Factors Influencing the Continuance Use of Mobile Social Media:The Effect of Privacy Concerns

Authors

  • Kwame Simpe Ofori SMC University, Switzerland
  • Eli Fianu Ghana Technology University College, Ghana
  • Otu Larbi-Siaw SMC University, Switzerland and Ghana Technology University College, Ghana
  • Richard Eddie Gladjah Ho Polytechnic, Ghana
  • Ezer Osei Yeboah Boateng Ghana Technology University College, Ghana

DOI:

https://doi.org/10.13052/2245-1439.426

Keywords:

Mobile Social Media Network, Privacy Concerns, Perceived Risk, Continuance Use

Abstract

With over 800 million active Whatsapp users, Mobile Social Networks (MSNs) have become one of the most vital means of social interactions, such as forming relationships and sharing information, sharing personal experiences. The mass adoption of MSN raises concerns about privacy and the risk of losing one’s personal information due to personal data shared online. This paper sought to examine the role of Privacy Concerns in the continuance use of Mobile Social Media. The Effects of factors such as Perceived Ease of Use, Perceived Usefulness and Perceived Risk and Perceived Enjoyments on Satisfaction and Continuance intention were also explored. Survey data was collected from 262 students in Ghana Technology University College and analysed using the Partial Least Square approach to Structural Equation Modelling with the use of SmartPLS software. Results from the analysis showed that Perceived Usefulness, Perceived Risk and Perceived Enjoyment were significant predictors of Satisfaction. Satisfaction in turn was found to be a significant predictor of Continuance Intention. Satisfaction also mediated the paths between Perceived Risk, Privacy Concern and Continuance Intention. The results are discussed and practical implications drawn.

 

Downloads

Download data is not yet available.

Author Biographies

Kwame Simpe Ofori, SMC University, Switzerland

K. S. Ofori is a doctoral student at SMC University, Switzerland. He holds a Master of Science degree in Telecommunications Technology and a Postgraduate diploma in Business Administration. He is currently a lecturer in Information Security, Reliability Engineering and Data Communications. His research interests include PLS path modelling and technology adoption. Kwame can be reached at: kwamesimpe@gmail.com

Eli Fianu, Ghana Technology University College, Ghana

E. Fianu is a faculty member in the Informatics Faculty of Ghana Technology University College (GTUC). His areas of lecturing are Database Systems, Systems Analysis and Design, Computer applications for Management, and E-Commerce. Prior to joining GTUC, he worked with Vodafone Ghana for 11 years as a Customer Experience, Sales and Service Provisioning Manager. He holds a Master of Science degree in Management Information Systems from Coventry University, and a Bachelor of Science Degree in Agricultural Economics from the University of Ghana. His research interests include Artificial Neural Networks, Technology Adoption, and e-Learning. Eli can be reached at: efianu@gmail.com

Otu Larbi-Siaw, SMC University, Switzerland and Ghana Technology University College, Ghana

O. Larbi-Siaw is a rigorous problem solver, with a passion for designing systematic decision making systems. He is the Head of Department for Economics at Ghana Technology University College. His research interest is in the area of macroeconomics, innovation economics, game theory, artificial intelligence, digital analytics and finance. He is currently a PhD student at Swiss Management Center (SMC). Otu can be reached at: oLarbi-Siaw@gtuc.edu.gh

Richard Eddie Gladjah, Ho Polytechnic, Ghana

R. E. Gladjah is a lecturer in the Department of Mathematics and Statistics, Ho Polytechnic, Ghana. He had his first degree in Statistics and Economics from the University of Ghana and a Master of Science in Statistics from Regent University College of Science and Technology. He has seventeen years of teaching experience in Statistics and Computer Applications and specializes in Time Series, Multivariate and Categorical Data Analyses. His research interests include technology adoption and time series analysis. Eddie can be reached at: e1684@yahoo.com

Ezer Osei Yeboah Boateng, Ghana Technology University College, Ghana

E. O. Yeboah-Boateng is a senior lecturer and the Head (acting Dean), Faculty of Informatics, at the Ghana Technology University College (GTUC), in Accra. Ezer is a Telecoms Engineer and an ICT Specialist; an executive with over 20 years of corporate experience and about 8 years in academia. He has over 10 peer-reviewed international journal papers to his credit. His research focuses on cyber-security vulnerabilities, digital forensics, cyber-crime, cloud computing, Big data and fuzzy systems. He can be reached at: eyeboah-boateng@gtuc.edu.gh

References

Ajzen, I.,&Fishbein, M. (1980). Understanding attitudes and predicting social behavior. Englewood Cliffs NY Prentice Hall

Akhter, S. H. (2014). Privacy concern and online transactions: The impact of internet self-efficacy and internet involvement. Journal of Consumer Marketing, 31(2), 118–125. http://doi.org/10.1108/JCM-06- 2013-0606

Arpaci, I., Kilicer, K., & Bardakci, S. (2015). Effects of security and privacy concerns on educational use of cloud services. Computers in Human Behavior, 45, 93–98. http://doi.org/10.1016/j.chb.2014.11.075

Bansal, G., Zahedi, F. “Mariam,” & Gefen, D. (2010). The impact of personal dispositions on information sensitivity, privacy concern and trust in disclosing health information online. Decision Support Systems, 49(2), 138–150. http://doi.org/10.1016/j.dss.2010.01.010

Bhattacherjee, A. (2001). Understanding information system continuance: An Expectation confirmation model. MIS Quarterly, 25(3), 351–370.

