Skip to main content
Log in

Constraint-based and dedication-based mechanisms for encouraging online self-disclosure: Is personalization the only thing that matters?

  • Empirical Research
  • Published:
European Journal of Information Systems

Abstract

Consumer-generated self-disclosure is better than firm-generated advertising and sales reports in increasing contact opportunities and also more credible for firms to foster alignment with future market expectations. Previous research mostly assesses online self-disclosure from the rational approach of anticipated benefits and privacy risks without considering the “privacy paradox” phenomenon (users behave contrarily to privacy concern) in social networking sites (SNSs). We develop a theoretical model, grounded in constraint-based (lock-in) and dedication-based (trust-building) mechanisms and social identity theory, to predict online self-disclosure. We test the proposed theoretical model by surveying 395 consumers with participation experience in an online SNS. Different from the rational approach behind personalization, we advance knowledge on how to apply social identity, as well as constraint-based and dedication-based mechanisms, to motivate online self-disclosure induced by consumers. We provide theoretical and practical insights based on our research findings for managing the motivational mechanisms of online self-disclosure.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Figure 1
Figure 2
Figure 3

Similar content being viewed by others

References

  • Alashoor T and Baskerville R (2015) The privacy paradox: the role of cognitive absorption in the social networking activity. In Proceedings of the 2015 International Conference on Information Systems (ICIS2015), Dec 13–16, Texas, USA.

  • Alashoor T, Keil M, Liu L and Smith J (2015) How values shape concerns about privacy for self and others. In Proceedings of the 2015 International Conference on Information Systems (ICIS2015), Dec 13–16, Texas, USA.

  • Ashforth BE and Mael FA (1989) Social identity theory and the organization. Academy of Management Review 14(1), 20–39.

    Google Scholar 

  • Ashforth BE, Harrison SH and Corley KG (2008) Identification in organizations: an examination of four fundamental questions. Journal of Management 34(3), 325–374.

    Article  Google Scholar 

  • Awad NF and Krishnan MS (2006) The personalization privacy paradox: an empirical evaluation of information transparency and the willingness to be profiled online for personalization. MIS Quarterly 30(1), 13–28.

    Google Scholar 

  • Ba S and Pavlou PA (2002) Evidence of the effect of trust building technology in electronic markets: price premiums and buyer behavior. MIS Quarterly 26(3), 243–268.

    Article  Google Scholar 

  • Bagozzi RP (2000) On the concept of intentional social action in consumer behavior. Journal of Consumer Research 27(3), 388–396.

    Article  Google Scholar 

  • Bagozzi RP and Dholakia UM (2002) Intentional social action in virtual communities. Journal of Interactive Marketing 16(2), 2–21.

    Article  Google Scholar 

  • Bagozzi RP and Dholakia UM (2006) Antecedents and purchase consequences of customer participation in small group brand communities. International Journal of Research in Marketing 23(1), 45–61.

    Article  Google Scholar 

  • Bagozzi RP and Yi Y (1988) On the evaluation of structural equations models. Journal of the Academy of Marketing Science 16(1), 74–94.

    Article  Google Scholar 

  • Bagozzi RP, Yi Y and Phillips L (1991) Assessing construct validity in organizational research. Administrative Science Quarterly 36(3), 421–458.

    Article  Google Scholar 

  • Baron RM and Kenny DA (1986) The moderator-mediator variable distinction in social psychological research: conceptual, strategic, and statistical considerations. Journal of Personality and Social Psychology 51(6), 1173–1182.

    Article  Google Scholar 

  • Bendapudi N and Berry L (1997) Customers’ motivations for maintaining relationships with service providers. Journal of Retailing 73(1), 15–37.

    Article  Google Scholar 

  • Bendapudi N and Leone RP (2003) Psychological implications of customer participation in co-production. Journal of Marketing 67(1), 14–28.

    Article  Google Scholar 

  • Blau PM (1964) Exchange and Power in Social Life. Wiley, New York.

    Google Scholar 

  • Brislin RW, Lonner WJ and Throndike RM (1973) Cross-Cultural Research Methods. Wiley, New York.

    Google Scholar 

  • Burnham TA, Frels JK and Mahajan V (2003) Consumer switching costs: a topology, antecedents, and consequences. Journal of the Academy of Marketing Science 31(2), 109–126.

