Constraint-based and dedication-based mechanisms for encouraging online self-disclosure: Is personalization the only thing that matters?

Consumer-generated self-disclosure is better than firm-generated advertising and sales reports in increasing contact opportunities and also more credible for firms to foster alignment with future market expectations. Previous research mostly assesses online self-disclosure from the rational approach of anticipated benefits and privacy risks without considering the “privacy paradox” phenomenon (users behave contrarily to privacy concern) in social networking sites (SNSs). We develop a theoretical model, grounded in constraint-based (lock-in) and dedication-based (trust-building) mechanisms and social identity theory, to predict online self-disclosure. We test the proposed theoretical model by surveying 395 consumers with participation experience in an online SNS. Different from the rational approach behind personalization, we advance knowledge on how to apply social identity, as well as constraint-based and dedication-based mechanisms, to motivate online self-disclosure induced by consumers. We provide theoretical and practical insights based on our research findings for managing the motivational mechanisms of online self-disclosure.

[1]  Mayuram S. Krishnan,et al.  The Personalization Privacy Paradox: An Empirical Evaluation of Information Transparency and the Willingness to be Profiled Online for Personalization , 2006, MIS Q..

[2]  Hock-Hai Teo,et al.  The Value of Privacy Assurance: An Exploratory Field Experiment , 2007, MIS Q..

[3]  D. Sandy Staples,et al.  Exploring the effects of trust, task interdependence and virtualness on knowledge sharing in teams , 2008, Inf. Syst. J..

[4]  Daniel J. McAllister Affect- and Cognition-Based Trust as Foundations for Interpersonal Cooperation in Organizations , 1995 .

[5]  Rui Chen,et al.  Living a private life in public social networks: An exploration of member self-disclosure , 2013, Decis. Support Syst..

[6]  A. Tversky,et al.  Loss Aversion in Riskless Choice: A Reference-Dependent Model , 1991 .

[7]  C. Fornell,et al.  Evaluating structural equation models with unobservable variables and measurement error. , 1981 .

[8]  Tamara Dinev,et al.  An Extended Privacy Calculus Model for E-Commerce Transactions , 2006, Inf. Syst. Res..

[9]  L. Berry,et al.  Customers' motivations for maintaining relationships with service providers , 1997 .

[10]  R. Bagozzi,et al.  On the evaluation of structural equation models , 1988 .

[11]  Jocelyn M. DeGroot,et al.  Attitudes Toward Online Social Connection and Self-Disclosure as Predictors of Facebook Communication and Relational Closeness , 2011, Commun. Res..

[12]  Hal R. Varian,et al.  Information rules - a strategic guide to the network economy , 1999 .

[13]  Alan Dick,et al.  Customer loyalty: Toward an integrated conceptual framework , 1994 .

[14]  P. Blau Exchange and Power in Social Life , 1964 .

[15]  Pradeep Racherla,et al.  Network Externalities and Technology Use: A Quantitative Analysis of Intraorganizational Blogs , 2010, J. Manag. Inf. Syst..

[16]  M. E. Lipetz,et al.  Parental interference and romantic love: the Romeo and Juliet effect. , 1972, Journal of personality and social psychology.

[17]  Daniel T. Norris,et al.  SOCIAL NETWORKING WEBSITES IN INDIA AND THE UNITED STATES: A CROSS-NATIONAL COMPARISON OF ONLINE PRIVACY AND COMMUNICATION , 2008 .

[18]  Rathindra Sarathy,et al.  The role of affect and cognition on online consumers' decision to disclose personal information to unfamiliar online vendors , 2011, Decis. Support Syst..

[19]  A. Teger,et al.  Too Much Invested to Quit , 1980 .

[20]  Kazuyuki Aihara,et al.  Amoeba-based neurocomputing with chaotic dynamics , 2007, CACM.

[21]  M. Deutsch,et al.  A study of normative and informational social influences upon individual judgement. , 1955, Journal of abnormal psychology.

[22]  D. A. Kenny,et al.  The moderator-mediator variable distinction in social psychological research: conceptual, strategic, and statistical considerations. , 1986, Journal of personality and social psychology.

[23]  Celia V. Harquail,et al.  Organizational images and member identification. , 1994 .

