Skip to main content

A MCDM Methods Based TAM for Deriving Influences of Privacy Paradox on User’s Trust on Social Networks

  • Conference paper
  • First Online:
  • 2742 Accesses

Part of the book series: Lecture Notes in Computer Science ((LNAI,volume 9799))

Abstract

Social network (SN) sites (SNSs) surged recently all over the world and have become new platforms for intimate communications. As the functionality of SNs was enhanced, users’ own information can be collected, stored, and manipulated much more easily. Privacy concerns have thus become the most concerned issue by both users and SN service providers. The service providers intend to maximize the profits and need to consider how users’ confidential information can be fully utilized in marketing and operations. At the same time, users usually concern over the misuse of private information by the website operations at the moment when disclosing individual details on SNSs. Apparently, a significant gap exists between the website operators’ intention to fully utilize the private information as well as the users’ privacy concerns about disclosing information on the SNSs. Such a cognition gap, or the “privacy paradox”, influences users’ trust on a specific SNS directly and further influences users’ acceptance and continuous usage of the sites. In this study, the Technology Acceptance Model (TAM) was introduced as the theoretical basis by applying users’ private disclosure behavior, disclosure risks perception, and the extent of privacy settings in the SNSs as the main variables. In addition, in the past works, researchers found that perceived usefulness, perceived ease of use and the interaction strength for modern technology services or products influence the use intention. So, these factors were also added as research variables in the analytic model. The Decision Making Trial and Evaluation Laboratory Based Network Process (DNP) was introduced construct the influence relationships between the variables. The weights being associated with the variables can be derived accordingly. By using the analytic model, the variables which can influence the privacy paradox on user’s trust of SNs can be derived. Such variables and influence relationships can be used in developing the security policies of the SNSs.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Ellison, N.B.: Social network sites: definition, history, and scholarship. J. Comput.-Mediated Commun. 13, 210–230 (2007)

    Article  Google Scholar 

  2. Young, A.L., Quan-Haase, A.: Privacy protection strategies on facebook: the internet privacy paradox revisited. Inf. Commun. Soc. 16, 479–500 (2013)

    Article  Google Scholar 

  3. Utz, S., Krämer, N.: The privacy paradox on social network sites revisited: the role of individual characteristics and group norms. Cyberpsychol.: J. Psychosoc. Res. Cyberspace 3, 2 (2009)

    Google Scholar 

  4. Davis, F.D., Bagozzi, R.P., Warshaw, P.R.: User acceptance of computer technology: a comparison of two theoretical models. Manag. Sci. 35, 982–1003 (1989)

    Article  Google Scholar 

  5. Venkatesh, V., Davis, F.D.: A theoretical extension of the technology acceptance model: four longitudinal field studies. Manag. Sci. 46, 186–204 (2000)

    Article  Google Scholar 

  6. Venkatesh, V., Morris, M.G.: Why don’t men ever stop to ask for directions? Gender, social influence, and their role in technology acceptance and usage behavior. MIS Q. 24, 115–139 (2000)

    Article  Google Scholar 

  7. Huang, C.-Y., Wu, M.-J., Liu, Y.-W., Tzeng, G.-H.: Using the DEMATEL based network process and structural equation modeling methods for deriving factors influencing the acceptance of smart phone operation systems. In: Jiang, H., Ding, W., Ali, M., Wu, X. (eds.) IEA/AIE 2012. LNCS, vol. 7345, pp. 731–741. Springer, Heidelberg (2012)

    Chapter  Google Scholar 

  8. Huang, C.-Y., Shyu, J.Z., Tzeng, G.-H.: Reconfiguring the innovation policy portfolios for Taiwan’s SIP mall industry. Technovation 27, 744–765 (2007)

    Article  Google Scholar 

  9. Bansal, G., Fatemeh‘Mariam’Zahedi, D.G.: The role of privacy assurance mechanisms in building trust and the moderating role of privacy concern. Eur. J. Inf. Syst. 24, 624–644 (2015)

    Article  Google Scholar 

  10. Nam, C., Song, C., Lee, E., Park, C.I.: Consumers’ privacy concerns and willingness to provide marketing-related personal information online. Adv. Consum. Res. 33, 212 (2006)

    Google Scholar 

  11. Delvaux, E., Vanhoof, J., Tuytens, M., Vekeman, E., Devos, G., Van Petegem, P.: How may teacher evaluation have an impact on professional development? A multilevel analysis. Teach. Teach. Educ. 36, 1–11 (2013)

    Article  Google Scholar 

  12. Hsu, C.-L., Lu, H.-P.: Consumer behavior in online game communities: a motivational factor perspective. Comput. Hum. Behav. 23, 1642–1659 (2007)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Chi-Yo Huang .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer International Publishing Switzerland

About this paper

Cite this paper

Huang, CY., Wu, HH., Lu, HH. (2016). A MCDM Methods Based TAM for Deriving Influences of Privacy Paradox on User’s Trust on Social Networks. In: Fujita, H., Ali, M., Selamat, A., Sasaki, J., Kurematsu, M. (eds) Trends in Applied Knowledge-Based Systems and Data Science. IEA/AIE 2016. Lecture Notes in Computer Science(), vol 9799. Springer, Cham. https://doi.org/10.1007/978-3-319-42007-3_30

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-42007-3_30

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-42006-6

  • Online ISBN: 978-3-319-42007-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics