ABSTRACT
We develop and validate a multi-item measure for perceived relationship boundary regulation and show how it significantly drives adoption and use of four social media platforms: Facebook, Instagram, Twitter, and LinkedIn. We further show how this perception is tied to one's communication style.
- Irwin Altman. 1975. The Environment and Social Behavior. Brooks/Cole Publishing Co., Monterey, CA.Google Scholar
- Yair Amichai-Hamburger and Gideon Vinitzky. 2010. Social network use and personality. Computers in Human Behavior 26, 6: 1289--1295. Google ScholarDigital Library
- Monica Anderson and Jingjing Jiang. 2018. Teens, Social Media & Technology 2018. Pew Research Center.Google Scholar
- Tamar Ashuri, Shira Dvir-Gvisman, and Ruth Halperin. 2018. Watching me watching you: How observational learning affects self-disclosure on social network sites? Journal of Computer-Mediated Communication 23, 1: 34--68.Google ScholarCross Ref
- Lemi Baruh, Ekin Secinti, and Zeynep Cemalcilar. 2017. Online privacy concerns and privacy management: A meta-analytical review. Journal of Communication 67, 1: 26--53.Google ScholarCross Ref
- P. M. Bentler and Chih-Ping Chou. 1987. Practical issues in structural modeling. Sociological Methods & Research 16, 1: 78--117.Google ScholarCross Ref
- Tom Buchanan, Carina Paine, Adam N. Joinson, and Ulf-Dietrich Reips. 2007. Development of measures of online privacy concern and Protection for use on the internet. Journal of the American Society for Information Science & Technology 58, 2: 157--165. Google ScholarDigital Library
- Burgoon et al. 1989. Maintaining and restoring privacy through communication in different types of relationships. Journal of Social and Personal Relationships 6, 2: 131--158.Google ScholarCross Ref
- Moira Burke, Robert Kraut, and Cameron Marlow. 2011. Social capital on Facebook: Differentiating uses and users. Proc. CHI 2011, 571--580. Google ScholarDigital Library
- Teresa Correa, Amber Willard Hinsley, and Homero Gil de Zúñiga. 2010. Who interacts on the web? Computers in Human Behavior 26, 2: 247--253. Google ScholarDigital Library
- Shaun W. Davenport, Shawn M. Bergman, Jacqueline Z. Bergman, and Matthew E. Fearrington. 2014. Twitter versus Facebook: Exploring the role of narcissism in the motives and usage of different social media platforms. Computers in Human Behavior 32, Supplement C: 212--220.Google ScholarCross Ref
- Tobias Dienlin and Sabine Trepte. 2015. Is the privacy paradox a relic of the past? European Journal of Social Psychology 45, 3: 285--297.Google ScholarCross Ref
- Maeve Duggan, Nicole B. Ellison, Cliff Lampe, Amanda Lenhart, and Mary Madden. 2015. Social Media Update 2014. Pew Research Center.Google Scholar
- Nicole B. Ellison, Jessica Vitak, Charles Steinfield, Rebecca Gray, and Cliff Lampe. 2011. Negotiating privacy concerns and social capital needs in a social media environment. In Privacy Online: Perspectives on Privacy and Self-Disclosure in the Social Web, Sabine Trepte and Leonard Reinecke (eds.). Springer, Berlin/Heidelberg, 19--32.Google Scholar
- Nina Gerber, Paul Gerber, and Melanie Volkamer. 2018. Explaining the privacy paradox: A systematic review of literature investigating privacy attitude and behavior. Computers & Security 77: 226--261.Google ScholarDigital Library
- Li-tze Hu and Peter M. Bentler. 1999. Cutoff criteria for fit indexes in covariance structure analysis. Structural Equation Modeling: A Multidisciplinary Journal 6, 1: 1--55.Google ScholarCross Ref
- Haiyan Jia and Heng Xu. 2016. Autonomous and interdependent: Collaborative privacy management on social networking sites. Proc. CHI 2016, 4286--4297. Google ScholarDigital Library
- Yolanda Jordaan and Gené Van Heerden. 2017. Online privacy-related predictors of Facebook usage intensity. Computers in Human Behavior 70, Supplement C: 90--96. Google ScholarDigital Library
- R.B. Kline. 2004. Principles and Practice of Structural Equation Modeling. New York, NY, USA: The Guilford Press.Google Scholar