    Article  Google Scholar 

  • Cao J, Basoglu KA, Sheng H and Lowry PB (2015) A systematic review of social networks research in information systems: building a foundation for exciting future research. Communications of the Association for Information Systems 36, 727–758.

    Google Scholar 

  • Cazier JA, Shao BBM and St. Louis RD (2006) E-business differentiation through value-based trust. Information & Management 43(6), 718–727.

    Article  Google Scholar 

  • Chen R (2013) Living a private life in public social networks: an exploration of member self-disclosure. Decision Support Systems 55(3), 661–668.

    Article  Google Scholar 

  • Chen R and Sharma SK (2013) Self-disclosure at social networking sites: an exploration through relational capitals. Information Systems Frontiers 15(2), 269–278

    Article  Google Scholar 

  • Chen R and Sharma SK (2015) Learning and self-disclosure behavior on social networking sites: the case of Facebook users. European Journal of Information Systems 24(1), 93–106.

    Article  Google Scholar 

  • Collins NL and Miller LC (1994) Self-disclosure and liking: a meta-analytic review. Psychological Bulletin 116(3), 457–475.

    Article  Google Scholar 

  • Cook S (2008) The contribution revolution. Harvard Business Review 86(10), 60–69.

    Google Scholar 

  • Cozby PC (1973) Self-disclosure: a literature review. Psychological Bulletin 79(2), 73–91.

    Article  Google Scholar 

  • Cyr D, Head M and Larios H (2009) Exploring human images in website design: a multi-method approach. MIS Quarterly 33(3), 539–566.

    Google Scholar 

  • Derlega VJ, Metts S, Petronio S and Margulis ST (1993) Self-Disclosure. Sage Publication, Newbury Park.

    Google Scholar 

  • Deutsch M (1973) The Resolution of Conflict: Constructive and Destructive Processes. CT: Yale University Press, New Haven.

    Google Scholar 

  • Deutsch M and GERARD HB (1955) A study of normative and informational social influences upon individual judgment. Journal of Abnormal and Social Psychology 51(3), 629–636.

    Article  Google Scholar 

  • Dholakia UM, Bagozzi RP and Pearo LK (2004) A social influence model of consumer participation in network- and small-group-based virtual communities. International Journal of Research in Marketing 21(3), 241–263.

    Article  Google Scholar 

  • Dick AS and Basu K (1994) Customer loyalty: toward an integrated conceptual framework. Journal of the Academy of Marketing Science 22(2), 99–114.

    Article  Google Scholar 

  • Dimoka A (2010) What does the brain tell us about trust and distrust? Evidence from a functional neuroimaging study. MIS Quarterly 34(2), 373–396.

    Google Scholar 

  • Dinev T (2014) Why would we care about privacy? European Journal of Information Systems 23(2), 97–102.

    Article  Google Scholar 

  • Dinev T and Hart P (2006) An extended privacy calculus model for e-commerce transactions. Information Systems Research 17(1), 61–80.

    Article  Google Scholar 

  • Dinev T, Xu H, Smith JH and Hart P (2013) Information privacy and correlates: an empirical attempt to bridge and distinguish privacy-related concepts. European Journal of Information Systems 22(3), 295–316.

    Article  Google Scholar 

  • Doney PM and Cannon JP (1997) An examination of the nature of trust in buyer-seller relationships. Journal of Marketing 61(2), 35–51.

    Article  Google Scholar 

  • Driscoll R, Davis KE and Lipetz ME (1972) Parental interference and romantic love: the Romeo and Juliet effect. Journal of Personality and Social Psychology 24(1), 1–10.

    Article  Google Scholar 

  • Dunham RB, Grube JA and Castaneda MB (1994) Organizational commitment: the utility of an integrative definition. Journal of Applied Psychology 79(3), 370–380.

    Article  Google Scholar 

  • Dutton JE, Dukerich JM and Harquail CV (1994) Organizational images and member identification. Administrative Science Quarterly 39(2), 239–263.

    Article  Google Scholar 

  • Emerson RM (1976) Social exchange theory. Annual Review of Sociology 2, 335–362.

    Article  Google Scholar 

  • Fertik M (2013) Welcome to the “Pull Economy”. http://www.inc.com/michael-fertik/welcome-to-the-pull-economy.html (Sep. 2015).

