首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 21 毫秒
1.
This paper examines the antecedents of branding co-creation that include social networking sites’(SNSs) participation motivations,customer participation, brand trust and brand loyalty in social media brand communities by applying the “Stimulus-Organism-Response paradigm”. The survey method was used to gather data from 407 social media users. Data were analysed using structural equation modeling techniques. The findings reveal that SNSs’ participation motivations positively influence customer participation, which in turn significantly affects brand trust and brand loyalty. Consequently, both brand trust and brand loyalty positively influence branding co-creation in brand communities on social media. Furthermore, brand trust contributes as a mediator between customer participation and brand loyalty on social media brand communities. Although studies on relationships examined through the lens of the Stimulus-Organism-Response paradigm are popular, to the authors’ surprise there is scant literature examining the relationships between SNSs’ participation motivations, customer participation in social media brand communities, brand trust, brand loyalty and branding co-creation.  相似文献   

2.
Despite mobile applications being at the frontier of mobile computation technologies, security issues pose a threat to their adoption and diffusion. Recent studies suggest that security violations could be mitigated through improved security behaviors and attitudes, not just through better technologies. Existing literature on behavioral security suggests that one of the main predictors of users’ perceptions of security is their perceived privacy concerns. Using communication privacy management theory (CPM), this study examines the effects of privacy-related perceptions, such as privacy risk and the effectiveness of privacy policies, on the security perceptions of mobile app users. To empirically test the proposed theoretical model, two survey studies were conducted using mobile apps requesting less sensitive information (n = 487) and more sensitive information (n = 559). The findings show that the perceived privacy risk negatively influences the perceived security of the mobile apps; the perceived effectiveness of a privacy policy positively influences user perceptions of mobile app security; and perceived privacy awareness moderates the effect of perceived privacy risk on the perceived security of mobile apps. The results also suggest that users have different privacy-security perceptions based on the information sensitivity of the mobile apps. Theoretical and practical implications are discussed.  相似文献   

3.
The findings of our experiments showed that social network sites (SNSs) such as Google Plus, Facebook, and Twitter, have the ability to acquire knowledge about their users’ movements not only within SNSs but also beyond SNS boundaries, particularly among websites that embedded SNS widgets such as Google’s Plus One button, Facebook’s Like button, and Twitter’s Tweet button. In this paper, we analysed the privacy implication of such a practice from a moral perspective by applying Helen Nissenbaum’s decision heuristic derived from her contextual integrity framework in order to answer the question of whether or not an online user’s privacy is being violated by this practice.  相似文献   

4.
In this study, the under-examined area of privacy perception and protection on Chinese social media is investigated. The prevalence of digital technology shapes the social, political and cultural aspects of the lives of urban young adults. The influential Chinese social media platform WeChat is taken as a case study, and the ease of connection, communication and transaction combined with issues of commercialisation and surveillance are discussed in the framework of the privacy paradox. Protective behaviour and tactics are examined through different perceptions of privacy in the digital age. The findings of this study suggest that users possess certain amount of freedoms on WeChat. However, users’ individual privacy attitudes and behaviour in practice suggest they have a declined sense of their own freedom and right to privacy. A privacy paradox exists when users, while holding a high level of concerns, in reality do little to further the protection of their personal information on WeChat. We argue that once a user has ingrained part of their social engagement within the WeChat system, the incentive for them to remain a part of the system outweighs their requirement to secure their privacy online as their decision-making is largely based on a simple cost-benefit analysis. The power and social capital yielded via WeChat is too valuable to give up as WeChat is widely used not only for private conversations, but also for study or work-related purposes. It further blurs the boundaries between the public, the professional and the private, which is a rather unique case compared with other social media around the world.  相似文献   

5.
Video conferencing (VC) applications (apps) have surged in popularity as an alternative to face-to-face communications. Although VC apps offer myriad benefits, it has caught much media attention owing to concerns of privacy infringements. This study examines the key determinants of professionals’ attitude and intentions to use VC apps in the backdrop of this conflicting duality. A conceptual research model is proposed based on theoretical foundations of privacy calculus and extended with conceptualizations of mobile users’ information privacy concerns (MUIPC), trust, technicality, ubiquity, as well as theoretical underpinnings of social presence theory. Structural equation modeling is used to empirically test the model using data collected from 484 professionals. The study offers insights regarding the trade-offs that professionals are willing to make in the face of information privacy concerns associated with VC apps. Based on the findings, the study emphasizes the promotion of privacy protection at the organizational level, control mechanisms that motivate employees to actively engage in privacy protection behavior, and a multi-faceted approach for data transparency within the VC app platforms.  相似文献   

