876
Views
9
CrossRef citations to date
0
Altmetric
Articles

Privacy Coping and Information-Sharing Behaviors in Social Media: A Comparison of Chinese and U.S. Users

, &

REFERENCES

  • Abril, P. S., Levin, A., & Riego, A. D. (2012). Blurred boundaries: Social media privacy and the twenty-first-century employee. American Business Law Journal, 49(1), 63 –124. doi:10.1111/j.1744-1714.2011.01127.x
  • Acquisti, A. (2011). Identity theft fears grow over Facebook facial recognition. Biometric Technology Today, 2011(8), 2 –3. doi:10.1016/S0969-4765(11)70143-6
  • Ardichvili, A., Maurer, M., Li, W., Wentling, T., & Stuedemann, R. (2006). Cultural influences on knowledge sharing through online communities of practice. Journal of Knowledge Management, 10(1), 94 –107. doi:10.1108/13673270610650139
  • Becker, J.-M., Klein, K., & Wetzels, M. (2012). Hierarchical latent variable models in PLS-SEM: Guidelines for using reflective-formative type models. Long Range Planning, 45(5–6), 359 –394. doi:10.1016/j.lrp.2012.10.001
  • Block, J. J. (2008). Issues for DSM-V: Internet addiction. American Journal of Psychiatry, 165(3), 306 –307. doi:10.1176/appi.ajp.2007.07101556
  • Bollen, K., & Lennox, R. (1991). Conventional wisdom on measurement: A structural equation perspective. Psychological Bulletin, 110(2), 305 –314. doi:10.1037/0033-2909.110.2.305
  • Brandtzæg, P. B., Lüders, M., & Skjetne, J. H. (2010). Too many Facebook “friends”? Content sharing and sociability versus the need for privacy in social network sites. International Journal of Human-Computer Interaction, 26(11–12), 1006 –1030. doi:10.1080/10447318.2010.516719
  • Brislin, R. W. (1986). The wording and translation of research instruments. In W. J. Lonner & J. W. Berry ( Eds.), Field methods in cross-cultural research ( pp. 137 –164). Thousand Oaks, CA: Sage Publications.
  • Bulgurcu, B., Cavusoglu, H., & Benbasat, I. (2010). Information security policy compliance: An empirical study of rationality-based beliefs and information security awareness. MIS Quarterly, 34(3), 523 –548.
  • Chapman, C. N., & Lahav, M. (2008). International ethnographic observation of social networking sites. In Proceedings of the CHI’08 Conference on Human Factors in Computing Systems ( pp. 3123 –3128). New York, NY: ACM Press.
  • Chen, R., & Sharma, S. (2012). Understanding user behavior at social networking sites: A relational capital perspective. Journal of Global Information Technology Management, 15, 2.
  • Chin, W. W. (1998). The partial least squares approach to structural equation modeling. In G. A. Marcoulides ( Ed.), Modern business research methods ( pp. 295 –336). Mahwah, NJ: Lawrence Erlbaum Associates.
  • Chin, W. W., Thatcher, J. B., & Wright, R. T. (2012). Assessing common method bias: Problems with the ULMC technique. MIS Quarterly, 36(3), 1003 –1019.
  • Chou, C., & Hsiao, M.-C. (2000). Internet addiction, usage, gratification, and pleasure experience: The Taiwan college students’ case. Computers & Education, 35(1), 65 –80. doi:10.1016/S0360-1315(00)00019-1
  • Chou, W.-Y. S., Hunt, Y. M., Beckjord, E. B., Moser, R. P., & Hesse, B. W. (2009). Social media use in the United States: Implications for health communication. Journal of Medical Internet Research, 11(4), e48. doi:10.2196/jmir.1249
  • Cohen, J. (1988). Statistical power analysis for the behavioral sciences. Hillsdale, NJ: Lawrence Erlbaum Associates.
  • Cohen, J. (1992). A power primer. Psychological Bulletin, 112(1), 155 –159. doi:10.1037/0033-2909.112.1.155
  • Ehrenberg, A., Juckes, S., White, K. M., & Walsh, S. P. (2008). Personality and self-esteem as predictors of young people’s technology use. CyberPsychology & Behavior, 11(6), 739 –741. doi:10.1089/cpb.2008.0030
  • Ferraro, G., Caci, B., D’Amico, A., & Di Blasi, M. (2007). Internet addiction disorder: An Italian study. Cyberpsychology & Behavior, 10(2), 170 –175. doi:10.1089/cpb.2006.9972
