Advertisement

Journal of Business Ethics

, Volume 133, Issue 1, pp 111–123 | Cite as

Exploring the Security of Information Sharing on Social Networking Sites: The Role of Perceived Control of Information

  • Nick HajliEmail author
  • Xiaolin Lin
Article

Abstract

Social networking sites (SNS) have challenged ethical issues about users’ information security and privacy. SNS users are concerned about their privacy and need to control the information they share and its use. This paper examines the security of SNS by taking a look at the influence of users’ perceived control of information over their information-sharing behaviors. Employing an empirical study, this paper demonstrates the importance of perceived control in SNS users’ information-sharing behaviors. Specifically, perceived control has been found to be negatively related to perceived privacy risk and attitude toward information sharing, which in turn has an impact on their information-sharing behaviors. In addition, gender has been shown to be an important factor that moderates the influences of both perceived control and perceived privacy risk on SNS users’ attitudes toward information sharing. Theoretical and practical implications are discussed.

Keywords

Perceived control Privacy risk Information sharing Social networking sites Gender difference 

References

  1. Ahuja, M. K., & Thatcher, J. B. (2005). Moving beyond intentions and toward the theory of trying: Effects of work environment and gender on post-adoption information technology use. MIS Quarterly, 29, 427–459.Google Scholar
  2. Ajzen, I. (1991). The theory of planned behavior. Organizational Behavior and Human Decision Processes, 50, 179–211.CrossRefGoogle Scholar
  3. Ajzen, I. (2001). Nature and operation of attitudes. Annual Review of Psychology, 52, 27–58.CrossRefGoogle Scholar
  4. AJZEN, I. 2002. Attitudes. In R. Fernandez Ballesteros (Ed.), Encyclopedia of psychological assessment. London: Sage Publications, 1:110-115Google Scholar
  5. Arnold, V., Benford, T., Hampton, C., & Sutton, S. G. (2010). Competing pressures of risk and absorptive capacity potential on commitment and information sharing in global supply chains. European Journal of Information Systems, 19, 134–152.CrossRefGoogle Scholar
  6. Averill, J. R. (1973). Personal control over aversive stimuli and its relationship to stress. Psychological Bulletin, 80, 286.CrossRefGoogle Scholar
  7. Bandura, A. (1982). Self-efficacy mechanism in human agency. American Psychologist, 37, 122.CrossRefGoogle Scholar
  8. Bandura, A. (1997). Self-efficacy: The exercise of control. New York: Freeman.Google Scholar
  9. Barnes, SB. (2006). A privacy paradox: Social networking in the United States. First Monday, 11Google Scholar
  10. Baronas, A.-M. K., & Louis, M. R. (1988). Restoring a sense of control during implementation: how user involvement leads to system acceptance. Mis Quarterly, 12, 111–124.CrossRefGoogle Scholar
  11. Bélanger, F., & Crossler, R. E. (2011). Privacy in the digital age: a review of information privacy research in information systems. MIS Quarterly, 35, 1017–1042.Google Scholar
  12. Belanger, F., Hiller, J. S., & Smith, W. J. (2002). Trustworthiness in electronic commerce: The role of privacy, security, and site attributes. The Journal of Strategic Information Systems, 11, 245–270.CrossRefGoogle Scholar
  13. Berings, D., & Adriaenssens, S. (2012). The role of business ethics, personality, work values and gender in vocational interests from adolescents. Journal of Business Ethics, 106, 325–335.CrossRefGoogle Scholar
  14. Betz, M., O’Connell, L., & Shepard, J. M. (1989). Gender differences in proclivity for unethical behavior. Journal of Business Ethics, 8, 321–324.CrossRefGoogle Scholar
  15. Bugental, D., Blue, J., & Cruzcosa, M. (1989). Perceived control over caregiving outcomes: Implications for child abuse. Developmental Psychology, 25, 532–539.CrossRefGoogle Scholar
  16. Burger, J. M. (1989). Negative reactions to increases in perceived personal control. Journal of Personality and Social Psychology, 56, 246.CrossRefGoogle Scholar
  17. Chai, S., Das, S., & Rao, H. R. (2011). Factors affecting bloggers’ knowledge sharing: An investigation across gender. Journal of Management Information Systems, 28, 309–342.CrossRefGoogle Scholar