6.
Service failure apologies on social media are a new crisis communication outlet trend used by companies to apologise to affected customers quickly and offer solutions, ultimately to restore customers' trust and brand loyalty. This paper contributes to the nascent literature on companies' social media service failure apologies and fills a gap in the social commerce literature by recognising that due to the open and public nature of social media, these apologies may reach not just affected customers, but also unintended audiences such as potential customers among the general public, which could potentially damage a company's reputation and market share. An online survey administered to 241 customers and 271 non-customers of a famous mobile phone brand, which used YouTube to apologise to its customers for a service failure incident, is used to explore potential behavioural outcomes, after exposure to the apology. Findings confirm that both customers and non-customers of the service provider may become exposed to a social media service failure apology. The hypothesised model predicts behavioural intentions to remain a customer after exposure to the social media service apology better than behavioural intentions to become a customer, even though relationships hold for both groups. Theoretical and managerial implications are discussed.  相似文献   

7.
Social commerce (s-commerce) has become increasingly impactful to e-commerce and has generated potential economic benefits. With the rise of online privacy concerns, we have seen the need to explain how concerns about privacy affect consumers’ social interaction behavior and purchase decision-making on s-commerce sites. Synthesizing the privacy-trust-behavioral intention (PTB) and consumer decision-making models, this study proposes a comprehensive model by specifically refining its privacy and trust from an institutional perspective and investigating the influences of social interaction on purchase intention and actual purchase behaviors. Our results found that institutional privacy assurance positively influences institutional-based trust, which, in turn, affects online social interactions, and consequently increases the likelihood of product purchases on s-commerce sites. Theoretical development of this research contributes to both marketing and information systems disciplines in the social media era.  相似文献   

8.
Voice shopping is becoming increasingly popular among consumers due to the ubiquitous presence of artificial intelligence (AI)-based voice assistants in our daily lives. This study explores how personality, trust, privacy concerns, and prior experiences affect customer experience performance perceptions and the combinations of these factors that lead to high customer experience performance. Goldberg’s Big Five Factors of personality, a contextualized theory of reasoned action (TRA-privacy), and recent literature on customer experience are used to develop and propose a conceptual research model. The model was tested using survey data from 224 US-based voice shoppers. The data were analyzed using partial least squares structural equation modeling (PLS-SEM) and fuzzy-set qualitative comparative analysis (fsQCA). PLS-SEM revealed that trust and privacy concerns mediate the relationship between personality (agreeableness, emotional instability, and conscientiousness) and voice shoppers’ perceptions of customer experience performance. FsQCA reveals the combinations of these factors that lead to high perceptions of customer experience performance. This study contributes to voice shopping literature, which is a relatively understudied area of e-commerce research yet an increasingly popular shopping method.  相似文献   

9.
While users’ discontinuance of use has posed a challenge for social media in recent years, there is a paucity of knowledge on the relationships between different dimensions of overload and how overload adversely affects users’ social media discontinuance behaviors. To address this knowledge gap, this study employed the stressor–strain–outcome (SSO) framework to explain social media discontinuance behaviors from an overload perspective. It also conceptualized social media overload as a multidimensional construct consisting of system feature overload, information overload, and social overload. The proposed research model was empirically validated via 412 valid questionnaire responses collected from Facebook users. Our results indicated that the three types of overload are interconnected through system feature overload. System feature overload, information overload, and social overload engender user exhaustion, which in turn leads to users’ discontinued usage of social media. This study extends current technostress research by demonstrating the value of the SSO perspective in explaining users’ social media discontinuance.  相似文献   

