The role of security notices and online consumer behaviour: An empirical study of social networking users

This paper uses a survey of social networking users to empirically explore their perceptions of security notices - independently verified artefacts informing internet site users that security measures are taken by the site owner. We investigate such factors as purchase experience, purchase intention, risk propensity, usage of various social network categories and user victimisation. The results suggest a strong positive link between purchase intention and paying attention to security notices/features on social networks. We find that higher use of narrow-purpose social networking services has a negative association with paying attention to security notices. We also show that users with higher risk propensity pay less attention to security notices/features. Finally, we find no association between purchase experience, user victimisation and perception of security notices/features. Our results provide new, and possibly more refined, evidence of the factors that influence the attention paid to security notices/features by social media users. The results have important implications for theory development, policy and practice. We attempt to close the gap in literature on consumer behaviour in social context.We model user behaviour, risk, usage, victimisation and impact of security notices.We empirically test the proposed model using a survey of 500+ social network users.We apply an ordered probit analysis to explore the role of security notices.Notices influence users who are risk averse and willing to transact on social media.

[1]  K. Mitchell,et al.  Online Harassment in Context: Trends From Three Youth Internet Safety Surveys (2000, 2005, 2010) , 2013 .

[2]  Dale Goodhue,et al.  Two Worlds of Trust for Potential E-Commerce Users: Humans as Cognitive Misers , 2012, Inf. Syst. Res..

[3]  Xi Chen,et al.  A Literature Review of Privacy Research on Social Network Sites , 2009, 2009 International Conference on Multimedia Information Networking and Security.

[4]  P. Schmidt,et al.  Limited-Dependent and Qualitative Variables in Econometrics. , 1984 .

[5]  Alexey N. Nikitkov Information Assurance Seals: How They Impact Consumer Purchasing Behavior , 2006, J. Inf. Syst..

[6]  Michael D. Smith,et al.  Gaining Trust Through Online Privacy Protection: Self-Regulation, Mandatory Standards, or Caveat Emptor , 2007, J. Manag. Inf. Syst..

[7]  A. Kaplan,et al.  Users of the world, unite! The challenges and opportunities of Social Media , 2010 .

[8]  Paola Benassi,et al.  TRUSTe: an online privacy seal program , 1999, CACM.

[9]  Lawrence E. Cohen,et al.  Social Change and Crime Rate Trends: A Routine Activity Approach , 1979 .

[10]  Mary E Duffy,et al.  Methodological issues in Web-based research. , 2002, Journal of nursing scholarship : an official publication of Sigma Theta Tau International Honor Society of Nursing.

[11]  Yoshihisa Kashima,et al.  The acquisition of perceived descriptive norms as social category learning in social networks , 2013, Soc. Networks.

[12]  F. A. Pettit A comparison of World-Wide Web and paper-and-pencil personality questionnaires , 2002, Behavior research methods, instruments, & computers : a journal of the Psychonomic Society, Inc.

[13]  Yong Tan,et al.  Social Networks and the Diffusion of User-Generated Content: Evidence from YouTube , 2012, Inf. Syst. Res..

[14]  Babu P. George,et al.  Risk Perception and Buying Behavior: An Examination of Some Relationships in the Context of Cruise Tourism in Jamaica , 2013 .

[15]  S. Livingstone,et al.  Handbook of new media : social shaping and consequences of ICTs , 2002 .

[16]  John Raacke,et al.  MySpace and Facebook: Applying the Uses and Gratifications Theory to Exploring Friend-Networking Sites , 2008, Cyberpsychology Behav. Soc. Netw..

[17]  S. Michael Handbook in research and evaluation , 1971 .

[18]  Lei Zhou,et al.  The Economic Cost of Publicly Announced Information Security Breaches: Empirical Evidence from the Stock Market , 2003, J. Comput. Secur..

[19]  Bradford W Reyns,et al.  Online Routines and Identity Theft Victimization , 2013 .

[20]  D. Hoffman,et al.  Can You Measure the ROI of Your Social Media Marketing , 2010 .

[21]  John G. Lynch,et al.  Interactive Home Shopping: Consumer, Retailer, and Manufacturer Incentives to Participate in Electronic Marketplaces , 1997 .

[22]  Kai H. Lim,et al.  Web strategies to promote internet shopping: is cultural-customization needed? , 2009 .

[23]  Robert LaRose,et al.  Internet Self-Efficacy and the Psychology of the Digital Divide , 2006, J. Comput. Mediat. Commun..

[24]  A. Khatibi,et al.  Understanding consumers internet purchase intention in Malaysia , 2011 .