[24]  Joseph P. Cannon,et al.  An Examination of the Nature of Trust in Buyer–Seller Relationships: , 1997 .

[25]  R. Bagozzi,et al.  Intentional social action in virtual communities , 2002 .

[26]  Richard P. Bagozzi,et al.  Assessing Construct Validity in Organizational Research , 1991 .

[27]  S. Fuchs Trust and Power , 2019, Contemporary Sociology: A Journal of Reviews.

[28]  Tamara Dinev,et al.  Why would we care about privacy? , 2014, Eur. J. Inf. Syst..

[29]  Paul Benjamin Lowry,et al.  A Systematic Review of Social Networks Research in Information Systems: Building a Foundation for Exciting Future Research , 2015, Commun. Assoc. Inf. Syst..

[30]  Yuan Li,et al.  Theories in online information privacy research: A critical review and an integrated framework , 2012, Decis. Support Syst..

[31]  David Gefen,et al.  Customer Loyalty in E-Commerce , 2002, J. Assoc. Inf. Syst..

[32]  David L. Mothersbaugh,et al.  Switching barriers and repurchase intentions in services , 2000 .

[33]  Blake E. Ashforth,et al.  Identification in Organizations: An Examination of Four Fundamental Questions , 2008 .

[34]  Adam N. Joinson,et al.  Privacy, Trust, and Self-Disclosure Online , 2010, Hum. Comput. Interact..

[35]  Randall B. Dunham,et al.  Organizational commitment: The utility of an integrative definition. , 1994 .

[36]  M. Hogg,et al.  Interpersonal attraction, social identification and psychological group formation , 1985 .

[37]  R. Bagozzi,et al.  Antecedents and purchase consequences of customer participation in small group brand communities , 2006 .

[38]  Varun Grover,et al.  Knowing your customers: Using a reciprocal relationship to enhance voluntary information disclosure , 2010, Decis. Support Syst..

[39]  K. Cook,et al.  Social Exchange Theory , 1989, Theoretical Sociology.

[40]  Fred A. Mael,et al.  Social identity theory and the organization , 1989 .

[41]  J. Dixon,et al.  Instrument translation process: a methods review. , 2004, Journal of advanced nursing.

[42]  Detmar W. Straub,et al.  Validation Guidelines for IS Positivist Research , 2004, Commun. Assoc. Inf. Syst..

[43]  S. Petronio Boundaries of Privacy: Dialectics of Disclosure , 2002 .

[44]  L. Festinger Social pressures in informal groups : a study of human factors in housing / by Leon Festinger, Stanley Schachter and Kurt Back , 1950 .

[45]  J. Sheth,et al.  Relationship marketing in consumer markets: Antecedents and consequences , 1995 .

[46]  Paul Benjamin Lowry,et al.  The role of mobile‐computing self‐efficacy in consumer information disclosure , 2015, Inf. Syst. J..

[47]  Youngme Moon Intimate Exchanges: Using Computers to Elicit Self-Disclosure from Consumers , 2000 .

[48]  Detmar W. Straub,et al.  Validating Instruments in MIS Research , 1989, MIS Q..

[49]  Milena M. Head,et al.  Exploring human images in website design: a multi-method approach , 2009 .

[50]  H. Kelman,et al.  Interests, relationships, identities: three central issues for individuals and groups in negotiating their social environment. , 2006, Annual review of psychology.

[51]  Vallabh Sambamurthy,et al.  Sources of Influence on Beliefs about Information Technolgoy Use: An Empirical Study of Knowledge Workers , 2003, MIS Q..

[52]  J. Rotter Interpersonal trust, trustworthiness, and gullibility. , 1980 .

[53]  Xi Zhang,et al.  Attracted to or Locked In? Predicting Continuance Intention in Social Virtual World Services , 2012, J. Manag. Inf. Syst..

[54]  P. Klemperer Markets with consumer switching costs , 1986 .

[55]  Sung S. Kim,et al.  Out of Dedication or Constraint? A Dual Model of Post-Adoption Phenomena and its Empirical Test in the Context of Online Services , 2009, MIS Q..

[56]  Naresh K. Malhotra,et al.  Internet Users' Information Privacy Concerns (IUIPC): The Construct, the Scale, and a Causal Model , 2004, Inf. Syst. Res..

