Exploring the Effects of the Privacy-Handling Management Styles of Social Networking Sites on User Satisfaction: A Conflict Management Perspective

The issue of consumer information privacy, arguably the most substantial and persistent problem confronting e-commerce companies in general and online social networking service providers in particular, often results in unsatisfied customers. Researchers have investigated privacy from various perspectives and in a multitude of settings, yet there have been few attempts to understand privacy versus satisfaction, particularly from the perspective of conflict management. Because users’ privacy can be negatively affected by social networking sites (SNS), this study focuses on the privacy conflicts between SNSs and their users. Drawing on conflict management theory, this article investigates the effects of different conflict management styles exhibited by an SNS on users’ satisfaction with its privacy practices, which then affects their intention to disclose personal information. The SNS examined in this study is Facebook, the most popular SNS with the largest number of users. Data were collected using an online survey and were analyzed using structural equation modeling. The results suggest that the two cooperative conflict management styles demonstrated by the SNS—accommodating and problem-solving—positively affect users’ satisfaction with the privacy practices of the SNS both directly and indirectly through perceived privacy risk control. With regard to uncooperative styles, an avoiding style negatively affects user satisfaction directly, whereas an asserting style negatively affects user satisfaction indirectly through perceived privacy risk. The results also support that satisfaction is positively related to intention; users who are satisfied with the privacy practices of SNSs are more willing to disclose personal information than unsatisfied ones.

[1]  Naresh K. Malhotra,et al.  Internet Users' Information Privacy Concerns (IUIPC): The Construct, the Scale, and a Causal Model , 2004, Inf. Syst. Res..

[2]  Paul A. Pavlou,et al.  From IT Leveraging Competence to Competitive Advantage in Turbulent Environments: The Case of New Product Development , 2006, Inf. Syst. Res..

[3]  Shirley Ou Yang,et al.  Achieving Online Relationship Marketing via Tourism Blogs: A Social Network Perspective , 2014, Pac. Asia J. Assoc. Inf. Syst..

[4]  J. A. Wall,et al.  Conflict and Its Management , 1995 .

[5]  Robert P. Bostrom,et al.  The Impact of Group Support Systems on Group Conflict and Conflict Management , 1993, J. Manag. Inf. Syst..

[6]  Paul Benjamin Lowry,et al.  Information Disclosure on Mobile Devices: Re-Examining Privacy Calculus with Actual User Behavior , 2013, Int. J. Hum. Comput. Stud..

[7]  H. Jeff Smith,et al.  Information Privacy: Measuring Individuals' Concerns About Organizational Practices , 1996, MIS Q..

[8]  Tamara Dinev,et al.  An Extended Privacy Calculus Model for E-Commerce Transactions , 2006, Inf. Syst. Res..

[9]  R. Bagozzi,et al.  On the evaluation of structural equation models , 1988 .

[10]  M. Afzalur Rahim,et al.  Supervisory Power Bases, Styles of Handling Conflict with Subordinates, and Subordinate Compliance and Satisfaction , 1989 .

[11]  Tung Lai Lai,et al.  Service Quality and Perceived Value's Impact on Satisfaction, Intention and Usage of Short Message Service (SMS) , 2004 .

[12]  Varun Grover,et al.  A model of consumers' perceptions of the invasion of information privacy , 2013, Inf. Manag..

[13]  Hock-Hai Teo,et al.  AIS Electronic , 2013 .

[14]  M. Lindell,et al.  Accounting for common method variance in cross-sectional research designs. , 2001, The Journal of applied psychology.

[15]  Wynne W. Chin Issues and Opinion on Structural Equation Modeling by , 2009 .

[16]  Leslie A. DeChurch,et al.  MAXIMIZING THE BENEFITS OF TASK CONFLICT: THE ROLE OF CONFLICT MANAGEMENT , 2001 .

[17]  Kwai-Sang Chin,et al.  Identifying and prioritizing critical success factors for conflict management in collaborative new product development , 2005 .

[18]  M. Sobel Asymptotic Confidence Intervals for Indirect Effects in Structural Equation Models , 1982 .

[19]  Shu-Sheng Liaw,et al.  Computers and the Internet as a job assisted tool: based on the three-tier use model approach , 2007, Comput. Hum. Behav..

[20]  Yuan Li,et al.  Empirical Studies on Online Information Privacy Concerns: Literature Review and an Integrative Framework , 2011, Commun. Assoc. Inf. Syst..

[21]  D. G. Pruitt Strategic Choice in Negotiation , 1983 .

[22]  van de Evert Vliert,et al.  Agreeableness and activeness as components of conflict behaviors. , 1994, Journal of personality and social psychology.

[23]  Tom L. Roberts,et al.  Proposing the online community self-disclosure model: the case of working professionals in France and the U.K. who use online communities , 2010, Eur. J. Inf. Syst..

