M (2015) Privacy antecedents for SNS self-disclosure: The case of Facebook. Computers in Human Behavior 45, 158–167.
Zwass V (2010) Co-creation: toward a taxonomy and an integrated research perspective. International Journal of Electronic Commerce 15(1), 11–48.
Acknowledgements
We are grateful to the AE and referees for their helpful comments on earlier versions of our paper. Cheng was supported in part by The Hong Kong Polytechnic University under the Fung Yiu King - Wing Hang Bank Endowed Professorship in Business Administration.
Author information
Authors and Affiliations
Corresponding author
Additional information
Associate Editor:
Paul Benjamin Lowry.
Editor:
Dov Te'eni.
Appendices
Appendix A: Measurement items
Table A1.
Appendix B: The literature of self-disclosure and the design and test of the measurement instrument
The measurement instrument development
To survey those users of Yahoo (Taiwan) e-auction forum, we performed the translation of the measurement instrument in the form of a survey questionnaire from English to traditional Chinese. According to Brislin et al (1973), back-translation, bilingual techniques, commitment approach, and pretest were four techniques for enhancing instrument translation in cross-cultural research. Maneesriwongul and Dixon (2004) recommended that minimum standards for developing an instrument should at least include back-translation and monolingual testing among target language subjects. We followed the recommendation by using three appropriate techniques except for bilingual ones. This study did not follow the bilingual techniques because of the complexity in assessing cultural relevance and how it uniquely influences semantic equivalence between the source and target language versions. In the first step, we recruited bilingual experts in marketing and MIS to perform the translation from the source (English) to the target language (Chinese). One expert conducted forward translation, whereas the other expert conducted back-translation. In the back-translation, the target language version was translated back into the source language version for verifying the semantic equivalence. In the second step, following the committee approach, the expert panel cooperatively and mutually examined the original and back-translated versions. This expert panel iteratively conducted the back-translation until they reached a consensus on the instrument translation. In the third step, a pilot test was conducted to examine the clarity of the target language version among its monolingual subjects after completing the instrument translation. From the pilot test, discrepancies between the source and the target versions were identified, and the target version was also improved for formal survey. This survey did not focus on particular participants, and all volunteers understood that this academic survey would not apply for business-use profits. In sum, the instrument was developed by following the recommended techniques and thereby should possess face validity.
Regarding the scale for self-disclosure intention, this study developed new measures because the scale from the literature was not appropriate for this study. Previous studies often combine credibility and benevolence to assess the trust construct (Doney & Cannon, 1997; Ba & Pavlou, 2002). In this study, we consider cognitive trust and affective trust as distinct but correlated constructs. Hence, we measured cognitive trust in terms of the credibility dimension and affective trust in terms of the benevolence dimension. We dropped the integrity dimension because of the research goal on the comparison between cognition and affect in the trust building. Early scales for switching cost (e.g. money, time, and effort) are difficult to meet the current survey that focuses on the loss of loyalty benefits. We thus measured switching cost using new scales that refer to the cost of terminating the current relationship. This study measured dependency using new scales that refer to psychological costs or burdens incurred when participants seek better alternatives either for substitution or for more choices. Most measurement items were developed from prior studies and revised by experts for assessing the true properties of theoretical constructs, suggesting the instrument achieves content validity (Straub, 1989).
CMV analysis
We took necessary steps to avoid the effects of CMV in the administration of questionnaire survey, including guarantee of respondent anonymity, counterbalance of question order, and improvement of scale items as recommended by Podsakoff et al (2003). Moreover, most constructs were measured in terms of previously validated measures and examined via pretest in order to increase the validity of the theoretical model (Sharma et al, 2009). We also examined CMV using a post hoc approach with two tests on the self-reported data. First, the test of inter-construct correlations (Table 2) shows that the highest correlation between the research constructs (0.594 for ASI-ESI) is far below the threshold of 0.90 (Bagozzi et al, 1991), indicating the effect of CMV is small. Second, we applied the partial correlation approach recommended by Lindell and Whitney (2001) to test CMV. In this study, we partial out the lowest correlation among the variables to test the effect of a method variance. The correlations among non-partial out variables did not cause a significant inflation, suggesting that our empirical results were unlikely to be explained by CMV. Overall, the effect of CMV is small in the survey.
Model-fit indices
The seven model-fit indices and corresponding cut-off values are (Wheaton et al, 1977; Bagozzi and Yi, 1988): Chi-square/degree of freedom (χ2/df ≤ 5.00), standardized root-mean-square residual (RMR ≤ 0.05), root-mean-square error of approximation (RMSEA ≤ 0.08), goodness-of-fit index (GFI ≥ 0.90), adjusted goodness-of-fit index (AGFI ≥ 0.80), normed fit index (NFI ≥ 0.90), and comparative fit index (CFI ≥ 0.90). Definitions of absolute fit indices (χ2/df, GFI, AGFI, RMR, and RMSEA) and relative fit indices (NFI and CFI) can be found in the AMOS manuals.
Measurement model
We employ the structural equation modelling (SEM) package (AMOS) to perform confirmatory factor analysis (CFA) to examine the psychometric properties of the measurement items. The test of seven fitness indices (χ2/df = 2.303; RMR = 0.023; RMSEA = 0.057; GFI = 0.91; AGFI = 0.87; NFI = 0.94; CFI = 0.96) shows an acceptable fit of the measurement model according to the recommended cut-off values (“Appendix B”). In sum, the tests of convergent and discriminant validity, and goodness-of-fit of the measurement model establish factorial validity of this measurement instrument (Straub et al, 2004).
Mediation effect analysis
We follow the analytic procedures to examine three structural models with partial mediation, full mediation, and no mediation (Baron and Kenny, 1986). The no-mediation model has poor model-fit indices (χ2/df = 14.873; RMR = 0.149; RMSEA = 0.188; GFI = 0.83; AGFI = 0.71; NFI = 0.71; CFI = 0.72), which should be dropped in further tests. The full-mediation model has an appropriate model fit (χ2/df = 3.861; RMR = 0.04; RMSEA = 0.08; GFI = 0.94; AGFI = 0.89; NFI = 0.94; CFI = 0.95). The partial-mediation model has a good model fit (χ2/df = 1.940; RMR = 0.03; RMSEA = 0.05; GFI = 0.97; AGFI = 0.94; NFI = 0.97; CFI = 0.98). Following the recommended procedures of Preacher and Hayes (2004), we run SPSS Macro (e.g. PROCESS.spd) programmed by Hayes to test indirect effects on SD. Taking the theoretical lens and mediation models into account (Zhao et al, 2010), we use the full-mediation model to conduct the hypothesis testing.
Rights and permissions
About this article
Cite this article
Shih, Hp., Lai, Kh. & Cheng, T.C.E. Constraint-based and dedication-based mechanisms for encouraging online self-disclosure: Is personalization the only thing that matters?. Eur J Inf Syst 26, 432–450 (2017). https://doi.org/10.1057/s41303-016-0031-0
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1057/s41303-016-0031-0