Privacy and pleasure: A paradox of the hedonic use of computer-mediated social networks

Abstract Despite legitimate privacy concerns regarding their use, hundreds of millions of people still visit online social network sites every day. Although people state that they are concerned about their privacy, they engage in online behaviors that are contrary to this stated belief. This study draws from social capital and social exchange theories to provide a hedonic explanation for this seemingly contradictory stated beliefs and actual behavior. This study proposes that the enjoyment derived from computer-mediated social network (CMSN) sites serves as an incentive for individuals to ignore privacy concerns. Results of our study help explain how people exchange their privacy concerns for hedonic benefits. We found that the enjoyment derived from this social exchange is sufficient to override users' privacy concerns. This reduction in privacy concerns is proposed to explain continued use of online social networks.

[1]  Cliff Lampe,et al.  The Benefits of Facebook "Friends: " Social Capital and College Students' Use of Online Social Network Sites , 2007, J. Comput. Mediat. Commun..

[2]  Hans van der Heijden,et al.  User Acceptance of Hedonic Information Systems , 2004, MIS Q..

[3]  Alessandro Acquisti,et al.  Imagined Communities: Awareness, Information Sharing, and Privacy on the Facebook , 2006, Privacy Enhancing Technologies.

[4]  Andrew B. Whinston,et al.  Introducing a Third Dimension in Information Systems Design: The Case for Incentive Alignment , 2001 .

[5]  Hayeon Song,et al.  Social comparison on Facebook: Its antecedents and psychological outcomes , 2016, Comput. Hum. Behav..

[6]  S. Ghoshal,et al.  Social Capital, Intellectual Capital, and the Organizational Advantage , 1998 .

[7]  Atreyi Kankanhalli,et al.  Contributing Knowledge to Electronic Knowledge Repositories: An Empirical Investigation , 2005, MIS Q..

[8]  Robert D. Smither,et al.  The Nature of Competitiveness: The Development and Validation of the Competitiveness Index , 1992 .

[9]  Thomas H. Davenport,et al.  Book review:Working knowledge: How organizations manage what they know. Thomas H. Davenport and Laurence Prusak. Harvard Business School Press, 1998. $29.95US. ISBN 0‐87584‐655‐6 , 1998 .

[10]  M. Huysman,et al.  Social Capital and Information Technology , 2004 .

[11]  David Horton Smith,et al.  Altruism, Volunteers, and Volunteerism , 1981 .

[12]  D Krebs Empathy and altruism. , 1975, Journal of personality and social psychology.

[13]  Carrie R. Leana,et al.  Organizational Social Capital and Employment Practices , 1999 .

[14]  Eric A. von Hippel,et al.  How Open Source Software Works: 'Free' User-to-User Assistance? , 2000 .

[15]  J. Coleman,et al.  Social Capital in the Creation of Human Capital , 1988, American Journal of Sociology.

[16]  C. Fornell,et al.  Evaluating structural equation models with unobservable variables and measurement error. , 1981 .

[17]  Albert H. Segars,et al.  An Empirical Examination of the Concern for Information Privacy Instrument , 2002, Inf. Syst. Res..

[18]  Linda D. Molm Theoretical Comparisons of Forms of Exchange* , 2003 .

[19]  Robert D. Putnam,et al.  Bowling alone: the collapse and revival of American community , 2000, CSCW '00.

[20]  Wynne W. Chin,et al.  A Partial Least Squares Latent Variable Modeling Approach for Measuring Interaction Effects: Results from a Monte Carlo Simulation Study and Voice Mail Emotion/Adoption Study , 1996, ICIS.

[21]  Lee Sproull,et al.  What's Mine Is Ours, or Is It? A Study of Attitudes about Information Sharing , 1994, Inf. Syst. Res..

[22]  Sung S. Kim,et al.  Internet Users' Information Privacy-Protective Responses: A Taxonomy and a Nomological Model , 2008, MIS Q..

[23]  Tao Hu,et al.  Why People Continue to Use Social Networking Services: Developing a Comprehensive Model , 2008, ICIS.

[24]  S. Borgatti,et al.  A General Theory of Network Governance: Exchange Conditions and Social Mechanisms , 1997 .

[25]  Hua Ye,et al.  Why do you return the favor in online knowledge communities? A study of the motivations of reciprocity , 2016, Comput. Hum. Behav..

[26]  David Gefen,et al.  Implementation Team Responsiveness and User Evaluation of Customer Relationship Management: A Quasi-Experimental Design Study of Social Exchange Theory , 2002, J. Manag. Inf. Syst..

[27]  L. Molm Theories of Social Exchange and Exchange Networks , 2001 .

[28]  J. Coleman Foundations of Social Theory , 1990 .

[29]  Judith Donath,et al.  Identity and deception in the virtual community , 1998 .

[30]  Peter A. Rosen,et al.  Hedonic Information Systems: Acceptance of Social Networking Websites , 2006, AMCIS.

[31]  M. Mauss The gift : Forms and functions of exchange in Archaic Societies / Marcel Mauss , 2020 .

[32]  M. Bauer Exchange And Power In Social Life , 2016 .

