Skip to main content
Top
Published in: Information Systems and e-Business Management 2/2014

01-05-2014 | Original Article

Benevolence trust: a key determinant of user continuance use of online social networks

Authors: Cou-Chen Wu, Yves Huang, Chia-Lin Hsu

Published in: Information Systems and e-Business Management | Issue 2/2014

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Online social networking (OSN) has attracted increased attention and growing membership in recent years. In this paper, we propose and test an extended and unified theory of acceptance and use of technology (UTAUT) model, including the additional areas of satisfaction, credibility trust, and benevolence trust, using an empirical survey of 676 OSN users to examine the influence of these factors. The results of regression analysis showed that the four key constructs of UTAUT (social influence, performance expectancy, effort expectancy, and facilitating conditions), as well as satisfaction, credibility trust, and benevolence trust, are all direct determinants of user continuance use of OSN. By comparing the coefficients of regression analysis, the relative importance of each determinant was also demonstrated. Results further indicate that benevolence trust has a much more significant effect on user continuance use of OSN than any other factor. A discussion is offered on the implications of these findings for OSN managers with regard to marketing and operations.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Appendix
Available only for authorised users
Literature
go back to reference Agarwal R, Karahanna E (2000) Time flies when you’re having fun: cognitive absorption and beliefs about information technology usage. MIS Q 24(4):665–694CrossRef Agarwal R, Karahanna E (2000) Time flies when you’re having fun: cognitive absorption and beliefs about information technology usage. MIS Q 24(4):665–694CrossRef
go back to reference Ajzen I, Fishbein M (1980) Understanding attitudes and predicting social behavior. Prentice Hall, Englewood Cliffs Ajzen I, Fishbein M (1980) Understanding attitudes and predicting social behavior. Prentice Hall, Englewood Cliffs
go back to reference Al-Gahtani SS, Hubona GS, Wang J (2007) Information technology (IT) in Saudi Arabia: culture and the acceptance and use of IT. Inf Manage 44(8):681–691CrossRef Al-Gahtani SS, Hubona GS, Wang J (2007) Information technology (IT) in Saudi Arabia: culture and the acceptance and use of IT. Inf Manage 44(8):681–691CrossRef
go back to reference Anderson JC, Gerbing DW (1988) Structural equation modeling in practice: a review and recommended two-step approach. Psychol Bull 103(3):411–423CrossRef Anderson JC, Gerbing DW (1988) Structural equation modeling in practice: a review and recommended two-step approach. Psychol Bull 103(3):411–423CrossRef
go back to reference Aurifeille JM, Medlin CJ (2009) Dimensions of inter-firm trust: benevolence and credibility. In: Aurifeille JM, Medlin CJ, Tisdell C (eds) Trust, globalisation and market expansion. Nova Science Publishers, New York, Ch. 2, pp 9–22 Aurifeille JM, Medlin CJ (2009) Dimensions of inter-firm trust: benevolence and credibility. In: Aurifeille JM, Medlin CJ, Tisdell C (eds) Trust, globalisation and market expansion. Nova Science Publishers, New York, Ch. 2, pp 9–22
go back to reference Awad NF, Krishnan MS (2006) The personalization privacy paradox: an empirical evaluation of information transparency and the willingness to be profiled online for personalization. MIS Q 1(30):13–28 Awad NF, Krishnan MS (2006) The personalization privacy paradox: an empirical evaluation of information transparency and the willingness to be profiled online for personalization. MIS Q 1(30):13–28
