1,375
Views
12
CrossRef citations to date
0
Altmetric
Research Article

Prior negative experience of online disclosure, privacy concerns, and regulatory support in Chinese social media

&

REFERENCES

  • Antisdel, T., & Ghalayini, T. (2011). The challenge of conducting data collections and investigations under unclear data privacy rules. China Business Review, 38(4), 46–49.
  • Bansal, G., Zahedi, F. M., & Gefen, D. (2010). The impact of personal dispositions on information sensitivity, privacy concern and trust in disclosing health information online. Decision Support Systems, 49(2), 138–150.
  • Barksdale, H. C., Perreault, W. D.Jr, Arndt, J., Barnhill, J. A., French, W. A., Halliday, M., et al., (1982). A cross-national survey of consumer attitudes towards marketing practices, consumerism and government regulations. Columbia Journal of World Business, 17(2), 71–86.
  • Boyd, D. M., & Ellison, N. B. (2007). Social network sites: Definition, history, and scholarship. Journal of Computer-Mediated Communication, 13(1), Retrieved from http://jcmc.indiana.edu/vol13/issue1/boyd.ellison.html.
  • Cao, Z., Chu, R., & Lu, X. (2006). An empirical research of factors influencing transactional trust under online environment: An empirical research from Taiwan. Nankai Business Review, 9(4), 91–95 [in Chinese].
  • Carmines, E. G., & McIver, J. P. (1981). Analyzing models with unobserved variables: Analysis of covariance structures. In G. W.Bohrnstedt & E. F.Borgatta (Eds.), Social measurement: Current issues (pp. 65–115). Beverly Hills, CA: Sage.
  • Chen, X., Xu, X., & Mao, R. (2010, November). Self-disclosure under social networking sites: A risk-utility decision model. Paper presented at the Information Management Session of the Annual Meeting of China Academy of Management Modernization, Dalian, Liaoning Province, China.
  • Cheung, A. S. Y. (2009). China Internet going wild: Cyber-hunting versus privacy protection. Computer Law & Security Review, 25(3), 275–279.
  • China Consumer Association. (2011). China Consumer Association calls for better protection of smartphone users' personal information. China Brand & Anti-counterfeiting, 7, 84 [in Chinese].
  • Cho, C.-H., & Cheon, H. J. (2004). Why do people avoid advertising on the Internet?Journal of Advertising, 33(4), 89–97.
  • Cho, H., Rivera-Sánchez, M., & Lim, S. (2009). A multinational study on online privacy: Global concerns and local responses. New Media & Society, 11(3), 395–416.
  • Churchill, G. A.Jr (1979). A paradigm for developing better measures of marketing constructs. Journal of Marketing Research, 16(1), 64–73.
  • CNNIC. (2009). Research report on China net. Citizens' use of social network services. Retrieved from www.cnnic.cn/research/bgxz/sqbg/200911/t20091112_18427.html [in Chinese].
  • CNNIC. (2012). The 30th statistical report on internet development in China. Retrieved from http://www.cnnic.cn/research/bgxz/tjbg/201207/P020120719489935146937.pdf [in Chinese].
  • Culnan, M. J. (1995). Consumer awareness of name removal procedures: Implications for direct marketing. Journal of Direct Marketing, 9(2), 10–19.
  • Culnan, M. J., & Bies, R. J. (2003). Consumer privacy: Balancing economic and justice considerations. Journal of Social Issues, 59(2), 323–342.
  • DCCI. (2011). Blue book of social marketing services. Retrieved from www.dcci.com.cn/media/download/567510a7fc367abdadfb91e23513145263cb.pdf [in Chinese].
  • Dong, D., Li, G., & Yang, Y. (2005). Research of the perceived risk facets by consumers in Internet shopping. Chinese Journal of Management, 2(1), 55–60.
  • Dunfee, T. W., Smith, N. C., & Ross, W. T.Jr (1999). Social contracts and marketing ethics. Journal of Marketing, 63(3), 14–32.
  • Dunfee, T. W., & Warren, D. E. (2001). Is Guanxi ethical? A normative analysis of doing business in China. Journal of Business Ethics, 32(3), 191–204.
  • Ellison, N. B., Steinfield, C., & Lampe, C. (2007). The benefits of Facebook “friends”: Social capital and college students' use of online social network sites. Journal of Computer-Mediated Communication, 12(4), 1143–1168.
  • eMarketer Inc. (2012). Total worldwide social network ad revenues continue strong growth. Retrieved from www.emarketer.com/Article.aspx?R = 1008862.
  • FTC (Federal Trade Commission). (1998). Privacy online: A report to Congress. Washington, DC: Federal Trade Commission.
  • Fogel, J., & Nehmad, E. (2009). Internet social network communities: Risk taking, trust, and privacy concerns. Computers in Human Behavior, 25(1), 153–160.
  • Fornell, C., & Larcker, D. F. (1981). Evaluating structural equation models with unobservable variables and measurement error. Journal of Marketing Research, 18(1), 39–50.
