User trust in social networking services: A comparison of Facebook and LinkedIn
The innovative social networking services (SNS) provide people with versatile personal, commerce, and social applications. This study compares Facebook and LinkedIn to better understand factors affecting users' trust on SNS. Subject domain experts were invited to participate in qualitative rese...
Saved in:
Published in | Computers in human behavior Vol. 69; pp. 207 - 217 |
---|---|
Main Authors | , , |
Format | Journal Article |
Language | English |
Published |
Elmsford
Elsevier Ltd
01.04.2017
Elsevier Science Ltd |
Subjects | |
Online Access | Get full text |
Cover
Loading…
Abstract | The innovative social networking services (SNS) provide people with versatile personal, commerce, and social applications. This study compares Facebook and LinkedIn to better understand factors affecting users' trust on SNS. Subject domain experts were invited to participate in qualitative research based interviews. Using the refined research model a quantitative empirical study was designed and conducted to investigate the relationships between important constructs including effort expectancy, social influence, privacy concern, perceived risk, trust, and continuance intention. Users' trust on SNS is mainly influenced by effort expectancy, social influence, and perceived risk. The impacts of influential factors are different between Facebook and LinkedIn user groups. Our empirical results imply that when the positive influences, such as effort expectancy of the online community, users from different SNS have different needs in social reputation, or high security compliance, in consideration of the negative influence of perceived risk to users' trust when continuing to use the SNS. This study presents a conceptual framework using extant theories and models to form a foundation for SNS incorporating the important factors of trust and privacy concerns.
•Effort expectancy and social influence affect users' intention more than privacy.•Users' perceptions and trust between Facebook and LinkedIn are different.•Users' perception of privacy affects trust, attitudes, and usage intention. |
---|---|
AbstractList | The innovative social networking services (SNS) provide people with versatile personal, commerce, and social applications. This study compares Facebook and LinkedIn to better understand factors affecting users' trust on SNS. Subject domain experts were invited to participate in qualitative research based interviews. Using the refined research model a quantitative empirical study was designed and conducted to investigate the relationships between important constructs including effort expectancy, social influence, privacy concern, perceived risk, trust, and continuance intention. Users' trust on SNS is mainly influenced by effort expectancy, social influence, and perceived risk. The impacts of influential factors are different between Facebook and LinkedIn user groups. Our empirical results imply that when the positive influences, such as effort expectancy of the online community, users from different SNS have different needs in social reputation, or high security compliance, in consideration of the negative influence of perceived risk to users' trust when continuing to use the SNS. This study presents a conceptual framework using extant theories and models to form a foundation for SNS incorporating the important factors of trust and privacy concerns. The innovative social networking services (SNS) provide people with versatile personal, commerce, and social applications. This study compares Facebook and LinkedIn to better understand factors affecting users' trust on SNS. Subject domain experts were invited to participate in qualitative research based interviews. Using the refined research model a quantitative empirical study was designed and conducted to investigate the relationships between important constructs including effort expectancy, social influence, privacy concern, perceived risk, trust, and continuance intention. Users' trust on SNS is mainly influenced by effort expectancy, social influence, and perceived risk. The impacts of influential factors are different between Facebook and LinkedIn user groups. Our empirical results imply that when the positive influences, such as effort expectancy of the online community, users from different SNS have different needs in social reputation, or high security compliance, in consideration of the negative influence of perceived risk to users' trust when continuing to use the SNS. This study presents a conceptual framework using extant theories and models to form a foundation for SNS incorporating the important factors of trust and privacy concerns. •Effort expectancy and social influence affect users' intention more than privacy.•Users' perceptions and trust between Facebook and LinkedIn are different.•Users' perception of privacy affects trust, attitudes, and usage intention. |
Author | Shen, Wei Cheng Chang, Shuchih Ernest Liu, Anne Yenching |
Author_xml | – sequence: 1 givenname: Shuchih Ernest surname: Chang fullname: Chang, Shuchih Ernest – sequence: 2 givenname: Anne Yenching surname: Liu fullname: Liu, Anne Yenching email: yench3@gmail.com – sequence: 3 givenname: Wei Cheng surname: Shen fullname: Shen, Wei Cheng |
BookMark | eNp9kDtPAzEMgCMEEuXxA9giMd-RxyWXgwkhCkiVWOgcJTkX0pakJCmIf0-qMjEw2bL92fJ3gg5DDIDQBSUtJVReLVv3ZltW05ayllB-gCZU9bzp5cAO0YT0Xd8IydkxOsl5SQgRgsgJep5nSLikbS7YB5yj82aNA5SvmFY-vOLa_vQO8jW-xS6-b0zyOQYcF3hqHNgYV9iEEc98WMH4FM7Q0cKsM5z_xlM0n96_3D02s-eHp7vbWeM4JaVRlipqx3HshLPSMi4HxySXBpQgUGu9goWklIneccWVlR2ooeulsMSabuSn6HK_d5PixxZy0cu4TaGe1HTgjCgyCFGn-v2USzHnBAvtfDHFx1CS8WtNid7Z00td7emdPU2ZrvYqSf-Qm-TfTfr-l7nZM1Af__SQdHYegoPRJ3BFj9H_Q_8A0IKIwQ |
CitedBy_id | crossref_primary_10_55544_ijrah_4_5_25 crossref_primary_10_17657_jcr_2022_10_31_1 crossref_primary_10_1016_j_jbusres_2021_12_030 crossref_primary_10_1177_01655515241293775 crossref_primary_10_21511_bbs_17_3__2022_18 crossref_primary_10_1080_08985626_2024_2311319 crossref_primary_10_1108_IMDS_09_2021_0558 crossref_primary_10_1016_j_tranpol_2022_10_009 crossref_primary_10_1016_j_procs_2018_10_184 crossref_primary_10_1108_ITP_10_2021_0817 crossref_primary_10_1007_s43545_022_00586_3 crossref_primary_10_20525_ijrbs_v13i5_3414 crossref_primary_10_51137_ijarbm_2024_5_2_1 crossref_primary_10_3390_systems13030144 crossref_primary_10_1108_JSIT_03_2022_0060 crossref_primary_10_1108_JICES_04_2023_0050 crossref_primary_10_4018_JGIM_347503 crossref_primary_10_2139_ssrn_4058134 crossref_primary_10_1007_s11704_022_1182_x crossref_primary_10_1016_j_asoc_2021_107159 crossref_primary_10_1016_j_jjimei_2021_100056 crossref_primary_10_1016_j_chb_2021_106700 crossref_primary_10_11616_asbi_956027 crossref_primary_10_4018_IJEA_294860 crossref_primary_10_1016_j_chbr_2023_100321 crossref_primary_10_1108_JSIT_05_2019_0096 crossref_primary_10_1108_K_06_2020_0373 crossref_primary_10_1108_JAMR_10_2021_0343 crossref_primary_10_1016_j_cose_2022_103071 crossref_primary_10_1108_JSIT_09_2020_0180 