Référence :
Ku, Y.C., Chen, R., & Zhang, H. (2013). Why do users continue using social networking sites? An exploratory study of members in the United States and Taiwan. Information & Management, 50, 571-581
Idée / dominante : L’intention des internautes de continuer à utiliser un réseau social est régie par 4 variables : la satisfaction (cf. Uses and Gratifications Theory), le degré d’utilisation et de viabilité perçu du réseau social, les normes subjectives (liées notamment à l’appartenance à un groupe), et les inquiétudes portant sur la confidentialité des données. Ce dernier élément, ainsi que la satisfaction, ont une influence différente à Taiwan et aux US.
|
|
Résumé : Les études qui ont été faites jusque maintenant peuvent être classées en deux courants : le premier faisant état des motivations pour s’inscrire sur un réseau social, à l’image de Baek et al. (2011) qui en recensent 6 raisons (le partage d’information, l’aspect pratique, le divertissement, l’utilité sociale, le contrôle et la promotion professionnelle. Le second courant vise, quant à lui, à aborder les motivations pour y rester. E.g. Shi et al. (2010) : la satisfaction de conserver des contacts « offline », le divertissement et la recherche d’informations. De fait, aucun n’a été consacré à l’étude des motivations pour rester sur un réseau social en utilisant la « Uses and Gratifications Theory »* (Blumler 1979), et les influences interpersonnelles suggérées par l’usage des réseaux sociaux. Ainsi, la recherche vise à connaître les motivations pour continuer à utiliser les réseaux sociaux, en utilisant 4 paramètres : la satisfaction, les inquiétudes liées à la confidentialité, les normes subjectives et la perception du degré d’utilisation et de viabilité du réseau observé. L’étude a été réalisée par le moyen d’un sondage soumis à un échantillon de 225 étudiants (103 aux USA et 122 à Taïwan), utilisateurs de Facebook à 91,6%. Ce sondage se présentait sous la forme d’items à évaluer via une échelle de Likert à 7 points (Pas du tout d’accord/Tout à fait d’accord).
|
Notes d’intérêt pour la recherche en cours : Etat de l’art sur les motivations pour s’inscrire sur un réseau social, définition de « Privacy concerns », utilisation de l’UGT, influence des problèmes de confidentialité sur l’utilisation des réseaux sociaux, différences de perceptions selon les régions. Concentration sur des étudiants : les plus de 22 ans ne sont pas mentionnés, ni les plus jeunes. L’étude faisant état des différences de perceptions des problèmes de confidentialité entre les Etats-Unis et Taiwan, est-ce que le développement de différentes versions des réseaux sociaux selon les régions aurait un intérêt ? Qu’est-ce qui fait le plus peur : le site lui-même ou les autres utilisateurs ?
|
Références :
Arkes, H.R., and Blumer, C. (1985). The psychology of sunk cost, Organisational Behaviour and Human Decisions Processes. 35 (1), 124–140.
Awad, N.F. and Krishnan, M.S. (2006). The personalization privacy paradox: an empirical evaluation of information transparency and the willingness to be profiled online for personalization, MIS Quarterly. 30 (1), 13–28.
Baek, K., Holton, A., Harp, D., Yaschur, C. (2011). The links that bind: uncovering novel motivations for linking on facebook, CHB, 27 (6), 2243–2248.
Baker, R.K. and White, K.M. (2010). Predicting adolescents’ use of social networking sites from an extended theory of planned behaviour perspective, CHB, 26 (6), 1591–1597.
Baron, R.M. and Kenny, D.A. (1986). The moderator–mediator variable distinction in social psychological research: conceptual, strategic, and statistical considerations, Journal of Personality and Social Psychology, 51 (6), 1173–1182.
Benbasat, I. and Barki, H. (2007). Quo vadis TAM? Journal of the Association for Information Systems, 8 (4), 211– 218.
Blumler, J.G. (1979). The role of theory in uses and gratifications studies, Commununication Research, 6 (1), 9–36.
Boyd, D.M. and Ellison, N.B. (2007). Social network sites: definition, history, and scholarship, Journal of Computer-Mediated Communication, 13 (1), 210–230.
Carte, T.A. and Russell, C.J. (2003). In pursuit of moderation: nine common errors and their solutions, MIS Quarterly, 27 (3), 479–501.
Cenfetelli, R.T., and Bassellier, G. (2009). Interpretation of formative measurement in information systems research, MIS Quarterly, 33 (4), 689–707.
