Influence of Social Context and Affect on Individuals' Implementation of Information Security Safeguards

Individuals’ use of safeguards against information security risks is commonly conceptualized as the result of a risk-benefit analysis. This economic perspective assumes a “rational actor” whereas risk is subjectively perceived by people who may be influenced by a number of social, psychological, cultural, and other “soft” factors. Their decisions thus may deviate from what economic risk assessment analysis would dictate. In this respect, a phenomenon interesting to study is that on social network sites (SNSes) people tend to, despite a number of potential security risks, provide an amount of personal information that they would otherwise frown upon. In this study we explore how people’s affect toward online social networking may impact their use of privacy safeguards. Since building social capital is a main purpose of online social networking, we use social capital theory to examine some potential contextual influence on the formation of the affect. More specifically, we adopt the perspective proposed by Nahapiet and Ghoshal (1998), which views social capital as a composite of structural, relational, and cognitive capitals. Preliminary analysis of 271 survey responses shows that (a) a person’s structural and relational embeddedness in her online social networks, as well as her cognitive ability in maintaining those networks, are positively related to her affect toward SNSes; (b) a person’s affect toward SNSes moderates the relationship between her perception of privacy risk and the privacy safeguards she implements on the SNSes.

[1]  Larry E. Toothaker,et al.  Multiple Regression: Testing and Interpreting Interactions , 1991 .

[2]  Wynne W. Chin,et al.  A Partial Least Squares Latent Variable Modeling Approach for Measuring Interaction Effects: Results from a Monte Carlo Simulation Study and an Electronic - Mail Emotion/Adoption Study , 2003, Inf. Syst. Res..

[3]  Samer Faraj,et al.  Why Should I Share? Examining Social Capital and Knowledge Contribution in Electronic Networks of Practice , 2005, MIS Q..

[4]  Sung S. Kim,et al.  Internet Users' Information Privacy-Protective Responses: A Taxonomy and a Nomological Model , 2008, MIS Q..

[5]  Cliff Lampe,et al.  The Benefits of Facebook "Friends: " Social Capital and College Students' Use of Online Social Network Sites , 2007, J. Comput. Mediat. Commun..

[6]  A. Isen,et al.  The effect of positive feelings on risk taking: When the chips are down. , 1983 .

[7]  Jane M. Howell,et al.  Personal Computing: Toward a Conceptual Model of Utilization , 1991, MIS Q..

[8]  Tamara Dinev,et al.  An Extended Privacy Calculus Model for E-Commerce Transactions , 2006, Inf. Syst. Res..

[9]  S. Ghoshal,et al.  Social Capital and Value Creation: The Role of Intrafirm Networks , 1998 .

[10]  Detmar W. Straub,et al.  Structural Equation Modeling and Regression: Guidelines for Research Practice , 2000, Commun. Assoc. Inf. Syst..

[11]  B. Fischhoff,et al.  Cost benefit analysis and the art of motorcycle maintenance , 1977 .

[12]  Jacob Cohen Statistical Power Analysis for the Behavioral Sciences , 1969, The SAGE Encyclopedia of Research Design.

[13]  Ana M. Martínez-Alemán,et al.  Online Social Networking on Campus: Understanding What Matters in Student Culture , 2008 .

[14]  Deborah Compeau,et al.  Social Cognitive Theory and Individual Reactions to Computing Technology: A Longitudinal Study , 1999, MIS Q..

[15]  John Hulland,et al.  Use of partial least squares (PLS) in strategic management research: a review of four recent studies , 1999 .

[16]  Jinsook Cho,et al.  Likelihood to abort an online transaction: influences from cognitive evaluations, attitudes, and behavioral variables , 2004, Inf. Manag..

[17]  J. Helliwell,et al.  The social context of well-being. , 2004, Philosophical transactions of the Royal Society of London. Series B, Biological sciences.

[18]  C. Fornell,et al.  Evaluating structural equation models with unobservable variables and measurement error. , 1981 .

[19]  S. Ghoshal,et al.  Social Capital, Intellectual Capital, and the Organizational Advantage , 1998 .

[20]  Jacob Cohen,et al.  Applied multiple regression/correlation analysis for the behavioral sciences , 1979 .

