2017
DOI: 10.17705/1cais.04010
|View full text |Cite
|
Sign up to set email alerts
|

The Role of User Psychological Contracts in the Sustainability of Social Networks.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(2 citation statements)
references
References 102 publications
(167 reference statements)
0
2
0
Order By: Relevance
“…Analysis of the literature highlighted in Figure 3 suggested that several psychological factors affect consumers’ responses towards mobile app usage. Information sharing risk (Keith et al , 2013; Wang et al , 2016; Chen et al , 2017; Mamonov et al , 2017), beliefs (Menard and Bott, 2020), privacy risk (Wang et al , 2016; Ozturk et al , 2017), self-efficacy (Lee and Rha, 2016; Crossler and Bélanger, 2019), technology readiness (Lee and Rha, 2016; Crossler and Bélanger, 2019) and personality traits (Cottrill and Vonu Thakuriah, 2015; Pentina et al , 2016; Chen et al , 2017) are crucial factors that enhance consumers’ privacy concern over the smartphone.…”
Section: Findings and Discussionmentioning
confidence: 99%
“…Analysis of the literature highlighted in Figure 3 suggested that several psychological factors affect consumers’ responses towards mobile app usage. Information sharing risk (Keith et al , 2013; Wang et al , 2016; Chen et al , 2017; Mamonov et al , 2017), beliefs (Menard and Bott, 2020), privacy risk (Wang et al , 2016; Ozturk et al , 2017), self-efficacy (Lee and Rha, 2016; Crossler and Bélanger, 2019), technology readiness (Lee and Rha, 2016; Crossler and Bélanger, 2019) and personality traits (Cottrill and Vonu Thakuriah, 2015; Pentina et al , 2016; Chen et al , 2017) are crucial factors that enhance consumers’ privacy concern over the smartphone.…”
Section: Findings and Discussionmentioning
confidence: 99%
“…However, thus far, researchers have examined whistle-blowing in relation to financial fraud. Even though IS researchers consider user information an asset as valuable as financial information (Posey, Roberts, Lowry, Bennett, & Courtney, 2013;Posey et al, 2015) and expect people to whistle-blow confidentiality breaches (Guo & Yu, 2019;Mamonov, Koufaris, & Benbunan-Fich, 2017;Padayachee, 2016;Posey et al, 2015;Tim, Pan, Bahri, & Fauzi, 2017;van Offenbeek, Boonstra, & Seo, 2017;Zhang & Leidner, 2018), they have not yet tested whether whistle-blowing applies to confidentiality breaches. We do not know whether whistle-blowing applies to confidentiality breaches because these breaches result in less obvious damage to organizations and even to victims; as such, employees may not consider reporting it necessary.…”
Section: Introductionmentioning
confidence: 99%