Member use of social networking sites - an empirical examination

In this research the authors examine members' voluntary use of social networking sites. Site use leads to the growth of social relationships, increased volume of site visits and traffic, and an accumulation of user generated contents; hence it is imperative to the success of social networking sites. Drawing upon Social Exchange Theory (SET), we develop a research model that examines the major determinants of member site use behavior through a cost-benefit framework. This model also investigates the key antecedents to site use that stem from website designs, personal traits, and personal beliefs in the environment. The research model has been validated through survey data collected from 222 social networking site users, and the analysis results provide strong support to the hypothesized relationships. The current study generates new knowledge on the literature of SET and social networking sites; it also sheds lights on site management for networking service providers.

[1]  Wynne W. Chin,et al.  Intention does not always Matter: The Contingent Role of Habit in IT Usage Behaviour , 2001, ECIS.

[2]  Sridhar Narasimhan,et al.  Effects of Relational Factors and Channel Climate on EDI Usage in the Customer-Supplier Relationship , 2005, J. Manag. Inf. Syst..

[3]  Young-Gul Kim,et al.  Extending the TAM for a World-Wide-Web context , 2000, Inf. Manag..

[4]  K. Jöreskog,et al.  Intraclass Reliability Estimates: Testing Structural Assumptions , 1974 .

[5]  C. Steinfield,et al.  A Social Information Processing Model of Media Use in Organizations , 1987 .

[6]  Hock Chuan Chan,et al.  Understanding Users' Continuance of Facebook: The Role of General and Specific Computer Self-Efficacy , 2008, ICIS.

[7]  E. Foa,et al.  Societal Structures of the Mind , 1974 .

[8]  A. Gouldner THE NORM OF RECIPROCITY: A PRELIMINARY STATEMENT * , 1960 .

[9]  Wynne W. Chin Issues and Opinion on Structural Equation Modeling by , 2009 .

[10]  Donghua Tao,et al.  Intention to Use and Actual Use of Electronic Information Resources: Further Exploring Technology Acceptance Model (TAM) , 2009, AMIA.

[11]  Paul A. Pavlou,et al.  Consumer Acceptance of Electronic Commerce: Integrating Trust and Risk with the Technology Acceptance Model , 2003, Int. J. Electron. Commer..

[12]  P. Blau Exchange and Power in Social Life , 1964 .

[13]  Younghwa Lee,et al.  Avatar e-mail versus traditional e-mail: Perceptual difference and media selection difference , 2009, Decis. Support Syst..

[14]  R. H. Willis,et al.  Social Exchange: Advances In Theory And Research , 1981 .

[15]  Hans van der Heijden,et al.  User Acceptance of Hedonic Information Systems , 2004, MIS Q..

[16]  Danah Boyd,et al.  Social Network Sites: Definition, History, and Scholarship , 2007, J. Comput. Mediat. Commun..

[17]  Chang Liu,et al.  Beyond concern - a privacy-trust-behavioral intention model of electronic commerce , 2004, Inf. Manag..

[18]  P. Hackl,et al.  Robustness of partial least-squares method for estimating latent variable quality structures , 1999 .

[19]  Milena M. Head,et al.  The Impact of Infusing Social Presence in the Web Interface: An Investigation Across Product Types , 2005, Int. J. Electron. Commer..

[20]  Scott B. MacKenzie,et al.  Common method biases in behavioral research: a critical review of the literature and recommended remedies. , 2003, The Journal of applied psychology.

[21]  Xiaolong Zhang,et al.  Information Disclosure and Online Social Networks: From the Case of Facebook News Feed Controversy to a Theoretical Understanding , 2010, AMCIS.

[22]  Christian Wagner,et al.  Weblogging: A study of social computing and its impact on organizations , 2008, Decis. Support Syst..

[23]  Deb Sledgianowski,et al.  Social Network Sites: Antecedents of User Adoption and Usage , 2008, AMCIS.

