Abstract
Social networking sites (SNS) have challenged ethical issues about users’ information security and privacy. SNS users are concerned about their privacy and need to control the information they share and its use. This paper examines the security of SNS by taking a look at the influence of users’ perceived control of information over their information-sharing behaviors. Employing an empirical study, this paper demonstrates the importance of perceived control in SNS users’ information-sharing behaviors. Specifically, perceived control has been found to be negatively related to perceived privacy risk and attitude toward information sharing, which in turn has an impact on their information-sharing behaviors. In addition, gender has been shown to be an important factor that moderates the influences of both perceived control and perceived privacy risk on SNS users’ attitudes toward information sharing. Theoretical and practical implications are discussed.
Similar content being viewed by others
References
Ahuja, M. K., & Thatcher, J. B. (2005). Moving beyond intentions and toward the theory of trying: Effects of work environment and gender on post-adoption information technology use. MIS Quarterly, 29, 427–459.
Ajzen, I. (1991). The theory of planned behavior. Organizational Behavior and Human Decision Processes, 50, 179–211.
Ajzen, I. (2001). Nature and operation of attitudes. Annual Review of Psychology, 52, 27–58.
AJZEN, I. 2002. Attitudes. In R. Fernandez Ballesteros (Ed.), Encyclopedia of psychological assessment. London: Sage Publications, 1:110-115
Arnold, V., Benford, T., Hampton, C., & Sutton, S. G. (2010). Competing pressures of risk and absorptive capacity potential on commitment and information sharing in global supply chains. European Journal of Information Systems, 19, 134–152.
Averill, J. R. (1973). Personal control over aversive stimuli and its relationship to stress. Psychological Bulletin, 80, 286.
Bandura, A. (1982). Self-efficacy mechanism in human agency. American Psychologist, 37, 122.
Bandura, A. (1997). Self-efficacy: The exercise of control. New York: Freeman.
Barnes, SB. (2006). A privacy paradox: Social networking in the United States. First Monday, 11
Baronas, A.-M. K., & Louis, M. R. (1988). Restoring a sense of control during implementation: how user involvement leads to system acceptance. Mis Quarterly, 12, 111–124.
Bélanger, F., & Crossler, R. E. (2011). Privacy in the digital age: a review of information privacy research in information systems. MIS Quarterly, 35, 1017–1042.
Belanger, F., Hiller, J. S., & Smith, W. J. (2002). Trustworthiness in electronic commerce: The role of privacy, security, and site attributes. The Journal of Strategic Information Systems, 11, 245–270.
Berings, D., & Adriaenssens, S. (2012). The role of business ethics, personality, work values and gender in vocational interests from adolescents. Journal of Business Ethics, 106, 325–335.
Betz, M., O’Connell, L., & Shepard, J. M. (1989). Gender differences in proclivity for unethical behavior. Journal of Business Ethics, 8, 321–324.
Bugental, D., Blue, J., & Cruzcosa, M. (1989). Perceived control over caregiving outcomes: Implications for child abuse. Developmental Psychology, 25, 532–539.
Burger, J. M. (1989). Negative reactions to increases in perceived personal control. Journal of Personality and Social Psychology, 56, 246.
Chai, S., Das, S., & Rao, H. R. (2011). Factors affecting bloggers’ knowledge sharing: An investigation across gender. Journal of Management Information Systems, 28, 309–342.
Chiu, C.-M., Hsu, M.-H., & Wang, E. T. (2006). Understanding knowledge sharing in virtual communities: an integration of social capital and social cognitive theories. Decision Support Systems, 42, 1872–1888.
Connell, J. P. (1985). A new multidimensional measure of children’s perceptions of control. Child Development, 56, 1018–1041.
D’arcy, J., & Hovav, A. (2009). Does one size fit all? Examining the differential effects of IS security countermeasures. Journal of Business Ethics, 89, 59–71.
Davenport, T. H., & Pruzak, L. (2000). Working knowledge: How organizations manage what they know. New York: Harvard Business Press.
Davidson, D. J., & Freudenburg, W. R. (1996). Gender and environmental risk concerns a review and analysis of available research. Environment and behavior, 28, 302–339.
Dinev, T., & Hart, P. (2006). An extended privacy calculus model for e-commerce transactions. Information Systems Research, 17, 61–80.
Dwyer, C., Hiltz, SR. & Passerini, K. Trust and privacy concern within social networking sites: A comparison of facebook and mySpace. AMCIS, 2007. p. 339
Dwyer, P. D., Gilkeson, J. H., & List, J. A. (2002). Gender differences in revealed risk taking: evidence from mutual fund investors. Economics Letters, 76, 151–158.
Fishbein, M. (1963). An investigation of the relationship between beliefs about an object and the attitude toward that object. Human relations, 16, 233–240.
Fishbein, M., & AJZEN, I. (1975). Belief, attitude, intention and behavior: An introduction to theory and research
Folkman, S. (1984). Personal control and stress and coping processes: A theoretical analysis. Journal of Personality and Social Psychology, 46, 839–852.
