Assessing Social Networking from Three Different Perspectives: Toward an Integrative View

Similar documents
Understanding Social Norms, Enjoyment, and the Moderating Effect of Gender on E-Commerce Adoption

User Acceptance of E-Government Services

Trust in E-Commerce Vendors: A Two-Stage Model

External Variables and the Technology Acceptance Model

Physicians' Acceptance of Web-Based Medical Assessment Systems: Findings from a National Survey

An Empirical Study of the Roles of Affective Variables in User Adoption of Search Engines

PREDICTING THE USE OF WEB-BASED INFORMATION SYSTEMS: INTRINSIC MOTIVATION AND SELF-EFFICACY

Acceptance of E-Government Service: A Validation of the UTAUT

ADOPTION PROCESS FOR VoIP: THE UTAUT MODEL

Why Do People Like to Play Social Network Games with Their Friends? A Focus on Sociability and Playability

System and User Characteristics in the Adoption and Use of e-learning Management Systems: A Cross-Age Study

Why We Don t Block 3rd Party Trackers: An Attributional Theory Perspective

The Vital Role of Trust in E-Commerce: A Meta-Analysis

ADOPTION AND USE OF A UNIVERSITY REGISTRATION PORTAL BY UNDERGRADUATE STUDENTS OF BAYERO UNIVERSITY, KANO

Topic 1 Social Networking Service (SNS) Users Theory of Planned Behavior (TPB)

THEORY OF PLANNED BEHAVIOR: A PERSPECTIVE IN INDIA S INTERNET BANKING

EMOTIONAL ATTACHMENT TO IT BRANDS AND TECHNOLOGY ACCEPTANCE

Can We Assess Formative Measurement using Item Weights? A Monte Carlo Simulation Analysis

Antecedents of Virtual Community members' participation: the Triandis Interpersonal behavior Perspective

THE THEORY OF PLANNED BEHAVIOR TO DETERMINE THE SOCIAL NETWORK USAGE BEHAVIOR IN SAUDI ARABIA

THE ROLE OF COLOR IN INFLUENCING TRUST THE ROLE OF COLOR IN INFLUENCING TRUST IN E-COMMERCE WEB SITES

a, Emre Sezgin a, Sevgi Özkan a, * Systems Ankara, Turkey

User Acceptance of Mobile Internet Based on. Gender Differences

A Model of Unethical Usage of Information Technology

The Impact of Rewards on Knowledge Sharing

Issues in Information Systems

Evolution of Trust in Distributed Software Development Teams: A Punctuated Equilibrium Model

Why Is Theory Important?

Toward E-Commerce Website Evaluation and Use: Qualitative and Quantitative Understandings

Determinants of Perceived Usefulness and Perceived Ease of Use in Individual Adoption of Social Network Sites

ROLES OF ATTITUDES IN INITIAL AND CONTINUED ICT USE: A LONGITUDINAL STUDY

EXTENDING THE EXPECTATION- CONFIRMATION MODEL TO EVALUATE THE POST-ADOPTION BEHAVIOR OF IT CONTINUERS AND DISCONTINUERS

Analysis of citizens' acceptance for e-government services: applying the utaut model

An Empirical Study of Health Consumer Beliefs, Attitude and Intentions toward the Use of Self- Service Kiosks

Exploring factors that influence knowledge sharing behavior via SNS

A LONGITUDINAL STUDY OF TRUST AND PERCEIVED USEFULNESS IN CONSUMER ACCEPTANCE OF AN ESERVICE: THE CASE OF ONLINE HEALTH SERVICES

The Relative Importance Of Trust Intentions And Trust Beliefs In Internet Banking Adoption

How Self-Efficacy and Gender Issues Affect Software Adoption and Use

Sharing of Knowledge in Public Knowledge Spaces: Influencing Factors

INVESTGATING THE EFFECT OF SOCIAL INFLUENCE ON INFORMATION TECHNOLOGY ACCEPTANCE

Are Men More Technology-Oriented Than Women? The Role of Gender on the Development of General Computer Self-Efficacy of College Students

