用户名: 密码: 验证码:
学生用户对SNS网站信任度的实证研究
详细信息    本馆镜像全文|  推荐本文 |  |   获取CNKI官网全文
摘要
SNS网站是新兴的互联网虚拟社区形态,它与传统的虚拟社区的根本区别在于SNS网站大多数用户身份的真实性。传统虚拟社区的可信度由社区成员及其提供的信息的可信度决定,SNS网站的可信度则是由其保护用户个人信息和提供社交功能的能力和善意决定。本研究使用组织学、心理学、社会学、经济学以及传播学的相关理论,以人人网学生用户为研究样本,探讨和研究四个问题:第一,探讨学生用户对SNS网站的初始信任度、随后信任度以及学生用户随后信任度形成的基础;第二,研究学生用户对SNS网站的初始信任度和其与SNS网站互动满意度之间的关系;第三,研究学生用户对SNS网站的初始信任度和其在注册SNS网站时披露的基本个人信息水平之间的关系;第四,研究学生用户对SNS网站的随后信任度和其在SNS网站披露其他个人信息的水平之间的关系。
     本研究的研究结果表明,首先,用户的信任倾向、用户对SNS网站所处互联网制度的认知、用户对SNS网站规则的认知、用户对来自第三方的涉及SNS网站信息的认知以及用户对其与SNS网站互动历史的认知(互动满意度)均和用户的随后信任度/水平有不同程度的相关关系;其次,用户对SNS网站的初始信任度和用户对其与SNS网站的互动满意度之间存在正相关关系;第三,用户对SNS网站的初始信任度和用户在网站注册时披露的基本个人信息水平之间不存在相关;第四,用户对SNS网站的随后信任度和用户使用过程中通过SNS网站状态栏和日志功能披露其他个人信息(最新动态、意见和观点)的水平之间不存在相关。
     本研究的研究结果表明,本研究所建立的信任基础—信任度模型具有合理性,这是本研究的最大贡献。此外,用户对SNS网站信任度与用户披露信息的行为之间不存在相关的结果为未来的研究提供了新的视角。
Social Networking Sites are new forms of Internet virtual community. The basic difference between SNS and traditional virtual community is that most SNS users disclose their authentic identification information to the site and to the other users of the site. Hence, the credibility of SNS is based on its competency and benevolence of protectiong user’s privacy and providing services for online social interaction.
     Using relevant theores from organization, psychology, sociology, economy and communication research, this paper trie to solve three problems based on the samples of college student users of renren.com. Firstly, a model of trust bases which help the formation of trust is built. Secondly, the relationship between users’initial trust to SNS and their satisfaction to SNS is tested. Thirdly, the relationship between users’trust and their information disclosure behavior is tested.
     The study results suggest that the users’subsequent trust is positively related to all the trust bases including trust disposition, cognition of institution, cognition of rules, cognition of third-party information and cognition of interaction history with SNS(satisfaction of interaction with SNS). The results also suggest that the users’intitial trust is positively related to their satisfaction of interaction with SNS. Further, the study cannot find evidence of certain relationship between initial trust and users’information disclosure level when they registered. Besides, there is no evidence either to prove the correlation between subsequent trust and users’other information disclosure in the process of using SNS.
     As a contribution, the“trust base—trust”model is proved to be with reason. The empirical result that there is no relationship between users’trust and their information disclosure behavior also provides new orientations for future research..
引文
[1]Chen, Yuhui and Barnes, S.(2007),“Initial trust and online buyer behaviour”, Industrial Management & Data, 107(1), pp.21-36
    [2]McKnight, D.H., Choudhury, V., Kacmar, C.(2002),“The impact of initial consumer trust on intentions to transact with a web site: a trust building model”, Journal of Strategic Information Systems(11), pp.297-323
    [3]Wakefield, R.L., Stocks, M.H., and Wilder, W.M.(2004),“The role of web site characteristics in initial trust formation”, Journal of Computer Information Systems, Fall, pp.94-103
    [4]Hampton-Sosa, W. and Koufaris, M.(2005),“The effect of Web Site Perceptions on initial trust in the owner company”, International Jourmal of Electronic Commerce, 10(1), pp.55-81
    [5]Spector, M.D. and Jones G.E.(2004),“Trust in the workplace: factors affecting trust formation between team members”, The Journal of Social Psychology, 144(3), pp.311-321
    [6]McKnight, D.H., Kacmar, C.J., and Choudhury, V.(2004),“Shifting factors and the ineffectiveness of third party assurance seals: a two-stage model of initial trust in a web business”, Electronic Markets, 14(3), pp.252-266
    [7]Li, X., Hess, T.J., and Valacich, J.S.(2008),“Why do we trust new technology? A study of initial trust formation with organizational information systems”, Journal of Strategic Information Systems, 17, pp.39-71
