916
Views
4
CrossRef citations to date
0
Altmetric
Original Articles

User misrepresentation in online social networks: how competition and altruism impact online disclosure behaviours

, &
Pages 1320-1340 | Received 19 Jul 2018, Accepted 09 Sep 2019, Published online: 23 Sep 2019

References

  • Abel, M. J. 1990. Experiences in an Exploratory Distributed Organization.
  • Abraham, S., and I. Chengalur-Smith. 2010. “An Overview of Social Engineering Malware: Trends, Tactics, and Implications.” Technology in Society 32 (3): 183–196.
  • Alashoor, T., S. Han, and R. C. Joseph. 2017. “Familiarity with Big Data, Privacy Concerns, and Self-Disclosure Accuracy in Social Networking Websites: An APCO Model.” Communications of the Association for Information Systems 41 (1): 62–96.
  • Allcott, H., and M. Gentzkow. 2017. “Social Media and Fake News in the 2016 Election.” Journal of Economic Perspectives 31 (2): 211–236.
  • Bagozzi, R. P., M. Gopinath, and P. U. Nyer. 1999. “The Role of Emotions in Marketing.” Journal of the Academy of Marketing Science 27 (2): 184–206.
  • Bandura, A. 1977. “Self-efficacy: Toward a Unifying Theory of Behavioural Change.” Psychological Review 84 (2): 191–215.
  • Bandura, A. 1986. Social Foundations of Thought and Action: A Social Cognitive Theory. Englewood Cliffs, NJ: Prentice-Hall.
  • Bandura, A. 1989. “Six Theories of Child Development.” Annals of Child Development 6: 1–60.
  • Bandura, A. 2001. “Social Cognitive Theory of Mass Communication.” Media Psychology 3 (3): 265–299.
  • Blau, P. M. 1964. Exchange and Power in Social Life. New York, NY: Wiley.
  • Bolt, M. A., L. N. Killough, and H. C. Koh. 2001. “Testing the Interaction Effects of Task Complexity in Computer Training Using the Social Cognitive Model.” Decision Sciences 32 (1): 1–20.
  • Burgess, S., C. Sellitto, C. Cox, and J. Buultjens. 2011. “Trust Perceptions of Online Travel Information by Different Content Creators: Some Social and Legal Implications.” Information Systems Frontiers 13 (2): 221–235.
  • Cassa, A., Rumi Chunara, Kenneth Mandl, and John S. Brownstein. 2013. “Twitter as a Sentinel in Emergency Situations: Lessons From the Boston Marathon Explosions.” PLoS Currents 5.
  • Chang, C. M., and M. H. Hsu. 2016. Understanding the Determinants of Users’ Subjective Well-Being in Social Networking Sites: an Integration of Social Capital Theory and Social Presence Theory.” Behaviour & Information Technology 35 (9): 720–729.
  • Chen, Y. F. 2014. “See you on Facebook: Exploring Influences on Facebook Continuous Usage.” Behaviour & Information Technology 33 (11): 1208–1218.
  • Chen, K., and A. I. Rea. 2004. “Protecting Personal Information Online: A Survey of User Privacy Concerns and Control Techniques.” Journal of Computer Information Systems 44 (4): 85–92.
  • Chen, H., W. Rong, X. Ma, Y. Qu, and Z. Xiong. 2017. “An Extended Technology Acceptance Model for Mobile Social Gaming Service Popularity Analysis.” Mobile Information Systems 2017. doi:10.1155/2017/3906953.
  • Chiu, C. M., M. H. Hsu, and E. T. Wang. 2006. “Understanding Knowledge Sharing in Virtual Communities: An Integration of Social Capital and Social Cognitive Theories.” Decision Support Systems 42 (3): 1872–1888.
  • Cho, H., M. Chen, and S. Chung. 2010. “Testing an Integrative Theoretical Model of Knowledge-Sharing Behavior in the Context of Wikipedia.” Journal of the American Society for Information Science and Technology 61 (6): 1198–1212.
  • Cho, I., H. Park, and J. K. Kim. 2015. “The Relationship Between Motivation and Information Sharing About Products and Services on Facebook.” Behaviour & Information Technology 34 (9): 858–868.
  • Chunara, R., J. Andrews, and J. S. Brownstein. 2012. “Social and News Media Enable Estimation of Epidemiological Patterns Early in the 2010 Haitian Cholera Outbreak.” The American Journal of Tropical Medicine and Hygiene 86 (1): 39–45.
  • Church, E. M., and R. Thambusamy. 2018. “Competition and Information Deception in Online Social Networks.” Journal of Computer Information Systems 58 (3): 274–281.
