841
Views
25
CrossRef citations to date
0
Altmetric
Articles

Understanding the Intention of Using Mobile Social Networking Apps Across Cultures

, &

References

  • Ajzen, I. (1991). The theory of planned behavior. Organizational Behavior and Human Decision Processes, 50, 179–211.
  • Ajzen, I. (1995). From intentions to actions: A theory of planned behavior. In J. Kuhl & J. Beckmann (Eds.), action control: from cognition to behavior (pp. 11–39). New York, NY: Springer Verlag.
  • Ajzen, I., & Fishbein, M. (1980). Understanding attitudes and predicting social behavior. Englewood Cliffs, NJ: Prentice-Hall.
  • Al-Debei, M. M., Al-Lozi, E., & Papazafeiropoulou, A. (2013). Why people keep coming back to Facebook: Explaining and predicting continuance participation from an extended theory of planned behaviour perspective. Decision Support Systems, 55, 43–54.
  • Al-Gahtani, S. S., Hubona, G. S., & Wang, J. (2007). Information technology (IT) in Saudi Arabia: Culture and the acceptance and use of IT. Information & Management, 44(8), 681–691.
  • Al-Jabri, I. M., Sohail, M. S., & Ndubisi, N. O. (2015). Understanding the usage of global social networking sites by Arabs through the lens of uses and gratifications theory. Journal of Service Management, 26(4), 662–680.
  • Bagozzi, R. P., & Yi, Y. (1988). On the evaluation of structural equation models. Journal of the Academy of Marketing Science, 16(1), 74–94.
  • Bandura, A. (1977a). Social learning theory. New York, NY: General Learning Press.
  • Bandura, A. (1977b). Self-efficacy: Toward a unifying theory of behavioral change. Psychological Review, 84(2), 191–225.
  • Bandura, A. (1982). Self-efficacy mechanism in human agency. American Psychologist, 37, 122–147.
  • Bolton, D. (2015). Smartphones are now the dominant driver of social media. Retrieved from http://arc.applause.com/2015/07/16/social-media-consumption-on-smartphones-2015/
  • Chauhan, S. (2014). Factors affecting use of mobile social networking. Vilakshan: the XIMB Journal of Management, 11(1), 41–50.
  • Chen, J. Q., Zhang, R., & Lee, J. (2014). A cross-culture empirical study of M-commerce privacy concerns. Journal of Internet Commerce, 12(4), 348–364.
  • Chen, R. (2013). Member use of social networking sites-an empirical examination. Decision Support Systems, 54(3), 1219–1227.
  • Chen, R., & Sharma, S. K. (2013). Understanding member use of social networking sites: A value analysis. Communications of the Association for Information Systems, 33, 97–114.
  • Chin, W. W. (1998). Issues and opinion on structural equation modeling. MIS Quarterly, 22, 1.
  • Cho, S. E., & Park, H. W. (2013). A qualitative analysis of cross-cultural new media research: SNS use in Asia and the West. Qual Quant, 47, 2319–2330.
  • Choi, G., & Chung, H. (2013). Applying the technology acceptance model to Social Networking Sites (SNS): Impact of subjective norm and social capital on the acceptance of SNS. International Journal of Human-Computer Interaction, 29, 619–628.
  • Compeau, D., & Higgins, C. (1991). The development of a measure of computer self-efficacy. ASAC 1991 Conference, 34–48.
  • Connolly, R., & Bannister, F. (2007). Consumer trust in Internet shopping in Ireland: Towards the development of a more effective trust measurement instrument. Journal of Information Technology, 22(2), 102–118.
  • Davis, F. D., Bagozzi, R. P., & Warshaw, P. R. (1989). User acceptance of computer technology: A comparison of two theoretical models. Management Science, 35, 982–1003.
  • Dickinger, A., Arami, M., & Meyer, D. (2008). The role of perceived enjoyment and social norm in the adoption of technology with network externalities. European Journal of Information Systems, 17(1), 4–11.
  • Evans, B. (2014). WhatsApp and $19bn. Benedict Evans Blog. February 19.
  • Fishbein, M., & Ajzen, I. (1975). Belief, attitude, intention and behavior: An introduction to theory and research. Reading, MA: Addison-Wesley.
  • Fornell, C. (1982). A second generation of multivariate analysis methods (pp. 1 & 2). New York, NY: Praeger Special Studies.
  • Fornell, C., & Larcker, D. (1981). Structural equation models with unobservable variables and measurement error. Journal of Marketing Research, 18, 39–50.
  • Galliers, R. (1992). Information systems research: Issues, methods & practical guidelines. Boston, MA: Blackwell Scientific.
