References
- Ajzen, I. (1991). The theory of planned behavior. Organizational Behavior and Human Decision Processes, 50, 179–211.
- Ajzen, I. (1995). From intentions to actions: A theory of planned behavior. In J. Kuhl & J. Beckmann (Eds.), action control: from cognition to behavior (pp. 11–39). New York, NY: Springer Verlag.
- Ajzen, I., & Fishbein, M. (1980). Understanding attitudes and predicting social behavior. Englewood Cliffs, NJ: Prentice-Hall.
- Al-Debei, M. M., Al-Lozi, E., & Papazafeiropoulou, A. (2013). Why people keep coming back to Facebook: Explaining and predicting continuance participation from an extended theory of planned behaviour perspective. Decision Support Systems, 55, 43–54.
- Al-Gahtani, S. S., Hubona, G. S., & Wang, J. (2007). Information technology (IT) in Saudi Arabia: Culture and the acceptance and use of IT. Information & Management, 44(8), 681–691.
- Al-Jabri, I. M., Sohail, M. S., & Ndubisi, N. O. (2015). Understanding the usage of global social networking sites by Arabs through the lens of uses and gratifications theory. Journal of Service Management, 26(4), 662–680.
- Bagozzi, R. P., & Yi, Y. (1988). On the evaluation of structural equation models. Journal of the Academy of Marketing Science, 16(1), 74–94.
- Bandura, A. (1977a). Social learning theory. New York, NY: General Learning Press.
- Bandura, A. (1977b). Self-efficacy: Toward a unifying theory of behavioral change. Psychological Review, 84(2), 191–225.
- Bandura, A. (1982). Self-efficacy mechanism in human agency. American Psychologist, 37, 122–147.
- Bolton, D. (2015). Smartphones are now the dominant driver of social media. Retrieved from http://arc.applause.com/2015/07/16/social-media-consumption-on-smartphones-2015/
- Chauhan, S. (2014). Factors affecting use of mobile social networking. Vilakshan: the XIMB Journal of Management, 11(1), 41–50.
- Chen, J. Q., Zhang, R., & Lee, J. (2014). A cross-culture empirical study of M-commerce privacy concerns. Journal of Internet Commerce, 12(4), 348–364.
- Chen, R. (2013). Member use of social networking sites-an empirical examination. Decision Support Systems, 54(3), 1219–1227.
- Chen, R., & Sharma, S. K. (2013). Understanding member use of social networking sites: A value analysis. Communications of the Association for Information Systems, 33, 97–114.
- Chin, W. W. (1998). Issues and opinion on structural equation modeling. MIS Quarterly, 22, 1.
- Cho, S. E., & Park, H. W. (2013). A qualitative analysis of cross-cultural new media research: SNS use in Asia and the West. Qual Quant, 47, 2319–2330.
- Choi, G., & Chung, H. (2013). Applying the technology acceptance model to Social Networking Sites (SNS): Impact of subjective norm and social capital on the acceptance of SNS. International Journal of Human-Computer Interaction, 29, 619–628.
- Compeau, D., & Higgins, C. (1991). The development of a measure of computer self-efficacy. ASAC 1991 Conference, 34–48.
- Connolly, R., & Bannister, F. (2007). Consumer trust in Internet shopping in Ireland: Towards the development of a more effective trust measurement instrument. Journal of Information Technology, 22(2), 102–118.
- Davis, F. D., Bagozzi, R. P., & Warshaw, P. R. (1989). User acceptance of computer technology: A comparison of two theoretical models. Management Science, 35, 982–1003.
- Dickinger, A., Arami, M., & Meyer, D. (2008). The role of perceived enjoyment and social norm in the adoption of technology with network externalities. European Journal of Information Systems, 17(1), 4–11.
- Evans, B. (2014). WhatsApp and $19bn. Benedict Evans Blog. February 19.
- Fishbein, M., & Ajzen, I. (1975). Belief, attitude, intention and behavior: An introduction to theory and research. Reading, MA: Addison-Wesley.
- Fornell, C. (1982). A second generation of multivariate analysis methods (pp. 1 & 2). New York, NY: Praeger Special Studies.
- Fornell, C., & Larcker, D. (1981). Structural equation models with unobservable variables and measurement error. Journal of Marketing Research, 18, 39–50.
- Galliers, R. (1992). Information systems research: Issues, methods & practical guidelines. Boston, MA: Blackwell Scientific.