Fornell, C., & Larcker, D. F. (1981). Evaluating structural equation models with unobservable variables and measurement error. Journal of Marketing Research, 18, 39–50.
Garbarino, E., & Strahilevitz, M. (2004). Gender differences in the perceived risk of buying online and the effects of receiving a site recommendation. Journal of Business Research, 57, 768–775.
Govani, T., & Pashley, H. (2005). Student awareness of the privacy implications when using Facebook. Unpublished paper presented at the “Privacy Poster Fair” at the Carnegie Mellon University School of Library and Information Science, 9.
Gustafsod, P. E. (1998). Gender differences in risk perception: Theoretical and methodological erspectives. Risk Analysis, 18, 805–811.
Hair, J. R. F., Black, W., Babin, B., Anderson, R., & Tatham, R. (2006). Multivariate data analysis. Upper Saddle River: Pearson.
Hajli, M. N. (2014a). The role of social support on relationship quality and social commerce. Technological Forecasting and Social Change, 87, 17–27.
Hajli, N. (2014b). Developing online health communities through digital media. International Journal of Information Management, 34, 311–314.
Hajli, N. (2014c). A study of the impact of social media on consumers. International Journal of Market Research, 56, 95–113.
Hajli, N., Lin, X., Featherman, M., & Wang, Y. (2014). Social word of mouth: How trust develops in the market. International Journal of Market Research, 56, 1–30.
Harman, H. H. (1976). Modern factor analysis. Chicago: University of Chicago Press.
Hoadley, C. M., Xu, H., Lee, J. J., & Rosson, M. B. (2010). Privacy as information access and illusory control: The case of the Facebook news feed privacy outcry. Electronic Commerce Research and Applications, 9, 50–60.
Hsu, M.-H., & Chiu, C.-M. (2004). Predicting electronic service continuance with a decomposed theory of planned behaviour. Behaviour & Information Technology, 23, 359–373.
Hsu, M.-H., Ju, T. L., Yen, C.-H., & Chang, C.-M. (2007). Knowledge sharing behavior in virtual communities: The relationship between trust, self-efficacy, and outcome expectations. International Journal of Human-Computer Studies, 65, 153–169.
Hsu, C.-L., & Lin, J. C.-C. (2008). Acceptance of blog usage: The roles of technology acceptance, social influence and knowledge sharing motivation. Information & Management, 45, 65–74.
Kamis, A., Koufaris, M., & Stern, T. (2008). Using an attribute-based decision support system for user-customized products online: An experimental investigation. MIS Quarterly, 32, 159–177.
Keil, M., Tan, BC., Wei, K.-K., Saarinen, T., Tuunainen, V. & Wassenaar, A. (2000). A cross-cultural study on escalation of commitment behavior in software projects. Mis Quarterly, 299–325.
Krasnova, H., Spiekermann, S., Koroleva, K., & Hildebrand, T. (2010). Online social networks: Why we disclose. Journal of Information Technology, 25, 109–125.
Langer, E. J. (1975). The illusion of control. Journal of Personality and Social Psychology, 32, 311.
Lee, J. (2012). Components of Medical Service Users’ Dissatisfaction: A Perceived Control Perspective. International Journal of Management and Marketing Research, 5, 53–63.
Lee, J.-N., & Kim, Y.-G. (1999). Effect of partnership quality on IS outsourcing success: Conceptual framework and empirical validation. Journal of Management Information Systems, 15, 29–61.
Lin, X., Featherman, M., & Brooks, SL. (2013a). Factors affecting online consumer’s behavior: An investigation across gender. AMCIS 2013 Proceedings
Lin, X., Li, Y., Califf, CB., & Featherman, M. Can social role theory explain gender differences in facebook usage? System sciences (HICSS), 2013 46th Hawaii International Conference on, 2013b. IEEE, 690–699
Liu, Y., Gummadi, KP., Krishnamurthy, B., & Mislove, A. (2011). Analyzing facebook privacy settings: user expectations vs. reality. Proceedings of the 2011 ACM SIGCOMM Conference on Internet Measurement Conference, ACM, 61–70
Malhotra, N. K., Kim, S. S., & Agarwal, J. (2004). Internet users’ information privacy concerns (IUIPC): the construct, the scale, and a causal model. Information Systems Research, 15, 336–355.
Miranda, S. M., & Saunders, C. S. (2003). The social construction of meaning: An alternative perspective on information sharing. Information Systems Research, 14, 87–106.
Pavlou, P. A., & Fygenson, M. (2006). Understanding and predicting electronic commerce adoption: An extension of the theory of planned behavior. Mis Quarterly, 30, 115–143.
Pavlou, P. A., Liang, H., & Xue, Y. (2007). Understanding and mitigating uncertainty in online exchange relationships: A principal-agent perspective. MIS Quarterly, 31, 105–136.
