Location information disclosure in location-based social network services: Privacy calculus, benefit structure, and gender differences

Hedonic benefits have stronger impacts on perceived benefits than utilitarian benefits.There is an interaction effect between perceived benefits and privacy risks.Males stress on utilitarian benefits while females stress on hedonic benefits.Males stress on perceived benefits while females stress on privacy risks. As the mechanisms underlying users' location information disclosure behavior under the context of location-based social network services (LBSNS) have been rarely investigated, this study builds a research model to examine the privacy calculus, benefit structure and gender differences. Specifically, hedonic benefits have stronger impacts on perceived benefits than utilitarian benefits and there is an interaction effect between perceived benefits and privacy risks. Further, utilitarian (hedonic) benefits are more influential for males (females) than for females (males) when formulating overall benefit perceptions, and perceived benefits (privacy risks) have stronger impacts on disclosure intention for males (females) than for females (males). Theoretical and practical implications are also discussed.

[1]  Varun Grover,et al.  Investigating online information disclosure: Effects of information relevance, trust and risk , 2010, Inf. Manag..

[2]  Varun Grover,et al.  Knowing your customers: Using a reciprocal relationship to enhance voluntary information disclosure , 2010, Decis. Support Syst..

[3]  Heng Xu,et al.  Information privacy and correlates: an empirical attempt to bridge and distinguish privacy-related concepts , 2013, Eur. J. Inf. Syst..

[4]  Viswanath Venkatesh,et al.  Determinants of Perceived Ease of Use: Integrating Control, Intrinsic Motivation, and Emotion into the Technology Acceptance Model , 2000, Inf. Syst. Res..

[5]  Andrea Everard,et al.  Privacy Concerns Versus Desire for Interpersonal Awareness in Driving the Use of Self-Disclosure Technologies: The Case of Instant Messaging in Two Cultures , 2011, J. Manag. Inf. Syst..

[6]  Sung S. Kim,et al.  Internet Users' Information Privacy-Protective Responses: A Taxonomy and a Nomological Model , 2008, MIS Q..

[7]  Robin L. Wakefield The influence of user affect in online information disclosure , 2013, J. Strateg. Inf. Syst..

[8]  Yulin Fang,et al.  Understanding Sustained Participation in Open Source Software Projects , 2009, J. Manag. Inf. Syst..

[9]  Edward L. Deci,et al.  Intrinsic Motivation and Self-Determination in Human Behavior , 1975, Perspectives in Social Psychology.

[10]  Hock-Hai Teo,et al.  The Value of Privacy Assurance: An Exploratory Field Experiment , 2007, MIS Q..

[11]  R. Helmreich,et al.  Masculinity & femininity: Their psychological dimensions, correlates, and antecedents , 1978 .

[12]  C. Fornell,et al.  Evaluating structural equation models with unobservable variables and measurement error. , 1981 .

[13]  William D. Schafer,et al.  Gender differences in risk taking: A meta-analysis. , 1999 .

[14]  Sumeet Gupta,et al.  Disclosure Intention of Location-Related Information in Location-Based Social Network Services , 2012, Int. J. Electron. Commer..

[15]  Thompson S. H. Teo,et al.  Intrinsic and extrinsic motivation in Internet usage , 1999 .

[16]  Rathindra Sarathy,et al.  The role of affect and cognition on online consumers' decision to disclose personal information to unfamiliar online vendors , 2011, Decis. Support Syst..

[17]  Matthew K. O. Lee,et al.  Examining the moderating effect of inconsistent reviews and its gender differences on consumers' online shopping decision , 2014, Int. J. Inf. Manag..

[18]  Fred D. Davis,et al.  A Theoretical Extension of the Technology Acceptance Model: Four Longitudinal Field Studies , 2000, Management Science.

[19]  Ritu Agarwal,et al.  The Digitization of Healthcare: Boundary Risks, Emotion, and Consumer Willingness to Disclose Personal Health Information , 2011, Inf. Syst. Res..

[20]  David Gefen,et al.  The impact of personal dispositions on information sensitivity, privacy concern and trust in disclosing health information online , 2010, Decis. Support Syst..

[21]  Rui Chen,et al.  Why do users continue using social networking sites? An exploratory study of members in the United States and Taiwan , 2013, Inf. Manag..