go back to reference Bagozzi RP, Heatherton T (1994) A general approach to representing multifaceted personality constructs: application to state self-esteem. Struct Equ Model 1(1):35–67CrossRef Bagozzi RP, Heatherton T (1994) A general approach to representing multifaceted personality constructs: application to state self-esteem. Struct Equ Model 1(1):35–67CrossRef
go back to reference Bhattacherjee A (2001) An empirical analysis of the antecedents of electronic commerce service continuance. Decis Support Syst 32(2):201–214CrossRef Bhattacherjee A (2001) An empirical analysis of the antecedents of electronic commerce service continuance. Decis Support Syst 32(2):201–214CrossRef
go back to reference Borys B, Jemison D (1989) Hybrid arrangements as strategic alliances: theoretical issues in organizational combinations. Acad Manag Rev 14(2):234–249 Borys B, Jemison D (1989) Hybrid arrangements as strategic alliances: theoretical issues in organizational combinations. Acad Manag Rev 14(2):234–249
go back to reference Chang YP, Zhu DH (2012) The role of perceived social capital and flow experience in building users’ continuance intention to social networking sites in China. Comput Hum Behav 28(3):995–1001CrossRef Chang YP, Zhu DH (2012) The role of perceived social capital and flow experience in building users’ continuance intention to social networking sites in China. Comput Hum Behav 28(3):995–1001CrossRef
go back to reference Chaudhuri A, Holbrook M (2001) The chain of effects from brand trust and brand effect to brand performance: the role of brand loyalty. J Mark 65(2):81–93CrossRef Chaudhuri A, Holbrook M (2001) The chain of effects from brand trust and brand effect to brand performance: the role of brand loyalty. J Mark 65(2):81–93CrossRef
go back to reference Chen YH, Barnes S (2007) Initial trust and online buyer behaviour. Ind Manage Data Syst 107(1):21–36CrossRef Chen YH, Barnes S (2007) Initial trust and online buyer behaviour. Ind Manage Data Syst 107(1):21–36CrossRef
go back to reference Chen Z, Huang Y, Sternquist B (2011) Guanxi practice and Chinese buyer–supplier relationships: the buyer’s perspective. Ind Mark Manage 40(4):569–580CrossRef Chen Z, Huang Y, Sternquist B (2011) Guanxi practice and Chinese buyer–supplier relationships: the buyer’s perspective. Ind Mark Manage 40(4):569–580CrossRef
go back to reference Cheung W, Chang MK, Lai VS (2000) Prediction of Internet and World Wide Web usage at work: a test of an extended Triandis Model. Decis Support Syst 30(1):83–100CrossRef Cheung W, Chang MK, Lai VS (2000) Prediction of Internet and World Wide Web usage at work: a test of an extended Triandis Model. Decis Support Syst 30(1):83–100CrossRef
go back to reference Chiu YTH, Fang SC, Tseng CC (2010) Early versus potential adopters: exploring the antecedents of use intention in the context of retail service innovations. Int J Retail Distrib Manage 38(6):443–459CrossRef Chiu YTH, Fang SC, Tseng CC (2010) Early versus potential adopters: exploring the antecedents of use intention in the context of retail service innovations. Int J Retail Distrib Manage 38(6):443–459CrossRef
go back to reference Churchill GA, Suprenant C (1982) An investigation into the determinants of customer satisfaction. J Mark Res 19(4):491–504CrossRef Churchill GA, Suprenant C (1982) An investigation into the determinants of customer satisfaction. J Mark Res 19(4):491–504CrossRef
go back to reference Clinton HR (1996) It takes a village, tenth anniversary edition. Simon & Schuster, New York Clinton HR (1996) It takes a village, tenth anniversary edition. Simon & Schuster, New York
go back to reference Coppola NW, Hiltz SR, Rotter NG (2004) Building trust in virtual teams. IEEE Trans Prof Commun 47(2):95–104CrossRef Coppola NW, Hiltz SR, Rotter NG (2004) Building trust in virtual teams. IEEE Trans Prof Commun 47(2):95–104CrossRef
