Let the users tell the truth: Self-disclosure intention and self-disclosure honesty in mobile social networking

This study investigated the antecedents of self-disclosure intention and self-disclosure honesty in mobile social networking.This study explored how privacy protective behaviours vary with interpersonal difference and contextual settings.We found that both monetary rewards and social rewards were positively related to self-disclosure intention, whereas only social rewards positively predict self-disclosure honesty.Application reputation and flow experience mitigate the perceptions of privacy concerns, and application compatibility and flow experience strengthen the perceptions of social rewards. Large amounts of customer data present rich business opportunities. Drawing on the privacy calculus model, this study investigates the antecedents of self-disclosure intention and self-disclosure honesty. We extend the privacy calculus model by exploring how the characteristics of service providers and the interpersonal difference of users influence privacy trade-off. An online empirical survey that involves 913 respondents was conducted. We find that both monetary rewards and social rewards positively predict self-disclosure intention, whereas only social rewards positively predict self-disclosure honesty. Moreover, application reputation and flow experience of users weaken the perceptions of privacy concern, and application compatibility and flow experience strengthen the perceptions of social rewards. Our results suggest that users place more weight on social rewards than on monetary rewards. Therefore, service providers are advised to create salient and distinct social rewards. They can also adopt distinct marketing strategies based on their profiles and the interpersonal difference of their users.

[1]  Scott B. MacKenzie,et al.  Common method biases in behavioral research: a critical review of the literature and recommended remedies. , 2003, The Journal of applied psychology.

[2]  Zilong Liu,et al.  Self-disclosure in Chinese micro-blogging: A social exchange theory perspective , 2016, Inf. Manag..

[3]  Mincong Tang,et al.  Building trust online: Interactions among trust building mechanisms , 2013, Inf. Manag..

[4]  Tom L. Roberts,et al.  Proposing the online community self-disclosure model: the case of working professionals in France and the U.K. who use online communities , 2010, Eur. J. Inf. Syst..

[5]  Lei-da Chen,et al.  Enticing online consumers: an extended technology acceptance perspective , 2002, Inf. Manag..

[6]  Hsiu-Fen Lin,et al.  An empirical investigation of mobile banking adoption: The effect of innovation attributes and knowledge-based trust , 2011, Int. J. Inf. Manag..

[7]  Lynette I. Millett,et al.  Authentication, Privacy, and the Federal E-Government , 2005, Inf. Soc..

[8]  Charles F. Hofacker,et al.  Customer Information Sharing with E-Vendors: The Roles of Incentives and Trust , 2010, Int. J. Electron. Commer..

[9]  Julia Dmitrieva,et al.  Item-wording and the dimensionality of the Rosenberg Self-Esteem Scale: do they matter? , 2003 .

[10]  G. Loewenstein,et al.  Privacy and human behavior in the age of information , 2015, Science.

[11]  Zhenhui Jiang,et al.  Research Note - Privacy Concerns and Privacy-Protective Behavior in Synchronous Online Social Interactions , 2013, Inf. Syst. Res..

[12]  Hock-Hai Teo,et al.  Research Note - Effects of Individual Self-Protection, Industry Self-Regulation, and Government Regulation on Privacy Concerns: A Study of Location-Based Services , 2012, Inf. Syst. Res..

[13]  Tamara Dinev,et al.  An Extended Privacy Calculus Model for E-Commerce Transactions , 2006, Inf. Syst. Res..

[14]  Robert LaRose,et al.  How does online social networking enhance life satisfaction? The relationships among online supportive interaction, affect, perceived social support, sense of community, and life satisfaction , 2014, Comput. Hum. Behav..

[15]  I. Simonson,et al.  Get Closer to Your Customers by Understanding How They Make Choices , 1993 .

[16]  Donald G. Gardner,et al.  Self-Esteem Within the Work and Organizational Context: A Review of the Organization-Based Self-Esteem Literature , 2004 .

[17]  Sumeet Gupta,et al.  Disclosure Intention of Location-Related Information in Location-Based Social Network Services , 2012, Int. J. Electron. Commer..

[18]  Alexandra J. Campbell Relationship marketing in consumer markets , 1997 .

