ONLINE social networking (OSN) is an information technology

Size: px
Start display at page:

Download "ONLINE social networking (OSN) is an information technology"

Transcription

1 654 IEEE TRANSACTIONS ON ENGINEERING MANAGEMENT, VOL. 59, NO. 4, NOVEMBER 2012 The Moderating Effects of Privacy Restrictiveness and Experience on Trusting Beliefs and Habit: An Empirical Test of Intention to Continue Using a Social Networking Website Nancy K. Lankton, D. Harrison McKnight, and Jason Bennett Thatcher Abstract While some online social networking (OSN) websites, such as Facebook, have reported sustained growth, others, such as Bebo, have not. This study investigates the factors that influence users intentions to continue using these websites. We adapt the theory of reasoned action and develop a model depicting how trusting beliefs, habit, attitude, and subjective norm lead to continuance intention. We propose that trusting beliefs and habit will have differential effects depending on the levels of privacy restrictiveness and site experience. An analysis of data collected from Facebook users shows that the effects of trusting beliefs on continuance intention diminish as OSN users become more experienced, yet, do not diminish when users set privacy controls high. The latter finding contradicts theory positing control and trusting beliefs are substitutes. The finding that the trusting belief-continuance intention relationship is not significant when experience is high demonstrates that trusting beliefs and experience interact. We also show that habit is a stronger predictor when users restrict their personal information. However, contrary to predictions, habit shapes intention among users with both high and low experience. These findings explain how habit and trusting beliefs predict continuance intention in the new OSN environment and have both practical and research implications. Index Terms Continuance intention, habit, privacy restrictiveness, social networking, trust. I. INTRODUCTION ONLINE social networking (OSN) is an information technology (IT) phenomenon that is experiencing meteoric growth. One major OSN website, Facebook.com, started in 2004 and grew to over 400 million active accounts worldwide as of June 2010 [1]. Also, a recent study reports that 46% of online users in the U.S. use OSN sites like Facebook or MySpace, and that four in ten people from other countries such as Great Manuscript received July 3, 2010; revised January 26, 2011, July 13, 2011, and October 26, 2011; accepted November 27, Date of publication January 18, 2012; date of current version October 16, Review of this manuscript was arranged by Department Editor T. Ravichandran. N. K. Lankton is with the College of Business, Marshall University, Huntington, WV USA ( nancyledu@yahoo.com). D. H. McKnight is with the Accounting and Information Systems, Michigan State University, East Lansing, MI USA ( mcknight@bus.msu. edu). J. B. Thatcher is with the Department of Management, Clemson University, Clemson, SC USA ( jthatch@clemson.edu). Digital Object Identifier /TEM Britain and South Korea use OSN websites [2]. These statistics suggest that OSN website use is a growing, pervasive, and global phenomenon. OSN sites are popular because they allow individuals to exchange digital information such as pictures, videos, and text. These sites enable people to stay in touch with friends, family, and people with common interests [3]. Individuals can: 1) construct a public or restricted profile; 2) create a list of those to whom they are connected; and 3) view and traverse their own and others connections [4, p. 211]. Some OSN sites also have programming interfaces that individuals can use to create applications [3]. Given OSN s tremendous growth and functionality, businesses can benefit by understanding why individuals develop intentions to continue using these websites. For example, by understanding continuance intention, service providers can become more efficient at providing networking services as the customer base increases, thereby achieving economies of scale [3]. Also, by understanding continuance intention other businesses can enhance online advertising, target specific demographics, and disseminate information and news. These actions can help businesses better attract customers and market products. Even if initially successful, continued OSN growth is not assured, with recent figures showing fluctuations in Facebook use [5] and shrinking growth for MySpace [6], [7]. In fact, some OSN sites, such as Friendster, have not experienced sustained growth [6]. Others, such as Bebo, have shrunk. When individuals abandon OSN websites, provider firms can lose revenue and experience declines in value. For example, AOL recently sold Bebo for a huge loss [8]. Because discontinuance happens, and it can be costly to providers, understanding individuals OSN continuance intention is important Hence, this paper examines factors that influence OSN continuance intention. Because to date research has a limited understanding of why individuals use OSN websites [4], we advance a theory of reasoned action (TRA)-based research model. It focuses on attitude (feelings of favorableness toward the behavior) and subjective norm (perceptions that most important others think one should perform the behavior) [9], in addition to trusting beliefs and habit, which are two salient continuance predictors. Trusting beliefs in the OSN website are beliefs that the website possesses three desirable attributes: integrity, /$ IEEE

2 LANKTON et al.: MODERATING EFFECTS OF PRIVACY RESTRICTIVENESS AND EXPERIENCE 655 competence, and benevolence [10], [11]. 1 Trusting beliefs are important to study because OSN websites involve security and privacy risks and trusting beliefs can help reduce these perceived risks. We also examine IT habit, which is defined as peoples tendency to use IT automatically because of learning [14, p. 705]. Habit is important in an OSN context because many people use websites, such as Facebook, on a daily basis. Habit s influence on OSN continuance intention remains an unresolved research question, with researchers calling for habit s inclusion in future OSN research [15]. Our model adds value to the OSN literature by being the first to examine how privacy restrictiveness and site experience moderate the effects of trusting beliefs and habit on OSN continuance intention. Privacy restrictiveness refers to a privacy control behavior that involves using vendor-provided privacy settings to restrict access to one s personal information. Site experience refers to the frequency and length of past OSN website usage. We address the question: Do privacy restrictiveness and site experience levels alter how well trusting beliefs and habit predict Facebook usage continuance intention? Moderators are important to study because they address organizational, individual, and technological contexts [16], and can also help identify a model s boundary conditions [14]. Although Benbasat and Barki [17] urged researchers to examine moderators to illuminate IT use, relatively little trust and habit research has done this (some exceptions include [18], [19]). II. BACKGROUND AND RESEARCH HYPOTHESES We use TRA, a generalized model for predicting and explaining behavior, as the theoretical basis for our study [9]. In TRA, behavior is predicted by intention, which in turn is predicted by attitude and subjective norm. TRA forms the basis for many important IT models that have advanced understanding of IT intention and use including the Technology Acceptance Model [20] and the Unified Theory of Acceptance and Use of Technology [21]. TRA was recently used to predict the intention to use OSN sites [22]. This research s objective is not to test TRA per se, but instead to leverage TRA to advance our knowledge of continuance intention s predictors. Therefore, while we include attitude and subjective norm as antecedents to usage continuance intention, our study adds value by supplementing TRA with two additional predictors of OSN continuance intention (trusting beliefs and habit) and two moderators (privacy restrictiveness and site experience) (see Fig. 1). A. Attitude and Subjective Norm Consistent with TRA, we predict that attitude toward continuing to use the OSN website will influence continuance intention. Attitude is an evaluative or affect variable that predisposes one 1 In this study, we examine trusting beliefs [12], which are sometimes called factors of trustworthiness [10, p. 717]. We do not study trusting intention or trusting attitude (often called trust ), which is the willingness to depend on or be vulnerable to the other party [10], [11]. We use the term trust as a generic term that is used to refer to either a combination or subset of trusting intention and trusting beliefs [13]. Fig. 1. Research model. to the behavior. All else being equal, people will intend to perform a behavior if they have a positive affect toward it. In IT research, evidence is mixed on attitude s influence on intentions, partly because in some contexts it encompasses the beliefs that form it [12], [21]. However, it may be especially relevant in voluntary use contexts [21] and has recently been found to predict intention to use OSN websites [22]. H1: Attitude toward using the website will have a positive influence on usage continuance intention. Subjective norm s influence on intention represents a compliance effect in which individuals intend to use a website because they desire to strengthen relationships with others or at least avoid being rejected [21], [23]. Therefore, if an individual feels that important others think he/she should use a technology, he/she will be more likely to intend to use it regardless of other feelings and beliefs [20]. Others can include coworkers, family, friends, or peers. IT researchers find that subjective norm s relationship with intention is complex and may be contingent on a variety of factors that are beyond this research s scope [20], [21]. However, we believe that one s OSN continuance intention may be influenced by one s friends wanting one to use the site. Further, empirical work finds that subjective norm influences intentions for other online and web-related activities [24] [26]. H2: Subjective norm will have a positive influence on usage continuance intention. B. Trusting Beliefs and Habit While TRA predicts that beliefs influence intention through attitude, we follow previous research and predict that trusting beliefs will have a direct influence on continuance intention [18]. Trusting beliefs can encourage behavioral intention because they reduce complexity in social interactions by overriding beliefs that the trustee will behave in an opportunistic manner [18].

3 656 IEEE TRANSACTIONS ON ENGINEERING MANAGEMENT, VOL. 59, NO. 4, NOVEMBER 2012 In this way, trusting beliefs act as an evaluative mechanism that can help one deal with risk. OSN websites present privacy and security risks that can leave one vulnerable to reputation loss, identity theft, and even bodily harm. Hence, believing that the OSN website has desirable attributes can reduce one s felt risks and increase one s continuance intention. Prior research finding trusting beliefs influence intention to use e-commerce, interorganizational exchange, and OSN websites supports this prediction [3], [18], [27]. H3: Trusting beliefs will have a positive influence on usage continuance intention. Habit has been included in TRA-based use continuance models to account for IT-use behaviors that have become automatic [14], [28]. Habitual behavior does not require deliberate processing and instead results from nondeliberate (i.e., automatic) processing of stimulus cues [29]. For example, a person may stop for coffee every day on the way to work. Soon the individual may behave this way automatically just because they are going to work rather than because they have deliberately decided to stop. Habit theory supports a habit continuance intention relationship because habits can automatically trigger intention [29], [30], and previous habitual activities can create favorable feelings toward the behavior thereby increasing continuance intention [28], [31], [32]. Habit applies well to OSN use behavior and intention. Researchers find that college students Internet use is habitual [14]. Also, most Facebook users provide above-the-mean responses to habit questions like Facebook is part of my everyday activity and Facebook has become a part of my daily routine [33]. Researchers find that 60% of MySpace users and 55% of Facebook users access the site daily [34]. Since many OSN users behaviors may be habitual, we make habit a predictor of continuance intention. H4: Habit will have a positive influence on usage continuance intention. C. Privacy Restrictiveness Moderator Individuals have privacy to the extent that others have limited access to their information [35]. Privacy research has largely focused on individual concern for protecting personal information in response to organizations privacy practices [36]. For example, individuals may be concerned about firms collecting their personal information and using it for unauthorized purposes [37] [39]. While privacy concerns have long existed, the Web has exacerbated them by making it easier for data to be collected and shared [40]. Privacy concerns about OSN sites exist because unless users take action to restrict access to their profiles, anyone can view their postings, such as their real name, current address, and date of birth. OSN sites like Facebook allow users to restrict access both by who can see it (e.g., friends only) and by specific information type (e.g., date or year of birth). OSN website users tradeoff disclosing enough information to meet peers with similar interests against keeping themselves safe from unwanted attention [41]. OSN users appear to be aware of both the privacy issues and the option to restrict access. For example, one study finds that 69% of respondents thought strangers had looked at their Facebook profile [42], and another study finds that 66% of users limit profile access in some way [41]. Hence, privacy is a concern for OSN users. Two theoretical bases explain how, and why, people control personal information. First, the power-responsibility model posits that if firms have more power and are less responsible, consumers will take defensive actions [40]. Using this model, researchers find that consumers have greater privacy concerns and engage in more privacy control behaviors when they feel firms do not keep their information private [36], [40]. Second, the privacy calculus model posits that individuals are willing to expose themselves to some privacy loss as long as disclosing the information pays back [43]. Researchers empirically find that individual costs and benefits influence disclosure [38], [43]. 1) Trusting Beliefs and Privacy Restrictiveness: Research demonstrates that trusting beliefs influence privacy restrictiveness behavior. For example, the privacy calculus model supports the notion that, in general, individuals who have higher trusting beliefs are more willing to disclose information for e-commerce and OSN transactions [38], [43], [44]. This is because trusting beliefs can outweigh privacy concerns about disclosing information online. If individuals perceive the website is trustworthy, they will disclose information despite concern that the website may act opportunistically with their information. Without trusting beliefs, one might not disclose information due to privacy concerns [43]. Our study expands on this literature by examining whether the trusting belief continuance intention relationship is stronger or weaker once an individual becomes vulnerable by disclosing personal information. Trust theory discusses that trusting beliefs and control are substitutes because trusting beliefs allow people to psychologically feel they can control a situation [13], [45]. Control mechanisms to limit and monitor the other party s behavior are not needed in high-trust relationships, but are needed in low-trust relationships [46]. In our study, when individuals have disclosed information, they may feel they have less control over who can see and use their personal information, which leaves them more open to privacy violations and other opportunistic behaviors. This can make their trusting beliefs an important influence on their continuance intention. Trusting beliefs can help them set aside their fears related to these risks. However, if individuals restrict information, they may perceive more control over who can see and use their personal information, and thus, trusting beliefs will not be as important to their continuance intention decision. H5: Privacy restrictiveness will moderate the relationship between trusting beliefs and usage continuance intention, such that with high privacy restrictiveness, trusting beliefs will have a smaller positive influence on usage continuance intention than with low privacy restrictiveness. 2) Habit and Privacy Restrictiveness: To predict how restrictiveness will affect the habit continuance intention relation, we use the theoretical model of perceived control processes that describes how different levels of perceived control affect

