3,275
Views
7
CrossRef citations to date
0
Altmetric
Research Article

Mobile SNS Addiction as A Learned Behavior: A Perspective from Learning Theory

Pages 461-492 | Received 05 Apr 2018, Accepted 05 Apr 2019, Published online: 01 May 2019

References

  • Ahn, J. (2012). Teenagers’ experiences with social network sites: Relationships to bridging and bonding social capital. The Information Society, 28(2), 99–109. doi:10.1080/01972243.2011.649394
  • Andreassen, C. S. (2015). Online social network site addiction: A comprehensive review. Current Addiction Reports, 2(2), 175–184. doi:10.1007/s40429-015-0056-9
  • Astrachan, C. B., Patel, V. K., & Wanzenried, G. (2014). A comparative study of CB-SEM and PLS-SEM for theory development in family firm research. Journal of Family Business Strategy, 5(1), 116–128. doi:10.1016/j.jfbs.2013.12.002
  • Barker, V. (2009). Older adolescents‘ motivations for social network site use: The influence of gender, group identity, and collective self-esteem. Cyberpsychology & Behavior, 12(2), 209–213. doi:10.1089/cpb.2008.0228
  • Brunborg, G. S., Mentzoni, R. A., Melkevik, O. R., Torsheim, T., Samdal, O., Hetland, J., … Palleson, S. (2013). Gaming addiction, gaming engagement, and psychological health complaints among Norwegian adolescents. Media Psychology, 16(1), 115–128. doi:10.1080/15213269.2012.756374
  • Chen, H., Wigand, R. T., & Nilan, M. (2000). Exploring web users’ optimal flow experiences. Information Technology & People, 13(4), 263–281. doi:10.1108/09593840010359473
  • Chen, R., & Sharma, S. K. (2015). Learning and self-disclosure behavior on social networking sites: The case of Facebook users. European Journal of Information Systems, 24(1), 93–106. doi:10.1057/ejis.2013.31
  • Cheshire, C. (2011). Online trust, trustworthiness, or assurance? Daedalus, 140(4), 49–58. doi:10.1162/DAED_a_00114
  • Cheung, C. M., Chiu, P.-Y., & Lee, M. K. (2011). Online social networks: Why do students use facebook? Computers in Human Behavior, 27(4), 1337–1343. doi:10.1016/j.chb.2010.07.028
  • Chin, W. W. (1998). The partial least squares approach for structural equation modeling. In G. A. Marcoulides (Ed.), Modern methods for business research (pp. 295–336). Mahwah, NJ: Lawrence Erlbaum Associates.
  • Chin, W. W., Marcolin, B. L., & Newsted, P. R. (2003). A partial least squares latent variable modeling approach for measuring interaction effects: Results from a Monte Carlo simulation study and an electronic-mail emotion/adoption study. Information Systems Research, 14(2), 189–217. doi:10.1287/isre.14.2.189.16018
  • Chou, T.-J., & Ting, -C.-C. (2003). The role of flow experience in cyber-game addiction. Cyberpsychology & Behavior, 6(6), 663–675. doi:10.1089/109493103322725469
  • Cohen, J. (1988). Statistical power analysis for the behavioral sciences (2 ed. ed.). Hillside, NJ: Lawrence Earlbaum Associates.
  • Conklin, C. A., & Tiffany, S. T. (2002). Applying extinction research and theory to cue‐exposure addiction treatments. Addiction, 97(2), 155–167. doi:10.1046/j.1360-0443.2002.00014.x
  • Dholakia, U. M., Bagozzi, R. P., & Pearo, L. K. (2004). A social influence model of consumer participation in network-and small-group-based virtual communities. International Journal of Research in Marketing, 21(3), 241–263. doi:10.1016/j.ijresmar.2003.12.004
  • Domjan, M. (2005). Pavlovian conditioning: A functional perspective. Annual Review of Psychology, 56, 179–206. doi:10.1146/annurev.psych.55.090902.141409
  • Emmelkamp, P. M., & Vedel, E. (2012). Evidence-based treatments for alcohol and drug abuse: A practitioner‘s guide to theory, methods, and practice. New York, NY: Routledge.