[25]  Mary J. Culnan,et al.  How Large U.S. Companies Can Use Twitter and Other Social Media to Gain Business Value , 2010, MIS Q. Executive.

[26]  Stanley Wasserman,et al.  Social Network Analysis: Methods and Applications , 1994 .

[27]  Bruno S. Silvestre,et al.  Social Media? Get Serious! Understanding the Functional Building Blocks of Social Media , 2011 .

[28]  Trevor T. Moores,et al.  Do consumers understand the role of privacy seals in e-commerce? , 2005, CACM.

[29]  P Jennette,et al.  Debatin, Bernhard, Lovejoy, Horn, Ann-Kathrin, and Hughes, Facebook and Online Privacy: Attitudes, Behaviors, and Unintended Consequences. , 2009 .

[30]  Hsin Hsin Chang,et al.  Consumer perception of interface quality, security, and loyalty in electronic commerce , 2009, Inf. Manag..

[31]  France Bélanger,et al.  Trustworthiness in electronic commerce: the role of privacy, security, and site attributes , 2002, J. Strateg. Inf. Syst..

[32]  Dan Jong Kim,et al.  Revisiting the role of web assurance seals in business-to-consumer electronic commerce , 2008, Decis. Support Syst..

[33]  P. Pavlou,et al.  Perceived Information Security, Financial Liability and Consumer Trust in Electronic Commerce Transactions , 2002 .

[34]  S.M. Furnell Considering the security challenges in consumer-oriented eCommerce , 2005, Proceedings of the Fifth IEEE International Symposium on Signal Processing and Information Technology, 2005..

[35]  Alessandro Acquisti,et al.  Gone in 15 Seconds: The Limits of Privacy Transparency and Control , 2013, IEEE Security & Privacy.

[36]  R. LaRose,et al.  Understanding Internet Usage , 2001 .

[37]  Ellen Christiaanse,et al.  Consumer Trust in Electronic Channels: The Impact of Electronic Commerce Assurance on Consumers' Purchasing Likelihood and Risk Perceptions , 2003 .

[38]  Clement Guitton,et al.  Cyber insecurity as a national threat: overreaction from Germany, France and the UK? , 2013 .

[39]  J. Wolak,et al.  Does online harassment constitute bullying? An exploration of online harassment by known peers and online-only contacts. , 2007, The Journal of adolescent health : official publication of the Society for Adolescent Medicine.

[40]  S. Sitkin,et al.  Determinants of Risky Decision-Making Behavior: A Test of the Mediating Role of Risk Perceptions and Propensity , 1995 .

[41]  A. Bandura Social Foundations of Thought and Action: A Social Cognitive Theory , 1985 .

[42]  Vladimir Zwass,et al.  Co-Creation: Toward a Taxonomy and an Integrated Research Perspective , 2010, Int. J. Electron. Commer..

[43]  Sebastiaan H. von Solms,et al.  Information Security - A Multidimensional Discipline , 2001, Comput. Secur..

[44]  M. Haenlein,et al.  Managing Customer Relationships in the Social Media Era: Introducing the Social CRM House , 2013 .

[45]  Anand Kumar,et al.  Web Assurance Seals: How and Why They Influence Consumers' Decisions , 2002, J. Inf. Syst..

[46]  P. Berthon,et al.  E‐readiness and trust: macro and micro dualities for e‐commerce in a global environment , 2008 .

[47]  Ingoo Han,et al.  The Effect of On-Line Consumer Reviews on Consumer Purchasing Intention: The Moderating Role of Involvement , 2007, Int. J. Electron. Commer..

[48]  Kristen LeFevre,et al.  Privacy wizards for social networking sites , 2010, WWW '10.

[49]  Susan Wiedenbeck,et al.  On-line trust: concepts, evolving themes, a model , 2003, Int. J. Hum. Comput. Stud..

[50]  Jeffrey M. Wooldridge,et al.  Solutions Manual and Supplementary Materials for Econometric Analysis of Cross Section and Panel Data , 2003 .

[51]  R. Al-Dwairi E-Commerce Web Sites Trust Factors: An Empirical Approach , 2013 .

[52]  Colin Potts,et al.  Privacy policies as decision-making tools: an evaluation of online privacy notices , 2004, CHI.

[53]  David J. Faulds,et al.  Social media: The new hybrid element of the promotion mix , 2009 .

[54]  Rossouw von Solms,et al.  From information security to cyber security , 2013, Comput. Secur..

[55]  Huseyin Cavusoglu,et al.  The Effect of Internet Security Breach Announcements on Market Value: Capital Market Reactions for Breached Firms and Internet Security Developers , 2004, Int. J. Electron. Commer..