4 LANKTON et al.: MODERATING EFFECTS OF PRIVACY RESTRICTIVENESS AND EXPERIENCE 657 automatic and deliberate processing [47]. 2 Deliberate processing means thoughtfully evaluating beliefs to form intentions. Individuals who perceive a gap between their control and the control that is necessary for a behavior will be motivated to engage in deliberate processing. Individuals who possess the control they need to perform a behavior are more likely to form intentions through a nondeliberate or automatic process. We apply this model to OSN and privacy restrictiveness. Individuals with high privacy restrictiveness behaviors may feel they have more control over using the website because they have fewer impediments to using the site (i.e., less concern about information privacy). They will have a smaller gap between the control they possess and the control they need to safely use the site, which will make habit s influence on continuance intention stronger. Individuals with less privacy restrictiveness will have a bigger gap between perceived and actual control, which will require more deliberate processing and make habit s influence on continuance intention weaker. H6: Privacy restrictiveness will moderate the relationship between habit and usage continuance intention, such that with high privacy restrictiveness, habit will have a larger positive influence on usage continuance intention than with low privacy restrictiveness. D. Site Experience Moderator Experience is gained by engaging in behaviors and seeing the consequences. Researchers generally agree that experience provides feedback that may change one s subsequent evaluations and beliefs about the behavior [28], [49]. Experience can also moderate (i.e., strengthen or weaken) various relationships in IT use models [21]. The moderating effect may depend on the other constructs in the model with some perceptions replacing others after one gains experience [18]. Little research to date has examined how experience affects OSN continuance intention. Initial work finds differences between OSN website users and nonusers [50]. Other work finds OSN use has moderating effects on self-esteem and life satisfaction [34]. These studies suggest OSN site experience may also moderate the factors that influence continuance intention. 1) Trusting Beliefs and Site Experience: Trust theory proposes that trusting belief levels increase with positive experiences because repeat interaction enhances each party s ability to predict the other s behavior [46]. Researchers find that antecedents like site experience are significant predictors of trusting beliefs [18]. However, we know less about how experience might alter the influence of trusting beliefs on continuance intention. To understand this moderating effect, we use research that examines how the influence of trusting beliefs on attitudes and behaviors in organizations differs based on a relationship s am- 2 Perceived control from the theoretical model of perceived control processes is the same construct used in the Theory of Planned Behavior (TPB) [48] and refers to the perception that one possesses the personal resources, and is free from impediments, to perform a particular behavior [47]. While TPB explains that perceived control influences intention, the theoretical model of perceived control processes explains the type of processing (deliberate or automatic) that will occur when individuals have more/less control, making it useful for explaining the moderating effects of habit and privacy restrictiveness. biguity [51]. If cues that indicate one should behave in a particular manner are ambiguous, trusting beliefs will play a larger role in influencing attitudes and behaviors. One will rely on the trustworthiness of the other to guide behavior. If cues become stronger and more certain (i.e., less ambiguous), they will have a greater effect on attitudes and behavior and trusting beliefs will play a lesser role. Researchers suggest that experience is a cue that can reduce ambiguity [52]. Thus, it should reduce the impact of trusting beliefs on continuance intention. Holmes also reasons that the influence of trusting beliefs will decline with experience [45]. He suggests that as experience with another party increases, people become less concerned about security and risk issues. High experience individuals have confidence in the other s attachment to the relationship and have little need to monitor behavior for signs of trustworthiness. Trusting beliefs may have a weaker influence on behavioral intentions within these relationships. Empirical research shows how experience modifies the influence of trusting beliefs on intention. Zhang [19] finds that the influence of trust-promoting seals (that indicate the other s trustworthiness) on intention to buy is stronger for inexperienced than for experienced consumers. Gefen et al. [18] reports that the influence of trusting beliefs in a website on intentions to transact is higher for potential than for repeat customers. These studies imply that trusting beliefs are more influential for the inexperienced, than for the experienced, OSN user. H7: Site experience will moderate the relationship between trusting beliefs and usage continuance intention, such that with high site experience, trusting beliefs will have a smaller positive influence on usage continuance intention than with low site experience. 2) Habit and Site Experience: Experience s moderating role on the habit continuance intention relationship tells us under what conditions habit has a stronger influence. While prior research shows that experience has a direct influence on habit [14], no research to date examines the moderating effect. Dualprocess theories (see, e.g., [53]) from cognitive and social psychology provide the basis for evaluating this effect. These theories generally posit that automatic processing becomes stronger when an individual has more experience with the stimuli. For example, information processing theory assumes that considerable and consistent experience is a necessary condition for automatic processes [53]. Further, automatic processing is based on well-learned associations that have been built up over time [54]. Other dual process research including Devine s work on stereotyping and prejudice [55], Fazio s work on attitude and attitude change [56], and Sloman s work on reasoning [57] supports the notion that the association between a stimulus and behavior that is necessary to produce habitual behavior is strengthened by experience. Experience can thus act as a moderator or suppressor variable, such that when it is present (i.e., individuals have more experience), habit will be better formed and better able to exert a strong influence on continuance intention. When experience is not present (i.e., individuals have less experience), habit will be ill-formed, thereby exerting less influence on continuance intention.

5 658 IEEE TRANSACTIONS ON ENGINEERING MANAGEMENT, VOL. 59, NO. 4, NOVEMBER 2012 Habit may also have a stronger influence on continuance intention when experience is higher because more prior experience can lead to more situational stability and satisfactory outcomes, which can lead to stronger habits. Individuals with less experience may perceive more risks and uncertainties that make the context seem less stable or unsatisfactory [58]. Thus, habit should weakly predict continuance intention at first. As experience with the site increases and uncertainty and risk decrease, the context will be perceived as more stable and satisfactory. Together these factors should make habit a stronger predictor of continuance intention for those with more experience. H8: Site experience will moderate the relationship between habit and usage continuance intention, such that with high site experience, habit will have a larger positive influence on usage continuance intention than with low site experience. E. Control Variables We also examine the effect of four control variables on usage continuance intention: perceived usefulness, age, gender, and friends use. Usefulness is defined as the degree to which using the OSN website enhances one s performance in OSN (i.e., making it easier and more effective to communicate with others). We include usefulness in our model as a control variable because it is a dominant predictor of intention in the IT acceptance literature based on TRA [21], including research that shows it is important in OSN website use [3]. We include age and gender following previous research that shows some beliefs have stronger influences on continuance intention depending on gender and age [21]. Finally, we include friends use because individuals may have higher continuance intention as their friends use increases [59]. III. METHODOLOGY We collected survey data in February 2007 to test the hypotheses. We used Facebook as the OSN website. Participants were juniors and seniors in an information systems course required for all business majors in a large public U.S. university. This is an appropriate sample because Facebook originally targeted college students, and Facebook users are often college-aged, comprising 40% of unique visitors from the age group in 2006 and 29% in 2007 [5]. A. Procedure The survey instructions asked subjects to indicate an OSN site of which they were either currently a member or might become a member. The survey then instructed subjects to answer all remaining questions referring to that OSN site. Of the 413 respondents, 367 indicated they currently use Facebook. We used this subsample to analyze the hypotheses. Of those excluded, 39 said they used a different OSN website and seven indicated Facebook but had not yet used it. Class time was given to complete the survey, so nonresponse was limited to those who did not attend class that day. Our response rate was 76% (413/540 in the course). Subjects were similar to the University population in age (20 years), but the female percentage (41%) was lower. B. Measurement Scales Table I reports the scales and anchors. We adapted the items for most constructs from previous research including habit [60], continuance intention [21], trusting beliefs [11], perceived usefulness 3 [61], and subjective norm and attitude [21]. We measured experience using two items representing length and frequency of prior use. These items used categorical scales appropriate for the context [32] and were multiplied to form a total site experience score. We measured privacy restrictiveness with one item created by the authors. 4 For age, gender, and friends use, we used one item measures. All items were pilot tested with subjects from the same class the previous semester (n = 362) and had adequate loadings (0.74 to 0.95) and internal consistency reliabilities (0.88 to 0.96). We treated trusting beliefs as a second-order factor with integrity, competence, and benevolence as reflective first-order factors per the guidelines in Hardin et al. [62]. First, reflective first-order dimensions tend to have high intercorrelations. Trusting beliefs tend to be consistent because of cognitive dissonance theory, which posits that individuals will tend to resolve conflicting beliefs to eliminate or reduce dissonance [11], [63], [64]. Second, substantive theory depicts trusting beliefs as a psychological construct that exists apart from any attempt to measure it. Hence, trusting beliefs will influence its components. Third, we use reflective first-order factors because we are interested in the generalizability of the trusting belief measures rather than explaining variance in the trusting beliefs concept. IV. DATA ANALYSIS AND RESULTS We used EQS to analyze our data. We followed the two-step data-analysis process recommended by Anderson and Gerbing [65] that first assesses the measurement model via a confirmatory factor analysis and then tests the structural model. For the analyses, we used a multigroup method that tests for parameter invariance (equivalence) across groups representing different moderator levels. Significant differences between groups indicate moderator effects. Group analysis is recommended for testing moderator effects with structural equation modeling because it can detect differences in factor loadings in addition to beta coefficients [14]. In this set of analyses, we split the data into low and high privacy restrictiveness, and low and high site experience groups. We split the groups by the median (5.0 for privacy restrictiveness and 30 for site experience). 5 Values for restrictiveness groups were 1 to 4 (low) and 5 to 7 (high). Values for the experience groups were < 30 (low) and 30 (high). 3 The usefulness items relate to the general OSN context rather than to any specific tasks performed at the website, which is how Davis et al. [20] originally framed them. To ask about the usefulness of specific tasks would have required asking additional use questions, which was beyond our research s scope. 4 We also asked respondents Do you use a My Privacy -like feature to control who may view your profile? Yes No n/a This measure correlated with the above measure at Using this item (or combining the two items multiplicatively) did not change any of the hypothesis testing results we report later. 5 The low/high group split would be the same if we used the mean instead of the median.