go back to reference Coulter K, Coulter R (2002) Determinants of trust in a service provider: the moderating role of length of relationship. J Serv Mark 16(1):35–50CrossRef Coulter K, Coulter R (2002) Determinants of trust in a service provider: the moderating role of length of relationship. J Serv Mark 16(1):35–50CrossRef
go back to reference Dirks KT (2000) Trust in leadership and team performance: evidence from NCCA basketball. J Appl Psychol 85(6):1004–1012CrossRef Dirks KT (2000) Trust in leadership and team performance: evidence from NCCA basketball. J Appl Psychol 85(6):1004–1012CrossRef
go back to reference Fogel J, Nehmad E (2009) Internet social network communities: risk taking, trust, and privacy concerns. Comput Hum Behav 25(1):153–160CrossRef Fogel J, Nehmad E (2009) Internet social network communities: risk taking, trust, and privacy concerns. Comput Hum Behav 25(1):153–160CrossRef
go back to reference Foon YS, Fah BCY (2011) Internet banking adoption in Kuala Lumpur: an application of UTAUT model. Int J Bus Manage 6(4):161–167 Foon YS, Fah BCY (2011) Internet banking adoption in Kuala Lumpur: an application of UTAUT model. Int J Bus Manage 6(4):161–167
go back to reference Fornell C (1992) A national customer satisfaction barometer: the Swedish experience. J Mark 56(1):6–21CrossRef Fornell C (1992) A national customer satisfaction barometer: the Swedish experience. J Mark 56(1):6–21CrossRef
go back to reference Fornell C, Larcker DF (1981) Evaluating structural equation models with unobservable variables and measurement error. J Mark Res 18(1):39–50CrossRef Fornell C, Larcker DF (1981) Evaluating structural equation models with unobservable variables and measurement error. J Mark Res 18(1):39–50CrossRef
go back to reference Ganesan S (1994) Determinants of long-term orientation in buyer-seller relationships. J Mark 58(2):1–19CrossRef Ganesan S (1994) Determinants of long-term orientation in buyer-seller relationships. J Mark 58(2):1–19CrossRef
go back to reference Ganesan S, Hess R (1997) Dimensions and levels of trust: implications for commitment to a relationship. Mark Lett 8(4):439–448CrossRef Ganesan S, Hess R (1997) Dimensions and levels of trust: implications for commitment to a relationship. Mark Lett 8(4):439–448CrossRef
go back to reference Garbarino E, Johnson M (1999) The different roles of satisfaction, trust, and commitment in customer relationships. J Mark 63(2):70–87CrossRef Garbarino E, Johnson M (1999) The different roles of satisfaction, trust, and commitment in customer relationships. J Mark 63(2):70–87CrossRef
go back to reference Gefen D (2002) Customer loyalty in e-commerce. J Assoc Inf Syst 3(1):27–51 Gefen D (2002) Customer loyalty in e-commerce. J Assoc Inf Syst 3(1):27–51
go back to reference Gefen D, Straub DW (2004) Consumer trust in B2C e-Commerce and the importance of social presence: experiments in e-Products and e-Services. Omega 32(6):407–424CrossRef Gefen D, Straub DW (2004) Consumer trust in B2C e-Commerce and the importance of social presence: experiments in e-Products and e-Services. Omega 32(6):407–424CrossRef
go back to reference Gefen D, Karahanna E, Straub D (2003) Trust and TAM in online shopping: an integrated model. MIS Q 27(1):51–90 Gefen D, Karahanna E, Straub D (2003) Trust and TAM in online shopping: an integrated model. MIS Q 27(1):51–90
go back to reference Geyskens I, Steenkamp JBEM, Kumar N (1998) Generalizations about trust in marketing channel relationships using meta-analysis. Int J Res Mark 15(3):223–248CrossRef Geyskens I, Steenkamp JBEM, Kumar N (1998) Generalizations about trust in marketing channel relationships using meta-analysis. Int J Res Mark 15(3):223–248CrossRef
go back to reference Grabner-Kraeuter S (2002) The role of consumers’ trust in online-shopping. J Bus Ethics 39(1–2):43–50CrossRef Grabner-Kraeuter S (2002) The role of consumers’ trust in online-shopping. J Bus Ethics 39(1–2):43–50CrossRef