- Gao, L., & Bai, X. (2014). An empirical study on continuance intention of mobile social networking services: Integrating the IS success model, network externalities and flow theory. Asia Pacific Journal of Marketing and Logistics, 26(2), 168–189.
- Gefen, D., Straub, D. W., & Boudreau, M. C. (2000). Structural equation modeling and regression: Guidelines for research practice. Communications of the Association for Information Systems, 4.
- Guo, H., Pathak, P., & Cheng, H. K. (2015). Estimating social influences from social networking sites-articulated friendships versus communication interactions. Decision Sciences, 46(1), 135–163.
- Hair, J., Anderson, R., Tatham, R., & Black, W. (1992). Multivariate data analysis with readings. New York, NY: Macmillan.
- Hajli, N., & Lin, X. (2015). Exploring the security of information sharing on social networking sites: The role of perceived control of information. Journal of Business Ethics, 133(1), 111–123.
- Harrison, D. A., Mykytyn, P. P., & Riemenschneider, C. K. (1997). Executive decisions about adoption of information technology in small business: Theory and empirical tests. Information Systems Research, 8(2), 171–195.
- Hofstede, G. (2010). Culture and organizations: Software of the min. London, UK: McGraw Hill.
- Hooper, D., Coughlan, J., & Mullen, M. R. (2008). Structural equation modelling: Guidelines for determining model fit. The Electronic Journal of Business Research Methods, 6(1), 53–60.
- Hsu, C., Yu, C., & Wu, C. (2014). Exploring the continuance intention of social networking websites: An empirical research. Information Systems & e-Business Management, 12(2), 139–163.
- Hsu, C. L., & Lin, J. C. (2008). Acceptance of blog usage: The roles of technology acceptance, social influence and knowledge sharing motivation. Information & Management, 45, 65–74.
- Hsu, C. L., & Lu, H. P. (2004). Why do people play on-line games? An extended TAM with social influences and flow experience. Information & Management, 41, 853–868.
- Hu, L.-T., & Bentler, P. M. (1998). Fit indices in covariance structure modeling: Sensitivity to underparameterized model misspecification. Psychological Methods, 3(4), 424–453.
- Ifinedo, P. (2016). Applying uses and gratifications theory and social influence processes to understand students’ pervasive adoption of social networking sites: Perspectives from the Americas. International Journal of Information Management, 36(2), 192–206.
- Kim, B. (2011). Understanding antecedents of continuance intention in social-networking services. Cyberpsychology, Behavior, and Social Networking, 14(4), 199–205.
- Kim, Y., Sohn, D., & Choi, S. M. (2011). Cultural difference in motivations for using social network sites: A comparative study of American and Korean college students. Computers in Human Behavior, 27(1), 365–372.
- Ku, Y., Chen, R., & Zhang, H. (2013). Why do users continue using social networking sites? An exploratory study of members in the United States and Taiwan. Information & Management, 50(7), 571–581.
- Li, D. C. (2011). Online social network acceptance: A social perspective. Internet Research, 21(5), 562–580.
- Li, Y. (2011). Empirical studies on online information privacy concerns: Literature review and an integrative framework. Communications of the Association for Information Systems, 28(1), 453–496.
- Luarn, P., Yang, J., & Chiu, Y. (2015). Why people check in to social network sites. International Journal of Electronic Commerce, 19(4), 21–46.
- Malhotra, N. K., Kim, S. S., & Agarwal, J. (2004). Internet Users’ Information Privacy Concerns (IUIPC): The construct, the scale, and a causal model. Information Systems Research, 15(4), 336–355.
- Mathieson, K. (1991). Predicting user intentions: Comparing the technology acceptance model with the theory of planned behavior. Information Systems Research, 2(3), 173–191.
- Milberg, S. J., Smith, H. J., & Burke, S. J. (2000). Information privacy: Corporate management and national regulation. Organization Science, 11(1), 35–57.
- Mugny, G., Butera, F., Sanchez-Mazas, M., & Perez, J. A. (1995). Judgements in conflict: The conflict elaboration theory of social influence. In B. Boothe, R. Hirsig, A. Helminger, B. Meier, & R. Volkart (Eds.), Perception-evaluation-interpretation, Swiss Monographs in Psychology (Vol. 3, pp. 160–168). Bern, Switzerland: Huber.
- Nocera, J. A., & Dunckley, L. (2007). An approach to the evaluation of usefulness as a social construct using technological frames. International Journal of Human-Computer Interaction, 22(1&2), 153–172.
- Nunnally, J. C. (1967). Psychometric theory. New York, NY: McGraw-Hill.
