题名

探索社交網路服務採用者之重要信任因素:以Facebook為例

并列篇名

Exploring Important Trust Factors for Social Networking Services Adopters: An Example of Facebook

作者

張樹之(Ernest Shu-Chih Chang);沈威政(Wei-Cheng Shen)

关键词

整合型科技接受模式 ; 隱私疑慮 ; 信任 ; Facebook 採用者 ; SmartPLS ; Unified Theory of Acceptance & Use of Technology (UTAUT) ; Privacy Concern ; Trust ; Facebook Adopters ; SmartPLS

期刊名称

科技管理學刊

卷期/出版年月

20卷2期(2015 / 06 / 01)

页次

71 - 98

内容语文

繁體中文

中文摘要

網際網路的發展趨勢已經從傳統的電子商務,轉變為Web2.0 技術為基礎的互動式模式。創新的社交網路服務(Social Networking Services, SNSs)提供人們娛樂、人際關係拓展、以及商業的應用。然而,人們知覺隱私疑慮卻影響SNSs採用者的信任。本研究利用三個階段研究步驟,來瞭解使用者對於SNSs 的信任因素:1.利用整合型科技接受模式(UTAUT)、隱私疑慮、知覺風險、以及信任等構面進行文獻的彙整;2.邀請Facebook 社交採用者和校園學者,進行半開放式的質化研究的訪談;3.針對努力期望、群體影響、隱私疑慮、知覺風險、以及信任等構面進行社群採用者問卷的填寫和分析。依據本研究的發現,我們認為採用者對於社群網路服務的信任因素,主要是分別受到努力期望、群體影響、以及隱私疑慮等因素的正向和負向的影響,其影響程度又受到使用者的年紀、性別、經驗、自願使用等變數的限制。同時,本研究建議服務提供者應持續發展容易使用的社交工具和避免負向的社群影響因素,都是持續強化採用者信任的方法。最後,我們也針對採用者、社群採用者、以及社群服務提供者提供具體的管理意涵。

英文摘要

The trend of internet has evolved from the traditional E-Commerce to the Web 2.0 paradigm emphasizing interaction and collaboration. The innovative social networking services (SNSs) provide people with entertainment, social relations, and commerce applications. However, the perceived privacy concerns may influence adopters’ trust on using SNSs. To better understand factors affecting users’ trust on SNSs, this research was conducted in three phases. Firstly, a research model was built through literature review to integrate the Unified Theory of Acceptance and Use of Technology (UTAUT) with three important constructs: privacy concerns, perceived risk, and trust. Secondly, subject domain experts of SNSs (specifically, Facebook) from both practitioners and academia were invited to participate qualitative research based interviews. Thirdly, a quantitative empirical study was designed and conducted to study the relationships between important constructs including effort expectancy, social influence, privacy concern, perceived risk, and trust. Our research findings showed that users’ trust on SNSs is mainly influenced by effort expectancy, social influence, and privacy concern. Furthermore, the degree of such influence would be affected by various moderators including age, gender, experience, and voluntariness. Meanwhile, it is suggested by this research that service providers should develop social tools which are easy to use and mitigate the negative factors of social influence, for continuously enhancing adopters’ trust on SNSs. Finally, management implications are also provided to both SNSs adopters and SNSs providers.