Shaping Consumer Perception to Motivate Online Shopping: A Prospect Theory Perspective

Examining the efficacy of the Theory of Planned Behavior (TPB) to understand pre-service teachers intention to use technology*

Investigating the Strategies to Cope with Resistance to Change in Implementing ICT : A Case Study of Allama Iqbal Open University

Research on Software Continuous Usage Based on Expectation-confirmation Theory

Factors Influencing the Usage of Websites: The Case of a Generic Portal in the Netherlands

Exploring the Impact of Instant Messaging (IM) on User Performance and Perceived Workload

AN INVESTIGATION OF INTRINSIC MOTIVATORS FOR ORGANISATIONAL KNOWLEDGE SHARING. (Research in Progress)

The Significance of Mixed Methods Research in Information Systems Research

The Role of Habit in Information Systems Continuance: Examining the Evolving Relationship Between Intention and Usage

CHAPTER III RESEARCH MODEL FRAMEWORK

PERCEIVED TRUSTWORTHINESS OF KNOWLEDGE SOURCES: THE MODERATING IMPACT OF RELATIONSHIP LENGTH

Issues in Information Systems Volume 17, Issue II, pp , 2016

An Investigation of the Determinants of User Acceptance of Information Technology in a West African Nation: The Case of Nigeria

Understanding the Formation of General Computer Self-Efficacy

Seminar Medical Informatics 2015

Deakin Research Online Deakin University s institutional research repository DDeakin Research Online Research Online This is the published version:

Is entrepreneur s photo a crucial element in a crowdfunding webpage?

Electronic Commerce Research and Applications

Privacy Concern, Locus of Control, and Salience in a Trust-Risk Model of Information Disclosure on Social Networking Sites

Perceived usefulness. Intention Use E-filing. Attitude. Ease of use Perceived behavioral control. Subjective norm

A Productivity Review Study on Theory of Reasoned Action Literature Using Bibliometric Methodology

Influence Processes for Practicing Green Information Technology: Elaboration Likelihood Model

An Empirical Investigation of Normative, Affective, and Gender Influence on E-Commerce Systems Adoption

Does Content Relevance Lead to Positive Attitude toward Websites? Exploring the Role of Flow and Goal Specificity

How Personality Affects Continuance Intention: An Empirical Investigation of Instant Messaging

Using the Technology Acceptance Model to assess the impact of decision difficulty on website revisit intentions

A Test of the Technology Acceptance Model The Case of Cellular Telephone Adoption

The Adoption of Mobile Games in China: An Empirical Study

Information Sharing on Social Networking Sites: the role of perceived control of information and gender

Understanding Social Network Usage: Impact of Co- Presence, Intimacy, and Immediacy

Putting the Motivation in Protection Motivation Theory: An Examination of Persuasive Communication via Extrinsic and Intrinsic Means

Content Versus Structure in Information Environments: A Longitudinal Analysis of Website Preferences

THE DETERMINANTS OF KNOWLEDGE SHARING INTENTION IN PROFESSIONAL VIRTUAL COMMUNITIES: AN INTEGRATIVE MODEL

Proposing Leisure Activity Participation and Its Antecedents: A Conceptual Model

Understanding the Intention of Giving Information in Virtual Communities

When Attitudes Don't Predict Behavior: A Study of Attitude Strength

367 4TH INTERNATIONAL CONFERENCE ON BUSINESS AND ECONOMIC

Factors Influencing Individual's Knowledge Seeking Behavior in Electronic Knowledge Repository

Personal Internet Usage at Work: The Dark Side of Technology Adoption

Kyle B. Murray and Gerald Häubl

Striving Instincts And Conative Strengths: Assessing The Test-Retest Reliability Of The Kolbe A tm Index

Unauthorized Information Sharing Vs. Hacking: The Moderating Role of Privacy Concern on Trust Found and Lost

An Exploratory Study on Consumer Psychological Contracts

One-dimensional, Multidimensional and Unidimensional Perspectives in a Multifunctional Device: Comparison of Three Models

An Empirical Study on Causal Relationships between Perceived Enjoyment and Perceived Ease of Use