Chau, P.Y.K. (2008). Cultural differences in diffusion, adoption, and infusion of web 2.0, Journal of Global Information Management, 16 (1), i–iii.
Chen, H.G., Chen, C.C., Lo, L., Yang, S.C. (2008). Online privacy control via anonymity and pseudonym: cross-cultural implications, Behavariol and Information Technology, 27 (3), 229–242.
Chen, R. (2013). Living a private life in public social networks: an exploration of member self-disclosure, Decision Support System.
Cheung, C.M.K. and Lee, M.K.O. (2010). A theoretical model of intentional social action in online social networks, Decision Support System, 49 (1), 24–30.
Chin, W.W. (1998). Issues and opinion on structural equation modeling, MIS Quarterly, 22(1), 7–16.
Chin, W.W., Marcolin, B.L., and Newsted, P.R. (2003). A partial least squares latent variable modeling approach for measuring interaction effects: results from a Monte Carlo simulation study and an electronic-mail emotion/adoption study, Information System Research, 14 (2), 189–217.
Davison, R.M., Clarke, R., Smith, H.J., Langford, D., Kuo, F.Y. (2003). Information privacy in a globally networked society: implications for IS research, Communication of the Association for Information Systems, 12, 341–365.
Debatin, B., Lovejoy, J.P., Horn, A.K. and Hughes, B.N. (2009). Facebook and online privacy: attitudes, behaviors, and unintended consequences, Journal of Computer-Mediated Communication, 15 (1), 83–108.
Dinev, T., Bellotto, M., Hart, P., Russo, V., Serra, I. and Colautti, C. (2006). Privacy calculus model in e-commerce—a study of Italy and the United States, European Journal of Information Systems, 15 (4), 389–402.
Fogel, J. and Nehmad, E. (2009). Internet social network communities: risk taking, trust, and privacy concerns, Computers in Human Behavior, 25 (1), 153–160.
Gefen, D. and Straub, D.W. (1997). Gender differences in the perception and use of e-mail: an extension to the technology acceptance model, MIS Quarterly, 21 (4), 389–400.
Geisser, S. (2010). The predictive sample reuse method with applications, Journal of the American Satistical Assocation, 70 (350), 320–328.
Hoadley, C.M., Xu, H., Lee, J.J., and Rosson, M.B. (2010). Privacy as information access and illusory control: the case of the facebook news feed privacy outcry, Electronic Commerce Research and Applications, 9 (1), 50–60.
Hsu, C.L. and Wu, C.C. (2011). Understanding users’ continuance of facebook: an integrated model with the unified theory of acceptance and use of technology, expectation disconfirmation model, and flow theory, International Journal of Virtual Communication and Social Network, 3 (2), 1–16.
Hu, T., Poston, R.S. and Kettinger, W.J. (2011). Non-adopters of online social network services: is it easy to have fun yet? Communication of the Association for the Information System. 29, 441–458.
Jackson, L.A., and Wang, J.L. (2013). Cultural differences in social networking site use: a comparative study of China and the United States, Computers in Human Behaviour, 29 (3), 910–921.
Kim, B. (2011). Understanding antecedents of continuance intention in social-networkingservices, Cyberpsychogy, Behavior, and Social Networking, 14(4), 199–205.
Kim, Y., Sohn, D. and Choi, S.M. (2011). Cultural difference in motivations for using social network sites: a comparative study of American and Korean college students, Computers in Human Behavior,27 (1), 365–372.
Ku, Y.C., Chu, T.H. and Tseng, C.H. Gratifications for using CMC technologies: acomparison among SNS, IM, and e-mail, Computers in Human Behavior, 29 (1), 226–234.
Leung, L. (2001). College student motives for chatting on ICQ, New Media and Society, 3(4), 483–500.
Li, D., Browne, G.J. and Wetherbe, J. (2006). Why do internet users stick with a specific website? A relationship perspective, International Journal of Electronic Commerce, 10 (4), 105–141.
Li, D., Chau, P.Y.K. and Slyke, C.V. (2010). A comparative study of individual acceptance of instant messaging in the US and China: a structural equation modeling approach, Communication of the Association for Information System. 26, 85–106.
Liu, C., Marchewka, J.T., Lu, J. and Yu, C.S. (2005). Beyond concern—a privacy–trust–behavioral intention model of electronic commerce, Information Management. 42 (2), 289–304.
Lo, O.W.Y., Leung, L. (2009). Effects of gratification-opportunities and gratifications-obtained on preferences of instant messaging and e-mail among college students,Telematics and Informatics. 26 (2), 156–166.