[24]  Richard,et al.  Extrinsic and Intrinsic Motivation to Use Computers in the Workplace , 2022 .

[25]  Tom L. Roberts,et al.  Proposing the online community self-disclosure model: the case of working professionals in France and the U.K. who use online communities , 2010, Eur. J. Inf. Syst..

[26]  Amany R. Elbanna From intention to use to actual rejection: the journey of an e-procurement system , 2010, J. Enterp. Inf. Manag..

[27]  Thompson S. H. Teo,et al.  Intrinsic and extrinsic motivation in Internet usage , 1999 .

[28]  Atreyi Kankanhalli,et al.  Contributing Knowledge to Electronic Knowledge Repositories: An Empirical Investigation , 2005, MIS Q..

[29]  Yi Zhao,et al.  Effects of System Characteristics on Users' Self-Disclosure in Social Networking Sites , 2010, 2010 Seventh International Conference on Information Technology: New Generations.

[30]  Traci Carte,et al.  In Pursuit of Moderation: Nine Common Errors and Their Solutions , 2003, MIS Q..

[31]  Wynne W. Chin,et al.  A Partial Least Squares Latent Variable Modeling Approach for Measuring Interaction Effects: Results from a Monte Carlo Simulation Study and an Electronic - Mail Emotion/Adoption Study , 2003, Inf. Syst. Res..

[32]  Tao Hu,et al.  Why People Continue to Use Social Networking Services: Developing a Comprehensive Model , 2008, ICIS.

[33]  Nassim Belbaly,et al.  Understanding Developers’ Motives in Open Source Projects: A Multi-Theoretical Framework , 2010, Commun. Assoc. Inf. Syst..

[34]  H. Markus,et al.  Possible Selves , 2001 .

[35]  Sooyeon Kim,et al.  A Study on the Factors Influencing the Intention of Blog Usage , 2009, PACIS.

[36]  Amy L. Pablo,et al.  Reconceptualizing the Determinants of Risk Behavior , 1992 .

[37]  Izak Benbasat,et al.  Para-social presence: a re-conceptualization of 'social presence' to capture the relationship between a Web site and her visitors , 2002, Proceedings of the 35th Annual Hawaii International Conference on System Sciences.

[38]  Bernardo A. Huberman,et al.  Rhythms of social interaction: messaging within a massive online network , 2006, ArXiv.

[39]  Khaled Hassanein,et al.  The Impact of Infusing Social Presence in the Web Interface : An Investigation Across Different Products ” , 2006 .

[40]  Danah Boyd,et al.  Friendster and publicly articulated social networking , 2004, CHI EA '04.

[41]  Natasha F. Veltri,et al.  The Role of National Culture Differences in User Adoption of Social Netowrking , 2009 .

[42]  Matthew Lombard,et al.  At the Heart of It All: The Concept of Presence , 2006 .

[43]  P. Pavlou,et al.  Consumer Acceptance of Electronic Commerce: Integrating Trust and Risk with the Technology Acceptance Model , 2003 .

[44]  Jessie Pallud,et al.  Crisis Response and IT Use Literature Review and Suggestions for Future Research , 2009, AMCIS.

[45]  Matthew K. O. Lee,et al.  A theoretical model of intentional social action in online social networks , 2010, Decis. Support Syst..

[46]  R. Cropanzano,et al.  Social Exchange Theory: An Interdisciplinary Review , 2005 .

[47]  P. Costa,et al.  NEO inventories for the NEO Personality Inventory-3 (NEO-PI-3), NEO Five-Factor Inventory-3 (NEO-FFI-3), NEO Personality Inventory-Revised (NEO PI-R) : professional manual , 2010 .

[48]  이훈,et al.  지각된 유용성(Perceived Usefulness)의 영향분석 , 2004 .

[49]  C. Fornell,et al.  Evaluating structural equation models with unobservable variables and measurement error. , 1981 .