  • Fioravanti, G., Dèttore, D., & Casale, S. (2012). Adolescent Internet addiction: Testing the association between self-esteem, the perception of Internet attributes, and preference for online social interactions. Cyberpsychology, Behavior, and Social Networking, 15(6), 318–323. doi:10.1089/cyber.2011.0358
  • Fornell, C., & Larcker, D. F. (1981). Structural equation models with unobservable variables and measurement error: Algebra and statistics. Journal of Marketing Research, 18(3), 382–388. doi:10.2307/3150980
  • Griffiths, M. D. (2005). A ‘components’ model of addiction within a biopsychosocial framework. Journal of Substance Use, 10(4), 191–197. doi:10.1080/14659890500114359
  • Griffiths, M. D. (2013). Social networking addiction: Emerging themes and issues. Journal of Addiction Research & Therapy, 4(5), e118. doi:10.4172/2155-6105.1000e118
  • Hair, J. F., Hult, G. T. M., Ringle, C., & Sarstedt, M. (2014). A primer on partial least squares structural equation modeling (PLS-SEM). Thousand Oaks: Sage.
  • Hair, J. F., Ringle, C. M., & Sarstedt, M. (2011). PLS-SEM: Indeed a silver bullet. Journal of Marketing Theory and Practice, 19(2), 139–152. doi:10.2753/MTP1069-6679190202
  • Henseler, J., Ringle, C. M., & Sinkovics, R. R. (2009). The use of partial least squares path modeling in international marketing. In R. R. Sinkovics & P. N. Ghauri (Eds.), Advances in international marketing (Vol. 20, pp. 277–320). Bingley, UK: Emerald.
  • Jin, C. (2013). The perspective of a revised TRAM on social capital building: The case of Facebook usage. Information & Management, 50(4), 162–168. doi:10.1016/j.im.2013.03.002
  • Kang, I., Shin, M. M., & Park, C. (2013). Internet addiction as a manageable resource: A focus on social network services. Online Information Review, 37(1), 28–41. doi:10.1108/14684521311311612
  • Kim, Y., Sohn, D., & Choi, S. M. (2011). Cultural difference in motivations for using social network sites: A comparative study of American and Korean college students. Computers in Human Behavior, 27(1), 365–372. doi:10.1016/j.chb.2010.08.015
  • Krasnova, H., Spiekermann, S., Koroleva, K., & Hildebrand, T. (2010). Online social networks: Why we disclose. Journal of Information Technology, 25(2), 109–125. doi:10.1057/jit.2010.6
  • Kuss, D. J., & Griffiths, M. D. (2011). Online social networking and addiction-A review of the psychological literature. International Journal of Environmental Research and Public Health, 8(9), 3528–3552. doi:10.3390/ijerph8093528
  • LaRose, R., Lin, C. A., & Eastin, M. S. (2003). Unregulated Internet usage: Addiction, habit, or deficient self-regulation? Media Psychology, 5(3), 225–253. doi:10.1207/S1532785XMEP0503_01
  • Lemmens, J. S., Valkenburg, P. M., & Peter, J. (2009). Development and validation of a game addiction scale for adolescents. Media Psychology, 12(1), 77–95. doi:10.1080/15213260802669458
  • Leung, L., & Lee, P. S. (2005). Multiple determinants of life quality: The roles of internet activities, use of new media, social support, and leisure activities. Telematics and Informatics, 22(3), 161–180. doi:10.1016/j.tele.2004.04.003
  • Lin, K.-Y., & Lu, H.-P. (2015). Predicting mobile social network acceptance based on mobile value and social influence. Internet Research, 25(1), 107–130. doi:10.1108/IntR-01-2014-0018
  • Loeber, S., Croissant, B., Heinz, A., Mann, K., & Flor, H. (2006). Cue exposure in the treatment of alcohol dependence: Effects on drinking outcome, craving and self‐efficacy. British Journal of Clinical Psychology, 45(4), 515–529. doi:10.1348/014466505X82586
