Skip to main content
Top
Published in: Journal of Business Ethics 1/2016

10-09-2014

Exploring the Security of Information Sharing on Social Networking Sites: The Role of Perceived Control of Information

Authors: Nick Hajli, Xiaolin Lin

Published in: Journal of Business Ethics | Issue 1/2016

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Social networking sites (SNS) have challenged ethical issues about users’ information security and privacy. SNS users are concerned about their privacy and need to control the information they share and its use. This paper examines the security of SNS by taking a look at the influence of users’ perceived control of information over their information-sharing behaviors. Employing an empirical study, this paper demonstrates the importance of perceived control in SNS users’ information-sharing behaviors. Specifically, perceived control has been found to be negatively related to perceived privacy risk and attitude toward information sharing, which in turn has an impact on their information-sharing behaviors. In addition, gender has been shown to be an important factor that moderates the influences of both perceived control and perceived privacy risk on SNS users’ attitudes toward information sharing. Theoretical and practical implications are discussed.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Appendix
Available only for authorised users
Literature
go back to reference Ahuja, M. K., & Thatcher, J. B. (2005). Moving beyond intentions and toward the theory of trying: Effects of work environment and gender on post-adoption information technology use. MIS Quarterly, 29, 427–459. Ahuja, M. K., & Thatcher, J. B. (2005). Moving beyond intentions and toward the theory of trying: Effects of work environment and gender on post-adoption information technology use. MIS Quarterly, 29, 427–459.
go back to reference Ajzen, I. (1991). The theory of planned behavior. Organizational Behavior and Human Decision Processes, 50, 179–211.CrossRef Ajzen, I. (1991). The theory of planned behavior. Organizational Behavior and Human Decision Processes, 50, 179–211.CrossRef
go back to reference Ajzen, I. (2001). Nature and operation of attitudes. Annual Review of Psychology, 52, 27–58.CrossRef Ajzen, I. (2001). Nature and operation of attitudes. Annual Review of Psychology, 52, 27–58.CrossRef
go back to reference AJZEN, I. 2002. Attitudes. In R. Fernandez Ballesteros (Ed.), Encyclopedia of psychological assessment. London: Sage Publications, 1:110-115 AJZEN, I. 2002. Attitudes. In R. Fernandez Ballesteros (Ed.), Encyclopedia of psychological assessment. London: Sage Publications, 1:110-115
go back to reference Arnold, V., Benford, T., Hampton, C., & Sutton, S. G. (2010). Competing pressures of risk and absorptive capacity potential on commitment and information sharing in global supply chains. European Journal of Information Systems, 19, 134–152.CrossRef Arnold, V., Benford, T., Hampton, C., & Sutton, S. G. (2010). Competing pressures of risk and absorptive capacity potential on commitment and information sharing in global supply chains. European Journal of Information Systems, 19, 134–152.CrossRef
go back to reference Averill, J. R. (1973). Personal control over aversive stimuli and its relationship to stress. Psychological Bulletin, 80, 286.CrossRef Averill, J. R. (1973). Personal control over aversive stimuli and its relationship to stress. Psychological Bulletin, 80, 286.CrossRef
go back to reference Bandura, A. (1982). Self-efficacy mechanism in human agency. American Psychologist, 37, 122.CrossRef Bandura, A. (1982). Self-efficacy mechanism in human agency. American Psychologist, 37, 122.CrossRef
go back to reference Bandura, A. (1997). Self-efficacy: The exercise of control. New York: Freeman. Bandura, A. (1997). Self-efficacy: The exercise of control. New York: Freeman.