  • Festinger L, Schacter S and Back K (1950) Social Pressures in Informal Groups: A Study of Human Factors in Housing. Stanford University Press, Palo Alto, CA.

    Google Scholar 

  • Forman C, Ghose A and Wiesenfeld B (2008) Examining the relationship between reviews and sales: the role of reviewer identity disclosure in electronic markets. Information Systems Research 19(3), 291–313.

    Article  Google Scholar 

  • Fornell C and Larcker DF (1981) Evaluating structural equation models with unobservable variables and measurement error. Journal of Marketing Research 18(1), 39–50.

    Article  Google Scholar 

  • Ganesan S (1994) Determinants of long-term orientation in buyer-seller relationships. Journal of Marketing 58(2), 1–19.

    Article  Google Scholar 

  • Gefen D (2002) Customer loyalty in e-commerce. Journal of the Association for Information Systems 3(1), 27–51.

    Google Scholar 

  • Hair JF, Black WC, Babin BJ and Anderson RE (2010) Multivariate Data Analysis. (7th ed.). Prentice-Hall, Upper Saddle River, New Jersey.

    Google Scholar 

  • Hogg MA and Turner JC (1985) Interpersonal attraction, social identification and psychological group formation. European Journal of Social Psychology 15(1), 51–66.

    Article  Google Scholar 

  • Hollenbaugh EE and Ferris AL (2014) Facebook self-disclosure: examining the role of traits, social cohesion, and motives. Computers in Human Behavior 30, 50–58.

    Article  Google Scholar 

  • Hui K-L, Tan BCY and Goh C-Y (2006) Online information disclosure: motivators and measurements. ACM Transactions on Internet Technology 6(4), 415–441.

    Article  Google Scholar 

  • Hui K-L, Teo HH and Lee SYT (2007) The value of privacy assurance: an exploratory field experiment. MIS Quarterly 31(1), 19–33.

    Google Scholar 

  • Jarvenpaa SL, Knoll K and Leidner DE (1998) Is anybody out there? Antecedents of trust in global virtual teams. Journal of Management Information Systems 14(4), 29–64.

    Article  Google Scholar 

  • Johnson D and Grayson K (2005) Cognitive and affective trust in service relationships. Journal of Business Research 58(4), 500–507.

    Article  Google Scholar 

  • Joinson AN, Reips UD, Buchanan T and Schofield CBP (2010) Privacy, trust, and self-disclosure online. Human-Computer Interaction 25(1), 1–24.

    Article  Google Scholar 

  • Jones MA, Mothersbaugh DL and Beatty SE (2000) Switching barriers and repurchase intentions in services. Journal of Retailing 76(2), 259–274.

    Article  Google Scholar 

  • Kahneman D and Tversky A (1979) Prospect theory: an analysis of decision under risk. Econometrica 47, 263–291.

    Article  Google Scholar 

  • Kehr F, Kowatsch T, Wentzel D, Fleisch E (2015) Blissfully ignorant: the effects of general privacy concerns, general institutional trust, and affect in the privacy calculus. Information Systems Journal 25(6), 607–635.

    Article  Google Scholar 

  • Keith MJ, Thompson SC, Hale J and Lowry PB (2013) Information disclosure on mobile devices: re-examining privacy calculus with actual user behavior. International Journal of Human-Computer Studies 71(12), 1163–1173.

    Article  Google Scholar 

  • Keith MJ, Babb JS, Lowry PB, Furner CP and Abdullat A (2015) The role of mobile-computing self-efficacy in consumer information disclosure. Information Systems Journal 25(6), 637–667.

    Article  Google Scholar 

  • Kelman HC (1974) Further thoughts on the processes of compliance, identification, and internalization. (J.T. Tedeschi, Ed.), pp. 126–171, Perspectives on Social Power, IL: Aldines Press, Chicago.

  • Kelman HC (2006) Interests, relationships, identities: three central issues for individuals and groups in negotiating their social environment. Annual Review of Psychology 59(1), 1–26.

    Article  Google Scholar 

  • Kim SS and Son J-Y (2009) Out of dedication or constraint? A dual model of post-adoption phenomena and its empirical test in the context of online services. MIS Quarterly 33(1), 49–70.

    Google Scholar 

  • Klemperer P (1987) Markets with consumer switching costs. The Quarterly Journal of Economics 102(2), 375–394.