[22]  Chang Liu,et al.  Beyond concern - a privacy-trust-behavioral intention model of electronic commerce , 2004, Inf. Manag..

[23]  Dan J. Kim,et al.  Self-Perception-Based Versus Transference-Based Trust Determinants in Computer-Mediated Transactions: A Cross-Cultural Comparison Study , 2008, J. Manag. Inf. Syst..

[24]  Hamid Reza Peikari,et al.  The determinants of individuals' perceived e-security: Evidence from Malaysia , 2014, Int. J. Inf. Manag..

[25]  Chao-Min Chiu,et al.  Exploring individuals' subjective well-being and loyalty towards social network sites from the perspective of network externalities: The Facebook case , 2013, Int. J. Inf. Manag..

[26]  Wynne W. Chin,et al.  A Partial Least Squares Latent Variable Modeling Approach for Measuring Interaction Effects: Results from a Monte Carlo Simulation Study and an Electronic - Mail Emotion/Adoption Study , 2003, Inf. Syst. Res..

[27]  Gordon B. Davis,et al.  User Acceptance of Information Technology: Toward a Unified View , 2003, MIS Q..

[28]  Jing Ma,et al.  Information privacy, gender differences, and intrinsic motivation in the workplace , 2013, Int. J. Inf. Manag..

[29]  Xueming Luo,et al.  Contextual Marketing and Customer-Orientation Strategy for E-Commerce: An Empirical Analysis , 2003, Int. J. Electron. Commer..

[30]  Per E. Pedersen,et al.  Explaining intention to use mobile chat services: moderating effects of gender , 2005 .

[31]  Paul A. Pavlou,et al.  State of the information privacy literature: where are we now and where should we go? , 2011 .

[32]  Y. Aharoni Cultures and Organizations: Software of the Mind , 1992 .

[33]  Christy M. K. Cheung,et al.  Understanding consumer trust in Internet shopping: A multidisciplinary approach , 2006 .

[34]  A. Eagly Sex differences in social behavior : a social-role interpretation , 1987 .

[35]  Rui Chen,et al.  Living a private life in public social networks: An exploration of member self-disclosure , 2013, Decis. Support Syst..

[36]  Fred D. Davis Perceived Usefulness, Perceived Ease of Use, and User Acceptance of Information Technology , 1989, MIS Q..

[37]  Adams Js Towards an understanding of inequity , 1963 .

[38]  Shuk Ying Ho,et al.  The Effects of Location Personalization on Integrity Trust and Integrity Distrust in Mobile Merchants , 2013, Int. J. Electron. Commer..

[39]  Robert E. Crossler,et al.  Privacy in the Digital Age: A Review of Information Privacy Research in Information Systems , 2011, MIS Q..

[40]  Ritu Agarwal,et al.  Adoption of Electronic Health Records in the Presence of Privacy Concerns: The Elaboration Likelihood Model and Individual Persuasion , 2009, MIS Q..

[41]  Rui Chen,et al.  Member use of social networking sites - an empirical examination , 2013, Decis. Support Syst..

[42]  Viswanath Venkatesh,et al.  Why Don't Men Ever Stop to Ask for Directions? Gender, Social Influence, and Their Role in Technology Acceptance and Usage Behavior , 2000, MIS Q..

[43]  Alessandro Acquisti,et al.  The Effect of Online Privacy Information on Purchasing Behavior: An Experimental Study , 2011, WEIS.

[44]  Heng Xu,et al.  CoPE: Enabling collaborative privacy management in online social networks , 2011, J. Assoc. Inf. Sci. Technol..

[45]  Scott B. MacKenzie,et al.  Common method biases in behavioral research: a critical review of the literature and recommended remedies. , 2003, The Journal of applied psychology.

[46]  H. Raghav Rao,et al.  Factors Affecting Bloggers' Knowledge Sharing: An Investigation Across Gender , 2011, J. Manag. Inf. Syst..

[47]  Rathindra Sarathy,et al.  Examining the decision to use standalone personal health record systems as a trust-enabled fair social contract , 2014, Decis. Support Syst..

[48]  Daniel D. Mittleman,et al.  Twitter, Google, iPhone/iPad, and Facebook (TGIF) and Smart Technology Environments: How Well Do Educators Communicate with Students via TGIF? , 2011, Commun. Assoc. Inf. Syst..