go back to reference Barnes, SB. (2006). A privacy paradox: Social networking in the United States. First Monday, 11 Barnes, SB. (2006). A privacy paradox: Social networking in the United States. First Monday, 11
go back to reference Baronas, A.-M. K., & Louis, M. R. (1988). Restoring a sense of control during implementation: how user involvement leads to system acceptance. Mis Quarterly, 12, 111–124.CrossRef Baronas, A.-M. K., & Louis, M. R. (1988). Restoring a sense of control during implementation: how user involvement leads to system acceptance. Mis Quarterly, 12, 111–124.CrossRef
go back to reference Bélanger, F., & Crossler, R. E. (2011). Privacy in the digital age: a review of information privacy research in information systems. MIS Quarterly, 35, 1017–1042. Bélanger, F., & Crossler, R. E. (2011). Privacy in the digital age: a review of information privacy research in information systems. MIS Quarterly, 35, 1017–1042.
go back to reference Belanger, F., Hiller, J. S., & Smith, W. J. (2002). Trustworthiness in electronic commerce: The role of privacy, security, and site attributes. The Journal of Strategic Information Systems, 11, 245–270.CrossRef Belanger, F., Hiller, J. S., & Smith, W. J. (2002). Trustworthiness in electronic commerce: The role of privacy, security, and site attributes. The Journal of Strategic Information Systems, 11, 245–270.CrossRef
go back to reference Berings, D., & Adriaenssens, S. (2012). The role of business ethics, personality, work values and gender in vocational interests from adolescents. Journal of Business Ethics, 106, 325–335.CrossRef Berings, D., & Adriaenssens, S. (2012). The role of business ethics, personality, work values and gender in vocational interests from adolescents. Journal of Business Ethics, 106, 325–335.CrossRef
go back to reference Betz, M., O’Connell, L., & Shepard, J. M. (1989). Gender differences in proclivity for unethical behavior. Journal of Business Ethics, 8, 321–324.CrossRef Betz, M., O’Connell, L., & Shepard, J. M. (1989). Gender differences in proclivity for unethical behavior. Journal of Business Ethics, 8, 321–324.CrossRef
go back to reference Bugental, D., Blue, J., & Cruzcosa, M. (1989). Perceived control over caregiving outcomes: Implications for child abuse. Developmental Psychology, 25, 532–539.CrossRef Bugental, D., Blue, J., & Cruzcosa, M. (1989). Perceived control over caregiving outcomes: Implications for child abuse. Developmental Psychology, 25, 532–539.CrossRef
go back to reference Burger, J. M. (1989). Negative reactions to increases in perceived personal control. Journal of Personality and Social Psychology, 56, 246.CrossRef Burger, J. M. (1989). Negative reactions to increases in perceived personal control. Journal of Personality and Social Psychology, 56, 246.CrossRef
go back to reference Chai, S., Das, S., & Rao, H. R. (2011). Factors affecting bloggers’ knowledge sharing: An investigation across gender. Journal of Management Information Systems, 28, 309–342.CrossRef Chai, S., Das, S., & Rao, H. R. (2011). Factors affecting bloggers’ knowledge sharing: An investigation across gender. Journal of Management Information Systems, 28, 309–342.CrossRef
go back to reference Chiu, C.-M., Hsu, M.-H., & Wang, E. T. (2006). Understanding knowledge sharing in virtual communities: an integration of social capital and social cognitive theories. Decision Support Systems, 42, 1872–1888.CrossRef Chiu, C.-M., Hsu, M.-H., & Wang, E. T. (2006). Understanding knowledge sharing in virtual communities: an integration of social capital and social cognitive theories. Decision Support Systems, 42, 1872–1888.CrossRef
go back to reference Connell, J. P. (1985). A new multidimensional measure of children’s perceptions of control. Child Development, 56, 1018–1041.CrossRef Connell, J. P. (1985). A new multidimensional measure of children’s perceptions of control. Child Development, 56, 1018–1041.CrossRef
go back to reference D’arcy, J., & Hovav, A. (2009). Does one size fit all? Examining the differential effects of IS security countermeasures. Journal of Business Ethics, 89, 59–71.CrossRef D’arcy, J., & Hovav, A. (2009). Does one size fit all? Examining the differential effects of IS security countermeasures. Journal of Business Ethics, 89, 59–71.CrossRef
go back to reference Davenport, T. H., & Pruzak, L. (2000). Working knowledge: How organizations manage what they know. New York: Harvard Business Press. Davenport, T. H., & Pruzak, L. (2000). Working knowledge: How organizations manage what they know. New York: Harvard Business Press.