Running head: PRESERVING RELATIONSHIPS WITH AN INTERNET CONNECTION 1

UNFULFILLED OBLIGATIONS IN RECOMMENDATION AGENT USE

Integrating Emotion and the Theory of Planned Behavior to Explain Consumers Activism in the Internet Web site

Strategy at Work. MedStar Health. Engaging people, improving performance

Qualitative Data Analysis. Richard Boateng, PhD. Arguments with Qualitative Data. Office: UGBS RT18 (rooftop)

RELATIONSHIP BETWEEN RISK AND INTENTION TO PURCHASE IN AN ONLINE CONTEXT: ROLE OF GENDER AND PRODUCT CATEGORY

Exploring the Time Dimension in the Technology Acceptance Model with Latent Growth Curve Modeling

USE AND UPTAKE OF E-BOOKS IN THE LENS OF UNIFIED THEORY OF ACCEPTANCE AND USE OF TECHNOLOGY

Explaining Ethical IT Behavior, Judgment and Awareness Using a Domain Theory Context

reward based power have ability to give you what you want. coercive have power to punish

Building Trust through Social Networking

PHYSICIAN ACCEPTANCE BEHAVIOR OF THE ELECTRONIC MEDICAL RECORDS EXCHANGE: AN EXTENDED DECOMPOSED THEORY OF PLANNED BEHAVIOR

Rewarding Healthy Behaviors: A Step-by-Step Guide to Workplace Incentives for Tobacco Cessation

EXAMINING FACTORS AFFECTING COLLEGE STUDENTS INTENTION TO USE WEB-BASED INSTRUCTION SYSTEMS: TOWARDS AN INTEGRATED MODEL

Transcription:

Association for Information Systems AIS Electronic Library (AISeL) MWAIS 2013 Proceedings Midwest (MWAIS) 5-24-2013 Assessing Social Networking from Three Different Perspectives: Toward an Integrative View Jun He University of Michigan - Dearborn, junhe@umich.edu Follow this and additional works at: http://aisel.aisnet.org/mwais2013 Recommended Citation He, Jun, ": Toward an Integrative View" (2013). MWAIS 2013 Proceedings. 10. http://aisel.aisnet.org/mwais2013/10 This material is brought to you by the Midwest (MWAIS) at AIS Electronic Library (AISeL). It has been accepted for inclusion in MWAIS 2013 Proceedings by an authorized administrator of AIS Electronic Library (AISeL). For more information, please contact elibrary@aisnet.org.

Assessing Social Networking from Three Different Perspectives: Toward an Integrative View Jun He University of Michigan-Dearborn junhe@umich.edu ABSTRACT Social networking is penetrating all corners of our daily life. Many researchers study social networking websites as a special form of computer-mediated communication to be adopted among users, while the social perspective of the phenomenon has been largely ignored. In this study, social networking sites are viewed not only as technological platform of communication and information sharing, but also a social platform of relationship building. Three perspectives of technical, communicational, and social are incorporated in the development of an integrative view of social networking. Keywords Social Networking, SNS, TAM, MOA, Trust, Social Influence INTRODUCTION Although a relatively recent Internet phenomenon, social networking sites (SNS) are accepted by millions of web users, many of them having integrated SNS into their everyday life (Boyd and Ellison, 2007). According to Comscore (2011), an online audience measurement company, social networking accounted for nearly 1 in every 5 minutes spent online globally in October 2011, ranking as the most engaging online activity worldwide. As of September, 2012, Facebook, a popular SNS, claimed to have over one billion monthly active users (Fowler, 2012). Recently, another popular SNS, Twitter, reported to have 200 million-plus monthly active users (Berman, 2013). The proliferation of social networking has affected our life in many aspects. People have devoted significant time to maintaining their accounts at social networking sites (Li, 2011). Companies quickly acknowledge the trend and attempt to explore the business potential. For example, marketing managers have recognized social networking sites as important channels for marketing communications and customer engagement (Lorenzo-Romero et al., 2011; Westland, 2012); human resource managers are using social networking sites for recruiting and candidate selection (Judith, 2007; Kluemper and Rosen, 2009; Davison et al., 2011). Educators also see the potential of using social networking sites for language learning (Harrison and Thomas 2009). Given the growing importance, social networking sites have received increasing attention among IS researchers. Social networking sites are widely viewed as an Internet-based information technology featured with Web2.0 (Harrison and Thomas 2009). Thus, many researchers treated SNS as a special form of computer-mediated communication (Faraj and Johnson, 2011) and developed research models based on technology-driven frameworks, notably the technology acceptance model. However, the social aspect of SNS is largely ignored (Wang et al., 2010). This paper attempts to develop an integrative model of SNS. SNS is viewed as not only a technical platform of communication and information sharing, but also a social platform of relationship building. Incorporating various perspectives in the study of SNS will enrich our understanding on people s behavior of using SNS. To serve this end, the paper reviews the existing literature of SNS. Three perspectives of technical, communicational, and social in the study of SNS are discussed, key factors are identified with hypotheses regarding their impacts on individual behavior. SOCIAL NETWORKING SITES SNSs are primarily used for casual social interaction and social relationship maintenance (Li, 2011). Popular features provided by SNSs include (1) creating online profiles and identities, (2) articulating connections with other users, and (3) expanding these connections through searches of other profiles and networks, and interactions with other users (Boyd & Ellison, 2007). All these features center on a social function of relationship building. This is well reflected in the numerous definitions of SNSs in the literature. For example, Boyd and Ellison (2007) describe SNSs as services based on Internet that Proceedings of the EigthMidwest Association for Information Systems Conference, Normal, Illinois May 24-25, 2013 1