crossref_primary_10_1002_mar_21457 crossref_primary_10_1109_TEM_2019_2893541 crossref_primary_10_1016_j_techfore_2024_123969 crossref_primary_10_1007_s42979_024_02714_7 crossref_primary_10_1080_00224545_2024_2319177 crossref_primary_10_1016_j_dss_2025_114437 crossref_primary_10_1080_0267257X_2020_1751242 crossref_primary_10_1007_s12525_019_00347_w crossref_primary_10_1111_grow_12501 crossref_primary_10_1177_02666669231208101 crossref_primary_10_1016_j_ijinfomgt_2019_05_014 crossref_primary_10_1590_0034_761220220145x crossref_primary_10_1016_j_chb_2022_107614 crossref_primary_10_3390_su151712771 crossref_primary_10_1016_j_jretconser_2019_03_016 crossref_primary_10_1016_j_trf_2019_09_021 crossref_primary_10_1002_cpe_5572 crossref_primary_10_1016_j_acalib_2024_102938 crossref_primary_10_1108_IJOEM_09_2021_1345 crossref_primary_10_1108_ITP_01_2020_0005 crossref_primary_10_1002_mar_21281 crossref_primary_10_3390_su10072283 crossref_primary_10_1016_j_eswa_2020_114241 crossref_primary_10_3390_socsci13050251 crossref_primary_10_1108_QMR_01_2017_0025 crossref_primary_10_3846_jbem_2022_17387 crossref_primary_10_3390_bs14111060 crossref_primary_10_1016_j_tele_2020_101475 crossref_primary_10_1080_10447318_2020_1768674 crossref_primary_10_1108_REGE_09_2021_0178 crossref_primary_10_3390_su12125163 crossref_primary_10_1080_10510974_2022_2094982 crossref_primary_10_3390_electronics8101165 crossref_primary_10_3390_socsci13070361 crossref_primary_10_1016_j_digbus_2023_100070 crossref_primary_10_1057_s41270_020_00093_5 crossref_primary_10_1080_02681102_2023_2202640 crossref_primary_10_1080_10941665_2023_2276468 crossref_primary_10_1186_s12911_023_02313_1 crossref_primary_10_1016_j_heliyon_2021_e07899 crossref_primary_10_1016_j_im_2018_09_014 crossref_primary_10_11627_jkise_2018_41_1_024 crossref_primary_10_1080_1540496X_2019_1695122 crossref_primary_10_1177_21582440211056621 crossref_primary_10_1002_nvsm_1764 crossref_primary_10_1007_s11423_021_09987_2 crossref_primary_10_1016_j_crm_2024_100619 crossref_primary_10_1007_s10639_023_11836_z crossref_primary_10_3389_fpsyg_2022_987381 crossref_primary_10_1108_JFBM_07_2022_0103 crossref_primary_10_1016_j_ijinfomgt_2023_102623 crossref_primary_10_2196_10282 crossref_primary_10_4018_JECO_305738 crossref_primary_10_1142_S0219877023500049 crossref_primary_10_1016_j_jengtecman_2020_101585 crossref_primary_10_1016_j_tele_2022_101925 crossref_primary_10_3390_app11020577 crossref_primary_10_3390_su15053939 crossref_primary_10_1111_hequ_12256 crossref_primary_10_1142_S0219622023500566 crossref_primary_10_1177_0361198120942224 crossref_primary_10_1016_j_techfore_2020_119913 crossref_primary_10_3233_JIFS_169983 crossref_primary_10_1186_s43093_023_00233_0 crossref_primary_10_1590_1678_6971_eramg220064_en crossref_primary_10_1016_j_procs_2023_08_001 crossref_primary_10_1088_1742_6596_1793_1_012008 crossref_primary_10_3390_su10124680 crossref_primary_10_1007_s12144_024_05753_8 crossref_primary_10_1177_09732586211048034 crossref_primary_10_1016_j_ijinfomgt_2021_102315 crossref_primary_10_1177_21582440231175370 crossref_primary_10_1080_10447318_2020_1712061 crossref_primary_10_1109_JIOT_2020_2981005 crossref_primary_10_1145_3637339 crossref_primary_10_1016_j_lisr_2021_101125 crossref_primary_10_1016_j_eswa_2019_113016 crossref_primary_10_1080_13527266_2019_1569088 crossref_primary_10_1108_CCSM_03_2022_0046 crossref_primary_10_20879_acr_2021_18_3_168 crossref_primary_10_1080_23311975_2022_2153487 crossref_primary_10_1177_00219096221108738 crossref_primary_10_3389_fpubh_2025_1535218 crossref_primary_10_1016_j_ipm_2020_102223 crossref_primary_10_1590_0034_761220220145 crossref_primary_10_1002_mar_21813 crossref_primary_10_1155_2023_2643683 crossref_primary_10_1016_j_heliyon_2024_e34468 crossref_primary_10_1108_IJOES_06_2020_0078 crossref_primary_10_3390_wevj14030073 crossref_primary_10_4018_IJSMOC_356507 crossref_primary_10_1016_j_tele_2022_101861 crossref_primary_10_1108_AJIM_08_2021_0232 crossref_primary_10_1155_2022_2552099 crossref_primary_10_1080_0144929X_2024_2427111 crossref_primary_10_1080_10447318_2021_1988237 crossref_primary_10_1108_OIR_03_2020_0116 crossref_primary_10_1108_IMDS_07_2023_0467 crossref_primary_10_20473_jeba_V34I12024_128_147 crossref_primary_10_1016_j_tele_2023_102063 |
Cites_doi | 10.1016/j.comnet.2012.08.009 10.1080/13669870802497744 10.1016/j.dss.2006.03.009 10.5465/amr.1998.926629 10.1108/YC-12-2013-00416 10.1016/j.tele.2012.03.004 10.1086/209386 10.1108/10662241211214575 10.1287/isre.1040.0032 10.1109/COMST.2000.5340804 10.1016/S0378-7206(02)00010-1 10.1080/1097198X.2004.10856370 10.1016/j.csda.2004.03.005 10.1007/s12599-012-0216-6 10.1145/1989098.1989101 10.1177/109804821101500104 10.1016/j.ijhcs.2005.01.001 10.1287/isre.13.3.334.81 10.1016/j.tele.2014.05.003 10.1016/j.chb.2008.08.006 10.1016/j.soscij.2014.04.005 10.1016/j.indmarman.2015.12.001 10.1016/j.ijinfomgt.2012.11.006 10.1111/j.1744-6570.1975.tb01393.x 10.1002/(SICI)1097-0266(199902)20:2<195::AID-SMJ13>3.0.CO;2-7 10.2307/30036519 10.1108/02635570710719034 10.1016/j.chb.2010.03.013 10.1007/s12599-014-0351-3 10.1016/j.indmarman.2011.06.040 10.1016/j.im.2010.09.001 10.1016/j.im.2013.03.002 10.1080/10919392.2011.590109 10.15728/bbr.2014.11.2.4 10.2307/20650296 10.1080/0144929X.2010.549513 10.1016/j.intcom.2010.05.001 10.1016/j.dss.2012.12.032 10.1016/j.dss.2005.05.019 10.1007/s11042-013-1430-z 10.1111/j.1083-6101.2007.00393.x 10.1016/j.chb.2014.05.008 10.1080/1369118X.2013.777757 10.1016/j.chb.2010.10.017 10.1108/10662240910952346 10.1016/j.chb.2016.02.087 10.1108/IMDS-07-2014-0197 10.2307/249008 10.1108/02635571111115146 10.1016/j.chb.2010.01.013 10.5465/amr.1998.926619 10.1287/isre.14.2.189.16018 10.1177/002224378101800104 10.1504/IJMC.2015.070961 10.2753/MTP1069-6679190202 10.1108/IMDS-03-2015-0075 10.2307/30036540 |
ContentType | Journal Article |
Copyright | 2016 Elsevier Ltd Copyright Elsevier Science Ltd. Apr 2017 |
Copyright_xml | – notice: 2016 Elsevier Ltd – notice: Copyright Elsevier Science Ltd. Apr 2017 |
DBID | AAYXX CITATION 7SC 8FD JQ2 L7M L~C L~D |
DOI | 10.1016/j.chb.2016.12.013 |
DatabaseName | CrossRef Computer and Information Systems Abstracts Technology Research Database ProQuest Computer Science Collection Advanced Technologies Database with Aerospace Computer and Information Systems Abstracts Academic Computer and Information Systems Abstracts Professional |
DatabaseTitle | CrossRef Computer and Information Systems Abstracts Technology Research Database Computer and Information Systems Abstracts – Academic Advanced Technologies Database with Aerospace ProQuest Computer Science Collection Computer and Information Systems Abstracts Professional |
DatabaseTitleList | Computer and Information Systems Abstracts |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Psychology Computer Science |
EISSN | 1873-7692 |
EndPage | 217 |
ExternalDocumentID | 10_1016_j_chb_2016_12_013 S0747563216308330 |
