1 Introduction

Social media tools are currently emerging as the new means for value creation and realization for many organizations across all industries. Indeed, social media tools (e.g., Facebook, Twitter) have the capability of transforming the way firms conduct their businesses, by allowing for example, an improved way of identifying products with high market potential [1], a superior mechanism for engaging (e.g., attract and retain) with online consumers [2], a robust platform for marketing communication [3], and a better collaboration channel with all firm stakeholders [4, 5]. It is probably for these reasons that some scholars argue that social media are at the core of the “social commerce”, which is considered as the new wave of electronic commerce, and defined as “a form of Internet-based social media that allows people to participate in the marketing, selling, comparing, and buying of products and services in online marketplaces and communities” (p. 215) [6].

The high operational and strategic potential of social media as enabler of organizational change for competitive advantage has been acknowledged by the professional literature as well as the emerging research on the topic. However, technological innovation history tells us that the path toward the wide acceptance of any given innovation by businesses can be quite long. Therefore, it is critical to look at the key determinants that may drive the adoption and use of social media by organizations. More specifically, this study examines the following research questions:

  1. 1.

    What is the impact of perceived connectivity on the intention to use social media in organizations?

  2. 2.

    What is the moderating effect of perceived risk and security on this relationship?

To address these research questions, the study explores the embryonic literature on social media, the diffusion of innovation theory, risk and security issues to develop a conceptual research model. More precisely, we argue that social media’s perceived connectivity will have a positive impact on the intention to use social media. Then, perceived risk and perceived security will have moderating effects on the said relationship. The proposed model was tested using data from 2,556 social media users for their daily activities across various industries in Australia, Canada, India, the UK, and the US. The rest of the paper is structured as follows: first, we present the conceptual model and hypotheses; next, we discuss the research methodology; the following section presents the results; then we present the discussion, implications, limitations and future research perspectives; finally, we present the conclusion of the study.

2 Theoretical Development

From the emerging literature on social media, the diffusion of innovation theory, risk and security issues, a conceptual model based is presented in Fig. 1. In the model, we argue that Perceived connectivity (PC) of social media in organizations will have a positive impact on the intention to use (IU) social media. However, this relationship will be moderated by both perceived risk (PR) and perceived security (PS).

Fig. 1.
figure 1

Research model

Perceived connectivity which is defined as the ability of a social media platform to bring together people who share common interests or goals [7] is considered as an important determinant of IT adoption and use [8, 9]. The importance of this construct is even greater for interactive innovations since their adoption and effective use by a critical mass of users will impact positive network externalities on all users [10]. Evidence supporting this postulate exists in prior studies on the user acceptance of enterprise instant messaging [8], and the acceptance of electronic mail (e-mail) and instant messaging (IM) [9].

Perceived risk and perceived security play an important role in IT adoption and use. Perceived risk is defined as “the extent to which a functional or psychosocial risk a user feels he/she is taking when using a product”, whereas perceived security is defined as “the subjective probability with which users believe their sensitive information (business or private) will not be viewed, stored, and manipulated during work sessions by unauthorized parties in a manner consistent with their confident expectations” (p. 165) [8].

Due to the emergence of Web 2.0 and social media in the last decade, there is an increasing trend in the creation and exchange of user generated contents. People express themselves in virtual communities for communication, networking or amusement through constant interaction in the form of information creation, redistribution and exchange [11]. Indeed, social network sites and many online platforms are used by individuals to share private information effortlessly and seamlessly in great detail and volume [11]. These massive amounts of data, referred to as big data, often used for personalized offers or targeting potential customers. However, Akter & Wamba [12] report that unexpected consequences can have on perceived risk and security when marketers target consumers in the big data environment. Because, it raises the question of safe handling of individual and organizational privacy and data security (e.g., names and addresses, social security numbers, credit card numbers, and financial information). Although consumers increasingly share personal information in e-commerce sites or in social networks, it is expected for firms not to breach consumers’ privacy because consumers disclose information expecting it to be confidential under ‘terms of use’ [13]. Despite consumers’ expectations for anonymous data to protect their security and risk, the ever growing big data environment and social commerce raise the question of perceived risk and security. Scholars have identified the current environment as informal and poorly structured [14, 15]. Moreover, prior studies on social media adoption and use by organizations have identified perceived risk [3] and perceived security as s factors that can slow down their adoption.

Thus, we propose the following hypotheses:

H1:

PC has a significant positive effect on the IU social media in organizations.

H2:

PR negatively moderates the relationship between PC and IU social media in organizations.

H3:

PS positively moderates the relationship between PC and IU social media in organizations.

3 Methodology

This study is part of a larger study conducted by the Institute for Innovation in Business and Social Research (IIBSoR) of the University of Wollongong in Australia.

