2013
DOI: 10.5171/2012.281869
|View full text |Cite
|
Sign up to set email alerts
|

Examining Information Disclosure Behavior on Social Network Sites Using Protection Motivation Theory, Trust and Risk

Abstract: This paper reports on an empirical study that investigates the information disclosure behavior on Social Network Sites (SNS) focusing on undergraduate University students as our population. Although much have been reported on the issue of information privacy or privacy leakage on SNS, very few have employed the Protection Motivation Theory (PMT) as a framework to understand SNS user's behavior related to information disclosure. In this study, the PMT incorporated with trust and risk factor, has revealed that t… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
15
2

Year Published

2018
2018
2022
2022

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 12 publications
(17 citation statements)
references
References 23 publications
0
15
2
Order By: Relevance
“…Users have the belief that the Grab Health application provides benefits and security from bad risks that harm their work and privacy. This study does not support [30]; [31]; [8], which indicates that perceived vulnerability has a positive effect on attitudes towards information systems. Different backgrounds and research problems have an impact on differences in research results.…”
Section: Methodscontrasting
confidence: 79%
See 1 more Smart Citation
“…Users have the belief that the Grab Health application provides benefits and security from bad risks that harm their work and privacy. This study does not support [30]; [31]; [8], which indicates that perceived vulnerability has a positive effect on attitudes towards information systems. Different backgrounds and research problems have an impact on differences in research results.…”
Section: Methodscontrasting
confidence: 79%
“…This study defines perceived vulnerability as an individual's assessment of opportunities for privacy threats and virus intrusions in the use of information systems. Internet users' privacy violations have an impact on individual attitudes not to publish personal information on the internet [30]. Individuals who feel vulnerable tend to avoid using information systems.…”
Section: E Perceived Vulnerabilitymentioning
confidence: 99%
“…Most academic studies on employees' information-security compliance have focused on the individual and organizational levels (e.g. Dang-Pham and Pittayachawan, 2015;Hu et al, 2012;Hwang and Cha, 2018;Janmaimool, 2017;Putri and Hovav, 2014;Salleh et al, 2012;Siponen, 2006;Tu and Yuan, 2015). More recently, a study conducted by Johnston et al (2019) investigated this phenomenon at the group level.…”
Section: Introductionmentioning
confidence: 99%
“…"Possible reasons include the result of exposure to stimulating and authentic learning contexts, and of collaborative work in a less-threatening environment" (Freiermuth and Jarrell in Ockert 2017, p. 12). As the inherent belief to guide individual learning goal, induce learning behaviors to make continuous efforts, reinforce cognition history, and strengthen and improve the learning outcome (Salleh, Hussein, Mohamed, Karim, Ahlan, and Aditiawarman, 2012), motivation could trigger the students to "make decisions, and acquired fun and sense of achievement in the process" (Lin, Chen, and Liu, 2017, p. 3356). Skype as a digital learning platform is believed to enhance learning interests to make learning more efficient and promote learners' learning persistence (Kaklamanou, Pearce, and Nelson, 2012).…”
Section: P1 P6mentioning
confidence: 99%