allow individuals to create a list of other users that share a connection, and see and navigate through their list of connections and of those created by others within the system (p.2 ). Kwon and Wen (2010) also depict SNSs as websites that allow building relationships online between persons by means of collecting useful information and sharing it with people (p. 255). As such, SNSs can be viewed from various angles, including the technical perspective, the communication perspective, and the social perspective. EXPLAINING THE USE OF SOCIAL NETWORKING: THREE PERSPECTIVES The proliferation of social networking has attracted much research attention from different disciplines. In this section, three theoretical perspectives are reviewed for their theoretical roots and main propositions. Technology Acceptance: the Technological perspective TAM, introduced by Davis (1989) and Davis et al. (1989), is one of the most widely accepted approaches to explain the adoption of any technology (Venkatesh and Davis, 2000; Lin and Lu, 2000; Gefen et al., 2003a, b; McKechnie et al., 2006; King and He, 2006; Kim et al., 2009), including SNS (e.g. Wang et al., 2010; Lorenzo-Romero et al., 2011). The core model of TAM postulates that one s behavioral intention (BI) to adopt/use a certain technology is determined jointly by the person s perceived ease of use (EU) and perceived usefulness (U) of the target technology; in addition, perceived usefulness partially mediates the relationship between perceived ease of use and behavioral intention. Recent meta-analyses (e.g., King and He 2006) have concluded that TAM is a parsimonious and powerful model to explain people s behavioral intention to adopt and use a new technology. Applying TAM in the context of SNSs, the following hypotheses are developed: H1: The perceived usefulness of a SNS will positively affect one s intention of using the SNS. H2: The perceived ease of use of a SNS will positively affect one s intention of using the SNS. But the application of TAM in the SNS research is not without concern. TAM has its theoretical roots in behavioral research about behavior formation (i.e., the theory of reasoned action) and psychology research about behavior regulation and change (i.e., the social cognitive theory) (Davis et al., 1989). The two references share a common theme: one conducts certain behavior because he/she views the target action as feasible and valuable. In other words, one s behavior is the result of a subjective judgment on the expected consequences. The instrumentalism tradition is also evidenced in TAM: the key determinant of behavior intention perceived usefulness is defined as the prospective user s subjective probability that using a specific application system will increase his or her job performance (Davis et a., 1989; p. 985). Thus, TAM holds an implicit assumption that using the target technology will affect one s overall utility, tangible or intangible. Examining the environment of SNS suggests that such assumption may not hold for SNS. For example, in a study of people s behaviors in online communities, Chu (2011) found that helping behavior is phenomenal among many members; the prevalence of such altruistic behavior, violating the assumption of utility-driven egotistic behavior, drives the development of SNSs as online communities. The limitation of TAM suggests for other theoretical perspectives in the study of SNSs. MOA: A Marketing Communication Perspective Social networking can be viewed as a special channel of communication. In the communication, an entity, either institutional (e.g., a firm) or individual, tries to attract other users through the delivery of information; if the information presents value or is of interest, users will be motivated to pursue relationship with the entity through SNSs. As such, SNSs serve as a channel of communication and deliver information to a large population of users. The way people surf social networking sites is analogous to the way consumers obtain and process brand information from advertisements. The marketing communication theory of MOA provides another theoretical lens for examining the use of SNSs among individual users. Advertising is an important marketing means for vendors to deliver brand information to consumers. The effectiveness of communicating brand information is in part driven by consumers motivation, opportunity, and ability (MOA) to process the information. The MOA theory, originally proposed by MacInnis and Jaworski (1989), posits that the degree to which individuals process marketing communications is based on three factors: (1) motivation, which is driven by the value of the information, refers to the readiness, willingness, interest, and desire to engage in information processing, (2) opportunity, reflects the extent to which a situation is conducive to achieving a desired outcome, and (3) ability, represents the extent to which consumers have the necessary resources (e.g. knowledge, intelligence, money) to achieve an outcome. All the three elements need to be present to enable the process of brand information among consumers. Communication effectiveness can be proactively managed by enhancing individuals levels of the MOA elements (MacInnis et al., 1991). Proceedings of the EigthMidwest Association for Information Systems Conference, Normal, Illinois May 24-25, 2013 2