主题分类 社會科學 > 管理學
参考文献
  1. Ringle, C. M., Wende, S., & Will, S. (2005), "SmartPLS 2.0 (M3) Beta", From:http://www.smartpls.de/.
  2. Facebook. (2012), 'Facebook Terms and Policies", From: https://www.facebook.com/policies/.
  3. Walker, H. M. (1940), "Degrees of Freedom", Journal of Educational Psychology, Vol.31(4), pp.253–269.
  4. (1998).Modern Methods for Business Research.Mahwah, NJ:Lawrence Erlbaum Associates.
  5. Ajzen, I.(1991).The Theory of Planned Behavior.Organizational Behaviour & Human Decision Processes,50(2),179-211.
  6. Al-Debei, M. M.,Al-Lozi, E.,Papazafeiropoulou, A.(2013).Why People Keep Coming Back to Facebook: Explaining and Predicting Continuance Participation from an Extended Theory of Planned Behaviour Perspective.Decision Support Systems,55,43-54.
  7. Bansal, G.,Zahedi, F. M.,Gefen, D.(2010).The Impact of Personal Dispositions on Information Sensitivity, Privacy Concern and Trust in Disclosing Health Information Online.Decision Support Systems,49(2),138-150.
  8. Barclay, D.,Higgins, C.,Thompson, R.(1995).The Partial Least Squares (PLS) Approach to Causal Modeling: Personal Computer Adoption and Use as an Illustration.Technology Studies,2(2),285-309.
  9. Beldad, A.,Jong, M. D.,Steehouder, M.(2010).How Shall I Trust the Faceless and the Intangible? A Literature Review on the Antecedents of Online Trust.Computers in Human Behavior,26(5),857-869.
  10. Benbasat, I.,Wang, W.(2005).Trust in and Adoption of Online Recommendation Agents.Journal of the Association for Information Systems,6(3),72-101.
  11. Bhattacherjee, A.(2002).Individual Trust in Online Firms: Scale Development and Initial Trust.Journal of Management Information Systems,19(1),213-243.
  12. Boyd, D. M. ,Ellison N. B.(2007).Social Network Sites: Definition, History, and Scholarship.Journal of Computer-Mediated Communication,13(1),210-230.
  13. Braun, M. T.(2013).Obstacles to Social Networking Website Use among Older Adults.Computers in Human Behavior,29(3),673-680.
  14. Bryman, A.(2004).Social Research Methods.Oxford:Oxford University Press.
  15. Chang, C.-W.,Chen, G. M.(2014).College Students' Disclosure of Location-Related Information on Facebook.Computers in Human Behavior,35,33-38.
  16. Chau, P.,Hu, P.(2001).Information Technology Acceptance by Individual Professionals: A Model Comparison Approach.Decision Sciences,32(4),699-719.
  17. Chen, L.,Tsoi, H. K.(2011).Privacy Concern and Trust in Using Social Network Sites: A Comparison between French and Chinese Users.Lecture Notes in Computer Science,6948,234-241.
  18. Chin, W. W.,Marcolin, B. L.,Newsted, P. R.(2003).A Partial Least Squares Latent Variable Modeling Approach for Measuring Interaction Effects: Results from a Monte Carlo Simulation Study and an Electronic Mail Emotion/Adoption Study.Information System Research,14(2),189-217.
  19. Compeau, D. R.,Higgins, C. A.,Huff, S.(1999).Social Cognitive Theory and Individual Reactions to Computing Technology: A Longitudinal Study.MIS Quarterly,23(2),145-158.
  20. Crespo, A. H.,del Bosque, I. R.,Sánchez, M. M.(2009).The Influence of Perceived Risk on Internet Shopping Behavior: A Multidimensional Perspective.Journal of Risk Research,12(2),259-277.
  21. Davis, F. D.(1989).Perceived Usefulness, Perceived Ease of Use, and User Acceptance of Information Technology.MIS Quarterly,13(3),319-339.
  22. Davis, F. D.,Bagozzi, R. P.,Warshaw, P. R.(1992).Extrinsic and Intrinsic Motivation to Use Computers in the Workspace.Journal of Applied Social Psychology,22(14),1111-1132.
  23. Davis, F. D.,Bagozzi, R. P.,Warshaw. P. R.(1989).User Acceptance of Computer Technology: A Comparison of Two Theoretical Models.Management Science,38(8),982-1002.