  • Church, E. M., R. Thambusamy, and H. Nemati. 2017. “Privacy and Pleasure: A Paradox of the Hedonic Use of Computer-Mediated Social Networks.” Computers in Human Behavior 77: 121–131.
  • Compeau, D. R., and C. A. Higgins. 1995. “Application of Social Cognitive Theory to Training for Computer Skills.” Information Systems Research 6 (2): 118–143.
  • Constant, D., S. Kiesler, and L. Sproull. 1994. “What’s Mine is Ours, or is it? A Study of Attitudes About Information Sharing.” Information Systems Research 5 (4): 400–421.
  • Cooke, N. A. 2017. “Post-truth, Truthiness, and Alternative Facts: Information Behavior and Critical Information Consumption for a new age.” The Library Quarterly 87 (3): 211–221.
  • Cropanzano, R., and M. S. Mitchell. 2005. “Social Exchange Theory: An Interdisciplinary Review.” Journal of Management 31 (6): 874–900.
  • Debatin, B., J. P. Lovejoy, A. Horn, and B. N. Hughes. 2009. “Facebook and Online Privacy: Attitudes, Behaviours, and Unintended Consequences.” Journal of Computer-Mediated Communication 15 (1): 83–108.
  • Del Vicario, M., A. Bessi, F. Zollo, F. Petroni, A. Scala, G. Caldarelli, H. E. Stanley, and W. Quattrociocchi. 2016. “The Spreading of Misinformation Online.” Proceedings of the National Academy of Sciences 113 (3): 554–559.
  • DePaulo, B., and D. A. Kashy. 1998. “Everyday Lies in Close and Casual Relationships.” Journal of Personality and Social Psychology 74 (1): 63–79.
  • De Wit, F. R., L. L. Greer, and K. A. Jehn. 2012. “The Paradox of Intragroup Conflict: a Meta-Analysis.” Journal of Applied Psychology 97 (2): 360.
  • Drouin, M., D. Miller, S. M. Wehle, and E. Hernandez. 2016. “Why do People lie Online? Because Everyone Lies on the Internet.” Computers in Human Behaviour 64: 134–142.
  • Eckel, C. C., and P. J. Grossman. 1996. “Altruism in Anonymous Dictator Games.” Games and Economic Behavior 16 (2): 181–191.
  • Ellison, N., R. Heino, and J. Gibbs. 2006. “Managing Impressions Online: Self-Presentation Processes in the Online Dating Environment.” Journal of Computer-Mediated Communication 11 (2): 415–441.
  • Ellison, N. B., C. Steinfield, and C. Lampe. 2007. “The Benefits of Facebook “Friends:” Social Capital and College Students’ use of Online Social Network Sites.” Journal of Computer-Mediated Communication 12 (4): 1143–1168.
  • Facebook. 2015. “Statistics of Facebook.” http://newsroom.fb.com/company-info/.
  • Franklin, B., ed. 1999. Social Policy, the Media and Misrepresentation. London: Psychology Press.
  • French, A. M., and A. Read. 2013. “My Mom’s on Facebook: an Evaluation of Information Sharing Depth in Social Networking.” Behaviour & Information Technology 32 (10): 1049–1059.
  • Gates, S., and S. Podder. 2015. “Social Media, Recruitment, Allegiance and the Islamic State.” Perspectives on Terrorism 9: 4.
  • Giannakos, M. N., K. Chorianopoulos, K. Giotopoulos, and P. Vlamos. 2013. “Using Facebook out of Habit.” Behaviour & Information Technology 32 (6): 594–602.
  • Goode, S., G. Shailer, M. Wilson, and J. Jankowski. 2014. “Gifting and Status in Virtual Worlds.” Journal of Management Information Systems 31 (2): 171–210.
  • Gürbüz, A., and H. Gözde. 2017. “Use of Social Network Sites among Depressed Adolescents.” Behaviour & Information Technology 36 (5): 517–523.
  • Haas, P., I. Blohm, and J. M. Leimeister. 2014. “An Empirical Taxonomy of Crowdfunding Intermediaries.” In Proceedings of the International Conference on Information Systems, Auckland, NZ.
  • Hancock, J. T., C. Toma, and N. Ellison. 2007. “The Truth About Lying in Online Dating Profiles.” In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, 449–452.
  • Hann, I. H., K. L. Hui, S. Y. Lee, and I. P. Png. 2007. “Overcoming Online Information Privacy Concerns: An Information-Processing Theory Approach.” Journal of Management Information Systems 24 (2): 13–42.