GroupedDBID | --K --M -~X .DC .~1 0R~ 186 1B1 1RT 1~. 1~5 29F 4.4 457 4G. 53G 5GY 5VS 6J9 7-5 71M 8P~ 9JN 9JO AABNK AACTN AADFP AAEDT AAEDW AAFJI AAGJA AAGUQ AAIAV AAIKJ AAKOC AALRI AAOAW AAQFI AAQXK AAXUO AAYFN ABBOA ABFNM ABFRF ABIVO ABJNI ABMAC ABMMH ABOYX ABXDB ABYKQ ACDAQ ACGFO ACGFS ACHQT ACNNM ACRLP ACXNI ACZNC ADBBV ADEZE ADHUB ADJOM ADMUD AEBSH AEFWE AEKER AFFNX AFKWA AFTJW AFYLN AGHFR AGUBO AGYEJ AHHHB AHZHX AIALX AIEXJ AIKHN AITUG AJBFU AJOXV AKYCK ALMA_UNASSIGNED_HOLDINGS AMFUW AMRAJ AOMHK AOUOD ASPBG AVARZ AVWKF AXJTR AZFZN BKOJK BLXMC CS3 DU5 EBS EFJIC EFLBG EJD EO8 EO9 EP2 EP3 F5P FA8 FDB FEDTE FGOYB FIRID FNPLU FYGXN G-2 G-Q GBLVA GBOLZ HF~ HLZ HMW HVGLF HZ~ H~9 IHE J1W KOM LG9 LPU M3V M41 MO0 N9A NHB O-L O9- OAUVE OKEIE OZT P-8 P-9 P2P PC. PRBVW Q38 R2- RIG ROL RPZ RXW SBC SCC SDF SDG SDP SES SEW SPC SPCBC SPS SSB SSO SSV SSY SSZ T5K TAE UMD UNMZH WUQ XPP XSW ZCA ~G- AATTM AAXKI AAYWO AAYXX ABWVN ACRPL ACVFH ADCNI ADNMO AEIPS AEUPX AFJKZ AFPUW AFXIZ AGCQF AGQPQ AGRNS AIGII AIIUN AKBMS AKRWK AKYEP ANKPU APXCP BNPGV CITATION SSH 7SC 8FD EFKBS JQ2 L7M L~C L~D |
ID | FETCH-LOGICAL-c310t-8b181bddd45cb6b2369c2636ae850e5cb78ef611257c3838b64e894765b0ba4d3 |
IEDL.DBID | .~1 |
ISSN | 0747-5632 |
IngestDate | Wed Aug 13 04:42:58 EDT 2025 Thu Apr 24 23:12:44 EDT 2025 Tue Jul 01 03:51:31 EDT 2025 Fri Feb 23 02:13:55 EST 2024 |
IsPeerReviewed | true |
IsScholarly | true |
Keywords | Privacy concern Perceived risk Service trust Social networking services (SNS) |
Language | English |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-c310t-8b181bddd45cb6b2369c2636ae850e5cb78ef611257c3838b64e894765b0ba4d3 |
Notes | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 14 |
PQID | 1932080955 |
PQPubID | 2038346 |
PageCount | 11 |
ParticipantIDs | proquest_journals_1932080955 crossref_citationtrail_10_1016_j_chb_2016_12_013 crossref_primary_10_1016_j_chb_2016_12_013 elsevier_sciencedirect_doi_10_1016_j_chb_2016_12_013 |
ProviderPackageCode | CITATION AAYXX |
PublicationCentury | 2000 |
PublicationDate | April 2017 2017-04-00 20170401 |
PublicationDateYYYYMMDD | 2017-04-01 |
PublicationDate_xml | – month: 04 year: 2017 text: April 2017 |
PublicationDecade | 2010 |
PublicationPlace | Elmsford |
PublicationPlace_xml | – name: Elmsford |
PublicationTitle | Computers in human behavior |
PublicationYear | 2017 |
Publisher | Elsevier Ltd Elsevier Science Ltd |
Publisher_xml | – name: Elsevier Ltd – name: Elsevier Science Ltd |
References | McKnight, Choudhury, Kacmar (bib44) 2002; 13 Lankton, McKnight (bib36) 2011; 42 Grandison, Sloman (bib20) 2000; 3 Li (bib38) 2011; 28 Nofer, Hinz, Muntermann, Roßnagel (bib47) 2014; 6 Chang, Liu, Lin (bib7) 2015; 115 Fornell, Larcker (bib18) 1981; 18 Gefen, Karahanna, Straub (bib19) 2003; 27 Sykes, Venkatesh, Gosain (bib68) 2009; 33 Davis (bib11) 1989; 13 Ngai, Moon, Lam, Chin, Tao (bib46) 2015; 115 Venkatesh, Morris, Davis, Davis (bib69) 2003; 27 LinkedIn (bib39) 2015 Baker, Bricout, Moon, Coughlan, Pater (bib2) 2013; 30 Jin (bib29) 2013; 50 Stutzman, Capra, Thompson (bib57) 2011; 27 Simon, Burstein (bib55) 1985 Boyd, Ellison (bib6) 2007; 13 Eklinder-Frick, Eriksson, Hallén (bib14) 2011; 40 Heidemann, Klier, Probst (bib22) 2012; 56 Quinton, Wilsonb (bib49) 2016; 54 Zhou, Li (bib65) 2014; 37 Hong, Thong, Tam (bib23) 2006; 42 Lawshe (bib37) 1975; 28 Beldad, Jong, Steehouder (bib4) 2010; 26 Zhou (bib64) 2011; 111 Kim, Park (bib32) 2013; 33 Riegelsberger, Sasse, McCarthy (bib50) 2005; 62 Myers, Czepiec, Roxas, Whitson (bib45) 2011; 15 Crespo, del Bosque, Sánchez (bib10) 2009; 12 Karyda, Gritzalis, Park, Kokolakis (bib31) 2009; 19 Jøsang, Ismail, Boyd (bib30) 2007; 43 Malhotra, Kim, Agarwal (bib41) 2004; 15 Im, Hing, Kang (bib26) 2011; 48 Park, Lee, Ahn (bib48) 2004; 7 Doney, Cannon, Mullen (bib12) 1998; 23 Skeels, Grudin (bib56) 2009; 10 Lankton, McKnight (bib35) 2011; 42 Basak, Calisir (bib3) 2014 Fogel, Nehmad (bib17) 2009; 25 Hair, Ringle, Sarstedt (bib21) 2011; 19 Tan, Qin, Kim, Hsu (bib59) 2012; 22 Yokoyama, Sekiguchi (bib62) 2014; 11 Young, Quan-Haase (bib63) 2013; 16 Manasijevic, Zivkovic, Arsic, Milosevic (bib42) 2016; 60 Chin, Marcolin, Newsted (bib9) 2003; 14 Krasnova, Veltri, Günther (bib33) 2012; 4 Turban, Bolloju, Liang (bib61) 2011; 21 Tan, Qin (bib58) 2012; 22 Riemenschneider, Harrison, Mykytyn (bib51) 2003; 40 McKnight (bib43) 2005; 7 Hsu, Chang, Yen (bib24) 2011; 30 Tenenhaus, Vinzi, Chatelin, Lauro (bib60) 2005; 48 Al-Debei, Al-Lozi, Papazafeiropoulou (bib1) 2013; 55 Jang, Chang, Chen (bib28) 2015; 74 Zhou, Lu, Wang (bib67) 2010; 26 Bhattacherjee (bib5) 2002; 19 Florenthal (bib16) 2015; 16 Shaikh, Karjaluoto (bib52) 2015; 32 Sheppard, Sherman (bib53) 1998; 23 Dowling, Staelin (bib13) 1994; 21 Ionescu, Anghel, Jinga (bib27) 2014; 16 Shin (bib54) 2010; 22 Chen, Barnes (bib8) 2007; 107 Kwon, Park, Kim (bib34) 2014; 51 Toe, Tan, Ooi, Lin (bib66) 2015; 13 Ezumah (bib15) 2013; 4 Hulland (bib25) 1999; 20 Quinton (10.1016/j.chb.2016.12.013_bib49) 2016; 54 Skeels (10.1016/j.chb.2016.12.013_bib56) 2009; 10 McKnight (10.1016/j.chb.2016.12.013_bib43) 2005; 7 Fornell (10.1016/j.chb.2016.12.013_bib18) 1981; 18 Tan (10.1016/j.chb.2016.12.013_bib58) 2012; 22 Karyda (10.1016/j.chb.2016.12.013_bib31) 2009; 19 Gefen (10.1016/j.chb.2016.12.013_bib19) 2003; 27 Sheppard (10.1016/j.chb.2016.12.013_bib53) 1998; 23 Ionescu (10.1016/j.chb.2016.12.013_bib27) 2014; 16 Myers (10.1016/j.chb.2016.12.013_bib45) 2011; 15 Grandison (10.1016/j.chb.2016.12.013_bib20) 2000; 3 McKnight (10.1016/j.chb.2016.12.013_bib44) 2002; 13 Al-Debei (10.1016/j.chb.2016.12.013_bib1) 2013; 55 Hulland (10.1016/j.chb.2016.12.013_bib25) 1999; 20 Florenthal (10.1016/j.chb.2016.12.013_bib16) 2015; 16 Lankton (10.1016/j.chb.2016.12.013_bib35) 2011; 42 Li (10.1016/j.chb.2016.12.013_bib38) 2011; 28 Doney (10.1016/j.chb.2016.12.013_bib12) 1998; 23 Sykes (10.1016/j.chb.2016.12.013_bib68) 2009; 33 Tenenhaus (10.1016/j.chb.2016.12.013_bib60) 2005; 48 Im (10.1016/j.chb.2016.12.013_bib26) 2011; 48 Davis (10.1016/j.chb.2016.12.013_bib11) 1989; 13 Hong (10.1016/j.chb.2016.12.013_bib23) 2006; 42 Malhotra (10.1016/j.chb.2016.12.013_bib41) 2004; 15 Shin (10.1016/j.chb.2016.12.013_bib54) 2010; 22 Heidemann (10.1016/j.chb.2016.12.013_bib22) 2012; 56 Bhattacherjee (10.1016/j.chb.2016.12.013_bib5) 2002; 19 LinkedIn (10.1016/j.chb.2016.12.013_bib39) 2015 Zhou (10.1016/j.chb.2016.12.013_bib65) 2014; 37 Fogel (10.1016/j.chb.2016.12.013_bib17) 2009; 25 Riegelsberger (10.1016/j.chb.2016.12.013_bib50) 2005; 62 Krasnova (10.1016/j.chb.2016.12.013_bib33) 2012; 4 Zhou (10.1016/j.chb.2016.12.013_bib67) 2010; 26 Hsu (10.1016/j.chb.2016.12.013_bib24) 2011; 30 Stutzman (10.1016/j.chb.2016.12.013_bib57) 2011; 27 Park (10.1016/j.chb.2016.12.013_bib48) 2004; 7 Nofer (10.1016/j.chb.2016.12.013_bib47) 2014; 6 Venkatesh (10.1016/j.chb.2016.12.013_bib69) 2003; 27 Young (10.1016/j.chb.2016.12.013_bib63) 2013; 16 Chin (10.1016/j.chb.2016.12.013_bib9) 2003; 14 Chang (10.1016/j.chb.2016.12.013_bib7) 2015; 115 Lawshe (10.1016/j.chb.2016.12.013_bib37) 1975; 28 Yokoyama (10.1016/j.chb.2016.12.013_bib62) 2014; 11 Eklinder-Frick (10.1016/j.chb.2016.12.013_bib14) 2011; 40 Riemenschneider (10.1016/j.chb.2016.12.013_bib51) 2003; 40 Simon (10.1016/j.chb.2016.12.013_bib55) 