    Article  Google Scholar 

  • Koh J, Kim Y-G, Butler B and Bock G-W (2007) Encouraging participation in virtual communities. Communications of the ACM 50(2), 69–73.

    Article  Google Scholar 

  • Krasnova H, Spiekermann S, Koroleva K and Hildebrand T (2010) Online social networks: why we disclose? Journal of Information Technology 25(2), 109–125.

    Article  Google Scholar 

  • Lam SY, Shankar V, Erramilli MK and Murthy B (2004) Customer value, satisfaction, loyalty, and switching costs: an illustration from a business-to-business service context. Journal of the Academy of Marketing Science 32(3), 293–311.

    Article  Google Scholar 

  • Ledbetter AM, Mazer JP, Degroot JM, Meyer KR, Mao Y and Swafford B (2011) Attitudes toward online social connection and self-disclosure as predictors of Facebook communication and relational closeness. Communication Research 38(1), 27–53.

    Article  Google Scholar 

  • Lewis JD and Weigert A (1985) Trust as a social reality. Social Forces 63(4), 967–985.

    Article  Google Scholar 

  • Lewis W, Agarwal, R and Sambamurthy V (2003) Sources of influence on beliefs about information technology use: an empirical study of knowledge workers. MIS Quarterly 27(4), 657–678.

    Google Scholar 

  • Li Y (2012) Theories in online information privacy research: a critical review and an integrated framework. Decision Support Systems 54(1), 471–481.

    Article  Google Scholar 

  • Li T and Unger T (2012) Willing to pay for quality personalization? Trade-off between quality and privacy. European Journal of Information Systems 21(6), 621–642.

    Article  Google Scholar 

  • Li H, Sarathy R and Xu H (2011) The role of affect and cognition on online consumers’ decision to disclose personal information to unfamiliar online vendors. Decision Support Systems 51(3), 434–445.

    Article  Google Scholar 

  • Lindell MK and Whitney DJ (2001) Accounting for common method variance in cross-sectional research design. Journal of Applied Psychology 86(1), 114–121.

    Article  Google Scholar 

  • Lowry PB, Vance A, Moody G, Beckman B and Read A (2008) Explaining and predicting the impact of branding alliances and web site quality on initial consumer trust of e-commerce web sites. Journal of Management Information Systems 24(4), 199–224.

    Article  Google Scholar 

  • Luhmann N (1979) Trust and Power. Wiley, Chichester.

    Google Scholar 

  • Malhotra NK, Kim SS and Agarwal J (2004) Internet users’ information privacy concerns (IUIPC): the construct, the scale, and a causal model. Information Systems Research 15(4), 336–355.

    Article  Google Scholar 

  • Maneesriwongul W and Dixon JK (2004) Instrument translation process: a method review. Journal of Advanced Nursing 48(2), 175–186.

    Article  Google Scholar 

  • Marshall BA, Cardon PW, Norris DT, Goreva N and D’souza R (2008) Social networking websites in India and the United States: a cross-national comparison of online privacy and communication. Issues in Information Systems 9(2), 87–94.

    Google Scholar 

  • Mcallster DJ (1995) Affect- and cognition-based trust as foundations for interpersonal cooperation in organizations. Academy of Management Journal 38(1), 24–59.

    Article  Google Scholar 

  • Merlo O, Eisingerich AB and Auh S (2014) Why customer participation matters? MIT Sloan Management Review 55(2), 81–88.

    Google Scholar 

  • Metzger MJ (2004) Privacy, trust, and disclosure: exploring barriers to electronic commerce. Journal of Computer Mediated Communication 9(4). doi:10.1111/j.1083-6101.2004.tb00292.x.

  • Moon Y (2000) Intimate exchange: using computers to elicit self-disclosure from consumers. Journal of Consumer Research 26(4), 323–339.

    Article  Google Scholar 

  • Moorman C, Zaltman G and Deshpandé R (1992) Relationships between providers and users of market research: the dynamics of trust within and between organizations. Journal of Marketing Research 29(3), 314–328.

    Article  Google Scholar 

  • Nielsen (2011) How social media impacts brand marketing. http://www.nielsen.com/content/corporate/us/en/newswire/2013.html?q=onlinereviews&sortbyScore=false&start=10 (accessed April 2014).

  • Nunnally J (1978) Psychometric Theory. McGraw-Hill, New York.

