The Effect of Perceived Information Control on the Knowledge Sharing

Un-Kon Lee, Kyong Kyu Kim, Ho Hyeon Song

Abstract


The evolution of IT facilitated the communication and knowledge sharing between the social network service (SNS) users. When the more information about SNS users had been posted in SNS site, SNS users had sometimes exposed in the risk of privacy invasion. To remedy this problem, we had introduced the information control mechanisms from the prior studies in data management to the SNS area and empirically validated the effect of these mechanisms in this research. Three information control mechanisms had been elected as access control, reference control and diffusion control. We had conducted a survey to the Facebook users which is the most famous SNS site. 459 data had been gathered and analyzed by PLS algorism. As the results, reference control and diffusion control has significantly increased the trust on SNS providers and decrease the privacy concern. This change could significantly affect on the satisfaction with the SNS site and knowledge sharing intention of SNS users. This study could introduce the new perspective about privacy protection issues in SNS area. Also, the information control mechanisms suggested in this study could contributeto make more robust privacy protectionmechanisms in SNS site in practice.


Full Text:

PDF

References


Acquisti, A. and Gross, R., “Imagined communities : Awareness, information sharing, and privacy on the Facebook,” Presentation at the 2006 privacy enhancing technologies (PET) workshop, Cambridge, England, 2006.

Ahuja, M., Galletta, D., and Carley, K., “Individual Centrality and Performance in Virtual R&D Groups : An Empirical Study,” Management Science, Vol. 49, No. 1, pp. 21-38, 2003.

Ajzen, I., “Behavioral Interventions Based on the Theory of Planned Behavior,” Journal of applied social psychology, pp. 1-6, 2006.

Andrews, S., “Privacy and human rights 2002 : An intenrnational survey of privacy laws and developments,” http://www.privacyinternational.org/survey/phr2002/, 2002.

Barclay, D., Higgins, C., and Thompson, R., “The Partial Least Squares (PLS) Approach to Causal Modeling : Personal Computer Adoption and Use as an Illustration,” Technology Studies, Vol. 2, No. 2, pp. 285-309, 1995.

Beato, F., Kohlweiss, M., and Wouters, K., “Enforcing Access Control in Social Network Sites,” Hot Topics in Privacy, pp. 1-11, 2009.

Bhattacherjee, A. and Premkumar, G., “Understanding Changes in Belief and Attitude Toward Information Technology Usage : A Theoretical Model and Longitudinal Test,” MIS Quarterly, Vol. 28, pp. 229-254, 2004.

Bhattacherjee, A., “Understanding Information Systems Continuance : An Expectation-Confirmation Model,” MIS Quarterly, Vol. 25, No. 3, pp. 351-370, 2001.

Bloter.net, Jung, B. R., “SNS Users per 5 persons in Global,” 2012. 3. 2., http://www.bloter.net/archives/99004.

Bock, G. W., Zmud, R. W., and Kim, Y. G., “Behavioral Intention Formation in Knowledge Sharing : Examining the Roles of Extrinsic Motivators, Social-Psychological Forces, and Organizational Climate,” MIS Quarterly, Vol. 29, No.1, pp. 87-111, 2005.

Boyd, D. M. and Ellison, N. B., “Social network sites:Definition, history and scholarship,” Journal of Computer-Mediated Communication, Vol. 13, No. 1, pp. 210-230, 2007.

Cheung, C. and Lee, M., “Trust in Internet Shopping : Instrument Development and Validation Through Classical and Modern Approaches,” Journal of Global information Management,Vol. 9, No. 3, pp. 23-35, 2001.

Chin, W. W., “The Partial Least Squares Approach to Structural Equation Modeling,” In Marcoulides, G. A. (ed.), Modern methods for business research, pp. 295-336, 1998.

Chin, W. W. and Dibbern, J., “Permutation Based Procedure for Multi-Group PLS Analysis : Results of Tests of Differences on Simulated Data and a Cross of Information System Services between Germany and the USA” in Handbook of Partial Least Squares : Concepts, Methods and Applications in Marketing and Related Fields, V. E. Vinzi, W. W. Chin, J. Henseler, and H. Wang (eds), pp. 171-193, 2010.

Chow, K. and Chan, J., “A Dual-Scheme Approach of Cumulus Parameterization for Simulating the Asian Summer Monsoon,” Meteorological Applications, Vol. 17, No. 3, pp. 287-297, 2010.