go back to reference Grewal D, Iyer G, Levy M (2004) Internet retailing: enablers, limiters and market consequences. J Bus Res 57(7):703–713CrossRef Grewal D, Iyer G, Levy M (2004) Internet retailing: enablers, limiters and market consequences. J Bus Res 57(7):703–713CrossRef
go back to reference Gupta R, Kabadayi S (2010) The relationship between trusting beliefs and web site loyalty: the moderating role of consumer motives and flow. Psychol Mark 27(2):166–185CrossRef Gupta R, Kabadayi S (2010) The relationship between trusting beliefs and web site loyalty: the moderating role of consumer motives and flow. Psychol Mark 27(2):166–185CrossRef
go back to reference Hair JF, Anderson RE, Tatham RL, Black WC (1995) Multivariate data analysis with readings. Prentice Hall, Englewood Cliffs Hair JF, Anderson RE, Tatham RL, Black WC (1995) Multivariate data analysis with readings. Prentice Hall, Englewood Cliffs
go back to reference Harris LC, Goode MMH (2004) The four levels of loyalty and the pivotal role of trust: a study of online service dynamics. J Retail 80(2):139–158CrossRef Harris LC, Goode MMH (2004) The four levels of loyalty and the pivotal role of trust: a study of online service dynamics. J Retail 80(2):139–158CrossRef
go back to reference Hennington AH, Janz BD (2007) Information systems and healthcare XVI: physician adoption of electronic medical records: applying the UTAUT model in a healthcare context. Commun Assoc Inf Syst 19(5):60–80 Hennington AH, Janz BD (2007) Information systems and healthcare XVI: physician adoption of electronic medical records: applying the UTAUT model in a healthcare context. Commun Assoc Inf Syst 19(5):60–80
go back to reference Jarvenpaa SL, Todd PA (1996/1997) Consumer reactions to electronic shopping on the World Wide Web. Int J Electron Comm 1(2):59–88 Jarvenpaa SL, Todd PA (1996/1997) Consumer reactions to electronic shopping on the World Wide Web. Int J Electron Comm 1(2):59–88
go back to reference Jarvenpaa SL, Knoll K, Leidner DE (1998) Is anybody out there? Antecedents of trust in global virtual teams. J Manage Inf Syst 14(4):29–64 Jarvenpaa SL, Knoll K, Leidner DE (1998) Is anybody out there? Antecedents of trust in global virtual teams. J Manage Inf Syst 14(4):29–64
go back to reference Jarvenpaa SL, Tractinsky N, Vitale M (2000) Consumer trust in an Internet store. Inf Technol Manage 1(1):45–71CrossRef Jarvenpaa SL, Tractinsky N, Vitale M (2000) Consumer trust in an Internet store. Inf Technol Manage 1(1):45–71CrossRef
go back to reference Jones E, Sundaram S, Chin W (2002) Factors leading to sales force automation use: a longitudinal analysis. J Pers Sell Sales Manage 22(3):145–156 Jones E, Sundaram S, Chin W (2002) Factors leading to sales force automation use: a longitudinal analysis. J Pers Sell Sales Manage 22(3):145–156
go back to reference Joreskog KG, Sorbom D (1996) LISREL 8: user’s reference guide, 2nd edn. Scientific Software International, Chicago, IL Joreskog KG, Sorbom D (1996) LISREL 8: user’s reference guide, 2nd edn. Scientific Software International, Chicago, IL
go back to reference Jung EJ, McKnight DH, Jung E, Lankton NK (2011) The surprising lack of effect of privacy concerns on intention to use online social networks. In: Proceedings of AMCIS, Detroit, Michigan, America Jung EJ, McKnight DH, Jung E, Lankton NK (2011) The surprising lack of effect of privacy concerns on intention to use online social networks. In: Proceedings of AMCIS, Detroit, Michigan, America
go back to reference Kim B (2011) Understanding antecedents of continuance intention in social-networking services. Cyberpsychol Behav Soc Netw 14(4):199–205CrossRef Kim B (2011) Understanding antecedents of continuance intention in social-networking services. Cyberpsychol Behav Soc Netw 14(4):199–205CrossRef
