The role of mobile‐computing self‐efficacy in consumer information disclosure

Smartphones are increasingly penetrating business and consumer markets, and mobile applications (apps) have engendered a large and innovative market. Whereas apps are useful, they also present new forms of privacy risk associated with users' personal and location data. However, these dangers do not appear to increase the perceived risk or reduce the trust consumers demonstrate when using apps. Many information technology (IT) trust indicators are well documented such as the quality of the IT, trust assurances, brand recognition and social influences. However, these traditional indicators appear to have a lesser impact on the adoption of mobile commerce via apps because of the nature of mobile‐app adoption and subsequent information disclosure. As a result, we draw from social cognitive theory and its construct of self‐efficacy in particular to explain perceived mobile‐app risk and provider trust. Through two controlled experiments, we demonstrate the strong direct effect of mobile‐computing self‐efficacy on users' initial trust in location‐based app vendors as well as their perceived risk of disclosing information – regardless of the actual trustworthiness of the app vendor. The results imply that being skilled in the latest smartphones and apps can cause users to place greater trust in app providers and perceive less risk in the app itself, even when the intentions of the app providers cannot be verified.

[1]  Deborah Compeau,et al.  Application of Social Cognitive Theory to Training for Computer Skills , 1995, Inf. Syst. Res..

[2]  Paul A. Pavlou,et al.  Building Effective Online Marketplaces with Institution-Based Trust , 2004, Inf. Syst. Res..

[3]  Anindya Ghose,et al.  Examining the Relationship Between Reviews and Sales: The Role of Reviewer Identity Disclosure in Electronic Markets , 2008, Inf. Syst. Res..

[4]  Jinwoo Kim,et al.  Do size and structure matter to mobile users? An empirical study of the effects of screen size, information structure, and task complexity on user activities with standard web phones , 2004, Behav. Inf. Technol..

[5]  Detmar W. Straub,et al.  Examining Trust in Information Technology Artifacts: The Effects of System Quality and Culture , 2008, J. Manag. Inf. Syst..

[6]  A. Bandura Social Foundations of Thought and Action , 1986 .

[7]  Heng Xu,et al.  Information privacy and correlates: an empirical attempt to bridge and distinguish privacy-related concepts , 2013, Eur. J. Inf. Syst..

[8]  David W. Wilson,et al.  A Picture is Worth a Thousand Words: Source Credibility Theory Applied to Logo and Website Design for Heightened Credibility and Consumer Trust , 2014, Int. J. Hum. Comput. Interact..

[9]  Sarah Spiekermann,et al.  Online social networks: why we disclose , 2010, J. Inf. Technol..

[10]  Andrea Everard,et al.  Privacy Concerns Versus Desire for Interpersonal Awareness in Driving the Use of Self-Disclosure Technologies: The Case of Instant Messaging in Two Cultures , 2011, J. Manag. Inf. Syst..

[11]  Lauren I. Labrecque,et al.  Toward an Understanding of the Online Consumer's Risky Behavior and Protection Practices , 2009 .

[12]  Detmar W. Straub,et al.  Trust and TAM in Online Shopping: An Integrated Model , 2003, MIS Q..

[13]  Paul A. Pavlou,et al.  Evidence of the Effect of Trust Building Technology in Electronic Markets: Price Premiums and Buyer Behavior , 2002, MIS Q..

[14]  Christopher P. Furner,et al.  Making it Personal: How Personalization Affects Trust Over Time , 2005, Proceedings of the 38th Annual Hawaii International Conference on System Sciences.

[15]  Leyland F. Pitt,et al.  Integrating the smartphone into a sound environmental information systems strategy: Principles, practices and a research agenda , 2011, J. Strateg. Inf. Syst..

[16]  Pin Luarn,et al.  Predicting consumer intention to use mobile service , 2006, Inf. Syst. J..

[17]  Michael Macaulay,et al.  Who do we trust , 2016 .