    [8]Koufaris, M. and Hampton-Sosa, W.(2004),“The development of initial trust in an online company by new customers”, Information & Management, 41, pp.377-397
    [9]McKnight D.H., Cummings, L.L., and Chervany, N.L.(1995),“Trust formation in new organizational relationships”, A Proceeding of Information & Decision Sciences Workshop, University of Minnesota, 1995
    [10]Gefen, D.(2000),“E-commerce: the role of familiarity and trust”, The International Jourmal of Management Science, 28, pp.725-737
    [11]Kramer, R.M.(1999),“Trust and distrust in organizations: emerging perspectives, enduringquestions”, Annu.Rev.Psychol, 50, pp.569-598
    [12]Rousseau, D.M., Sitkin, S.B., Burt, R.S., and Camerer, C.(1998),“Not so different after all: a cross discipline view of trust”, Academy of Management Review, 23(3), pp.393-404
    [13]Zaheer, A., McEvily, B., and Perrone, V.(1998),“Does trust matter? Exporing the effects of interorganizational and interpersonal trust on performance”, Organization Science, 9(2), pp.141-159
    [14]Doney, P.M. and Cannon, J.P.(1997),“An examination of the nature of trust in buyer-seller relationships”, Journal of Marketing, 61(April), pp.35-51
    [15]Mayer, R.C., Davis, J.H., and Schoorman, F.D.(1995),“An integrative model of organizational trust”, Academy of Management Review, 20(3), pp.709-734
    [16]Moorman, C., Deshpandé, R., and Zaltman, G.(1993),“Factors affecting trust in market research relationships”, Journal of Marketing, 57(January), pp.81-101
    [17]Moorman, C., Zaltman, G., Deshpande, R.(1992),“Relationships between providers and user of market research: the dynamics of trust within and between organizations”, Journal of Marketing Research, XXIX(August), pp.413-328
    [18]McKnight, D.H. and Chervany, N.L.(1996),“The meaning of trust”, Technical Report MISRC WorkingPaper Series 96-04, University of Minnesota, Management Information Systems Research Center
    [19]McAllister, D.J.(1995),“Affect- and cognition-based trust as foundations for interpersonal coorperation in organizations”, Academy of Management Journal, 38(1), pp.24-59
    [20]McKnight, D.H., Choudhury, V., and Kacmar, C.(2002),“Developing and validating trust measures for e-commerce: an integrative typology”, Information Systems Research, 13(3), pp.334-359
    [21]Gulati, R. and Sytch Maxim(2008),“Does familiarity breed trust? Revisiting the antecedents of trust”, Managerial and Decision Economics, 29, pp.165-190
    [22]Jarvenpaa, S.J., Knoll, K., and Leidner, D.E.(1998),“Is anybody out there? Antecedents of trust in global virtual teams”, Journal of Management Information Systems, 14(4), pp.29-64
    [23]McKnight, D.H. and Chervany, N.L.(2001),“Trust and distrust definitions: one bite at a time”, Lecture Notes in Computer Science, Vol 2246/2001, pp.27-54
    [24]Bigley, G.A.(1998),“Straining for shared meaning in organization science: problems of trustand distrust”, Academy of Management Review, 23(3), pp.405-421
    [25]Robinson, S.L. and Morrison, E.W.(2000),“The development of psychological contract breach and violation: a longitudinal study”, Journal of Organizational Behavior, 21, pp.525-546
    [26]Robinson, S.L.(1996),“Trust and breach of the psychological contract”, Administrative Science Quarterly, 41(4), pp.574-599
    [27]Robinson, S.L. and Rousseau, D.M.(1994),“Violating the psychological contract: not the exception but the norm”, Journal of Organizational Behavior, 15(3), pp.245-259
    [28]Robinson, S.L., Kraatz, M.S., Rousseau, D.M.(1994),“Changing obligations and the psychological contract: a longitudinal study”, Academy of Management Journal, 37(1), pp.137-152
    [29]Turnley, M.H. and Feldman, D.C.(1999),“The impact of psychological contract violations on exit, voice, loyalty, and neglect”, Human Relations, 52(7), pp.895-922
    [30]Rousseau, D.M.(1990),“New hire perceptions of their own and their employer’s oligations: a study of psycholgical contracts”, Journal of Organizaitonal Behavior, 11(5), pp.389-400