go back to reference Krasnova H, Kolesnikova E, Gunther O (2010) Leveraging trust and privacy concerns in online social networks: an empirical study. In: Proceedings of 18th European conference on information systems, South Africa, Pretoria Krasnova H, Kolesnikova E, Gunther O (2010) Leveraging trust and privacy concerns in online social networks: an empirical study. In: Proceedings of 18th European conference on information systems, South Africa, Pretoria
go back to reference Kumar N, Scheer LK, Steenkamp JBEM (1995) The effects of supplier fairness on vulnerable resellers. J Mark Res 32(1):54–65CrossRef Kumar N, Scheer LK, Steenkamp JBEM (1995) The effects of supplier fairness on vulnerable resellers. J Mark Res 32(1):54–65CrossRef
go back to reference Kumar N, Scheer LK, Steenkamp JBEM (1998) Interdependence, punitive capability, and the reciprocation of punitive actions in channel. J Mark Res 35(2):225–235CrossRef Kumar N, Scheer LK, Steenkamp JBEM (1998) Interdependence, punitive capability, and the reciprocation of punitive actions in channel. J Mark Res 35(2):225–235CrossRef
go back to reference Larzelere RE, Huston TL (1980) The dyadic trust scale: toward understanding interpersonal trust in close relationships. J Marriage Fam 42(3):595–604CrossRef Larzelere RE, Huston TL (1980) The dyadic trust scale: toward understanding interpersonal trust in close relationships. J Marriage Fam 42(3):595–604CrossRef
go back to reference Liao C, Palvia P, Chen JL (2009) Information technology adoption behavior life cycle: toward a technology continuance theory (TCT). Int J Inf Manage 29(4):309–320CrossRef Liao C, Palvia P, Chen JL (2009) Information technology adoption behavior life cycle: toward a technology continuance theory (TCT). Int J Inf Manage 29(4):309–320CrossRef
go back to reference Lin HF (2006) Understanding behavioral intention to participate in virtual communities. CyberPsychol Behav 9(5):540–547CrossRef Lin HF (2006) Understanding behavioral intention to participate in virtual communities. CyberPsychol Behav 9(5):540–547CrossRef
go back to reference Lin CP, Anol B (2008) Learning online social support: an investigation of network information technology based on UTAUT. CyberPsychol Behav 11(3):268–272CrossRef Lin CP, Anol B (2008) Learning online social support: an investigation of network information technology based on UTAUT. CyberPsychol Behav 11(3):268–272CrossRef
go back to reference Lin CS, Wu S, Tsai RJ (2005) Integrating perceived playfulness into expectation-confirmation model for web portal context. Inf Manage 42(5):683–693CrossRef Lin CS, Wu S, Tsai RJ (2005) Integrating perceived playfulness into expectation-confirmation model for web portal context. Inf Manage 42(5):683–693CrossRef
go back to reference Lu J, Yao JE, Yu CS (2005) Personal innovativeness, social influences and adoption of wireless Internet services via mobile technology. J Strateg Inf Syst 14(3):245–268CrossRef Lu J, Yao JE, Yu CS (2005) Personal innovativeness, social influences and adoption of wireless Internet services via mobile technology. J Strateg Inf Syst 14(3):245–268CrossRef
go back to reference Lu Y, Zhou T, Wang B (2009) Exploring Chinese users’ acceptance of instant messaging using the theory of planned behavior, the technology acceptance model, and the flow theory. Comput Hum Behav 25(1):29–39CrossRef Lu Y, Zhou T, Wang B (2009) Exploring Chinese users’ acceptance of instant messaging using the theory of planned behavior, the technology acceptance model, and the flow theory. Comput Hum Behav 25(1):29–39CrossRef
go back to reference Luhmann N (1979) Trust and power. Wiley, Chichester Luhmann N (1979) Trust and power. Wiley, Chichester