[24]  Rathindra Sarathy,et al.  The role of affect and cognition on online consumers' decision to disclose personal information to unfamiliar online vendors , 2011, Decis. Support Syst..

[25]  van de Evert Vliert,et al.  A theoretical position of compromising among other styles of conflict management , 1989 .

[26]  Sarah Spiekermann,et al.  Online social networks: why we disclose , 2010, J. Inf. Technol..

[27]  Stephen Swailes,et al.  TEAM ROLE PREFERENCE AND CONFLICT MANAGEMENT STYLES , 2005 .

[28]  Gloria J. Galanes,et al.  The SYMLOG dimensions and small group conflict , 1986 .

[29]  Gerardine DeSanctis,et al.  Using a GDSS to Facilitate Group Consensus: Some Intended and Unintended Consequences , 1988, MIS Q..

[30]  Robert LaRose,et al.  Your privacy is assured - of being disturbed: websites with and without privacy seals , 2006, New Media Soc..

[31]  Leslie A. DeChurch,et al.  Effects of conflict management strategies on perceptions of intragroup conflict. , 2007 .

[32]  Peter Mykytyn,et al.  Impact of heterogeneity and collaborative conflict management style on the performance of synchronous global virtual teams , 2004, Inf. Manag..

[33]  Lawrence R. Wheeless,et al.  Conceptualization and Measurement of Reported Self-Disclosure. , 1976 .

[34]  Alfred Kobsa,et al.  Making Decisions about Privacy: Information Disclosure in Context-Aware Recommender Systems , 2013, TIIS.

[35]  I. Ajzen The theory of planned behavior , 1991 .

[36]  M. Afzalur Rahim,et al.  Referent Role and Styles of Handling Interpersonal Conflict , 1986 .

[37]  Nikita Borisov,et al.  FlyByNight: mitigating the privacy risks of social networking , 2008, WPES '08.

[38]  C. Fornell,et al.  Evaluating structural equation models with unobservable variables and measurement error. , 1981 .

[39]  Heng Xu,et al.  Information Systems Journal Special Issue on: Reframing Privacy in a Networked World , 2013 .

[40]  Rui Chen,et al.  Living a private life in public social networks: An exploration of member self-disclosure , 2013, Decis. Support Syst..

[41]  P. Shrout,et al.  Mediation in experimental and nonexperimental studies: new procedures and recommendations. , 2002, Psychological methods.

[42]  Burcu Bulgurcu,et al.  Understanding Users’ Coping with Information Privacy Threats in Online Social Networks , 2011 .

[43]  Anne P. Massey,et al.  Getting It Together: Temporal Coordination and Conflict Management in Global Virtual Teams , 2001 .

[44]  D. A. Kenny,et al.  The moderator-mediator variable distinction in social psychological research: conceptual, strategic, and statistical considerations. , 1986, Journal of personality and social psychology.

[45]  Adam N. Joinson,et al.  Privacy, Trust, and Self-Disclosure Online , 2010, Hum. Comput. Interact..

[46]  David Antonioni,et al.  Relationship between the Big Five personality factors and conflict management styles. , 1998 .

[47]  Timothy Kuhn,et al.  Do Conflict Management Styles Affect Group Decision Making? Evidence From a Longitudinal Field Study , 2000 .

[48]  Madeline E. Smith,et al.  Limiting, leaving, and (re)lapsing: an exploration of facebook non-use practices and experiences , 2013, CHI.

[49]  Steve Sawyer,et al.  Effects of intra‐group conflict on packaged software development team performance , 2001, Inf. Syst. J..

[50]  Xu Huang,et al.  Managers’ conflict management styles and employee attitudinal outcomes: The mediating role of trust , 2008 .

[51]  James J. Jiang,et al.  Conflict Resolution Satisfaction and IS Program Effectiveness: Constructive Controversy Theory , 2013 .

[52]  I. Ajzen,et al.  Belief, Attitude, Intention, and Behavior: An Introduction to Theory and Research , 1977 .

[53]  Catherine Dwyer Privacy in the Age of Google and Facebook , 2011, IEEE Technology and Society Magazine.

[54]  T. Bonoma,et al.  Managing Organizational Conflict: A Model for Diagnosis and Intervention , 1979 .

[55]  Dennis F. Galletta,et al.  Some Cautions on the Measurement of User Information Satisfaction , 1989 .

[56]  Venkata K Yanamandram,et al.  The impact of pre-existing attitude and conflict management style on customer satisfaction with service recovery , 2011 .

[57]  George R. Milne,et al.  Trust and Concern in Consumers’ Perceptions of Marketing Information Management Practices , 1999 .

[58]  M. Rahim,et al.  A measure of styles of handling interpersonal conflict. , 1983, Academy of Management journal. Academy of Management.

[59]  Mahadzirah Mohamad,et al.  EXAMINING THE STRUCTURAL RELATIONSHIPS OF SERVICE RECOVERY, DESTINATION IMAGE AND BEHAVIOURAL INTENTIONS OF FOREIGN TOURISTS: A PROPOSAL , 2011 .