    [31]Morrison, E.W. and Robinson, S.L.(1997),“When employees feel betrayed: a model of how psychological contract violation develops”, Academy of Management Review, 22(1), pp.226-256
    [32]Lewicki, R.J. and McAllister, D.J.(1998),“Trust and distrust: new relationships and realities”, Academy of Management Review, 23(3), pp.438-458
    [33]Ridings, C.M., Gefen, D., and Arinze, B.(2002),“Some antecedents and effects of trust in virtual communities”, Journal of Strategic Information Systems, 11, pp.271-295
    [34]Hsu, Meng-Hsiang, Ju, T.L., Yen, Chia-Hui, and Chang, Chuan-Ming(2007),“Knowledge sharing behavior in virtual communities: the relationship between trust, self-efficacy, and outcome expectations”, International Journal of Human-Computer Studies, 65, pp.153-169
    [35]Dwyer, C., Hiltz, S.R., and Passerini, K.(2007),“Trust and privacy concern within social networking sites: a comparison of Facebook and Myspace”, Proceedings of the Thirteenth Americas Conference on Information Systems, Keystone, Colorado, August 09-12
    [36]Dwyer, C.(2007),“Digital relationships in the‘Myspace’generation: results from a qualitative study”, Proceedings of the 40th Hawaii International Conference on System Sciences
    [36]Rosenblum, D.(2007),“What anyone can know? The privacy risks of social networking sites”, Security & Privacy, 5(3), pp.40-49
    [38]Dwyer, C.(2009),“The inference problem and pervasive computing”, Proceedings of Internet Research 10.0, Milwaukee, Wisconsin, October 7th-11th
    [39]Ruggiero, T.E.(2000),“Uses and gratifications theory in the 21st century”, Mass Communication & Society, 3(1), pp.3-37
    [40]Katz. E., Blumler, J.G., and Gurevitch, M.(1973-1974),“Uses and gratifications research”, The Public Opinion Quaterly, 37(4), pp.509-523
    [41]Bonds-Raacke, J. and Raacke, J.(2010),“MySpace and Facebook: identifying dimensions of uses and gratifications for friend networking sites”, Individual Difference Research, 8(1), pp.27-33
    [42]Pornsakulvanich, V.(2005),“Testing a uses and gratifications model of online relationships”, A dissertation submitted to the College of Communication and Informtion of Kent State University in partial fulfillment of the requirements for the degree of Doctor of Philosophy
    [43]Song, I., Larose, R., Eastin, M.S., and Lin, C.A.(2004),“Internet gratifications and Internet addiction: on the uses and abuses of new media”, Cyber Psychology & Behavior, 7(4), pp.384-394
    [44]Mighmey, J. and McCord, L.(1998),“Adding value in the information age: Uses and gratifications of sites on the World Wide Web”, Journal of Business Rearch, 41, pp.187-194
    [45]Ferguson, D.A. and Perse, E.M.(2000),“The World Wide Web as a functional alternative to television”, Journal of Broadcasting & Electronic Media, 44(2), pp.155-174
    [46]Flanagin, A.J. and Metzer, M.J.(2001),“Internet use in the contemporary media environment”, Human Communication Research, 27(1), pp.153-181
    [47]Perse, E.M. and Ferguson, D.A.(2000),“The benefits and costs of Web surfing”, Communication Quarterly, 48(4), pp.343-359
    [48]Papacharissi, Z. and Rubin, A.M.(2000),“Predictors of Internet use”, Journal of Broadcasting & Electronic Media, 44(2), pp.175-196
    [49]Rafaeli, S.(1986),“The electronic bulletin board: A computer-driven mass medium”, Computers and the Social Science, 2, pp.123-136
    [50]Li, D.(2005),“Why do you blog: a uses and gratifications inquiry into bloggers motivations”, A Thesis submitted to the Faculty of the Graduate School. Marquette University, in Partial Fulfillment of the Requirements for the Degree of Masters of Arts
    [51]Joinson, A.N.(2008),“‘Looking at’,‘looking up’, or‘keeping up with’people? Motives and uses of Facebook”, CHI 2008 Proceedings·Online Social Networks, April 5-10, 2008·Florence,Italy
    [52]Granovetter, M.(1983),“The strength of weal ties: a network theory revisited”, Sociological Theory, 1, pp.201-233