[56]  Alice Hutchings,et al.  Hacking and Fraud: Qualitative Analysis of Online Offending and Victimization , 2013 .

[57]  Irene Pollach,et al.  What's wrong with online privacy policies? , 2007, CACM.

[58]  Eric F. Shaver,et al.  On Trust in the Internet: Belief Cues from Domain Suffixes and Seals of Approval , 2003 .

[59]  Wang Tao,et al.  An empirical study of customers' perceptions of security and trust in e-payment systems , 2010, Electron. Commer. Res. Appl..

[60]  Kacper Gradon Crime Science and the Internet Battlefield: Securing the Analog World from Digital Crime , 2013, IEEE Security & Privacy.

[61]  U. Gretzel,et al.  Role of social media in online travel information search , 2010 .

[62]  Amanda Lenhart,et al.  Adults and social network websites , 2009 .

[63]  Carl A. Kallgren,et al.  A focus theory of normative conduct: Recycling the concept of norms to reduce littering in public places. , 1990 .

[64]  Oliver Schilke,et al.  Strategic development of business models: Implications of the web 2.0 for creating value on the internet , 2010 .

[65]  Kimberly J. Mitchell,et al.  Patterns of Internet Use and Risk of Online Victimization for Youth With and Without Disabilities , 2014 .

[66]  Brian R. Kovar,et al.  Consumer Responses to the CPA WEBTRUST™ Assurance , 2000, J. Inf. Syst..

[67]  Marlien Herselman,et al.  Implementation of regulation-based e-procurement in the Eastern Cape provincial administration , 2010 .

[68]  R. Petty Marketing without Consent: Consumer Choice and Costs, Privacy, and Public Policy , 2000 .

[69]  Tanya S. Benford,et al.  Retraction: The Impact of Electronic Commerce Assurance on Financial Analysts' Earnings Forecasts and Stock Price Estimates , 2000 .

[70]  Eric Beauregard,et al.  Routine Activities and Time Use , 2014, Sexual abuse : a journal of research and treatment.

[71]  T. Makana Chock,et al.  Facebook, the Third-Person Effect, and the Differential Impact Hypothesis , 2014, J. Comput. Mediat. Commun..

[72]  B. Paul,et al.  The Third-Person Effect: A Meta-Analysis of the Perceptual Hypothesis , 2000 .

[73]  Sejung Marina Choi,et al.  Your Privacy Is Sealed: Effects of Web Privacy Seals on Trust and Personal Disclosures , 2005 .

[74]  William Sims Bainbridge Cyberspace: Sociology's Natural Domain , 1999 .

[75]  Stuart J. Barnes,et al.  Initial trust and online buyer behaviour , 2007, Ind. Manag. Data Syst..

[76]  Tom L. Roberts,et al.  Proposing the online community self-disclosure model: the case of working professionals in France and the U.K. who use online communities , 2010, Eur. J. Inf. Syst..

[77]  T. Holt,et al.  Examining the Applicability of Lifestyle-Routine Activities Theory for Cybercrime Victimization , 2008 .

[78]  Amitava Dutta,et al.  Management's Role in Information Security in a Cyber Economy , 2002 .

[79]  Kathryn M. Kimery,et al.  Signals of Trustworthiness in E-Commerce: Consumer Understanding of Third-Party Assurance Seals , 2006, J. Electron. Commer. Organ..

[80]  Guohua Wu,et al.  The effects of Web assurance seals on consumers' initial trust in an online vendor: A functional perspective , 2010, Decis. Support Syst..

[81]  Kin Fai Ellick Wong The role of risk in making decisions under escalation situations , 2005 .

[82]  Elaine G. Mauldin,et al.  An Experimental Examination of Alternative Forms of Web Assurance for Business-to-Consumer e-Commerce , 2002, J. Inf. Syst..

[83]  Tran Khanh Dang,et al.  A survey on security visualization techniques for web information systems , 2013, Int. J. Web Inf. Syst..

[84]  A. Rubin Ritualized and Instrumental Television Viewing , 1984 .

[85]  Framarz Byramjee,et al.  A REVIEW OF THE ROLE OF CONSUMERS TRANSACTION COSTS IN THE TRADITIONAL AND ONLINE SHOPPING ENVIRONMENTS , 2013 .

[86]  O. A. Sawy,et al.  Digital business strategy: toward a next generation of insights , 2013 .

[87]  Mary J. Culnan,et al.  Strategies for reducing online privacy risks: Why consumers read (or don't read) online privacy notices , 2004 .