  • Fogel, J., & Nehmad, E. (2009). Internet social network communities: Risk taking, trust, and privacy concerns. Computers in Human Behavior, 25(1), 153 –160. doi:10.1016/j.chb.2008.08.006
  • Fornell, C., & Larcker, D. F. (1981). Evaluating structural equation models with unobservable variables and measurement error. Journal of Marketing Research, 18(1), 39 –50. doi:10.2307/3151312
  • Goodhue, D. L., Lewis, W., & Thompson, R. (2012). Does PLS have advantages for small sample size or non-normal data?. MIS Quarterly, 36(3), 981 –1001.
  • Gretzel, U., Kang, M., & Lee, W. (2008). Differences in consumer-generated media adoption and use: A cross-national perspective. Journal of Hospitality Marketing & Management, 17(1), 99 –120. doi:10.1080/10507050801978240
  • Gross, R., & Acquisti, A. (2005, November). Information revelation and privacy in online social networks. ACM Workshop on Privacy in the Electronic Society, Alexandria, VA.
  • Hofstede, G., Hofstede, G. J., & Minkov, M. (2010). Cultures and organizations: Software of the mind (3rd ed.). New York, NY: McGraw-Hill.
  • Holden, C. (2001). ‘Behavioral’ addictions: Do they exist? Science, 294(5544), 980 –982. doi:10.1126/science.294.5544.980
  • Hongladarom, S. (2011). Personal identity and the self in the online and offline world. Minds and Machines, 21(4), 533 –548. doi:10.1007/s11023-011-9255-x
  • Hwang, A., Francesco, A., & Kessler, E. (2003). The relationship between individualism-collectivism, face, and feedback and learning processes in Hong Kong, Singapore, and the United States. Journal of Cross-cultural Psychology, 34(1), 72 –91. doi:10.1177/0022022102239156
  • Junglas, I. A., Johnson, N. A., & Spitzmüller, C. (2008). Personality traits and concern for privacy: An empirical study in the context of location-based services. European Journal of Information Systems, 17(4), 387 –402. doi:10.1057/ejis.2008.29
  • Leung, L. (2004). Net-Generation attributes and seductive properties of the Internet as predictors of online activities and Internet addiction. Cyberpsychology & Behavior, 7(3), 333 –348. doi:10.1089/1094931041291303
  • Lowry, P. B., Cao, J., & Everard, A. (2011). Privacy concerns versus desire for interpersonal awareness in driving the use of self-disclosure technologies: The case of instant messaging in two cultures. Journal of Management Information Systems, 27(4), 163 –200. doi:10.2753/MIS0742-1222270406
  • Lowry, P. B., & Gaskin, J. (2014). Partial least squares (PLS) structural equation modeling (SEM) for building and testing behavioral causal theory: When to choose it and how to use it. IEEE Transactions on Professional Communication, 57(2), 123–146. doi:10.1109/TPC.2014.2312452
  • Malhotra, N. K., Kim, S. S., & Agarwal, J. (2004). Internet users’ information privacy concerns (IUIPC): The construct, the scale, and a causal model. Information Systems Research, 15(4), 336 –355. doi:10.1287/isre.1040.0032
  • Mascolo, M. F., Fischer, K. W., & Li, J. (2003). Dynamic development of component systems of emotions: Pride, shame, and guilt in China and the United States. In R. J. Davidson, K. R. Scherer, & H. H. Goldsmith ( Eds.), Handbook of affective sciences. New York, NY: Oxford University Press.
  • McDermott, E. (2012, May 7). To tweet or not to tweet: Advice on social media. Managing Intellectual Property. Available at http://www.managingip.com/Article/3023952/Internet-IP-United-States-Jurisdiction-Archive/To-tweet-or-not-to-tweet-advice-on-social-media.html
  • Morahan-Martin, J., & Schumacher, P. (2000). Incidence and correlates of pathological Internet use among college students. Computers in Human Behavior, 16(1), 13 –29. doi:10.1016/S0747-5632(99)00049-7
  • Petter, S., Straub, D., & Rai, A. (2007). Specifying formative constructs in information systems research. MIS Quarterly, 31(4), 623 –656.