  • Gao, L., & Bai, X. (2014). An empirical study on continuance intention of mobile social networking services: Integrating the IS success model, network externalities and flow theory. Asia Pacific Journal of Marketing and Logistics, 26(2), 168–189.
  • Gefen, D., Straub, D. W., & Boudreau, M. C. (2000). Structural equation modeling and regression: Guidelines for research practice. Communications of the Association for Information Systems, 4.
  • Guo, H., Pathak, P., & Cheng, H. K. (2015). Estimating social influences from social networking sites-articulated friendships versus communication interactions. Decision Sciences, 46(1), 135–163.
  • Hair, J., Anderson, R., Tatham, R., & Black, W. (1992). Multivariate data analysis with readings. New York, NY: Macmillan.
  • Hajli, N., & Lin, X. (2015). Exploring the security of information sharing on social networking sites: The role of perceived control of information. Journal of Business Ethics, 133(1), 111–123.
  • Harrison, D. A., Mykytyn, P. P., & Riemenschneider, C. K. (1997). Executive decisions about adoption of information technology in small business: Theory and empirical tests. Information Systems Research, 8(2), 171–195.
  • Hofstede, G. (2010). Culture and organizations: Software of the min. London, UK: McGraw Hill.
  • Hooper, D., Coughlan, J., & Mullen, M. R. (2008). Structural equation modelling: Guidelines for determining model fit. The Electronic Journal of Business Research Methods, 6(1), 53–60.
  • Hsu, C., Yu, C., & Wu, C. (2014). Exploring the continuance intention of social networking websites: An empirical research. Information Systems & e-Business Management, 12(2), 139–163.
  • Hsu, C. L., & Lin, J. C. (2008). Acceptance of blog usage: The roles of technology acceptance, social influence and knowledge sharing motivation. Information & Management, 45, 65–74.
  • Hsu, C. L., & Lu, H. P. (2004). Why do people play on-line games? An extended TAM with social influences and flow experience. Information & Management, 41, 853–868.
  • Hu, L.-T., & Bentler, P. M. (1998). Fit indices in covariance structure modeling: Sensitivity to underparameterized model misspecification. Psychological Methods, 3(4), 424–453.
  • Ifinedo, P. (2016). Applying uses and gratifications theory and social influence processes to understand students’ pervasive adoption of social networking sites: Perspectives from the Americas. International Journal of Information Management, 36(2), 192–206.
  • Kim, B. (2011). Understanding antecedents of continuance intention in social-networking services. Cyberpsychology, Behavior, and Social Networking, 14(4), 199–205.
  • Kim, Y., Sohn, D., & Choi, S. M. (2011). Cultural difference in motivations for using social network sites: A comparative study of American and Korean college students. Computers in Human Behavior, 27(1), 365–372.
  • Ku, Y., Chen, R., & Zhang, H. (2013). Why do users continue using social networking sites? An exploratory study of members in the United States and Taiwan. Information & Management, 50(7), 571–581.
  • Li, D. C. (2011). Online social network acceptance: A social perspective. Internet Research, 21(5), 562–580.
  • Li, Y. (2011). Empirical studies on online information privacy concerns: Literature review and an integrative framework. Communications of the Association for Information Systems, 28(1), 453–496.
  • Luarn, P., Yang, J., & Chiu, Y. (2015). Why people check in to social network sites. International Journal of Electronic Commerce, 19(4), 21–46.
  • Malhotra, N. K., Kim, S. S., & Agarwal, J. (2004). Internet Users’ Information Privacy Concerns (IUIPC): The construct, the scale, and a causal model. Information Systems Research, 15(4), 336–355.
  • Mathieson, K. (1991). Predicting user intentions: Comparing the technology acceptance model with the theory of planned behavior. Information Systems Research, 2(3), 173–191.
  • Milberg, S. J., Smith, H. J., & Burke, S. J. (2000). Information privacy: Corporate management and national regulation. Organization Science, 11(1), 35–57.
  • Mugny, G., Butera, F., Sanchez-Mazas, M., & Perez, J. A. (1995). Judgements in conflict: The conflict elaboration theory of social influence. In B. Boothe, R. Hirsig, A. Helminger, B. Meier, & R. Volkart (Eds.), Perception-evaluation-interpretation, Swiss Monographs in Psychology (Vol. 3, pp. 160–168). Bern, Switzerland: Huber.
  • Nocera, J. A., & Dunckley, L. (2007). An approach to the evaluation of usefulness as a social construct using technological frames. International Journal of Human-Computer Interaction, 22(1&2), 153–172.
  • Nunnally, J. C. (1967). Psychometric theory. New York, NY: McGraw-Hill.