- Ksenia Koroleva, Hanna Krasnova, Natasha Veltri, and Oliver Günther. 2011. It's all about networking! Empirical investigation of social capital formation on social network sites. Proc. ICIS 2011.Google Scholar
- Maurice Kuegler, Stefan Smolnik, and Gerald Kane. 2015. What's in IT for employees? The Journal of Strategic Information Systems 24, 2: 90--112. Google ScholarDigital Library
- Airi Lampinen, Vilma Lehtinen, Asko Lehmuskallio, and Sakari Tamminen. 2011. We're in it Together. Proc. CHI '11, 3217--3226. Google ScholarDigital Library
- Robert S. Laufer and Maxine Wolfe. 1977. Privacy as a concept and a social issue: A multidimensional developmental theory. Journal of Social Issues 33, 3: 22--42.Google ScholarCross Ref
- Mark Leary. 1996. Self-presentation: Impression Management and Interpersonal Behavior. Westview Press, Madison, WI.Google Scholar
- Ana Levordashka and Sonja Utz. 2016. Ambient awareness: From random noise to digital closeness in online social networks. Computers in Human Behavior 60: 147--154. Google ScholarDigital Library
- Christian Licoppe. 2004. 'Connected' presence: The emergence of a new repertoire for managing social relationships in a changing communication technoscape. Environment and Planning D: Society and Space 22, 1: 135--156.Google ScholarCross Ref
- Mary Madden, Amanda Lenhart, Sandra Cortesi, Urs Gasser, Maeve Duggan, and Aaron Smith. 2013. Teens, Social Media, and Privacy. Pew Research Center.Google Scholar
- Naresh K. Malhotra, Sung S. Kim, and James Agarwal. 2004. Internet Users' Information Privacy Concerns (IUIPC). Info. Sys. Research 15, 4: 336--355. Google ScholarDigital Library
- Alice Marwick and danah boyd. 2011. To see and be seen: Celebrity practice on Twitter. Convergence 17, 2: 139--158.Google ScholarCross Ref
- Robert R. McCrae and Paul T. Costa Jr. 1985. Comparison of EPI and psychoticism scales with measures of the five-factor model of personality. Personality and Individual Differences 6, 5: 587--597.Google ScholarCross Ref
- James C. McCroskey. 1992. Reliability and validity of the willingness to communicate scale. Communication Quarterly 40, 1: 16--25.Google ScholarCross Ref
- Ashwini Nadkarni and Stefan G. Hofmann. 2012. Why do people use Facebook? Personality and Individual Differences 52, 3: 243--249.Google ScholarCross Ref
- Helen Nissenbaum. 2009. Privacy in context: Technology, policy, and the integrity of social life. Stanford University Press, Stanford, CA. Google ScholarDigital Library
- Xinru Page, Bart P. Knijnenburg, and Alfred Kobsa. 2013. FYI: communication style preferences underlie differences in location-sharing adoption and usage. Proc. UbiComp 2013. Google ScholarDigital Library
- Xinru Page, Alfred Kobsa, and Bart P. Knijnenburg. 2012. Don't disturb my circles! boundary preservation is at the center of location-sharing concerns. Proc. ICWSM 2012.Google Scholar
- Xinru Page, Karen Tang, Fred Stutzman, and Airi Lampinen. 2013. Measuring networked social privacy. Proc. CSCW 2013, 315--320. Google ScholarDigital Library
- Leysia Palen and Paul Dourish. 2003. Unpacking "privacy" for a networked world. Proc. CHI 2003, 129--136. Google ScholarDigital Library
- Sandra Petronio. 1991. Communication boundary management: A theoretical model of managing disclosure of private information between marital couples. Communication Theory 1, 4: 311--335.Google ScholarCross Ref
- Sandra Petronio. 2010. Communication privacy management theory: What do we know about family privacy regulation? Journal of Family Theory & Review 2, 3: 175--196.Google ScholarCross Ref
- Virginia P. Richmond, James C. Mccroskey, and Leonard M. Davis. 1982. Individual differences among employees, management communication style, and employee satisfaction: replication and extension. Human Communication Research 8, 2: 170--188.Google ScholarCross Ref
- Meredith M. Skeels and Jonathan Grudin. 2009. When social networks cross boundaries. Proc. GROUP 2009, 95--104. Google ScholarDigital Library