  24. Davis, G. B.(ed.)(2005).The Blackwell Encyclopedia of Management.Malden, MA:Blackwell.
  25. De Wolf, R.,Willaert, K.,Pierson, J.(2014).Managing Privacy Boundaries Together:Exploring Individual and Group Privacy Management Strategies in Facebook.Computers in Human Behavior,35,444-454.
  26. Dowling, G.,Staelin, R.(1994).A Model of Perceived Risk and Intended Risk Handling Activity.Journal of Consumer Research,21(1),119-135.
  27. Eastlick, M. A.,Lotz, S. L.,Warrington, P.(2006).Understanding online B-to-C Relationships: An Integrated Model of Privacy Concerns, Trust, and Commitment.Journal of Business Research,59(8),877-886.
  28. Featherman, M. S.,Pavlou, P. A.(2003).Predicting e-Services Adoption: A Perceived Risk Facets Perspective.International Journal of Human-Computer Studies,59(4),451-474.
  29. Fishbein, M.,Ajzen, I.(1975).Belief, Attitude, Intention and Behavior: An Introduction to Theory and Research.MA:Addison-Wesley.
  30. Fogel, J.,Nehmad, E.(2009).Internet Social Network Communities: Risk Taking, Trust, & Privacy Concerns.Computers in Human Behavior,25(1),153-160.
  31. Fornell, C. ,Larcker, D. F.(1981).Evaluating Structural Equation Models with Unobservable Variables and Measurement Error.Journal of Marketing Research,18(1),39-50.
  32. Gefen, D.,Karahanna, E.,Straub, D. W.(2003).Trust and TAM in Online Shopping: An Integrated Model.MIS Quarterly,27(1),51-90.
  33. Gefen, D.,Straub, D. W.,Boudreau, M.(2000).Structural Equation Modeling Techniques and Regression: Guidelines for Research Practice.Communications of the Association for Information Systems,4(7),1-78.
  34. Glover, S.,Benbasat, I.(2011).A Comprehensive Model of Perceived Risk of e-Commerce Transactions.International Journal of Electronic Commerce,15(2),47-78.
  35. Goodhue, D. L.,Lewis, W.,Thompson, R.(2012).Does PLS Have Advantages for Small Sample Size or Non-Normal Data.MIS Quarterly,36(3),981-1001.
  36. Grazioli, S. ,Jarvenpaa, S.(2000).Perils of Internet Fraud: An Empirical Investigation of Deception and Trust with Experienced Internet Consumers.IEEE Transactions on Systems, Man, and Cybernetics-Part A: Systems and Humans,30(4),395-410.
  37. Gupta, B.,Iyer, L. S.,Weisskirch, R. S.(2010).Facilitating Global e-Commerce: A Comparison of Consumers' Willingness to Disclose Personal Information Online in the U.S and in India.Journal of Electronic Commerce Research,11(1),41-52.
  38. Hair, J. F., Jr.,Black, W. C.,Babin, B. J.,Anderson, R. E.(2010).Multivariate Data Analysis: A Global Perspective.NJ:Pearson Prentice Hall.
  39. Heidemann, J.,Klier, M.,Probst, F.(2012).Online Social Networks: A Survey of a Global Phenomenon.Computer Networks,56(18),3866-3878.
  40. Hong, S. J.,Thong, J. Y. L.,Tam, K. Y.(2006).Understanding Continued Information Technology Usage Behavior: A Comparison of Three Models in the Context of Mobile Internet.Decision Support Systems,42(3),1819-1834.
  41. Hsu, M.,Chiu, C.(2004).Predicting Electronic Service Continuance with a Decomposed Theory of Planned Behavior.Behaviour & Information Technology,23(5),359-373.
  42. Im, I.,Kim Y.,Han, H.-J.(2008).The Effects of Perceived Risk and Technology Type on Users' Acceptance of Technologies.Information & Management,45(1),1-9.
  43. Jang Y.-T.,Chang, S. E.,Chen, P.-A.(2015).Exploring Social Networking Sites for Facilitating Multi-Channel Retailing.Multimedia Tools and Applications,74(1),159-178.
  44. Jarvenpaa, S. L.,Tractinsky, N.,Vitale, M.(2000).Consumer Trust in an Internet Store.Information Technology and Management,1(1-2),45-71.