6 LANKTON et al.: MODERATING EFFECTS OF PRIVACY RESTRICTIVENESS AND EXPERIENCE 659 TABLE I MEASUREMENT ITEMS A. Measurement Model Analysis When assessing the measurement model (i.e., performing a confirmatory factor analysis) in a multi-group analysis, each group is analyzed separately (low and high restrictiveness and low and high experience) [66]. The initial models revealed that habit item 2 had significant but low loadings (0.40 to 0.61) in all four models, indicating poor convergence [67]. After dropping this item, the remaining factor loadings were of a high magnitude (0.66 to 0.99) and all significant at p < Although some modification indices (Lagrange multiplier statistics) were above the 5.00 cutoff level, the standardized residuals were all below 2.58 (the highest was 0.311) suggesting no further model respecifications [68]. The goodness-of-fit statistics for the four measurement models are within suggested guidelines with the non-normed fit indices and comparative fit indices greater than 0.90 ( ) [69], the root-mean-square errors of approximation less than 0.08 ( ) [70], and the Chi square divided by degrees of freedom less than 2.00 ( ) [71]. Additionally, convergent validity was demonstrated by the internal consistency reliabilities ( ) exceeding the suggested 0.80 minimum, and the average variance extracted (AVE) ( ) exceeding the suggested 0.50 minimum [72]. Discriminant validity was demonstrated per the conservative procedure that each first-order construct s AVE square root exceeded the construct s correlation with other first-order constructs [72]. Discriminant

7 660 IEEE TRANSACTIONS ON ENGINEERING MANAGEMENT, VOL. 59, NO. 4, NOVEMBER 2012 TABLE II STRUCTURAL MODEL RESULTS PREDICTING CONTINUANCE INTENTION validity was also demonstrated because the confidence interval (± two standard errors) around the correlation estimates of all latent factor pairings excluded 1.0 [65]. Intervals that include 1.0 indicate that the measures may reflect the same construct. From the goodness-of-fit statistics, and convergent and discriminant validity tests, we determined that the measurement models were correctly specified. Because we treated trusting beliefs as a second-order factor, we used EQS to test its appropriateness as such. First, we found the first-order factors in each group were significantly correlated. Next, we found that each first-order factor was significantly related to the second-order factor, with loadings ranging from 0.60 to 0.92, all significant at p < Finally, for the combined dataset, we found that the second order-factor model had similar model fit and variance explained to a model with only first-order factors. We also assessed common method variance for the combined dataset by adding a factor with all measures as indicators to the theorized measurement model in EQS [73]. The nonnormed fit index for this model only improved minimally (0.006), suggesting a nonsignificant fit improvement [74], [75]. Also, the original factor loadings were still significant [74]. Finally, the average method variance was only 11%, which is considered to be quite low [76]. Based on these results, we conclude that common method variance is not a problem in this data. Finally, we tested for multicollinearity by examining the variance inflation factors and condition indexes for all first-order factors. The variance inflation factors ranged from 1.28 to 2.27, well below the suggested cutoff of 5.00 [77]. Also, no variable has a condition index above 30 and has two variance decomposition proportions greater than 0.50 [78]. These tests suggest multicollinearity is not a problem in the data. B. Structural Model Analysis/Moderation Testing 6 We next analyzed the structural models. In a multigroup analysis, assessing whether the path coefficients are invariant 6 Before proceeding to this step, we tested for factor loading invariance, which detects significant differences in responses to the questionnaire between groups [66]. We found several significant differences between factor loadings for the restrictiveness groups (the fourth competency item and the third usefulness item) and the experience groups (the third usefulness item, the second subjective norm item, and the third attitude item). Allowing the loadings to differ however, resulted in significant and high standardized factor loadings for all groups (0.826 to 0.964). Also, because there remained at least one invariant loading for each construct, it was deemed acceptable to proceed to testing the structural models [66]. between groups can detect hypothesized moderation [66]. We tested for structural model invariance by running multigroup constrained and unconstrained models. The χ 2 difference tests show that the constrained model s fit is significantly different from that of the unconstrained structural model for both group analyses (restrictiveness Δχ 2 = 21.48, Δdf = 8, p < 0.01; experience Δχ 2 = 22.06, Δdf = 7, p < 0.01). This indicates that the models are invariant and that moderation exists. Table II presents the results of the hypotheses tests. First, for H1 H4, we examine the significance of attitude, subjective norm, trusting beliefs, and habit on intention in all groups. We find that attitude, trusting beliefs (except with high experience), and habit significantly influence intention, while subjective norm does not. This generally supports H1, H3, and H4, but not H2. The Lagrange multiplier statistics provide hypothesis testing results for the moderator hypotheses. The trusting belief coefficients in the low (0.15) and high (0.13) restrictiveness groups are not significantly different, so H5 is not supported. H6 is supported by habit s significantly higher influence in the high restrictiveness group (0.46) than in the low (0.27) group (p = 0.025). The coefficient for trusting beliefs in the low experience group (0.23) is significantly higher than in the high experience group (0.03) (p = 0.021), supporting H7. There is no significant difference for habit s coefficient between low (0.32) and high experience (0.31) groups, so H8 is not supported. Of the control variables, usefulness and age had significant effects and group differences. The coefficient for usefulness is significantly smaller in the high restrictiveness group ( 0.07) than in the low restrictiveness group (0.23). Age has significantly more impact in the low experience group (0.16) than in the high experience group ( 0.06). C. Supplementary Analyses 7 We performed three supplementary analyses. First, to better understand attitude s mediating role in the trusting belief continuance intention relationship, we tested an alternative model that has the same relationships as the main model but adds a direct link from trusting beliefs to attitude, links from the control variables to attitude, and site experience and privacy restrictiveness moderation effects for all new links. The significance levels for hypotheses tests are the same as those reported 7 We performed another supplemental analysis showing the experience X restrictiveness interaction.

8 LANKTON et al.: MODERATING EFFECTS OF PRIVACY RESTRICTIVENESS AND EXPERIENCE 661 TABLE III STRUCTURAL MODEL RESULTS LOW-MEDIUM-HIGH GROUPS in the results section, except that trusting beliefs influence continuance intention at p < 0.05 in the low experience group and at p = 0.07 in both restrictiveness groups. Given the significant effect of trusting beliefs on attitude in all models, we find that attitude partly (in the low experience group) or fully (in the remaining groups) mediates the trusting belief continuance intention relationship [79]. Another difference between the models is that attitude s effect on continuance intention is significantly different between the low and high experience groups (low experience β = 0.49, high experience β = 0.26, p = 0.046). Also, the control variables, usefulness, and friend s use significantly influence attitude in all group models. The second analysis tested group split sensitivity. We divided the sample into as-equal-as-possible low-medium-high groups by privacy restrictiveness and site experience. Similar differences (see Table III) were found as in the original analysis, although the difference in perceived usefulness between the medium and high restrictiveness groups was only significant at p = 0.088, and the difference in trusting beliefs between the low and medium groups was significant at p = These tests generally support the robustness of our group splits. We also find an experience difference for attitude between the medium and high groups. The third analysis was to utilize different trusting beliefs measures. Measuring Facebook trusting beliefs with interpersonal attributes assumes respondents can associate these attributes with websites. Significant evidence suggests people do impute human characteristics to technical artifacts [64], [80]. However, technologies have no volition and no ability to make moral decisions and it may constitute an unwarranted anthropomorphism to attribute benevolence or integrity to a technology [81]. For this reason, subjects may more easily respond to questions about technology trusting belief attributes for websites. To see whether our results are an artifact of how we measured trust, we also measured trusting beliefs using the technology trusting attributes from prior research that include reliability, functionality, and helpfulness [81] [83] (see Table I). Helpfulness is similar to benevolence, while functionality is similar to competence, and reliability is like integrity. We validated the constructs with the same tests discussed earlier. The hypotheses have the same support as they did using interpersonal trusting beliefs attributes (see Table IV). This indicates our results are robust across both ways of measuring trusting beliefs. V. DISCUSSION While much research has examined trusting beliefs in e- commerce environments, very little has examined trusting beliefs and habit, or their moderators, in OSN websites. This study contributes to the OSN literature by using a TRA-based model to show how privacy restrictiveness and site experience moderate the trusting belief continuance intention and the habit continuance intention relationships in Facebook. Our analyses explain variances in continuance intention ranging from 25% to 37%. This research contributes to IT acceptance research on trust, habit, and privacy. Specific contributions and implications are discussed next. The first contribution is that we propose and test the moderating effects of privacy restrictiveness, an important privacy control behavior. This adds to prior research that has examined factors such as privacy concern and willingness to disclose personal information [43]. While this study hypothesized that privacy restrictiveness should moderate the effects of trusting beliefs on Facebook continuance intention, this hypothesis was not supported empirically. This means privacy restrictiveness may not reduce perceived OSN risks enough to obviate the need for trusting beliefs. Lenhart and Madden [41] report that 63% of OSN users feel strangers could find their personal information if they tried hard enough. Users may also fear Facebook could sell their information. Research should further explore risks involved in using OSN websites and how they interact with trusting beliefs. We found that habit predicts continuance intention better under high restrictiveness. This is because high restrictiveness closes the gap between the control individuals possess and the control they need to use an OSN website, thereby increasing the degree of automatic intention processing used. These users do not have to think about what information they disclose each time they use the OSN site. Our research extends Jewell and

9 662 IEEE TRANSACTIONS ON ENGINEERING MANAGEMENT, VOL. 59, NO. 4, NOVEMBER 2012 TABLE IV TECHNOLOGY TRUSTING BELIEFS STRUCTURAL MODEL COMPARATIVE RESULTS Kidwell s [47] model to OSN privacy behaviors and is one of the first to associate privacy control behaviors with habit. Future research should examine habit s association with other privacy-related variables such as privacy concerns and information sensitivity. Our group comparison based on privacy restrictiveness yielded an additional interesting finding about the control variable usefulness. We found that high restrictiveness reduces the effect of usefulness. Perhaps this is because high restrictiveness militates against a major reason Facebook is useful to share personal information with as many friends as possible. The more restrictive a user, the less useful the Facebook for that user s social networking. Our study also contributes by explaining why experience moderates trust s effects on intention to use Facebook. For example, researchers find that people grow less concerned over risk and security issues when experiential knowledge of the other party increases. Thus, we find that the trusting beliefs construct affects usage continuance intention when users have low experience, but not when they have high experience. While other studies show that the influence of trusting beliefs declines somewhat with experience (see [18], β change: 0.49 to 0.22), our study shows that with high experience, trusting beliefs no longer significantly influence usage continuance intention. This result could be because our high experience group on average had used Facebook for two years or more and used it more than once a day. Gefen s repeat customers had made seven purchases on average. Our findings suggest that trusting belief predictions should take into account how much experience individuals have. Surprisingly, our study failed to demonstrate that experience moderates habit s effects. Rather, habit predicts continuance intention with high and low experience. This was true whether we use split halves or the low third versus high third groups (see Table III). Thus, for our sample, it appears that habit forms and becomes a significant predictor of usage continuance intention quickly. This could be because even before using an OSN website, university students already have experience with and communication software. Also, the younger generation is very online-oriented, so only a little experience is needed to master new web-based technologies. Or, it could be that Facebook s useful features swiftly encourage habitual use. Future research could explore how experience moderates habit s influence for other technologies including business applications. Our findings concerning the direct effects of attitude, subjective norm, trusting beliefs, and habit (H1 H4) also contribute, although care must be taken when interpreting direct effects in the presence of interactions. First, the nonsignificant finding for subjective norm s influence on continuance intention is consistent with some prior research in voluntary contexts in which subjective norm may be less influential [21]. However, our finding may have occurred because some people that are important to users, such as parents, may actually discourage OSN use. This is supported by research on OSN websites that finds a slightly significant negative relationship [3]. Second, the significant findings for attitude provide evidence for the idea that researchers should not dismiss its potentially important role in TRA models [12]. Attitude s direct effect on continuance intention is consistent with prior work that finds attitude and other affect variables like playfulness are important in hedonic contexts including online games and now OSN websites [3], [22], [26]. Third, we provide further evidence that trusting beliefs influence website use continuance intention, adding to the growing literature that people can trust technology artifacts [64]. While attitude mediates this relationship, future work can investigate the effects of trusting attitude or trusting intention as an additional mediator, as its effects have been found to be significant in other research [12]. Finally, habit s strong role in predicting continuance intention supplements other research showing that habit can trigger one s intentions to continue using a technology [14], [28], [32]. Prior research also shows that habit can have a direct and moderating effect on actual behavior, which we did not measure [14]. These relationships should be investigated in future research. This paper also contributes to the trusting beliefs literature by showing that our results are robust whether one measures trusting beliefs in Facebook using technology trusting beliefs or interpersonal trusting beliefs. Users appear to consider the Facebook website to have human-like attributes benevolence, competence, and integrity and technology-like attributes helpfulness, functionality, and reliability. These two models appear to behave as functional equivalents of each other [84]. Future research should explore how technology trusting beliefs affect continuance intention related to other technologies.