1985 Jang (10.1016/j.chb.2016.12.013_bib28) 2015; 74 Jøsang (10.1016/j.chb.2016.12.013_bib30) 2007; 43 Toe (10.1016/j.chb.2016.12.013_bib66) 2015; 13 Zhou (10.1016/j.chb.2016.12.013_bib64) 2011; 111 Crespo (10.1016/j.chb.2016.12.013_bib10) 2009; 12 Ezumah (10.1016/j.chb.2016.12.013_bib15) 2013; 4 Chen (10.1016/j.chb.2016.12.013_bib8) 2007; 107 Turban (10.1016/j.chb.2016.12.013_bib61) 2011; 21 Beldad (10.1016/j.chb.2016.12.013_bib4) 2010; 26 Hair (10.1016/j.chb.2016.12.013_bib21) 2011; 19 Boyd (10.1016/j.chb.2016.12.013_bib6) 2007; 13 Kwon (10.1016/j.chb.2016.12.013_bib34) 2014; 51 Tan (10.1016/j.chb.2016.12.013_bib59) 2012; 22 Jin (10.1016/j.chb.2016.12.013_bib29) 2013; 50 Kim (10.1016/j.chb.2016.12.013_bib32) 2013; 33 Lankton (10.1016/j.chb.2016.12.013_bib36) 2011; 42 Shaikh (10.1016/j.chb.2016.12.013_bib52) 2015; 32 Dowling (10.1016/j.chb.2016.12.013_bib13) 1994; 21 Baker (10.1016/j.chb.2016.12.013_bib2) 2013; 30 Basak (10.1016/j.chb.2016.12.013_bib3) 2014 Manasijevic (10.1016/j.chb.2016.12.013_bib42) 2016; 60 Ngai (10.1016/j.chb.2016.12.013_bib46) 2015; 115 |
References_xml | – volume: 40 start-page: 994 year: 2011 end-page: 1003 ident: bib14 article-title: Bridging and bonding forms of social capital in a regional strategic network publication-title: Industrial Marketing Management – volume: 37 start-page: 283 year: 2014 end-page: 289 ident: bib65 article-title: Understanding mobile SNS continuance usage in China from the perspectives of social influence and privacy concern publication-title: Computers in Human Behavior – volume: 40 start-page: 269 year: 2003 end-page: 285 ident: bib51 article-title: Understanding IT adoption decisions in small business: Integrating current theories publication-title: Information Management – volume: 107 start-page: 21 year: 2007 end-page: 36 ident: bib8 article-title: Initial trust and online buyer behaviour publication-title: Industrial Management & Data Systems – volume: 48 start-page: 1 year: 2011 end-page: 8 ident: bib26 article-title: An international comparison of technology adoption: Testing the UTAUT model publication-title: Information & Management – volume: 33 start-page: 318 year: 2013 end-page: 332 ident: bib32 article-title: Effects of various characteristics of social commerce (s-commerce) on consumers' trust and trust performance publication-title: International Journal of Information Management – volume: 16 start-page: 273 year: 2014 end-page: 288 ident: bib27 article-title: Organizations' responsibility in maintaining the security of personal data posted online by Romanian consumers: An exploratory analysis of Facebook and LinkedIn publication-title: Amfiteatru Economic – volume: 19 start-page: 213 year: 2002 end-page: 243 ident: bib5 article-title: Individual trust in online Firms: Scale development and initial trust publication-title: Journal of Management Information Systems – volume: 50 start-page: 162 year: 2013 end-page: 168 ident: bib29 article-title: The perspective of a revised TRAM on social capital building: The case of Facebook usage publication-title: Information & Management – volume: 4 start-page: 127 year: 2012 end-page: 135 ident: bib33 article-title: Self-disclosure and privacy calculus on social networking sites: The role of culture publication-title: Business & Information Systems Engineering – volume: 43 start-page: 618 year: 2007 end-page: 644 ident: bib30 article-title: A survey of trust and reputation systems for online service provision publication-title: Decision Support Systems – volume: 42 start-page: 32 year: 2011 end-page: 54 ident: bib36 article-title: What does it mean to trust Facebook? Examining technology and interpersonal trust beliefs publication-title: ACM SIGMIS Database – volume: 7 start-page: 6 year: 2004 end-page: 30 ident: bib48 article-title: Risk-focused e-commerce adoption model: A cross-country study publication-title: Journal of Global Information Technology Management – volume: 51 start-page: 534 year: 2014 end-page: 544 ident: bib34 article-title: What drives successful social networking services? A comparative analysis of user acceptance of Facebook and Twitter publication-title: The Social Science Journal – volume: 18 start-page: 39 year: 1981 end-page: 50 ident: bib18 article-title: Evaluating structural equation models with unobservable variables and measurement error publication-title: Journal of Marketing Research – volume: 16 start-page: 479 year: 2013 end-page: 500 ident: bib63 article-title: Privacy protection strategies on Facebook publication-title: Information, Communication & Society – volume: 14 start-page: 189 year: 2003 end-page: 217 ident: bib9 article-title: A partial least squares latent variable modeling approach for measuring interaction effects: Results from a Monte Carlo simulation study and an electronic mail emotion/adoption study publication-title: Information Systems Research – volume: 21 start-page: 202 year: 2011 end-page: 220 ident: bib61 article-title: Enterprise social networking: Opportunities, adoption, and risk mitigation publication-title: Journal of Organizational Computing and Electronic Commerce – volume: 13 start-page: 478 year: 2015 end-page: 497 ident: bib66 article-title: Why consumers adopt mobile payment? A Partial Least Squares Structural Equation Modeling (PLS-SEM) approach publication-title: International Journal of Mobile Communications – volume: 26 start-page: 760 year: 2010 end-page: 767 ident: bib67 article-title: Integrating TTF and UTAUT to explain mobile banking user adoption publication-title: Computers in Human Behavior – volume: 115 start-page: 88 year: 2015 end-page: 106 ident: bib7 article-title: Exploring privacy and trust for employee monitoring publication-title: Industrial Management & Data Systems – volume: 7 start-page: 329 year: 2005 end-page: 331 ident: bib43 article-title: Trust in information technology publication-title: The Blackwell Encyclopedia of Management, Management Information Systems – volume: 19 start-page: 194 year: 2009 end-page: 208 ident: bib31 article-title: Privacy and fair information practices in ubiquitous environments publication-title: Internet Research – volume: 20 start-page: 195 year: 1999 end-page: 204 ident: bib25 article-title: Use of partial least squares (PLS) in strategic management research: A review of four recent studies publication-title: Strategic Management Journal – volume: 22 start-page: 211 year: 2012 end-page: 233 ident: bib59 article-title: Impact of privacy concern in social networking web sites publication-title: Internet Research – volume: 19 start-page: 139 year: 2011 end-page: 152 ident: bib21 article-title: PLS-SEM: Indeed a silver bullet publication-title: Journal of Marketing Theory and Practice – volume: 15 start-page: 23 year: 2011 end-page: 29 ident: bib45 article-title: Teaching students self-advertising/marketing skills in the age of social media: Designing an experiential exercise publication-title: Journal of Advertising Education – volume: 62 start-page: 381 year: 2005 end-page: 422 ident: bib50 article-title: The