Information privacy, consumer alienation, and lurking behavior in social networking sites

Abstract This study investigates the relationships among information security awareness, concern for information privacy, consumer alienation, privacy risk belief, lurking, and self-concealment. It explores the mediation effects of concern for information privacy/consumer alienation between information security awareness and privacy risk belief as well as the mediation effect of lurking between privacy risk belief and self-concealment. The results confirm that information security awareness has significant and positive effects on concern for information privacy, consumer alienation, and privacy risk belief. Concerns for information privacy and consumer alienation have significant and positive effects on privacy risk belief. Privacy risk belief has a significant and positive effect on lurking and self-concealment. Lurking has a significant and positive effect on self-concealment. Concerns for information privacy and consumer alienation are mediators between information security awareness and privacy risk belief. In addition, perceived privacy empowerment is a moderator between privacy risk belief and lurking as well as between privacy risk belief and self-concealment.

[1]  H. Jeff Smith,et al.  Information Privacy: Measuring Individuals' Concerns About Organizational Practices , 1996, MIS Q..

[2]  S. Bikhchandani,et al.  Herd Behavior in Financial Markets , 2000, IMF Staff Papers.

[3]  Robert G. Capra,et al.  Factors mediating disclosure in social network sites , 2011, Comput. Hum. Behav..

[4]  Richard D. Johnson,et al.  Concern for Information Privacy and Online Consumer Purchasing , 2006, J. Assoc. Inf. Syst..

[5]  Rossouw von Solms,et al.  Information security management: why standards are important , 1999, Inf. Manag. Comput. Secur..

[6]  Jennifer L. Bevan,et al.  Negative emotional and cognitive responses to being unfriended on Facebook: An exploratory study , 2012, Comput. Hum. Behav..

[7]  Peter H. Gray,et al.  Social Influence and Knowledge Management Systems Use: Evidence from Panel Data , 2013, MIS Q..

[8]  Barry Wellman,et al.  Net-Surfers Don’t Ride Alone: Virtual Communities as Communities , 2018, Networks in the Global Village.

[9]  Etienne Wenger,et al.  Situated Learning: Legitimate Peripheral Participation , 1991 .

[10]  Varun Grover,et al.  A model of consumers' perceptions of the invasion of information privacy , 2013, Inf. Manag..

[11]  J. Hair Multivariate data analysis , 1972 .

[12]  V. Derlega,et al.  The Cambridge Handbook of Personal Relationships: Self-Disclosure in Personal Relationships , 2006 .

[13]  C. Ogan,et al.  The Internet as Mass Medium , 1996, J. Comput. Mediat. Commun..

[14]  Mikko T. Siponen,et al.  A conceptual foundation for organizational information security awareness , 2000, Inf. Manag. Comput. Secur..

[15]  I. Ajzen,et al.  Predicting and Changing Behavior: The Reasoned Action Approach , 2009 .

[16]  Fei-Ching Chen Passive Forum Behaviors (Lurking): A Community Perspective , 2004, ICLS.

[17]  Scott B. MacKenzie,et al.  Common method biases in behavioral research: a critical review of the literature and recommended remedies. , 2003, The Journal of applied psychology.

[18]  Sibren Fetter,et al.  Lurking: a challenge or a fruitful strategy? A comparison between lurkers and active participants in an online corporate community of practice , 2010, Int. J. Knowl. Learn..

[19]  Christine Moser,et al.  Categorizing Behavior in Online Communities: A Look Into the World of Cake Bakers , 2012, 2012 45th Hawaii International Conference on System Sciences.

[20]  R. Bies,et al.  Consumer Privacy: Balancing Economic and Justice Considerations , 2003 .

[21]  Chris Moore,et al.  Sharing music files: Tactics of a challenge to the industry , 2010, First Monday.

[22]  Tao Zhou,et al.  Understanding mobile SNS continuance usage in China from the perspectives of social influence and privacy concern , 2014, Comput. Hum. Behav..

[23]  Varun Grover,et al.  Investigating online information disclosure: Effects of information relevance, trust and risk , 2010, Inf. Manag..

[24]  Robert D. Latzman,et al.  Psychological flexibility and self-concealment as predictors of disordered eating symptoms , 2012 .

[25]  A. Joinson,et al.  Development of measures of online privacy concern and protection for use on the Internet , 2007, J. Assoc. Inf. Sci. Technol..

