760
Views
1
CrossRef citations to date
0
Altmetric
Original Articles

Understanding Rumor Combating Behavior on Social Media

, , ORCID Icon &

References

  • Van Bavel JJ, Baicker K, Boggio PS, Capraro V, Cichocka A, Cikara M, Crockett MJ, Crum AJ, Douglas KM, Druckman JN, et al. Using social and behavioural science to support COVID-19 pandemic response. Nat Hum Behav. 2020;4(5):460–471.
  • Laato S, Islam AN, Islam MN, Whelan E. What drives unverified information sharing and cyberchondria during the COVID-19 pandemic? Eur J Inf Syst. 2020;29(3):288–305. doi:10.1080/0960085X.2020.1770632.
  • Naidoo R. A multi-level influence model of COVID-19 themed cybercrime. Eur J Inf Syst. 2020;29(3):306–21. doi:10.1080/0960085X.2020.1771222.
  • Craven M, Liu L, Wilson M, Mysore M. COVID-19: implications for business. 2020 [assessed 2020 July 11]. https://www.mckinsey.com/business-functions/risk/our-insights/covid-19-implications-for-business.
  • Zhao L, Yin J, Song Y. An exploration of rumor combating behavior on social media in the context of social crises. Comput Hum Behav. 2016;58:25–36. doi:10.1016/j.chb.2015.11.054.
  • Mondal T, Pramanik P, Bhattacharya I, Boral N, Ghosh S. Analysis and early detection of rumors in a post disaster scenario. Inf Syst Front. 2018;20(5):961–79. doi:10.1007/s10796-018-9837-8.
  • Oh O, Agrawal M, Rao HR. Community intelligence and social media services: a rumor theoretic analysis of tweets during social crises. MIS Q. 2013;37(2):407–26. doi:10.25300/MISQ/2013/37.2.05.
  • Oh O, Gupta P, Agrawal M, Rao HR. ICT mediated rumor beliefs and resulting user actions during a community crisis. Gov Inf Q. 2018;35(2):243–58. doi:10.1016/j.giq.2018.03.006.
  • Tang Z, Miller AS, Zhou Z, Warkentin M. Does government social media promote users’ information security behavior towards COVID-19 scams? Cultivation effects and protective motivations. Gov Inf Q. 2021;38(2):101572. doi:10.1016/j.giq.2021.101572.
  • Chen MJ, Su KH, Tsai W. Competitive tension: the awareness-motivation-capability perspective. Acad Manag Ann. 2017;50(1):101–18. doi:10.5465/amj.2007.24162081.
  • Stadtler L, Lin H. Moving to the next strategy stage: examining firms’ awareness, motivation and capability drivers in environmental alliances. Bus Strategy Environ. 2017;26(6):709–30. doi:10.1002/bse.1937.
  • Chen X, Chen L, Wu D. Factors that influence employees’ security policy compliance: an awareness-motivation-capability perspective. J Comput Inf Syst. 2018;58(4):312–24. doi:10.1080/08874417.2016.1258679.
  • Lee J, Agrawal M, Rao HR. Message diffusion through social network service: the case of rumor and non-rumor related tweets during Boston bombing 2013. Inf Syst Front. 2015;17(5):997–1005. doi:10.1007/s10796-015-9568-z.
  • Chen MJ. Competitor analysis and interfirm rivalry: toward a theoretical integration. Acad Manag Rev. 1996;21(1):100–34. doi:10.5465/amr.1996.9602161567.
  • Shu C, Zhao M, Liu J, Lindsay W. Why firms go green and how green impacts financial and innovation performance differently: an awareness-motivation-capability perspective. Asia Pac J Manag. 2019;37(3):1–27.
  • Zhang M, Geng R, Huang Y, Ren S. Terminator or accelerator? Lessons from the peer-to-peer accommodation hosts in China in responses to COVID-19. Int J Hosp Manag 2021;92:102760. doi:10.1016/j.ijhm.2020.102760.
  • Anderson CL, Agarwal R. Practicing safe computing: a multimedia empirical examination of home computer user security behavioral intentions. MIS Q. 2010;34(3):613–43. doi:10.2307/25750694.
  • Rogers RW. A protection motivation theory of fear appeals and attitude change. J Psychol. 1975;91(1):93–114. doi:10.1080/00223980.1975.9915803.
  • Rogers RW. Cognitive and psychological processes in fear appeals and attitude change: a revised theory of protection motivation. Soc Psychophysiol. 1983;19(5):153–76.
  • Johnston AC, Warkentin M. Fear appeals and information security behaviors: an empirical study. MIS Q. 2010;34(3):549–66. doi:10.2307/25750691.
  • Tu Z, Turel O, Yuan Y, Archer N. Learning to cope with information security risks regarding mobile device loss or theft: an empirical examination. Inf Manag J. 2015;52(4):506–17. doi:10.1016/j.im.2015.03.002.
  • Martens M, De Wolf R, De Marez L. Investigating and comparing the predictors of the intention towards taking security measures against malware, scams and cybercrime in general. Comput Human Behav. 2019;92:139–50. doi:10.1016/j.chb.2018.11.002.
  • Schwartz SH. Normative influences on altruism. Adv Exp Soc Psychol. 1977;10:221–79.