Perry, R. P., Hladkyj, S., Pekrun, R. H., & Pelletier, S. T. (2001). Academic control and action control in the achievement of college students: A longitudinal field study. Journal of Educational Psychology, 93, 776–789.
Powell, M., & Ansic, D. (1997). Gender differences in risk behaviour in financial decision-making: An experimental analysis. Journal of Economic Psychology, 18, 605–628.
Qureshi, I., & Compeau, D. (2009). Assessing between-group differences in information systems research: A comparison of covariance-and component-based SEM. MIS Quarterly, 33, 197–214.
Roman, S. (2007). The ethics of online retailing: a scale development and validation from the consumers’ perspective. Journal of Business Ethics, 72, 131–148.
Rotter, J. (1966). Generalized expectancies for internal vs. external control of reinforcement. Psychological Monographs, 80, 1–28.
Schulz, R., & Heckhausen, J. (1996). A lifespan model of successful aging. American Psychologist, 51, 702–714.
Scott, B. G., & Weems, C. F. (2010). Patterns of actual and perceived control: are control profiles differentially related to internalizing and externalizing problems in youth? Anxiety, Stress, & Coping, 23, 515–528.
Seligman, M. E. (1975). Helplessness: On depression, development, and death. London: WH Freeman/Times Books/Henry Holt & Co.
Skinner, E. A. (1996). A guide to constructs of control. Journal of Personality and Social Psychology, 71, 549.
Skinner, E., Chapman, M., & Baltes, P. (1988). Control, means-ends, and agency beliefs: A new conceptualization and its measurement during childhood. Journal of Personality and Social Psychology, 54, 113–117.
Specht, J., Schmukle, S. C., & Egloff, B. (2013). Everything Under Control? The Effects of Age, Gender, and Education on Trajectories of Perceived Control in a Nationally Representative German Sample. Developmental Psychology, 49, 353–364.
Thompson, S., Sobolew-Shubin, A., Galbraith, M., Schwankovsky, L., & Cruzen, D. (1993). Maintaining perceptions of control: Finding perceived control in low-control circumstances. Journal of Personality and Social Psychology, 64, 293–304.
van Slyke, C., Shim, J., Johnson, R., & Jiang, J. (2006). Concern for information privacy and online consumer purchasing. Journal of the Association for Information Systems, 7, 415–444.
Venkatesh, V., & Morris, M. G. (2000). Why don’t men ever stop to ask for directions? Gender, social influence, and their role in technology acceptance and usage behavior. Mis Quarterly, 24, 115–139.
Venkatesh, V., Thong, J., & Xu, X. (2012). Consumer acceptance and use of information technology: Extending the unified theory of acceptance and use of technology. MIS Quarterly, 36, 157–178.
Wallhagen, M. (1992). Perceived control and adaptation in elder caregivers: Development of an explanatory model. International Journal of Aging and Human Development, 36, 219–237.
Wallston, K. A., Wallston, K. A., & Devellis, R. (1978). Development of the multidimensional health locus of control scales. Health Education Monographs, 6, 161–170.
Weisz, J. R., & Stipek, D. J. (1982). Competence, contingency, and the development of perceived control. Human Development, 25, 250–281.
Westin, A. F. (1968). Privacy and freedom. Washington and Lee Law Review, 25, 166.
Xu, H., Dinev, T., Smith, H. J., & Hart, P. (2008). Examining the formation of individual’s privacy concerns: Toward an integrative view
Xu, H. The Effects of Self-Construal and Perceived Control on Privacy Concerns. ICIS, 2007. Citeseer, 125
Xu, H., & Teo, H.-H. (2004). Alleviating Consumers’ Privacy Concerns in Location-based Services: A Psychological Control Perspective. ICIS, 793–806
Xu, H., Teo, H.-H., Tan, B. C., & Agarwal, R. (2012). Research note—effects of individual self-protection, industry self-regulation, and government regulation on privacy concerns: A study of location-based services. Information Systems Research, 23, 1342–1363.
Acquisti, A., & Gross, R. (2006) Imagined communities: Awareness, information sharing, and privacy on the Facebook. Privacy Enhancing Technologies, Springer, 36–58
Yin, G., & Cheng, X. (2011). & ZHU, L. A Theoretical Model and Empirical Study of the Chinese Context: Understanding continuance usage of social networking services.
Zhang, K. Z., Lee, M. K., Cheung, C. M., & Chen, H. (2009). Understanding the role of gender in bloggers’ switching behavior. Decision Support Systems, 47, 540–546.
Author information
Authors and Affiliations
Corresponding author
Appendix
Appendix
See appendix Table 6.
Rights and permissions
About this article
Cite this article
Hajli, N., Lin, X. Exploring the Security of Information Sharing on Social Networking Sites: The Role of Perceived Control of Information. J Bus Ethics 133, 111–123 (2016). https://doi.org/10.1007/s10551-014-2346-x
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s10551-014-2346-x