go back to reference Malhotra Y, Gelletta DF (1999) Extending the technology acceptance model to account for social influence: theoretical bases and empirical validation. In: Proceedings of the 32nd Hawaii international conference on system sciences, Maui, Hawaii, 5–8 January Malhotra Y, Gelletta DF (1999) Extending the technology acceptance model to account for social influence: theoretical bases and empirical validation. In: Proceedings of the 32nd Hawaii international conference on system sciences, Maui, Hawaii, 5–8 January
go back to reference Mayer RC, Davis JH, Schoorman FD (1995) An integrative model of organizational trust. Acad Manage Rev 20(3):709–734 Mayer RC, Davis JH, Schoorman FD (1995) An integrative model of organizational trust. Acad Manage Rev 20(3):709–734
go back to reference McKnight DH, Choudhury V, Kacmar C (2002) Developing and validating trust measures for e-Commerce: an integrative typology. Inf Syst Res 13(3):334–359CrossRef McKnight DH, Choudhury V, Kacmar C (2002) Developing and validating trust measures for e-Commerce: an integrative typology. Inf Syst Res 13(3):334–359CrossRef
go back to reference Moorman C, Zaltman G, Deshpande R (1992) Relationships between providers and users of market research: the dynamics of trust within and between organizations. J Mark Res 29(3):314–328CrossRef Moorman C, Zaltman G, Deshpande R (1992) Relationships between providers and users of market research: the dynamics of trust within and between organizations. J Mark Res 29(3):314–328CrossRef
go back to reference Morgan RM, Hunt SD (1994) The commitment-trust theory of relationship marketing. J Market 58(3):20–38CrossRef Morgan RM, Hunt SD (1994) The commitment-trust theory of relationship marketing. J Market 58(3):20–38CrossRef
go back to reference Nunnally JC (1978) Psychometric theory. McGraw-Hill, New York Nunnally JC (1978) Psychometric theory. McGraw-Hill, New York
go back to reference Orr ES, Sisic M, Ross C, Simmering MG, Arseneault JM, Orr RR (2009) The influence of shyness on the use of Facebook in an undergraduate sample. CyberPsychol Behav 12(3):337–340CrossRef Orr ES, Sisic M, Ross C, Simmering MG, Arseneault JM, Orr RR (2009) The influence of shyness on the use of Facebook in an undergraduate sample. CyberPsychol Behav 12(3):337–340CrossRef
go back to reference Papadopoulou P (2007) Applying virtual reality for trust-building e-commerce environments. Virtual Real 11(2):107–127CrossRef Papadopoulou P (2007) Applying virtual reality for trust-building e-commerce environments. Virtual Real 11(2):107–127CrossRef
go back to reference Park Y, Chen JV (2007) Acceptance and adoption of the innovative use of smartphone. Ind Manage Data Syst 107(9):1349–1365CrossRef Park Y, Chen JV (2007) Acceptance and adoption of the innovative use of smartphone. Ind Manage Data Syst 107(9):1349–1365CrossRef
go back to reference Pavlou PA (2002) Institution-based trust in interorganizational exchange relationships: the role of online B2B marketplaces on trust formation. J Strateg Inf Syst 11(3–4):215–243CrossRef Pavlou PA (2002) Institution-based trust in interorganizational exchange relationships: the role of online B2B marketplaces on trust formation. J Strateg Inf Syst 11(3–4):215–243CrossRef
go back to reference Pavlou PA, Gefen D (2004) Building effective online marketplaces with institution-based trust. Inf Syst Res 15(1):37–59CrossRef Pavlou PA, Gefen D (2004) Building effective online marketplaces with institution-based trust. Inf Syst Res 15(1):37–59CrossRef
go back to reference Pelling EL, White KM (2009) The theory of planned behavior applied to young people’s use of social networking web sites. CyberPsychol Behav 12(6):755–759CrossRef Pelling EL, White KM (2009) The theory of planned behavior applied to young people’s use of social networking web sites. CyberPsychol Behav 12(6):755–759CrossRef