  • Harris, L., and P. Harrigan. 2015. “Social Media in Politics: The Ultimate Voter Engagement Tool or Simply an Echo Chamber?” Journal of Political Marketing 14 (3): 251–283.
  • Hasan, B., and J. M. Ali. 2004. “An Empirical Examination of a Model of Computer Learning Performance.” Journal of Computer Information Systems 44 (4): 27–33.
  • Heirman, W., M. Walrave, A. Vermeulen, K. Ponnet, H. Vandebosch, J. Van Ouytsel, and E. Van Gool. 2016. “An Open Book on Facebook? Examining the Interdependence of Adolescents’ Privacy Regulation Strategies.” Behaviour & Information Technology 35 (9): 706–719.
  • Higgins, E. T. 2006. “Value From Hedonic Experience and Engagement.” Psychological Review 113 (3): 439–460.
  • Hollenbaugh, E. E., and A. L. Ferris. 2015. “Predictors of Honesty, Intent, and Valence of Facebook Self-Disclosure.” Computers in Human Behaviour 50: 456–464.
  • Hsu, M. H., C. M. Chang, and C. H. Yen. 2011. “Exploring the Antecedents of Trust in Virtual Communities.” Behaviour & Information Technology 30 (5): 587–601.
  • Huberman, B. A., C. H. Loch, and A. Onculer. 2004. “Status as a Valued Resource.” Social Psychology Quarterly 67 (1): 103–114.
  • Hung, S. Y., H. M. Lai, and W. W. Chang. 2011. “Knowledge-sharing Motivations Affecting R&D Employees’ Acceptance of Electronic Knowledge Repository.” Behaviour & Information Technology 30 (2): 213–230.
  • Hwang, Y., Y. Lee, and D. H. Shin. 2016. “The Role of Goal Awareness and Information Technology Self-Efficacy on job Satisfaction of Healthcare System Users.” Behaviour & Information Technology 35 (7): 548–558.
  • Ifinedo, P. 2014. “Information Systems Security Policy Compliance: An Empirical Study of the Effects of Socialisation, Influence, and Cognition.” Information and Management 51 (1): 69–79.
  • Isaac, Mike. 2016. “Facebook Mounts Effort to Limit Tide of Fake News.” The New York Times. Retrieved from http://www.nytimes.com.
  • Jang, K., N. Park, and H. Song. 2016. “Social Comparison on Facebook: Its Antecedents and Psychological Outcomes.” Computers in Human Behavior 62: 147–154.
  • Jenkins, C. D., S. J. Zyzanski, and R. H. Rosenman. 1979. Manual for the Jenkins Activity Survey. New York, NY: Psychological Corporation.
  • Johnson, D. W., and R. T. Johnson. 1989. Cooperation and Competition: Theory and Research. Edina, MN: Interaction Book Company.
  • Jones, C., W. S. Hesterly, and S. P. Borgatti. 1997. “A General Theory of Network Governance: Exchange Conditions and Social Mechanism.” Academy of Management Review 22 (4): 911–945.
  • Junger, M., L. Montoya, and F. J. and Overink. 2017. “Priming and Warnings are not Effective to Prevent Social Engineering Attacks.” Computers in Human Behaviour 66: 75–87.
  • Kim, H. S. 2016. “What Drives you to Check in on Facebook? Motivations, Privacy Concerns, and Mobile Phone Involvement for Location-Based Information Sharing.” Computers in Human Behaviour 54: 397–406.
  • Krombholz, K., H. Hobel, M. Huber, and E. Weippl. 2015. “Advanced Social Engineering Attacks.” Journal of Information Security and Applications 22: 113–122.
  • Kuo, F. Y., T. H. Chu, M. H. Hsu, and H. S. Hsieh. 2004. “An Investigation of Effort–Accuracy Trade-off and the Impact of Self-Efficacy on Web Searching Behaviours.” Decision Support Systems 37 (3): 331–342.
  • Lai, H., P. J. Hsieh, and R. C. Zhang. 2019. “Understanding Adolescent Students’ Use of Facebook and Their Subjective Wellbeing: A Gender-Based Comparison.” Behaviour & Information Technology 38 (5): 533–548.
  • Lee, D., R. Larose, and N. Rifon. 2008. “Keeping our Network Safe: a Model of Online Protection Behaviour.” Behaviour & Information Technology 27 (5): 445–454.
  • Lee, H., D. Lim, H. Kim, H. Zo, and A. P. Ciganek. 2015. “Compensation Paradox: the Influence of Monetary Rewards on User Behaviour.” Behaviour & Information Technology 34 (1): 45–56.
  • Lerner, J., and J. Tirole. 2002. “Some Simple Economics of Open Source.” The Journal of Industrial Economics 50 (2): 197–234.