  • Gao, Z. (2008). Controlling deceptive advertising in China: An overview. Journal of Public Policy & Marketing, 27(2), 165–177.
  • Gao, Z., & Zhang, H. (2011). A comparative study of Chinese and US consumers' attitudes toward advertising regulation. Asia Pacific Journal of Marketing and Logistics, 23(1), 72–90.
  • Goles, T., Lee, S., Rao, S. V., & Warren, J. (2009). Trust violation in electronic commerce: Customer concerns and reactions. Journal of Computer Information Systems, 49(4), 1–9.
  • Hou, L. (2010). Firms' brand relationship building from a social contracts perspective. Economic Herald, 4, 86–87 [in Chinese].
  • Hsu, C.-W. (2004, May 27–31). Possibility and impossibility for global online privacy: A cross-country examination. Paper presented at the Annual Meeting of International Communication Association, New Orleans, LA, USA.
  • Hu, L.-t., & Bentler, P. M. (1999). Cutoff criteria for fit indexes in covariance structure analysis: Conventional criteria versus new alternatives. Structural Equation Modeling, 6(1), 1–55.
  • Jing, M., Zhou, Y., & Wang, F. (2007). Empirical study on online shopping perceived risk. Journal of Systems & Management, 16(2), 164–169 [in Chinese].
  • Kong, L. (2007). Online privacy in China: A survey on information practices of Chinese websites. Chinese Journal of International Law, 6(1), 157–183.
  • Lin, J. (2004). A social contracts approach to social responsibility of firms. Lingnan Journal, 4, 71–75 [in Chinese].
  • Lin, J., Lu, Y., & Lu, Y. (2011). Dynamic evolution of consumer trust in the mobile commerce environment. Journal of Management Science, 24(6), 93–103 [in Chinese].
  • Lowry, P. B., Cao, J., & Everard, A. (2011). Privacy concerns versus desire for interpersonal awareness in driving the use of self-disclosure technologies: The case of instant messaging in two cultures. Journal of Management Information Systems, 27(4), 163–200.
  • Luo, X. (2002). Trust production and privacy concerns on the Internet: A framework based on relationship marketing and social exchange theory. Industrial Marketing Management, 31(2), 111–118.
  • Lwin, M., Wirtz, J., & Williams, J. D. (2007). Consumer online privacy concerns and responses: a power-responsibility equilibrium perspective. Journal of the Academy of Marketing Science, 35(4), 572–585.
  • Ma, X. (2011). On protection of online privacy right: From the angle of Article 36 of the Tort Liability Law. Legal System and Society, 2, 78–79 [in Chinese].
  • Madden, N. (2011). Sy Lau. Advertising Age, 82(1), 6.
  • Malhotra, N. K., Kim, S. S., & Agarwal, J. (2004). Internet users' information privacy concerns (IUIPC): The construct, the scale, and a causal model. Information Systems Research, 15(4), 336–355.
  • Marsh, H. W., Hau, K.-T., & Wen, Z. (2004). In search of golden rules: Comment on hypothesis-testing approaches to setting cutoff values for fit indexes and dangers in overgeneralizing Hu and Bentler's (1999) findings. Structural Equation Modeling, 11(3), 320–341.
  • McKnight, D. H., Choudhury, V., & Kacmar, C. (2002). Developing and validating trust measures for e-commerce: An integrative typology. Information Systems Research, 13(3), 334–359.
  • Merisavo, M., Kajalo, S., Karjaluoto, H., Virtanen, V., Salmenkivi, S., Raulas, M., et al., (2007). An empirical study of the drivers of consumer acceptance of mobile advertising. Journal of Interactive Advertising, 7(2), 1–17.
  • Metzger, M. J. (2004). Privacy, trust, and disclosure: Exploring barriers to electronic commerce. Journal of Computer-Mediated Communication, 9(4), Retrieved from http://jcmc.indiana.edu/vol9/issue4/metzger.html.
  • Milberg, S. J. H., Smith, J., & Burke, S. J. (2000). Information privacy: Corporate management and national regulation. Organization Science, 11(1), 35–57.
  • Milne, G. R., & Gordon, M. E. (1993). Direct mail privacy-efficiency trade-offs within an implied social contract framework. Journal of Public Policy & Marketing, 12(2), 206–215.
  • Milne, G. R., Rohm, A. J., & Bahl, S. (2004). Consumers' protection of online privacy and identity. Journal of Consumer Affairs, 38(2), 217–232.
  • Nunnally, J. C., & Bernstein, I. H. (1994). Psychometric theory. New York, NY: McGraw-Hill.
  • Okazaki, S., Li, H., & Hirose, M. (2009). Consumer privacy concerns and preference for degree of regulatory control. Journal of Advertising, 38(4), 63–77.
  • Pavlou, P. A. (2003). Consumer acceptance of electronic commerce: Integrating trust and risk with the technology acceptance model. International Journal of Electronic Commerce, 7(3), 101–134.
  • Pavlou, P. A., & Gefen, D. (2005). Psychological contract violation in online marketplaces: Antecedents, consequences, and moderating role. Information Systems Research, 16(4), 372–399.
