Skip to main content
Log in

Exploring the Security of Information Sharing on Social Networking Sites: The Role of Perceived Control of Information

  • Published:
Journal of Business Ethics Aims and scope Submit manuscript

Abstract

Social networking sites (SNS) have challenged ethical issues about users’ information security and privacy. SNS users are concerned about their privacy and need to control the information they share and its use. This paper examines the security of SNS by taking a look at the influence of users’ perceived control of information over their information-sharing behaviors. Employing an empirical study, this paper demonstrates the importance of perceived control in SNS users’ information-sharing behaviors. Specifically, perceived control has been found to be negatively related to perceived privacy risk and attitude toward information sharing, which in turn has an impact on their information-sharing behaviors. In addition, gender has been shown to be an important factor that moderates the influences of both perceived control and perceived privacy risk on SNS users’ attitudes toward information sharing. Theoretical and practical implications are discussed.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2

Similar content being viewed by others

References

  • Ahuja, M. K., & Thatcher, J. B. (2005). Moving beyond intentions and toward the theory of trying: Effects of work environment and gender on post-adoption information technology use. MIS Quarterly, 29, 427–459.

    Google Scholar 

  • Ajzen, I. (1991). The theory of planned behavior. Organizational Behavior and Human Decision Processes, 50, 179–211.

    Article  Google Scholar 

  • Ajzen, I. (2001). Nature and operation of attitudes. Annual Review of Psychology, 52, 27–58.

    Article  Google Scholar 

  • AJZEN, I. 2002. Attitudes. In R. Fernandez Ballesteros (Ed.), Encyclopedia of psychological assessment. London: Sage Publications, 1:110-115

  • Arnold, V., Benford, T., Hampton, C., & Sutton, S. G. (2010). Competing pressures of risk and absorptive capacity potential on commitment and information sharing in global supply chains. European Journal of Information Systems, 19, 134–152.

    Article  Google Scholar 

  • Averill, J. R. (1973). Personal control over aversive stimuli and its relationship to stress. Psychological Bulletin, 80, 286.

    Article  Google Scholar 

  • Bandura, A. (1982). Self-efficacy mechanism in human agency. American Psychologist, 37, 122.

    Article  Google Scholar 

  • Bandura, A. (1997). Self-efficacy: The exercise of control. New York: Freeman.

    Google Scholar 

  • Barnes, SB. (2006). A privacy paradox: Social networking in the United States. First Monday, 11

  • Baronas, A.-M. K., & Louis, M. R. (1988). Restoring a sense of control during implementation: how user involvement leads to system acceptance. Mis Quarterly, 12, 111–124.

    Article  Google Scholar 

  • Bélanger, F., & Crossler, R. E. (2011). Privacy in the digital age: a review of information privacy research in information systems. MIS Quarterly, 35, 1017–1042.

    Google Scholar 

  • Belanger, F., Hiller, J. S., & Smith, W. J. (2002). Trustworthiness in electronic commerce: The role of privacy, security, and site attributes. The Journal of Strategic Information Systems, 11, 245–270.

    Article  Google Scholar 

  • Berings, D., & Adriaenssens, S. (2012). The role of business ethics, personality, work values and gender in vocational interests from adolescents. Journal of Business Ethics, 106, 325–335.

    Article  Google Scholar 

  • Betz, M., O’Connell, L., & Shepard, J. M. (1989). Gender differences in proclivity for unethical behavior. Journal of Business Ethics, 8, 321–324.

    Article  Google Scholar 

  • Bugental, D., Blue, J., & Cruzcosa, M. (1989). Perceived control over caregiving outcomes: Implications for child abuse. Developmental Psychology, 25, 532–539.

    Article  Google Scholar 

  • Burger, J. M. (1989). Negative reactions to increases in perceived personal control. Journal of Personality and Social Psychology, 56, 246.

    Article  Google Scholar 

  • Chai, S., Das, S., & Rao, H. R. (2011). Factors affecting bloggers’ knowledge sharing: An investigation across gender. Journal of Management Information Systems, 28, 309–342.

    Article  Google Scholar 

  • Chiu, C.-M., Hsu, M.-H., & Wang, E. T. (2006). Understanding knowledge sharing in virtual communities: an integration of social capital and social cognitive theories. Decision Support Systems, 42, 1872–1888.