- Nysveen, H., Pedersen, P. E., & Thorbjornsen, H. (2005). Explaining intention to use mobile chat services: Moderating effects of gender. The Journal of Consumer Marketing, 22(5), 247–256.
- Okazaki, S., Rubio, N., & Campo, S. (2014). Gossip in social networking sites Why people chitchat about ad campaigns. International Journal of Market Research, 56(3), 317–340.
- Park, C., Jun, J., & Lee, T. (2015). Consumer characteristics and the use of social networking sites. International Marketing Review, 32(3/4), 414–437.
- Park, Y. J. (2008). Privacy regime, culture and user practices in the cyber-marketplace. Journal of Policy, Regulations, & Telecommunications, 2(10), 57–74.
- Pavlou, P. A., & Fygenson, M. (2006). Understanding and predicting electronic commerce adoption: An extension of the theory of planned behavior. MIS Quarterly, 30(1), 115–143.
- Pelling, E., & White, K. (2009). The theory of planned behavior applied to young people’s use of social networking web sites. CyberPsychology & Behavior, 12(6), 755–759.
- Pinsonneault, A., & Kraemer, K. (1993). Survey research methodology in management information systems: An assessment. Journal of Management Information Systems, 10, 75–106.
- Qin, L., Kim, Y., Hsu, J., & Tan, X. (2011). The effects of social influence on user acceptance of online social networks. International Journal of Human-Computer Interaction, 27(9), 885–899.
- Qureshi, I., & Compeau, D. (2009). Assessing between-group differences in information systems research: A comparison of covariance- and component-based SEM. MIS Quarterly, 33(1), 197–214.
- Rice, R. E., Grant, A. E., Schmitz, J., & Torobin, J. (1990). Individual and network influences on the adoption and perceived outcomes of electronic messaging. Social Networks, 12(1), 27–55.
- Roback, D., & Wakefield, R. L. (2013). Privacy risk versus socialness in the decision to use mobile location-based applications. ACM SIGMIS Database, 44, 19–38.
- Shin, D. H. (2010). Analysis of online social networks: A cross-national study. Online Information Review, 34(3), 473–495.
- Shneor, R., & Efrat, K. (2014). Analyzing the impact of culture on average time spent on social networking sites. Journal of Promotion Management, 20, 413–435.
- Smith, H. J., Milberg, J. S., & Burke, J. S. (1996). Information privacy: Measuring individuals’ concerns about organizational practices. MIS Quarterly, 20(2), 167–196.
- Straub, D., Keil, M., & Brenner, W. (1997). Testing the technology acceptance model across cultures: A three country study. Information & Management, 33, 1–11.
- Sukhu, A., Zhang, T., & Bilgihan, A. (2015). Factors influencing information-sharing behaviors in social networking sites. Services Marketing Quarterly, 36(4), 317–334.
- Tan, X., Qin, L., Kim, Y., & Hsu, J. (2012). Impact of privacy concern in social networking websites. Internet Research, 22(2), 211–233.
- Taylor, S., & Todd, P. (1995). Understanding information technology usage: A test of competing models. Information Systems Research, 6(2), 144–176.
- Van der Heijden, H. (2004). User acceptance of hedonic information systems. MIS Quarterly, 4(28), 695–704.
- Venkatesh, V., & Davis, F. D. (2000). A theoretical extension of the Technology Acceptance Model: Four longitudinal field studies. Management Science, 45, 186–204.
- Xu, H., Dinev, T., Smith, H. J., & Hart, P. (2008, December 14–17). Examining the formation of individual’s privacy concerns: toward an integrative view. International Conference on Information Systems (ICIS), Paris, France.
- Xu, H., Dinev, T., Smith, H. J., & Hart, P. (2011). Information privacy concerns: Linking individual perceptions with institutional privacy assurances. Journal of the Association for Information Systems, 12, 798–824.
- Yoon, C., & Rolland, E. (2015). Understanding continuance use in social networking services. Journal of Computer Information Systems, 55(2), 1–8.
- Yu, J., Zo, H., Choi, M. K., & Ciganek, A. P. (2013). User acceptance of location-based social networking services an extended perspective of perceived value. Online Information Review, 37(5), 711–730.
- Zhou, T. (2011). The impact of privacy concern on user adoption of location-based services. Industrial Management & Data Systems, 111(2), 212–226.
- Zhou, T., Li, H., & Liu, Y. (2010). The effect of flow experience on mobile SNS users’ loyalty. Industrial Management & Data Systems, 110(6), 930–946.