[50]  Dianne Cyr,et al.  The role of social presence in establishing loyalty in e-Service environments , 2007, Interact. Comput..

[51]  Andrew B. Whinston Opportunities and Challenges in Analysis of Social Netowrks , 2009, AMCIS.

[52]  Dan Jong Kim,et al.  Customer self-service systems: The effects of perceived Web quality with service contents on enjoyment, anxiety, and e-trust , 2007, Decis. Support Syst..

[53]  Paul A. Pavlou,et al.  Understanding and Mitigating Uncertainty in Online Exchange Relationships: A Principal-Agent Perspective , 2007, MIS Q..

[54]  Ting-Peng Liang,et al.  Can Social Exchange Theory Explain Individual Knowledge-Sharing Behavior? A Meta-Analysis , 2008, ICIS.

[55]  Cliff Lampe,et al.  A familiar face(book): profile elements as signals in an online social network , 2007, CHI.

[56]  Jennifer Glenar Fisher Implications of electronic mail policies for fairness and invasion of privacy : a field experiment , 2002 .

[57]  Deb Sledgianowski,et al.  Using Social Network Sites: The Effects of Playfulness, Critical Mass and Trust in a Hedonic Context , 2009, J. Comput. Inf. Syst..

[58]  Hsiu-Lan Wu,et al.  Utilitarian and Hedonic Values of Social Network Services , 2009, AMCIS.

[59]  Mark Keil,et al.  Usefulness and ease of use: field study evidence regarding task considerations , 1995, Decis. Support Syst..

[60]  Matthew K. O. Lee,et al.  Understanding the role of gender in bloggers' switching behavior , 2009, Decis. Support Syst..

[61]  Starr Roxanne Hiltz,et al.  Trust and Privacy Concern Within Social Networking Sites: A Comparison of Facebook and MySpace , 2007, AMCIS.

[62]  CyrDianne,et al.  The role of social presence in establishing loyalty in e-Service environments , 2007 .

[63]  Sirkka L. Jarvenpaa,et al.  Perils of Internet fraud: an empirical investigation of deception and trust with experienced Internet consumers , 2000, IEEE Trans. Syst. Man Cybern. Part A.

[64]  Alice E. Marwick 'I’m a Lot More Interesting than a Friendster Profile': Identity Presentation, Authenticity and Power in Social Networking Services , 2005 .

[65]  Fred D. Davis,et al.  Extrinsic and Intrinsic Motivation to Use Computers in the Workplace1 , 1992 .

[66]  Neil Conway,et al.  The employment relationship through the lens of social exchange , 2004 .

[67]  Cliff Lampe,et al.  The Benefits of Facebook "Friends: " Social Capital and College Students' Use of Online Social Network Sites , 2007, J. Comput. Mediat. Commun..

[68]  Peter A. Rosen,et al.  The Impact of the Big Five Personality Traits on the Acceptance of Social Networking Website , 2008, AMCIS.

[69]  R. Sabatelli The Social Psychology of Groups , 2000 .

[70]  Moez Limayem,et al.  How Habit Limits the Predictive Power of Intention: The Case of Information Systems Continuance , 2007, MIS Q..

[71]  Mary-Anne Williams,et al.  Privacy in Social Networks: a Comparative Study , 2009, PACIS.

[72]  Robert P. Bostrom,et al.  Mis problems and failures: a socio-technical perspective , 1977 .

[73]  Aaron Smith,et al.  Social Media & Mobile Internet Use among Teens and Young Adults. Millennials. , 2010 .

[74]  Fred D. Davis User Acceptance of Information Technology: System Characteristics, User Perceptions and Behavioral Impacts , 1993, Int. J. Man Mach. Stud..

[75]  Magid Igbaria,et al.  A Motivational Model of Microcomputer Usage , 1996, J. Manag. Inf. Syst..

[76]  Gilbert A. Churchill A Paradigm for Developing Better Measures of Marketing Constructs , 1979 .

