Skip to main content

Advertisement

Log in

Benevolence trust: a key determinant of user continuance use of online social networks

  • Original Article
  • Published:
Information Systems and e-Business Management Aims and scope Submit manuscript

Abstract

Online social networking (OSN) has attracted increased attention and growing membership in recent years. In this paper, we propose and test an extended and unified theory of acceptance and use of technology (UTAUT) model, including the additional areas of satisfaction, credibility trust, and benevolence trust, using an empirical survey of 676 OSN users to examine the influence of these factors. The results of regression analysis showed that the four key constructs of UTAUT (social influence, performance expectancy, effort expectancy, and facilitating conditions), as well as satisfaction, credibility trust, and benevolence trust, are all direct determinants of user continuance use of OSN. By comparing the coefficients of regression analysis, the relative importance of each determinant was also demonstrated. Results further indicate that benevolence trust has a much more significant effect on user continuance use of OSN than any other factor. A discussion is offered on the implications of these findings for OSN managers with regard to marketing and operations.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1

Similar content being viewed by others

References

  • Admin (2008) Aristotle and held on trust. Available at http://docs.pureonsense.com/?p=103

  • Agarwal R, Karahanna E (2000) Time flies when you’re having fun: cognitive absorption and beliefs about information technology usage. MIS Q 24(4):665–694

    Article  Google Scholar 

  • Ajzen I, Fishbein M (1980) Understanding attitudes and predicting social behavior. Prentice Hall, Englewood Cliffs

    Google Scholar 

  • Al-Gahtani SS, Hubona GS, Wang J (2007) Information technology (IT) in Saudi Arabia: culture and the acceptance and use of IT. Inf Manage 44(8):681–691

    Article  Google Scholar 

  • Anderson JC, Gerbing DW (1988) Structural equation modeling in practice: a review and recommended two-step approach. Psychol Bull 103(3):411–423

    Article  Google Scholar 

  • Aurifeille JM, Medlin CJ (2009) Dimensions of inter-firm trust: benevolence and credibility. In: Aurifeille JM, Medlin CJ, Tisdell C (eds) Trust, globalisation and market expansion. Nova Science Publishers, New York, Ch. 2, pp 9–22

  • Awad NF, Krishnan MS (2006) The personalization privacy paradox: an empirical evaluation of information transparency and the willingness to be profiled online for personalization. MIS Q 1(30):13–28

    Google Scholar 

  • Bagozzi RP, Heatherton T (1994) A general approach to representing multifaceted personality constructs: application to state self-esteem. Struct Equ Model 1(1):35–67

    Article  Google Scholar 

  • Bhattacherjee A (2001) An empirical analysis of the antecedents of electronic commerce service continuance. Decis Support Syst 32(2):201–214

    Article  Google Scholar 

  • Borys B, Jemison D (1989) Hybrid arrangements as strategic alliances: theoretical issues in organizational combinations. Acad Manag Rev 14(2):234–249

    Google Scholar 

  • Chang YP, Zhu DH (2012) The role of perceived social capital and flow experience in building users’ continuance intention to social networking sites in China. Comput Hum Behav 28(3):995–1001

    Article  Google Scholar 

  • Chaudhuri A, Holbrook M (2001) The chain of effects from brand trust and brand effect to brand performance: the role of brand loyalty. J Mark 65(2):81–93

    Article  Google Scholar 

  • Chen YH, Barnes S (2007) Initial trust and online buyer behaviour. Ind Manage Data Syst 107(1):21–36

    Article  Google Scholar 

  • Chen Z, Huang Y, Sternquist B (2011) Guanxi practice and Chinese buyer–supplier relationships: the buyer’s perspective. Ind Mark Manage 40(4):569–580

    Article  Google Scholar 

  • Cheung W, Chang MK, Lai VS (2000) Prediction of Internet and World Wide Web usage at work: a test of an extended Triandis Model. Decis Support Syst 30(1):83–100

    Article  Google Scholar 

  • Chiu YTH, Fang SC, Tseng CC (2010) Early versus potential adopters: exploring the antecedents of use intention in the context of retail service innovations. Int J Retail Distrib Manage 38(6):443–459

    Article  Google Scholar 

  • Churchill GA, Suprenant C (1982) An investigation into the determinants of customer satisfaction. J Mark Res 19(4):491–504

    Article  Google Scholar 

  • Clinton HR (1996) It takes a village, tenth anniversary edition. Simon & Schuster, New York

    Google Scholar 

  • Coppola NW, Hiltz SR, Rotter NG (2004) Building trust in virtual teams. IEEE Trans Prof Commun 47(2):95–104