go back to reference Piccoli G, Ives B (2003) Trust and the unintended effects of behavior control in virtual teams. MIS Q 27(3):365–395 Piccoli G, Ives B (2003) Trust and the unintended effects of behavior control in virtual teams. MIS Q 27(3):365–395
go back to reference Reichheld FF, Schefter P (2000) E-loyalty: your secret weapon on the web. Harv Bus Rev 78(4):105–113 Reichheld FF, Schefter P (2000) E-loyalty: your secret weapon on the web. Harv Bus Rev 78(4):105–113
go back to reference Rempel JK, Holmes JG, Zanna MP (1985) Trust in close relationships. J Pers Soc Psychol 49(1):95–112CrossRef Rempel JK, Holmes JG, Zanna MP (1985) Trust in close relationships. J Pers Soc Psychol 49(1):95–112CrossRef
go back to reference Ridings CM, Gefen D, Arinze B (2002) Some antecedents and effects of trust in virtual communities. J Strateg Inf Syst 11(3&4):271–295CrossRef Ridings CM, Gefen D, Arinze B (2002) Some antecedents and effects of trust in virtual communities. J Strateg Inf Syst 11(3&4):271–295CrossRef
go back to reference Rotter JB (1971) Generalized expectancies for interpersonal trust. Am Psychol 26(5):443–452CrossRef Rotter JB (1971) Generalized expectancies for interpersonal trust. Am Psychol 26(5):443–452CrossRef
go back to reference Sheng ML, Hsu CL, Wu CC (2011) The asymmetric effect of online social networking attribute-level performance. Ind Manage Data Syst 111(7):1065–1086CrossRef Sheng ML, Hsu CL, Wu CC (2011) The asymmetric effect of online social networking attribute-level performance. Ind Manage Data Syst 111(7):1065–1086CrossRef
go back to reference Sheppard BH, Hartwick J, Warshaw PR (1988) The theory of reasoned action: a meta-analysis of past research with recommendations for modifications and future research. J Consumer Res 15(3):325–343CrossRef Sheppard BH, Hartwick J, Warshaw PR (1988) The theory of reasoned action: a meta-analysis of past research with recommendations for modifications and future research. J Consumer Res 15(3):325–343CrossRef
go back to reference Shih H (2004) An empirical study on predicting user acceptance of e-shopping on the Web. Inf Manage 41(3):351–368CrossRef Shih H (2004) An empirical study on predicting user acceptance of e-shopping on the Web. Inf Manage 41(3):351–368CrossRef
go back to reference Shin DH (2009) Towards an understanding of the consumer acceptance of mobile wallet. Comput Hum Behav 25(6):1343–1354CrossRef Shin DH (2009) Towards an understanding of the consumer acceptance of mobile wallet. Comput Hum Behav 25(6):1343–1354CrossRef
go back to reference Sledgianowski D, Kulviwat S (2009) Using social network sites: the effects of playfulness, critical mass and trust in a hedonic context. J Comput Inf Syst 49(4):74–83 Sledgianowski D, Kulviwat S (2009) Using social network sites: the effects of playfulness, critical mass and trust in a hedonic context. J Comput Inf Syst 49(4):74–83
go back to reference Stetten AV, Wild U, Chrennikow W (2011) Adopting social network sites-the role of individual IT culture and privacy concerns. In: Proceedings of AMCIS Stetten AV, Wild U, Chrennikow W (2011) Adopting social network sites-the role of individual IT culture and privacy concerns. In: Proceedings of AMCIS
go back to reference Strahilevitz M, Myers JG (1998) Donations to charity as purchase incentives: how well they work may depend on what you are trying to sell. J Consumer Res 24(4):434–446CrossRef Strahilevitz M, Myers JG (1998) Donations to charity as purchase incentives: how well they work may depend on what you are trying to sell. J Consumer Res 24(4):434–446CrossRef
go back to reference Thompson RL, Higgins CA, Howell JM (1991) Personal computing: toward a conceptual model of utilization. MIS Q 15(1):125–143CrossRef Thompson RL, Higgins CA, Howell JM (1991) Personal computing: toward a conceptual model of utilization. MIS Q 15(1):125–143CrossRef