[49]  Hans van der Heijden,et al.  User Acceptance of Hedonic Information Systems , 2004, MIS Q..

[50]  Ingoo Han,et al.  The Impact of Customer Trust and Perception of Security Control on the Acceptance of Electronic Commerce , 2003, Int. J. Electron. Commer..

[51]  Mary Beth Rosson,et al.  The personalization privacy paradox: An exploratory study of decision making process for location-aware marketing , 2011, Decis. Support Syst..

[52]  Katina Michael,et al.  Using a social informatics framework to study the effects of location-based social networking on relationships between people: A review of literature , 2010, 2010 IEEE International Symposium on Technology and Society.

[53]  Matthew L. Jensen,et al.  Using an elaboration likelihood approach to better understand the persuasiveness of website privacy assurance cues for online consumers , 2012, J. Assoc. Inf. Sci. Technol..

[54]  E. Deci,et al.  Self-determination theory and the facilitation of intrinsic motivation, social development, and well-being. , 2000, The American psychologist.

[55]  Chin-Lung Hsu,et al.  Acceptance of blog usage: The roles of technology acceptance, social influence and knowledge sharing motivation , 2008, Inf. Manag..

[56]  Danah Boyd,et al.  Social Network Sites: Definition, History, and Scholarship , 2007, J. Comput. Mediat. Commun..

[57]  Hsiu-Fen Lin,et al.  Effects of extrinsic and intrinsic motivation on employee knowledge sharing intentions , 2007, J. Inf. Sci..

[58]  Zhenhui Jiang,et al.  Research Note - Privacy Concerns and Privacy-Protective Behavior in Synchronous Online Social Interactions , 2013, Inf. Syst. Res..

[59]  Tao Zhou,et al.  Examining continuous usage of location-based services from the perspective of perceived justice , 2013, Inf. Syst. Frontiers.

[60]  Tom L. Roberts,et al.  Proposing the online community self-disclosure model: the case of working professionals in France and the U.K. who use online communities , 2010, Eur. J. Inf. Syst..

[61]  Qian Huang,et al.  The impact of trust, guanxi orientation and face on the intention of Chinese employees and managers to engage in peer‐to‐peer tacit and explicit knowledge sharing , 2011, Inf. Syst. J..

[62]  S. Bem The BSRI and gender schema theory: A reply to Spence and Helmreich. , 1981 .

[63]  Hock-Hai Teo,et al.  The Role of Push-Pull Technology in Privacy Calculus: The Case of Location-Based Services , 2009, J. Manag. Inf. Syst..

[64]  Margo Wilson,et al.  Sex differences in valuations of the environment? , 1996 .

[65]  Qing Hu,et al.  Assimilation of Enterprise Systems: The Effect of Institutional Pressures and the Mediating Role of Top Management , 2007, MIS Q..

[66]  Viswanath Venkatesh,et al.  Consumer Acceptance and Use of Information Technology: Extending the Unified Theory of Acceptance and Use of Technology , 2012, MIS Q..

[67]  Detmar W. Straub,et al.  Gender Differences in the Perception and Use of E-Mail: An Extension to the Technology Acceptance Model , 1997, MIS Q..

[68]  T. C. Edwin Cheng,et al.  Extending the Understanding of End User Information Systems Satisfaction Formation: An Equitable Needs Fulfillment Model Approach , 2008, MIS Q..

[69]  Charles F. Hofacker,et al.  Customer Information Sharing with E-Vendors: The Roles of Incentives and Trust , 2010, Int. J. Electron. Commer..

[70]  Donald E. Conlon,et al.  Justice at the millennium: a meta-analytic review of 25 years of organizational justice research. , 2001, The Journal of applied psychology.

[71]  Heng Xu,et al.  Information Privacy Research: An Interdisciplinary Review , 2011, MIS Q..

[72]  B. Thurston,et al.  The duality of human existence , 1966 .

[73]  Vincenzo Russo,et al.  Privacy calculus model in e-commerce – a study of Italy and the United States , 2006, Eur. J. Inf. Syst..

[74]  Richard D. Johnson,et al.  Concern for Information Privacy and Online Consumer Purchasing , 2006, J. Assoc. Inf. Syst..

[75]  Tamara Dinev,et al.  Internet privacy concerns and beliefs about government surveillance - An empirical investigation , 2008, J. Strateg. Inf. Syst..

