Abstract
The main objective of this study is to assess the impact of perceived connectivity (PC) on the intention to use (IU) social media in organizations, as well as the moderating effects of perceived risk (PR) and perceived security (PS) on this relationship. Data were collected from 2,556 social media users across Australia, Canada, India, the UK, and the US to test our proposed research model. Our results found that PC has a significant positive effect on the IU social media in organizations, and non-significant moderating effects of PR and PS. The study concludes with the implications for practice and research.
You have full access to this open access chapter, Download conference paper PDF
1 Introduction
Social media tools are currently emerging as the new means for value creation and realization for many organizations across all industries. Indeed, social media tools (e.g., Facebook, Twitter) have the capability of transforming the way firms conduct their businesses, by allowing for example, an improved way of identifying products with high market potential [1], a superior mechanism for engaging (e.g., attract and retain) with online consumers [2], a robust platform for marketing communication [3], and a better collaboration channel with all firm stakeholders [4, 5]. It is probably for these reasons that some scholars argue that social media are at the core of the “social commerce”, which is considered as the new wave of electronic commerce, and defined as “a form of Internet-based social media that allows people to participate in the marketing, selling, comparing, and buying of products and services in online marketplaces and communities” (p. 215) [6].
The high operational and strategic potential of social media as enabler of organizational change for competitive advantage has been acknowledged by the professional literature as well as the emerging research on the topic. However, technological innovation history tells us that the path toward the wide acceptance of any given innovation by businesses can be quite long. Therefore, it is critical to look at the key determinants that may drive the adoption and use of social media by organizations. More specifically, this study examines the following research questions:
-
1.
What is the impact of perceived connectivity on the intention to use social media in organizations?
-
2.
What is the moderating effect of perceived risk and security on this relationship?
To address these research questions, the study explores the embryonic literature on social media, the diffusion of innovation theory, risk and security issues to develop a conceptual research model. More precisely, we argue that social media’s perceived connectivity will have a positive impact on the intention to use social media. Then, perceived risk and perceived security will have moderating effects on the said relationship. The proposed model was tested using data from 2,556 social media users for their daily activities across various industries in Australia, Canada, India, the UK, and the US. The rest of the paper is structured as follows: first, we present the conceptual model and hypotheses; next, we discuss the research methodology; the following section presents the results; then we present the discussion, implications, limitations and future research perspectives; finally, we present the conclusion of the study.
2 Theoretical Development
From the emerging literature on social media, the diffusion of innovation theory, risk and security issues, a conceptual model based is presented in Fig. 1. In the model, we argue that Perceived connectivity (PC) of social media in organizations will have a positive impact on the intention to use (IU) social media. However, this relationship will be moderated by both perceived risk (PR) and perceived security (PS).
Perceived connectivity which is defined as the ability of a social media platform to bring together people who share common interests or goals [7] is considered as an important determinant of IT adoption and use [8, 9]. The importance of this construct is even greater for interactive innovations since their adoption and effective use by a critical mass of users will impact positive network externalities on all users [10]. Evidence supporting this postulate exists in prior studies on the user acceptance of enterprise instant messaging [8], and the acceptance of electronic mail (e-mail) and instant messaging (IM) [9].
Perceived risk and perceived security play an important role in IT adoption and use. Perceived risk is defined as “the extent to which a functional or psychosocial risk a user feels he/she is taking when using a product”, whereas perceived security is defined as “the subjective probability with which users believe their sensitive information (business or private) will not be viewed, stored, and manipulated during work sessions by unauthorized parties in a manner consistent with their confident expectations” (p. 165) [8].