  • Peter, J. P. (1979). Reliability: A review of psychometric basics and recent marketing practices. Journal of Marketing Research, 16(1), 6–17.
  • Phelps, J., Nowak, G., & Ferrell, E. (2000). Privacy concerns and consumer willingness to provide personal information. Journal of Public Policy & Marketing, 19(1), 27–41.
  • Quinn, J. (2010, August 5). Facebook clicks with advertisers. The Daily Telegraph, 3.
  • Rifon, N. J., LaRose, R., & Choi, S. M. (2005). Your privacy is sealed: Effects of web privacy seals on trust and personal disclosures. Journal of Consumer Affairs, 39(2), 339–362.
  • Rising (Beijing Rising International Software Co., Ltd.). (2009). Report on Social Networking Websites and Netizens' Privacy Security. Retrieved from http://it.rising.com.cn/new2008/News/NewsInfo/2009-03-30/1238378978d52093.shtml [in Chinese].
  • Rose, E. A. (2006). An examination of the concern for information privacy in the New Zealand regulatory context. Information & Management, 43(3), 322–335.
  • Schumacker, R. E., & Lomax, R. G. (2004). A beginner's guide to structural equation modeling (Second edition). Mahwah, NJ: Lawrence Erlbaum.
  • Shao, B., & Meng, X. (2005). An empirical study on factors influencing consumer trust in China's B2C e-commerce. Science & Technology Progress and Policy, 7, 166–169 [in Chinese].
  • Sirdeshmukh, D., Singh, J., & Sabol, B. (2002). Consumer trust, value, and loyalty in relational exchanges. Journal of Marketing, 66(1), 15–37.
  • Smith, H. J., Milberg, S. J., & Burke, S. J. (1996). Information privacy: Measuring individuals' concerns about organizational practices. MIS Quarterly, 20(2), 167–196.
  • Son, J.-Y., & Kim, S. S. (2008). Internet users' information privacy protective response: a taxonomy and a nomological model. MIS Quarterly, 32(3), 503–529.
  • Stewart, K. A., & Segars, A. H. (2002). An empirical examination of the concern for information privacy instrument. Information Systems Research, 13(1), 36–49.
  • Wang, Y. (2008). Empirical study in factors influencing online trust in tourism e-Commerce. Science and Technology for China Youth, 1, 26–32 [in Chinese].
  • Westin, A. F. (1967). Privacy and freedom. New York, NY: Atheneum.
  • Wu, Y., Lau, T., Atkin, D. J., & Lin, C. A. (2011). A comparative study of online privacy regulations in the US and China. Telecommunications Policy, 35(7), 603–616.
  • Xie, G., Li, W., & Cui, C. (2012). The empirical research on influencing factors of network privacy protection behavior intention. East China Economic Management, 26(6), 148–150, 160 [in Chinese].
  • Xu, M., & Luo, Y. (2010). An interpretation of the Tort Liability Law for online privacy protection. Legal System and Society, 20, 68–69 [in Chinese].
  • Xue, H. (2010). Privacy and personal data protection in China: An update for the year end 2009. Computer Law & Security Review, 26(3), 284–289.
  • Yang, H. (2011, August 10–13). Young American consumers' social media use, online privacy concerns, trust, risk, and support for advertising regulation. Paper presented to the Advertising Division of the AEJMC Annual Convention, St Louis, Missouri, USA.
  • Yang, H. (2012). Young American consumers' prior negative experience of online disclosure, online privacy concerns, and behavioral intent of privacy protection. Journal of Consumer Satisfaction, Dissatisfaction & Complaining Behavior, 25, 179–202.
  • Yang, H., & Zhou, L. (2009, May 27–30). A comparative study of regulation and self-regulation of Internet advertising in United States and China. Paper presented at the American Academy Advertising Asian-Pacific Conference, Beijing, China.
  • Yang, Q., Qian, X., & Pang, C. (2011). Consumer e-trust and perceived risks for online payments. Statistical Research, 28(10), 89–97 [in Chinese].
  • Yang, S., Wang, Y., & Wang, K. (2008). The measurement of online users' privacy concern in China context. Journal of Information, 10, 3–7 [in Chinese].
  • Yao, M. Z., & Zhang, J. (2008). Predicting user concerns about online privacy in Hong Kong. CyberPsychology & Behavior, 11(6), 779–781.
  • Zhang, R. (2010). To what end will be Internet manhunt: From the angle of the tort liability law. Legal System and Society, 27, 75–76 [in Chinese].
  • Zhang, X. (2008). Consumers' trust model and a real world data analysis in C2C transactions. Statistics and Information Forum, 23(3), 61–65, 76 [in Chinese].
  • Zhao, D., & Ji, S. (2010). Trust and perceived risk to online purchase intention: An empirical study. Journal of Applied Statistics and Management, 29(2), 305–314 [in Chinese].

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.