    Google Scholar 

  • Pavlou PA and Gefen D (2004) Building effective online marketplaces with institution-based trust. Information Systems Research 15(1), 37–59.

    Article  Google Scholar 

  • Petronio S (2002) Boundaries of Privacy: Dialectics of Disclosure. State University of New York Press, Albany.

    Google Scholar 

  • Podsakoff PM, Mackenzie SB, Lee J-Y and Podsakoff NP (2003) Common method biases in behavioral research: a critical review of the literature and recommended remedies. Journal of Applied Psychology 88(5), 879–903.

    Article  Google Scholar 

  • Porter CE and Donthu N (2008) Cultivating trust and harvesting value in virtual communities. Management Science 54(1), 113–128.

    Article  Google Scholar 

  • Posey C, Lowry PB, Roberts TL and Ellis TS (2010) Proposing the online community self-disclosure model: the case of working professionals in France and the U.K. who use online communities. European Journal of Information Systems 19(2), 181–195.

    Article  Google Scholar 

  • Preacher KJ and Hayes AF (2004) SPSS and SAS procedures for estimating indirect effects in simple mediation models. Behavior Research Methods, Instruments, & Computers 36(4), 717–731.

    Article  Google Scholar 

  • Prentice DA, Miller DT and Lightdale JR (1994) Asymmetries in attachments to groups and to their members: distinguishing between common-identity and common-bond groups. Personality and Social Psychology Bulletin 20(5), 484–493.

    Article  Google Scholar 

  • Rempel JK, Holmes JG and Zanna MD (1985) Trust in close relationships. Journal of Personality and Social Psychology 49(1), 95–112.

    Article  Google Scholar 

  • Ren Y, Kraut R and Kiesler S (2007) Applying common identity and bond theory to design of online communities. Organization Studies 28(3), 377–408.

    Article  Google Scholar 

  • Rotter JB (1980) Interpersonal trust, trustworthiness, and gullibility. American Psychologist 35(1), 1–7.

    Article  Google Scholar 

  • Rust RT and Lemon KN (2001) E-service and the customer. International Journal of electronic Commerce 5(3), 85–101.

    Google Scholar 

  • Sassenberg K (2002) Common bond and common identity groups on the Internet: attachment and normative behavior in on-topic and off-topic chats. Group Dynamics: Theory, Research, and Practice 6(1), 27–37.

    Article  Google Scholar 

  • Shapiro C and Varian HR (1999) Information Rules: A Strategic Guide to the New Economy. Harvard Business School Press, Boston.

    Google Scholar 

  • Sharma R, Yetton P and Crawford J (2009) Estimating the effect of common method variance: the method-method pair technique with an illustration from TAM research. MIS Quarterly 33(3), 473–490.

    Google Scholar 

  • Sheth JN and Parvatiyar A (1995) Relationship marketing in consumer markets: antecedents and consequences. Journal of the Academy of Marketing Science 23(4), 255–271.

    Article  Google Scholar 

  • Stanley SM and Markman HJ (1992) Assessing commitment in personal relationships. Journal of Marriage and the Family 54(3), 595–608

    Article  Google Scholar 

  • Staples DN and Webster J (2008) Exploring the effects of trust, task interdependence and virtualness on knowledge sharing in teams. Information Systems Journal 18, 617–640.

  • Straub DW (1989) Validating instruments in MIS research. MIS Quarterly 13(2), 147–169.

    Article  Google Scholar 

  • Straub DW, Boudreau M-C and Gefen D (2004) Validation guidelines for IS positivist research. Communications of the Association for Information Systems 13, 380–427.

    Google Scholar 

  • Tajfel H (1978) Interindividual behavior and intergroup behavior. In Differentiation Between Groups: Studies in the Social Psychology of Intergroup Relations (H. Taifel, Ed.), pp. 27–60, Academic Press, London.

    Google Scholar 

  • Teger A (1980) Too Much Invested to Quit. Pergamon Press, New York.

    Google Scholar 

  • Tversky A and Kahneman D (1991) Loss aversion in riskless choice: a reference-dependent model. Quarterly Journal of Economics 106(4), 1039–1061.

    Article  Google Scholar 

  • Wakefield RL, Wakefield KL, Baker J and Wang LC (2011) How website socialness leads to website use. European Journal of Information Systems 20(1), 118–132.