The MOA framework can be used to explain the degree to which users enter into and engage in the information exchange with other users through SNSs (Gruen et al., 2005). Adjusted for the special context of SNS, motivation can be explained as a user s desire or readiness to engage in SNS-enabled information exchange due to the perceived value of doing so; opportunity can be studied from a negative perspective of impediments (MacInnis et al., 1991) and defined as the restrictions that an individual faces (e.g. time, connection availability, organizational policies); ability can be viewed as the skills or proficiencies that an individual process to engage in the SNS-mediated information exchange process. According to the MOA theory, the three elements will jointly affect users behavior of using SNSs. Thus, the following hypotheses are developed: H3: The perceived value of a SNS (motivation) will positively affect one s intention of using the SNS. H4: The perceived restrictions of accessing a SNS (opportunity) will negatively affect one s intention of using the SNS. H5: The perceived competency of using a SNS (ability) will positively affect one s intention of using the SNS. Trust and Social Influence: A Social Perspective SNS is not only a technical platform of information sharing and communication, but also a social platform of relationship building. The latter has been widely recognized as the main purpose of many SNSs (Lorenzo-Romero et al., 2011). Thus, overlooking the social aspect of SNS will mislead the research by ignoring a major force of driving of users behavior with SNSs. There are several social theories explaining the mechanisms through which individuals build and maintain relationship. The social exchange theory is one of the most popular social theories in the IS research community. Emerged from the interactions between economics, psychology, and sociology, social exchange theory was developed to understand the social behavior of humans in economic undertakings (Homans, 1958). Social exchange theory takes a social psychological and sociological perspective that explains the reciprocity in social relations as the processes of negotiated exchanges between parties. The theory posits that individuals or groups interact with one another on the expectation of rewards and the avoidance of penalties or punishment (Emerson, 1976; Bandura, 1986). Important factors suggested by social exchange theory include perceived benefits, perceived risks, trust, and perceived social values. Of these factors, trust is of great importance to e- commerce in general and to SNSs in particular. Trust is often defined as the willingness of a party (trustor) to be vulnerable to the actions of another party (trustee) based on the expectation that the other (trustee) will perform a particular action important to the trustor, irrespective of the ability to monitor or control the other party (trustee) (Mayer et al., 1995; p. 712). In e-commerce, conducting transactions require customers to provide sensitive information in the absence of formal control mechanisms to monitor such information being appropriately used (Hoffman et al., 1999). Thus, initiating, building, and maintaining trust among customers are widely believed to be the key drivers of success for e-vendors (Friedman et al., 2000; Ba and Pavlou, 2002; Gefen et al., 2003; Pavlou and Gefen, 2004). The same applies for SNSs, a common place for social interaction. To overcome security concerns such as lack of control on information sharing and exchange, users rely on trust to direct their engagement with a SNS. As argued by Ridings and colleagues, the success of SNS is retaining members and promoting use through trust development (Ridings et al., 2002). H6: The level of trust with a SNS will positively affect one s intention of using the SNS. Another social factor that has been widely studied in IS is social influence (Venkatesh and Morris, 2000; Venkatesh et al., 2003) or subjective norm (Davis et al., 1989). Based on the theory of reasoned action ((Fishbein and Ajzen, 1975) and the social cognitive theory (Bandura, 1986), social influence is widely accepted as an important source of information that influences one s behavior on the use of a technology. This is particularly true for SNS, an environment in which one s behavior is deeply immersed in the social interactions with other users. H7: social influence will positively affect one s intension of using the SNS. CONCLUSION Social networking websites have become among the most frequently visited sites on the web. SNSs facilitate social and professional relations among members through discussions and postings, sharing of multimedia content, and organizing events, and accordingly are now comprised of hundreds of millions of members from varying demographic backgrounds (Swartz, 2010). As such, SNS is featured not only as a technical platform for communication and information sharing, but also a social platform of relationship building. SNS studies should carefully examine these features; emphasizing on one and ignoring the other may mislead the research. Proceedings of the EigthMidwest Association for Information Systems Conference, Normal, Illinois May 24-25, 2013 3