10.
The only way to be aware of the risks and threats of Facebook, the most commonly used social networking site in the world and Turkey, is to be a careful user changing the default settings or simply not to have a Facebook account. In Turkey, there is still no study in which personal information shared though social networking sites has been evaluated in terms of privacy. For this reason, the findings obtained of this study have a great importance in the general picture of the current situation and drawing attention to the risks of the issue in Turkey where there are no legal arrangements effectively protecting the users from such sites. This study aims to investigate the Facebook privacy of information professionals who are members of KUTUP-L, and to determine the sensitivity and level of awareness of information professionals in Turkey. Facebook user profiles of 400 information professionals, all KUTUP-L members, have been analyzed in a study examining 32 different privacy settings. A privacy score has been calculated for each user, and the relations between privacy results have been analyzed. The findings at the end of the study show that information professionals in Turkey do pay attention to privacy, and most of the users change the default settings in order to protect their personal information.  相似文献   

11.
Companies are increasingly relying on social media brand communities to interact with consumers and achieve business values. Thus, it is essential to understand how companies can extract value from consumers in social media brand communities. We develop a model clarifying the dual concept of consumer value and illustrating how consumer-perceived value can be transformed into consumer-generated value from a trust transfer perspective. Specifically, we identify three types of consumer-perceived value: utilitarian, hedonic, and social. We capture consumer-generated value in terms of purchase intention and social media word of mouth. Using a two-wave survey, our results strongly support the research model. Specifically, the three types of consumer-perceived values positively affect consumer trust in social media brand communities, which in turn leads to trust in brand and in social media and, thereafter, consumers’ subsequent social media word of mouth and purchase intentions. Our study makes several contributions to the strategic information systems literature concerning leveraging social media brand communities into business strategies. Theoretically, our study expands the understanding of the dual concept of consumer value in social media brand communities through the trust transfer theory. Practically, our study delivers insights for companies into how social media brand communities can be used as a strategic tool for achieving business values.  相似文献   

12.
Social networking sites like Facebook are rapidly gaining in popularity. At the same time, they seem to present significant privacy issues for their users. We analyze two of Facebooks’s more recent features, Applications and News Feed, from the perspective enabled by Helen Nissenbaum’s treatment of privacy as “contextual integrity.” Offline, privacy is mediated by highly granular social contexts. Online contexts, including social networking sites, lack much of this granularity. These contextual gaps are at the root of many of the sites’ privacy issues. Applications, which nearly invisibly shares not just a users’, but a user’s friends’ information with third parties, clearly violates standard norms of information flow. News Feed is a more complex case, because it involves not just questions of privacy, but also of program interface and of the meaning of “friendship” online. In both cases, many of the privacy issues on Facebook are primarily design issues, which could be ameliorated by an interface that made the flows of information more transparent to users.  相似文献   

13.
Prior literature suggests that social media users are increasingly experiencing social media fatigue. Only recently have scholars undertaken empirical studies to investigate its antecedents and outcomes to better understand the impact of fatigue on social media users. To further this understanding, the present study has conducted a cross-sectional survey with 1552 users. The Stress-Strain-Outcome (SSO) theoretical framework is applied to examine if privacy concerns, self-disclosure, parental mediation strategies, and decrement in academic performance due to social media use correlate with social media fatigue. Two forms of fatigue are considered, namely, fatigue due to social networking site (SNS) and mobile instant messaging (MIM) use. The study results suggest that privacy concerns, self-disclosure, parental encouragement and worry significantly and positively correlate with SNS and MIM fatigue. Parental permission and parental monitoring are either not or lowly associated with fatigue. In addition to this, SNS and MIM fatigue positively correlated with the tendency to experience academic decrement due to social media use. The antecedents and consequences of social media fatigue were similar for SNS and MIM users. Moreover, students perceived their parents to be more open to their MIM use, and they had higher self-disclosure in MIM than in SNS. The study concludes with significant implications for practitioners, policy makers as well as service designers.  相似文献   

14.
[目的/意义]社交网络已广泛渗入到人们的日常生活中,用户对所提供个人数据的隐私关注一直存在,但却依然持续使用社交网络,需要解析产生这种现象的原因。[方法/过程]运用社会影响理论,通过解析用户使用社交网络的隐私成本(即隐私关注)和隐私收益(即行为诱导:人际关系管理,自我展示,主观规范),建立隐私权衡模型,分析用户的隐私权衡行为,寻找隐私关注困扰下用户持续使用社交网络的动机。[结果/结论]用户提供个人数据并持续使用社交网络的动机并非是忽略了隐私关注,而是行为诱导(包括人际关系管理和自我展示)的正面影响超过隐私关注的负面影响。  相似文献   