  • Gao L, Wang S, Li J, Li H. Application of the extended theory of planned behavior to understand individual’s energy saving behavior in workplaces. Resour Conserv Recycl. 2017;127:107–13. doi:10.1016/j.resconrec.2017.08.030.
  • Tang Z, Warkentin M, Wu L. Understanding employees’ energy saving behavior from the perspective of stimulus-organism-responses. Resour Conserv Recycl. 2019;140:216–23. doi:10.1016/j.resconrec.2018.09.030.
  • Kankanhalli A, Tan BC, Wei KK. Contributing knowledge to electronic knowledge repositories: an empirical investigation. MIS Q. 2005;29(1):113–43. doi:10.2307/25148670.
  • Jin XL, Zhou Z, Lee MK, Cheung CM. Why users keep answering questions in online question answering communities: a theoretical and empirical investigation. Int J Inf Manag. 2013;33(1):93–104. doi:10.1016/j.ijinfomgt.2012.07.007.
  • Savary J, Goldsmith K. Unobserved altruism: how self-signaling motivations and social benefits shape willingness to donate. J Exp Psychol Appl. 2020. Advance online publication 10.1037/xap0000261
  • Evans R, Ferguson E. Defining and measuring blood donor altruism: a theoretical approach from biology, economics and psychology. Vox Sang. 2014;106(2):118–26. doi:10.1111/vox.12080.
  • Lampel J, Bhalla A. The role of status seeking in online communities: giving the gift of experience. J Comput Mediat Commun. 2017;12(2):434–55. doi:10.1111/j.1083-6101.2007.00332.x.
  • Lee CS, Ma L. News sharing in social media: the effect of gratifications and prior experience. Comput Human Behav. 2012;28(2):331–39. doi:10.1016/j.chb.2011.10.002.
  • Exley C. Incentives for prosocial behavior: the role of reputations. Manag Sci. 2018;64(5):2460–71. doi:10.1287/mnsc.2016.2685.
  • He W, Wei KK. What drives continued knowledge sharing? An investigation of knowledge-contribution and-seeking beliefs. Decis Support Syst. 2009;46(4):826–38. doi:10.1016/j.dss.2008.11.007.
  • Zhong BL, Luo W, Li HM, Zhang QQ, Liu XG, Li WT, Li Y. Knowledge, attitudes, and practices towards COVID-19 among Chinese residents during the rapid rise period of the COVID-19 outbreak: a quick online cross-sectional survey. Int J Biol Sci. 2020;16(10):1745–1752.
  • Zhang Y, Wang Z, Zhou G. Antecedents of employee electricity saving behavior in organizations: an empirical study based on norm activation model. Energy Policy. 2013;62:1120–27. doi:10.1016/j.enpol.2013.07.036.
  • Tang Z, Chen L, Gillenson ML. How to keep brand fan page followers? The lens of person-environment fit theory. Inf Technol People. 2018;31(4):927–47. doi:10.1108/ITP-04-2016-0076.
  • Jin XL, Yin M, Zhou* Z, Yu X. The differential effects of trusting beliefs on social media users’ willingness to adopt and share health knowledge. Information Processing and Management. 2021;58(1):102413. doi:10.1016/j.ipm.2020.102413.
  • Iqbal A. WeChat revenue and usage statistics. 2020 [accessed 2020 July 12]. https://www.businessofapps.com/data/wechat-statistics/#:~:text=WeChat counts over one billion,in terms of social media.
  • Witte K. Predicting risk behaviors: development and validation of a diagnostic scale. J Health Commun. 1996;1(4):317–42. doi:10.1080/108107396127988.
  • Anderson JC, Gerbing DW. Structural equation modeling in practice: a review and recommended two-step approach. Psychol Bull. 1988;103(3):411–23. doi:10.1037/0033-2909.103.3.411.
  • Jin XL, Zhou* Z, Tian Y. A configurational analysis of the causes of consumer indirect misbehaviors in access-based consumption. J Bus Ethics. Published online. doi:10.1007/s10551-020-04637–8.
  • Fornell C, Larcker DF. Evaluating structural equation models with unobservable variables and measurement error. J Mark Res. 1981;18(1):39–50. doi:10.1177/002224378101800104.
  • Guo Q, Sun P, Li L. Shyness and online prosocial behavior: a study on multiple mediation mechanisms. Comput Human Behav. 2018;86:1–8. doi:10.1016/j.chb.2018.04.032.
  • Latan H, Jabbour CJC, De Sousa Jabbour ABL. Social media as a form of virtual whistleblowing: empirical evidence for elements of the diamond model. J Bus Ethics. 2020:1–20. doi:10.1007/s10551-020-04598-y.
  • Hofstede G. Culture and organizations. Int Stud Manag Organ. 1980;10(4):15–41. doi:10.1080/00208825.1980.11656300.
  • Warkentin M, Johnston AC, Shropshire J, Barnett WD. Continuance of protective security behavior: a longitudinal study. Decis Support Syst. 2016;92:25–35. doi:10.1016/j.dss.2016.09.013.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.