- Deb Sledgianowski and Songpol Kulviwat. 2008. Social network sites: Antecedents of User Adoption and Usage. Proc. AMCIS 2008Google Scholar
- Aaron Smith and Monica Anderson. 2018. Social Media Use in 2018. Pew Research Center.Google Scholar
- H. Jeff Smith, Sandra J Milberg, and Sandra J Burke. 1996. Information privacy: Measuring individuals' concerns about organizational practices. MIS Quarterly 20, 2: 167--196. Google ScholarDigital Library
- Daniel J Solove. 2008. Understanding Privacy. Harvard University Press, Cambridge, MA.Google Scholar
- Frederic Stutzman and Woodrow Hartzog. 2012. Boundary regulation in social media. Proc. CSCW 2012, 769--778. Google ScholarDigital Library
- J. S. Tanaka. 1987. "How big is big enough?" Child Development 58, 1: 134--146.Google ScholarCross Ref
- Janice Y. Tsai, Patrick Kelley, Lorrie Faith Cranor, and Norman Sadeh. 2010. Location-sharing technologies: Privacy risks and controls. I/S: A Journal of Law and Policy for the Information Society 6, 1: 119--151.Google Scholar
- Jessica Vitak. 2012. The impact of context collapse and privacy on social network site disclosures. Journal of Broadcasting & Electronic Media 56, 4: 451--470.Google ScholarCross Ref
- Jessica Vitak and Jinyoung Kim. 2014. "You can't block people offline": Examining how Facebook's affordances shape the disclosure process. Proc CSCW '14, 461--474. Google ScholarDigital Library
- Alan Westin. 1991. Harris-Equifax Consumer Privacy Survey. Equifax Inc, Atlanta, GA.Google Scholar
- Pamela Wisniewski, A. K. M. Islam, Heather Richter Lipford, and David Wilson. 2016. Framing and measuring multi-dimensional interpersonal privacy preferences of social networking site users. Communications of the Association for Information Systems 38, 1.Google ScholarCross Ref
- Pamela Wisniewski, A. K. M. Najmul Islam, Bart P. Knijnenburg, and Sameer Patil. 2015. Give social network users the privacy they want. Proc CSCW 2015, 1427--1441. Google ScholarDigital Library
- Pamela J. Wisniewski, Bart P. Knijnenburg, and Heather Richter Lipford. 2017. Making privacy personal: Profiling social network users to inform privacy education and nudging. International Journal of Human-Computer Studies 98: 95--108. Google ScholarDigital Library
- Alyson Leigh Young and Anabel Quan-Haase. 2013. Privacy protection strategies on Facebook. Information, Communication & Society 16, 4: 479--500.Google ScholarCross Ref
- Nan Zhang, Chong Wang, and Yan Xu. 2011. Privacy in online social networks. Proc. ICIS 2011Google Scholar
- Izzal Asnira Zolkepli and Yusniza Kamarulzaman. 2015. Social media adoption: The role of media needs and innovation characteristics. Computers in Human Behavior 43, Supplement C: 189--209. Google ScholarDigital Library
Index Terms
- How Communication Style Shapes Relationship Boundary Regulation and Social Media Adoption
Recommendations
Social media adoption
Media uses and gratifications, together with innovation characteristics merge to form a model of social media adoption.Personal, social and tension release needs drive social media adoption.Social media innovation characteristics enhance the likelihood ...
E-WOM from e-commerce websites and social media
We discussed how consumers choose eWOM from E-commerce websites and social media.EC-eWOM usefulness and credibility negatively influence the adoption of SM-eWOM.EC-eWOM adoption negatively impacts SM-eWOM adoption.EC-eWOM adoption mediates the ...
Perceived usefulness, ease of use and risk in Social Media Adoption within Workspace: An Empirical Study Integrating Assessment of Unobserved Heterogeneity in PLS Path Modeling
ICEC '14: Proceedings of the Sixteenth International Conference on Electronic CommerceThis paper investigates the role of perceived usefulness (PU), perceived ease of use (PEOU) and perceived risk (PR) in social media adoption and use within workspace. The proposed model is tested using data collected from 2,556 social media users at ...
Comments