15.
In 2008, a group of researchers publicly released profile data collected from the Facebook accounts of an entire cohort of college students from a US university. While good-faith attempts were made to hide the identity of the institution and protect the privacy of the data subjects, the source of the data was quickly identified, placing the privacy of the students at risk. Using this incident as a case study, this paper articulates a set of ethical concerns that must be addressed before embarking on future research in social networking sites, including the nature of consent, properly identifying and respecting expectations of privacy on social network sites, strategies for data anonymization prior to public release, and the relative expertise of institutional review boards when confronted with research projects based on data gleaned from social media.  相似文献   

16.
[目的/意义]用户的微信使用行为,涉及使用动机、隐私关注和隐私行为三个问题,研究目的在于探讨三者之间的关系。[方法/过程]以隐私关注为中介变量,使用动机为前因变量,隐私行为为结果变量,构建用户使用微信的APCO模型,设计量表,测度微信用户对这三个变量的认知,进行相关性分析与回归分析,探讨三者之间的联系。[结果/结论]结果表明,使用动机与隐私关注整体上相关性较弱,但其中的关系保持和信息搜寻动机对隐私关注存在正向影响;隐私关注对隐私行为中的隐私保护存在正向影响,但在使用动机与自我披露之间的中介作用并不显著;使用动机中的关系建立对隐私行为中的自我披露具有显著正向作用。  相似文献   

17.
With rising numbers of Facebook, Twitter and MXit users, Africa is increasingly gaining prominence in the sphere of social networking. Social media is increasingly becoming main stream; serving as important tools for facilitating interpersonal communication, business and educational activities. Qualitative analyses of relevant secondary data show that children and youths aged between 13 and 30 constitute Africa’s heaviest users of social media. Media reports have revealed cases of abuse on social media by youths. Social networks have severally been used as tools for perpetuating crimes such as; cyberbullying and violence against girls and women. This study proposes a ‘Culture-centered Approach’ to the use of social media in a bid to minimize these cybercrimes and encourage the responsible use of social media amongst African youths. The Culture-centered Approach, which incorporates the tenets of Information Ethics, stresses the need for the respect of the dignity and rights of other online users as well the application of good cultural values and ethical behavior while on social media platforms.  相似文献   

18.
Consideration of social media use for issues of risk communication has received rapid attention in the scholarly literature. However, specific features of social media and their relevance for risk communication warrant continued investigation. The current study examines how system-generated cues available in social media impact perceptions of trust at the organizational level. After viewing one of three mock Twitter pages from an organization that varied the number of retweets concerning the risk of contaminated food in grocery stores, participants were asked to report their perceived trust in the organization. Data indicate a reverse bandwagon or snob effect, such that having too many retweets results in lower judgments of organizational trust. Results are discussed in addition to limitations and future directions for research.  相似文献   

19.
朱侯  李佳纯 《现代情报》2009,40(3):169-177
[目的/意义] 为研究中国情境下社交媒体用户隐私设置行为的影响机制,为隐私设置功能的设计与开发提供参考依据。[方法/过程] 本文以微信活跃用户为研究对象,基于计划行为理论和技术接受模型,构建了隐私设置行为影响因素理论模型。[结果/结论] 研究结果表明:隐私设置行为主要受到隐私设置意愿和感知控制影响;隐私关注、感知有用性、感知易用性正向影响隐私设置意愿;感知易用性、信任、交互公平正向影响感知控制;隐私关注和感知易用性都正向影响感知有用性。  相似文献   

20.
Over the past decade, social media technologies have become effective tools not only for entertainment, but also for online health communications. In virtual health communities (VHCs), the members often share their personal health information (PHI) with other members. These information exchanges provide benefits to both the information providers as well as the recipients. The PHI disclosure, however, may entail privacy concerns. Our study used the privacy calculus model to examine the trade-off between individuals’ expected benefits and privacy concerns when disclosing PHI in social media environments. Our results showed that age, health status, and affective commitment influence the balance between the information disclosure drivers and barriers in the privacy calculus model. More specifically, we found that among members of VHCs, healthier people expect to receive fewer personal benefits of communicating PHI in social media environments. Moreover, individuals who are emotionally attached to online communities expect to both receive and provide more benefits while communicating PHI in those communities. We also observed that individuals who are familiar with but not members of VHCs, especially those who are young and healthy, are more concerned about their PHI privacy in online communities.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号