    Article  Google Scholar 

  • Coulter K, Coulter R (2002) Determinants of trust in a service provider: the moderating role of length of relationship. J Serv Mark 16(1):35–50

    Article  Google Scholar 

  • Deutsch M (1958) Trust and suspicion. J Conflict Resolut 2(4):265–279

    Article  Google Scholar 

  • Dirks KT (2000) Trust in leadership and team performance: evidence from NCCA basketball. J Appl Psychol 85(6):1004–1012

    Article  Google Scholar 

  • Fogel J, Nehmad E (2009) Internet social network communities: risk taking, trust, and privacy concerns. Comput Hum Behav 25(1):153–160

    Article  Google Scholar 

  • Foon YS, Fah BCY (2011) Internet banking adoption in Kuala Lumpur: an application of UTAUT model. Int J Bus Manage 6(4):161–167

    Google Scholar 

  • Fornell C (1992) A national customer satisfaction barometer: the Swedish experience. J Mark 56(1):6–21

    Article  Google Scholar 

  • Fornell C, Larcker DF (1981) Evaluating structural equation models with unobservable variables and measurement error. J Mark Res 18(1):39–50

    Article  Google Scholar 

  • Ganesan S (1994) Determinants of long-term orientation in buyer-seller relationships. J Mark 58(2):1–19

    Article  Google Scholar 

  • Ganesan S, Hess R (1997) Dimensions and levels of trust: implications for commitment to a relationship. Mark Lett 8(4):439–448

    Article  Google Scholar 

  • Garbarino E, Johnson M (1999) The different roles of satisfaction, trust, and commitment in customer relationships. J Mark 63(2):70–87

    Article  Google Scholar 

  • Gefen D (2002) Customer loyalty in e-commerce. J Assoc Inf Syst 3(1):27–51

    Google Scholar 

  • Gefen D, Straub DW (2004) Consumer trust in B2C e-Commerce and the importance of social presence: experiments in e-Products and e-Services. Omega 32(6):407–424

    Article  Google Scholar 

  • Gefen D, Karahanna E, Straub D (2003) Trust and TAM in online shopping: an integrated model. MIS Q 27(1):51–90

    Google Scholar 

  • Geyskens I, Steenkamp JBEM, Kumar N (1998) Generalizations about trust in marketing channel relationships using meta-analysis. Int J Res Mark 15(3):223–248

    Article  Google Scholar 

  • Grabner-Kraeuter S (2002) The role of consumers’ trust in online-shopping. J Bus Ethics 39(1–2):43–50

    Article  Google Scholar 

  • Grewal D, Iyer G, Levy M (2004) Internet retailing: enablers, limiters and market consequences. J Bus Res 57(7):703–713

    Article  Google Scholar 

  • Gupta R, Kabadayi S (2010) The relationship between trusting beliefs and web site loyalty: the moderating role of consumer motives and flow. Psychol Mark 27(2):166–185

    Article  Google Scholar 

  • Hair JF, Anderson RE, Tatham RL, Black WC (1995) Multivariate data analysis with readings. Prentice Hall, Englewood Cliffs

    Google Scholar 

  • Harris LC, Goode MMH (2004) The four levels of loyalty and the pivotal role of trust: a study of online service dynamics. J Retail 80(2):139–158

    Article  Google Scholar 

  • Hennington AH, Janz BD (2007) Information systems and healthcare XVI: physician adoption of electronic medical records: applying the UTAUT model in a healthcare context. Commun Assoc Inf Syst 19(5):60–80

    Google Scholar 

  • Jarvenpaa SL, Todd PA (1996/1997) Consumer reactions to electronic shopping on the World Wide Web. Int J Electron Comm 1(2):59–88

    Google Scholar 

  • Jarvenpaa SL, Knoll K, Leidner DE (1998) Is anybody out there? Antecedents of trust in global virtual teams. J Manage Inf Syst 14(4):29–64

    Google Scholar 

  • Jarvenpaa SL, Tractinsky N, Vitale M (2000) Consumer trust in an Internet store. Inf Technol Manage 1(1):45–71

    Article  Google Scholar 

  • Jones E, Sundaram S, Chin W (2002) Factors leading to sales force automation use: a longitudinal analysis. J Pers Sell Sales Manage 22(3):145–156

    Google Scholar 

  • Joreskog KG, Sorbom D (1996) LISREL 8: user’s reference guide, 2nd edn. Scientific Software International, Chicago, IL

    Google Scholar 

  • Jung EJ, McKnight DH, Jung E, Lankton NK (2011) The surprising lack of effect of privacy concerns on intention to use online social networks. In: Proceedings of AMCIS, Detroit, Michigan, America