Due to the emergence of Web 2.0 and social media in the last decade, there is an increasing trend in the creation and exchange of user generated contents. People express themselves in virtual communities for communication, networking or amusement through constant interaction in the form of information creation, redistribution and exchange [11]. Indeed, social network sites and many online platforms are used by individuals to share private information effortlessly and seamlessly in great detail and volume [11]. These massive amounts of data, referred to as big data, often used for personalized offers or targeting potential customers. However, Akter & Wamba [12] report that unexpected consequences can have on perceived risk and security when marketers target consumers in the big data environment. Because, it raises the question of safe handling of individual and organizational privacy and data security (e.g., names and addresses, social security numbers, credit card numbers, and financial information). Although consumers increasingly share personal information in e-commerce sites or in social networks, it is expected for firms not to breach consumers’ privacy because consumers disclose information expecting it to be confidential under ‘terms of use’ [13]. Despite consumers’ expectations for anonymous data to protect their security and risk, the ever growing big data environment and social commerce raise the question of perceived risk and security. Scholars have identified the current environment as informal and poorly structured [14, 15]. Moreover, prior studies on social media adoption and use by organizations have identified perceived risk [3] and perceived security as s factors that can slow down their adoption.
Thus, we propose the following hypotheses:
H1:
PC has a significant positive effect on the IU social media in organizations.
H2:
PR negatively moderates the relationship between PC and IU social media in organizations.
H3:
PS positively moderates the relationship between PC and IU social media in organizations.
3 Methodology
This study is part of a larger study conducted by the Institute for Innovation in Business and Social Research (IIBSoR) of the University of Wollongong in Australia.
In this study, a web based-survey employed to collect data from 2,556 social media users within their workplaces in Australia, Canada, India, the UK, and the US in January 2013. The data collection process was handled by a leading international market research provider called Survey Sampling International (SSI). All items used in the study were taken from prior studies and adapted to the context of social media adoption and use in organizations [8, 16]. They were measured using 7-point Likert scale with anchors ranging from Strongly Disagree (1) to Strongly Agree (7) (Appendix).
For the data analysis, a statistical Excel add-in tool called XLSTAT-PLS (version of 2013.6.04) was used using Partial Least Squares (PLS) based Path Modeling. In this study, the reliability and validity of the items were evaluated. For model assessment, all item loadings values that are higher than 0.70 are considered to be adequate. A composite reliability value that is higher than 0.70 is considered to be acceptable [17]. For average variance extracted (AVE), a value that is higher than 0.50 is considered as acceptable measure justifying the use of a construct [17].
For the moderating effects testing, we use the two stage approach proposed by [3] using XLSTAT as following [18]: (1) we ran the main effect model, (2) extract the latent variable scores, (3) use the extracted latent variable scores as indicators of the exogenous and endogenous variables, and (4) use the element wise product of the latent variable scores of the exogenous variable and the moderator variable as the indicator of the interaction term.
4 Results and Discussion
Table 1 presents the descriptive statistics of our manifest variables. PC is the latent variable with the items with the highest means. Indeed, all PC items have a mean greater than five (5) with items measure using a Likert scale ranging from 1 to 7. On the other hands, PS is the latent variable with the lowest items values (3.68 and 3.706).
Table 2 displays all factor loadings, Cronbach’s alpha values, composite reliability and average variance extracted (AVE) of the latent variables. From Table 2, we can see that all values meet the recommended acceptable threshold values—respectively, 0.6, 0.7, 0.7 and 0.5 [19] —and consequently justify the use of all our constructs in the model.
Table 3 represents the correlation matrix with the square root of the AVEs in the diagonals. From the table, we can see that all values exceed the inter-correlations of the construct with the other constructs in the model, and therefore confirming the discriminant validity [20–22]. In fact, the discriminant validity is confirmed when all the bold values on the diagonal representing the square root of the AVE are higher than the inter-correlations of all constructs in the model.
Table 4 presents a value of 0.644 for the absolute goodness of fit (GoF) and a value of 0.980 for the relative GoF, which are all above the threshold values. Indeed, an absolute GoF greater than 0.5 is considered satisfactory, and a relative GoF that is close to 0.90 is considered as a great fit of a model [23], and accordingly, we can conclude that the research model has an excellent fit.
Figure 2 presents the research results. From the figure, we see that the standardized path coefficient of the relationship between PC and IU social media in organizations is significant at a level of 0.001, and thus supporting our hypothesis (H1). However, all the standardized path coefficients related to the moderating effects of PR and PS are not significant, and therefore, we have to reject H2 and H3. In addition, the coefficient of determination, R2 is 0.521 for the IU social media in organizations, thus suggesting a good fit of the data with our proposed model.