go back to reference Davidson, D. J., & Freudenburg, W. R. (1996). Gender and environmental risk concerns a review and analysis of available research. Environment and behavior, 28, 302–339.CrossRef Davidson, D. J., & Freudenburg, W. R. (1996). Gender and environmental risk concerns a review and analysis of available research. Environment and behavior, 28, 302–339.CrossRef
go back to reference Dinev, T., & Hart, P. (2006). An extended privacy calculus model for e-commerce transactions. Information Systems Research, 17, 61–80.CrossRef Dinev, T., & Hart, P. (2006). An extended privacy calculus model for e-commerce transactions. Information Systems Research, 17, 61–80.CrossRef
go back to reference Dwyer, C., Hiltz, SR. & Passerini, K. Trust and privacy concern within social networking sites: A comparison of facebook and mySpace. AMCIS, 2007. p. 339 Dwyer, C., Hiltz, SR. & Passerini, K. Trust and privacy concern within social networking sites: A comparison of facebook and mySpace. AMCIS, 2007. p. 339
go back to reference Dwyer, P. D., Gilkeson, J. H., & List, J. A. (2002). Gender differences in revealed risk taking: evidence from mutual fund investors. Economics Letters, 76, 151–158.CrossRef Dwyer, P. D., Gilkeson, J. H., & List, J. A. (2002). Gender differences in revealed risk taking: evidence from mutual fund investors. Economics Letters, 76, 151–158.CrossRef
go back to reference Fishbein, M. (1963). An investigation of the relationship between beliefs about an object and the attitude toward that object. Human relations, 16, 233–240.CrossRef Fishbein, M. (1963). An investigation of the relationship between beliefs about an object and the attitude toward that object. Human relations, 16, 233–240.CrossRef
go back to reference Fishbein, M., & AJZEN, I. (1975). Belief, attitude, intention and behavior: An introduction to theory and research Fishbein, M., & AJZEN, I. (1975). Belief, attitude, intention and behavior: An introduction to theory and research
go back to reference Folkman, S. (1984). Personal control and stress and coping processes: A theoretical analysis. Journal of Personality and Social Psychology, 46, 839–852.CrossRef Folkman, S. (1984). Personal control and stress and coping processes: A theoretical analysis. Journal of Personality and Social Psychology, 46, 839–852.CrossRef
go back to reference Fornell, C., & Larcker, D. F. (1981). Evaluating structural equation models with unobservable variables and measurement error. Journal of Marketing Research, 18, 39–50.CrossRef Fornell, C., & Larcker, D. F. (1981). Evaluating structural equation models with unobservable variables and measurement error. Journal of Marketing Research, 18, 39–50.CrossRef
go back to reference Garbarino, E., & Strahilevitz, M. (2004). Gender differences in the perceived risk of buying online and the effects of receiving a site recommendation. Journal of Business Research, 57, 768–775.CrossRef Garbarino, E., & Strahilevitz, M. (2004). Gender differences in the perceived risk of buying online and the effects of receiving a site recommendation. Journal of Business Research, 57, 768–775.CrossRef
go back to reference Govani, T., & Pashley, H. (2005). Student awareness of the privacy implications when using Facebook. Unpublished paper presented at the “Privacy Poster Fair” at the Carnegie Mellon University School of Library and Information Science, 9. Govani, T., & Pashley, H. (2005). Student awareness of the privacy implications when using Facebook. Unpublished paper presented at the “Privacy Poster Fair” at the Carnegie Mellon University School of Library and Information Science, 9.