  • Kim B (2011) Understanding antecedents of continuance intention in social-networking services. Cyberpsychol Behav Soc Netw 14(4):199–205

    Article  Google Scholar 

  • Krasnova H, Kolesnikova E, Gunther O (2010) Leveraging trust and privacy concerns in online social networks: an empirical study. In: Proceedings of 18th European conference on information systems, South Africa, Pretoria

  • Kumar N, Scheer LK, Steenkamp JBEM (1995) The effects of supplier fairness on vulnerable resellers. J Mark Res 32(1):54–65

    Article  Google Scholar 

  • Kumar N, Scheer LK, Steenkamp JBEM (1998) Interdependence, punitive capability, and the reciprocation of punitive actions in channel. J Mark Res 35(2):225–235

    Article  Google Scholar 

  • Larzelere RE, Huston TL (1980) The dyadic trust scale: toward understanding interpersonal trust in close relationships. J Marriage Fam 42(3):595–604

    Article  Google Scholar 

  • Liao C, Palvia P, Chen JL (2009) Information technology adoption behavior life cycle: toward a technology continuance theory (TCT). Int J Inf Manage 29(4):309–320

    Article  Google Scholar 

  • Lin HF (2006) Understanding behavioral intention to participate in virtual communities. CyberPsychol Behav 9(5):540–547

    Article  Google Scholar 

  • Lin CP, Anol B (2008) Learning online social support: an investigation of network information technology based on UTAUT. CyberPsychol Behav 11(3):268–272

    Article  Google Scholar 

  • Lin CS, Wu S, Tsai RJ (2005) Integrating perceived playfulness into expectation-confirmation model for web portal context. Inf Manage 42(5):683–693

    Article  Google Scholar 

  • Lu J, Yao JE, Yu CS (2005) Personal innovativeness, social influences and adoption of wireless Internet services via mobile technology. J Strateg Inf Syst 14(3):245–268

    Article  Google Scholar 

  • Lu Y, Zhou T, Wang B (2009) Exploring Chinese users’ acceptance of instant messaging using the theory of planned behavior, the technology acceptance model, and the flow theory. Comput Hum Behav 25(1):29–39

    Article  Google Scholar 

  • Luhmann N (1979) Trust and power. Wiley, Chichester

    Google Scholar 

  • Malhotra Y, Gelletta DF (1999) Extending the technology acceptance model to account for social influence: theoretical bases and empirical validation. In: Proceedings of the 32nd Hawaii international conference on system sciences, Maui, Hawaii, 5–8 January

  • Mayer RC, Davis JH, Schoorman FD (1995) An integrative model of organizational trust. Acad Manage Rev 20(3):709–734

    Google Scholar 

  • McKnight DH, Choudhury V, Kacmar C (2002) Developing and validating trust measures for e-Commerce: an integrative typology. Inf Syst Res 13(3):334–359

    Article  Google Scholar 

  • Moorman C, Zaltman G, Deshpande R (1992) Relationships between providers and users of market research: the dynamics of trust within and between organizations. J Mark Res 29(3):314–328

    Article  Google Scholar 

  • Morgan RM, Hunt SD (1994) The commitment-trust theory of relationship marketing. J Market 58(3):20–38

    Article  Google Scholar 

  • Nunnally JC (1978) Psychometric theory. McGraw-Hill, New York

    Google Scholar 

  • Orr ES, Sisic M, Ross C, Simmering MG, Arseneault JM, Orr RR (2009) The influence of shyness on the use of Facebook in an undergraduate sample. CyberPsychol Behav 12(3):337–340

    Article  Google Scholar 

  • Papadopoulou P (2007) Applying virtual reality for trust-building e-commerce environments. Virtual Real 11(2):107–127

    Article  Google Scholar 

  • Park Y, Chen JV (2007) Acceptance and adoption of the innovative use of smartphone. Ind Manage Data Syst 107(9):1349–1365

    Article  Google Scholar 

  • Pavlou PA (2002) Institution-based trust in interorganizational exchange relationships: the role of online B2B marketplaces on trust formation. J Strateg Inf Syst 11(3–4):215–243

    Article  Google Scholar 

  • Pavlou PA, Gefen D (2004) Building effective online marketplaces with institution-based trust. Inf Syst Res 15(1):37–59

    Article  Google Scholar 

  • Pelling EL, White KM (2009) The theory of planned behavior applied to young people’s use of social networking web sites. CyberPsychol Behav 12(6):755–759

    Article  Google Scholar 

  • Piccoli G, Ives B (2003) Trust and the unintended effects of behavior control in virtual teams. MIS Q 27(3):365–395

