Abstract
Social network (SN) sites (SNSs) surged recently all over the world and have become new platforms for intimate communications. As the functionality of SNs was enhanced, users’ own information can be collected, stored, and manipulated much more easily. Privacy concerns have thus become the most concerned issue by both users and SN service providers. The service providers intend to maximize the profits and need to consider how users’ confidential information can be fully utilized in marketing and operations. At the same time, users usually concern over the misuse of private information by the website operations at the moment when disclosing individual details on SNSs. Apparently, a significant gap exists between the website operators’ intention to fully utilize the private information as well as the users’ privacy concerns about disclosing information on the SNSs. Such a cognition gap, or the “privacy paradox”, influences users’ trust on a specific SNS directly and further influences users’ acceptance and continuous usage of the sites. In this study, the Technology Acceptance Model (TAM) was introduced as the theoretical basis by applying users’ private disclosure behavior, disclosure risks perception, and the extent of privacy settings in the SNSs as the main variables. In addition, in the past works, researchers found that perceived usefulness, perceived ease of use and the interaction strength for modern technology services or products influence the use intention. So, these factors were also added as research variables in the analytic model. The Decision Making Trial and Evaluation Laboratory Based Network Process (DNP) was introduced construct the influence relationships between the variables. The weights being associated with the variables can be derived accordingly. By using the analytic model, the variables which can influence the privacy paradox on user’s trust of SNs can be derived. Such variables and influence relationships can be used in developing the security policies of the SNSs.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Ellison, N.B.: Social network sites: definition, history, and scholarship. J. Comput.-Mediated Commun. 13, 210–230 (2007)
Young, A.L., Quan-Haase, A.: Privacy protection strategies on facebook: the internet privacy paradox revisited. Inf. Commun. Soc. 16, 479–500 (2013)
Utz, S., Krämer, N.: The privacy paradox on social network sites revisited: the role of individual characteristics and group norms. Cyberpsychol.: J. Psychosoc. Res. Cyberspace 3, 2 (2009)
Davis, F.D., Bagozzi, R.P., Warshaw, P.R.: User acceptance of computer technology: a comparison of two theoretical models. Manag. Sci. 35, 982–1003 (1989)
Venkatesh, V., Davis, F.D.: A theoretical extension of the technology acceptance model: four longitudinal field studies. Manag. Sci. 46, 186–204 (2000)
Venkatesh, V., Morris, M.G.: Why don’t men ever stop to ask for directions? Gender, social influence, and their role in technology acceptance and usage behavior. MIS Q. 24, 115–139 (2000)
Huang, C.-Y., Wu, M.-J., Liu, Y.-W., Tzeng, G.-H.: Using the DEMATEL based network process and structural equation modeling methods for deriving factors influencing the acceptance of smart phone operation systems. In: Jiang, H., Ding, W., Ali, M., Wu, X. (eds.) IEA/AIE 2012. LNCS, vol. 7345, pp. 731–741. Springer, Heidelberg (2012)
Huang, C.-Y., Shyu, J.Z., Tzeng, G.-H.: Reconfiguring the innovation policy portfolios for Taiwan’s SIP mall industry. Technovation 27, 744–765 (2007)
Bansal, G., Fatemeh‘Mariam’Zahedi, D.G.: The role of privacy assurance mechanisms in building trust and the moderating role of privacy concern. Eur. J. Inf. Syst. 24, 624–644 (2015)
Nam, C., Song, C., Lee, E., Park, C.I.: Consumers’ privacy concerns and willingness to provide marketing-related personal information online. Adv. Consum. Res. 33, 212 (2006)
Delvaux, E., Vanhoof, J., Tuytens, M., Vekeman, E., Devos, G., Van Petegem, P.: How may teacher evaluation have an impact on professional development? A multilevel analysis. Teach. Teach. Educ. 36, 1–11 (2013)
Hsu, C.-L., Lu, H.-P.: Consumer behavior in online game communities: a motivational factor perspective. Comput. Hum. Behav. 23, 1642–1659 (2007)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2016 Springer International Publishing Switzerland
About this paper
Cite this paper
Huang, CY., Wu, HH., Lu, HH. (2016). A MCDM Methods Based TAM for Deriving Influences of Privacy Paradox on User’s Trust on Social Networks. In: Fujita, H., Ali, M., Selamat, A., Sasaki, J., Kurematsu, M. (eds) Trends in Applied Knowledge-Based Systems and Data Science. IEA/AIE 2016. Lecture Notes in Computer Science(), vol 9799. Springer, Cham. https://doi.org/10.1007/978-3-319-42007-3_30
Download citation
DOI: https://doi.org/10.1007/978-3-319-42007-3_30
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-42006-6
Online ISBN: 978-3-319-42007-3
eBook Packages: Computer ScienceComputer Science (R0)