mechanics of trust: A framework for research and design publication-title: International Journal of Human-Computer Studies – volume: 56 start-page: 3866 year: 2012 end-page: 3878 ident: bib22 article-title: Online social networks: A survey of a global phenomenon publication-title: Computer Networks – volume: 111 start-page: 212 year: 2011 end-page: 226 ident: bib64 article-title: The impact of privacy concern on user adoption of location-based services publication-title: Industrial Management & Data Systems – volume: 115 start-page: 769 year: 2015 end-page: 802 ident: bib46 article-title: Social media models, technologies, and applications publication-title: Industrial Management & Data Systems – volume: 28 start-page: 453 year: 2011 end-page: 496 ident: bib38 article-title: Empirical studies on online information privacy concerns: Literature review and an integrative framework publication-title: Communications of the Association for Information Systems – volume: 54 start-page: 15 year: 2016 end-page: 24 ident: bib49 article-title: Tensions and ties in social media networks: Towards a model of understanding business relationship development and business performance enhancement through the use of LinkedIn publication-title: Industrial Marketing Management – volume: 22 start-page: 428 year: 2010 end-page: 438 ident: bib54 article-title: The effects of trust, security and privacy in social networking: A security-based approach to understand the pattern of adoption publication-title: Interacting with Computers – volume: 25 start-page: 153 year: 2009 end-page: 160 ident: bib17 article-title: Internet social network communities: Risk taking, trust, and privacy concerns publication-title: Computers in Human Behavior – volume: 27 start-page: 425 year: 2003 end-page: 478 ident: bib69 article-title: User acceptance of information technology: Toward a unified view publication-title: MIS Quarterly – volume: 30 start-page: 22 year: 2013 end-page: 34 ident: bib2 article-title: Communities of participation: A comparison of disability and aging identified groups on Facebook and LinkedIn publication-title: Telematics and Informatics – volume: 12 start-page: 259 year: 2009 end-page: 277 ident: bib10 article-title: The influence of perceived risk on internet shopping behavior: A multidimensional perspective publication-title: Journal of Risk Research – volume: 33 start-page: 371 year: 2009 end-page: 393 ident: bib68 article-title: Model of acceptance with peer support: A social network perspective to understand employees' system use publication-title: MIS Quarterly – volume: 13 start-page: 319 year: 1989 end-page: 339 ident: bib11 article-title: Perceived usefulness, perceived ease of use, and user acceptance of information technology publication-title: MIS Quarterly – volume: 13 start-page: 210 year: 2007 end-page: 230 ident: bib6 article-title: Social network sites: Definition, history, and scholarship publication-title: Journal of Computer-Mediated Communication – volume: 15 start-page: 336 year: 2004 end-page: 355 ident: bib41 article-title: Internet users' information privacy concerns (IUIPC): The construct, the scale, and a causal model publication-title: Information Systems Research – volume: 23 start-page: 422 year: 1998 end-page: 437 ident: bib53 article-title: The grammars of trust: A model and general implications publication-title: The Academy of Management Review – volume: 23 start-page: 601 year: 1998 end-page: 620 ident: bib12 article-title: Understanding the influence of national culture on the development of trust publication-title: The Academy of Management Review – volume: 48 start-page: 159 year: 2005 end-page: 205 ident: bib60 article-title: PLS path modeling publication-title: Computational Statistics & Data Analysis – year: 1985 ident: bib55 article-title: Basic research methods in Social Science – volume: 6 start-page: 339 year: 2014 end-page: 348 ident: bib47 article-title: The economic impact of privacy violations and security breaches publication-title: Business & Information Systems Engineering – year: 2014 ident: bib3 article-title: Uses and gratifications of LinkedIn: An exploratory study publication-title: Proceedings of the world congress on engineering 2014 Vol. II, London, U.K – volume: 16 start-page: 17 year: 2015 end-page: 35 ident: bib16 article-title: Applying uses and gratifications theory to students' LinkedIn usage publication-title: Young Consumers – volume: 74 start-page: 159 year: 2015 end-page: 178 ident: bib28 article-title: Exploring social networking sites for facilitating multi-channel retailing publication-title: Multimedia Tools and Applications – volume: 32 start-page: 129 year: 2015 end-page: 142 ident: bib52 article-title: Mobile banking adoption: A literature review publication-title: Telematics and Informatics – volume: 26 start-page: 857 year: 2010 end-page: 869 ident: bib4 article-title: How shall I trust the faceless and the intangible? A literature review on the antecedents of online trust publication-title: Computers in Human Behavior – volume: 21 start-page: 119 year: 1994 end-page: 134 ident: bib13 article-title: A model of perceived risk and intended risk-handling activity publication-title: Journal of consumer research – volume: 30 start-page: 587 year: 2011 end-page: 601 ident: bib24 article-title: Exploring the antecedents of trust in virtual communities publication-title: Behaviour & Information Technology – volume: 22 start-page: 211 year: 2012 end-page: 233 ident: bib58 article-title: Impact of privacy concern in social networking web sites publication-title: Internet Research – volume: 42 start-page: 1819 year: 2006 end-page: 1834 ident: bib23 article-title: Understanding continued information technology usage behavior: A comparison of three models in the context of mobile internet publication-title: Decision Support Systems – volume: 42 start-page: 32 year: 2011 end-page: 54 ident: bib35 article-title: What does it mean to trust Facebook? Examining technology and interpersonal trust beliefs publication-title: The DATA BASE for Advances in Information Systems – volume: 11 start-page: 87 year: 2014 end-page: 114 ident: bib62 article-title: The use of social network sites in the workplace: A case study in Brazilian companies publication-title: Brazilian Business Review – volume: 4 start-page: 27 year: 2013 end-page: 34 ident: bib15 article-title: College students' use of social Media: Site preferences, uses and gratifications theory revisited publication-title: International Journal of Business and Social Science – volume: 60 start-page: 441 year: 2016 end-page: 450 ident: bib42 article-title: Exploring students' purposes of usage and educational usage of Facebook publication-title: Computers in Human Behavior – volume: 27 start-page: 590 year: 2011 end-page: 598 ident: bib57 article-title: Factors mediating disclosure in social network sites publication-title: Computer in Human Behavior – volume: 28 start-page: 563 year: 1975 end-page: 575 ident: bib37 article-title: A quantitative approach to content