  • Liaw, S. S., W. C. Chang, W. H. Hung, and H. M. Huang. 2006. “Attitudes Toward Search Engines as a Learning Assisted Tool: Approach of Liaw and Huang’s Research Model.” Computers in Human Behaviour 22 (2): 177–190.
  • Liew, E. J., S. Vaithilingam, and M. Nair. 2014. “Facebook and Socio-Economic Benefits in the Developing World.” Behaviour & Information Technology 33 (4): 345–360.
  • Lin, H. F. 2007. “Effects of Extrinsic and Intrinsic Motivation on Employee Knowledge Sharing Intentions.” Journal of Information Science 33 (2): 135–149.
  • Lin, K. M. 2016. “Understanding Undergraduates’ Problems From Determinants of Facebook Continuance Intention.” Behaviour & Information Technology 35 (9): 693–705.
  • Lin, L. F., Y. M. Li, and W. H. Wu. 2015. “A Social Endorsing Mechanism for Target Advertisement Diffusion.” Information and Management 52 (8): 982–997.
  • Liu, D., X. Li, and R. Santhanam. 2013. “Digital Games and Beyond: What Happens When Players Compete.” MIS Quarterly 37 (1): 111–124.
  • Lowry, P. B., J. Cao, and A. Everard. 2011. “Privacy Concerns Versus Desire for Interpersonal Awareness in Driving the Use of Self-Disclosure Technologies: The Case of Instant Messaging in Two Cultures.” Journal of Management Information Systems 27 (4): 163–200.
  • Lowry, P. B., J. Gaskin, N. Twyman, B. Hammer, and T. Roberts. 2013. “Taking ‘fun and Games’ Seriously: Proposing the Hedonic-Motivation System Adoption Model (HMSAM).” Journal of the Association for Information Systems 14 (11): 617–671.
  • Luarn, P., and H. H. Lin. 2005. “Toward an Understanding of the Behavioural Intention to use Mobile Banking.” Computers in Human Behaviour 21 (6): 873–891.
  • Malhotra, N. K., S. S. Kim, and J. Agarwal. 2004. “Internet Users’ Information Privacy Concerns (IUIPC): The Construct, the Scale, and a Causal Model.” Information Systems Research 15 (4): 336–355.
  • Meeker, B. F. 1971. “Decisions and Exchange.” American Sociological Review 36 (3): 485–495. doi:10.2307/2093088.
  • Miller, R., and J. Melton. 2015. “College Students and Risk-Taking Behaviour on Twitter Versus Facebook.” Behaviour & Information Technology 34 (7): 678–684.
  • Oh, O., M. Agrawal, and H. R. Rao. 2013. “Community Intelligence and Social Media Services: A Rumor Theoretic Analysis of Tweets During Social Crises.” MIS Quarterly 37 (2): 407–426.
  • Pavlou, P. A., and D. Gefen. 2004. “Building Effective Online Marketplaces with Institution-Based Trust.” Information Systems Research 15 (1): 37–59.
  • Pearson, J. M., T. Bahmanziari, L. Crosby, and E. Conrad. 2003. “An Empirical Investigation Into the Relationship Between Organizational Culture and Computer Efficacy as Moderated by age and Gender.” Journal of Computer Information Systems 43 (2): 58–70.
  • Pentina, I., and L. Zhang. 2017. “Effects of Social Support and Personality on Emotional Disclosure on Facebook and in Real Life.” Behaviour & Information Technology 36 (5): 484–492.
  • Podsakoff, P. M., S. B. MacKenzie, J. Y. Lee, and N. P. Podsakoff. 2003. “Common Method Biases in Behavioural Research: a Critical Review of the Literature and Recommended Remedies.” Journal of Applied Psychology 88 (5): 879.
  • Podsakoff, P. M., and D. W. Organ. 1986. “Self-reports in Organizational Research: Problems and Prospects.” Journal of Management 12 (4): 531–544.
  • Ryan, R., and E. Deci. 2000. “Intrinsic and Extrinsic Motivations: Classic Definitions and New Directions.” Contemporary Educational Psychology 25 (1): 54–67.
  • Savage, P. 2017. Russian Social Media Information Operations.
  • Scheepers, H., R. Scheepers, R. Stockdale, and N. Nurdin. 2014. “The Dependent Variable in Social Media use.” Journal of Computer Information Systems 54 (2): 25–34.
  • Schor, J. B. 1999. The Overspent American: Why.
  • Shang, S. S., Y. L. Wu, and E. Y. Li. 2017. “Field Effects of Social Media Platforms on Information-Sharing Continuance: Do Reach and Richness Matter?” Information and Management 54 (2): 241–255.