  18. Chiu, C.-M., Hsu, M.-H., & Wang, E. T. (2006). Understanding knowledge sharing in virtual communities: an integration of social capital and social cognitive theories. Decision Support Systems, 42, 1872–1888.CrossRefGoogle Scholar
  19. Connell, J. P. (1985). A new multidimensional measure of children’s perceptions of control. Child Development, 56, 1018–1041.CrossRefGoogle Scholar
  20. D’arcy, J., & Hovav, A. (2009). Does one size fit all? Examining the differential effects of IS security countermeasures. Journal of Business Ethics, 89, 59–71.CrossRefGoogle Scholar
  21. Davenport, T. H., & Pruzak, L. (2000). Working knowledge: How organizations manage what they know. New York: Harvard Business Press.Google Scholar
  22. Davidson, D. J., & Freudenburg, W. R. (1996). Gender and environmental risk concerns a review and analysis of available research. Environment and behavior, 28, 302–339.CrossRefGoogle Scholar
  23. Dinev, T., & Hart, P. (2006). An extended privacy calculus model for e-commerce transactions. Information Systems Research, 17, 61–80.CrossRefGoogle Scholar
  24. Dwyer, C., Hiltz, SR. & Passerini, K. Trust and privacy concern within social networking sites: A comparison of facebook and mySpace. AMCIS, 2007. p. 339Google Scholar
  25. Dwyer, P. D., Gilkeson, J. H., & List, J. A. (2002). Gender differences in revealed risk taking: evidence from mutual fund investors. Economics Letters, 76, 151–158.CrossRefGoogle Scholar
  26. Fishbein, M. (1963). An investigation of the relationship between beliefs about an object and the attitude toward that object. Human relations, 16, 233–240.CrossRefGoogle Scholar
  27. Fishbein, M., & AJZEN, I. (1975). Belief, attitude, intention and behavior: An introduction to theory and research Google Scholar
  28. Folkman, S. (1984). Personal control and stress and coping processes: A theoretical analysis. Journal of Personality and Social Psychology, 46, 839–852.CrossRefGoogle Scholar
  29. Fornell, C., & Larcker, D. F. (1981). Evaluating structural equation models with unobservable variables and measurement error. Journal of Marketing Research, 18, 39–50.CrossRefGoogle Scholar
  30. Garbarino, E., & Strahilevitz, M. (2004). Gender differences in the perceived risk of buying online and the effects of receiving a site recommendation. Journal of Business Research, 57, 768–775.CrossRefGoogle Scholar
  31. Govani, T., & Pashley, H. (2005). Student awareness of the privacy implications when using Facebook. Unpublished paper presented at the “Privacy Poster Fair” at the Carnegie Mellon University School of Library and Information Science, 9.Google Scholar
  32. Gustafsod, P. E. (1998). Gender differences in risk perception: Theoretical and methodological erspectives. Risk Analysis, 18, 805–811.CrossRefGoogle Scholar
  33. Hair, J. R. F., Black, W., Babin, B., Anderson, R., & Tatham, R. (2006). Multivariate data analysis. Upper Saddle River: Pearson.Google Scholar
  34. Hajli, M. N. (2014a). The role of social support on relationship quality and social commerce. Technological Forecasting and Social Change, 87, 17–27.CrossRefGoogle Scholar
  35. Hajli, N. (2014b). Developing online health communities through digital media. International Journal of Information Management, 34, 311–314.CrossRefGoogle Scholar
  36. Hajli, N. (2014c). A study of the impact of social media on consumers. International Journal of Market Research, 56, 95–113.CrossRefGoogle Scholar
  37. Hajli, N., Lin, X., Featherman, M., & Wang, Y. (2014). Social word of mouth: How trust develops in the market. International Journal of Market Research, 56, 1–30.CrossRefGoogle Scholar
  38. Harman, H. H. (1976). Modern factor analysis. Chicago: University of Chicago Press.Google Scholar
  39. Hoadley, C. M., Xu, H., Lee, J. J., & Rosson, M. B. (2010). Privacy as information access and illusory control: The case of the Facebook news feed privacy outcry. Electronic Commerce Research and Applications, 9, 50–60.CrossRefGoogle Scholar
  40. Hsu, M.-H., & Chiu, C.-M. (2004). Predicting electronic service continuance with a decomposed theory of planned behaviour. Behaviour & Information Technology, 23, 359–373.CrossRefGoogle Scholar