Consistent with prior studies [9, 18], this study found that PC of social media is a significant predictor of IU. This result confirms that users perceived positive network externalities of social media have a positive impact on their use of social media [9]. However, the study found no moderating effects of PR and PS on the relationship between PC and IU. A possible explanation of this result may be the fact that within organizations, several protection mechanisms related to the use of media have been implemented to create a safe usage environment.
5 Conclusion and Future Research Directions
The main objective of this paper was to assess the impact of perceived connectivity (PC) on the intention to use (IU) social media in organizations, as well as the moderating effects of perceived risk (PR) and security (PS) on this relationship. Our proposed model provides strong empirical evidence that perceived connectivity positively impact users’ intention to use social media in organizations. However, the study found no moderating effects of both perceived risk and security.
Still, the big data driven social media environment raises enormous questions on risk and security as a result of mass scale surveillance, manipulation, and profiling. Undoubtedly, the current environment has challenged the autonomy of individuals by neglecting their consent and acknowledgment. Since social connectivity are increasingly used for security, marketing, health, business, and many other social aspects, the predictions and decisions that are made using social data should be scientific, error- free and objective.
The study presents some limitations: First, the data were collected using a cross-sectional design. Future studies should consider using a longitudinal study or case study to gain a deeper understanding related to social media adoption and use within organizations. Second, the study doesn’t assess cultural differences within the sample. Future research could focus on analysing the impact of cultural factors on the adoption and use of social media within organizations. Third, this study doesn’t consider a specific type of social media platform. In fact, prior studies suggest that adoption factors vary depending on the type of social media platform under study [24]. Therefore, future studies could focus on one specific type of social media platform.
References
Liang, T.-P., Turban, E.: Introduction to the special issue social commerce: a research framework for social commerce. Int. J. Electron. Commer. 16(2), 5–14 (2011)
IBM: Social Commerce Defined. IBM (2009)
Munnukka, J., Järvi, P.: Perceived risks and risk management of social media in an organizational context. Electron. Markets 24(3), 219–229 (2014)
Culnan, M.J., McHugh, P.J., Zubillaga, J.I.: How large US companies can use Twitter and other social media to gain business value. MIS Q. Executive 9(4), 243–259 (2010)
Burke, W.Q., Fields, D.A., Kafai, Y.B.: Entering the clubhouse: case studies of young programmers joining the online scratch communities. J. Organ. End User Comput. 22, 21–35 (2010)
Stephen, A.T., Toubia, O.: Deriving value from social commerce networks. J. Market. Res. 47(2), 215–228 (2010)
Benbasat, I.: A program of studies to improve the communication between customers and online stores. In: Galletta, D.F., Zhang, P. (eds.) Human-Computer Interaction and Management Information Systems: Application. Advances in Management Information Systems (2006)
Trinchera, L.: Unobserved heterogeneity in structural equation models: a new approach to latent class detection in PLS path modeling, p. 338. Universita degli Studi di Napoli Federico II, Napoli(2007)
Strader, T.J., Ramaswami, S.N., Houle, P.A.: Perceived network externalities and communication technology acceptance. Eur. J. Inf. Syst. 16(1), 54–65 (2007)
Fosso Wamba, S., Chatfield, A.T.: A contingency model for creating value from RFID supply chain network projects in logistics and manufacturing environments. Eur. J. Inf. Syst. 18(6), 615–636 (2009)