The paper studies people s behavior with SNS from the technical, communicational, and social perspectives that are closely related to the phenomenon of social networking. Key factors from each perspective are identified and their impacts on individual behaviors are discussed. The attempt is to develop an integrative view of SNS and to enrich our understanding of the important phenomenon that is presenting an increasing influence in our daily life. REFERENCES 1. Ba, S., and Palvou, P.A. (2002) Evidence of the effect of trust building technology in electronic markets: Price premiums and buyer behavior, MIS Quarterly, 26, 3, 243-268. 2. Bandura, A. (1986), Social Foundations of Thought and Action: A Social Cognitive Theory, Prentice-Hall, Englewood Cliffs: NJ. 3. Berman, D.K. (2013) Is Twitter Really Worth $10 Billion? Wall Street Journal (Online), 26 Feb 2013, http://online.wsj.com/article/sb10001424127887323384604578328303487784818.html?keywords=is+twitter+rea lly+worth+10+billion, accessed on March 7, 2013. 4. Bhattacherjee, A. (2002) Individual trust in online firms: scale development and initial test, Journal of Management Information Systems, 19, 1, 211-241. 5. Comscore (2011), It s a Social World: Top 10 Need-to-Knows About Social Networking and Where It s Headed, available at http://www.comscore.com/press_events/presentations_whitepapers/2011/it_is_a_social_world_top_10_need-toknows_about_social_networking. 6. Davis, F.D. (1989) Perceived usefulness, perceived ease of use, and user acceptance of information technology, MIS Quarterly, 13, 3, 318 340. 7. Davis, F.D., Bagozzi, R.P., and Warshaw, P.R. (1989) User acceptance of computer technology: A comparison of two theoretical models, Management Science, 35, 8, 982-1002. 8. Davision, H.K., Maraist, C., Bing, M.N. (2011) Friend or Foe? The promise and pitfalls of using social networking sites for HR decisions, Journal of Business and Psychology, 16, 2, 153-159. 9. Emerson, R.M. (1976), Social exchange theory, Annual Review of Sociology, 2, pp. 335-362. 10. Facebook (2012) Amendment No. 4 to registration statement on form S-1, available at http://www.sec.gov/archives/edgar/data/1326801/000119312512175673/d287954ds1a.htm. 11. Faraj, S., and Johnson, S.L. (2011) Network exchange patterns in online communities, Organization Science, 22, 6, 1464-1480. 12. Fishbein, M., and Ajzen, I. (1975). Belief, Attitude, Intentions and Behavior: An Introduction to Theory and Research. Boston: Addison-Wesley. 13. Fitts, W.H., Adsms, J.L., Radford, G., Wayne, C.R., Thomas, B.K., Thomas, M.M., (1971) The Self Concept And Self- Actualization. Los Angeles, CA: Western Pyschological Services. 14. Fowler, G.A. (2012) Facebook: One Billion and Counting, Wall Street Journal (Online), 04 Oct 2012, (http://online.wsj.com/article/sb10000872396390443635404578036164027386112.html, accessed on Mar 7, 2013). 15. Friedman, B., Khan, Jr. P.H., and Howe, D.C. (2000) Trust online, Communications of the ACM, 43, 12, 34-40. 16. Gefen, D., Karahanna, E., and Straub, D.W. (2003) Trust and TAM in online shopping: An integrated model, MIS Quarterly, 27, 1, 51-90. 17. Gruen, T.W., Osmonbekov, T. and Czaplewski, A.J. (2005) How e-communities extend the concept of exchange in marketing: An application of the motivation, opportunity, ability (MOA) theory, Marketing Theory, 5, 1, 33-49. 18. He, J. (2011) Understanding the sources and impacts of trust in e-commerce: A meta-analysis, Proceedings of the Seventeenth Americas Conference on Information Systems, Detroit, Michigan August 4-7. 19. Hoffman, D.L., Novak, TP., and Peralta, M. (1999) Building consumer trust online, Communications of the ACM, 42, 4, 80-85. 20. Homans, G.C. (1958). Social behavior as exchange, American Journal of Sociology, 63, 6, 597-606. 21. Judith, R. (2007) Social networking: application for health care recruitment, Nursing Economics, 25, 5, 299-301. Proceedings of the EigthMidwest Association for Information Systems Conference, Normal, Illinois May 24-25, 2013 4