go back to reference Gustafsod, P. E. (1998). Gender differences in risk perception: Theoretical and methodological erspectives. Risk Analysis, 18, 805–811.CrossRef Gustafsod, P. E. (1998). Gender differences in risk perception: Theoretical and methodological erspectives. Risk Analysis, 18, 805–811.CrossRef
go back to reference Hair, J. R. F., Black, W., Babin, B., Anderson, R., & Tatham, R. (2006). Multivariate data analysis. Upper Saddle River: Pearson. Hair, J. R. F., Black, W., Babin, B., Anderson, R., & Tatham, R. (2006). Multivariate data analysis. Upper Saddle River: Pearson.
go back to reference Hajli, M. N. (2014a). The role of social support on relationship quality and social commerce. Technological Forecasting and Social Change, 87, 17–27.CrossRef Hajli, M. N. (2014a). The role of social support on relationship quality and social commerce. Technological Forecasting and Social Change, 87, 17–27.CrossRef
go back to reference Hajli, N. (2014b). Developing online health communities through digital media. International Journal of Information Management, 34, 311–314.CrossRef Hajli, N. (2014b). Developing online health communities through digital media. International Journal of Information Management, 34, 311–314.CrossRef
go back to reference Hajli, N. (2014c). A study of the impact of social media on consumers. International Journal of Market Research, 56, 95–113.CrossRef Hajli, N. (2014c). A study of the impact of social media on consumers. International Journal of Market Research, 56, 95–113.CrossRef
go back to reference Hajli, N., Lin, X., Featherman, M., & Wang, Y. (2014). Social word of mouth: How trust develops in the market. International Journal of Market Research, 56, 1–30.CrossRef Hajli, N., Lin, X., Featherman, M., & Wang, Y. (2014). Social word of mouth: How trust develops in the market. International Journal of Market Research, 56, 1–30.CrossRef
go back to reference Harman, H. H. (1976). Modern factor analysis. Chicago: University of Chicago Press. Harman, H. H. (1976). Modern factor analysis. Chicago: University of Chicago Press.
go back to reference Hoadley, C. M., Xu, H., Lee, J. J., & Rosson, M. B. (2010). Privacy as information access and illusory control: The case of the Facebook news feed privacy outcry. Electronic Commerce Research and Applications, 9, 50–60.CrossRef Hoadley, C. M., Xu, H., Lee, J. J., & Rosson, M. B. (2010). Privacy as information access and illusory control: The case of the Facebook news feed privacy outcry. Electronic Commerce Research and Applications, 9, 50–60.CrossRef
go back to reference Hsu, M.-H., & Chiu, C.-M. (2004). Predicting electronic service continuance with a decomposed theory of planned behaviour. Behaviour & Information Technology, 23, 359–373.CrossRef Hsu, M.-H., & Chiu, C.-M. (2004). Predicting electronic service continuance with a decomposed theory of planned behaviour. Behaviour & Information Technology, 23, 359–373.CrossRef
go back to reference Hsu, M.-H., Ju, T. L., Yen, C.-H., & Chang, C.-M. (2007). Knowledge sharing behavior in virtual communities: The relationship between trust, self-efficacy, and outcome expectations. International Journal of Human-Computer Studies, 65, 153–169.CrossRef Hsu, M.-H., Ju, T. L., Yen, C.-H., & Chang, C.-M. (2007). Knowledge sharing behavior in virtual communities: The relationship between trust, self-efficacy, and outcome expectations. International Journal of Human-Computer Studies, 65, 153–169.CrossRef
go back to reference Hsu, C.-L., & Lin, J. C.-C. (2008). Acceptance of blog usage: The roles of technology acceptance, social influence and knowledge sharing motivation. Information & Management, 45, 65–74.CrossRef Hsu, C.-L., & Lin, J. C.-C. (2008). Acceptance of blog usage: The roles of technology acceptance, social influence and knowledge sharing motivation. Information & Management, 45, 65–74.CrossRef
go back to reference Kamis, A., Koufaris, M., & Stern, T. (2008). Using an attribute-based decision support system for user-customized products online: An experimental investigation. MIS Quarterly, 32, 159–177. Kamis, A., Koufaris, M., & Stern, T. (2008). Using an attribute-based decision support system for user-customized products online: An experimental investigation. MIS Quarterly, 32, 159–177.