  • Simon, A. F., and J. Jerit. 2007. “Toward a Theory Relating Political Discourse, Media, and Public Opinion.” Journal of Communication 57 (2): 254–271.
  • Sledgianowski, D., and S. Kulviwat. 2009. “Using Social Network Sites: The Effects of Playfulness, Critical Mass and Trust in a Hedonic Context.” Journal of Computer Information Systems 49 (4): 74–83.
  • Smither, R. D., and J. M. Houston. 1992. “The Nature of Competitiveness: The Development and Validation of the Competitiveness Index.” Educational and Psychological Measurement 52 (2): 407–418.
  • Son, J., and S. Kim. 2008. “Internet Users’ Information Privacy-Protective Responses: a Taxonomy and a Nomological Model.” MIS Quarterly 32 (3): 503–529.
  • Straub, D. W. 1989. “Validating Instruments in MIS Research.” MIS Quarterly 13 (2): 147–169.
  • Sweetser, P., and P. Wyeth. 2005. “Gameflow: A Model for Evaluating Player Enjoyment in Games.” ACM Computers in Entertainment 3 (3): 3–25.
  • Tjosvold, D. 2008. “The Conflict-Positive Organization: It Depends upon us.” Journal of Organizational Behavior: The International Journal of Industrial, Occupational and Organizational Psychology and Behavior 29 (1): 19–28.
  • Toma, C. L., and J. T. Hancock. 2010. “Looks and Lies: The Role of Physical Attractiveness in Online Dating Self-Presentation and Deception.” Communication Research 37 (3): 335–351.
  • Tsai, M. T., and N. C. Cheng. 2012. “Understanding Knowledge Sharing Between IT Professionals–an Integration of Social Cognitive and Social Exchange Theory.” Behaviour & Information Technology 31 (11): 1069–1080.
  • Tsai, C. W., P. D. Shen, and Y. C. Chiang. 2015. “Meeting ex-Partners on Facebook: Users’ Anxiety and Severity of Depression.” Behaviour & Information Technology 34 (7): 668–677.
  • Turel, O. 2015. “An Empirical Examination of the “Vicious Cycle” of Facebook Addiction.” Journal of Computer Information Systems 55 (3): 83–91.
  • Turel, O., and D. Gefen. 2013. “The Dual Role of Trust in System Use.” Journal of Computer Information Systems 54 (1): 2–10.
  • Utz, S. 2010. “Show me Your Friends and I Will Tell you What Type of Person you are: How One’s Profile, Number of Friends, and Type of Friends Influence Impression Formation on Social Network Sites.” Journal of Computer Mediated Communication 15 (2): 314–335.
  • van der Heijden, H. 2004. “User Acceptance of Hedonic Information Systems.” MIS Quarterly 28 (4): 695–704.
  • Walsh, D., J. M. Parisi, and K. Passerini. 2017. “Privacy as a Right or as a Commodity in the Online World: the Limits of Regulatory Reform and Self-Regulation.” Electronic Commerce Research 17 (2): 185–203.
  • Wang, C. C., and C. Y. Lai. 2006. ““Knowledge Contribution in the Online Virtual Community: Capability and Motivation.” Knowledge Science, Engineering and Management 4092: 442–453.
  • Wang, D., L. Xu, and H. C. Chan. 2015. “Understanding the Continuance use of Social Network Sites: a Computer Self-Efficacy Perspective.” Behaviour & Information Technology 34 (2): 204–216.
  • Warren, A. M., A. Sulaiman, and N. I. Jaafar. 2015. “Understanding Civic Engagement Behaviour on Facebook From a Social Capital Theory Perspective.” Behaviour & Information Technology 34 (2): 163–175.
  • Wasko, M. M., and S. Faraj. 2005. “Why Should I Share? Examining Social Capital and Knowledge Contribution in Electronic Networks of Practice.” MIS Quarterly 29 (1): 35–57.
  • Wu, J. J., and A. S. Tsang. 2008. “Factors Affecting Members’ Trust Belief and Behaviour Intention in Virtual Communities.” Behaviour & Information Technology 27 (2): 115–125.
  • Yap, S. F., and S. S. Gaur. 2016. “Integrating Functional, Social, and Psychological Determinants to Explain Online Social Networking Usage.” Behaviour & Information Technology 35 (3): 166–183.
  • Yoon, C., and Z. W. Wang. 2011. “The Role of Citizenship Behaviours and Social Capital in Virtual Communities.” Journal of Computer Information Systems 52 (1): 106–115.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.