    Google Scholar 

  • Reichheld FF, Schefter P (2000) E-loyalty: your secret weapon on the web. Harv Bus Rev 78(4):105–113

    Google Scholar 

  • Rempel JK, Holmes JG, Zanna MP (1985) Trust in close relationships. J Pers Soc Psychol 49(1):95–112

    Article  Google Scholar 

  • Ridings CM, Gefen D, Arinze B (2002) Some antecedents and effects of trust in virtual communities. J Strateg Inf Syst 11(3&4):271–295

    Article  Google Scholar 

  • Rotter JB (1971) Generalized expectancies for interpersonal trust. Am Psychol 26(5):443–452

    Article  Google Scholar 

  • Sheng ML, Hsu CL, Wu CC (2011) The asymmetric effect of online social networking attribute-level performance. Ind Manage Data Syst 111(7):1065–1086

    Article  Google Scholar 

  • Sheppard BH, Hartwick J, Warshaw PR (1988) The theory of reasoned action: a meta-analysis of past research with recommendations for modifications and future research. J Consumer Res 15(3):325–343

    Article  Google Scholar 

  • Shih H (2004) An empirical study on predicting user acceptance of e-shopping on the Web. Inf Manage 41(3):351–368

    Article  Google Scholar 

  • Shin DH (2009) Towards an understanding of the consumer acceptance of mobile wallet. Comput Hum Behav 25(6):1343–1354

    Article  Google Scholar 

  • Sledgianowski D, Kulviwat S (2009) Using social network sites: the effects of playfulness, critical mass and trust in a hedonic context. J Comput Inf Syst 49(4):74–83

    Google Scholar 

  • Stetten AV, Wild U, Chrennikow W (2011) Adopting social network sites-the role of individual IT culture and privacy concerns. In: Proceedings of AMCIS

  • Strahilevitz M, Myers JG (1998) Donations to charity as purchase incentives: how well they work may depend on what you are trying to sell. J Consumer Res 24(4):434–446

    Article  Google Scholar 

  • Thompson RL, Higgins CA, Howell JM (1991) Personal computing: toward a conceptual model of utilization. MIS Q 15(1):125–143

    Article  Google Scholar 

  • Venkatesh V (2000) Determinants of perceived ease of use: integrating control, intrinsic motivation, and emotion into the technology acceptance model. Inf Syst Res 11(4):342–365

    Article  Google Scholar 

  • Venkatesh V, Morris MG (2000) Why don’t men ever stop to ask for directions? Gender, social influence, and their role in technology acceptance and usage behavior. MIS Q 24(1):115–139

    Article  Google Scholar 

  • Venkatesh V, Morris MG, Davis GB, Davis FD (2003) User acceptance of information technology: toward a unified view. MIS Q 27(3):425–478

    Google Scholar 

  • Wang SM, Lin JCC (2011) The effect of social influence on bloggers’ usage intention. Online Inf Rev 35(1):50–65

    Article  Google Scholar 

  • Wei TT, Marthandan G, Chong AYL, Ooi KB (2009) What drives Malaysian m-commerce adoption? An empirical analysis. Ind Manage Data Syst 109(3):370–388

    Article  Google Scholar 

  • Wu Y, Tao Y, Yang P (2007) Using UTAUT to explore the behavior of 3G mobile communication users. IEEE Int Conf Ind Eng Eng Manage 2(4):199–203

    Google Scholar 

  • Wu JJ, Chen YH, Chung YS (2010) Trust factors influencing virtual community members: a study of transaction communities. J Bus Res 63(9–10):1025–1032

    Article  Google Scholar 

  • Ximen LS, Ma GL, Liu QH (2009) The outbreak of the Internet revolution at present. China Machine Press, Beijing

    Google Scholar 

  • Yang K (2010) Determinants of US consumer mobile shopping services adoption: implications for designing mobile shopping services. J Consumer Mark 27(3):262–270

    Google Scholar 

  • Yuan X, Lee HS, Kim SY (2010) Present and future of Internet banking in China. J Internet Bank Comm 15(1):1–10

    Google Scholar 

  • Zeithaml VA, Berry LL, Parasuraman A (1996) The behavioral consequences of service quality. J Mark 60(2):31–46

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Cou-Chen Wu.

Appendix

Appendix

See Table 5.

Table 5 Measurement items

Rights and permissions

Reprints and permissions

About this article

Cite this article

Wu, CC., Huang, Y. & Hsu, CL. Benevolence trust: a key determinant of user continuance use of online social networks. Inf Syst E-Bus Manage 12, 189–211 (2014). https://doi.org/10.1007/s10257-013-0216-1

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10257-013-0216-1

Keywords

Navigation