10 LANKTON et al.: MODERATING EFFECTS OF PRIVACY RESTRICTIVENESS AND EXPERIENCE 663 A. Limitations One limitation is that we used a sample from one U.S. university. More than half of Facebook users are now outside of college [85] and Facebook is experiencing tremendous international growth [5]. The study s privacy restrictiveness and friends use measures are also limited. The privacy restrictiveness measure asked subjects how much they restrict access overall. However, OSN users may restrict access to some information (e.g., cell phone number) but not to other information (e.g., first name). Also, friend s use was measured using only one item. Finally, we only measured one privacy behavior. Another behavior is falsifying information. Lenhart and Madden report that 46% of OSN users who allow access to their profile post false information [41]. Future research can address these study limitations. B. Implications for Practice OSN providers should be aware of users differences in privacy restrictiveness and site experience because these factors influence continuance intention. For example, we show that an important factor for the low experience group is trusting beliefs, even though its impact erodes with more experience. This suggests OSN providers should take action to reduce risks early in the adoption process. This could include uncovering the key risks through surveys or interviews. Another implication is that OSN providers walk a delicate line between building useful sites and integrating safeguards that evoke trust. Disclosing enough information can make the site useful, yet disclosing too much information can put users at risk. To protect and guide users, some websites now provide disclosure guidelines. The United States Computer Emergency Readiness Team recommends that users not post their address online ( While many OSN websites have privacy policies that detail who can see and use one s personal information, these websites could also provide disclosure best practices. This could help users decide how to make the site more useful. OSN providers should explore which parts of OSN use become habitual. For example, users can browse profiles, interact with applications, join or monitor groups, browse marketplaces, and read discussion boards. It is important to track whether individuals use a function more often, are more satisfied with a function, or consider a function more stable than others. Because these factors lead to habit, they could also be moderating factors. Additional functions that build habit should be made more site-prominent. We also find that attitude drives continuance intention, which implies that OSN providers should continue to explore ways to make these sites evoke favorable feelings about their use. While favorableness may relate to how many of one s friends use the site (i.e., I like using the site because I can network with my friends on it), it may also relate to the site s relevancy as members lifestyles changes. For example, what might seem fun and be a good idea when one is in school may not have the same affect when one is finding a job or working in a professional position. By understanding which website features shape positive attitudes, OSN providers might strengthen attitude s weaker link to continuance among the more experienced users. VI. CONCLUSION This paper contributes to the OSN literature by deepening our understanding of two moderators of trusting beliefs and habit in the OSN setting. First, it shows that trusting beliefs and privacy restrictiveness do not always act as predictive substitutes for each other. Rather, in the OSN setting, trusting beliefs may still be needed even when privacy control is high. Second, it affirms that whereas trusting beliefs predict continuance intention at first, higher OSN site experience enables habit to replace trusting beliefs as a strong continuance intention predictor. This affirms that experiential knowledge about the setting can decrease and even eliminate the influence of trusting beliefs over time. Third, the findings show that habit is a strong predictor of continuance intention for all groups. However, its influence is especially strong when a user s privacy restrictiveness is high. Thus, habit is a powerful variable in the OSN environment. Overall, this research provides a better understanding of the moderators of trusting beliefs and habit for an important OSN technology. REFERENCES [1] Privacy Rights Clearinghouse. (Jun. 2010). [Online]. Available: [2] Pew Research. (2010). [Online]. Available: Commentary/2010/December/Global-Social-Networking.aspx [3] D. Sledgianowski and S. Kulviwat, Using social network sites: The effects of playfulness, critical mass and trust in a hedonic context, J. Comput. Inf. Syst., vol. 49, no. 4, pp , [4] D. M. Boyd and N. B. Ellison, Social network sites: Definition, history, and scholarship, J. Comput.-Mediat. Commun., vol. 13, no. 1, pp , [5] I. Darby, Facebook is entering difficult second phase, Campaign,p. 17, May 23, [6] Comscore. (Aug ). Social networking explodes worldwide as sites increase their focus on cultural relevance [Online]. Available: (accessed on December 28, 2008). [7] C. Geere. (Jun ). Bebo not the online social network site in trouble: MySpace looks to be struggling too [Online]. Available: [8] M. Sweeney. (Jun ). AOL Confirms Bebo sale [Online]. Available: aol-confirms-bebo-sale (accessed June 23, 2010). [9] I. Ajzen and M. Fishbein, Understanding Attitudes and Predicting Social Behavior. Englewood Cliffs, NJ: Prentice- Hall, [10] R. C. Mayer, J. H. Davis, and F. D. Schoorman, An integrative model of organizational trust, Acad. Manage. Rev., vol. 20, no. 3, pp , [11] D. H. McKnight, V. Choudhury, and C. Kacmar, Developing and validating trust measures for e-commerce: An integrative typology, Inf. Syst. Res., vol. 13, no. 3, pp , [12] J. Benamati, M. A. Fuller, M. A. Serva, and J. Baroudi, Clarifying the integration of trust and TAM in e-commerce environments: Implications for systems design and management, IEEE Trans. Eng. Manage.,vol. 57, no. 3, pp , Aug [13] D. M. Rousseau, S. B. Sitkin, R. S. Burt, and C. Camerer, Not so different after all: A cross-discipline view of trust, Acad. Manage. Rev., vol. 23, no. 3, pp , [14] M. Limayem, S. G. Hirt, and C. M. K. Cheung, How habit limits the predictive power of intention: The case of information systems continuance, MIS Quart., vol. 31, no. 4, pp , 2007.

11 664 IEEE TRANSACTIONS ON ENGINEERING MANAGEMENT, VOL. 59, NO. 4, NOVEMBER 2012 [15] M. K. Cheung and M. K. O. Lee, A theoretical model of intentional social action in online social networks, Decis. Supp. Syst., vol. 49, pp , [16] T. A. Carte and C. J. Russell, In pursuit of moderation: Nine common errors and their solutions, MIS Quart., vol. 27,no.3,pp ,2003. [17] I. Benbasat and H. Barki, Quo vadis, TAM, J. Assoc. Inf. Syst., vol. 8, no. 4, pp , [18] D. Gefen, E. Karahanna, and D. W. Straub, Inexperience and experience with online stores: The importance of TAM and trust, IEEE Trans. Eng. Manage., vol. 50, no. 3, pp , Aug [19] H. Zhang, Trust-promoting seals in electronic markets: Impact on online shopping decisions, J. Inf. Technol. Theory Appl., vol.6, no.4, pp.29 40, [20] F. D. Davis, R. P. Bagozzi, and P. R. Warsaw, User acceptance of information technology: A comparison of two theoretical models, Manage. Sci., vol. 35, no. 8, pp , [21] V. Venkatesh, M. G. Morris, G. B. Davis, and F. D. Davis, User acceptance of information technology: Toward a unified view, MIS Quart., vol. 27, no. 3, pp , [22] D. H. Shin, The effects of trust, security and privacy in social networking: A security-based approach to understand the pattern of adoption, Interact. Comput., vol. 22, pp , [23] M. Deutsch and H. Gerard, A study of normative and informational social influences upon individual judgment, J. Abnormal Soc. Psychol., vol. 51, pp , [24] J. Lin, H. C. Chan, and K. K. Wei, Understanding competing web application platforms: An extended theory of planned behavior and its relative model, IEEE Trans. Eng. Manage.,vol. 58,no. 1,pp ,Feb [25] J. Y. L. Thong, V. Venkatesh, X. Xu, S. J. Hong, and K. Y. Tam, Consumer acceptance of personal information and communication technology services, IEEE Trans. Eng. Manage., vol. 58, no. 4, pp , Nov [26] J. Wu and D. Liu, The effects of trust and enjoyment on intention to play online games, J. Electron. Commerce Res., vol. 8, no. 2, pp , [27] A. I. Nicolaou and D. H. McKnight, Perceived information quality in data exchanges: Effects on risk, trust, and intention to use, Inf. Syst. Res., vol. 17, no. 4, pp , [28] H. C. Triandis, Values, attitudes, and interpersonal behavior, in Nebraska Symposium on Miitvation, 1979: Beliefs, Attitudes, and Values,H. E. Howe, Ed. Lincoln, NE: Univ. Nebraska Press, 1980, pp [29] I. Ajzen, Residual effects of past on later behavior: Habituation and reasoned action perspectives, Person. Soc. Psychol. Rev., vol. 6, no. 2, pp , [30] J. A. Ouellette and W. Wood, Habit and intention in everyday life: The multiple processes by which past behavior predicts future behavior, Psychol. Bull., vol. 124, no. 1, pp , [31] S. S. Kim and N. K. Malhotra, A longitudinal model of continued IS use: An integrative view of four mechanisms underlying postadoption phenomena, Manage. Sci., vol. 51, no. 5, pp , [32] H. C. Triandis, Attitude and Attitude Change. New York: Wiley, [33] N. B. Ellison, C. Steinfield, and C. Lampe, The benefits of Facebook friends: Social capital and college students use of online social network sites, J. Comput.-Mediated Commun., vol. 12, no. 4, pp , [34] C. Dwyer, S. Hiltz, and K. Passerini, Trust and privacy concern within social networking sites: A comparison of Facebook and MySpace, presented at the Amer. Conf. Inf. Syst., Keystone, CO, [Online]. Available: [35] F. Shoeman, Philosophical Dimensions of Privacy. Cambridge, U.K.: Cambridge Univ. Press, [36] M. Lwin, J. Wirtz, and J. D. Williams, Consumer online privacy concerns and responses: A power-responsibility equilibrium perspective, J. Acad. Market. Sci., vol. 35, no. 4, pp , [37] M. M. Hossain and V. R. Prybutok, Consumer acceptance of RFID technology: An exploratory study, IEEE Trans. Eng. Manage., vol. 55, no. 2, pp , May [38] N. K. Malhotra, S. S. Kim, and J. Agarwal, Internet users information privacy concerns (IUIPC): The construct, the scale, and a casual model, Inf. Syst. Res., vol. 15, no. 4, pp , [39] H. J. Smith, S. J. Milberg, and S. J. Burke, Information privacy: Measuring individuals concerns about organizational practices, MIS Quart., vol. 20, no. 2, pp , [40] J. Wirtz, M. O. Lewin, and J. D. Williams, Causes and consequences of consumer online privacy, Int. J. Serv. Ind. Manage., vol. 18, no. 4, pp , [41] A. Lenhart, M. Madden. (2007 Apr. 18). Teens, privacy, & online social networks, Pew Internet Amer. Life Project. [Online]. Available: (accessed on Dec. 2, 2008). [42] C. Lampe, N. Ellison, and C. Steinfield, A Face(book) in the crowd : Social searching versus social browsing, in Proc. Comput. Support. Cooperat. Work, Banff, AB, Canada, 2006, pp [43] T. Dinev and P. Hart, An extended privacy calculus model for e-commerce transactions, Inf. Syst. Res., vol. 17, no. 1, pp , [44] S. Zeng, L. Wu, and H. Chen, Sharing private information online: The mediator effect of social exchange, in Proc. 11th Int. Conf. Electron. Commerce, 2009, pp [45] J. G. Holmes, Trust and the appraisal process in close relationships, in Advances in Personal Relationships, vol. 2, W. H. Jones and D. Perlman, Eds. London, U.K.: Jessica Kingsley, 1991, pp [46] R. J. Lewicki, E. C. Tomlinson, and N. Gillespie, Models of interpersonal trust development: Theoretical approaches, empirical evidence, and future directions, J. Manage., vol. 32, no. 6, pp , [47] R. D. Jewell and B. Kidwell, The moderating effect of perceived control on motivation to engage in deliberate processing, Psychol. Market., vol. 22, no. 9, pp , [48] I. Ajzen, Attitudes, Personality, and Behavior. Chicago, IL: Dorsey Press, [49] A. Bhattacherjee and G. Premkumar, Understanding changes in belief and attitude toward information technology usage: A theoretical model and longitudinal test, MIS Quart., vol. 28, no. 2, pp , [50] E. Hargittai, Whose space? Differences among users and non-users of social network websites, J. Comput.-Mediat. Commun., vol. 13, no. 1, pp , [51] K. T. Dirks and D. L. Ferrin, The role of trust in organizational settings, Org. Sci., vol. 12, no. 4, pp , [52] S. L. Jarvenpaa, T. R. Shaw, and D. S. Staples, Toward contextualized theories of trust: The role of trust in global virtual teams, Inf. Syst. Res., vol. 15, no. 3, pp , [53] R. M. Shiffrin and W. Schneider, Controlled and automatic human information processing: II. Perceptual learning, automatic attending, and a general theory, Psychol. Rev., vol. 84, no. 2, pp , [54] E. R. Smith and J. DeCoster, Dual-process models in social and cognitive psychology: Conceptual integration and links to underlying memory systems, Person. Soc. Psychol. Rev., vol. 4, no. 2, pp , [55] P. G. Devine, Stereotypes and prejudice: Their automatic and controlled components, J. Person. Soc. Psychol., vol. 56,pp.5 18,1989. [56] R. H. Fazio, How do attitudes guide behavior?, in Handbook of Motivation and Cognition, R. M. Sorrentino and E. T. Higgins, Eds. New York: Guilford, 1986, pp [57] S. A. Sloman, The empirical case for two systems of reasoning, Psychol. Bull., vol. 199, pp. 3 22, [58] M. M. Montoya-Weiss, G. B. Voss, and D. Grewal, Determinants of online channel use and overall satisfaction with a relational, multichannel service provider, J. Acad. Market. Sci.,vol. 31,no.4,pp ,2003. [59] A. F. Cameron and J. Webster, Unintended consequences of emerging communication technologies: Instant messaging in the workplace, Comput. Human Behav., vol. 21, no. 1, pp , [60] M. Limayem and S. G. Hirt, Force of habit and information systems usage: Theory and initial validation, J. Assoc. Inf. Syst., vol. 4, no. 1, pp , [61] V. Venkatesh and M. G. Morris, Why don t men ever stop to ask for directions? Gender, social influence, and their role in technology acceptance and usage behavior, MIS Quart., vol. 24, no. 1, pp , [62] A. Hardin, J. Chang, and M. A. Fuller, Formative versus reflective measurement: Comment on Marakas, Johnson, and Clay 2007, J. Assoc. Inf. Syst., vol. 9, no. 9, pp , [63] M. A. Serva, M. A. Fuller, and J. Benamati, Trustworthiness in B2C E-Commerce: An examination of alternative models, Data Base Adv. Inf. Syst., vol. 36, no. 3, pp , Summer [64] W. Wang and I. Benbasat, Trust in and adoption of online recommendation agents, J. Assoc. Inf. Syst., vol. 6, no. 3, pp , [65] J. C. Anderson and D. W. Gerbing, Structural equation modeling in practice: A review and recommended two-step approach, Psychol. Bull., vol. 103, no. 3, pp , [66] B. M. Byrne, Structural Equation Modeling with EQS.. Mahwah, NJ: Lawrence Erlbaum Assoc, [67] J. F. Hair, W. C. Black, B. J. Babin, R. E. Anderson, and R. L. Tatham, Multivariate Data Analysis Upper Saddle River, NJ: Prentice-Hall,

