Skip to main content

Introduction

  • Chapter
  • First Online:
Factors Driving Social Network Site Usage
  • 853 Accesses

Abstract

Social Network Sites (SNSs) such as Facebook have been gaining momentum and attracting a large number of users. Boyd and Ellison (2007, p. 211) define them as “web-based services that allow individuals to (1) construct a public or semi-public profile within a bounded system, (2) articulate a list of other users with whom they share a connection [regularly referred to as SNS-friends], and (3) view and traverse their list of connections and those made by others within the system”.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Bibliography

  • Alarcón-Del-Amo, M.-D.-C., Lorenzo-Romero, C. and Gómez-Borja, M.-A. (2012): Analysis of acceptance of social networking sites. African Journal of Business Management, 6 (29), pp. 8609–8619.

    Google Scholar 

  • Backstrom, L., Bakshy, E., Kleinberg, J., Lento, T. and Rosenn, I. (2011): Center of attention: How facebook users allocate attention across friends. ICWSM 2011 Proceedings.

    Google Scholar 

  • Baumeister, R.F. and Leary, M.R. (1995): The need to belong: Desire for interpersonal attachements as a fundamental human motivation. Psychological Bulletin, 117 (3), pp. 497–529.

    Article  Google Scholar 

  • Benevenuto, F., Rodrigues, T., Cha, M. and Almeida, V. (2009): Characterizing user behavior in online social networks. IMC 2009 Proceedings.

    Google Scholar 

  • Berkman, L.F. and Syme, S.L. (1978): Social networks, host resistance, and mortality: A nine-year follow-up study of alameda county residents. American Journal of Epidemiology, 109 (2), pp. 186–204.

    Google Scholar 

  • Bonds-Raacke, J. and Raacke, J. (2010): Myspace and facebook: Identifying dimensions of uses and gratifications for friend networking sites. Individual Differences Research, 8 (1), pp. 27–33.

    Google Scholar 

  • Boyd, D.M. and Ellison, N.B. (2007): Social network sites: Definition, history, and scholarship. Journal of Computer-Mediated Communication, 13 (1), pp. 210–230.

    Article  Google Scholar 

  • Bulgurcu, B., Cavusoglu, H. and Benbasat, I. (2010): Understanding emergence and outcomes of information privacy concerns: A case of facebook. ICIS 2010 Proceedings. Paper 230.

    Google Scholar 

  • Cavusoglu, H., Phan, T. and Cavusoglu, H. (2013): Privacy controls and content sharing patterns of online social network users: A natural experiment. ICIS 2013 Proceedings.

    Google Scholar 

  • Chen, R. (2013): Member use of social networking sites – an empirical examination. Decision Support Systems, 54 (3), pp. 1219–1227.

    Article  Google Scholar 

  • Cohen, S. and Wills, T.A. (1985): Stress, social support, and the buffering hypothesis. Psychological Bulletin, 98 (2), pp. 310–357.

    Article  Google Scholar 

  • Davis, F.D. (1989): Perceived usefulness, perceived ease of use, and user acceptance of information technology. MIS Quarterly, 13 (2), pp. 319–340.

    Article  Google Scholar 

  • Davis, F.D., Bagozzi, R.P. and Warshaw, P.R. (1989): User acceptance of computer technology: A comparison of two theoretical models. Management Science, 35 (8), pp. 982–1003.

    Article  Google Scholar 

  • Dinev, T. and Hart, P. (2006): An extended privacy calculus model for e-commerce transactions. Information Systems Research, 17 (1), pp. 61–80.

    Article  Google Scholar 

  • Dowling, G.R. and Staelin, R. (1994): A model of perceived risk and intended riskhandling activity. Journal of Consumer Research, 21 (1), pp. 119–134.

    Article  Google Scholar 

  • Featherman, M. (2001): Extending the technology acceptance model by inclusion of perceived risk. AMCIS 2001 Proceedings. Paper 148.

    Google Scholar 

  • Featherman, M.S. and Pavlou, P.A. (2003): Predicting e-services adoption: A perceived risk facets perspective. International Journal of Human-Computer Studies, 59 (4), pp. 451–474.

    Article  Google Scholar 

  • Gangadharbatla, H. (2008): Facebook me: Collective self-esteem, need to belong, and internet self-efficacy as predictors of the igeneration's attitudes toward social networking sites. Journal of Interactive Advertising, 8 (2), pp. 5–15.

    Article  Google Scholar 

  • Hu, T., Poston, R.S. and Kettinger, W.J. (2011): Nonadopters of online social network services: Is it easy to have fun yet? Communications of the Association for Information Systems, 29 (1), pp. 441–458.

    Google Scholar 

  • Jiang, J., Wilson, C., Wang, X., Huang, P., Sha, W., Dai, Y. and Zhao, B. (2010): Understanding latent interactions in online social networks. IMC 2010 Proceedings. pp. 369–382.

    Google Scholar 

  • John, O.P. and Srivastava, S. (1999): The big five trait taxonomy: History, measurement, and theoretical perspectives. In: Pervin, L. A. & John, O. P. (eds.) Handbook of personality: Theory and research. 2nd ed., New York, NY: Guilford Press, pp. 102–138.

    Google Scholar 

  • Katz, M.L. and Shapiro, C. (1985): Network externalities, competition, and compatibility. The American Economic Review, 75 (3), pp. 424–440.

    Google Scholar 

  • Killworth, P., Johnsen, E., Bernard, H., Shelley, G. and Mccarty, C. (1990): Estimating the size of personal networks. Social Networks, 12 (4), pp. 289–312.

    Article  Google Scholar 

  • Kim, D.J., Ferrin, D.L. and Rao, H.R. (2008): A trust-based consumer decisionmaking model in electronic commerce: The role of trust, perceived risk, and their antecedents. Decision Support Systems, 44 (2), pp. 544–564.