  • Podsakoff, P. M., MacKenzie, S. B., Lee, J.-Y., & Podsakoff, N. P. (2003). Common method biases in behavioral research: A critical review of the literature and recommended remedies. Journal of Applied Psychology, 88(5), 879 –903. doi:10.1037/0021-9010.88.5.879
  • Riego, A. D., Abril, P. S., & Levin, A. (2012). Your password or your paycheck? A job applicant’s murky right to social media privacy. Journal of Internet Law, 16(3), 18 –26.
  • Ringle, C. M., Wende, S., & Will, A. (2005). SmartPLS. Hamburg, Germany: SmartPLS.
  • Rodogno, R. (2012). Personal identity online. Philosophy & Technology, 25(3), 309 –328. doi:10.1007/s13347-011-0020-0
  • Rönkkö, M., & Ylitalo, J. (2011, December). PLS marker variable approach to diagnosing and controlling for method variance. Paper presented at the 32nd International Conference of Information Systems, Shanghai, China.
  • Smith, J., Milberg, S. J., & Burke, S. J. (1996). Information privacy: Measuring individuals’ concerns about organizational practices. MIS Quarterly, 20(2), 167 –196. doi:10.2307/249477
  • Smith, J. H., Dinev, T., & Xu, H. (2011). Information privacy research: An interdisciplinary review. MIS Quarterly, 35(4), 989 –1015.
  • Soule, L. C., Shell, L. W., & Kleen, B. A. (2003). Exploring Internet addiction: Demographic characteristics and streotypes of heavy Internet use. Journal of Computer Information Systems, 44(1), 64 –73.
  • Spitzberg, B. H., & Hoobler, G. (2002). Cyberstalking and the technologies of interpersonal terrorism. New Media & Society, 4(1), 71 –92. doi:10.1177/14614440222226271
  • Stone, E. F., Gueutal, H. G., Gardner, D. G., & McClure, S. (1983). A field experiment comparing information-privacy values, beliefs, and attitudes across several types of organizations. Journal of Applied Psychology, 68(3), 459 –468. doi:10.1037/0021-9010.68.3.459
  • Tenenhaus, M., Vinzi, V. E., Chatelin, Y.-M., & Lauro, C. (2005). PLS path modeling. Computational Statistics & Data Analysis, 48(1), 159 –205. doi:10.1016/j.csda.2004.03.005
  • Turel, O., Serenko, A., & Giles, P. (2011). Integrating technology addiction and use: An empirical investigation of online auction users. MIS Quarterly, 35(4), 1043 –1061.
  • Wetzels, M., Odekerken-Schöder, G., & Oppen, C. V. (2009). Using PLS path modeling for assessing hierarchical construct models: Guidelines and empirical illustration. MIS Quarterly, 33(1), 177 –195.
  • White, M. C. (2012, July 31). Big data knows what you’re doing right now. Time. Available at http://business.time.com/2012/07/31/big-data-knows-what-youre-doing-right-now/
  • Wu, H. R., & Zhu, K. J. (2004). Path analysis on related factors causing internet addiction disorder in college students. Chinese Journal of Public Health, 20(11), 1363 –1364.
  • Xiao, H., Li, W., Cao, X., Tang, Z., & Jiaotong, S. (2012). The online social networks on knowledge exchange: Online social identity, social tie and culture orientation. Journal of Global Information Technology Management, 15, 2.
  • Yang, D., Lai, F., & Lu, Y. (2012). Online communities and social networks–Global and cultural perspectives. Journal of Global Information Technology Management, 15, 1 –3.
  • Yellowlees, P. M., & Marks, S. (2007). Problematic Internet use or Internet addiction?. Computers in Human Behavior, 23(3), 1447 –1453. doi:10.1016/j.chb.2005.05.004
  • Yin, G., Zhu, L., & Cheng, X. (2013). Continuance usage of localized social networking services: A conceptual model and lessons from China. Journal of Global Information Technology Management, 16, 7 –30. doi:10.1080/1097198X.2013.10845640
  • Zhang, Y. J., Chen, J. Q., & Wen, K.-W. (2002). Characteristics of Internet users and their privacy concerns: A comparative study between China and the United States. Journal of Internet Commerce, 1(2), 1 –16. doi:10.1300/J179v01n02_01

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.