12 LANKTON et al.: MODERATING EFFECTS OF PRIVACY RESTRICTIVENESS AND EXPERIENCE 665 [68] D. Gefen, Assessing unidimensionality through LISREL: An explanation and example, Commun. Assoc. Inf. Syst., vol. 12, pp , [69] P. M. Bentler and D. G. Bonnett, Significance tests and goodness of fit in the analysis of covariance structures, Psychol. Bull., vol. 88, no. 3, pp , [70] M. W. Browne and R. Cudeck, Alternative ways of assessing model fit, Sociol. Methods Res., vol. 21, no. 2, pp , [71] K. A. Bollen, Structural Equations with Latent Variables. New York: Wiley, [72] C. Fornell and D. F. Larcker, Evaluating structural equations with unobservable variables and measurement error, J. Market. Res., vol. 18, no. 1, pp , [73] K. Widaman, Hierarchically nested covariance structure models for multitrait-multimethod data, Appl. Psychol. Meas., vol. 9, no. 1, pp. 1 23, [74] A. R. Elangovan and J. L. Xie, Effects of perceived power of supervisor on subordinate stress and motivation: The moderating role of subordinate characteristics, J. Org. Behav., vol. 20, no. 3, pp , [75] L. J. Williams, J. A. Cote, and M. R. Buckley, Lack of method variance in self-reported affect and perceptions at work: Reality or Artifact?, J. Appl. Psychol., vol. 74, no. 3, pp , [76] N. K. Malhotra, S. S. Kim, and A. Patil, Common method variance in IS research: A comparison of alternative approaches and a reanalysis of past research, Manage. Sci., vol. 52, no. 12, pp , [77] S. Menard, Applied Logistic Regression Analysis: Sage University Series on Quantitative Applications in the Social Science. Thousand Oaks, CA: Sage, [78] D. A. Belsley, E. Kuh, and R. E. Welsch, Regression Diagnostics: Identifying Influential Data and Sources of Collinearity.. New York: Wiley, [79] M. E. Sobel, Asymptotic confidence intervals for indirect effects in structural equation models, in Sociological Methodology, S. Leinhart, Ed. San Francisco, CA: Jossey-Bass, 1982, pp [80] B. Reeves and C. Nass, The Media Equation: How People Treat Computers, Television, and New Media like Real People and Places. Cambridge, U.K.: Cambridge Univ. Press, [81] D. H. McKnight, Trust in information technology, in The Blackwell Encyclopedia of Management. Vol. 7 Management Information Systems, G. B. Davis, Ed. Malden, MA: Blackwell, 2005, pp [82] S. K. Lippert, Investigating Postadoption utilization: An examination into the role of interorganizational and technology trust, IEEE Trans. Eng. Manage., vol. 54, no. 3, pp , Aug [83] J. B. Thatcher, D. H. McKnight, E. W. Baker, R. E. Arsal, and N. H. Roberts, The role of trust in postadoption it exploration: An empirical examination of knowledge management systems, IEEE Trans. Eng. Manage., vol. 58, no. 1, pp , Feb [84] N. Luhmann, Trust and Power. New York: Wiley, [85] Facebook (Dec ). Press room, [Online]. Available: D. Harrison McKnight received the bachelor s and M.B.A. degrees from Brigham Young University, Provo, UT, and the Ph.D. degree in management information systems from the University of Minnesota, Minneapolis. He is currently an Associate Professor in the Eli Broad College of Business, Michigan State University, East Lansing. He was with American Airlines SABRE Computer Systems division for ten years. His research interests include trust within technology and electronic commerce settings and the retention and motivation of technical professionals. His work has appeared in journals such as MIS Quarterly, Information Systems Research,theJournal of Management Information Systems, the IEEE TRANSACTIONS ON ENGINEERING MAN- AGEMENT,andtheAcademy of Management Review. Dr. McKnight currently serves as an Associate Editor of MIS Quarterly. Jason Bennett Thatcher received the B.A. degrees in history (cum laude) and political science (cum laude) from the University of Utah, Salt Lake City, the M.P.A. degree from the Askew School of Public Administration and Policy, Tallahassee, FL, and the Ph.D. degree in business administration from the College of Business, Florida State University, Tallahassee. He is currently an Associate Professor in the Department of Management, Clemson University, Clemson, SC. His research examines the influence of individual beliefs and characteristics on the use of information technology. He also studies strategic and human resource management issues related to the application of technologies in organizations. His work has appeared in MIS Quarterly, Communications of the ACM, thejournal of Management Information Systems, theieeetransactions ON ENGINEERING MANAGEMENT, Organizational Behavior and Human Decision Processes, andthejournal of Applied Psychology. Dr. Thatcher has served on the Boards of the Information Systems Research, thejournal of AIS, and the IEEE TRANSACTIONS ON ENGINEERING MANAGEMENT. Nancy K. Lankton received the B.S. degree in accounting, the M.B.A. and M.S. degrees in computer information systems, and the Ph.D. degree in business administration from Arizona State University, Tempe. She is currently an Assistant Professor in the College of Business, Marshall University, Huntington, WV. She teaches accounting information systems and information systems auditing. Her main research interests include trust s impacts on individual and organizational use of information technology, e-health, and privacy behaviors related to social networking websites. She has published in journals such as Contemporary Accounting Research, the IEEE TRANSAC- TIONS ON ENGINEERING MANAGEMENT,theJournal of Management Information Systems, andthejournal of the American Medical Informatics Association. Dr. Lankton is a member of the Association for Information Systems, and the Information Systems Auditor and Control Association. She currently serves as an Associate Editor for Communications of the AIS.

Topic 1 Social Networking Service (SNS) Users Theory of Planned Behavior (TPB)

Topic 1 Social Networking Service (SNS) Users Theory of Planned Behavior (TPB) Topic 1 Social Networking Service (SNS) Users Theory of Planned Behavior (TPB) Flow Experience Perceived Enjoyment Trust Attitude Subjective Norm Actual Use Self Efficacy Perceived Behavioral Control Introduction

More information

An Empirical Study of the Roles of Affective Variables in User Adoption of Search Engines

An Empirical Study of the Roles of Affective Variables in User Adoption of Search Engines An Empirical Study of the Roles of Affective Variables in User Adoption of Search Engines ABSTRACT Heshan Sun Syracuse University hesun@syr.edu The current study is built upon prior research and is an

More information

Trust in E-Commerce Vendors: A Two-Stage Model

Trust in E-Commerce Vendors: A Two-Stage Model Association for Information Systems AIS Electronic Library (AISeL) ICIS 2000 Proceedings International Conference on Information Systems (ICIS) December 2000 Trust in E-Commerce Vendors: A Two-Stage Model

More information

Understanding Social Norms, Enjoyment, and the Moderating Effect of Gender on E-Commerce Adoption

Understanding Social Norms, Enjoyment, and the Moderating Effect of Gender on E-Commerce Adoption Association for Information Systems AIS Electronic Library (AISeL) SAIS 2010 Proceedings Southern (SAIS) 3-1-2010 Understanding Social Norms, Enjoyment, and the Moderating Effect of Gender on E-Commerce

More information

Is entrepreneur s photo a crucial element in a crowdfunding webpage?