    Article  Google Scholar 

  • Connell, J. P. (1985). A new multidimensional measure of children’s perceptions of control. Child Development, 56, 1018–1041.

    Article  Google Scholar 

  • D’arcy, J., & Hovav, A. (2009). Does one size fit all? Examining the differential effects of IS security countermeasures. Journal of Business Ethics, 89, 59–71.

    Article  Google Scholar 

  • Davenport, T. H., & Pruzak, L. (2000). Working knowledge: How organizations manage what they know. New York: Harvard Business Press.

    Google Scholar 

  • Davidson, D. J., & Freudenburg, W. R. (1996). Gender and environmental risk concerns a review and analysis of available research. Environment and behavior, 28, 302–339.

    Article  Google Scholar 

  • Dinev, T., & Hart, P. (2006). An extended privacy calculus model for e-commerce transactions. Information Systems Research, 17, 61–80.

    Article  Google Scholar 

  • Dwyer, C., Hiltz, SR. & Passerini, K. Trust and privacy concern within social networking sites: A comparison of facebook and mySpace. AMCIS, 2007. p. 339

  • Dwyer, P. D., Gilkeson, J. H., & List, J. A. (2002). Gender differences in revealed risk taking: evidence from mutual fund investors. Economics Letters, 76, 151–158.

    Article  Google Scholar 

  • Fishbein, M. (1963). An investigation of the relationship between beliefs about an object and the attitude toward that object. Human relations, 16, 233–240.

    Article  Google Scholar 

  • Fishbein, M., & AJZEN, I. (1975). Belief, attitude, intention and behavior: An introduction to theory and research

  • Folkman, S. (1984). Personal control and stress and coping processes: A theoretical analysis. Journal of Personality and Social Psychology, 46, 839–852.

    Article  Google Scholar 

  • Fornell, C., & Larcker, D. F. (1981). Evaluating structural equation models with unobservable variables and measurement error. Journal of Marketing Research, 18, 39–50.

    Article  Google Scholar 

  • Garbarino, E., & Strahilevitz, M. (2004). Gender differences in the perceived risk of buying online and the effects of receiving a site recommendation. Journal of Business Research, 57, 768–775.

    Article  Google Scholar 

  • Govani, T., & Pashley, H. (2005). Student awareness of the privacy implications when using Facebook. Unpublished paper presented at the “Privacy Poster Fair” at the Carnegie Mellon University School of Library and Information Science, 9.

  • Gustafsod, P. E. (1998). Gender differences in risk perception: Theoretical and methodological erspectives. Risk Analysis, 18, 805–811.

    Article  Google Scholar 

  • Hair, J. R. F., Black, W., Babin, B., Anderson, R., & Tatham, R. (2006). Multivariate data analysis. Upper Saddle River: Pearson.

    Google Scholar 

  • Hajli, M. N. (2014a). The role of social support on relationship quality and social commerce. Technological Forecasting and Social Change, 87, 17–27.

    Article  Google Scholar 

  • Hajli, N. (2014b). Developing online health communities through digital media. International Journal of Information Management, 34, 311–314.

    Article  Google Scholar 

  • Hajli, N. (2014c). A study of the impact of social media on consumers. International Journal of Market Research, 56, 95–113.

    Article  Google Scholar 

  • Hajli, N., Lin, X., Featherman, M., & Wang, Y. (2014). Social word of mouth: How trust develops in the market. International Journal of Market Research, 56, 1–30.

    Article  Google Scholar 

  • Harman, H. H. (1976). Modern factor analysis. Chicago: University of Chicago Press.

    Google Scholar 

  • Hoadley, C. M., Xu, H., Lee, J. J., & Rosson, M. B. (2010). Privacy as information access and illusory control: The case of the Facebook news feed privacy outcry. Electronic Commerce Research and Applications, 9, 50–60.

    Article  Google Scholar 

  • Hsu, M.-H., & Chiu, C.-M. (2004). Predicting electronic service continuance with a decomposed theory of planned behaviour. Behaviour & Information Technology, 23, 359–373.

    Article  Google Scholar 

  • Hsu, M.-H., Ju, T. L., Yen, C.-H., & Chang, C.-M. (2007). Knowledge sharing behavior in virtual communities: The relationship between trust, self-efficacy, and outcome expectations. International Journal of Human-Computer Studies, 65, 153–169.

    Article  Google Scholar 

  • Hsu, C.-L., & Lin, J. C.-C. (2008). Acceptance of blog usage: The roles of technology acceptance, social influence and knowledge sharing motivation. Information & Management, 45, 65–74.

    Article  Google Scholar 

  • Kamis, A., Koufaris, M., & Stern, T. (2008). Using an attribute-based decision support system for user-customized products online: An experimental investigation. MIS Quarterly, 32, 159–177.

    Google Scholar 

  • Keil, M., Tan, BC., Wei, K.-K., Saarinen, T., Tuunainen, V. & Wassenaar, A. (2000). A cross-cultural study on escalation of commitment behavior in software projects. Mis Quarterly, 299–325.

  • Krasnova, H., Spiekermann, S., Koroleva, K., & Hildebrand, T. (2010). Online social networks: Why we disclose. Journal of Information Technology, 25, 109–125.

    Article  Google Scholar 

  • Langer, E. J. (1975). The illusion of control. Journal of Personality and Social Psychology, 32, 311.

    Article  Google Scholar 

  • Lee, J. (2012). Components of Medical Service Users’ Dissatisfaction: A Perceived Control Perspective. International Journal of Management and Marketing Research, 5, 53–63.

    Google Scholar 

  • Lee, J.-N., & Kim, Y.-G. (1999). Effect of partnership quality on IS outsourcing success: Conceptual framework and empirical validation. Journal of Management Information Systems, 15, 29–61.

    Article  Google Scholar 

  • Lin, X., Featherman, M., & Brooks, SL. (2013a). Factors affecting online consumer’s behavior: An investigation across gender. AMCIS 2013 Proceedings

  • Lin, X., Li, Y., Califf, CB., & Featherman, M. Can social role theory explain gender differences in facebook usage? System sciences (HICSS), 2013 46th Hawaii International Conference on, 2013b. IEEE, 690–699

  • Liu, Y., Gummadi, KP., Krishnamurthy, B., & Mislove, A. (2011). Analyzing facebook privacy settings: user expectations vs. reality. Proceedings of the 2011 ACM SIGCOMM Conference on Internet Measurement Conference, ACM, 61–70

  • Malhotra, N. K., Kim, S. S., & Agarwal, J. (2004). Internet users’ information privacy concerns (IUIPC): the construct, the scale, and a causal model. Information Systems Research, 15, 336–355.

    Article  Google Scholar 

  • Miranda, S. M., & Saunders, C. S. (2003). The social construction of meaning: An alternative perspective on information sharing. Information Systems Research, 14, 87–106.

    Article  Google Scholar 

  • Pavlou, P. A., & Fygenson, M. (2006). Understanding and predicting electronic commerce adoption: An extension of the theory of planned behavior. Mis Quarterly, 30, 115–143.

    Google Scholar 

  • Pavlou, P. A., Liang, H., & Xue, Y. (2007). Understanding and mitigating uncertainty in online exchange relationships: A principal-agent perspective. MIS Quarterly, 31, 105–136.

    Google Scholar 

  • Perry, R. P., Hladkyj, S., Pekrun, R. H., & Pelletier, S. T. (2001). Academic control and action control in the achievement of college students: A longitudinal field study. Journal of Educational Psychology, 93, 776–789.

    Article  Google Scholar 

  • Powell, M., & Ansic, D. (1997). Gender differences in risk behaviour in financial decision-making: An experimental analysis. Journal of Economic Psychology, 18, 605–628.

    Article  Google Scholar 

  • Qureshi, I., & Compeau, D. (2009). Assessing between-group differences in information systems research: A comparison of covariance-and component-based SEM. MIS Quarterly, 33, 197–214.

    Google Scholar 

  • Roman, S. (2007). The ethics of online retailing: a scale development and validation from the consumers’ perspective. Journal of Business Ethics, 72, 131–148.

    Article  Google Scholar 

  • Rotter, J. (1966). Generalized expectancies for internal vs. external control of reinforcement. Psychological Monographs, 80, 1–28.

    Article  Google Scholar 

  • Schulz, R., & Heckhausen, J. (1996). A lifespan model of successful aging. American Psychologist, 51, 702–714.

    Article  Google Scholar 

  • Scott, B. G., & Weems, C. F. (2010). Patterns of actual and perceived control: are control profiles differentially related to internalizing and externalizing problems in youth? Anxiety, Stress, & Coping, 23, 515–528.