go back to reference Keil, M., Tan, BC., Wei, K.-K., Saarinen, T., Tuunainen, V. & Wassenaar, A. (2000). A cross-cultural study on escalation of commitment behavior in software projects. Mis Quarterly, 299–325. Keil, M., Tan, BC., Wei, K.-K., Saarinen, T., Tuunainen, V. & Wassenaar, A. (2000). A cross-cultural study on escalation of commitment behavior in software projects. Mis Quarterly, 299–325.
go back to reference Krasnova, H., Spiekermann, S., Koroleva, K., & Hildebrand, T. (2010). Online social networks: Why we disclose. Journal of Information Technology, 25, 109–125.CrossRef Krasnova, H., Spiekermann, S., Koroleva, K., & Hildebrand, T. (2010). Online social networks: Why we disclose. Journal of Information Technology, 25, 109–125.CrossRef
go back to reference Langer, E. J. (1975). The illusion of control. Journal of Personality and Social Psychology, 32, 311.CrossRef Langer, E. J. (1975). The illusion of control. Journal of Personality and Social Psychology, 32, 311.CrossRef
go back to reference Lee, J. (2012). Components of Medical Service Users’ Dissatisfaction: A Perceived Control Perspective. International Journal of Management and Marketing Research, 5, 53–63. Lee, J. (2012). Components of Medical Service Users’ Dissatisfaction: A Perceived Control Perspective. International Journal of Management and Marketing Research, 5, 53–63.
go back to reference Lee, J.-N., & Kim, Y.-G. (1999). Effect of partnership quality on IS outsourcing success: Conceptual framework and empirical validation. Journal of Management Information Systems, 15, 29–61.CrossRef Lee, J.-N., & Kim, Y.-G. (1999). Effect of partnership quality on IS outsourcing success: Conceptual framework and empirical validation. Journal of Management Information Systems, 15, 29–61.CrossRef
go back to reference Lin, X., Featherman, M., & Brooks, SL. (2013a). Factors affecting online consumer’s behavior: An investigation across gender. AMCIS 2013 Proceedings Lin, X., Featherman, M., & Brooks, SL. (2013a). Factors affecting online consumer’s behavior: An investigation across gender. AMCIS 2013 Proceedings
go back to reference Lin, X., Li, Y., Califf, CB., & Featherman, M. Can social role theory explain gender differences in facebook usage? System sciences (HICSS), 2013 46th Hawaii International Conference on, 2013b. IEEE, 690–699 Lin, X., Li, Y., Califf, CB., & Featherman, M. Can social role theory explain gender differences in facebook usage? System sciences (HICSS), 2013 46th Hawaii International Conference on, 2013b. IEEE, 690–699
go back to reference Liu, Y., Gummadi, KP., Krishnamurthy, B., & Mislove, A. (2011). Analyzing facebook privacy settings: user expectations vs. reality. Proceedings of the 2011 ACM SIGCOMM Conference on Internet Measurement Conference, ACM, 61–70 Liu, Y., Gummadi, KP., Krishnamurthy, B., & Mislove, A. (2011). Analyzing facebook privacy settings: user expectations vs. reality. Proceedings of the 2011 ACM SIGCOMM Conference on Internet Measurement Conference, ACM, 61–70
go back to reference Malhotra, N. K., Kim, S. S., & Agarwal, J. (2004). Internet users’ information privacy concerns (IUIPC): the construct, the scale, and a causal model. Information Systems Research, 15, 336–355.CrossRef Malhotra, N. K., Kim, S. S., & Agarwal, J. (2004). Internet users’ information privacy concerns (IUIPC): the construct, the scale, and a causal model. Information Systems Research, 15, 336–355.CrossRef
go back to reference Miranda, S. M., & Saunders, C. S. (2003). The social construction of meaning: An alternative perspective on information sharing. Information Systems Research, 14, 87–106.CrossRef Miranda, S. M., & Saunders, C. S. (2003). The social construction of meaning: An alternative perspective on information sharing. Information Systems Research, 14, 87–106.CrossRef
go back to reference Pavlou, P. A., & Fygenson, M. (2006). Understanding and predicting electronic commerce adoption: An extension of the theory of planned behavior. Mis Quarterly, 30, 115–143. Pavlou, P. A., & Fygenson, M. (2006). Understanding and predicting electronic commerce adoption: An extension of the theory of planned behavior. Mis Quarterly, 30, 115–143.