[18]  Paul Benjamin Lowry,et al.  Information Disclosure on Mobile Devices: Re-Examining Privacy Calculus with Actual User Behavior , 2013, Int. J. Hum. Comput. Stud..

[19]  Vallabh Sambamurthy,et al.  Research Report: The Evolving Relationship Between General and Specific Computer Self-Efficacy - An Empirical Assessment , 2000, Inf. Syst. Res..

[20]  Xin Luo,et al.  Examining multi-dimensional trust and multi-faceted risk in initial acceptance of emerging technologies: An empirical study of mobile banking services , 2010, Decis. Support Syst..

[21]  Gordon B. Davis,et al.  User Acceptance of Information Technology: Toward a Unified View , 2003, MIS Q..

[22]  Lisa G. Aspinwall,et al.  Expect the Best and Prepare for the Worst: Anticipatory Coping and Preparations for Y2K , 2005 .

[23]  Christopher P. Furner,et al.  Privacy Assurance and Network Effects in the Adoption of Location-Based Services: an iPhone Experiment , 2010, ICIS.

[24]  Glenn D. Grace,et al.  Social Support and Coping Style Differences in Subjects High and Low in Interpersonal Trust , 1986 .

[25]  Yuan Li,et al.  Theories in online information privacy research: A critical review and an integrated framework , 2012, Decis. Support Syst..

[26]  Diane Lending,et al.  The Effects of Confidentiality on Nursing Self-Efficacy with Information Systems , 2007, Int. J. Heal. Inf. Syst. Informatics.

[27]  Batya Friedman,et al.  Trust online , 2000, CACM.

[28]  Gilles Hilary,et al.  Does Past Success Lead Analysts to Become Overconfident? , 2006, Manag. Sci..

[29]  Fred D. Davis,et al.  A Theoretical Extension of the Technology Acceptance Model: Four Longitudinal Field Studies , 2000, Management Science.

[30]  Jan M. Gutteling,et al.  How to trust? The importance of self‐efficacy and social trust in public responses to industrial risks , 2009 .

[31]  Matthew Garner,et al.  Effects of threat cues on attentional shifting, disengagement and response slowing in anxious individuals , 2008, Behaviour research and therapy.

[32]  Paul A. Pavlou,et al.  Institution-Based Trust in Interorganizational Exchange Relationships: The Role of Online B2B Marketplaces on Trust Formation , 2002, J. Strateg. Inf. Syst..

[33]  Lee Rainie A Biography of the Pew Research Center’s Internet & American Life Project , 2012 .

[34]  Viswanath Venkatesh,et al.  Technology Acceptance Model 3 and a Research Agenda on Interventions , 2008, Decis. Sci..

[35]  G. Loewenstein,et al.  Misplaced Confidences: Privacy and the Control Paradox. , 2010 .

[36]  Deborah Compeau,et al.  Intentions to Use Information Technologies: An Integrative Model , 2006, J. Organ. End User Comput..

[37]  Arik Ragowsky,et al.  Establishing Trust in Electronic Commerce Through Online Word of Mouth: An Examination Across Genders , 2008, J. Manag. Inf. Syst..

[38]  D. Russell,et al.  Adult Attachment, Social Self-Efficacy, Self-Disclosure, Loneliness, and Subsequent Depression for Freshman College Students: A Longitudinal Study , 2005 .

[39]  James J. Jiang,et al.  The effects of change control and management review on software flexibility and project performance , 2008, Inf. Manag..

[40]  Norman A. Johnson,et al.  Personality traits and concern for privacy: an empirical study in the context of location-based services , 2008, Eur. J. Inf. Syst..

[41]  Dan Jong Kim,et al.  A Study of Online Transaction Self-Efficacy, Consumer Trust, and Uncertainty Reduction in Electronic Commerce Transaction , 2005, Proceedings of the 38th Annual Hawaii International Conference on System Sciences.

[42]  Peter R. Dickson,et al.  How Believing in Ourselves Increases Risk Taking: Perceived Self‐Efficacy and Opportunity Recognition , 1994 .