Is entrepreneur s photo a crucial element in a crowdfunding webpage? Second International Conference on Economic and Business Management (FEBM 2017) Is entrepreneur s photo a crucial element in a crowdfunding webpage? Xin Wang, Huaxin Wang *, Yu Zhao Department of Business

More information

Examining the efficacy of the Theory of Planned Behavior (TPB) to understand pre-service teachers intention to use technology*

Examining the efficacy of the Theory of Planned Behavior (TPB) to understand pre-service teachers intention to use technology* Examining the efficacy of the Theory of Planned Behavior (TPB) to understand pre-service teachers intention to use technology* Timothy Teo & Chwee Beng Lee Nanyang Technology University Singapore This

More information

Tourism Website Customers Repurchase Intention: Information System Success Model Ming-yi HUANG 1 and Tung-liang CHEN 2,*

Tourism Website Customers Repurchase Intention: Information System Success Model Ming-yi HUANG 1 and Tung-liang CHEN 2,* 2017 International Conference on Applied Mechanics and Mechanical Automation (AMMA 2017) ISBN: 978-1-60595-471-4 Tourism Website Customers Repurchase Intention: Information System Success Model Ming-yi

More information

Deakin Research Online Deakin University s institutional research repository DDeakin Research Online Research Online This is the published version:

Deakin Research Online Deakin University s institutional research repository DDeakin Research Online Research Online This is the published version: Deakin Research Online Deakin University s institutional research repository DDeakin Research Online Research Online This is the published version: Taghian, Mehdi and D'Souza, Clare 2007, A cross-cultural

More information

An Empirical Study on Causal Relationships between Perceived Enjoyment and Perceived Ease of Use

An Empirical Study on Causal Relationships between Perceived Enjoyment and Perceived Ease of Use An Empirical Study on Causal Relationships between Perceived Enjoyment and Perceived Ease of Use Heshan Sun Syracuse University hesun@syr.edu Ping Zhang Syracuse University pzhang@syr.edu ABSTRACT Causality

More information

Issues in Information Systems Volume 17, Issue II, pp , 2016

Issues in Information Systems Volume 17, Issue II, pp , 2016 CONSUMER ADOPTION AND USE OF MOBILE APPLICATIONS: DO PRIVACY AND SECURITY CONCERNS MATTER? Gary Garrison, Belmont University, gary.garrison@belmont.edu Sang Hyun Kim, Kyungpook National University, ksh@knu.ac.kr

More information

User Acceptance of E-Government Services

User Acceptance of E-Government Services User Acceptance of E-Government Services PACIS 2007 Track (Human Computer Interaction, Social and Cultural Aspects of IS) (Full Paper) Abstract In order to provide more accessible, accurate, real-time

More information

External Variables and the Technology Acceptance Model

External Variables and the Technology Acceptance Model Association for Information Systems AIS Electronic Library (AISeL) AMCIS 1995 Proceedings Americas Conference on Information Systems (AMCIS) 8-25-1995 External Variables and the Technology Acceptance Model

More information

Learning Objectives. Learning Objectives 17/03/2016. Chapter 4 Perspectives on Consumer Behavior

Learning Objectives. Learning Objectives 17/03/2016. Chapter 4 Perspectives on Consumer Behavior Chapter 4 Perspectives on Consumer Behavior Copyright 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw-Hill Education. Learning

More information

PERCEIVED TRUSTWORTHINESS OF KNOWLEDGE SOURCES: THE MODERATING IMPACT OF RELATIONSHIP LENGTH

PERCEIVED TRUSTWORTHINESS OF KNOWLEDGE SOURCES: THE MODERATING IMPACT OF RELATIONSHIP LENGTH PERCEIVED TRUSTWORTHINESS OF KNOWLEDGE SOURCES: THE MODERATING IMPACT OF RELATIONSHIP LENGTH DANIEL Z. LEVIN Management and Global Business Dept. Rutgers Business School Newark and New Brunswick Rutgers

More information

System and User Characteristics in the Adoption and Use of e-learning Management Systems: A Cross-Age Study

System and User Characteristics in the Adoption and Use of e-learning Management Systems: A Cross-Age Study System and User Characteristics in the Adoption and Use of e-learning Management Systems: A Cross-Age Study Oscar Lorenzo Dueñas-Rugnon, Santiago Iglesias-Pradas, and Ángel Hernández-García Grupo de Tecnologías

More information

THE THEORY OF PLANNED BEHAVIOR TO DETERMINE THE SOCIAL NETWORK USAGE BEHAVIOR IN SAUDI ARABIA

THE THEORY OF PLANNED BEHAVIOR TO DETERMINE THE SOCIAL NETWORK USAGE BEHAVIOR IN SAUDI ARABIA 0F USING International Journal of Research in Computer Science eissn 2249-8265 Volume 5 Issue 1 (2015) pp. 1-8, A Unit of White Globe Publications THE THEORY OF PLANNED BEHAVIOR TO DETERMINE THE SOCIAL

More information

Issues in Information Systems

Issues in Information Systems ANALYZING THE ROLE OF SOME PERSONAL DETERMINANTS IN WEB 2.0 APPLICATIONS USAGE Adel M. Aladwani, Kuwait University, adel.aladwani@ku.edu.kw ABSTRACT This study examines the personal determinants of Web

More information

Research on Software Continuous Usage Based on Expectation-confirmation Theory

Research on Software Continuous Usage Based on Expectation-confirmation Theory Research on Software Continuous Usage Based on Expectation-confirmation Theory Daqing Zheng 1, Jincheng Wang 1, Jia Wang 2 (1. School of Information Management & Engineering, Shanghai University of Finance

More information

Physicians' Acceptance of Web-Based Medical Assessment Systems: Findings from a National Survey

Physicians' Acceptance of Web-Based Medical Assessment Systems: Findings from a National Survey Association for Information Systems AIS Electronic Library (AISeL) AMCIS 2003 Proceedings Americas Conference on Information Systems (AMCIS) 12-31-2003 Physicians' Acceptance of Web-Based Medical Assessment

More information

The Impact of Relative Standards on the Propensity to Disclose. Alessandro Acquisti, Leslie K. John, George Loewenstein WEB APPENDIX

The Impact of Relative Standards on the Propensity to Disclose. Alessandro Acquisti, Leslie K. John, George Loewenstein WEB APPENDIX The Impact of Relative Standards on the Propensity to Disclose Alessandro Acquisti, Leslie K. John, George Loewenstein WEB APPENDIX 2 Web Appendix A: Panel data estimation approach As noted in the main

More information

Personality Traits Effects on Job Satisfaction: The Role of Goal Commitment

Personality Traits Effects on Job Satisfaction: The Role of Goal Commitment Marshall University Marshall Digital Scholar Management Faculty Research Management, Marketing and MIS Fall 11-14-2009 Personality Traits Effects on Job Satisfaction: The Role of Goal Commitment Wai Kwan

More information

Measurement of Constructs in Psychosocial Models of Health Behavior. March 26, 2012 Neil Steers, Ph.D.

Measurement of Constructs in Psychosocial Models of Health Behavior. March 26, 2012 Neil Steers, Ph.D. Measurement of Constructs in Psychosocial Models of Health Behavior March 26, 2012 Neil Steers, Ph.D. Importance of measurement in research testing psychosocial models Issues in measurement of psychosocial

More information

Thinking Like a Researcher

Thinking Like a Researcher 3-1 Thinking Like a Researcher 3-3 Learning Objectives Understand... The terminology used by professional researchers employing scientific thinking. What you need to formulate a solid research hypothesis.

More information

Howard Sheth Model. The model claims that a person s purchase decision is often influenced by more than one individuals.

Howard Sheth Model. The model claims that a person s purchase decision is often influenced by more than one individuals. Howard Sheth Model The Howard Sheth theory of buyer behaviour is a sophisticated integration of the various social, psychological and marketing influences on consumer. The model claims that a person s

More information

Sense-making Approach in Determining Health Situation, Information Seeking and Usage

Sense-making Approach in Determining Health Situation, Information Seeking and Usage DOI: 10.7763/IPEDR. 2013. V62. 16 Sense-making Approach in Determining Health Situation, Information Seeking and Usage Ismail Sualman 1 and Rosni Jaafar 1 Faculty of Communication and Media Studies, Universiti

More information

Thank you very much for your guidance on this revision. We look forward to hearing from you.

Thank you very much for your guidance on this revision. We look forward to hearing from you. 1 PAINTED BUNTING MANUSCRIPT REVIEW HISTORY REVISION NOTES FROM AUTHORS (ROUND 2) We would like to submit a revision of our manuscript. As you requested, we have run new studies that employ additional

More information

ADOPTION PROCESS FOR VoIP: THE UTAUT MODEL

ADOPTION PROCESS FOR VoIP: THE UTAUT MODEL ADOPTION PROCESS FOR VoIP: THE UTAUT MODEL Eduardo Esteva-Armida, Instituto Tecnológico y de Estudios Superiores de Monterrey Gral. Ramón Corona 2514, Zapopan, Jalisco, México 45120 Phone: (5233) 3669.3080

More information

Copyright 2013 by The McGraw-Hill Companies, Inc. All rights reserved.

Copyright 2013 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin Copyright 2013 by The McGraw-Hill Companies, Inc. All rights reserved. ENLIGHTENED CARMAKERS KNOW WHAT CUSTOM(H)ERS VALUE! The Sense of Styling! The Need for Speed! The Substance of Safety!

More information

Acceptance of E-Government Service: A Validation of the UTAUT

Acceptance of E-Government Service: A Validation of the UTAUT Proceedings of the 5th WSEAS International Conference on E-ACTIVITIES, Venice, Italy, November 20-22, 2006 165 Acceptance of E-Government Service: A Validation of the UTAUT YI-SHUN WANG Department of Information

More information

Internal Consistency and Reliability of the Networked Minds Social Presence Measure

Internal Consistency and Reliability of the Networked Minds Social Presence Measure Internal Consistency and Reliability of the Networked Minds Social Presence Measure Chad Harms, Frank Biocca Iowa State University, Michigan State University Harms@iastate.edu, Biocca@msu.edu Abstract

More information

ROLES OF ATTITUDES IN INITIAL AND CONTINUED ICT USE: A LONGITUDINAL STUDY

ROLES OF ATTITUDES IN INITIAL AND CONTINUED ICT USE: A LONGITUDINAL STUDY ROLES OF ATTITUDES IN INITIAL AND CONTINUED ICT USE: A LONGITUDINAL STUDY Ping Zhang Syracuse University pzhang@syr.edu Abstract. Attitude has been understudied in the information systems (IS) field. Research

More information

National Culture Dimensions and Consumer Digital Piracy: A European Perspective

National Culture Dimensions and Consumer Digital Piracy: A European Perspective National Culture Dimensions and Consumer Digital Piracy: A European Perspective Abstract Irena Vida, irena.vida@ef.uni-lj.si Monika Kukar-Kinney, mkukarki@richmond.edu Mateja Kos Koklič, mateja.kos@ef.uni-lj.si

More information

Hae Won KIM. KIM Reproductive Health (2015) 12:91 DOI /s x

Hae Won KIM. KIM Reproductive Health (2015) 12:91 DOI /s x KIM Reproductive Health (2015) 12:91 DOI 10.1186/s12978-015-0076-x RESEARCH Open Access Sex differences in the awareness of emergency contraceptive pills associated with unmarried Korean university students

More information

Toward E-Commerce Website Evaluation and Use: Qualitative and Quantitative Understandings

Toward E-Commerce Website Evaluation and Use: Qualitative and Quantitative Understandings Association for Information Systems AIS Electronic Library (AISeL) SIGHCI 2009 Proceedings Special Interest Group on Human-Computer Interaction 2009 : Qualitative and Quantitative Understandings Na "Lina"

More information

THEORY OF PLANNED BEHAVIOR: A PERSPECTIVE IN INDIA S INTERNET BANKING

THEORY OF PLANNED BEHAVIOR: A PERSPECTIVE IN INDIA S INTERNET BANKING THEORY OF PLANNED BEHAVIOR: A PERSPECTIVE IN INDIA S INTERNET BANKING Dr. Rajesh Bhatt Head, Department of Business Administration Bhavnagar University, Bhavnagar ABSTRACT The banking services in India

More information

5. is the process of moving from the specific to the general. a. Deduction

5. is the process of moving from the specific to the general. a. Deduction Applied Social Psychology Understanding and Addressing Social and Practical Problems 3rd Edition Gruman Test Bank Full Download: https://testbanklive.com/download/applied-social-psychology-understanding-and-addressing-social-and-practical-p

More information

A Hierarchical Comparison on Influence Paths from Cognitive & Emotional Trust to Proactive Behavior Between China and Japan

A Hierarchical Comparison on Influence Paths from Cognitive & Emotional Trust to Proactive Behavior Between China and Japan A Hierarchical Comparison on Influence Paths from Cognitive & Emotional Trust to Proactive Behavior Between China and Japan Pei Liu School of Management and Economics, North China Zhen Li Data Science

More information

Results from a survey of NetAssess users Alan Mead Aon Consulting.