[60]  Heng Xu,et al.  Information Privacy Research: An Interdisciplinary Review , 2011, MIS Q..

[61]  Heng Xu,et al.  Information privacy and correlates: an empirical attempt to bridge and distinguish privacy-related concepts , 2013, Eur. J. Inf. Syst..

[62]  Merrill Warkentin,et al.  A dual privacy decision model for online social networks , 2015, Inf. Manag..

[63]  Paul Benjamin Lowry,et al.  Increasing Accountability Through User-Interface Design Artifacts: A New Approach to Addressing the Problem of Access-Policy Violations , 2015, MIS Q..

[64]  Jun Heo,et al.  Visiting theories that predict college students' self-disclosure on Facebook , 2014, Comput. Hum. Behav..

[65]  Barton A. Weitz,et al.  Managing conflict to improve the effectiveness of retail networks , 2004 .

[66]  Tejaswini Herath,et al.  Understanding continuance intentions of physicians with electronic medical records (EMR): An expectancy-confirmation perspective , 2015, Decis. Support Syst..

[67]  Steven C. Currall,et al.  What Goes Around Comes Around: the Impact of Personal Conflict Style on Work Conflict and Stress , 2006 .

[68]  Detmar W. Straub,et al.  A Practical Guide To Factorial Validity Using PLS-Graph: Tutorial And Annotated Example , 2005, Commun. Assoc. Inf. Syst..

[69]  Dean Tjosvold,et al.  Conflict Management and Team Effectiveness in China: The Mediating Role of Justice , 2002 .

[70]  Piet Kommers,et al.  Guest Editors' Introduction-Special Issue on Digital Society and E-Technologies , 2013, Pac. Asia J. Assoc. Inf. Syst..

[71]  Merrill Warkentin,et al.  The interpersonal privacy identity (IPI): development of a privacy as control model , 2016, Inf. Technol. Manag..

[72]  Marko Hölbl,et al.  Privacy antecedents for SNS self-disclosure: The case of Facebook , 2015, Comput. Hum. Behav..

[73]  Henri Barki,et al.  Interpersonal Conflict and Its Management in Information System Development , 2001, MIS Q..

[74]  Ronald J. Fisher,et al.  Third party consultation: a method for the study and resolution of conflict , 1972 .

[75]  Paul Benjamin Lowry,et al.  Partial Least Squares (PLS) Structural Equation Modeling (SEM) for Building and Testing Behavioral Causal Theory: When to Choose It and How to Use It , 2014, IEEE Transactions on Professional Communication.

[76]  K. Thomas Conflict and conflict management: Reflections and update , 1992 .

[77]  Nick Hajli,et al.  Exploring the Security of Information Sharing on Social Networking Sites: The Role of Perceived Control of Information , 2014, Journal of Business Ethics.

[78]  Laura K. Guerrero,et al.  MANAGING CONFLICT APPROPRIATELY AND EFFECTIVELY: AN APPLICATION OF THE COMPETENCE MODEL TO RAHIM'S ORGANIZATIONAL CONFLICT STYLES , 2000 .

[79]  R. W. Rogers,et al.  Effects of components of protection-motivation theory on adaptive and maladaptive coping with a health threat. , 1987, Journal of personality and social psychology.

[80]  R. Oliver Whence Consumer Loyalty? , 1999 .

[81]  Nicholas Christakis,et al.  The Taste for Privacy: An Analysis of College Student Privacy Settings in an Online Social Network , 2008, J. Comput. Mediat. Commun..

[82]  B. Beersma,et al.  NEGOTIATION PROCESSES AND OUTCOMES IN PROSOCIALLY AND EGOISTICALLY MOTIVATED GROUPS , 1999 .

[83]  E. Mannix,et al.  The critical role of conflict resolution in teams: a close look at the links between conflict type, conflict management strategies, and team outcomes. , 2008, The Journal of applied psychology.

[84]  Patrick Y. K. Chau,et al.  Cross-cultural IS research: perspectives from Eastern and Western traditions , 2015, Eur. J. Inf. Syst..

[85]  Jae-Shin Lee,et al.  Optimistic bias about online privacy risks: Testing the moderating effects of perceived controllability and prior experience , 2010, Comput. Hum. Behav..

[86]  Jalan Menara Gading,et al.  An Examination between the Relationships of Conflict Management Styles and Employees' Satisfaction , 2008 .

[87]  Frank Tutzauer,et al.  Communication Processes Leading to Integrative Agreements , 1988 .

[88]  B. Beersma,et al.  A theory-based measure of conflict management strategies in the workplace , 2001 .

[89]  Marie Helweg-Larsen,et al.  Do Moderators of the Optimistic Bias Affect Personal or Target Risk Estimates? A Review of the Literature , 2001 .