[43]  F. Bookstein,et al.  Two Structural Equation Models: LISREL and PLS Applied to Consumer Exit-Voice Theory , 1982 .

[44]  Vincenzo Russo,et al.  Privacy calculus model in e-commerce – a study of Italy and the United States , 2006, Eur. J. Inf. Syst..

[45]  Paul Benjamin Lowry,et al.  Explaining and Predicting the Impact of Branding Alliances and Web Site Quality on Initial Consumer Trust of E-Commerce Web Sites , 2007, J. Manag. Inf. Syst..

[46]  Wynne W. Chin,et al.  A Partial Least Squares Latent Variable Modeling Approach for Measuring Interaction Effects: Results from a Monte Carlo Simulation Study and an Electronic - Mail Emotion/Adoption Study , 2003, Inf. Syst. Res..

[47]  Heng Xu Locus of Control and Location Privacy: An Empirical Study in Singapore , 2010 .

[48]  Alexander Hars,et al.  Web Based Knowledge Infrastructures for the Sciences: An Adaptive Document , 2000, Commun. Assoc. Inf. Syst..

[49]  Izak Benbasat,et al.  Trust In and Adoption of Online Recommendation Agents , 2005, J. Assoc. Inf. Syst..

[50]  Per E. Pedersen,et al.  Adoption of Mobile Internet Services: An Exploratory Study of Mobile Commerce Early Adopters , 2005, J. Organ. Comput. Electron. Commer..

[51]  Sanjay Goel,et al.  Entrepreneurs, Effectual Logic, and Over–Trust , 2006 .

[52]  Detmar W. Straub,et al.  Validation Guidelines for IS Positivist Research , 2004, Commun. Assoc. Inf. Syst..

[53]  Chun-Ming Chang,et al.  Knowledge sharing behavior in virtual communities: The relationship between trust, self-efficacy, and outcome expectations , 2007, Int. J. Hum. Comput. Stud..

[54]  Detmar W. Straub,et al.  Structural Equation Modeling and Regression: Guidelines for Research Practice , 2000, Commun. Assoc. Inf. Syst..

[55]  N. A. Bernstein Dexterity and Its Development , 1996 .

[56]  Dale Goodhue,et al.  Comment on Benbasat and Barki's "Quo Vadis TAM" article , 2007, J. Assoc. Inf. Syst..

[57]  Chao-Min Chiu,et al.  Internet self-efficacy and electronic service acceptance , 2004, Decis. Support Syst..

[58]  Hock-Hai Teo,et al.  The Role of Push-Pull Technology in Privacy Calculus: The Case of Location-Based Services , 2009, J. Manag. Inf. Syst..

[59]  I. Ajzen The theory of planned behavior , 1991 .

[60]  A. Bandura Social cognitive theory of self-regulation☆ , 1991 .

[61]  France Bélanger,et al.  Trustworthiness in electronic commerce: the role of privacy, security, and site attributes , 2002, J. Strateg. Inf. Syst..

[62]  Byung-Gon Chun,et al.  TaintDroid: An Information-Flow Tracking System for Realtime Privacy Monitoring on Smartphones , 2010, OSDI.

[63]  Michele Grimaldi,et al.  Evaluating the Intellectual Capital of Technology Transfer and Learning Public Services , 2013 .

[64]  John H. Bradley,et al.  Computer Self-Efficacy, Anxiety, and Learning in Online Versus Face to Face Medium , 2012, J. Inf. Technol. Educ. Res..

[65]  Rui Chen,et al.  Security services as coping mechanisms: an investigation into user intention to adopt an email authentication service , 2014, Inf. Syst. J..

[66]  Eric T. Bradlow,et al.  Promises and Lies: Restoring Violated Trust , 2004 .

[67]  Matthew L. Jensen,et al.  Using an elaboration likelihood approach to better understand the persuasiveness of website privacy assurance cues for online consumers , 2012, J. Assoc. Inf. Sci. Technol..