  • Mäntymäki, M., & Islam, A. N. (2016). The Janus face of Facebook: Positive and negative sides of social networking site use. Computers in Human Behavior, 61, 14–26. doi:10.1016/j.chb.2016.02.078
  • Masur, P. K., Reinecke, L., Ziegele, M., & Quiring, O. (2014). The interplay of intrinsic need satisfaction and Facebook specific motives in explaining addictive behavior on Facebook. Computers in Human Behavior, 39, 376–386. doi:10.1016/j.chb.2014.05.047
  • Ngai, E. W., Tao, S. S., & Moon, K. K. (2015). Social media research: Theories, constructs, and conceptual frameworks. International Journal of Information Management, 35(1), 33–44. doi:10.1016/j.ijinfomgt.2014.09.004
  • Oulasvirta, A., Rattenbury, T., Ma, L., & Raita, E. (2012). Habits make smartphone use more pervasive. Personal and Ubiquitous Computing, 16(1), 105–114. doi:10.1007/s00779-011-0412-2
  • Park, S. Y. (2009). An analysis of the technology acceptance model in understanding university students‘ behavioral intention to use e-learning. Journal of Educational Technology & Society, 12(3), 150. Retrieved from http://www.jstor.org/stable/jeductechsoci.12.3.150
  • Pelling, E. L., & White, K. M. (2009). The theory of planned behavior applied to young people‘s use of social networking web sites. Cyberpsychology & Behavior, 12(6), 755–759. doi:10.1089/cpb.2009.0109
  • Podsakoff, P. M., MacKenzie, S. B., & Podsakoff, N. P. (2012). Sources of method bias in social science research and recommendations on how to control it. Annual Review of Psychology, 63, 539–569. doi:10.1146/annurev-psych-120710-100452
  • Reinartz, W., Haenlein, M., & Henseler, J. (2009). An empirical comparison of the efficacy of covariance-based and variance-based SEM. International Journal of Research in Marketing, 26(4), 332–344. doi:10.1016/j.ijresmar.2009.08.001
  • Robbins, T., & Clark, L. (2015). Behavioral addictions. Current Opinion in Neurobiology, 30, 66–72. doi:10.1016/j.conb.2014.09.005
  • Robinson, T. E., & Berridge, K. C. (2008). The incentive sensitization theory of addiction: Some current issues. Philosophical Transactions of the Royal Society of London B: Biological Sciences, 363(1507), 3137–3146. doi:10.1098/rstb.2008.0093
  • Rubin, J. D., & McClelland, S. I. (2015). ‘Even though it‘s a small checkbox, it‘s a big deal’: Stresses and strains of managing sexual identity (s) on Facebook. Culture, Health & Sexuality, 17(4), 512–526. doi:10.1080/13691058.2014.994229
  • Salehan, M., & Negahban, A. (2013). Social networking on smartphones: When mobile phones become addictive. Computers in Human Behavior, 29(6), 2632–2639. doi:10.1016/j.chb.2013.07.003
  • Sanchez, G. (2013). PLS path modeling with R. Berkeley, CA, USA: Trowchez Editions.
  • Shaffer, H. J., LaPlante, D. A., LaBrie, R. A., Kidman, R. C., Donato, A. N., & Stanton, M. V. (2004). Toward a syndrome model of addiction: Multiple expressions, common etiology. Harvard Review of Psychiatry, 12(6), 367–374. doi:10.1080/10673220490905705
  • Sledgianowski, D., & Kulviwat, S. (2009). Using social network sites: The effects of playfulness, critical mass and trust in a hedonic context. Journal of Computer Information Systems, 49(4), 74–83. doi:10.1080/08874417.2009.11645342
  • Takao, M., Takahashi, S., & Kitamura, M. (2009). Addictive personality and problematic mobile phone use. Cyberpsychology & Behavior, 12(5), 501–507. doi:10.1089/cpb.2009.0022
  • Taylor, S. E. (1998). The social being in social psychology. In D. T. Gilbert, S. T. Fiske, & G. E. Lindzey (Eds.), The handbook of social psychology (pp. 58–98). New York, NY: McGraw-Hill.
