Would you go invisible on social media? An empirical study on the antecedents of users' lurking behavior

被引:17
作者
Hong, Ying [1 ]
Hu, Jiangting [1 ]
Zhao, Yaxin [1 ]
机构
[1] Beijing Technol & Business Univ, Business Sch, 33 Fucheng Rd, Beijing 100048, Peoples R China
关键词
Lurking behavior; Social media; Security awareness; Refusal to disclose information; Social browsing; Social network fatigue; INFORMATION PRIVACY; TECHNOLOGY OVERLOAD; PERSONALITY-TRAITS; MODERATING ROLES; SECURITY; WECHAT; INTENTIONS; FATIGUE; LURKERS; IMPACT;
D O I
10.1016/j.techfore.2022.122237
中图分类号
F [经济];
学科分类号
02 ;
摘要
With the ubiquity of social networks, users of social network apps are likelier to lurk rather than interact. Accordingly, users' lurking behavior in online communities deserves more attention and research. Our research explores the causes of social media users' lurking behavior through three constructs: refusal to disclose information, social browsing, and social network fatigue and the antecedents of these three constructs. Evidence from 786 valid questionnaire data indicates that the users lurk on social media platforms primarily out of a refusal to disclose information and social network fatigue rather than for social browsing. Notably, social network fatigue was the major contributor to the users' lurking behavior. In summary, our research enhances the understanding of the users' lurking behavior and its antecedent variables and reveals key lurking determinants that provide social media vendors with practical insight.
引用
收藏
页数:13
相关论文
共 79 条
[1]   Improving information security awareness and behaviour through dialogue, participation and collective reflection. An intervention study [J].
Albrechtsen, Eirik ;
Hoyden, Jan .
COMPUTERS & SECURITY, 2010, 29 (04) :432-445
[2]  
[Anonymous], 2013, Int. J. Social Organizational Dyn. IT
[3]   Mobile application security: Role of perceived privacy as the predictor of security perceptions [J].
Balapour, Ali ;
Nikkhah, Hamid Reza ;
Sabherwal, Rajiv .
INTERNATIONAL JOURNAL OF INFORMATION MANAGEMENT, 2020, 52
[4]   Multidimensional modelling of quality of experience for mobile Web browsing [J].
Barakovic, Sabina ;
Skorin-Kapov, Lea .
COMPUTERS IN HUMAN BEHAVIOR, 2015, 50 :314-332
[5]  
Beye M., 2012, Computational Social Networks: Security and Privacy, P87, DOI [10.1007/978-1-4471-4051-1_4, DOI 10.1007/978-1-4471-4051-1_4]
[6]   Social networks and social media: Understanding and managing influence vulnerability in a connected society [J].
Bruning, Patrick F. ;
Alge, Bradley J. ;
Lin, Hsin-Chen .
BUSINESS HORIZONS, 2020, 63 (06) :749-761
[7]   Exploring the effect of overload on the discontinuous intention of social media users: An S-O-R perspective [J].
Cao, Xiongfei ;
Sun, Jianshan .
COMPUTERS IN HUMAN BEHAVIOR, 2018, 81 :10-18
[8]   Effect of servicescape on customer behavioral intentions: Moderating roles of service climate and employee engagement [J].
Chang, Kuo-Chien .
INTERNATIONAL JOURNAL OF HOSPITALITY MANAGEMENT, 2016, 53 :116-128
[9]   Understanding social networking sites adoption in China: A comparison of pre-adoption and post-adoption [J].
Chang, Ya Ping ;
Zhu, Dong Hong .
COMPUTERS IN HUMAN BEHAVIOR, 2011, 27 (05) :1840-1848
[10]   Information-Sharing Behavior on WeChat Moments: The Role of Anonymity, Familiarity, and Intrinsic Motivation [J].
Chen, Xi ;
Sun, MingXue ;
Wu, Dong ;
Song, Xiao Yu .
FRONTIERS IN PSYCHOLOGY, 2019, 10