Christy, C., Matthew, and Lee, K. O., “Trust in Internet Shopping : A Proposed Model and Measurement Instrument,” Americas Conference on Information Systems, pp. 681-689, 2000.

CNN, Dominique Van Heerden, “Facebook Birthday Invite Leads to Mayhem in Dutch town, Authorities Say,” September 24, 2012, http://edition.cnn.com/2012/09/22/world/europe/netherlands-facebook-riot/index.html.

Culnan, M. J., “How did They Get My Name?:An Exploratory Investigations of Consumer Attitudes toward Secondary Information Use,” MIS Quarterly, Vol. 17, No. 3, pp. 341-363, 1993.

Culnan, M. J. and Bies, R. J., “Consumer privacy : Balancing economic and justice considerations,” Journal of SocialIssues, Vol. 59, No. 2, pp. 323-342, 2003.

DeLone, W. H. and McLean, E. R., “Information Systems Success : The Quest for the Dependent Variable,” information Systems Research, Vol. 3, No. 1, pp. 60-95, 1992.

Donaldson, T. and Dunfee, T. W., “Towards a unified conception of business ethics : Integrative social contracts theory,” Academy of Management Review, Vol. 19, No. 2, pp. 252-284, 1994.

Dwyer, C., Hiltz, S. R., and Passerini, K., “Trust and privacy concern within social networking sites : A comparison of Facebook and MySpace,” Proceedings of the Thirteenth Americas Conference on Information Systems, Keystone, Colorado August, 2007.

eDaily, An, H. S., “The Number of Facebook Users Has Exceeded 1 Billion in 8 Years,” 2012, http://edaily.co.kr/news/ewsRead.edy?SCD=JH41&newsid=01620326599689968&DCD=A00804&OutLnkChk=Y.

eDaily, Yang, H. S., “The Privacy Problems occurred in Twitter Case : Including Account Number, Address, Schedule etc., 2011, http://www.edaily.co.kr/news/NewsRead.edy?SCD=JE31&newsid=02059846596118704&DCD=A00503&OutLnkChk=Y.

Fang, Y. H. and Chiu, C. M., “In Justice We Trust : Exploring Knowledge-Sharing Continuance Intentions in Virtual Communities of Practice,” Computers in Human Behavior, Vol. 26, No. 2, pp. 235-246, 2010.

Filipe B., Markulf K., and Karel W., “Scramble! Your Social Network Data,” Privacy Enhancing Technologies, pp. 211-225, 2011.

Fornell, C. and Larcker, D. F., “Evaluating Structural Equation Models with Unobservable Variables and Measurement Error,” Journal of Marketing Research, Vol. 18, No. 1, pp. 39-50, 1981.

Gatian, A. W., “IS user Satisfaction a Valid Measure of Systems Effectiveness?,” Information and Management, Vol. 26, pp. 119-131, 1994.

Gefen, D. and Straub, D. W., “Consumer Trust in B2C e-Commerce and the Importance of Social Presence : Experiments in e-Products and e-Services,” Omega, Vol. 32, No. 6, pp. 407-424, 2004.

Gefen, D., Karahanna, E., and Straub, D. W., “Trust and TAM in Online Shopping : An Integrated Model,” MIS Quarterly, Vol. 27, No. 1, pp. 51-90, 2003.

Ginzberg, M. J., “Early Diagnosis of MIS Implementation Failure : Promising Results and Unanswered Questions,” Management Science, Vol. 27, No. 4, pp. 459-478, 1981.

Greenfield Online, “Online Marketing Research Conducted on Behalf of Better Business Bureau,” Cybershoppers Research Report #13197, http://greenfieldcentral.com, 1998.

Hewett, K. and William, O. B., “Dependence, Trust, and Relational Behavior on the Part of Foreign Subsidiary Marketing Operations Implication for Managing Global Marketing Operations,” Journal of Marketing, Vol. 65, pp. 51-66, 2001.

Hoffman, D. L., Novak, T. P., and Peralta, M. A., “Information Privacy in the Marketspace : Implications for the Commercial Uses of Anonymity on the Web,” Information Society, Vol. 15, No. 2, pp. 129-140, 1999.

Jarvenpaa, S. L. and Tractinsky, N., “Consumer Trust in an Internet Store : A Cross Cultural Validation,” Journal of Computer Mediated Communication, Vol. 5, No. 2, pp. 1-35, 1999.