[33]  J. Nunnally Psychometric Theory (2nd ed), New York: McGraw-Hill. , 1978 .

[34]  Chris Chao Su,et al.  Predicting social capital on Facebook: The implications of use intensity, perceived content desirability, and Facebook-enabled communication practices , 2017, Comput. Hum. Behav..

[35]  Sonja Utz,et al.  Show me your friends and I will tell you what type of person you are: How one's profile, number of friends, and type of friends influence impression formation on social network sites , 2010, J. Comput. Mediat. Commun..

[36]  Albert Chan,et al.  Knowledge sharing and social media: Altruism, perceived online attachment motivation, and perceived online relationship commitment , 2014, Comput. Hum. Behav..

[37]  Samer Faraj,et al.  Why Should I Share? Examining Social Capital and Knowledge Contribution in Electronic Networks of Practice , 2005, MIS Q..

[38]  Mas Bambang Baroto,et al.  Modelling continuance intention of citizens in government Facebook page: A complementary PLS approach , 2017, Comput. Hum. Behav..

[39]  Deb Sledgianowski,et al.  Using Social Network Sites: The Effects of Playfulness, Critical Mass and Trust in a Hedonic Context , 2009, J. Comput. Inf. Syst..

[40]  Nenagh Kemp,et al.  Individual differences predicting social connectedness derived from Facebook: Some unexpected findings , 2015, Comput. Hum. Behav..

[41]  Yolanda Jordaan,et al.  Online privacy-related predictors of Facebook usage intensity , 2017, Comput. Hum. Behav..

[42]  Bernhard Debatin,et al.  Facebook and Online Privacy: Attitudes, Behaviors, and Unintended Consequences , 2009, J. Comput. Mediat. Commun..

[43]  David J. Danelski,et al.  Privacy and Freedom , 1968 .

[44]  Rafael Wittek,et al.  Structural Holes , 2014, Encyclopedia of Social Network Analysis and Mining.

[45]  Rahul Telang,et al.  Measuring Information Diffusion in an Online Community , 2009, J. Manag. Inf. Syst..

[46]  Andrew B. Whinston,et al.  Research Issues in Social computing , 2007, J. Assoc. Inf. Syst..

[47]  D. Hindman The Virtual Community: Homesteading on the Electronic Frontier , 1996 .

[48]  Starr Roxanne Hiltz,et al.  Trust and Privacy Concern Within Social Networking Sites: A Comparison of Facebook and MySpace , 2007, AMCIS.

[49]  Maeve Duggan,et al.  Social Media Update 2016 , 2016 .

[50]  Yunjie Calvin Xu,et al.  Am I Afraid of My Peers? Understanding the Antecedents of Information Privacy Concerns in the Online Social Context , 2009, ICIS.

[51]  William J. Doll,et al.  The Measurement of End-User Computing Satisfaction , 1988, MIS Q..

[52]  S. Kiesler,et al.  The kindness of strangers: on the usefulness of electronic weak ties for technical advice , 1996 .

[53]  Steven Eggermont,et al.  "I don't want to miss a thing": Adolescents' fear of missing out and its relationship to adolescents' social needs, Facebook use, and Facebook related stress , 2016, Comput. Hum. Behav..

[54]  Wynne W. Chin The partial least squares approach for structural equation modeling. , 1998 .

[55]  Mark D. Griffiths,et al.  Passive Facebook use, Facebook addiction, and associations with escapism: An experimental vignette study , 2017, Comput. Hum. Behav..

[56]  John Leubsdorf,et al.  Privacy and Freedom , 1968 .

[57]  Xiongfei Cao,et al.  Empirical investigation of Facebook discontinues usage intentions based on SOR paradigm , 2017, Comput. Hum. Behav..

[58]  R. Baumeister A SELF-PRESENTATIONAL VIEW OF SOCIAL PHENOMENA , 1982 .

[59]  R. Lewicki,et al.  Developing and Maintaining Trust in Work Relationships , 1996 .

[60]  R. Putnam Bowling Alone: America's Declining Social Capital , 1995, The City Reader.

[61]  Rachel Grieve,et al.  Facebook as a source of social connectedness in older adults , 2017, Comput. Hum. Behav..

[62]  Yong Liu,et al.  Modeling hedonic is continuance through the uses and gratifications theory: An empirical study in online games , 2015, Comput. Hum. Behav..

[63]  Yonghwan Kim,et al.  College students' social media use and communication network heterogeneity: Implications for social capital and subjective well-being , 2017, Comput. Hum. Behav..

[64]  R. Emerson SOCIAL EXCHANGE THEORY .10529 , 2016 .

[65]  H. Jeff Smith,et al.  Information Privacy: Measuring Individuals' Concerns About Organizational Practices , 1996, MIS Q..

[66]  B. Meeker Decisions and Exchange , 1971 .

[67]  Chi-Cheng Wu,et al.  What makes users share content on facebook? Compatibility among psychological incentive, social capital focus, and content type , 2017, Comput. Hum. Behav..

[68]  R. Cropanzano,et al.  Social Exchange Theory: An Interdisciplinary Review , 2005 .

[69]  Brian K. Thorn,et al.  Discretionary Databases: Theory, Data, and Implications , 1990 .