Burke, R. R. (1997). Do You See What I See? The Future of Virtual Shopping. Journal of the Academy of Marketing Science, 25(4), 352–360. http://doi.org/10.1177/0092070397254007

Casaló, L. V., Flavián, C., & Guinalíu, M. (2007). The role of security, privacy, usability and reputation in the development of online banking. Online Information Review, 31(5), 583–603. http://doi.org/10.1108/14684520710832315

Cheng, Y. (2012). Effects of quality antecedents on e-learning acceptance. Internet Research, 22(3), 361–390. http://doi.org/10.1108/10662241211235699

Culnan, M. J., & Bies, R. J. (2003). Consumer Privacy: Balancing Economic and Justice Considerations. Journal of Social Issues, 59(2), 323–342. http://doi.org/10.1111/1540-4560.00067

Davis, F. D. (1989). Perceived usefulness, perceived ease of use, and user acceptance of information technology. MIS Quarterly, 13(3), 319–340. http://doi.org/10.2307/249008

Gao, L., & Bai, X. (2014). An empirical study on continuance intention of mobile social networking services. Asia Pacific Journal of Marketing and Logistics, 26(2), 168–189. http://doi.org/10.1108/APJML-07-2013-0086

Gao, L., Waechter, K. A., & Bai, X. (2015). Understanding consumers’ continuance intention towards mobile purchase: Atheoretical framework and empirical study – A case of China. Computers in Human Behavior, 53, 249–262. http://doi.org/10.1016/j.chb.2015.07.014

Gashami, J. P. G., Chang, Y., Rho, J. J., & Park, M.-C. (2015). Privacy concerns and benefits in SaaS adoption by individual users: A trade-off approach. Information Development, (5). http://doi.org/10.1177/0266666915571428

Hair, J. F. J., Hult,G.T. M., Ringle, C.,&Sarstedt, M. (2014).APrimer on Partial Least Squares Structural Equation Modeling (PLS-SEM). Thousand Oaks: Sage Publications. http://doi.org/10.1016/j.lrp.2013.01.002

Jongchul, O., & Sung-Joon, Y. (2014). Validation of Haptic Enabling Technology Acceptance Model (HE-TAM): Integration of IDT and TAM. Telematics and Informatics, 31(4), 585–596. http://doi.org/10.1016/j.tele.2014.01.002

Kim, B. (2011). Understanding Antecedents of Continuance Intention in Social-Networking Services. Cyberpsychology, Behavior, and Social Networking, 14(4), 199–205. http://doi.org/10.1089/cyber.2010.0009

Koufaris, M. (2002). Applying the Technology Acceptance Model and flow theory to online consumer behavior. Journal of Information Systems Research, 13(2), 205–223. http://doi.org/10.1287/isre.13.2.205.83

Kumar, N., Mohan, K., & Holowczak, R. (2008). Locking the door but leaving the computer vulnerable: Factors inhibiting home users’ adoption of software firewalls. Decision Support Systems, 46(1), 254–264. http://doi.org/10.1016/j.dss.2008.06.010

Kuo, Y. F., Wu, C. M., & Deng, W. J. (2009). The relationships among service quality, perceived value, customer satisfaction, and postpurchase intention in mobile value-added services. Computers in Human Behavior, 25(4), 887–896. http://doi.org/10.1016/j.chb.2009.03.003

Li, Y. (2014). The impact of disposition to privacy, website reputation and website familiarity on information privacy concerns. Decision Support Systems, 57(1), 343–354. http://doi.org/10.1016/j.dss.2013.09.018

Lim, J.-S., Al-Aali, A., Heinrichs, J. H., & Lim, K.-S. (2013). Testing alternative models of individuals’ social media involvement and satisfaction. Computers in Human Behavior, 29(6), 2816–2828. http://doi.org/10.1016/j.chb.2013.07.022

Lin,W. S. (2012). Perceived fit and satisfaction on web learning performance: IS continuance intention and task-technology fit perspectives. International Journal of Human Computer Studies, 70(7), 498–507. http://doi.org/10.1016/j.ijhcs.2012.01.006

Liu, C., Marchewka, J.T., Lu, J.,&Yu, C.-S. (2005). Beyond concern—a privacy-trust-behavioral intention model of electronic commerce. Information & Management, 42(2), 289–304. http://doi.org/10.1016/j.im.2004.01.003

McCole, P., Ramsey, E., & Williams, J. (2010). Trust considerations on attitudes towards online purchasing: The moderating effect of privacy and security concerns. Journal of Business Research, 63(9–10),1018–1024. http://doi.or /10.1016/j.jbusres.2009.02.025

Moon, J. W., & Kim, Y. G. (2001). Extending the TAM for a World-Wide-Web context. Information and Management, 38(4), 217–230. http://doi.org/10.1016/S0378-7206(00)00061-6

Nunnally, J., & Bernstein, I. (1994). Psychometric Theory (3rd ed.). New York: McGraw-Hill.