    [53]Lo, J. and Riemenschneider(2010),“An examination of privacy concerns and trust entities in determining willingness to disclose personal information on a social networking site”, A Proceeding of Americas Conference on Inforation Systems 2010
    [54]Lo, J.(2010),“Privacy concern, Locus of control, and salence in a trust-risk model of information disclosure on social networking sites”, A Proceeding of Americas Conference on Inforation Systems 2010
    [55]Tung, L. Tan, P. and Chia, P.(2001),“An empirical investigation of virtual communicaties and trust”, A proceeding of International Conference on Information Systems
    [56]Kiousis, S.(2001),“Public trust or mistrust ?Perceptions of media credibility in the information age”, Mass Communication & Society, 4(4), pp.381-403
    [57]Porter, C.E. and Donthu, N.(2008),“Cultivating Trust and Harvesting Value in Virtual Communities”, Management Science, 54(1), pp.113-128
    [58]Jamieson, S.(2004),“Likert scales: how to (ab)use them”, Medical Education, 38, pp.1212-1218
    [59]Schafer, J.L. and Olsen, M.K.(1998),“Multiple imputation for multivariate missing-data problems: a data analyst’s perspective”, Multivariate Behavioral Research, 33(4), p.545-586
    [60]Bolton, G.E., Katok, E., and Ockenfels, A.(2005),“Cooperation among strangers with limited information about reputation”, Journal of Public Economics, 89, pp.1457-1468
    [61]Gliem, J.A. and Gliem, R.R.(2003),“Calculating, interpreting and reporting: Cronbach’s Alpha Reliability Coefficient for Likert-Type Scales”, 2003 Midwest Research to Practice Conference in Adult, Continuing, and Community Education
    [62]Russell, C.J. and Bobko, P.(1992),“Moderated Regression Analysis and Likert Scales: too coarse for comfort”, Journal of Applied Psychology, 77(3), pp.336-342
    [63]Warkentin, M., Gefen, D., Pavlou, P.A., and Rose, G.M.,“Encouraging citizen adoption of e-Government by Building Trust”, Electronic Markets, 12(3), pp.157-162
    [64]Lambright, Mischen, & Laramee(2010),“Building trust in public and nonprofit networks: personal, dyadic, and third-party influences”, The American Review of Public AdministrationJanuary, 2010, 40, pp.64-82
    [65]Quan-Haase, A. and Wellman, B.(2002),“How does internet affect social capital”, Social Capital and Information Technology, edited by Marleen Huysman and Volker Wulf, The MIT Press, 2004
    [66]McKnight, D.H. and Chervany, N.L.(2006),“Reflections on an initial trust-building model”, Handbook of Trust Rearch, edited by Bachmann, R. and Zaheer A., Edward Elgar Publishing, 2006
    [67]Lewicki, R.J. and Bunker, B.B.(1996),“Developing and maintaining trust in work relationships”, Trust in Organizations: Frontiers of Theory and Research, edited by Kramer, R.M. and Tyler, T.R., Sage Publications, 1996
    [68]安佳文《使用与满足理论在SNS网站的运用》,《新闻爱好者》,2009年12(上半月),p.29
    [69]黄婷文《社交网络服务(SNS)的用户接受影响因素研究》,浙江大学硕士学位论文,2009年
    [70]古玉立文《我国校园SNS受众媒介使用的研究》,电子科技大学硕士学位论文,2008年
    [71]李晓静文《西方“媒介可信度”研究述评(上)》,新闻大学,2006年第3期,pp.39-48
    [72]李晓静文《西方“媒介可信度”研究述评(下)》,新闻大学,2007年第2期,pp.52-60
    [73]林祺峰文《资讯部门人员人际信任、冲突与知识分享关系之研究》,台湾南华大学硕士学位论文,2005年
    [74]王楠文《对校园SNS用户人际互动与其掌握社会资本相关性的实证研究》,山东大学硕士学位论文,2009年
    [75]冯旭鹏文《构建基于SNS的研究生校际网络学习共同体的探究》,南昌大学硕士学位论文,2009年
    [76]周曦文《SNS网站对于大学生同学间人际关系的影响——以“校内网”为例》,厦门大学硕士学位论文,2009年
    [77]鲁耀斌,周涛文《B2C环境下影响消费者网上初始信任因素的实证分析》,南开管理评论,2005年第8卷第6期,pp.96-101
    [78]郑冉冉,宋泽文《网上购物意图影响因素实证研究》,商业经济与管理,2007年第7期,pp.55-61
    [79]吴巧洋文《信任前因对网上购买意向的影响研究》,湖南大学硕士学位论文,2009年
    [80]范艺潇文《C2C模式中声誉与口碑对信任和购买意向影响的实证研究》,哈尔滨工业大学硕士学位论文,2009年
    [81]咸晓静文《基于TAM的网络口碑信任度研究》,上海交通大学硕士学位论文,2010年
    [82]陈异兵文《电子商务网站质量对网络消费者在线信任影响的研究》,安徽大学硕士学位论文,2010年
    [83]曾五一,黄炳艺文《调查问卷的可信度和有效度分析》,统计与信息论坛,第20卷第6期,2005年11月,pp.11-15
    [84]王保进著《英文视窗版SPSS与行为科学研究》,北京大学出版社,2007年8月版,pp.485-510
    [85]吴明隆著《SPSS操作与应用:问卷统计分析实务》,台北五南图书出版股份有限公司,2009年版,pp.288-289
    [86]刘海龙著《大众传播理论:范式与流派》,中国人民大学出版社,2008年版,pp.271-294
    [87][美]布莱洛克著《社会统计学》,沈崇麟,李春华,傅正元等译,重庆大学出版社,2010年2月,p.262
    [88][美]艾尔·巴比著《社会研究方法》,邱泽奇译,华夏出版社,2005年6月版,pp.253-254

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700