go back to reference Pavlou, P. A., Liang, H., & Xue, Y. (2007). Understanding and mitigating uncertainty in online exchange relationships: A principal-agent perspective. MIS Quarterly, 31, 105–136. Pavlou, P. A., Liang, H., & Xue, Y. (2007). Understanding and mitigating uncertainty in online exchange relationships: A principal-agent perspective. MIS Quarterly, 31, 105–136.
go back to reference Perry, R. P., Hladkyj, S., Pekrun, R. H., & Pelletier, S. T. (2001). Academic control and action control in the achievement of college students: A longitudinal field study. Journal of Educational Psychology, 93, 776–789.CrossRef Perry, R. P., Hladkyj, S., Pekrun, R. H., & Pelletier, S. T. (2001). Academic control and action control in the achievement of college students: A longitudinal field study. Journal of Educational Psychology, 93, 776–789.CrossRef
go back to reference Powell, M., & Ansic, D. (1997). Gender differences in risk behaviour in financial decision-making: An experimental analysis. Journal of Economic Psychology, 18, 605–628.CrossRef Powell, M., & Ansic, D. (1997). Gender differences in risk behaviour in financial decision-making: An experimental analysis. Journal of Economic Psychology, 18, 605–628.CrossRef
go back to reference Qureshi, I., & Compeau, D. (2009). Assessing between-group differences in information systems research: A comparison of covariance-and component-based SEM. MIS Quarterly, 33, 197–214. Qureshi, I., & Compeau, D. (2009). Assessing between-group differences in information systems research: A comparison of covariance-and component-based SEM. MIS Quarterly, 33, 197–214.
go back to reference Roman, S. (2007). The ethics of online retailing: a scale development and validation from the consumers’ perspective. Journal of Business Ethics, 72, 131–148.CrossRef Roman, S. (2007). The ethics of online retailing: a scale development and validation from the consumers’ perspective. Journal of Business Ethics, 72, 131–148.CrossRef
go back to reference Rotter, J. (1966). Generalized expectancies for internal vs. external control of reinforcement. Psychological Monographs, 80, 1–28.CrossRef Rotter, J. (1966). Generalized expectancies for internal vs. external control of reinforcement. Psychological Monographs, 80, 1–28.CrossRef
go back to reference Schulz, R., & Heckhausen, J. (1996). A lifespan model of successful aging. American Psychologist, 51, 702–714.CrossRef Schulz, R., & Heckhausen, J. (1996). A lifespan model of successful aging. American Psychologist, 51, 702–714.CrossRef
go back to reference Scott, B. G., & Weems, C. F. (2010). Patterns of actual and perceived control: are control profiles differentially related to internalizing and externalizing problems in youth? Anxiety, Stress, & Coping, 23, 515–528.CrossRef Scott, B. G., & Weems, C. F. (2010). Patterns of actual and perceived control: are control profiles differentially related to internalizing and externalizing problems in youth? Anxiety, Stress, & Coping, 23, 515–528.CrossRef
go back to reference Seligman, M. E. (1975). Helplessness: On depression, development, and death. London: WH Freeman/Times Books/Henry Holt & Co. Seligman, M. E. (1975). Helplessness: On depression, development, and death. London: WH Freeman/Times Books/Henry Holt & Co.