validity publication-title: Personnel Psychology – volume: 27 start-page: 51 year: 2003 end-page: 90 ident: bib19 article-title: Trust and TAM in online shopping: An integrated model publication-title: MIS Quarterly – volume: 55 start-page: 43 year: 2013 end-page: 54 ident: bib1 article-title: Why people keep coming back to Facebook: Explaining and predicting continuance participation from an extended theory of planned behaviour perspective publication-title: Decision Support Systems – volume: 13 start-page: 334 year: 2002 end-page: 359 ident: bib44 article-title: Developing and validating trust measures for e-commerce: An integrative typology publication-title: Information Systems Research – year: 2015 ident: bib39 article-title: About Linkedin – volume: 3 start-page: 2 year: 2000 end-page: 16 ident: bib20 article-title: A survey of trust in internet applications publication-title: IEEE Communications Survey and Tutorials – volume: 10 start-page: 95 year: 2009 end-page: 103 ident: bib56 article-title: When social networks cross boundaries: A case study of workplace use of Facebook and LinkedIn publication-title: Group – volume: 56 start-page: 3866 issue: 18 year: 2012 ident: 10.1016/j.chb.2016.12.013_bib22 article-title: Online social networks: A survey of a global phenomenon publication-title: Computer Networks doi: 10.1016/j.comnet.2012.08.009 – volume: 12 start-page: 259 issue: 2 year: 2009 ident: 10.1016/j.chb.2016.12.013_bib10 article-title: The influence of perceived risk on internet shopping behavior: A multidimensional perspective publication-title: Journal of Risk Research doi: 10.1080/13669870802497744 – volume: 42 start-page: 1819 issue: 3 year: 2006 ident: 10.1016/j.chb.2016.12.013_bib23 article-title: Understanding continued information technology usage behavior: A comparison of three models in the context of mobile internet publication-title: Decision Support Systems doi: 10.1016/j.dss.2006.03.009 – volume: 23 start-page: 601 issue: 3 year: 1998 ident: 10.1016/j.chb.2016.12.013_bib12 article-title: Understanding the influence of national culture on the development of trust publication-title: The Academy of Management Review doi: 10.5465/amr.1998.926629 – volume: 16 start-page: 17 issue: 1 year: 2015 ident: 10.1016/j.chb.2016.12.013_bib16 article-title: Applying uses and gratifications theory to students' LinkedIn usage publication-title: Young Consumers doi: 10.1108/YC-12-2013-00416 – volume: 30 start-page: 22 issue: 1 year: 2013 ident: 10.1016/j.chb.2016.12.013_bib2 article-title: Communities of participation: A comparison of disability and aging identified groups on Facebook and LinkedIn publication-title: Telematics and Informatics doi: 10.1016/j.tele.2012.03.004 – year: 2015 ident: 10.1016/j.chb.2016.12.013_bib39 – year: 1985 ident: 10.1016/j.chb.2016.12.013_bib55 – volume: 21 start-page: 119 issue: 1 year: 1994 ident: 10.1016/j.chb.2016.12.013_bib13 article-title: A model of perceived risk and intended risk-handling activity publication-title: Journal of consumer research doi: 10.1086/209386 – volume: 22 start-page: 211 issue: 2 year: 2012 ident: 10.1016/j.chb.2016.12.013_bib58 article-title: Impact of privacy concern in social networking web sites publication-title: Internet Research doi: 10.1108/10662241211214575 – volume: 15 start-page: 336 issue: 4 year: 2004 ident: 10.1016/j.chb.2016.12.013_bib41 article-title: Internet users' information privacy concerns (IUIPC): The construct, the scale, and a causal model publication-title: Information Systems Research doi: 10.1287/isre.1040.0032 – volume: 3 start-page: 2 issue: 4 year: 2000 ident: 10.1016/j.chb.2016.12.013_bib20 article-title: A survey of trust in internet applications publication-title: IEEE Communications Survey and Tutorials doi: 10.1109/COMST.2000.5340804 – volume: 40 start-page: 269 issue: 4 year: 2003 ident: 10.1016/j.chb.2016.12.013_bib51 article-title: Understanding IT adoption decisions in small business: Integrating current theories publication-title: Information Management doi: 10.1016/S0378-7206(02)00010-1 – volume: 7 start-page: 6 issue: 2 year: 2004 ident: 10.1016/j.chb.2016.12.013_bib48 article-title: Risk-focused e-commerce adoption model: A cross-country study publication-title: Journal of Global Information Technology Management doi: 10.1080/1097198X.2004.10856370 – volume: 48 start-page: 159 issue: 1 year: 2005 ident: 10.1016/j.chb.2016.12.013_bib60 article-title: PLS path modeling publication-title: Computational Statistics & Data Analysis doi: 10.1016/j.csda.2004.03.005 – volume: 4 start-page: 127 issue: 3 year: 2012 ident: 10.1016/j.chb.2016.12.013_bib33 article-title: Self-disclosure and privacy calculus on social networking sites: The role of culture publication-title: Business & Information Systems Engineering doi: 10.1007/s12599-012-0216-6 – volume: 42 start-page: 32 issue: 2 year: 2011 ident: 10.1016/j.chb.2016.12.013_bib36 article-title: What does it mean to trust Facebook? Examining technology and interpersonal trust beliefs publication-title: ACM SIGMIS Database doi: 10.1145/1989098.1989101 – volume: 15 start-page: 23 issue: 1 year: 2011 ident: 10.1016/j.chb.2016.12.013_bib45 article-title: Teaching students self-advertising/marketing skills in the age of social media: Designing an experiential exercise publication-title: Journal of Advertising Education doi: 10.1177/109804821101500104 – volume: 62 start-page: 381 issue: 3 year: 2005 ident: 10.1016/j.chb.2016.12.013_bib50 article-title: The mechanics of trust: A framework for research and design publication-title: International Journal of Human-Computer Studies doi: 10.1016/j.ijhcs.2005.01.001 – volume: 13 start-page: 334 issue: 3 year: 2002 ident: 10.1016/j.chb.2016.12.013_bib44 article-title: Developing and validating trust measures for e-commerce: An integrative typology publication-title: Information Systems Research doi: 10.1287/isre.13.3.334.81 – volume: 32 start-page: 129 issue: 1 year: 2015 ident: 10.1016/j.chb.2016.12.013_bib52 article-title: Mobile banking adoption: A literature review publication-title: Telematics and Informatics doi: 10.1016/j.tele.2014.05.003 – volume: 25 start-page: 153 issue: 1 year: 2009 ident: 10.1016/j.chb.2016.12.013_bib17 article-title: Internet social network communities: Risk taking, trust, and privacy concerns publication-title: Computers in Human Behavior doi: 10.1016/j.chb.2008.08.006 – volume: 51 start-page: 534 issue: 4 year: 2014 ident: 10.1016/j.chb.2016.12.013_bib34 article-title: What drives successful social networking services? A comparative analysis of user acceptance of Facebook and Twitter publication-title: The Social Science Journal doi: 10.1016/j.soscij.2014.04.005 – volume: 54 start-page: 15 year: 2016 ident: 10.1016/j.chb.2016.12.013_bib49 article-title: Tensions and ties in social media networks: Towards a model of understanding business relationship development and business performance enhancement through the use of LinkedIn publication-title: Industrial Marketing Management doi: 10.1016/j.indmarman.2015.12.001 – volume: 22 start-page: 