    Article  Google Scholar 

  • Wattal S, Racherla P and Mandviwalla M (2010) Network externalities and technology use: a quantitative analysis of intraorganizational blogs. Journal of Management Information Systems 27(1), 151–180.

    Article  Google Scholar 

  • Wheaton B, Muthén B, Alwin DF and Summers GF (1977) Assessing reliability and stability in panel models. Sociological Methodology 8, 84–136.

    Article  Google Scholar 

  • Xu H, Teo HH, Tan BCY and Agarwal R (2009) The role of push-pull technology in privacy calculus: the case of location-based services. Journal of Management Information Systems 26(3), 135–173.

    Article  Google Scholar 

  • Zhao X, Lynch JG and Chen Q (2010) Reconsidering Baron and Kenny: myths and truths about mediation analysis. Journal of Consumer Research 37(2), 197–206.

    Article  Google Scholar 

  • Zhou Z, Fang Y, Vogel DR, Jin X-L and Zhang X (2012) Attracted to or locked in? Predicting continuance intention in social virtual world services. Journal of Management Information Systems 29(1), 273–305.

    Article  Google Scholar 

  • Zimmer JC, Arsal R, Al-Marzouq M, Moore D and Grover V (2010) Knowing your customers: using a reciprocal relationship to enhance voluntary information disclosure. Decision Support Systems 48(2), 395–406.

    Article  Google Scholar 

  • Zlatolas LN, Welzer T, Heričko M and Hölbl M (2015) Privacy antecedents for SNS self-disclosure: The case of Facebook. Computers in Human Behavior 45, 158–167.

    Article  Google Scholar 

  • Zwass V (2010) Co-creation: toward a taxonomy and an integrated research perspective. International Journal of Electronic Commerce 15(1), 11–48.

    Article  Google Scholar 

Download references

Acknowledgements

We are grateful to the AE and referees for their helpful comments on earlier versions of our paper. Cheng was supported in part by The Hong Kong Polytechnic University under the Fung Yiu King - Wing Hang Bank Endowed Professorship in Business Administration.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Hung-pin Shih.

Additional information

Associate Editor:

Paul Benjamin Lowry.

Editor:

Dov Te'eni.

Appendices

Appendix A: Measurement items

Table A1.

Table A1 .

Appendix B: The literature of self-disclosure and the design and test of the measurement instrument

Table B1 Theories for predicting self-disclosure

The measurement instrument development

To survey those users of Yahoo (Taiwan) e-auction forum, we performed the translation of the measurement instrument in the form of a survey questionnaire from English to traditional Chinese. According to Brislin et al (1973), back-translation, bilingual techniques, commitment approach, and pretest were four techniques for enhancing instrument translation in cross-cultural research. Maneesriwongul and Dixon (2004) recommended that minimum standards for developing an instrument should at least include back-translation and monolingual testing among target language subjects. We followed the recommendation by using three appropriate techniques except for bilingual ones. This study did not follow the bilingual techniques because of the complexity in assessing cultural relevance and how it uniquely influences semantic equivalence between the source and target language versions. In the first step, we recruited bilingual experts in marketing and MIS to perform the translation from the source (English) to the target language (Chinese). One expert conducted forward translation, whereas the other expert conducted back-translation. In the back-translation, the target language version was translated back into the source language version for verifying the semantic equivalence. In the second step, following the committee approach, the expert panel cooperatively and mutually examined the original and back-translated versions. This expert panel iteratively conducted the back-translation until they reached a consensus on the instrument translation. In the third step, a pilot test was conducted to examine the clarity of the target language version among its monolingual subjects after completing the instrument translation. From the pilot test, discrepancies between the source and the target versions were identified, and the target version was also improved for formal survey. This survey did not focus on particular participants, and all volunteers understood that this academic survey would not apply for business-use profits. In sum, the instrument was developed by following the recommended techniques and thereby should possess face validity.

Regarding the scale for self-disclosure intention, this study developed new measures because the scale from the literature was not appropriate for this study. Previous studies often combine credibility and benevolence to assess the trust construct (Doney & Cannon, 1997; Ba & Pavlou, 2002). In this study, we consider cognitive trust and affective trust as distinct but correlated constructs. Hence, we measured cognitive trust in terms of the credibility dimension and affective trust in terms of the benevolence dimension. We dropped the integrity dimension because of the research goal on the comparison between cognition and affect in the trust building. Early scales for switching cost (e.g. money, time, and effort) are difficult to meet the current survey that focuses on the loss of loyalty benefits. We thus measured switching cost using new scales that refer to the cost of terminating the current relationship. This study measured dependency using new scales that refer to psychological costs or burdens incurred when participants seek better alternatives either for substitution or for more choices. Most measurement items were developed from prior studies and revised by experts for assessing the true properties of theoretical constructs, suggesting the instrument achieves content validity (Straub, 1989).