[68]  M MarakasGeorge,et al.  The Multilevel and Multifaceted Character of Computer Self-Efficacy , 1998 .

[69]  Alessandro Acquisti,et al.  Privacy and rationality in individual decision making , 2005, IEEE Security & Privacy.

[70]  A. Bandura Toward a unifying theory of behavioral change , 1977 .

[71]  A. Acquisti Losses , Gains , and Hyperbolic Discounting : An Experimental Approach to Information Security Attitudes and Behavior , 2003 .

[72]  S. Kalichman,et al.  Self-efficacy and disclosure of HIV-positive serostatus to sex partners. , 1999, Health psychology : official journal of the Division of Health Psychology, American Psychological Association.

[73]  Kieran Mathieson,et al.  Predicting User Intentions: Comparing the Technology Acceptance Model with the Theory of Planned Behavior , 1991, Inf. Syst. Res..

[74]  Christian Grillon,et al.  Anxious responses to predictable and unpredictable aversive events. , 2004, Behavioral neuroscience.

[75]  C. Carver,et al.  Assessing coping strategies: a theoretically based approach. , 1989, Journal of personality and social psychology.

[76]  Poornima Madhavan,et al.  Effects of computer self-efficacy and system reliability on user interaction with decision support systems , 2010, Comput. Hum. Behav..

[77]  A. Bandura Self-efficacy: toward a unifying theory of behavioral change. , 1977, Psychological review.

[78]  Paul A. Pavlou,et al.  Understanding and Predicting Electronic Commerce Adoption: An Extension of the Theory of Planned Behavior , 2006, MIS Q..

[79]  A. Bandura Social Cognitive Theory in Cultural Context , 2002, Applied Psychology.

[80]  Mary J. Culnan,et al.  "How Did They Get My Name?": An Exploratory Investigation of Consumer Attitudes Toward Secondary Information Use , 1993, MIS Q..

[81]  Dan J. Kim,et al.  Self-Perception-Based Versus Transference-Based Trust Determinants in Computer-Mediated Transactions: A Cross-Cultural Comparison Study , 2008, J. Manag. Inf. Syst..

[82]  Paul Benjamin Lowry,et al.  Partial Least Squares (PLS) Structural Equation Modeling (SEM) for Building and Testing Behavioral Causal Theory: When to Choose It and How to Use It , 2014, IEEE Transactions on Professional Communication.

[83]  M. Sujan,et al.  Self-Accountability Emotions and Fear Appeals: Motivating Behavior , 2006 .

[84]  Paul Benjamin Lowry,et al.  The CMC Interactivity Model: How Interactivity Enhances Communication Quality and Process Satisfaction in Lean-Media Groups , 2009, J. Manag. Inf. Syst..

[85]  A. Bandura Self-efficacy mechanism in human agency. , 1982 .

[86]  Richard D. Johnson,et al.  The Evolving Nature of the Computer Self-Efficacy Construct: An Empirical Investigation of Measurement Construction, Validity, Reliability and Stability Over Time , 2007, J. Assoc. Inf. Syst..

[87]  R. Laufer,et al.  Privacy as a Concept and a Social Issue: A Multidimensional Developmental Theory , 1977 .

[88]  Alessandro Acquisti,et al.  Privacy Concerns and Information Disclosure: An Illusion of Control Hypothesis , 2009 .

[89]  Xin Li,et al.  Why do we trust new technology? A study of initial trust formation with organizational information systems , 2008, J. Strateg. Inf. Syst..

[90]  Robert E. Crossler,et al.  Privacy in the Digital Age: A Review of Information Privacy Research in Information Systems , 2011, MIS Q..

[91]  Blaise J. Bergiel,et al.  Effects of the electronic Nigerian money fraud on the brand equity of Nigeria and Africa , 2004 .

[92]  Deborah Compeau,et al.  Social Cognitive Theory and Individual Reactions to Computing Technology: A Longitudinal Study , 1999, MIS Q..