  • Nysveen, H., Pedersen, P. E., & Thorbjornsen, H. (2005). Explaining intention to use mobile chat services: Moderating effects of gender. The Journal of Consumer Marketing, 22(5), 247–256.
  • Okazaki, S., Rubio, N., & Campo, S. (2014). Gossip in social networking sites Why people chitchat about ad campaigns. International Journal of Market Research, 56(3), 317–340.
  • Park, C., Jun, J., & Lee, T. (2015). Consumer characteristics and the use of social networking sites. International Marketing Review, 32(3/4), 414–437.
  • Park, Y. J. (2008). Privacy regime, culture and user practices in the cyber-marketplace. Journal of Policy, Regulations, & Telecommunications, 2(10), 57–74.
  • Pavlou, P. A., & Fygenson, M. (2006). Understanding and predicting electronic commerce adoption: An extension of the theory of planned behavior. MIS Quarterly, 30(1), 115–143.
  • Pelling, E., & White, K. (2009). The theory of planned behavior applied to young people’s use of social networking web sites. CyberPsychology & Behavior, 12(6), 755–759.
  • Pinsonneault, A., & Kraemer, K. (1993). Survey research methodology in management information systems: An assessment. Journal of Management Information Systems, 10, 75–106.
  • Qin, L., Kim, Y., Hsu, J., & Tan, X. (2011). The effects of social influence on user acceptance of online social networks. International Journal of Human-Computer Interaction, 27(9), 885–899.
  • Qureshi, I., & Compeau, D. (2009). Assessing between-group differences in information systems research: A comparison of covariance- and component-based SEM. MIS Quarterly, 33(1), 197–214.
  • Rice, R. E., Grant, A. E., Schmitz, J., & Torobin, J. (1990). Individual and network influences on the adoption and perceived outcomes of electronic messaging. Social Networks, 12(1), 27–55.
  • Roback, D., & Wakefield, R. L. (2013). Privacy risk versus socialness in the decision to use mobile location-based applications. ACM SIGMIS Database, 44, 19–38.
  • Shin, D. H. (2010). Analysis of online social networks: A cross-national study. Online Information Review, 34(3), 473–495.
  • Shneor, R., & Efrat, K. (2014). Analyzing the impact of culture on average time spent on social networking sites. Journal of Promotion Management, 20, 413–435.
  • Smith, H. J., Milberg, J. S., & Burke, J. S. (1996). Information privacy: Measuring individuals’ concerns about organizational practices. MIS Quarterly, 20(2), 167–196.
  • Straub, D., Keil, M., & Brenner, W. (1997). Testing the technology acceptance model across cultures: A three country study. Information & Management, 33, 1–11.
  • Sukhu, A., Zhang, T., & Bilgihan, A. (2015). Factors influencing information-sharing behaviors in social networking sites. Services Marketing Quarterly, 36(4), 317–334.
  • Tan, X., Qin, L., Kim, Y., & Hsu, J. (2012). Impact of privacy concern in social networking websites. Internet Research, 22(2), 211–233.
  • Taylor, S., & Todd, P. (1995). Understanding information technology usage: A test of competing models. Information Systems Research, 6(2), 144–176.
  • Van der Heijden, H. (2004). User acceptance of hedonic information systems. MIS Quarterly, 4(28), 695–704.
  • Venkatesh, V., & Davis, F. D. (2000). A theoretical extension of the Technology Acceptance Model: Four longitudinal field studies. Management Science, 45, 186–204.
  • Xu, H., Dinev, T., Smith, H. J., & Hart, P. (2008, December 14–17). Examining the formation of individual’s privacy concerns: toward an integrative view. International Conference on Information Systems (ICIS), Paris, France.
  • Xu, H., Dinev, T., Smith, H. J., & Hart, P. (2011). Information privacy concerns: Linking individual perceptions with institutional privacy assurances. Journal of the Association for Information Systems, 12, 798–824.
  • Yoon, C., & Rolland, E. (2015). Understanding continuance use in social networking services. Journal of Computer Information Systems, 55(2), 1–8.
  • Yu, J., Zo, H., Choi, M. K., & Ciganek, A. P. (2013). User acceptance of location-based social networking services an extended perspective of perceived value. Online Information Review, 37(5), 711–730.
  • Zhou, T. (2011). The impact of privacy concern on user adoption of location-based services. Industrial Management & Data Systems, 111(2), 212–226.
  • Zhou, T., Li, H., & Liu, Y. (2010). The effect of flow experience on mobile SNS users’ loyalty. Industrial Management & Data Systems, 110(6), 930–946.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.