Beruflich Dokumente
Kultur Dokumente
I.
SEM
INTRODUCTION
c
978-1-4673-4529-3/12/$31.00 2012
IEEE
465
notification
III.
THEORETICAL BACKGROUND
A. Proposed hypothesis
The proposed hypothesis aims to find impact of privacy,
security, and trust on the willingness to share information in
social networking site. According to proposed hypothesis;
perceived security, perceived privacy and perceived trust are
the factors that influence users willingness to share
information in social networking sites. Thus the proposed
hypotheses are summarized in Table I.
The constructs used in our hypothesized model are defined
in Table II.
TABLE I.
RESEARCH HYPOTHESIS
H#
H1
Hypothesis
Perceived security is positively related to perceived trust with in
social networking sites.
H2
H3
466
H4
H5
TABLE II.
CONSTRUCT DEFINITIONS
Construct
Perceived privacy
Definition
Extent to which an individual have
control over his information flow
and protection of his profile privacy.
An individual belief in the ability of
social networking site that revealing
information and performing any task
is risk free.
An individual belief that using social
networking site over Internet is risk
free.
An individual belief that they will
continue to share information over
social networking site with regard to
privacy concerns.
Perceived trust
Perceived security
Information sharing
IV.
A. Data collection
Data were collected by conducting an online customized
questionnaire survey of Facebook user's, to test proposed
research framework. The survey was conducted from July 2012
to October 2012 for the time period of 4 months. To maximize
the response rate, we had utilized the search engines and
emails. Likert-type scale was selected as the most appropriate
measure for this study. All items of proposed research
framework were measured on a five-point likert scale ranging
from strongly disagree (1) to agree (5). Pilot survey was
used for validating the proposed framework before the final
analysis.
B. Tools and methods
Reliability analysis was performed by using SPSS 19.0.
Cronbachs alpha () provides a measure of the internal
consistency of a test or scale, was used to test the internal
consistency of the questionnaire. SEM structural equation
modelling) technique is used to detect relationship among
constructs. SEM model was performed by using AMOS 19.0.
V.
RESULTS
Items
Male
Female
16-25 years
26-35 years
36-50 years
Intermediate
Graduate
postgraduate
Student
Govt. Sector
Private Sector
Professional
Age
Educational
Qualification
Occupation
TABLE IV.
DEMOGRAPHICS OF RESPONDENTS
Frequencies
189
56
194
40
8
23
119
100
165
43
14
18
Percentage
77.1%
22.9%
79.2%
16.3%
3.3%
9.4%
48.6%
40.0%
67.3%
17.6%
5.7%
7.3%
Construct
Perceived privacy
Perceived security
Perceived trust
Information sharing
No. of items
4
4
4
5
Cronbach's alpha
82.6
78.5
72.5
73.6
A. Profile of respondents
Online questionnaire was distributed through emails and
search engines. A total of 265 respondents were collected over
the time period of 4 month, out of which 246 were usable for
TABLE V.
Fit Indices
X2
df (degree of freedom)
X2/df
Goodness of fit index (GFI)
3
0.90
Measurement model
361.239
113
3.1
0.942
467
0.90
0.90
0.08
0.889
0.91
0.076
Hypothesis
H1:Perceived Security perceived Trust
H2:Perceived Privacy Perceived Trust
H3:Perceived Security Information Sharing
H4:Perceived Privacy Information Sharing
H5:Perceived Trust Information Sharing
468
VI.
Path coefficient
P-value
Support
0.25**
0.51**
0.22**
0.04
0.25**
0.000
0.000
0.000
0.500
0.000
Yes
Yes
Yes
No
Yes
[3]
[4]
[5]
[6]
[7]
[8]
[9]
[10] D. Shin, The effects of trust, security and privacy in social networking:
A security-based approach to understand the pattern of adoption,
Interacting with Computers, vol. 22, no. 5, pp. 428438, 2010.
[11] I. Ajzen, The theory of planned behavior, Organizational behavior and
human decision processes, vol. 50, no. 2, pp. 179 211, 1991.
[12] N. M. Almadhoun, P. D. D. Dominic, and L. F. Woon, Perceived
security, privacy, and trust concerns within social networking sites: The
role of information sharing and relationships development in the
malaysian higher education institutions marketing, in ICCSCE, pp.
426431, 2011.
[13] C. Dwyer, S. R. Hiltz, and K. Passerini, Trust and privacy concern
within social networking sites: A comparison of facebook and
myspace, in AMCIS, p. 339, 2007.
[14] R. Goettke and J. Christiana, Privacy and online social networking
websites, Computer Science 199r: Special Topics in Computer Science
Computation and Society: Privacy and Technology, 2007.
[15] T. Govani and H. Pashley, Student awareness of the privacy
implications when using facebook, unpublished paper presented at the
AIJPrivacy Poster FairAI at the Carnegie Mellon University School
of Library and Information Science, vol. 9, 2005.
[16] D. Shin, The effects of trust, security and privacy in social networking:
A security-based approach to understand the pattern of adoption,
Interacting with Computers, vol. 22, no. 5, pp. 428438, 2010.
[17] SPSS for Windows step by step: A simple guide and reference.
[18] T. Dinev and P. Hart, An extended privacy calculus model for ecommerce transactions, Information Systems Research, vol. 17, no. 1,
pp. 6180, 2006.
[19] D. Iacobucci", "structural equations modeling: Fit indices, sample size,
and advanced topics", "Journal of Consumer Psychology", vol. "20",
no. "1", pp. "90 98", "2010".
[20] J. Scott, The measurement of information systems effectiveness:
evaluating a measuring instrument, ACM SIGMIS Database, vol. 26,
no. 1, pp. 4361, 1995.
[21] R. Bagozzi and Y. Yi, On the evaluation of structural equation
models, Journal of the academy of marketing science, vol. 16, no. 1, pp.
7494, 1988.
469