211 issue: 2 year: 2012 ident: 10.1016/j.chb.2016.12.013_bib59 article-title: Impact of privacy concern in social networking web sites publication-title: Internet Research doi: 10.1108/10662241211214575 – volume: 33 start-page: 318 issue: 2 year: 2013 ident: 10.1016/j.chb.2016.12.013_bib32 article-title: Effects of various characteristics of social commerce (s-commerce) on consumers' trust and trust performance publication-title: International Journal of Information Management doi: 10.1016/j.ijinfomgt.2012.11.006 – volume: 42 start-page: 32 issue: 2 year: 2011 ident: 10.1016/j.chb.2016.12.013_bib35 article-title: What does it mean to trust Facebook? Examining technology and interpersonal trust beliefs publication-title: The DATA BASE for Advances in Information Systems doi: 10.1145/1989098.1989101 – volume: 28 start-page: 563 issue: 4 year: 1975 ident: 10.1016/j.chb.2016.12.013_bib37 article-title: A quantitative approach to content validity publication-title: Personnel Psychology doi: 10.1111/j.1744-6570.1975.tb01393.x – volume: 20 start-page: 195 issue: 2 year: 1999 ident: 10.1016/j.chb.2016.12.013_bib25 article-title: Use of partial least squares (PLS) in strategic management research: A review of four recent studies publication-title: Strategic Management Journal doi: 10.1002/(SICI)1097-0266(199902)20:2<195::AID-SMJ13>3.0.CO;2-7 – volume: 27 start-page: 51 issue: 1 year: 2003 ident: 10.1016/j.chb.2016.12.013_bib19 article-title: Trust and TAM in online shopping: An integrated model publication-title: MIS Quarterly doi: 10.2307/30036519 – volume: 16 start-page: 273 issue: 35 year: 2014 ident: 10.1016/j.chb.2016.12.013_bib27 article-title: Organizations' responsibility in maintaining the security of personal data posted online by Romanian consumers: An exploratory analysis of Facebook and LinkedIn publication-title: Amfiteatru Economic – volume: 107 start-page: 21 issue: 1 year: 2007 ident: 10.1016/j.chb.2016.12.013_bib8 article-title: Initial trust and online buyer behaviour publication-title: Industrial Management & Data Systems doi: 10.1108/02635570710719034 – volume: 26 start-page: 857 issue: 5 year: 2010 ident: 10.1016/j.chb.2016.12.013_bib4 article-title: How shall I trust the faceless and the intangible? A literature review on the antecedents of online trust publication-title: Computers in Human Behavior doi: 10.1016/j.chb.2010.03.013 – volume: 4 start-page: 27 issue: 5 year: 2013 ident: 10.1016/j.chb.2016.12.013_bib15 article-title: College students' use of social Media: Site preferences, uses and gratifications theory revisited publication-title: International Journal of Business and Social Science – volume: 6 start-page: 339 issue: 6 year: 2014 ident: 10.1016/j.chb.2016.12.013_bib47 article-title: The economic impact of privacy violations and security breaches publication-title: Business & Information Systems Engineering doi: 10.1007/s12599-014-0351-3 – volume: 40 start-page: 994 issue: 6 year: 2011 ident: 10.1016/j.chb.2016.12.013_bib14 article-title: Bridging and bonding forms of social capital in a regional strategic network publication-title: Industrial Marketing Management doi: 10.1016/j.indmarman.2011.06.040 – volume: 48 start-page: 1 issue: 1 year: 2011 ident: 10.1016/j.chb.2016.12.013_bib26 article-title: An international comparison of technology adoption: Testing the UTAUT model publication-title: Information & Management doi: 10.1016/j.im.2010.09.001 – volume: 50 start-page: 162 issue: 4 year: 2013 ident: 10.1016/j.chb.2016.12.013_bib29 article-title: The perspective of a revised TRAM on social capital building: The case of Facebook usage publication-title: Information & Management doi: 10.1016/j.im.2013.03.002 – volume: 21 start-page: 202 issue: 3 year: 2011 ident: 10.1016/j.chb.2016.12.013_bib61 article-title: Enterprise social networking: Opportunities, adoption, and risk mitigation publication-title: Journal of Organizational Computing and Electronic Commerce doi: 10.1080/10919392.2011.590109 – volume: 11 start-page: 87 issue: 2 year: 2014 ident: 10.1016/j.chb.2016.12.013_bib62 article-title: The use of social network sites in the workplace: A case study in Brazilian companies publication-title: Brazilian Business Review doi: 10.15728/bbr.2014.11.2.4 – volume: 19 start-page: 213 issue: 1 year: 2002 ident: 10.1016/j.chb.2016.12.013_bib5 article-title: Individual trust in online Firms: Scale development and initial trust publication-title: Journal of Management Information Systems – volume: 33 start-page: 371 issue: 2 year: 2009 ident: 10.1016/j.chb.2016.12.013_bib68 article-title: Model of acceptance with peer support: A social network perspective to understand employees' system use publication-title: MIS Quarterly doi: 10.2307/20650296 – volume: 30 start-page: 587 issue: 5 year: 2011 ident: 10.1016/j.chb.2016.12.013_bib24 article-title: Exploring the antecedents of trust in virtual communities publication-title: Behaviour & Information Technology doi: 10.1080/0144929X.2010.549513 – volume: 28 start-page: 453 issue: 1 year: 2011 ident: 10.1016/j.chb.2016.12.013_bib38 article-title: Empirical studies on online information privacy concerns: Literature review and an integrative framework publication-title: Communications of the Association for Information Systems – volume: 22 start-page: 428 issue: 5 year: 2010 ident: 10.1016/j.chb.2016.12.013_bib54 article-title: The effects of trust, security and privacy in social networking: A security-based approach to understand the pattern of adoption publication-title: Interacting with Computers doi: 10.1016/j.intcom.2010.05.001 – volume: 7 start-page: 329 issue: 10 year: 2005 ident: 10.1016/j.chb.2016.12.013_bib43 article-title: Trust in information technology publication-title: The Blackwell Encyclopedia of Management, Management Information Systems – volume: 55 start-page: 43 issue: 1 year: 2013 ident: 10.1016/j.chb.2016.12.013_bib1 article-title: Why people keep coming back to Facebook: Explaining and predicting continuance participation from an extended theory of planned behaviour perspective publication-title: Decision Support Systems doi: 10.1016/j.dss.2012.12.032 – volume: 43 start-page: 618 issue: 2 year: 2007 ident: 10.1016/j.chb.2016.12.013_bib30 article-title: A survey of trust and reputation systems for online service provision publication-title: Decision Support Systems doi: 10.1016/j.dss.2005.05.019 – volume: 74 start-page: 159 issue: 1 year: 2015 ident: 10.1016/j.chb.2016.12.013_bib28 article-title: Exploring social networking sites for facilitating multi-channel retailing publication-title: Multimedia Tools and Applications doi: 10.1007/s11042-013-1430-z – volume: 13 start-page: 210 issue: 1 year: 2007 ident: 10.1016/j.chb.2016.12.013_bib6 article-title: Social network sites: Definition, history, and scholarship publication-title: Journal of Computer-Mediated Communication doi: 10.1111/j.1083-6101.2007.00393.x – volume: 37 start-page: 283 issue: 10 year: 2014 ident: 10.1016/j.chb.2016.12.013_bib65 article-title: Understanding mobile SNS continuance usage in China from