Table B2 CFA results: factor loadings and cross-loadings of measurement items

CMV analysis

We took necessary steps to avoid the effects of CMV in the administration of questionnaire survey, including guarantee of respondent anonymity, counterbalance of question order, and improvement of scale items as recommended by Podsakoff et al (2003). Moreover, most constructs were measured in terms of previously validated measures and examined via pretest in order to increase the validity of the theoretical model (Sharma et al, 2009). We also examined CMV using a post hoc approach with two tests on the self-reported data. First, the test of inter-construct correlations (Table 2) shows that the highest correlation between the research constructs (0.594 for ASI-ESI) is far below the threshold of 0.90 (Bagozzi et al, 1991), indicating the effect of CMV is small. Second, we applied the partial correlation approach recommended by Lindell and Whitney (2001) to test CMV. In this study, we partial out the lowest correlation among the variables to test the effect of a method variance. The correlations among non-partial out variables did not cause a significant inflation, suggesting that our empirical results were unlikely to be explained by CMV. Overall, the effect of CMV is small in the survey.

Model-fit indices

The seven model-fit indices and corresponding cut-off values are (Wheaton et al, 1977; Bagozzi and Yi, 1988): Chi-square/degree of freedom (χ2/df ≤ 5.00), standardized root-mean-square residual (RMR ≤ 0.05), root-mean-square error of approximation (RMSEA ≤ 0.08), goodness-of-fit index (GFI ≥ 0.90), adjusted goodness-of-fit index (AGFI ≥ 0.80), normed fit index (NFI ≥ 0.90), and comparative fit index (CFI ≥ 0.90). Definitions of absolute fit indices (χ2/df, GFI, AGFI, RMR, and RMSEA) and relative fit indices (NFI and CFI) can be found in the AMOS manuals.

Measurement model

We employ the structural equation modelling (SEM) package (AMOS) to perform confirmatory factor analysis (CFA) to examine the psychometric properties of the measurement items. The test of seven fitness indices (χ2/df = 2.303; RMR = 0.023; RMSEA = 0.057; GFI = 0.91; AGFI = 0.87; NFI = 0.94; CFI = 0.96) shows an acceptable fit of the measurement model according to the recommended cut-off values (“Appendix B”). In sum, the tests of convergent and discriminant validity, and goodness-of-fit of the measurement model establish factorial validity of this measurement instrument (Straub et al, 2004).

Mediation effect analysis

We follow the analytic procedures to examine three structural models with partial mediation, full mediation, and no mediation (Baron and Kenny, 1986). The no-mediation model has poor model-fit indices (χ2/df = 14.873; RMR = 0.149; RMSEA = 0.188; GFI = 0.83; AGFI = 0.71; NFI = 0.71; CFI = 0.72), which should be dropped in further tests. The full-mediation model has an appropriate model fit (χ2/df = 3.861; RMR = 0.04; RMSEA = 0.08; GFI = 0.94; AGFI = 0.89; NFI = 0.94; CFI = 0.95). The partial-mediation model has a good model fit (χ2/df = 1.940; RMR = 0.03; RMSEA = 0.05; GFI = 0.97; AGFI = 0.94; NFI = 0.97; CFI = 0.98). Following the recommended procedures of Preacher and Hayes (2004), we run SPSS Macro (e.g. PROCESS.spd) programmed by Hayes to test indirect effects on SD. Taking the theoretical lens and mediation models into account (Zhao et al, 2010), we use the full-mediation model to conduct the hypothesis testing.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Shih, Hp., Lai, Kh. & Cheng, T.C.E. Constraint-based and dedication-based mechanisms for encouraging online self-disclosure: Is personalization the only thing that matters?. Eur J Inf Syst 26, 432–450 (2017). https://doi.org/10.1057/s41303-016-0031-0

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1057/s41303-016-0031-0

Keywords

Navigation