Lou, H., Luo, W. and Strong, D. Perceived critical mass effect on group ware acceptance, European Journal of Information Systems, 9 (2), 91–103.
Luo, X., Gurung, A. and Shim, J.P. (2010). Understanding the determinants of user acceptance ofenterprise instant messaging: an empirical study, Journal of Organizational Computing and Electronic Commerce, 20 (2), 155–181.
Pavlou, P.A. (2011). State of the information privacy literature: where are we now andwhere should we go?, MIS Quarterly, 35 (4), 977–988.
Phang, C.W., Kankanhalli, A. and Sabherwal, R. (2009). Usability and sociability in online communities: a comparative study of knowledge seeking and contribution, Journal of theAssociation for Information Systems. 10 (10), 721–747.
Podsakoff, P.M., MacKenzie, S.B., Lee, J.Y. and Podsakoff, N.P. (2003). Common method biases inbehavioral research: a critical review of the literature and recommended remedies, Journal of Applied Psychology, 88 (5), 879–903.
Posey, C., Lowry, P.B., Roberts, T.L. and Ellis, T.S. Proposing the online community self-disclosure model: the case of working professionals in France and the UK who useonline communities, European Journal of Information Systems, 19 (2), 181–195.
Quan-Haase, A., Young, A.L. (2010). Uses and gratifications of social media: a compar- ison of facebook and instant messaging, Bulletin of Science, Society and Technology, 30 (5), 350–361.
Raacke, J. and Bonds-Raacke, J. (2008). Myspace and facebook: applying the uses and gratifications theory to exploring friend-networking sites, CyberPsycholy and Behavior, 11 (2), 169–174.
Rouibah, K., Abbas, H. and Rouibah, S. (2011). Factors affecting camera mobile phone adoption before e-shopping in the Arab world, Technology in Society, 33 (3–4), 271–283.
Rubin, A.M. (1983). Television uses and gratifications: the interactions of viewing patterns and motivations, Journal of Broadcasting and Electronic Media, 27 (1), 37–51.
Ruggiero, T.E. (2000). Uses and gratifications theory in the 21st century, Mass Communication and Society, 3 (1), 3–37.
Sledgianowski, D. and Kulviwat, S. (2009). Using social network sites: the effects of playful- ness, critical mass and trust in a hedonic context, Journal of Computer Information Systems, 49 (4), 74–83.
Smock, A.D., Ellison, N.B., Lampe, C. and Wohn, D.Y. (2011). Facebook as a toolkit: a uses and gratification approach to unbundling feature use, Computers in Human Behavior, 27 (6), 2322– 2329.
Stafford, T.F. Stafford, M.R. Schkade, L.L. (2004). Determining uses and gratifications for the Internet, Decision Sciences, 35 (2), 259–288.
Stewart, K.A. and Segars, A.H. (2002). An empirical examination of the concern for information privacy instrument, Information Systems Research, 13 (1), 36–49.
Stone, M. (1974). Cross-validatory choice and assessment of statistical predictions, Journals of the Royal Statistical Society, 36 (2), 111–147.
Tenenhaus, M., Vinzi, V.E. Chatelin, Y.M. and Lauro, C. (2005). PLS path modeling, Computational Statistics and Data Analysis. 48 (1), 159–205.
Trammell, K.D., Tarkowski, A., Hofmokl, J., and Sapp, A.M. Rzeczpospolita blogo ́ [republic of blog]: examining polish bloggers through content analysis, Journal of Computer-Mediated Communication, 11 (3), 702–722.
van de Schoot, R., Lugtig, P. and Hox, J. (2012). A checklist for testing measurement invariance, European Journal of Develomental Psychology, 9 (4), 486–492.
Van Slyke, C., Ilie, V., Lou, H. and Stafford, T. (2007). Perceived critical mass and the adoption of a communication technology, European Journal of Information Systems, 16 (3), 270–283.
Vathanophas, V., Krittayaphongphun, N. and Klomsiri, C. (2008). Technology acceptance toward e-government initiative in royal Thai navy, Transforming Government : People, Process and Policy, 2 (4), 256–282.
Xu, C., Ryan, S., Prybutok, V. and Wen, C. (2012). It is not for fun: an examination of social network site usage, Information Management. 49 (5), 210–217.
Yang, H.L., Chiu, H.K. (2002). Privacy disclosures of web sites in Taiwan, Journal of Information Technology and Theory Application, 4 (3), 15–42.