[21]  T. Keith Multiple Regression and Beyond , 2005, Principles & Methods of Statistical Analysis.

[22]  Deborah Compeau,et al.  Computer Self-Efficacy: Development of a Measure and Initial Test , 1995, MIS Q..

[23]  P. Slovic Trust, Emotion, Sex, Politics, and Science: Surveying the Risk‐Assessment Battlefield , 1999, Risk analysis : an official publication of the Society for Risk Analysis.

[24]  Harbir Singh,et al.  Learning and protection of proprietary assets in strategic alliances: building relational capital , 2000 .

[25]  R. Bies,et al.  Consumer Privacy: Balancing Economic and Justice Considerations , 2003 .

[26]  Adam Shostack,et al.  The New School of Information Security , 2008 .

[27]  Hsi‐Peng Lu,et al.  An empirical study of the effect of perceived risk upon intention to use online applications , 2005, Inf. Manag. Comput. Security.

[28]  J. Hair Multivariate data analysis , 1972 .

[29]  Subhash Sharma,et al.  Identification and Analysis of Moderator Variables , 1981 .

[30]  Daniel R. Krause,et al.  The relationships between supplier development, commitment, social capital accumulation and performance improvement , 2007 .

[31]  Steve Mansfield-Devine,et al.  Social Networking: Anti-social networking: exploiting the trusting environment of Web 2.0 , 2008 .

[32]  P. Adler,et al.  Social Capital: Prospects for a New Concept , 2002 .

[33]  B. Fischhoff,et al.  Behavioral Decision Theory , 1977 .

[34]  Yajiong Xue,et al.  Avoidance of Information Technology Threats: A Theoretical Perspective , 2009, MIS Q..

[35]  Beverly B. Tyler,et al.  Antecedents and consequences of social capital on buyer performance improvement , 2008 .

[36]  C. Coulton,et al.  Interaction Effects in Multiple Regression , 1993 .

[37]  Edgar Erdfelder,et al.  G*Power 3: A flexible statistical power analysis program for the social, behavioral, and biomedical sciences , 2007, Behavior research methods.

[38]  W. Edwards Behavioral decision theory. , 1961, Annual review of psychology.

[39]  Alan R. Dennis,et al.  Social Capital and Knowledge Integration in Digitally Enabled Teams , 2008, Inf. Syst. Res..

[40]  P. Deldin,et al.  The effect of mood induction in a risky decision-making task , 1986 .

[41]  Thomas E. Nygren,et al.  Influence of positive affect on the subjective utility of gains and losses: it is just not worth the risk. , 1988, Journal of personality and social psychology.

[42]  M. Culnan,et al.  Information Privacy Concerns, Procedural Fairness, and Impersonal Trust: An Empirical Investigation , 1999 .

[43]  Sherah Kurnia,et al.  Social Capital in Information and Communications Technology Research: Past, Present, and Future , 2009, Commun. Assoc. Inf. Syst..

[44]  Stephen M. Johnson,et al.  The affect heuristic in judgments of risks and benefits , 2000 .

[45]  Vincenzo Russo,et al.  Privacy calculus model in e-commerce – a study of Italy and the United States , 2006, Eur. J. Inf. Syst..

[46]  ScienceDirect Organizational behavior and human performance , 1984 .

[47]  Detmar W. Straub,et al.  A Practical Guide To Factorial Validity Using PLS-Graph: Tutorial And Annotated Example , 2005, Commun. Assoc. Inf. Syst..

[48]  Matthew Pearson,et al.  Online social networking on campus: understanding what matters in student culture , 2010 .

[49]  P. Slovic,et al.  A psychological study of the inverse relationship between perceived risk and perceived benefit. , 1994, Risk analysis : an official publication of the Society for Risk Analysis.

[50]  Ramnath K. Chellappa,et al.  Personalization versus Privacy: An Empirical Examination of the Online Consumer’s Dilemma , 2005, Inf. Technol. Manag..

[51]  Andrew Whitaker,et al.  Chained Exploits: Advanced Hacking Attacks from Start to Finish , 2009 .

[52]  Wynne W. Chin,et al.  Extending the technology acceptance model: the influence of perceived user resources , 2001, DATB.