    Article  Google Scholar 

  • Seligman, M. E. (1975). Helplessness: On depression, development, and death. London: WH Freeman/Times Books/Henry Holt & Co.

    Google Scholar 

  • Skinner, E. A. (1996). A guide to constructs of control. Journal of Personality and Social Psychology, 71, 549.

    Article  Google Scholar 

  • Skinner, E., Chapman, M., & Baltes, P. (1988). Control, means-ends, and agency beliefs: A new conceptualization and its measurement during childhood. Journal of Personality and Social Psychology, 54, 113–117.

    Article  Google Scholar 

  • Specht, J., Schmukle, S. C., & Egloff, B. (2013). Everything Under Control? The Effects of Age, Gender, and Education on Trajectories of Perceived Control in a Nationally Representative German Sample. Developmental Psychology, 49, 353–364.

    Article  Google Scholar 

  • Thompson, S., Sobolew-Shubin, A., Galbraith, M., Schwankovsky, L., & Cruzen, D. (1993). Maintaining perceptions of control: Finding perceived control in low-control circumstances. Journal of Personality and Social Psychology, 64, 293–304.

    Article  Google Scholar 

  • van Slyke, C., Shim, J., Johnson, R., & Jiang, J. (2006). Concern for information privacy and online consumer purchasing. Journal of the Association for Information Systems, 7, 415–444.

    Google Scholar 

  • Venkatesh, V., & Morris, M. G. (2000). Why don’t men ever stop to ask for directions? Gender, social influence, and their role in technology acceptance and usage behavior. Mis Quarterly, 24, 115–139.

    Article  Google Scholar 

  • Venkatesh, V., Thong, J., & Xu, X. (2012). Consumer acceptance and use of information technology: Extending the unified theory of acceptance and use of technology. MIS Quarterly, 36, 157–178.

    Google Scholar 

  • Wallhagen, M. (1992). Perceived control and adaptation in elder caregivers: Development of an explanatory model. International Journal of Aging and Human Development, 36, 219–237.

    Article  Google Scholar 

  • Wallston, K. A., Wallston, K. A., & Devellis, R. (1978). Development of the multidimensional health locus of control scales. Health Education Monographs, 6, 161–170.

    Google Scholar 

  • Weisz, J. R., & Stipek, D. J. (1982). Competence, contingency, and the development of perceived control. Human Development, 25, 250–281.

    Article  Google Scholar 

  • Westin, A. F. (1968). Privacy and freedom. Washington and Lee Law Review, 25, 166.

    Google Scholar 

  • Xu, H., Dinev, T., Smith, H. J., & Hart, P. (2008). Examining the formation of individual’s privacy concerns: Toward an integrative view

  • Xu, H. The Effects of Self-Construal and Perceived Control on Privacy Concerns. ICIS, 2007. Citeseer, 125

  • Xu, H., & Teo, H.-H. (2004). Alleviating Consumers’ Privacy Concerns in Location-based Services: A Psychological Control Perspective. ICIS, 793–806

  • Xu, H., Teo, H.-H., Tan, B. C., & Agarwal, R. (2012). Research note—effects of individual self-protection, industry self-regulation, and government regulation on privacy concerns: A study of location-based services. Information Systems Research, 23, 1342–1363.

    Article  Google Scholar 

  • Acquisti, A., & Gross, R. (2006) Imagined communities: Awareness, information sharing, and privacy on the Facebook. Privacy Enhancing Technologies, Springer, 36–58

  • Yin, G., & Cheng, X. (2011). & ZHU, L. A Theoretical Model and Empirical Study of the Chinese Context: Understanding continuance usage of social networking services.

    Google Scholar 

  • Zhang, K. Z., Lee, M. K., Cheung, C. M., & Chen, H. (2009). Understanding the role of gender in bloggers’ switching behavior. Decision Support Systems, 47, 540–546.

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Nick Hajli.

Appendix

Appendix

See appendix Table 6.

Table 6 Cross loadings for measurement indicators

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Hajli, N., Lin, X. Exploring the Security of Information Sharing on Social Networking Sites: The Role of Perceived Control of Information. J Bus Ethics 133, 111–123 (2016). https://doi.org/10.1007/s10551-014-2346-x

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10551-014-2346-x

Keywords

Navigation