Oliver, R. L. (1980). A Cognitive Model of the Antecedents and Consequences of Satisfaction Decisions. Journal of Marketing Research, 17(4), 460–469.

Oliver, R. L. (1999). Whence consumer loyalty? Journal of Marketing. Retrieved from http://search.ebscohost.com/login.aspx?direct=true&profile=ehost&scope=site&authtype=crawler&jrnl=00222429&AN=2444274&h=gx9looLpWeEmSRwxdnVVTF0cZFXHLX%2FfSknEYzpSVlrFtQSvbNOKhqnVEe%2BLuhQgkQhS%2B7CGZ4l8YniBvZ%2Fl

eg%3D%3D&crl=c

Oliver, R. L., & Burke, R. R. (1999). Expectation Processes in Satisfaction Formation: A Field Study. Journal of Service Research. http://doi.org/10.1177/109467059913002

Oliver, R. L., & Linda, G. (1981). Effect of satisfaction and its antecedents on consumer preference and intention. Advances in Consumer Research, 8(1), 88–93.

Park, N., Rhoads, M., Hou, J., & Lee, K. M. (2014). Understanding the acceptance of teleconferencing systems among employees:Anextension of the technology acceptance model. Computers in Human Behavior, 39, 118–127. http://doi.org/10.1016/j.chb.2014.05.048

Pavlou, P. A. (2003). Consumer Acceptance of Electronic Commerce: Integrating Trust and Risk with the Technology Acceptance Model. International Journal of Electronic Commerce, 7(3), 34. http://doi.org/10.1080/10864415.2003.11044275

Slyke, C. Van, Shim, J., Johnson, R., & Jiang, J. (2006). Concern for Information Privacy and Online consumer purchasing. Journal of the Association for Information Systems, 7(6), 415–444. Retrieved from http://ais.bepress.com/cgi/viewcontent.cgi?article=1266&context=jais

Spiller, J., Vlasic, A., & Yetton, P. (2007). Post-adoption behavior of users of Internet Service Providers. Information and Management, 44(6), 513–523. http://doi.org/10.1016/j.im.2007.01.003

Terzis, V., Moridis, C. N., & Economides, A. a. (2013). Continuance acceptance of computer based assessment through the integration of user’s expectations and perceptions. Computers and Education, 62, 50–61. http://doi.org/10.1016/j.compedu.2012.10.018

Vatanasombut, B., Igbaria, M., Stylianou, A. C., & Rodgers,W. (2008). Information systems continuance intention of web-based applications customers: The case of online banking. Information and Management, 45(7), 419–428. http://doi.org/10.1016/j.im.2008.03.005

Wu, K.W., Huang, S. Y., Yen, D. C., & Popova, I. (2012). The effect of online privacy policy on consumer privacy concern and trust. Computers in Human Behavior, 28(3), 889–897. http://doi.org/10.1016/j.chb.2011.12.008

Yoon, C., & Roland, E. (2015). Understanding Continuance Use in Social Networking Services. Journal of Computer Information Systems, 55(2), 1–8.

Yuan, S., Liu, Y., Yao, R., & Liu, J. (2014). An investigation of users’ continuance intention towards mobile banking in China. Information Development. http://doi.org/10.1177/0266666914522140

Zhao, A. L., Koenig-Lewis, N., Hanmer-Lloyd, S., & Ward, P.(2010). Adoption of internet banking services in China: Is it all about trust? International Journal of Bank Marketing, 28(1), 7–26. http://doi.org/10.1108/02652321011013562

Zhou, T. (2011a). The impact of privacy concern on user adoption of location-based services. Industrial Management & Data Systems, 111(2), 212–226. http://doi.org/10.1108/02635571111115146

Zhou, T. (2011b). Understanding mobile Internet continuance usage from the perspectives of UTAUT and flow. Information Development, 27(3), 207–218. http://doi.org/10.1177/0266666911414596

Zhou,T.,&Li, H. (2014). Understanding mobile SNS continuance usage in China from the perspectives of social influence and privacy concern. Computers in Human Behavior, 37, 283–289. http://doi.org/10.1016/j.chb.2014.05.008

Downloads

Published

2015-08-24

How to Cite

1.
Ofori KS, Fianu E, Larbi-Siaw O, Gladjah RE, Boateng EOY. Factors Influencing the Continuance Use of Mobile Social Media:The Effect of Privacy Concerns. JCSANDM [Internet]. 2015 Aug. 24 [cited 2024 Apr. 25];4(2-3):105-24. Available from: https://journals.riverpublishers.com/index.php/JCSANDM/article/view/5161

Issue

Section

Articles