[19]  P. Bentler,et al.  Cutoff criteria for fit indexes in covariance structure analysis : Conventional criteria versus new alternatives , 1999 .

[20]  Robert C. Ford,et al.  Ethical decision making: A review of the empirical literature , 1994 .

[21]  Jari Salo,et al.  Why do teens spend real money in virtual worlds? A consumption values and developmental psychology perspective on virtual consumption , 2015, Int. J. Inf. Manag..

[22]  Yoella Bereby-Meyer,et al.  Honesty Requires Time (and Lack of Justifications) , 2012, Psychological science.

[23]  J. Dawson,et al.  Probing three-way interactions in moderated multiple regression: development and application of a slope difference test. , 2006, The Journal of applied psychology.

[24]  Barton A. Weitz,et al.  Self-Disclosure on the Web: the Impact of Privacy Policy, Reward, and Company Reputation , 2002 .

[25]  Traci J. Hess,et al.  Reliability Generalization of Perceived Ease of Use, Perceived Usefulness, and Behavioral Intentions , 2014, MIS Q..

[26]  Chin-Lung Hsu,et al.  Why do people play on-line games? An extended TAM with social influences and flow experience , 2004, Inf. Manag..

[27]  Chaim Fershtman,et al.  Social Rewards Externalities and Stable Preferences , 1998 .

[28]  Jennifer J. Argo,et al.  Social Comparison Theory and Deception in the Interpersonal Exchange of Consumption Information , 2006 .

[29]  Katelyn Y. A. McKenna,et al.  Can you see the real me? Activation and expression of the "true self" on the Internet. , 2002 .

[30]  W. Bearden,et al.  Consumer Self‐Confidence: Refinements in Conceptualization and Measurement , 2001 .

[31]  C. Fornell,et al.  Evaluating structural equation models with unobservable variables and measurement error. , 1981 .

[32]  E. Deci,et al.  A meta-analytic review of experiments examining the effects of extrinsic rewards on intrinsic motivation. , 1999, Psychological bulletin.

[33]  Joseph P. Cannon,et al.  An Examination of the Nature of Trust in Buyer–Seller Relationships: , 1997 .

[34]  Donna L. Hoffman,et al.  Building consumer trust online , 1999, CACM.

[35]  Katy Mason,et al.  Pitfalls in evaluating market orientation: an exploration of executives' interpretations , 2005 .

[36]  L. Tidwell,et al.  Computer-Mediated Communication Effects on Disclosure, Impressions, and Interpersonal Evaluations: Getting to Know One Another a Bit at a Time , 2002 .

[37]  J. Edwards Multidimensional Constructs in Organizational Behavior Research: An Integrative Analytical Framework , 2001 .

[38]  S. Engeser,et al.  Flow, performance and moderators of challenge-skill balance , 2008 .

[39]  N. Marr,et al.  An empirical measure of the availability, completeness and reliability of voluntarily disclosed personal information for direct marketing purposes , 2006 .

[40]  Kai Lung Hui,et al.  Overcoming Online Information Privacy Concerns: An Information-Processing Theory Approach , 2007, J. Manag. Inf. Syst..

[41]  Aaron Ben-Ze'ev,et al.  Privacy, emotional closeness, and openness in cyberspace , 2003, Comput. Hum. Behav..

[42]  D. Whitten,et al.  The Chief Information Security Officer: An Analysis of the Skills Required for Success , 2008, J. Comput. Inf. Syst..

[43]  Dan Ariely,et al.  Dishonesty in Everyday Life and Its Policy Implications , 2006 .

[44]  Fevzi Okumus,et al.  What keeps the mobile hotel booking users loyal? Investigating the roles of self-efficacy, compatibility, perceived ease of use, and perceived convenience , 2016, Int. J. Inf. Manag..

[45]  Shane R. Thye,et al.  BRINGING EMOTIONS INTO SOCIAL EXCHANGE THEORY , 1999 .

[46]  Chang Liu,et al.  Beyond concern - a privacy-trust-behavioral intention model of electronic commerce , 2004, Inf. Manag..