  45. Jarvenpaa, S.,Tractinsky, N.(1999).Consumer Trust in an Internet Store.Journal of Computer Mediated Communication,5(2),45-71.
  46. Jin, C. H.(2013).The Perspective of a Revised TRAM on Social Capital Building: The Case of Facebook Usage.Information & Management,50(4),162-168.
  47. Karyda, M.,Gritzalis, S.,Park, J.H.,Kokolakis, S.(2009).Privacy and Fair Information Practices in Ubiquitous Environments.Internet Research,19(2),194-208.
  48. Komiak, S. Y. X.,Benbasat, I.(2006).The Effects of Personalization and Familiarity on Trust and Adoption of Recommendation Agents.MIS Quarterly,30(4),941-960.
  49. Kwan, G. C. E.,Skoric, M. M.(2013).Facebook Bullying: An Extension of Battles in School.Computers in Human Behavior,29(1),16-25.
  50. Kwon, S. J.,Park, E.,Kim, K. J.(2014).What Drives Successful Social Networking Services? A Comparative Analysis of User Acceptance of Facebook and Twitter.The Social Science Journal,51(4),534-544.
  51. Lankton, N. K.,McKnight, D. H.(2011).What Does it Mean to Trust Facebook?: Examining Technology and Interpersonal Trust Beliefs.ACM SIGMIS Database,42(2),32-54.
  52. Lawshe, C. H.(1975).A Quantitative Approach to Content Validity.Personnel Psychology,28(4),563-575.
  53. Lee, M. R.,Yen, D. C.,Hsiao, C. Y.(2014).Understanding the Perceived Community Value of Facebook Users.Computers in Human Behavior,35,350-358.
  54. Li, X.,Hess, T. J.,Valacich, J. S.(2006).Using Attitude and Social Influence to Develop an Extended Trust Model for Information Systems.ACM SIGMIS Database,37(2/3),108-124.
  55. Li, Y.(2011).Empirical Studies on Online Information Privacy Concerns: Literature Review and an Integrative Framework.Communications of the Association for Information Systems,28,453-496.
  56. Malhotra, N. K.,Kim, S. S.,Agarwal, J.(2004).Internet Users' Information Privacy Concerns (IUIPC): The Construct, the Scale, and a Causal Model.Information Systems Research,15(4),336-355.
  57. Martins, C.,Oliveira, T.,Popovič, A.(2014).Understanding the Internet Banking Adoption:A Unified Theory of Acceptance and Use of Technology and Perceived Risk Application.International Journal of Information Management,34(1),1-13.
  58. Mathieson, K.(1991).Predicting User Intentions: Comparing the Technology Acceptance Model with the Theory of Planned Behavior.Information Systems Research,2(3),173-191.
  59. McKnight, D. H.,Choudhury, V.,Kacmar, C.(2002).The Impact of Initial Consumer Trust on Intentions to Transact with a Web Site: A Trust Building Model.Journal of Strategic Information Systems,11(3),297-323.
  60. McKnight, D. H.,Choudhury, V.,Kacmar, C.(2002).Developing & Validating Trust Measures for e‑Commerce: An Integrative Typology.Information Systems Research,13(3),334-359.
  61. Moore, G. C.,Benbasat, I.(1991).Development of an Instrument to Measure the Perceptions of Adopting an Information Technology Innovation.Information Systems Research,2(3),192-222.
  62. Moore, G. C.,Benbasat, I.(1996).Integrating Diffusion of Innovations and Theory of Reasoned Action Models to Predict Utilization of Information Technology by End-Users.Diffusion and Adoption of Information Technology,New York:
  63. Park, J.,Lee, D.,Ahn, J.(2004).Risk-Focused e-Commerce Adoption Model: A Cross-Country Study.Journal of Global Information Technology Management,7(2),6-30.
  64. Pavlou, P. A.,Fygenson, M.(2006).Understanding and Predicting Electronic Commerce Adoption: An Extension of the Theory of Planned Behavior.MIS Quarterly,30(1),115-143.
  65. Pavlou, P.,Gefen, D.(2004).Building Effective Online Marketplaces with Institution-Based Trust.Information Systems Research,15(1),37-59.