Results from a survey of NetAssess users Alan Mead Aon Consulting. Results from a survey of NetAssess users Alan Mead Aon Consulting alan_d_mead@aoncons.com Lots of Internet hype corresponding HR interest in using web technology Increasing requests for web-based version

More information

Assessing Social Networking from Three Different Perspectives: Toward an Integrative View

Assessing Social Networking from Three Different Perspectives: Toward an Integrative View Association for Information Systems AIS Electronic Library (AISeL) MWAIS 2013 Proceedings Midwest (MWAIS) 5-24-2013 Assessing Social Networking from Three Different Perspectives: Toward an Integrative

More information

DISCREPANCY BETWEEN ACTUAL SELF AND VIRTUAL SELF: THEORETICAL EXTENSIONS, MEASUREMENT AND RELATION TO CONTRIBUTION IN VIRTUAL COMMUNITIES

DISCREPANCY BETWEEN ACTUAL SELF AND VIRTUAL SELF: THEORETICAL EXTENSIONS, MEASUREMENT AND RELATION TO CONTRIBUTION IN VIRTUAL COMMUNITIES DISCREPANCY BETWEEN ACTUAL SELF AND VIRTUAL SELF: THEORETICAL EXTENSIONS, MEASUREMENT AND RELATION TO CONTRIBUTION IN VIRTUAL COMMUNITIES Ayoung Suh, College of Business Administration, Ewha Womans University,

More information

Slacking and the Internet in the Classroom: A Preliminary Investigation

Slacking and the Internet in the Classroom: A Preliminary Investigation Association for Information Systems AIS Electronic Library (AISeL) SIGHCI 2006 Proceedings Special Interest Group on Human-Computer Interaction 2006 Slacking and the Internet in the Classroom: A Preliminary

More information

Marketing a healthier choice: Exploring young people s perception of e-cigarettes

Marketing a healthier choice: Exploring young people s perception of e-cigarettes Marketing a healthier choice: Exploring young people s perception of e-cigarettes Abstract Background: As a consequence of insufficient evidence on the safety and efficacy of e- cigarettes, there has been

More information

Heavy Smokers', Light Smokers', and Nonsmokers' Beliefs About Cigarette Smoking

Heavy Smokers', Light Smokers', and Nonsmokers' Beliefs About Cigarette Smoking Journal of Applied Psychology 1982, Vol. 67, No. 5, 616-622 Copyright 1982 by the American Psychological Association, Inc. 002I-9010/82/6705-0616S00.75 ', ', and Nonsmokers' Beliefs About Cigarette Smoking

More information

Why We Don t Block 3rd Party Trackers: An Attributional Theory Perspective

Why We Don t Block 3rd Party Trackers: An Attributional Theory Perspective Association for Information Systems AIS Electronic Library (AISeL) WISP 2015 Proceedings Pre-ICIS Workshop on Information Security and Privacy (SIGSEC) Winter 12-13-2015 Why We Don t Block 3rd Party Trackers:

More information

Perceived usefulness. Intention Use E-filing. Attitude. Ease of use Perceived behavioral control. Subjective norm

Perceived usefulness. Intention Use E-filing. Attitude. Ease of use Perceived behavioral control. Subjective norm Project Guidelines Perceived usefulness Attitude Intention Use E-filing Ease of use Perceived behavioral control Subjective norm Introduction Introduction should include support/justification why the research

More information

Personal Talent Skills Inventory

Personal Talent Skills Inventory Personal Talent Skills Inventory Sales Version Inside Sales Sample Co. 5-30-2013 Introduction Research suggests that the most effective people are those who understand themselves, both their strengths

More information

367 4TH INTERNATIONAL CONFERENCE ON BUSINESS AND ECONOMIC

367 4TH INTERNATIONAL CONFERENCE ON BUSINESS AND ECONOMIC 367 4TH INTERNATIONAL CONFERENCE ON BUSINESS AND ECONOMIC INVESTIGATING STUDENTS AWARENESS AND USAGE INTENTION TOWARDS HALAL LABELLED COSMETICS AND PERSONAL CARE PRODUCTS IN MALAYSIA Phuah Kit Teng Graduate

More information

User Acceptance of Mobile Internet Based on. Gender Differences

User Acceptance of Mobile Internet Based on. Gender Differences SOCIAL BEHAVIOR AND PERSONALITY, 2010, 38(3), 415-426 Society for Personality Research (Inc.) DOI 10.2224/sbp.2010.38.3.415 User Acceptance of Mobile Internet Based on THE UNIFIED THEORY OF ACCEPTANCE

More information

Privacy Concern, Locus of Control, and Salience in a Trust-Risk Model of Information Disclosure on Social Networking Sites

Privacy Concern, Locus of Control, and Salience in a Trust-Risk Model of Information Disclosure on Social Networking Sites Association for Information Systems AIS Electronic Library (AISeL) AMCIS 2010 Proceedings Americas Conference on Information Systems (AMCIS) 8-1-2010 Privacy Concern, Locus of Control, and Salience in

More information

The Antecedents of Students Expectation Confirmation Regarding Electronic Textbooks

The Antecedents of Students Expectation Confirmation Regarding Electronic Textbooks Computer Communication & Collaboration (Vol. 2, Issue 3, 2014) The Antecedents of Students Expectation Confirmation Regarding Electronic Textbooks Robert W. Stone (corresponding author) Department of Accounting,

More information

CHAPTER NINE INTERPERSONAL DETERMINANTS OF CONSUMER BEHAVIOR

CHAPTER NINE INTERPERSONAL DETERMINANTS OF CONSUMER BEHAVIOR CHAPTER NINE INTERPERSONAL DETERMINANTS OF CONSUMER BEHAVIOR CHAPTER OBJECTIVES Differentiate between customer behavior and consumer behavior Explain how marketers classify behavioral influences on consumer

More information

Organizational Behaviour

Organizational Behaviour Bachelor of Commerce Programme Organizational Behaviour Individual Behaviour Perception The Da Vinci Institute for Technology Management (Pty) Ltd Registered with the Department of Education as a private

More information

Running head: PRESERVING RELATIONSHIPS WITH AN INTERNET CONNECTION 1

Running head: PRESERVING RELATIONSHIPS WITH AN INTERNET CONNECTION 1 Running head: PRESERVING RELATIONSHIPS WITH AN INTERNET CONNECTION 1 Preserving Relationships With an Internet Connection Zachary Jones COMM 3050 Section 001 April 27, 2015 PRESERVING RELATIONSHIPS WITH

More information

Title: The Theory of Planned Behavior (TPB) and Texting While Driving Behavior in College Students MS # Manuscript ID GCPI

Title: The Theory of Planned Behavior (TPB) and Texting While Driving Behavior in College Students MS # Manuscript ID GCPI Title: The Theory of Planned Behavior (TPB) and Texting While Driving Behavior in College Students MS # Manuscript ID GCPI-2015-02298 Appendix 1 Role of TPB in changing other behaviors TPB has been applied

More information

Doing Quantitative Research 26E02900, 6 ECTS Lecture 6: Structural Equations Modeling. Olli-Pekka Kauppila Daria Kautto

Doing Quantitative Research 26E02900, 6 ECTS Lecture 6: Structural Equations Modeling. Olli-Pekka Kauppila Daria Kautto Doing Quantitative Research 26E02900, 6 ECTS Lecture 6: Structural Equations Modeling Olli-Pekka Kauppila Daria Kautto Session VI, September 20 2017 Learning objectives 1. Get familiar with the basic idea

More information

Type of Education, Locus of Control and Optimistic - Pessimistic. Attitude among Undergraduate College Students

Type of Education, Locus of Control and Optimistic - Pessimistic. Attitude among Undergraduate College Students The International Journal of Indian Psychology ISSN 2348-5396 (e) ISSN: 2349-3429 (p) Volume 2, Issue 4, DIP: B00352V2I42015 http://www.ijip.in July September, 2015 Type of Education, Locus of Control

More information

Individual Swift Trust and Knowledge Based Trust in Face to Face and Virtual Team Members

Individual Swift Trust and Knowledge Based Trust in Face to Face and Virtual Team Members Individual Swift Trust and Knowledge Based Trust in Face to Face and Virtual Team Members Lionel P. Robert Jr., Alan R. Dennis, and Yu Ting Caisy Hung Li o n e l P. Ro b e rt Jr. is an Assistant Professor

More information

Choose a fertility clinic: update

Choose a fertility clinic: update Choose a fertility clinic: update Strategic delivery: Setting standards Increasing and informing choice Demonstrating efficiency economy and value Details: Meeting Authority Agenda item 10 Paper number

More information

Exploring the relationship between user's intention to manage privacy in OSN and the factors of communication under distress

Exploring the relationship between user's intention to manage privacy in OSN and the factors of communication under distress Exploring the relationship between user's intention to manage privacy in OSN and the factors of communication under distress Kijung Lee 1, Il-Yeol Song 2 1 University of Cincinnati 2 Drexel University

More information

This self-archived version is provided for scholarly purposes only. The correct reference for this article is as follows:

This self-archived version is provided for scholarly purposes only. The correct reference for this article is as follows: SOCIAL AFFILIATION CUES PRIME HELP-SEEKING INTENTIONS 1 This self-archived version is provided for scholarly purposes only. The correct reference for this article is as follows: Rubin, M. (2011). Social

More information

Trust in Relationships

Trust in Relationships Trust in Relationships Diamond Management Consulting Page 2 Trust in Relationships Is trust easier to destroy than to build? Cooperation and conflict management research of the last 30 years assumes the

More information

Rong Quan Low Universiti Sains Malaysia, Pulau Pinang, Malaysia

Rong Quan Low Universiti Sains Malaysia, Pulau Pinang, Malaysia International Journal of Accounting & Business Management Vol. 1 (No.1), April, 2013 Page: 99-106 ISSN: 2289-4519 This work is licensed under a Creative Commons Attribution 4.0 International License. www.ftms.edu.my/journals/index.php/journals/ijabm

More information

Why Do People Like to Play Social Network Games with Their Friends? A Focus on Sociability and Playability

Why Do People Like to Play Social Network Games with Their Friends? A Focus on Sociability and Playability Association for Information Systems AIS Electronic Library (AISeL) PACIS 2013 Proceedings Pacific Asia Conference on Information Systems (PACIS) 6-18-2013 Why Do People Like to Play Social Network Games

More information

PREDICTING THE USE OF WEB-BASED INFORMATION SYSTEMS: INTRINSIC MOTIVATION AND SELF-EFFICACY

PREDICTING THE USE OF WEB-BASED INFORMATION SYSTEMS: INTRINSIC MOTIVATION AND SELF-EFFICACY PREDICTING THE USE OF WEB-BASED INFORMATION SYSTEMS: INTRINSIC MOTIVATION AND SELF-EFFICACY Yujong Hwang and Mun Y. Yi University of South Carolina yujongh@yahoo.com myi@moore.sc.edu Abstract This study

More information

Outcome Measurement Guidance

Outcome Measurement Guidance Outcome Measurement Guidance The following learning objectives, goal statements and accompanying outcome items were prepared by the Ohio Department of Health Rape Prevention Education Team to assist you

More information

WE-INTENTION TO USE INSTANT MESSAGING FOR COLLABORATIVE WORK: THE MODERATING EFFECT OF EXPERIENCE

WE-INTENTION TO USE INSTANT MESSAGING FOR COLLABORATIVE WORK: THE MODERATING EFFECT OF EXPERIENCE WE-INTENTION TO USE INSTANT MESSAGING FOR COLLABORATIVE WORK: THE MODERATING EFFECT OF EXPERIENCE Aaron X.L. Shen Department of Information Systems, University of Science and Technology of China City University

More information

How Self-Efficacy and Gender Issues Affect Software Adoption and Use

How Self-Efficacy and Gender Issues Affect Software Adoption and Use How Self-Efficacy and Gender Issues Affect Software Adoption and Use Kathleen Hartzel Today s computer software packages have potential to change how business is conducted, but only if organizations recognize