[77]  Natasha F. Veltri,et al.  AIS Electronic Library (AISeL) , 2022 .

[78]  Linda D. Molm Coercive power in social exchange , 1997 .

[79]  Juhani Iivari,et al.  Why do individuals use computer technology? A Finnish case study , 1995, Inf. Manag..

[80]  Tamara Dinev,et al.  An Extended Privacy Calculus Model for E-Commerce Transactions , 2006, Inf. Syst. Res..

[81]  Rui Chen,et al.  Visual e-mail authentication and identification services: An investigation of the effects on e-mail use , 2009, Decis. Support Syst..

[82]  HeijdenHans User acceptance of hedonic information systems , 2004 .

[83]  Ingoo Han,et al.  The impact of Web quality and playfulness on user acceptance of online retailing , 2007, Inf. Manag..

[84]  Minhong Wang,et al.  Integrating organizational, social, and individual perspectives in Web 2.0-based workplace e-learning , 2011, Inf. Syst. Frontiers.

[85]  P. Costa,et al.  Revised NEO Personality Inventory (NEO-PI-R) and NEO-Five-Factor Inventory (NEO-FFI) , 1992 .

[86]  Ca Jose,et al.  Lampe, Cliff, Ellison, Nicole, and Steinfeld, Charles. . Face(book): Profile Elements as Signals in an Online Social Network. , 2007, CHI 2007.

[87]  David Gefen,et al.  Implementation Team Responsiveness and User Evaluation of Customer Relationship Management: A Quasi-Experimental Design Study of Social Exchange Theory , 2002, J. Manag. Inf. Syst..

[88]  Malcolm Munro,et al.  Assessing User Competence: Conceptualization and Measurement , 2000, Inf. Syst. Res..

[89]  F. Bookstein,et al.  Two Structural Equation Models: LISREL and PLS Applied to Consumer Exit-Voice Theory , 1982 .

[90]  Robert A. Baron,et al.  INJUSTICE AND ORGANIZATIONAL CONFLICT: THE MODERATING EFFECT OF POWER RESTORATION , 1991 .

[91]  Elena Kolesnikova,et al.  "It Won't Happen To Me!": Self-Disclosure in Online Social Networks , 2009, AMCIS.

[92]  Albert H. Segars,et al.  An Empirical Examination of the Concern for Information Privacy Instrument , 2002, Inf. Syst. Res..

[93]  Eugene F. Stone Research methods in organizational behavior , 1978 .

[94]  Steven Durlauf,et al.  Social Capital , 2004 .

[95]  D. Sandy Staples,et al.  A Self-Efficacy Theory Explanation for the Management of Remote Workers in Virtual Organizations , 1999, J. Comput. Mediat. Commun..

[96]  Li Qin,et al.  The Effects of Privacy Concern and Social Influence on User Acceptance of Online Social Networks , 2009, AMCIS.

[97]  David Gefen,et al.  Managing User Trust in B2C e-Services , 2003 .

[98]  N. Ellison,et al.  Social capital, self-esteem, and use of online social network sites: A longitudinal analysis , 2008 .

[99]  A. Kaplan,et al.  A Beginner's Guide to Partial Least Squares Analysis , 2004 .

[100]  Anthony M. Cresswell,et al.  Advances in multi-agency disaster management: Key elements in disaster research , 2010, Inf. Syst. Frontiers.

[101]  S. M. Arnsten Intrinsic motivation. , 1990, The American journal of occupational therapy : official publication of the American Occupational Therapy Association.

[102]  Fred D. Davis Perceived Usefulness, Perceived Ease of Use, and User Acceptance of Information Technology , 1989, MIS Q..

[103]  Oliver Günther,et al.  Investigating the Value of Privacy in Online Social Networks: Conjoint Analysis , 2009, ICIS.

[104]  Youngjin Yoo,et al.  Media and Group Cohesion: Relative Influences on Social Presence, Task Participation, and Group Consensus , 2001, MIS Q..