In this study, a web based-survey employed to collect data from 2,556 social media users within their workplaces in Australia, Canada, India, the UK, and the US in January 2013. The data collection process was handled by a leading international market research provider called Survey Sampling International (SSI). All items used in the study were taken from prior studies and adapted to the context of social media adoption and use in organizations [8, 16]. They were measured using 7-point Likert scale with anchors ranging from Strongly Disagree (1) to Strongly Agree (7) (Appendix).

For the data analysis, a statistical Excel add-in tool called XLSTAT-PLS (version of 2013.6.04) was used using Partial Least Squares (PLS) based Path Modeling. In this study, the reliability and validity of the items were evaluated. For model assessment, all item loadings values that are higher than 0.70 are considered to be adequate. A composite reliability value that is higher than 0.70 is considered to be acceptable [17]. For average variance extracted (AVE), a value that is higher than 0.50 is considered as acceptable measure justifying the use of a construct [17].

For the moderating effects testing, we use the two stage approach proposed by [3] using XLSTAT as following [18]: (1) we ran the main effect model, (2) extract the latent variable scores, (3) use the extracted latent variable scores as indicators of the exogenous and endogenous variables, and (4) use the element wise product of the latent variable scores of the exogenous variable and the moderator variable as the indicator of the interaction term.

4 Results and Discussion

Table 1 presents the descriptive statistics of our manifest variables. PC is the latent variable with the items with the highest means. Indeed, all PC items have a mean greater than five (5) with items measure using a Likert scale ranging from 1 to 7. On the other hands, PS is the latent variable with the lowest items values (3.68 and 3.706).

Table 1. Descriptive statistics of measured manifest variables

Table 2 displays all factor loadings, Cronbach’s alpha values, composite reliability and average variance extracted (AVE) of the latent variables. From Table 2, we can see that all values meet the recommended acceptable threshold values—respectively, 0.6, 0.7, 0.7 and 0.5 [19] —and consequently justify the use of all our constructs in the model.

Table 2. Factor loadings, Cronbach’s Alpha, composite reliability and AVE

Table 3 represents the correlation matrix with the square root of the AVEs in the diagonals. From the table, we can see that all values exceed the inter-correlations of the construct with the other constructs in the model, and therefore confirming the discriminant validity [2022]. In fact, the discriminant validity is confirmed when all the bold values on the diagonal representing the square root of the AVE are higher than the inter-correlations of all constructs in the model.

Table 3. Correlations matrix (The bold values on the diagonal are the square root of the AVE)

Table 4 presents a value of 0.644 for the absolute goodness of fit (GoF) and a value of 0.980 for the relative GoF, which are all above the threshold values. Indeed, an absolute GoF greater than 0.5 is considered satisfactory, and a relative GoF that is close to 0.90 is considered as a great fit of a model [23], and accordingly, we can conclude that the research model has an excellent fit.

Table 4. Goodness of fit index

Figure 2 presents the research results. From the figure, we see that the standardized path coefficient of the relationship between PC and IU social media in organizations is significant at a level of 0.001, and thus supporting our hypothesis (H1). However, all the standardized path coefficients related to the moderating effects of PR and PS are not significant, and therefore, we have to reject H2 and H3. In addition, the coefficient of determination, R2 is 0.521 for the IU social media in organizations, thus suggesting a good fit of the data with our proposed model.

Fig. 2.
figure 2

Research results

Consistent with prior studies [9, 18], this study found that PC of social media is a significant predictor of IU. This result confirms that users perceived positive network externalities of social media have a positive impact on their use of social media [9]. However, the study found no moderating effects of PR and PS on the relationship between PC and IU. A possible explanation of this result may be the fact that within organizations, several protection mechanisms related to the use of media have been implemented to create a safe usage environment.

5 Conclusion and Future Research Directions

The main objective of this paper was to assess the impact of perceived connectivity (PC) on the intention to use (IU) social media in organizations, as well as the moderating effects of perceived risk (PR) and security (PS) on this relationship. Our proposed model provides strong empirical evidence that perceived connectivity positively impact users’ intention to use social media in organizations. However, the study found no moderating effects of both perceived risk and security.

Still, the big data driven social media environment raises enormous questions on risk and security as a result of mass scale surveillance, manipulation, and profiling. Undoubtedly, the current environment has challenged the autonomy of individuals by neglecting their consent and acknowledgment. Since social connectivity are increasingly used for security, marketing, health, business, and many other social aspects, the predictions and decisions that are made using social data should be scientific, error- free and objective.

The study presents some limitations: First, the data were collected using a cross-sectional design. Future studies should consider using a longitudinal study or case study to gain a deeper understanding related to social media adoption and use within organizations. Second, the study doesn’t assess cultural differences within the sample. Future research could focus on analysing the impact of cultural factors on the adoption and use of social media within organizations. Third, this study doesn’t consider a specific type of social media platform. In fact, prior studies suggest that adoption factors vary depending on the type of social media platform under study [24]. Therefore, future studies could focus on one specific type of social media platform.