[76]  Naresh K. Malhotra,et al.  Internet Users' Information Privacy Concerns (IUIPC): The Construct, the Scale, and a Causal Model , 2004, Inf. Syst. Res..

[77]  Tamara Dinev,et al.  An Extended Privacy Calculus Model for E-Commerce Transactions , 2006, Inf. Syst. Res..

[78]  Yu-Chen Chen,et al.  Extrinsic versus intrinsic motivations for consumers to shop on-line , 2005, Inf. Manag..

[79]  Terry L. Childers,et al.  HEDONIC AND UTILITARIAN MOTIVATIONS FOR ONLINE RETAIL SHOPPING BEHAVIOR , 2001 .

[80]  R. Carlson,et al.  Sex differences in ego functioning: exploratory studies of agency and communion. , 1970, Journal of consulting and clinical psychology.

[81]  Hock-Hai Teo,et al.  Research Note - Effects of Individual Self-Protection, Industry Self-Regulation, and Government Regulation on Privacy Concerns: A Study of Location-Based Services , 2012, Inf. Syst. Res..

[82]  Heng Xu,et al.  Information Privacy Concerns: Linking Individual Perceptions with Institutional Privacy Assurances , 2011, J. Assoc. Inf. Syst..

[83]  Vishal Midha,et al.  Impact of consumer empowerment on online trust: An examination across genders , 2012, Decis. Support Syst..

[84]  Jiming Wu,et al.  Effects of Extrinsic and Intrinsic Motivators on Using Utilitarian, Hedonic, and Dual-Purposed Information Systems: A Meta-Analysis , 2013, J. Assoc. Inf. Syst..

[85]  Marko Sarstedt,et al.  PLS-SEM: Indeed a Silver Bullet , 2011 .

[86]  Detmar W. Straub,et al.  Specifying Formative Constructs in Information Systems Research , 2007, MIS Q..

[87]  Judith A. Hall,et al.  Psychological androgyny: Theories, methods, and conclusions. , 1982 .

[88]  K. Deaux From individual differences to social categories: analysis of a decade's research on gender , 1984 .

[89]  Sarah Spiekermann,et al.  Online social networks: why we disclose , 2010, J. Inf. Technol..

[90]  Tamara Dinev,et al.  Internet Privacy Concerns and Social Awareness as Determinants of Intention to Transact , 2005, Int. J. Electron. Commer..

[91]  Kaan Varnali,et al.  obile marketing research : The-state-ofthe-art , 2009 .

[92]  Fred D. Davis,et al.  Extrinsic and Intrinsic Motivation to Use Computers in the Workplace1 , 1992 .

[93]  Hsi-Peng Lu,et al.  Why people use social networking sites: An empirical study integrating network externalities and motivation theory , 2011, Comput. Hum. Behav..

[94]  Mike Z. Yao,et al.  Predicting user concerns about online privacy , 2007 .

[95]  Sumeet Gupta,et al.  The effects of privacy concerns and personal innovativeness on potential and experienced customers’ adoption of location-based services , 2009, Electron. Mark..

[96]  Robert W. Zmud,et al.  Behavioral Intention Formation in Knowledge Sharing: Examining the Roles of Extrinsic Motivators, Social-Psychological Factors, and Organizational Climate , 2005, MIS Q..

[97]  Mayuram S. Krishnan,et al.  The Personalization Privacy Paradox: An Empirical Evaluation of Information Transparency and the Willingness to be Profiled Online for Personalization , 2006, MIS Q..

[98]  Keng Siau,et al.  An Experimental Study on Ubiquitous commerce Adoption: Impact of Personalization and Privacy Concerns , 2008, J. Assoc. Inf. Syst..

[99]  Norman A. Johnson,et al.  Personality traits and concern for privacy: an empirical study in the context of location-based services , 2008, Eur. J. Inf. Syst..

[100]  H. Raghav Rao,et al.  Privacy preserving actions of older adults on social media: Exploring the behavior of opting out of information sharing , 2013, Decis. Support Syst..

[101]  Eric W. T. Ngai,et al.  Social media research: Theories, constructs, and conceptual frameworks , 2015, Int. J. Inf. Manag..

[102]  Bernard C. Y. Tan,et al.  A Cross-Cultural Study on Escalation of Commitment Behavior in Software Projects , 2000, MIS Q..