go back to reference Skinner, E. A. (1996). A guide to constructs of control. Journal of Personality and Social Psychology, 71, 549.CrossRef Skinner, E. A. (1996). A guide to constructs of control. Journal of Personality and Social Psychology, 71, 549.CrossRef
go back to reference Skinner, E., Chapman, M., & Baltes, P. (1988). Control, means-ends, and agency beliefs: A new conceptualization and its measurement during childhood. Journal of Personality and Social Psychology, 54, 113–117.CrossRef Skinner, E., Chapman, M., & Baltes, P. (1988). Control, means-ends, and agency beliefs: A new conceptualization and its measurement during childhood. Journal of Personality and Social Psychology, 54, 113–117.CrossRef
go back to reference Specht, J., Schmukle, S. C., & Egloff, B. (2013). Everything Under Control? The Effects of Age, Gender, and Education on Trajectories of Perceived Control in a Nationally Representative German Sample. Developmental Psychology, 49, 353–364.CrossRef Specht, J., Schmukle, S. C., & Egloff, B. (2013). Everything Under Control? The Effects of Age, Gender, and Education on Trajectories of Perceived Control in a Nationally Representative German Sample. Developmental Psychology, 49, 353–364.CrossRef
go back to reference Thompson, S., Sobolew-Shubin, A., Galbraith, M., Schwankovsky, L., & Cruzen, D. (1993). Maintaining perceptions of control: Finding perceived control in low-control circumstances. Journal of Personality and Social Psychology, 64, 293–304.CrossRef Thompson, S., Sobolew-Shubin, A., Galbraith, M., Schwankovsky, L., & Cruzen, D. (1993). Maintaining perceptions of control: Finding perceived control in low-control circumstances. Journal of Personality and Social Psychology, 64, 293–304.CrossRef
go back to reference van Slyke, C., Shim, J., Johnson, R., & Jiang, J. (2006). Concern for information privacy and online consumer purchasing. Journal of the Association for Information Systems, 7, 415–444. van Slyke, C., Shim, J., Johnson, R., & Jiang, J. (2006). Concern for information privacy and online consumer purchasing. Journal of the Association for Information Systems, 7, 415–444.
go back to reference Venkatesh, V., & Morris, M. G. (2000). Why don’t men ever stop to ask for directions? Gender, social influence, and their role in technology acceptance and usage behavior. Mis Quarterly, 24, 115–139.CrossRef Venkatesh, V., & Morris, M. G. (2000). Why don’t men ever stop to ask for directions? Gender, social influence, and their role in technology acceptance and usage behavior. Mis Quarterly, 24, 115–139.CrossRef
go back to reference Venkatesh, V., Thong, J., & Xu, X. (2012). Consumer acceptance and use of information technology: Extending the unified theory of acceptance and use of technology. MIS Quarterly, 36, 157–178. Venkatesh, V., Thong, J., & Xu, X. (2012). Consumer acceptance and use of information technology: Extending the unified theory of acceptance and use of technology. MIS Quarterly, 36, 157–178.
go back to reference Wallhagen, M. (1992). Perceived control and adaptation in elder caregivers: Development of an explanatory model. International Journal of Aging and Human Development, 36, 219–237.CrossRef Wallhagen, M. (1992). Perceived control and adaptation in elder caregivers: Development of an explanatory model. International Journal of Aging and Human Development, 36, 219–237.CrossRef
go back to reference Wallston, K. A., Wallston, K. A., & Devellis, R. (1978). Development of the multidimensional health locus of control scales. Health Education Monographs, 6, 161–170. Wallston, K. A., Wallston, K. A., & Devellis, R. (1978). Development of the multidimensional health locus of control scales. Health Education Monographs, 6, 161–170.