  41. Hsu, M.-H., Ju, T. L., Yen, C.-H., & Chang, C.-M. (2007). Knowledge sharing behavior in virtual communities: The relationship between trust, self-efficacy, and outcome expectations. International Journal of Human-Computer Studies, 65, 153–169.CrossRefGoogle Scholar
  42. Hsu, C.-L., & Lin, J. C.-C. (2008). Acceptance of blog usage: The roles of technology acceptance, social influence and knowledge sharing motivation. Information & Management, 45, 65–74.CrossRefGoogle Scholar
  43. Kamis, A., Koufaris, M., & Stern, T. (2008). Using an attribute-based decision support system for user-customized products online: An experimental investigation. MIS Quarterly, 32, 159–177.Google Scholar
  44. Keil, M., Tan, BC., Wei, K.-K., Saarinen, T., Tuunainen, V. & Wassenaar, A. (2000). A cross-cultural study on escalation of commitment behavior in software projects. Mis Quarterly, 299–325.Google Scholar
  45. Krasnova, H., Spiekermann, S., Koroleva, K., & Hildebrand, T. (2010). Online social networks: Why we disclose. Journal of Information Technology, 25, 109–125.CrossRefGoogle Scholar
  46. Langer, E. J. (1975). The illusion of control. Journal of Personality and Social Psychology, 32, 311.CrossRefGoogle Scholar
  47. Lee, J. (2012). Components of Medical Service Users’ Dissatisfaction: A Perceived Control Perspective. International Journal of Management and Marketing Research, 5, 53–63.Google Scholar
  48. Lee, J.-N., & Kim, Y.-G. (1999). Effect of partnership quality on IS outsourcing success: Conceptual framework and empirical validation. Journal of Management Information Systems, 15, 29–61.CrossRefGoogle Scholar
  49. Lin, X., Featherman, M., & Brooks, SL. (2013a). Factors affecting online consumer’s behavior: An investigation across gender. AMCIS 2013 ProceedingsGoogle Scholar
  50. Lin, X., Li, Y., Califf, CB., & Featherman, M. Can social role theory explain gender differences in facebook usage? System sciences (HICSS), 2013 46th Hawaii International Conference on, 2013b. IEEE, 690–699Google Scholar
  51. Liu, Y., Gummadi, KP., Krishnamurthy, B., & Mislove, A. (2011). Analyzing facebook privacy settings: user expectations vs. reality. Proceedings of the 2011 ACM SIGCOMM Conference on Internet Measurement Conference, ACM, 61–70Google Scholar
  52. Malhotra, N. K., Kim, S. S., & Agarwal, J. (2004). Internet users’ information privacy concerns (IUIPC): the construct, the scale, and a causal model. Information Systems Research, 15, 336–355.CrossRefGoogle Scholar
  53. Miranda, S. M., & Saunders, C. S. (2003). The social construction of meaning: An alternative perspective on information sharing. Information Systems Research, 14, 87–106.CrossRefGoogle Scholar
  54. Pavlou, P. A., & Fygenson, M. (2006). Understanding and predicting electronic commerce adoption: An extension of the theory of planned behavior. Mis Quarterly, 30, 115–143.Google Scholar
  55. Pavlou, P. A., Liang, H., & Xue, Y. (2007). Understanding and mitigating uncertainty in online exchange relationships: A principal-agent perspective. MIS Quarterly, 31, 105–136.Google Scholar
  56. Perry, R. P., Hladkyj, S., Pekrun, R. H., & Pelletier, S. T. (2001). Academic control and action control in the achievement of college students: A longitudinal field study. Journal of Educational Psychology, 93, 776–789.CrossRefGoogle Scholar
  57. Powell, M., & Ansic, D. (1997). Gender differences in risk behaviour in financial decision-making: An experimental analysis. Journal of Economic Psychology, 18, 605–628.CrossRefGoogle Scholar
  58. Qureshi, I., & Compeau, D. (2009). Assessing between-group differences in information systems research: A comparison of covariance-and component-based SEM. MIS Quarterly, 33, 197–214.Google Scholar
  59. Roman, S. (2007). The ethics of online retailing: a scale development and validation from the consumers’ perspective. Journal of Business Ethics, 72, 131–148.CrossRefGoogle Scholar
  60. Rotter, J. (1966). Generalized expectancies for internal vs. external control of reinforcement. Psychological Monographs, 80, 1–28.CrossRefGoogle Scholar
  61. Schulz, R., & Heckhausen, J. (1996). A lifespan model of successful aging. American Psychologist, 51, 702–714.CrossRefGoogle Scholar