  • Tenenhaus, M., Amato, S., & Esposito Vinzi, V. (2004). A global goodness-of-fit index for PLS structural equation modelling. Paper presented at the Proceedings of the XLII SIS Scientific Meeting, Padova, CLEUP.
  • Toda, M., Monden, K., Kubo, K., & Morimoto, K. (2006). Mobile phone dependence and health-related lifestyle of university students. Social Behavior and Personality: an International Journal, 34(10), 1277–1284. doi:10.2224/sbp.2006.34.10.1277
  • Turel, O., & Serenko, A. (2012). The benefits and dangers of enjoyment with social networking websites. European Journal of Information Systems, 21(5), 512–528. doi:10.1057/ejis.2012.1
  • Van Rooij, A. J., Ferguson, C. J., Colder Carras, M., Kardefelt-Winther, D., Shi, J., Aarseth, E., … Deleuze, J. (2018). A weak scientific basis for gaming disorder: Let us err on the side of caution. Journal of Behavioral Addictions, 7(1), 1–9. doi:10.1556/2006.7.2018.19
  • Venkatesh, V., Morris, M. G., Davis, G. B., & Davis, F. D. (2003). User acceptance of information technology: Toward a unified view. MIS Quarterly, 27, 425–478. doi:10.2307/30036540
  • Wan, C.-S., & Chiou, W.-B. (2006). Psychological motives and online games addiction: Atest of flow theory and humanistic needs theory for taiwanese adolescents. Cyberpsychology & Behavior, 9(3), 317–324. doi:10.1089/cpb.2006.9.317
  • Wang, E. S.-T., & Wang, M. C.-H. (2013). Social support and social interaction ties on internet addiction: Integrating online and offline contexts. Cyberpsychology, Behavior, and Social Networking, 16(11), 843–849. doi:10.1089/cyber.2012.0557
  • Weiten, W. (2007). Psychology: Themes and variations: Themes and variations. Belmont, CA: Thomson Higher Education.
  • Wetzels, M., Odekerken-Schröder, G., & Van Oppen, C. (2009). Using PLS path modeling for assessing hierarchical construct models: Guidelines and empirical illustration. MIS Quarterly, 30(1), 177–195. doi:10.2307/20650284
  • Whang, L. S.-M., Lee, S., & Chang, G. (2003). Internet over-users‘ psychological profiles: A behavior sampling analysis on internet addiction. Cyberpsychology & Behavior, 6(2), 143–150. doi:10.1089/109493103321640338
  • Wilson, K., Fornasier, S., & White, K. M. (2010). Psychological predictors of young adults‘ use of social networking sites. Cyberpsychology, Behavior, and Social Networking, 13(2), 173–177. doi:10.1089/cyber.2009.0094
  • Wu, A. M., Cheung, V. I., Ku, L., & Hung, E. P. (2013). Psychological risk factors of addiction to social networking sites among Chinese smartphone users. Journal of Behavioral Addictions, 2(3), 160–166. doi:10.1556/JBA.2.2013.006
  • Xu, Z., Turel, O., & Yuan, Y. (2012). Online game addiction among adolescents: Motivation and prevention factors. European Journal of Information Systems, 21(3), 321–340. doi:10.1057/ejis.2011.56
  • Yang, S., Liu, Y., & Wei, J. (2016). Social capital on mobile SNS addiction: A perspective from online and offline channel integrations. Internet Research, 26(4), 982–1000. doi:10.1108/IntR-01-2015-0010
  • Young, N. L., Kuss, D. J., Griffiths, M. D., & Howard, C. J. (2017). Passive Facebook use, Facebook addiction, and associations with escapism: An experimental vignette study. Computers in Human Behavior, 71, 24–31. doi:10.1016/j.chb.2017.01.039

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.