go back to reference Weisz, J. R., & Stipek, D. J. (1982). Competence, contingency, and the development of perceived control. Human Development, 25, 250–281.CrossRef Weisz, J. R., & Stipek, D. J. (1982). Competence, contingency, and the development of perceived control. Human Development, 25, 250–281.CrossRef
go back to reference Westin, A. F. (1968). Privacy and freedom. Washington and Lee Law Review, 25, 166. Westin, A. F. (1968). Privacy and freedom. Washington and Lee Law Review, 25, 166.
go back to reference Xu, H., Dinev, T., Smith, H. J., & Hart, P. (2008). Examining the formation of individual’s privacy concerns: Toward an integrative view Xu, H., Dinev, T., Smith, H. J., & Hart, P. (2008). Examining the formation of individual’s privacy concerns: Toward an integrative view
go back to reference Xu, H. The Effects of Self-Construal and Perceived Control on Privacy Concerns. ICIS, 2007. Citeseer, 125 Xu, H. The Effects of Self-Construal and Perceived Control on Privacy Concerns. ICIS, 2007. Citeseer, 125
go back to reference Xu, H., & Teo, H.-H. (2004). Alleviating Consumers’ Privacy Concerns in Location-based Services: A Psychological Control Perspective. ICIS, 793–806 Xu, H., & Teo, H.-H. (2004). Alleviating Consumers’ Privacy Concerns in Location-based Services: A Psychological Control Perspective. ICIS, 793–806
go back to reference Xu, H., Teo, H.-H., Tan, B. C., & Agarwal, R. (2012). Research note—effects of individual self-protection, industry self-regulation, and government regulation on privacy concerns: A study of location-based services. Information Systems Research, 23, 1342–1363.CrossRef Xu, H., Teo, H.-H., Tan, B. C., & Agarwal, R. (2012). Research note—effects of individual self-protection, industry self-regulation, and government regulation on privacy concerns: A study of location-based services. Information Systems Research, 23, 1342–1363.CrossRef
go back to reference Acquisti, A., & Gross, R. (2006) Imagined communities: Awareness, information sharing, and privacy on the Facebook. Privacy Enhancing Technologies, Springer, 36–58 Acquisti, A., & Gross, R. (2006) Imagined communities: Awareness, information sharing, and privacy on the Facebook. Privacy Enhancing Technologies, Springer, 36–58
go back to reference Yin, G., & Cheng, X. (2011). & ZHU, L. A Theoretical Model and Empirical Study of the Chinese Context: Understanding continuance usage of social networking services. Yin, G., & Cheng, X. (2011). & ZHU, L. A Theoretical Model and Empirical Study of the Chinese Context: Understanding continuance usage of social networking services.
go back to reference Zhang, K. Z., Lee, M. K., Cheung, C. M., & Chen, H. (2009). Understanding the role of gender in bloggers’ switching behavior. Decision Support Systems, 47, 540–546.CrossRef Zhang, K. Z., Lee, M. K., Cheung, C. M., & Chen, H. (2009). Understanding the role of gender in bloggers’ switching behavior. Decision Support Systems, 47, 540–546.CrossRef
Metadata
Title
Exploring the Security of Information Sharing on Social Networking Sites: The Role of Perceived Control of Information
Authors
Nick Hajli
Xiaolin Lin
Publication date
10-09-2014
Publisher
Springer Netherlands
Published in
Journal of Business Ethics / Issue 1/2016
Print ISSN: 0167-4544
Electronic ISSN: 1573-0697
DOI
https://doi.org/10.1007/s10551-014-2346-x

Other articles of this Issue 1/2016

Journal of Business Ethics 1/2016 Go to the issue

Premium Partner