[26]  Lawrence R. Wheeless,et al.  Conceptualization and Measurement of Reported Self-Disclosure. , 1976 .

[27]  R. Middleton Alienation, Race, and Education , 1963 .

[28]  Babajide Osatuyi,et al.  Is lurking an anxiety-masking strategy on social media sites? The effects of lurking and computer anxiety on explaining information privacy concern on social media platforms , 2015, Comput. Hum. Behav..

[29]  Izak Benbasat,et al.  Information Security Policy Compliance: An Empirical Study of Rationality-Based Beliefs and Information Security Awareness , 2010, MIS Q..

[30]  Charles J. Kacmar,et al.  The impact of initial consumer trust on intentions to transact with a web site: a trust building model , 2002, J. Strateg. Inf. Syst..

[31]  P. Kollock,et al.  Managing the virtual commons : Cooperation and conflict in computer communities , 1996 .

[32]  Heshan Sun,et al.  A Longitudinal Study of Herd Behavior in the Adoption and Continued Use of Technology , 2013, MIS Q..

[33]  Thomas J. Johnson,et al.  MySpace is your space? Examining self-presentation of MySpace users , 2010, Comput. Hum. Behav..

[34]  M. Fishbein A Reasoned Action Approach to Health Promotion , 2008, Medical decision making : an international journal of the Society for Medical Decision Making.

[35]  C. Fornell,et al.  Evaluating structural equation models with unobservable variables and measurement error. , 1981 .

[36]  D. Moscovitch What Is the Core Fear in Social Phobia? A New Model to Facilitate Individualized Case Conceptualization and Treatment. , 2009 .

[37]  Lawrence R. Wheeless A Follow-up Study of the Relationships among Trust, Disclosure, and Interpersonal Solidarity , 1978 .

[38]  Oliver Günther,et al.  Privacy in e-commerce: stated preferences vs. actual behavior , 2005, CACM.

[39]  Shih-Ming Pi,et al.  A study of Facebook Groups members' knowledge sharing , 2013, Comput. Hum. Behav..

[40]  B. Nonnecke,et al.  WHY LURKERS LURK , 2001 .

[41]  M. Sobel Asymptotic Confidence Intervals for Indirect Effects in Structural Equation Models , 1982 .

[42]  Edna B. Johnson Cognitive Age: Understanding Consumer Alienation in the Mature Market , 1996 .

[43]  I. Ajzen The theory of planned behavior , 1991 .

[44]  Marko Hölbl,et al.  Privacy antecedents for SNS self-disclosure: The case of Facebook , 2015, Comput. Hum. Behav..

[45]  Hal G. Gueutal,et al.  A Field Experiment Comparing Information-Privacy Values, Beliefs, and Attitudes Across Several Types of Organizations , 1983 .

[46]  Younghwa Lee,et al.  Threat or coping appraisal: determinants of SMB executives’ decision to adopt anti-malware software , 2009, Eur. J. Inf. Syst..

[47]  Yuan Li,et al.  A multi-level model of individual information privacy beliefs , 2014, Electron. Commer. Res. Appl..

[48]  R. L. Chastain,et al.  Self-Concealment: Conceptualization, Measurement, and Health Implications , 1990 .

[49]  P. M. Podsakoff,et al.  Self-Reports in Organizational Research: Problems and Prospects , 1986 .

[50]  Hamid R. Nemati,et al.  The Effect of Consumer Privacy Empowerment on Trust and Privacy Concerns in E-Commerce , 2007, Electron. Mark..

[51]  I. Ajzen,et al.  Belief, Attitude, Intention, and Behavior: An Introduction to Theory and Research , 1977 .

[52]  Etienne Wenger,et al.  Communities of Practice: Learning, Meaning, and Identity , 1998 .

[53]  Vanessa Paz Dennen,et al.  Pedagogical lurking: Student engagement in non-posting discussion behavior , 2008, Comput. Hum. Behav..

[54]  I. Altman Privacy Regulation: Culturally Universal or Culturally Specific? , 1977 .

[55]  Miriam J. Metzger Privacy, Trust, and Disclosure: Exploring Barriers to Electronic Commerce , 2006, J. Comput. Mediat. Commun..