    Article  Google Scholar 

  • Krasnova, H., Spiekermann, S., Koroleva, K. and Hildebrand, T. (2010b): Online social networks: Why we disclose. Journal of Information Technology, 25 (2), pp. 109–125.

    Article  Google Scholar 

  • Laveist, T.A., Sellers, R.M., Elliot Brown, K.A. and Nickerson, K.J. (1997): Extreme social isolation, use of community-based senior support services, and mortality among african american elderly women. American Journal of Community Psychology, 25 (5), pp. 721–732.

    Article  Google Scholar 

  • Lo, J. (2010): Privacy concern, locus of control, and salience in a trust-risk model of information disclosure on social networking sites. AMCIS 2010 Proceedings. Paper 110.

    Google Scholar 

  • Maddux, J. and Rogers, R. (1983): Protection motivation and self-efficacy: A revised theory of fear appeals and attitude change. Journal of Experimental Social Psychology, 19 (5), pp. 469–479.

    Article  Google Scholar 

  • Maslow, A.H. (1943): A theory of human motivation. Psychological Review, 50 (4), pp. 370–396.

    Article  Google Scholar 

  • Peter, J.P. and Ryan, M.J. (1976): An investigation of perceived risk at the brand level. Journal of Marketing Research, 13 (2), pp. 184–188.

    Article  Google Scholar 

  • Raacke, J. and Bonds-Raacke, J. (2008): Myspace and facebook: Applying the uses and gratifications theory to exploring friend-networking sites. CyberPsychology & Behavior, 11 (2), pp. 169–174.

    Article  Google Scholar 

  • Renner, B. (2006): Curiosity about people: The development of a social curiosity measure in adults. Journal of Personality Assessment, 83 (3), pp. 305–316. Ringle, C.M., Wende, S. and Will, A. (2005): SmartPLS 2.0 (beta). http://www.smartpls.de.

  • Rogers, R. (1975): A protection motivation theory of fear appeals and attitude change. The Journal of Psychology: Interdisciplinary and Applied, 91 (1), pp. 93–114.

    Article  Google Scholar 

  • Rogers, R. (1983): Cognitive and physiological processes in fear appeals and attitude change: A revised theory of protection motivation. In: Cacioppo, J. & Petty, R. (eds.) Social psychophysiology: A sourcebook. New York, NY: Guilford Press, pp. 153–176.

    Google Scholar 

  • Rook, K.S. (1984): The negative side of social interactions: Impact on psychological well-being. Journal of Personality and Social Psychology, 46 (5), pp. 1097–1108.

    Article  Google Scholar 

  • Sheldon, K.M., Abad, N. and Hinsch, C. (2011): A two-process view of facebook use and relatedness need-satisfaction: Disconnection drives use, and connection rewards it. Journal of Personality and Social Psychology, 100 (4), pp. 766–775.

    Article  Google Scholar 

  • Sledgianowski, D. and Kulviwat, S. (2008): Social network sites: Antecedents of user adoption and usage. AMCIS 2008 Proceedings. Paper 83.

    Google Scholar 

  • Son, J.-Y. and Kim, S.S. (2008): Internet users’ information privacy-protective responses: A taxonomy and a nomological model. MIS Quarterly, 32 (3), pp. 503–529.

    Google Scholar 

  • Straub, D., Limayem, M. and Karahanna-Evaristo, E. (1995): Measuring system usage: Implications for is theory testing. Management Science, 41 (8), pp. 1328–1342.

    Article  Google Scholar 

  • Subrahmanyam, K., Reich, S.M., Waechter, M. and Espinoza, G. (2008): Online and offline social networks: Use of social networking sites by emerging adults. Journal of Applied Developmental Psychology 29 (6), pp. 420–433.

    Article  Google Scholar 

  • Thambusamy, R., Church, M., Nemati, H. and Barrick, J. (2010): Socially exchanging privacy for pleasure: Hedonic use of computer-mediated social networks. ICIS 2010 Proceedings. Paper 253.

    Google Scholar 

  • Van Der Heijden, H. (2004): User acceptance of hedonic information systems. MIS Quarterly, 28 (4), pp. 695–704.

    Google Scholar 

  • Venkatesh, V. (2000): Determinants of perceived ease of use: Integrating perceived behavioral control, computer anxiety and enjoyment into the technology acceptance model. Information Systems Research, 11 (4), pp. 342–365.

    Article  Google Scholar 

  • Von Stetten, A., Wild, U. and Chrennikow, W. (2011): Adopting social network sites – the role of individual it culture and privacy concerns. AMCIS 2011 Proceedings. Paper 290.

    Google Scholar 

  • Watson, G.B. and Johnson, D. (1972): Social psychology; issues and insights. 2nd ed., Philadelphia, PA: Lippincott.

    Google Scholar 

  • Westin, A.F. (1968): Privacy and freedom. New York, NY: Atheneum.

    Google Scholar 

  • Wu, Y.A., Ryan, S. and Windsor, J. (2009): Influence of social context and affect on individuals' implementation of information security safeguards. ICIS 2009 Proceedings. Paper 70.

    Google Scholar 

  • Yüksel, A. and Yüksel, F. (2007): Shopping risk perceptions: Effects on tourists’ emotions, satisfaction and expressed loyalty intentions. Tourism Management, 28 (3), pp. 703–713.

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Claus-Peter H. Ernst .

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer Fachmedien Wiesbaden

About this chapter

Cite this chapter

Ernst, CP. (2015). Introduction. In: Factors Driving Social Network Site Usage. Springer Gabler, Wiesbaden. https://doi.org/10.1007/978-3-658-09918-3_1

Download citation

Publish with us

Policies and ethics