Abstract
Social Network Sites (SNSs) such as Facebook have been gaining momentum and attracting a large number of users. Boyd and Ellison (2007, p. 211) define them as “web-based services that allow individuals to (1) construct a public or semi-public profile within a bounded system, (2) articulate a list of other users with whom they share a connection [regularly referred to as SNS-friends], and (3) view and traverse their list of connections and those made by others within the system”.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Bibliography
Alarcón-Del-Amo, M.-D.-C., Lorenzo-Romero, C. and Gómez-Borja, M.-A. (2012): Analysis of acceptance of social networking sites. African Journal of Business Management, 6 (29), pp. 8609–8619.
Backstrom, L., Bakshy, E., Kleinberg, J., Lento, T. and Rosenn, I. (2011): Center of attention: How facebook users allocate attention across friends. ICWSM 2011 Proceedings.
Baumeister, R.F. and Leary, M.R. (1995): The need to belong: Desire for interpersonal attachements as a fundamental human motivation. Psychological Bulletin, 117 (3), pp. 497–529.
Benevenuto, F., Rodrigues, T., Cha, M. and Almeida, V. (2009): Characterizing user behavior in online social networks. IMC 2009 Proceedings.
Berkman, L.F. and Syme, S.L. (1978): Social networks, host resistance, and mortality: A nine-year follow-up study of alameda county residents. American Journal of Epidemiology, 109 (2), pp. 186–204.
Bonds-Raacke, J. and Raacke, J. (2010): Myspace and facebook: Identifying dimensions of uses and gratifications for friend networking sites. Individual Differences Research, 8 (1), pp. 27–33.
Boyd, D.M. and Ellison, N.B. (2007): Social network sites: Definition, history, and scholarship. Journal of Computer-Mediated Communication, 13 (1), pp. 210–230.
Bulgurcu, B., Cavusoglu, H. and Benbasat, I. (2010): Understanding emergence and outcomes of information privacy concerns: A case of facebook. ICIS 2010 Proceedings. Paper 230.
Cavusoglu, H., Phan, T. and Cavusoglu, H. (2013): Privacy controls and content sharing patterns of online social network users: A natural experiment. ICIS 2013 Proceedings.
Chen, R. (2013): Member use of social networking sites – an empirical examination. Decision Support Systems, 54 (3), pp. 1219–1227.
Cohen, S. and Wills, T.A. (1985): Stress, social support, and the buffering hypothesis. Psychological Bulletin, 98 (2), pp. 310–357.
Davis, F.D. (1989): Perceived usefulness, perceived ease of use, and user acceptance of information technology. MIS Quarterly, 13 (2), pp. 319–340.
Davis, F.D., Bagozzi, R.P. and Warshaw, P.R. (1989): User acceptance of computer technology: A comparison of two theoretical models. Management Science, 35 (8), pp. 982–1003.
Dinev, T. and Hart, P. (2006): An extended privacy calculus model for e-commerce transactions. Information Systems Research, 17 (1), pp. 61–80.
Dowling, G.R. and Staelin, R. (1994): A model of perceived risk and intended riskhandling activity. Journal of Consumer Research, 21 (1), pp. 119–134.
Featherman, M. (2001): Extending the technology acceptance model by inclusion of perceived risk. AMCIS 2001 Proceedings. Paper 148.
Featherman, M.S. and Pavlou, P.A. (2003): Predicting e-services adoption: A perceived risk facets perspective. International Journal of Human-Computer Studies, 59 (4), pp. 451–474.
Gangadharbatla, H. (2008): Facebook me: Collective self-esteem, need to belong, and internet self-efficacy as predictors of the igeneration's attitudes toward social networking sites. Journal of Interactive Advertising, 8 (2), pp. 5–15.
Hu, T., Poston, R.S. and Kettinger, W.J. (2011): Nonadopters of online social network services: Is it easy to have fun yet? Communications of the Association for Information Systems, 29 (1), pp. 441–458.
Jiang, J., Wilson, C., Wang, X., Huang, P., Sha, W., Dai, Y. and Zhao, B. (2010): Understanding latent interactions in online social networks. IMC 2010 Proceedings. pp. 369–382.
John, O.P. and Srivastava, S. (1999): The big five trait taxonomy: History, measurement, and theoretical perspectives. In: Pervin, L. A. & John, O. P. (eds.) Handbook of personality: Theory and research. 2nd ed., New York, NY: Guilford Press, pp. 102–138.
Katz, M.L. and Shapiro, C. (1985): Network externalities, competition, and compatibility. The American Economic Review, 75 (3), pp. 424–440.
Killworth, P., Johnsen, E., Bernard, H., Shelley, G. and Mccarty, C. (1990): Estimating the size of personal networks. Social Networks, 12 (4), pp. 289–312.
Kim, D.J., Ferrin, D.L. and Rao, H.R. (2008): A trust-based consumer decisionmaking model in electronic commerce: The role of trust, perceived risk, and their antecedents. Decision Support Systems, 44 (2), pp. 544–564.