22. Kwon, O. and Wen, Y. (2010) An empirical study of the factors affecting social network service use, Computers in Human Behavior, 26, 2, 254-263. 23. Lorenzo-Romero, C., Constantinides, E., and María-del-Carmen, A. (2011) Consumer adoption of social networking sites: implications for theory and practice, Journal of Research in Interactive Marketing, 5, 2/3, 170-188. 24. Mayer, R.C., Davis, J.H., and Schoorman, F.D. (1995) An integrative model of organizational trust, Academy of Management Review, 20, 3, 709-734. 25. McKnight, D.H., Cummings, L.L., and Chervany, N.L. (1998) Initial trust formation in new organizational relationships. The Academy of Management Review, 23, 3, 473-490. 26. Pavlou, P.A., and Gefen, D. (2004) Building effective online marketplaces with institution-based trust, Information Systems Research, 15, 1, 37-59. 27. Rogers, C. (1951). Client-Centered Therapy: Its Current Practice, Implications and Theory, Constable & Robinson Ltd., London. 28. Rousseau, D.M., Sitkin, S.B., Burt, R.S., and Camerer, C.C. (1998) Not so different after all: A cross-discipline view of trust, Academy of Management Review, 23, 3, 393-404. 29. Standford, L. (2008). Social Exchange theories. In Baxter, L.A. and Braithwaite, D.O. (Eds.), Engaging Theories In Interpersonal Communication: Multiple Perspetives, Thousand Oaks, 377-389. 30. Venkatesh, V., and Morris, M. G. (2000) Why don t men ever stop to ask for directions? Gender, social influence, and their role in technology acceptance and usage behavior, MIS Quarterly, 24, 1, 115-139. 31. Wang, S.C., Sy, E., and Fang, K. (2010) The post-adoption behavior of online knowledge community: Decomposing customer value, The Journal of Computer Information Systems, 51, 2, 60-70. 32. Westland, J.C. (2012) The adoption of social networking technologies in cinema releases, Information Technology and Management, 13. 3, 167-181. Proceedings of the EigthMidwest Association for Information Systems Conference, Normal, Illinois May 24-25, 2013 5