Joinson, A. N., “Looking at, Looking up or Keeping up with People? Motives and Use of Facebook,” In : Proc. CHI. ACM Press, pp. 1027-1036, 2008.

Jun, D. Y., Chun, J. M., and Jung, I. L., “An Efficient Privacy-Preserving Data Sharing Scheme in Social Network,” Journal of The Korea Institute of Information Security and Cryptology, Vol. 22, No. 3, pp. 447-461, 2012.

Jung, S. I., Kim, D. M., and Jung, I. L., “Efficient Hop-based Access Control for Private Social Networks,” Journal of The Korea Institute of Information Security and Cryptology, Vol. 22, No. 3, pp. 505-514, 2012.

Kankanhalli, A., Tan, B. C. Y., and Wei, K. K., “Contributing Knowledge to Electronic Knowledge Repositories : an Empirical Investigation,” MIS Quarterly, Vol. 29, No. 1, pp. 113-143, 2005.

Kim, S. S. and Son, J. Y., ”Out of Dedication or Constraint? A Dual Model of Post-Adoption Phenomena and Its Empirical Test in the Context of Online Services,” MIS Quarterly, Vol. 33, No. 1, pp. 49-70, 2009.

Kim, H. S., “A Study on the Possibility of Development ofSocial Media Literacies Using Facebook,” Korean Journal of the Learning Sciences, Vol. 6, No. 2, pp. 20-38, 2012.

Kim, J. H. and Lee, H. H., “Implementation of Privacy Protection Policy Language and Module For Social Network Services,” Journal of The Korea Institute of Information Security and Cryptology, Vol. 21, No. 1, pp. 53-63, 2011.

Kim, J. S., Kim, K. Y., and Na, K. S., “The Effect of Perceived Privacy Concern on B2C Mall Usage Intention,” 2004 Conference of Korean Society of Manage Information Systems, Paper, Seoul, pp. 380-390, 2004.

Kim, M. J. and Choi, Y. G., “The Role of Twitter on Online and Offline Relationship Formation,” Korean Journal of Broadcasting and Telecommunication Studies, Vol. 26, No. 1, pp. 43-82, 2012.

Kim, Y. J., “The Motivation Factors of Relationship Management in SNS : Twitter and Metoday Case,” Disertation of Master Degree, Hongik University, 2010.

Kinney, W., “Information Quality Assurance and Internal Control for Management Decision,” McGraw-Hill Education, 2000.

Korean Communication Agency, “The Diffusion of SNS(Social Network Service),” 2012.

Koufaris, M., “Applying the Technology Acceptance Model and Flow Theory to Online Consumer Behavior,” Information Systems Research, Vol. 13, No. 2, pp. 205-223, 2002.

Koufaris, M. and Hampton-Sosa, W., “The Development of Initial Trust in an Online Company by New Customers,” Information and Management, Vol. 41, pp. 377-397, 2004.

Laudon, K. and Laudon, J., “The Essentials of Business Information Systems,” 12/E, Prentice Hall, 2012.

Ma, M. and Agawal, R., “Through a Glass Darkly : Information Technology Design, Identity Verification, and Knowledge Contribution in Online Communities,” Information Systems Research, Vol. 18, No. 1, pp. 42-67, 2007.

Malhotra, N. K., Kim, S. S., and Agarwal, J., “Internet Users’ Information Privacy Concerns(IUIPC):The Construct, the Scale, and a Causal Model,” Information Systems Research, Vol. 15, No. 4, pp. 336-355, 2004.

Mayer, R. C., Davis, J. H., and Schoorman, F. D., “An Integrative Model of Organizational Trust,” Academy of Management Journal, Vol. 20, No. 3, pp. 709-734, 1995.

McKnight, D. H., Choundhury, V. and Karmer, C., “Developing and Validating Trust Measures for e-Commerce : An Integrative Typology,” Information Systems Research, Vol. 13, No. 3, 2002.

Milberg, S. J., Burke, S. J., Smith, H. J., and Kallman, E. A., “Values, Personal Information Privacy Concerns, and Regulatory Approaches,” Communications of ACM, Vol. 38, No. 12, pp. 65-74, 1995.

Min, C. H. and Ko, W. S., “The Effect of Mobile Privacy Protection Service on Usability of Mobiling Billing Systems,” 2005 Conference of Korean Society of Manage Information Systems, Paper, Seoul, pp. 191-198, 2005.