the perspectives of social influence and privacy concern publication-title: Computers in Human Behavior doi: 10.1016/j.chb.2014.05.008 – volume: 10 start-page: 95 issue: 3 year: 2009 ident: 10.1016/j.chb.2016.12.013_bib56 article-title: When social networks cross boundaries: A case study of workplace use of Facebook and LinkedIn publication-title: Group – volume: 16 start-page: 479 issue: 4 year: 2013 ident: 10.1016/j.chb.2016.12.013_bib63 article-title: Privacy protection strategies on Facebook publication-title: Information, Communication & Society doi: 10.1080/1369118X.2013.777757 – volume: 27 start-page: 590 issue: 1 year: 2011 ident: 10.1016/j.chb.2016.12.013_bib57 article-title: Factors mediating disclosure in social network sites publication-title: Computer in Human Behavior doi: 10.1016/j.chb.2010.10.017 – volume: 19 start-page: 194 issue: 2 year: 2009 ident: 10.1016/j.chb.2016.12.013_bib31 article-title: Privacy and fair information practices in ubiquitous environments publication-title: Internet Research doi: 10.1108/10662240910952346 – year: 2014 ident: 10.1016/j.chb.2016.12.013_bib3 article-title: Uses and gratifications of LinkedIn: An exploratory study – volume: 60 start-page: 441 issue: 2016 year: 2016 ident: 10.1016/j.chb.2016.12.013_bib42 article-title: Exploring students' purposes of usage and educational usage of Facebook publication-title: Computers in Human Behavior doi: 10.1016/j.chb.2016.02.087 – volume: 115 start-page: 88 issue: 1 year: 2015 ident: 10.1016/j.chb.2016.12.013_bib7 article-title: Exploring privacy and trust for employee monitoring publication-title: Industrial Management & Data Systems doi: 10.1108/IMDS-07-2014-0197 – volume: 13 start-page: 319 issue: 3 year: 1989 ident: 10.1016/j.chb.2016.12.013_bib11 article-title: Perceived usefulness, perceived ease of use, and user acceptance of information technology publication-title: MIS Quarterly doi: 10.2307/249008 – volume: 111 start-page: 212 issue: 2 year: 2011 ident: 10.1016/j.chb.2016.12.013_bib64 article-title: The impact of privacy concern on user adoption of location-based services publication-title: Industrial Management & Data Systems doi: 10.1108/02635571111115146 – volume: 26 start-page: 760 issue: 4 year: 2010 ident: 10.1016/j.chb.2016.12.013_bib67 article-title: Integrating TTF and UTAUT to explain mobile banking user adoption publication-title: Computers in Human Behavior doi: 10.1016/j.chb.2010.01.013 – volume: 23 start-page: 422 issue: 3 year: 1998 ident: 10.1016/j.chb.2016.12.013_bib53 article-title: The grammars of trust: A model and general implications publication-title: The Academy of Management Review doi: 10.5465/amr.1998.926619 – volume: 14 start-page: 189 issue: 2 year: 2003 ident: 10.1016/j.chb.2016.12.013_bib9 article-title: A partial least squares latent variable modeling approach for measuring interaction effects: Results from a Monte Carlo simulation study and an electronic mail emotion/adoption study publication-title: Information Systems Research doi: 10.1287/isre.14.2.189.16018 – volume: 18 start-page: 39 issue: 1 year: 1981 ident: 10.1016/j.chb.2016.12.013_bib18 article-title: Evaluating structural equation models with unobservable variables and measurement error publication-title: Journal of Marketing Research doi: 10.1177/002224378101800104 – volume: 13 start-page: 478 issue: 5 year: 2015 ident: 10.1016/j.chb.2016.12.013_bib66 article-title: Why consumers adopt mobile payment? A Partial Least Squares Structural Equation Modeling (PLS-SEM) approach publication-title: International Journal of Mobile Communications doi: 10.1504/IJMC.2015.070961 – volume: 19 start-page: 139 issue: 2 year: 2011 ident: 10.1016/j.chb.2016.12.013_bib21 article-title: PLS-SEM: Indeed a silver bullet publication-title: Journal of Marketing Theory and Practice doi: 10.2753/MTP1069-6679190202 – volume: 115 start-page: 769 issue: 5 year: 2015 ident: 10.1016/j.chb.2016.12.013_bib46 article-title: Social media models, technologies, and applications publication-title: Industrial Management & Data Systems doi: 10.1108/IMDS-03-2015-0075 – volume: 27 start-page: 425 issue: 3 year: 2003 ident: 10.1016/j.chb.2016.12.013_bib69 article-title: User acceptance of information technology: Toward a unified view publication-title: MIS Quarterly doi: 10.2307/30036540 |
SSID | ssj0005506 |
Score | 2.443026 |
Snippet | The innovative social networking services (SNS) provide people with versatile personal, commerce, and social applications. This study compares Facebook and... |
SourceID | proquest crossref elsevier |
SourceType | Aggregation Database Enrichment Source Index Database Publisher |
StartPage | 207 |
SubjectTerms | Comparative analysis Perceived risk Privacy Privacy concern Risk perception Service trust Social networking services (SNS) Social networks Studies Trust User behavior User groups |
Title | User trust in social networking services: A comparison of Facebook and LinkedIn |
URI | https://dx.doi.org/10.1016/j.chb.2016.12.013 https://www.proquest.com/docview/1932080955 |
Volume | 69 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV3NS8MwFA9jXnbxYypO58jBk1DXtUnaehvDsTmYoA53C0na4kS6wXbx4t_ue2k6VHAHT4WSlPLyPn4v-eU9Qq4SxrDoSe75ieIeWCLYnMojL-1BRqRDo8DYkW0xFaMZu5_zeY0MqrswSKt0vr_06dZbuzddJ83uarHoPmHpdy7CABAF4IgQ83bGItTym89vNA9u-2viYA9HVyebluNlXjWyu4TdEeyFf8WmX17ahp7hIdl3mJH2y986IrWsaJKDqh8DdebZJI2tN_s4Jg8zUC5qr1TQRUHLvXFalKxviFd07bzELe1Ts-1GSJc5HSpjz1CpKlKKyWqWjosTMhvePQ9Gnuue4BmAbBsv1hC8dZqmjBstdBCKxAQiFCqLuZ_BuyjOcgFwi0cG0tRYC5bFCQiQa18rloanpF4si-yM0BxAFofQj_3RWR7wOGCxMByQZg-3OlWL-JXcpHGlxbHDxbusOGRvEkQtUdSyF0gQdYtcb6esyroauwazajHkD-WQ4Pd3TWtXCyedZa4lAlZAyQnn5__76gVpBBjaLXunTeqwkNklAJON7ljN65C9_ngymuJz8vgy-QIAbuA3 |
linkProvider | Elsevier |
linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV3NT8IwFH8hcJCLH6gRRe3Bk8nC2Npu80aIZAjiQUi4NW23RYwZJHDxv_d16zCayMFr0y7L6_v4vfbX9wDuIkpN0ZPMcSPJHLREtDmZBU7Sw4xI-VqisRu2xZTHc_q0YIsaDKq3MIZWaX1_6dMLb21Hulaa3fVy2X01pd8Z9z1EFIgjfMzbG6Y6FatDoz8ax9NvpgcrWmya-Y5ZUF1uFjQv_aYMwYsXh4I9_6_w9MtRF9FneAyHFjaSfvlnJ1BL8xYcVS0ZiLXQFjR3Du3zFF7mqF-keFVBljkpj8dJXhK_MWSRjXUUD6RP9K4hIVllZCh1cY1KZJ4Qk6-mySg_g_nwcTaIHdtAwdGI2rZOqDB-qyRJKNOKK8_nkfa4z2UaMjfFsSBMM46IiwUaM9VQcZqGEQ04U66SNPHPoZ6v8vQCSIY4i2H0Ny3Saeax0KMh1wzBZs-cdso2uJXchLbVxU2Tiw9R0cjeBYpaGFGLnidQ1G243y1Zl6U19k2m1WaIH_oh0PXvW9apNk5Y49wIg1kRKEeMXf7vq7dwEM-eJ2Iymo6voOmZSF-QeTpQx01NrxGnbNWN1cMvuUbhRQ |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=User+trust+in+social+networking+services%3A+A+comparison+of+Facebook+and+LinkedIn&rft.jtitle=Computers+in+human+behavior&rft.au=Chang%2C+Shuchih+Ernest&rft.au=Liu%2C+Anne+Yenching&rft.au=Shen%2C+Wei+Cheng&rft.date=2017-04-01&rft.issn=0747-5632&rft.volume=69&rft.spage=207&rft.epage=217&rft_id=info:doi/10.1016%2Fj.chb.2016.12.013&rft.externalDBID=n%2Fa&rft.externalDocID=10_1016_j_chb_2016_12_013 |
thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0747-5632&client=summon |
thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0747-5632&client=summon |
thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0747-5632&client=summon |