Gritzalis, D., et al.: History of information: the case of privacy and security in social media. In: Proceedings of the History of Information Conference (2014)
Akter, S., Wamba, S.F.: Big data analytics in e-commerce: a systematic review and agenda for future research. Electron. Markets 26, 1–22 (2016)
Martin, K.E.: Ethical issues in the big data industry. MIS Q. Executive (2015, Forthcoming)
Pantelis, K., Aija, L.: Understanding the value of (big) data. In: 2013 IEEE International Conference on Big Data (2013)
George, G., Haas, M.R., Pentland, A.: Big data and management. Acad. Manag. J. 57(2), 321–326 (2014)
Davis, F.D.: Perceived usefulness, perceived ease of use, and user acceptance of information technology. MIS Q. 13(3), 319–340 (1989)
Leung, J., Cheung, W., Chu, S.-C.: Aligning RFID applications with supply chain strategies. Inf. Manag. 51, 260–269 (2014)
Luo, X., Gurung, A., Shim, J.P.: Understanding the determinants of user acceptance of enterprise instant messaging: an empirical study. J. Organ. Comput. Electron. Commer. 20(2), 155–181 (2010)
Guadagnoli, E., Velicer, W.: Relation of sample size to the stability of component patterns. Psychol. Bull. 103, 265–275 (1988)
Chin, W.W.: The partial least squares approach for structural equation modeling (1998)
Chin, W.W.: How to write up and report PLS analyses. In: Handbook of Partial Least Squares, pp. 655–690 (2010)
Fornell, C., Larcker, D.F.: Evaluating structural equation models with unobservable variables and measurement error. J. Market. Res. 18, 39–50 (1981)
Rahimnia, F., Hassanzadeh, J.F.: The impact of website content dimension and e-trust on e-marketing effectiveness: the case of Iranian commercial Saffron corporations. Inf. Manag. 50(5), 240–247 (2013)
Fosso Wamba, S., Carter, L.: Twitter adoption and use by SMEs: an empirical study. In: The 46 Hawaii International Conferences on System Sciences (HICSS), Maui, Hawaii, US (2013)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Appendix: Adapted from [18]
Appendix: Adapted from [18]
Strongly Disagree | Moderately Disagree | Slightly Disagree | Undecided | Slightly Agree | Moderately Agree | Strongly Agree | |
---|---|---|---|---|---|---|---|
Perceived Connectivity | |||||||
Most of my colleagues use social media tools | 1 | 2 | 3 | 4 | 5 | 6 | 7 |
Among the colleagues I communicate with regularly, many use social media tools | 1 | 2 | 3 | 4 | 5 | 6 | 7 |
A large percentage of my colleagues use social media tools | 1 | 2 | 3 | 4 | 5 | 6 | 7 |
From my observation, the number of social media tools users is large | 1 | 2 | 3 | 4 | 5 | 6 | 7 |
Intention to Use | |||||||
If I have to temporarily use a computer without social media tool(s), I intend to install it (them). | 1 | 2 | 3 | 4 | 5 | 6 | 7 |
If I own a computer with social media tool(s), I intend to use it (them). | 1 | 2 | 3 | 4 | 5 | 6 | 7 |
Given that I have a computer with social media tool(s), I predict that I will use it (them) at work. | 1 | 2 | 3 | 4 | 5 | 6 | 7 |
I plan to use social media tools in the near future. | 1 | 2 | 3 | 4 | 5 | 6 | 7 |
Perceived Risk | |||||||
I think using social media tools is risky. | 1 | 2 | 3 | 4 | 5 | 6 | 7 |
Using social media tools will bring risk to my work | 1 | 2 | 3 | 4 | 5 | 6 | 7 |
Perceived Security | |||||||
I think my information on social media tools is secure. | 1 | 2 | 3 | 4 | 5 | 6 | 7 |
Using social media tools is secure | 1 | 2 | 3 | 4 | 5 | 6 | 7 |
Rights and permissions
Copyright information
© 2016 IFIP International Federation for Information Processing
About this paper
Cite this paper
Fosso Wamba, S., Akter, S. (2016). Impact of Perceived Connectivity on Intention to Use Social Media: Modelling the Moderation Effects of Perceived Risk and Security. In: Dwivedi, Y., et al. Social Media: The Good, the Bad, and the Ugly. I3E 2016. Lecture Notes in Computer Science(), vol 9844. Springer, Cham. https://doi.org/10.1007/978-3-319-45234-0_20
Download citation
DOI: https://doi.org/10.1007/978-3-319-45234-0_20
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-45233-3
Online ISBN: 978-3-319-45234-0
eBook Packages: Computer ScienceComputer Science (R0)