[47]  J Crocker,et al.  Downward comparison, prejudice, and evaluations of others: effects of self-esteem and threat. , 1987, Journal of personality and social psychology.

[48]  Detmar W. Straub,et al.  Trust and TAM in Online Shopping: An Integrated Model , 2003, MIS Q..

[49]  Seounmi Youn Determinants of Online Privacy Concern and Its Influence on Privacy Protection Behaviors Among Young Adolescents , 2009 .

[50]  Naresh K. Malhotra,et al.  Internet Users' Information Privacy Concerns (IUIPC): The Construct, the Scale, and a Causal Model , 2004, Inf. Syst. Res..

[51]  Helen Nissenbaum,et al.  Privacy in Context - Technology, Policy, and the Integrity of Social Life , 2009 .

[52]  Özgür Külcü,et al.  Privacy in social networks: An analysis of Facebook , 2014, Int. J. Inf. Manag..

[53]  Agata Blachnio,et al.  Association between Facebook addiction, self-esteem and life satisfaction: A cross-sectional study , 2016, Comput. Hum. Behav..

[54]  Elena Karahanna,et al.  Time Flies When You're Having Fun: Cognitive Absorption and Beliefs About Information Technology Usage , 2000, MIS Q..

[55]  Philip Handler Science and the Federal Government , 1969 .

[56]  Marios Koufaris,et al.  Applying the Technology Acceptance Model and Flow Theory to Online Consumer Behavior , 2002, Inf. Syst. Res..

[57]  Sunil Erevelles,et al.  Big Data consumer analytics and the transformation of marketing , 2016 .

[58]  Liqiong Deng,et al.  User experience, satisfaction, and continual usage intention of IT , 2010, Eur. J. Inf. Syst..

[59]  Bernhard Debatin,et al.  Facebook and Online Privacy: Attitudes, Behaviors, and Unintended Consequences , 2009, J. Comput. Mediat. Commun..

[60]  Charlie C. Chen,et al.  Intention to disclose personal information via mobile applications: A privacy calculus perspective , 2016, Int. J. Inf. Manag..

[61]  Cliff Lampe,et al.  Cultivating Social Resources on Social Network Sites: Facebook Relationship Maintenance Behaviors and Their Role in Social Capital Processes , 2014, J. Comput. Mediat. Commun..

[62]  Melinda Korzaan,et al.  The Influence of Personality Traits and Information Privacy Concerns on Behavioral Intentions , 2008, J. Comput. Inf. Syst..

[63]  Murtaza Haider,et al.  Beyond the hype: Big data concepts, methods, and analytics , 2015, Int. J. Inf. Manag..

[64]  S. Quartz,et al.  Getting to Know You: Reputation and Trust in a Two-Person Economic Exchange , 2005, Science.

[65]  Manuel J. Sánchez-Franco,et al.  Exploring the influence of gender on the web usage via partial least squares , 2006, Behav. Inf. Technol..

[66]  Elizabeth Partington,et al.  The dark side of flow: a qualitative study of dependence in big wave surfing , 2009 .

[67]  Weiguo Fan,et al.  The power of social media analytics , 2014, CACM.

[68]  Sarah Spiekermann,et al.  Online social networks: why we disclose , 2010, J. Inf. Technol..

[69]  Mary Ann Eastlick,et al.  Understanding online B-to-C relationships: An integrated model of privacy concerns, trust, and commitment , 2006 .

[70]  David Gefen,et al.  The impact of personal dispositions on information sensitivity, privacy concern and trust in disclosing health information online , 2010, Decis. Support Syst..

[71]  Dennis L. Hoffman,et al.  Marketing in Hypermedia Computer-Mediated Environments : Conceptual Foundations 1 ) , 1998 .

[72]  Marko Sarstedt,et al.  PLS-SEM: Indeed a Silver Bullet , 2011 .

[73]  Mayuram S. Krishnan,et al.  The Personalization Privacy Paradox: An Empirical Evaluation of Information Transparency and the Willingness to be Profiled Online for Personalization , 2006, MIS Q..

[74]  M. Csíkszentmihályi Flow: The Psychology of Optimal Experience , 1990 .