Miyazaki, A. D. and Fernandez, A., “Consumer perceptions of privacy and security risks for online shopping,” The Journal of Consumer Affairs, Vol. 35, No. 1, pp. 27-44, 2001.

Nicolaou, A. I. and McKnight, D. H., “Perceived Information Quality in Data Exchanges : Effects of Risk, Trust, and Intention to Use,” Information Systems Research, Vol. 17, No. 4, pp. 332-351, 2006.

Nunnally, J. C. and Bernstein, I. H., “Psychometric Theory” (3rd ed.), 1994.

Oliver, R., “A Conceptual Model of Service Quality and Service Satisfaction : Compatible Goals, Different Concept,” Advances in Service Marketing and Management, 1993.

Olmo, J. M. C. and Jamilena, D. M. F., “Regression lineal,” In Martinez, T. L. (coord.), T cnicas de an lisis de datos eninvestigaci n de mercados, pp. 247-280, 2008.

Park, C. H. and Kim, Y. G., “Identifying Key Factors Affecting Consumer Purchase Behavior in an Online Shopping Context,” International Journal of Retail and Distribution Management,Vol. 31, pp. 16-29, 2003.

Park, Y. S., “Who Controls the User’s Privacy on Social Networking Sites,” Journal of Industrial Property, Vol. 37, pp. 337-375, 2012.

Pavlou, P. A. and Gefen, D., “Building Effective Online Marketplaces with Institution-Based Trust,” Information Systems Research, Vol. 15, No. 1, pp. 37-59, 2004.

Warren, S. D. and Brandeis, L. D., “The Right to Privacy,” Harvard Law Review, Vol. IV, No. 5, pp. 193-220, 1890.

Sandhu, R. S. and Samarati, P., “Access Control : Principles and Practice,” IEEE Communications Magazine, pp. 40-48, 1994.

Son, J. Y. and Kim, S. S., “Internet Users’ Information Privacy-Protective Responses : A Taxonomy and A Nomological Model, MIS Quarterly, Vol. 32, No. 3, pp. 503-529, 2008.

Stewart, K. L., “Trust Transfer on the World Wide Web,” Organization Science, Vol. 14, No. 1, pp. 5-17, 2003.

Stutzman, F., “An Evaluation of Identity-Sharing Behavior in Social Network Communities,” International Digital and Media Arts Journal, Vol. 3, No. 1, pp. 10-18, 2006.

Suh, B. M. and Han, I. G., “The Impact of Customer Trust and Perception of Security Control on the Acceptance of Electronic Commerce, International Journal of Electronic Commerce, Vol. 7, No. 3, pp. 135-161, 2003.

Teeni, D., “Review : ACognitive-Affective Model of Organizational Communication For Designing IT,” MIS Quarterly, Vol. 25, No. 2, pp. 251-312, 2001.

Wang, Y. D. and Emurian, H. H., “An Overview of Online Trust : Concepts, Elements, and Implications,” Computers in Human Behavior, Vol. 21, No. 1, pp. 105-125, 2005.

Wasko, M. M. and Faraj, S., “Why Should I share? Examining Social Capital and Knowledge Contribution in Electronic Networks of Practice,” MIS Quarterly, Vol. 29, No. 1, pp. 35-57, 2005.

Werts, C. E., Linn, R. L., and Joreskog. K. G., “Intraclass Reliability Estimates : Testing Structural Assumptions,” Educational and Psychological Measurement, Vol. 34, pp. 25-33, 1973.

Westbrook, R. A. and Reilly, M. D., “Value-Percept Disparity : An Alternative to the Disconfirmation of Expectations Theory of Cons user Satisfaction,” Advances in Consumer Research, Vol. 10, pp. 256-261, 1983.

Westin, A. F., “Privacy and Freedom,” Athenaum, New York, 1967.

Wiemann, J. M., “Explication and Test of a Model of Communicative Competence,” Human Communication Research, Vol. 3, pp. 195-213, 1977.

Wold, H., “Systems Under Indirect Observation Using PLS, in A Second Generation of Multivariate Analysis,” C. Fornell (Ed.), Praeger, New York, pp. 325-347, 1982.

Yoo, I., Shin, J. S., Lee, K. K., and Choi, H. L., “Antecedents to Internet Privacy Concerns and Their Effect on the Trust and the Online Transaction Intention of Internet Users,” Journal of Information Technology Applications and Management, Vol. 25, No. 4, pp. 37-59, 2008.


Refbacks

  • There are currently no refbacks.