[57]  G. Zaltman,et al.  Relationships between Providers and Users of Market Research: The Dynamics of Trust within and between Organizations , 1992 .

[58]  Rui Chen,et al.  Self-disclosure at social networking sites: An exploration through relational capitals , 2011, Information Systems Frontiers.

[59]  Mark Keil,et al.  How Values Shape Concerns about Privacy for Self and Others , 2015, ICIS.

[60]  M. Deutsch The Resolution of ConflictConstructive and Destructive Processes , 1974 .

[61]  Angelika Dimoka,et al.  What Does the Brain Tell Us About Trust and Distrust? Evidence from a Functional Neuroimaging Study , 2010, MIS Q..

[62]  Frederick Plotkin,et al.  I. SELF-DISCLOSURE , 1971 .

[63]  John G. Lynch,et al.  Reconsidering Baron and Kenny: Myths and Truths about Mediation Analysis , 2010 .

[64]  Joon Koh,et al.  Encouraging participation in virtual communities , 2007, CACM.

[65]  G. Bower,et al.  The evolution of a cognitive psychologist: a journey from simple behaviors to complex mental acts. , 2008, Annual review of psychology.

[66]  S. Kiesler,et al.  Applying Common Identity and Bond Theory to Design of Online Communities , 2007 .

[67]  Kai Lung Hui,et al.  Disclosure : Motivators and Measurements , 2006 .

[68]  Paul A. Pavlou,et al.  Building Effective Online Marketplaces with Institution-Based Trust , 2004, Inf. Syst. Res..

[69]  Elgar Fleisch,et al.  Blissfully ignorant: the effects of general privacy concerns, general institutional trust, and affect in the privacy calculus , 2015, Inf. Syst. J..

[70]  Ting Li,et al.  Willing to pay for quality personalization? Trade-off between quality and privacy , 2012, Eur. J. Inf. Syst..

[71]  Sarah Spiekermann,et al.  Online social networks: why we disclose , 2010, J. Inf. Technol..

[72]  Anindya Ghose,et al.  Examining the Relationship Between Reviews and Sales: The Role of Reviewer Identity Disclosure in Electronic Markets , 2008, Inf. Syst. Res..

[73]  Robert P. Leone,et al.  Psychological Implications of Customer Participation in Co-Production , 2003 .

[74]  Robin L. Wakefield,et al.  How website socialness leads to website use , 2011, Eur. J. Inf. Syst..

[75]  Richard Baskerville,et al.  The Privacy Paradox: The Role of Cognitive Absorption in the Social Networking Activity , 2015, ICIS.

[76]  R. Bagozzi,et al.  A Social Influence Model of Consumer Participation in Network- and Small-Group-Based Virtual Communities , 2004 .

[77]  A. Tversky,et al.  Prospect theory: analysis of decision under risk , 1979 .

[78]  Devon S. Johnson,et al.  Cognitive and affective trust in service relationships , 2005 .

[79]  J. Hair Multivariate data analysis , 1972 .

[80]  B. Muthén,et al.  Assessing Reliability and Stability in Panel Models , 1977 .

[81]  S. Cook THE CONTRIBUTION REVOLUTION : Letting Volunteers Build Your Business , 2008 .

[82]  Paul Benjamin Lowry,et al.  Explaining and Predicting the Impact of Branding Alliances and Web Site Quality on Initial Consumer Trust of E-Commerce Web Sites , 2007, J. Manag. Inf. Syst..

[83]  Rui Chen,et al.  Learning and self-disclosure behavior on social networking sites: the case of Facebook users , 2015, Eur. J. Inf. Syst..

[84]  J. G. Holmes,et al.  Trust in close relationships. , 1985 .

[85]  Rolph E. Anderson,et al.  Multivariate Data Analysis (7th ed. , 2009 .

[86]  P. Cozby Self-disclosure: a literature review. , 1973, Psychological bulletin.

[87]  Herbert C. Kelman,et al.  Social influence and linkages between the individual and the social system: Further thoughts on the processes of compliance, identification, and internalization , 2017 .

[88]  Heng Xu,et al.  Information privacy and correlates: an empirical attempt to bridge and distinguish privacy-related concepts , 2013, Eur. J. Inf. Syst..