  62. Scott, B. G., & Weems, C. F. (2010). Patterns of actual and perceived control: are control profiles differentially related to internalizing and externalizing problems in youth? Anxiety, Stress, & Coping, 23, 515–528.CrossRefGoogle Scholar
  63. Seligman, M. E. (1975). Helplessness: On depression, development, and death. London: WH Freeman/Times Books/Henry Holt & Co.Google Scholar
  64. Skinner, E. A. (1996). A guide to constructs of control. Journal of Personality and Social Psychology, 71, 549.CrossRefGoogle Scholar
  65. Skinner, E., Chapman, M., & Baltes, P. (1988). Control, means-ends, and agency beliefs: A new conceptualization and its measurement during childhood. Journal of Personality and Social Psychology, 54, 113–117.CrossRefGoogle Scholar
  66. Specht, J., Schmukle, S. C., & Egloff, B. (2013). Everything Under Control? The Effects of Age, Gender, and Education on Trajectories of Perceived Control in a Nationally Representative German Sample. Developmental Psychology, 49, 353–364.CrossRefGoogle Scholar
  67. Thompson, S., Sobolew-Shubin, A., Galbraith, M., Schwankovsky, L., & Cruzen, D. (1993). Maintaining perceptions of control: Finding perceived control in low-control circumstances. Journal of Personality and Social Psychology, 64, 293–304.CrossRefGoogle Scholar
  68. van Slyke, C., Shim, J., Johnson, R., & Jiang, J. (2006). Concern for information privacy and online consumer purchasing. Journal of the Association for Information Systems, 7, 415–444.Google Scholar
  69. Venkatesh, V., & Morris, M. G. (2000). Why don’t men ever stop to ask for directions? Gender, social influence, and their role in technology acceptance and usage behavior. Mis Quarterly, 24, 115–139.CrossRefGoogle Scholar
  70. Venkatesh, V., Thong, J., & Xu, X. (2012). Consumer acceptance and use of information technology: Extending the unified theory of acceptance and use of technology. MIS Quarterly, 36, 157–178.Google Scholar
  71. Wallhagen, M. (1992). Perceived control and adaptation in elder caregivers: Development of an explanatory model. International Journal of Aging and Human Development, 36, 219–237.CrossRefGoogle Scholar
  72. Wallston, K. A., Wallston, K. A., & Devellis, R. (1978). Development of the multidimensional health locus of control scales. Health Education Monographs, 6, 161–170.Google Scholar
  73. Weisz, J. R., & Stipek, D. J. (1982). Competence, contingency, and the development of perceived control. Human Development, 25, 250–281.CrossRefGoogle Scholar
  74. Westin, A. F. (1968). Privacy and freedom. Washington and Lee Law Review, 25, 166.Google Scholar
  75. Xu, H., Dinev, T., Smith, H. J., & Hart, P. (2008). Examining the formation of individual’s privacy concerns: Toward an integrative viewGoogle Scholar
  76. Xu, H. The Effects of Self-Construal and Perceived Control on Privacy Concerns. ICIS, 2007. Citeseer, 125Google Scholar
  77. Xu, H., & Teo, H.-H. (2004). Alleviating Consumers’ Privacy Concerns in Location-based Services: A Psychological Control Perspective. ICIS, 793–806Google Scholar
  78. Xu, H., Teo, H.-H., Tan, B. C., & Agarwal, R. (2012). Research note—effects of individual self-protection, industry self-regulation, and government regulation on privacy concerns: A study of location-based services. Information Systems Research, 23, 1342–1363.CrossRefGoogle Scholar
  79. Acquisti, A., & Gross, R. (2006) Imagined communities: Awareness, information sharing, and privacy on the Facebook. Privacy Enhancing Technologies, Springer, 36–58Google Scholar
  80. Yin, G., & Cheng, X. (2011). & ZHU, L. A Theoretical Model and Empirical Study of the Chinese Context: Understanding continuance usage of social networking services.Google Scholar
  81. Zhang, K. Z., Lee, M. K., Cheung, C. M., & Chen, H. (2009). Understanding the role of gender in bloggers’ switching behavior. Decision Support Systems, 47, 540–546.CrossRefGoogle Scholar

Copyright information

© Springer Science+Business Media Dordrecht 2014

Authors and Affiliations

  1. 1.Newcastle University Business SchoolNewcastle upon TyneUK
  2. 2.Department of Management, Information Systems, and Entrepreneurship (MISE), College of BusinessWashington State UniversityPullmanUSA

Personalised recommendations