go back to reference Venkatesh V (2000) Determinants of perceived ease of use: integrating control, intrinsic motivation, and emotion into the technology acceptance model. Inf Syst Res 11(4):342–365CrossRef Venkatesh V (2000) Determinants of perceived ease of use: integrating control, intrinsic motivation, and emotion into the technology acceptance model. Inf Syst Res 11(4):342–365CrossRef
go back to reference Venkatesh V, Morris MG (2000) Why don’t men ever stop to ask for directions? Gender, social influence, and their role in technology acceptance and usage behavior. MIS Q 24(1):115–139CrossRef Venkatesh V, Morris MG (2000) Why don’t men ever stop to ask for directions? Gender, social influence, and their role in technology acceptance and usage behavior. MIS Q 24(1):115–139CrossRef
go back to reference Venkatesh V, Morris MG, Davis GB, Davis FD (2003) User acceptance of information technology: toward a unified view. MIS Q 27(3):425–478 Venkatesh V, Morris MG, Davis GB, Davis FD (2003) User acceptance of information technology: toward a unified view. MIS Q 27(3):425–478
go back to reference Wang SM, Lin JCC (2011) The effect of social influence on bloggers’ usage intention. Online Inf Rev 35(1):50–65CrossRef Wang SM, Lin JCC (2011) The effect of social influence on bloggers’ usage intention. Online Inf Rev 35(1):50–65CrossRef
go back to reference Wei TT, Marthandan G, Chong AYL, Ooi KB (2009) What drives Malaysian m-commerce adoption? An empirical analysis. Ind Manage Data Syst 109(3):370–388CrossRef Wei TT, Marthandan G, Chong AYL, Ooi KB (2009) What drives Malaysian m-commerce adoption? An empirical analysis. Ind Manage Data Syst 109(3):370–388CrossRef
go back to reference Wu Y, Tao Y, Yang P (2007) Using UTAUT to explore the behavior of 3G mobile communication users. IEEE Int Conf Ind Eng Eng Manage 2(4):199–203 Wu Y, Tao Y, Yang P (2007) Using UTAUT to explore the behavior of 3G mobile communication users. IEEE Int Conf Ind Eng Eng Manage 2(4):199–203
go back to reference Wu JJ, Chen YH, Chung YS (2010) Trust factors influencing virtual community members: a study of transaction communities. J Bus Res 63(9–10):1025–1032CrossRef Wu JJ, Chen YH, Chung YS (2010) Trust factors influencing virtual community members: a study of transaction communities. J Bus Res 63(9–10):1025–1032CrossRef
go back to reference Ximen LS, Ma GL, Liu QH (2009) The outbreak of the Internet revolution at present. China Machine Press, Beijing Ximen LS, Ma GL, Liu QH (2009) The outbreak of the Internet revolution at present. China Machine Press, Beijing
go back to reference Yang K (2010) Determinants of US consumer mobile shopping services adoption: implications for designing mobile shopping services. J Consumer Mark 27(3):262–270 Yang K (2010) Determinants of US consumer mobile shopping services adoption: implications for designing mobile shopping services. J Consumer Mark 27(3):262–270
go back to reference Yuan X, Lee HS, Kim SY (2010) Present and future of Internet banking in China. J Internet Bank Comm 15(1):1–10 Yuan X, Lee HS, Kim SY (2010) Present and future of Internet banking in China. J Internet Bank Comm 15(1):1–10
go back to reference Zeithaml VA, Berry LL, Parasuraman A (1996) The behavioral consequences of service quality. J Mark 60(2):31–46CrossRef Zeithaml VA, Berry LL, Parasuraman A (1996) The behavioral consequences of service quality. J Mark 60(2):31–46CrossRef
Metadata
Title
Benevolence trust: a key determinant of user continuance use of online social networks
Authors
Cou-Chen Wu
Yves Huang
Chia-Lin Hsu
Publication date
01-05-2014
Publisher
Springer Berlin Heidelberg
Published in
Information Systems and e-Business Management / Issue 2/2014
Print ISSN: 1617-9846
Electronic ISSN: 1617-9854
DOI
https://doi.org/10.1007/s10257-013-0216-1

Other articles of this Issue 2/2014

Information Systems and e-Business Management 2/2014 Go to the issue

Premium Partner