Krasnova, H., Spiekermann, S., Koroleva, K. and Hildebrand, T. (2010b): Online social networks: Why we disclose. Journal of Information Technology, 25 (2), pp. 109–125.
Laveist, T.A., Sellers, R.M., Elliot Brown, K.A. and Nickerson, K.J. (1997): Extreme social isolation, use of community-based senior support services, and mortality among african american elderly women. American Journal of Community Psychology, 25 (5), pp. 721–732.
Lo, J. (2010): Privacy concern, locus of control, and salience in a trust-risk model of information disclosure on social networking sites. AMCIS 2010 Proceedings. Paper 110.
Maddux, J. and Rogers, R. (1983): Protection motivation and self-efficacy: A revised theory of fear appeals and attitude change. Journal of Experimental Social Psychology, 19 (5), pp. 469–479.
Maslow, A.H. (1943): A theory of human motivation. Psychological Review, 50 (4), pp. 370–396.
Peter, J.P. and Ryan, M.J. (1976): An investigation of perceived risk at the brand level. Journal of Marketing Research, 13 (2), pp. 184–188.
Raacke, J. and Bonds-Raacke, J. (2008): Myspace and facebook: Applying the uses and gratifications theory to exploring friend-networking sites. CyberPsychology & Behavior, 11 (2), pp. 169–174.
Renner, B. (2006): Curiosity about people: The development of a social curiosity measure in adults. Journal of Personality Assessment, 83 (3), pp. 305–316. Ringle, C.M., Wende, S. and Will, A. (2005): SmartPLS 2.0 (beta). http://www.smartpls.de.
Rogers, R. (1975): A protection motivation theory of fear appeals and attitude change. The Journal of Psychology: Interdisciplinary and Applied, 91 (1), pp. 93–114.
Rogers, R. (1983): Cognitive and physiological processes in fear appeals and attitude change: A revised theory of protection motivation. In: Cacioppo, J. & Petty, R. (eds.) Social psychophysiology: A sourcebook. New York, NY: Guilford Press, pp. 153–176.
Rook, K.S. (1984): The negative side of social interactions: Impact on psychological well-being. Journal of Personality and Social Psychology, 46 (5), pp. 1097–1108.
Sheldon, K.M., Abad, N. and Hinsch, C. (2011): A two-process view of facebook use and relatedness need-satisfaction: Disconnection drives use, and connection rewards it. Journal of Personality and Social Psychology, 100 (4), pp. 766–775.
Sledgianowski, D. and Kulviwat, S. (2008): Social network sites: Antecedents of user adoption and usage. AMCIS 2008 Proceedings. Paper 83.
Son, J.-Y. and Kim, S.S. (2008): Internet users’ information privacy-protective responses: A taxonomy and a nomological model. MIS Quarterly, 32 (3), pp. 503–529.
Straub, D., Limayem, M. and Karahanna-Evaristo, E. (1995): Measuring system usage: Implications for is theory testing. Management Science, 41 (8), pp. 1328–1342.
Subrahmanyam, K., Reich, S.M., Waechter, M. and Espinoza, G. (2008): Online and offline social networks: Use of social networking sites by emerging adults. Journal of Applied Developmental Psychology 29 (6), pp. 420–433.
Thambusamy, R., Church, M., Nemati, H. and Barrick, J. (2010): Socially exchanging privacy for pleasure: Hedonic use of computer-mediated social networks. ICIS 2010 Proceedings. Paper 253.
Van Der Heijden, H. (2004): User acceptance of hedonic information systems. MIS Quarterly, 28 (4), pp. 695–704.
Venkatesh, V. (2000): Determinants of perceived ease of use: Integrating perceived behavioral control, computer anxiety and enjoyment into the technology acceptance model. Information Systems Research, 11 (4), pp. 342–365.
Von Stetten, A., Wild, U. and Chrennikow, W. (2011): Adopting social network sites – the role of individual it culture and privacy concerns. AMCIS 2011 Proceedings. Paper 290.
Watson, G.B. and Johnson, D. (1972): Social psychology; issues and insights. 2nd ed., Philadelphia, PA: Lippincott.
Westin, A.F. (1968): Privacy and freedom. New York, NY: Atheneum.
Wu, Y.A., Ryan, S. and Windsor, J. (2009): Influence of social context and affect on individuals' implementation of information security safeguards. ICIS 2009 Proceedings. Paper 70.
Yüksel, A. and Yüksel, F. (2007): Shopping risk perceptions: Effects on tourists’ emotions, satisfaction and expressed loyalty intentions. Tourism Management, 28 (3), pp. 703–713.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
Copyright information
© 2015 Springer Fachmedien Wiesbaden
About this chapter
Cite this chapter
Ernst, CP. (2015). Introduction. In: Factors Driving Social Network Site Usage. Springer Gabler, Wiesbaden. https://doi.org/10.1007/978-3-658-09918-3_1
Download citation
DOI: https://doi.org/10.1007/978-3-658-09918-3_1
Published:
Publisher Name: Springer Gabler, Wiesbaden
Print ISBN: 978-3-658-09917-6
Online ISBN: 978-3-658-09918-3
eBook Packages: Business and EconomicsBusiness and Management (R0)