[93]  Dennis F. Galletta,et al.  When Trust and Distrust Collide Online: The Engenderment and Role of Consumer Ambivalence in Online Consumer Behavior , 2014, Electron. Commer. Res. Appl..

[94]  Hock-Hai Teo,et al.  The Value of Privacy Assurance: An Exploratory Field Experiment , 2007, MIS Q..

[95]  Trevor T. Moores,et al.  Self-efficacy, overconfidence, and the negative effect on subsequent performance: A field study , 2009, Inf. Manag..

[96]  Izak Benbasat,et al.  Recommendation Agents for Electronic Commerce: Effects of Explanation Facilities on Trusting Beliefs , 2007, J. Manag. Inf. Syst..

[97]  Tamara Dinev,et al.  An Extended Privacy Calculus Model for E-Commerce Transactions , 2006, Inf. Syst. Res..

[98]  Gil Sadka,et al.  The Economic Consequences of Accounting Fraud in Product Markets: Theory and a Case from the Us Telecommunications Industry (Worldcom) , 2006 .

[99]  KokolakisSpyros Privacy attitudes and privacy behaviour , 2017 .

[100]  BenbasatIzak,et al.  The effects of personalizaion and familiarity on trust and adoption of recommendation agents , 2006 .

[101]  H. Jeff Smith,et al.  Information Privacy: Measuring Individuals' Concerns About Organizational Practices , 1996, MIS Q..

[102]  Elizabeth Fife,et al.  The Privacy Calculus: Mobile Apps and User Perceptions of Privacy and Security , 2012 .

[103]  O. Scholz,et al.  When is a picture? , 1993, Synthese.

[104]  M. Friedman,et al.  Coping with Consumer Fraud: The Need for a Paradigm Shift. , 1998 .

[105]  Detmar W. Straub,et al.  A Practical Guide To Factorial Validity Using PLS-Graph: Tutorial And Annotated Example , 2005, Commun. Assoc. Inf. Syst..

[106]  A. Tenbrunsel,et al.  Organizational Behavior and Human Decision Processes , 2013 .

[107]  Mark A. Fuller,et al.  Formative vs. Reflective Measurement: Comment on Marakas, Johnson, and Clay (2007) , 2008, J. Assoc. Inf. Syst..

[108]  Charles J. Kacmar,et al.  Developing and Validating Trust Measures for e-Commerce: An Integrative Typology , 2002, Inf. Syst. Res..

[109]  Sirkka L. Jarvenpaa,et al.  Consumer and Business Deception on the Internet: Content Analysis of Documentary Evidence , 2003, Int. J. Electron. Commer..

[110]  E. Rogers,et al.  Diffusion of innovations , 1964, Encyclopedia of Sport Management.

[111]  H. Raghav Rao,et al.  A trust-based consumer decision-making model in electronic commerce: The role of trust, perceived risk, and their antecedents , 2008, Decis. Support Syst..

[112]  Deborah Compeau,et al.  Computer Self-Efficacy: Development of a Measure and Initial Test , 1995, MIS Q..

[113]  S. Thompson Social Learning Theory , 2008 .

[114]  H. Krohne,et al.  The concept of coping modes: relating cognitive person variables to actual coping behavior , 1989 .

[115]  Timothy D. Wilson,et al.  Telling more than we can know: Verbal reports on mental processes. , 1977 .

[116]  M. Csíkszentmihályi Beyond boredom and anxiety , 1975 .

[117]  Richard D. Johnson,et al.  The Multilevel and Multifaceted Character of Computer Self-Efficacy: Toward Clarification of the Construct and an Integrative Framework for Research , 1998, Inf. Syst. Res..

[118]  J. Gutteling,et al.  Information needs and risk perception as predictors of risk information seeking , 2008 .

[119]  A. Tversky,et al.  Preference and belief: Ambiguity and competence in choice under uncertainty , 1991 .