[89]  Kristopher J Preacher,et al.  SPSS and SAS procedures for estimating indirect effects in simple mediation models , 2004, Behavior research methods, instruments, & computers : a journal of the Psychonomic Society, Inc.

[90]  Carol R. Ember,et al.  Cross-Cultural Research Methods , 2000 .

[91]  Deborah A. Prentice,et al.  Asymmetries in Attachments to Groups and to their Members: Distinguishing between Common-Identity and Common-Bond Groups , 1994 .

[92]  Marko Hölbl,et al.  Privacy antecedents for SNS self-disclosure: The case of Facebook , 2015, Comput. Hum. Behav..

[93]  Erin E. Hollenbaugh,et al.  Facebook self-disclosure: Examining the role of traits, social cohesion, and motives , 2014, Comput. Hum. Behav..

[94]  Miriam J. Metzger Privacy, Trust, and Disclosure: Exploring Barriers to Electronic Commerce , 2006, J. Comput. Mediat. Commun..

[95]  Seigyoung Auh,et al.  Why customer participation matters , 2014 .

[96]  Judy K. Frels,et al.  Consumer switching costs: A typology, antecedents, and consequences , 2003 .

[97]  M. Lindell,et al.  Accounting for common method variance in cross-sectional research designs. , 2001, The Journal of applied psychology.

[98]  Katherine N. Lemon,et al.  E-Service and the Consumer , 2001, Int. J. Electron. Commer..

[99]  L. Miller,et al.  Self-disclosure and liking: a meta-analytic review. , 1994, Psychological bulletin.

[100]  Friedrich-Schiller-Universitat Jena Common Bond and Common Identity Groups on the Internet: Attachment and Normative Behavior in On-Topic and Off-Topic Chats , 2002 .

[101]  Vladimir Zwass,et al.  Co-Creation: Toward a Taxonomy and an Integrated Research Perspective , 2010, Int. J. Electron. Commer..

[102]  R. Bagozzi On the Concept of Intentional Social Action in Consumer Behavior , 2000 .

[103]  Venkatesh Shankar,et al.  Customer value, satisfaction, loyalty, and switching costs: An illustration from a business-to-business service context , 2004 .

[104]  Paul A. Pavlou,et al.  Evidence of the Effect of Trust Building Technology in Electronic Markets: Price Premiums and Buyer Behavior , 2002, MIS Q..

[105]  Sirkka L. Jarvenpaa,et al.  Is Anybody Out There? Antecedents of Trust in Global Virtual Teams , 1998, J. Manag. Inf. Syst..

[106]  Paul Benjamin Lowry,et al.  Information Disclosure on Mobile Devices: Re-Examining Privacy Calculus with Actual User Behavior , 2013, Int. J. Hum. Comput. Stud..

[107]  J. Lewis,et al.  Trust as a Social Reality , 1985 .

[108]  A. Tversky,et al.  Prospect theory: an analysis of decision under risk — Source link , 2007 .

[109]  Rajeev Sharma,et al.  Estimating the effect of common method variance: the method-method pair technique with an illustration from TAM research , 2009 .

[110]  Shankar Ganesan Determinants of Long-Term Orientation in Buyer-Seller Relationships , 1994 .

[111]  Joseph A. Cazier,et al.  E-business differentiation through value-based trust , 2006, Inf. Manag..

[112]  Scott M. Stanley,et al.  Assessing commitment in personal relationships. , 1992 .

[113]  J. Nunnally Psychometric Theory (2nd ed), New York: McGraw-Hill. , 1978 .

[114]  Constance Elise Porter,et al.  Cultivating Trust and Harvesting Value in Virtual Communities , 2008, Manag. Sci..

[115]  Scott B. MacKenzie,et al.  Common method biases in behavioral research: a critical review of the literature and recommended remedies. , 2003, The Journal of applied psychology.

[116]  Tom L. Roberts,et al.  Proposing the online community self-disclosure model: the case of working professionals in France and the U.K. who use online communities , 2010, Eur. J. Inf. Syst..

[117]  Hock-Hai Teo,et al.  The Role of Push-Pull Technology in Privacy Calculus: The Case of Location-Based Services , 2009, J. Manag. Inf. Syst..