More information

Main Factors Influencing Mobile Commerce Adoption

Main Factors Influencing Mobile Commerce Adoption Main Factors Influencing Mobile Commerce Adoption 1 Mohammadjafar Esmaeili University of Dayton mesmaeili1@udayton.edu Ali Eydgahi Eastern Michigan University aeydgahi@emich.edu Abstract Mobile commerce

More information

Bridging the Gap: Predictors of Willingness to Engage in an Intercultural Interaction

Bridging the Gap: Predictors of Willingness to Engage in an Intercultural Interaction Bridging the Gap: Predictors of Willingness to Engage in an Intercultural Interaction Heather Dudley What influences people s willingness to interact with someone of a different cultural background from

More information

Attitude Measurement

Attitude Measurement Business Research Methods 9e Zikmund Babin Carr Griffin Attitude Measurement 14 Chapter 14 Attitude Measurement 2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or

More information

The Royal Aeronautical Society

The Royal Aeronautical Society The Royal Aeronautical Society 2010 Membership Survey Summary of Findings based on Research Paper Part One: Joining, renewing and commitment Response A 23% response rate to the survey was achieved, with

More information

Motivational Affordances: Fundamental Reasons for ICT Design and Use

Motivational Affordances: Fundamental Reasons for ICT Design and Use ACM, forthcoming. This is the author s version of the work. It is posted here by permission of ACM for your personal use. Not for redistribution. The definitive version will be published soon. Citation:

More information

SEMINAR ON SERVICE MARKETING

SEMINAR ON SERVICE MARKETING SEMINAR ON SERVICE MARKETING Tracy Mary - Nancy LOGO John O. Summers Indiana University Guidelines for Conducting Research and Publishing in Marketing: From Conceptualization through the Review Process

More information

At the Israel Electric Company: Israel Railways

At the Israel Electric Company: Israel Railways Evaluation of the outcomes of an intervention to reduce the use of drugs and alcohol in the workplace in Israel Navy Shipyards, the Israel Electric Company, and Israel Railways Executive Summary Background:

More information

ENTREPRENEURSHIP AND STEREOTYPES: ARE ENTREPRENEURS FROM MARS OR FROM VENUS?

ENTREPRENEURSHIP AND STEREOTYPES: ARE ENTREPRENEURS FROM MARS OR FROM VENUS? ENTREPRENEURSHIP AND STEREOTYPES: ARE ENTREPRENEURS FROM MARS OR FROM VENUS? VISHAL K. GUPTA University of Missouri Department of Management Columbia, MO 65211-2600 Phone: (573) 882-7659 DANIEL B. TURBAN

More information

A Test of the Technology Acceptance Model The Case of Cellular Telephone Adoption

A Test of the Technology Acceptance Model The Case of Cellular Telephone Adoption A Test of the Technology Acceptance Model The Case of Cellular Telephone Adoption Hyosun Stella Kwon Samsung Electronics Company, Ltd. hsskwon@samsung.co.kr Laku Chidambaram Indiana University, Bloomington

More information

12/31/2016. PSY 512: Advanced Statistics for Psychological and Behavioral Research 2

12/31/2016. PSY 512: Advanced Statistics for Psychological and Behavioral Research 2 PSY 512: Advanced Statistics for Psychological and Behavioral Research 2 Introduce moderated multiple regression Continuous predictor continuous predictor Continuous predictor categorical predictor Understand

More information

Title: Healthy snacks at the checkout counter: A lab and field study on the impact of shelf arrangement and assortment structure on consumer choices

Title: Healthy snacks at the checkout counter: A lab and field study on the impact of shelf arrangement and assortment structure on consumer choices Author's response to reviews Title: Healthy snacks at the checkout counter: A lab and field study on the impact of shelf arrangement and assortment structure on consumer choices Authors: Ellen van Kleef

More information

a, Emre Sezgin a, Sevgi Özkan a, * Systems Ankara, Turkey

a, Emre Sezgin a, Sevgi Özkan a, * Systems Ankara, Turkey Available online at www.sciencedirect.com Procedia - Social and Behavioral Scien ce s 8 ( 0 ) nd World Conference on Educational Technology Researches WCETR0 The role of Gender in Pharmacists Attitudes

More information

Traditional consumer research has frequently employed

Traditional consumer research has frequently employed Self-Monitoring as a Moderating in Consumer Behavior RICHARD C. BECHERER LAWRENCE M. RICHARD* Most consumer research uses either a dispositional or a situational conceptual orientation for all types of

More information

ORIENTATION SAN FRANCISCO STOP SMOKING PROGRAM

ORIENTATION SAN FRANCISCO STOP SMOKING PROGRAM ORIENTATION SAN FRANCISCO STOP SMOKING PROGRAM PURPOSE To introduce the program, tell the participants what to expect, and set an overall positive tone for the series. AGENDA Item Time 0.1 Acknowledgement

More information

Information Sharing on Social Networking Sites: the role of perceived control of information and gender

Information Sharing on Social Networking Sites: the role of perceived control of information and gender Association for Information Systems AIS Electronic Library (AISeL) WISP 2012 Proceedings Pre-ICIS Workshop on Information Security and Privacy (SIGSEC) Winter 11-14-2013 Information Sharing on Social Networking

More information

Standards of Conduct for Transmission Providers

Standards of Conduct for Transmission Providers Standards of Conduct for Transmission Providers Posted and Effective as of December 30, 2016 Puget Sound Energy ( PSE ) is a public utility that owns, operates, and controls facilities used for the transmission

More information

Professional Development: proposals for assuring the continuing fitness to practise of osteopaths. draft Peer Discussion Review Guidelines

Professional Development: proposals for assuring the continuing fitness to practise of osteopaths. draft Peer Discussion Review Guidelines 5 Continuing Professional Development: proposals for assuring the continuing fitness to practise of osteopaths draft Peer Discussion Review Guidelines February January 2015 2 draft Peer Discussion Review

More information

Chapter 3-Attitude Change - Objectives. Chapter 3 Outline -Attitude Change

Chapter 3-Attitude Change - Objectives. Chapter 3 Outline -Attitude Change Chapter 3-Attitude Change - Objectives 1) An understanding of how both internal mental processes and external influences lead to attitude change 2) An understanding of when and how behavior which is inconsistent

More information

CHAPTER 3 METHOD AND PROCEDURE

CHAPTER 3 METHOD AND PROCEDURE CHAPTER 3 METHOD AND PROCEDURE Previous chapter namely Review of the Literature was concerned with the review of the research studies conducted in the field of teacher education, with special reference

More information

THE DYNAMICS OF MOTIVATION

THE DYNAMICS OF MOTIVATION 92 THE DYNAMICS OF MOTIVATION 1. Motivation is a highly dynamic construct that is constantly changing in reaction to life experiences. 2. Needs and goals are constantly growing and changing. 3. As individuals

More information

ISC- GRADE XI HUMANITIES ( ) PSYCHOLOGY. Chapter 2- Methods of Psychology

ISC- GRADE XI HUMANITIES ( ) PSYCHOLOGY. Chapter 2- Methods of Psychology ISC- GRADE XI HUMANITIES (2018-19) PSYCHOLOGY Chapter 2- Methods of Psychology OUTLINE OF THE CHAPTER (i) Scientific Methods in Psychology -observation, case study, surveys, psychological tests, experimentation

More information

Investigating the Strategies to Cope with Resistance to Change in Implementing ICT : A Case Study of Allama Iqbal Open University

Investigating the Strategies to Cope with Resistance to Change in Implementing ICT : A Case Study of Allama Iqbal Open University Investigating the Strategies to Cope with Resistance to Change in Implementing ICT : A Case Study of Allama Iqbal Open University Adnan Riaz Department of Business Administration Allama Iqbal Open University

More information

Postgraduate Diploma in Marketing June 2017 Examination Exploring Consumer Behaviour (ECB)

Postgraduate Diploma in Marketing June 2017 Examination Exploring Consumer Behaviour (ECB) Postgraduate Diploma in Marketing June 2017 Examination Exploring Consumer Behaviour (ECB) Date: 19 June 2017 Time: 0830 Hrs 1130 Hrs Duration: Three (03) Hrs Total marks for this paper is 100 marks. There

More information

Assessing Measurement Invariance in the Attitude to Marriage Scale across East Asian Societies. Xiaowen Zhu. Xi an Jiaotong University.

Assessing Measurement Invariance in the Attitude to Marriage Scale across East Asian Societies. Xiaowen Zhu. Xi an Jiaotong University. Running head: ASSESS MEASUREMENT INVARIANCE Assessing Measurement Invariance in the Attitude to Marriage Scale across East Asian Societies Xiaowen Zhu Xi an Jiaotong University Yanjie Bian Xi an Jiaotong

More information

PDRF About Propensity Weighting emma in Australia Adam Hodgson & Andrey Ponomarev Ipsos Connect Australia

PDRF About Propensity Weighting emma in Australia Adam Hodgson & Andrey Ponomarev Ipsos Connect Australia 1. Introduction It is not news for the research industry that over time, we have to face lower response rates from consumer surveys (Cook, 2000, Holbrook, 2008). It is not infrequent these days, especially

More information

Understanding Consumers Processing of Online Review Information

Understanding Consumers Processing of Online Review Information Understanding Consumers Processing of Online Review Information Matthew McNeill mmcneil@clemson.edu Nomula Siddarth-Reddy snomula@clemson.edu Dr. Tom T. Baker Clemson University School of Marketing 234

More information

Chapter 8: Consumer Attitude Formation and Change

Chapter 8: Consumer Attitude Formation and Change MKT 344 Faculty NNA Consumer Behavior, Ninth Edition Schiffman & Kanuk Chapter 8: Consumer Attitude Formation and Change Attitude A learned tendency to behave in a consistently favorable or unfavorable

More information

The Influence of Hedonic versus Utilitarian Consumption Goals on the Compromise Effect. Abstract

The Influence of Hedonic versus Utilitarian Consumption Goals on the Compromise Effect. Abstract The Influence of Hedonic versus Utilitarian Consumption Goals on the Compromise Effect Abstract This article reports the effects of hedonic versus utilitarian consumption goals on consumers choices between

More information

Active Bystander Behavior: Extended Analysis from the Sexual Conduct: Culture and Respect Survey Tyler Anderson 16 Grinnell College

Active Bystander Behavior: Extended Analysis from the Sexual Conduct: Culture and Respect Survey Tyler Anderson 16 Grinnell College Active Bystander Behavior: Extended Analysis from the Sexual Conduct: Culture and Respect Survey Tyler Anderson 16 Grinnell College Author s note: This document represents the results of a Mentored Advanced

More information

Misplaced Confidences: Privacy and the Control Paradox

Misplaced Confidences: Privacy and the Control Paradox Misplaced Confidences: Privacy and the Control Paradox Laura Brandimarte Alessandro Acquisti George Loewenstein Why are we willing to disclose private information to strangers if, at the same time, we

More information

Chapter Seven. Learning Objectives 10/2/2010. Three Good Reasons Why You Should Care About... Interpersonal Behavior

Chapter Seven. Learning Objectives 10/2/2010. Three Good Reasons Why You Should Care About... Interpersonal Behavior Chapter Seven Interpersonal Behavior in the Workplace Learning Objectives DESCRIBE two types of psychological contracts in work relationships and the types of trust associated with each DESCRIBE organizational

More information

Statistical analysis DIANA SAPLACAN 2017 * SLIDES ADAPTED BASED ON LECTURE NOTES BY ALMA LEORA CULEN

Statistical analysis DIANA SAPLACAN 2017 * SLIDES ADAPTED BASED ON LECTURE NOTES BY ALMA LEORA CULEN Statistical analysis DIANA SAPLACAN 2017 * SLIDES ADAPTED BASED ON LECTURE NOTES BY ALMA LEORA CULEN Vs. 2 Background 3 There are different types of research methods to study behaviour: Descriptive: observations,

More information