[56]  Neil S. Coulson,et al.  Empowering processes in online support groups among people living with HIV/AIDS: A comparative analysis of 'lurkers' and 'posters' , 2010, Comput. Hum. Behav..

[57]  Howard Rheingold,et al.  The Virtual Community: Homesteading on the Electronic Frontier , 2000 .

[58]  Gustavo S. Mesch Is online trust and trust in social institutions associated with online disclosure of identifiable information online? , 2012, Comput. Hum. Behav..

[59]  Neil K. Allison A Psychometric Development of a Test for Consumer Alienation from the Marketplace , 1978 .

[60]  A. Cepeda-Benito,et al.  Self-Concealment, Avoidance of Psychological Services, and Perceived Likelihood of Seeking Professional Help. , 1998 .

[61]  Naresh K. Malhotra,et al.  Internet Users' Information Privacy Concerns (IUIPC): The Construct, the Scale, and a Causal Model , 2004, Inf. Syst. Res..

[62]  M. Seeman On The Meaning of Alienation , 1959 .

[63]  R. Tibshirani,et al.  An introduction to the bootstrap , 1993 .

[64]  Jennifer Preece,et al.  Non-public and public online community participation: Needs, attitudes and behavior , 2006, Electron. Commer. Res..

[65]  Tamara Dinev,et al.  An Extended Privacy Calculus Model for E-Commerce Transactions , 2006, Inf. Syst. Res..

[66]  Pei-Luen Patrick Rau,et al.  Understanding lurkers in online communities: A literature review , 2014, Comput. Hum. Behav..

[67]  R. Bagozzi,et al.  On the evaluation of structural equation models , 1988 .

[68]  Z. V. Lambert,et al.  Profiling demographic characteristics of alienated consumers , 1981 .

[69]  Eirik Albrechtsen,et al.  Improving information security awareness and behaviour through dialogue, participation and collective reflection. An intervention study , 2010, Comput. Secur..

[70]  Albert H. Segars,et al.  An Empirical Examination of the Concern for Information Privacy Instrument , 2002, Inf. Syst. Res..

[71]  Henry O. Pruden,et al.  Alienation from the marketplace , 1977 .

[72]  Jonathan Bishop,et al.  Increasing participation in online communities: A framework for human-computer interaction , 2007, Comput. Hum. Behav..

[73]  Nicholas David Bowman,et al.  Two faces of narcissism on SNS: The distinct effects of vulnerable and grandiose narcissism on SNS privacy control , 2015, Comput. Hum. Behav..

[74]  Baiyun Chen,et al.  Students' self-presentation on Facebook: An examination of personality and self-construal factors , 2012, Comput. Hum. Behav..

[75]  E. B. Andersen,et al.  Modern factor analysis , 1961 .

[76]  F. Kelly Shuptrine,et al.  A measure of alienation from the marketplace , 1974 .

[77]  Alexander Brem,et al.  Do privacy concerns matter for Millennials? Results from an empirical analysis of Location-Based Services adoption in Germany , 2015, Comput. Hum. Behav..

[78]  Rathindra Sarathy,et al.  The role of affect and cognition on online consumers' decision to disclose personal information to unfamiliar online vendors , 2011, Decis. Support Syst..

[79]  I. Nonaka,et al.  SECI, Ba and Leadership: a Unified Model of Dynamic Knowledge Creation , 2000 .

[80]  Mary J. Culnan,et al.  Strategies for reducing online privacy risks: Why consumers read (or don't read) online privacy notices , 2004 .

[81]  John Hulland,et al.  Use of partial least squares (PLS) in strategic management research: a review of four recent studies , 1999 .

[82]  Emily Christofides,et al.  Information Disclosure and Control on Facebook: Are They Two Sides of the Same Coin or Two Different Processes? , 2009, Cyberpsychology Behav. Soc. Netw..

[83]  Danah Boyd,et al.  Facebook privacy settings: Who cares? , 2010, First Monday.

[84]  Alexandra J. Campbell Relationship marketing in consumer markets , 1997 .

[85]  H. Kelman Compliance, identification, and internalization three processes of attitude change , 1958 .

[86]  Anne Beaudry,et al.  The Other Side of Acceptance: Studying the Direct and Indirect Effects of Emotions on Information Technology Use , 2010, MIS Q..

[87]  Tarek Mady,et al.  Sentiment toward marketing: Should we care about consumer alienation and readiness to use technology? , 2011 .