[88]  David R. Brake,et al.  ON THE RAPID RISE OF SOCIAL NETWORKING SITES: NEW FINDINGS AND POLICY IMPLICATIONS , 2010 .

[89]  Nick Couldry,et al.  Media Rituals: A Critical Approach , 2003 .

[90]  Z. Pan,et al.  Understanding the Third‐Person Perception: Evidence From a Meta‐Analysis , 2008 .

[91]  Chun-Ming Chang,et al.  Knowledge sharing behavior in virtual communities: The relationship between trust, self-efficacy, and outcome expectations , 2007, Int. J. Hum. Comput. Stud..

[92]  Yohko Orito,et al.  Do online privacy policies and seals affect corporate trustworthiness and reputation , 2013 .

[93]  Johan van Wilsem,et al.  ‘Bought it, but Never Got it’ Assessing Risk Factors for Online Consumer Fraud Victimization , 2013 .

[94]  Dhavan V. Shah,et al.  FOR THE GOOD OF OTHERS: CENSORSHIP AND THE THIRD-PERSON EFFECT , 1996 .

[95]  Douglas E. Hughes This ad’s for you: the indirect effect of advertising perceptions on salesperson effort and performance , 2013 .

[96]  Huaping Chen,et al.  Credibility of Electronic Word-of-Mouth: Informational and Normative Determinants of On-line Consumer Recommendations , 2009, Int. J. Electron. Commer..

[97]  Tom W. Smith,et al.  Survey-Research Paradigms Old and New , 2013 .

[98]  S. Kiesler,et al.  SELF-SELECTED AND RANDOMLY SELECTED RESPONDENTS IN A COMPUTER NETWORK SURVEY , 1992 .

[99]  Chang Liu,et al.  Beyond concern - a privacy-trust-behavioral intention model of electronic commerce , 2004, Inf. Manag..

[100]  Hamid Reza Peikari,et al.  Does Nationality Matter in the B2C Environment? Results from a Two Nation Study , 2010, ICGS3.

[101]  Robert E. Kraut,et al.  Editorial Overview - The Interplay Between Digital and Social Networks , 2008, Inf. Syst. Res..

[102]  Hans-Bernd Brosius,et al.  THE CAUSES OF THIRD-PERSON EFFECTS: UNREALISTIC OPTIMISM, IMPERSONAL IMPACT, OR GENERALIZED NEGATIVE ATTITUDES TOWARDS MEDIA INFLUENCE? , 1996 .

[103]  James E. Rauch Business and Social Networks in International Trade , 2001 .

[104]  Koen Pauwels,et al.  Social Media Metrics — A Framework and Guidelines for Managing Social Media , 2013 .

[105]  R. V. Krejcie,et al.  Determining Sample Size for Research Activities , 1970 .

[106]  A. Bandura Social learning theory , 1977 .

[107]  Danah Boyd,et al.  Social Network Sites: Definition, History, and Scholarship , 2007, J. Comput. Mediat. Commun..

[108]  D. Hoffman,et al.  Toward a Deeper Understanding of Social Media , 2012 .

[109]  Dong-Hee Shin,et al.  The effects of trust, security and privacy in social networking: A security-based approach to understand the pattern of adoption , 2010, Interact. Comput..

[110]  R. Kozinets E-tribalized Marketing?: The Strategic Implications of Virtual Communities of Consumption , 1999 .

[111]  Debi Ashenden,et al.  Designing Usable Online Privacy Mechanisms: What Can We Learn from Real World Behaviour? , 2010, PrimeLife.

[112]  James Backhouse,et al.  Current directions in IS security research: towards socio‐organizational perspectives , 2001, Inf. Syst. J..

[113]  Dhruv Grewal,et al.  Understanding social media effects across seller, retailer, and consumer interactions , 2013, Journal of the Academy of Marketing Science.

[114]  S. Gosling,et al.  Should we trust web-based studies? A comparative analysis of six preconceptions about internet questionnaires. , 2004, The American psychologist.

[115]  Anthony D. Miyazaki,et al.  Consumer Perceptions of Privacy and Security Risks for Online Shopping , 2001 .

[116]  C. B. Bhutta Not by the Book Facebook as a Sampling Frame , 2012 .

[117]  Bernhard Debatin,et al.  Facebook and Online Privacy: Attitudes, Behaviors, and Unintended Consequences , 2009, J. Comput. Mediat. Commun..

[118]  M. Couper A REVIEW OF ISSUES AND APPROACHES , 2000 .

[119]  David Godes,et al.  Introduction to the Special Issue - Social Media and Business Transformation: A Framework for Research , 2013, Inf. Syst. Res..