  66. Pavlou, P.,Liang, H.,Xue, Y.(2007).Understanding and Mitigating Uncertainty in Online Exchange Relationships: A Principal-Agent Perspective.MIS Quarterly,31(1),105-136.
  67. Petter, S.,Straub, D.,Rai, A.(2007).Specifying Formative Constructs in Information Systems Research.MIS Quarterly,31(4),623-656.
  68. Podsakoff, P. M.,Organ, D. W.(1986).Self-Reports in Organizational Research: Problems and Prospects.Journal of Management,12(4),531-544.
  69. Rauniar, R.,Rawski, G.,Yang, J.,Johnson, B.(2014).Technology Acceptance Model (TAM) and Social Media Usage: An Empirical Study on Facebook.Journal of Enterprise Information Management,27(1),6-30.
  70. Riemenschneider, C. K.,Harrison, D. A,Mykytyn, P. P., Jr.(2003).Understanding IT Adoption Decisions in Small Business: Integrating Current Theories.Information & Management,40(4),269-285.
  71. Shin, D.-H.(2010).The Effects of Trust, Security and Privacy in Social Networking: A Security-Based Approach to Understand the Pattern of Adoption.Interacting with Computers,22(5),428-438.
  72. Simon, J. L.,Burstein, P.(1985).Basic Research Methods in Social Science.New York:Random House.
  73. Smith, H. J.,Milberg, S. J.,Burke S. J.(1996).Information Privacy: Measuring Individuals'Concerns about Organizational Practices.MIS Quarterly,20(2),167-196.
  74. Son, J.-Y.,Kim, S. S.(2008).Internet Users' Information Privacy-Protective Responses: A Taxonomy and a Nomological model.MIS Quarterly,32(3),503-529.
  75. Taddei, S.,Contena, B.(2013).Privacy, Trust and Control: Which Relationships with Online Self-Disclosure?.Computers in Human Behavior,29(3),821-826.
  76. Tan, X.,Qin L.,Kim, Y.,Hsu, J.(2012).Impact of Privacy Concern in Social Networking Web Sites.Internet Research,22(2),211-233.
  77. Taylor, S.,Todd, P.(1995).Assessing IT Usage: The Role of Prior Experience.MIS Quarterly,19(4),561-570.
  78. Tenenhaus, M.,Vinzi, V. E.,Chatelin, Y.-M.,Lauro, C.(2005).PLS Path Modeling.Computational Statistics & Data Analysis,48(1),159-205.
  79. Thompson, R. L.,Higgins, C. A.,Howell, J. M.(1991).Personal Computing: Toward a Conceptual Model of Utilization.MIS Quarterly,15(1),124-143.
  80. Turban, E.,Bolloju N.,Liang, T.-P.(2011).Enterprise Social Networking: Opportunities, Adoption, and Risk Mitigation.Journal of Organizational Computing and Electronic Commerce,21(3),202-220.
  81. Venkatesh, V.,Brown, S. A.(2001).A Longitudinal Investigation of Personal Computers in Homes: Adoption Determinants and Emerging Challenges.MIS Quarterly,25(1),71-102.
  82. Venkatesh, V.,Morris, M. G.(2000).Why Don't Men Ever Stop to Ask For Directions? Gender, Social Influence, and Their Role in Technology Acceptance and Usage Behavior.MIS Quarterly,24(1),115-139.
  83. Venkatesh, V.,Morris, M. G.,Davis G. B.,Davis, F. D.(2003).User Acceptance of Information Technology: Toward a Unified View.MIS quarterly,27(3),425-478.
  84. Vinzi, V. E.(ed.)(2010).Handbook of Partial Least Squares: Concepts, Methods and Applications.Heidelberg:Springer.
  85. Young, A. L.,Quan-Haase, A.(2013).Privacy Protection Strategies on Facebook.Information, Communication & Society,16(4),479-500.
  86. Zhou, T.(2012).Examining Location-Based Services Usage From the Perspectives of Unified Theory of Acceptance and Use of Technology and Privacy Risk.Journal of Electronic Commerce Research,13(2),135-144.
  87. Zhou, T.,Li, H.(2014).Understanding Mobile SNS Continuance Usage in China from the Perspectives of Social Influence and Privacy Concern.Computers in Human Behavior,37,283-289.
被引用次数
  1. 賴錦慧,李維平,伏泳霖(2021)。Churn Prediction Based on the Analysis of Customers' Preferences and Social Behavior on a Big Data Platform。科技管理學刊,26(1),1-28。