UPSI Digital Repository (UDRep)
|
|
|
Abstract : Universiti Pendidikan Sultan Idris |
The purpose of this research was to determine the effect of privacy awareness on
security concerns, the effect of privacy awareness and security concerns on trust and
the effect of privacy awareness, security concerns and trust on information sharing in
the social media platform. This study employed a quantitative method. Data were
collected from a sample of 373 public university students, in the age range of 18 to 29
years old in Selangor using an online questionnaire. To analyze the data, descriptive
analysis and covariance-based structural equation modeling (CB-SEM) were used.
Based on the R2 value, 17.0 per cent of the total variance in security concerns (SC) is
explained by privacy awareness (PA), 6.0 per cent of the variance in the trust is
explained by PA and SC, while 27.0 per cent of the variance in information sharing
(IS) is explained by PA, SC and trust. The findings showed the significant positive
effects of PA on trust (β=0.273, p |
References |
Acquisti, A. & Gross, R. (2006). Imagined communities: Awareness, information sharing, and privacy on the Facebook. 6th International Workshop on Privacy Enhancing Technologies. Springer Berlin Heidelberg, 36–58.
Aljohani, M., Nisbet, A., & Blincoe, K. (2016). A survey of social media users privacy settings & information disclosure. 67–75. https://doi.org/10.4225/75/58a693deee893
Abdul Hamid, N., Ishak, M., Ismail, S., & Mohamad Yazam, S. (2013). Social Media Usage among University Students in Malaysia. Social Media and the New Academic Environment: Pedagogical Challenges, 244-255. doi:https://doi.org/10.4018/978-1- 4666-2851-9.ch012.
Ahmad, R., Hassan, N. A., Tajuddin, J. M., Wimpi & Yollanda T. (2018). A Study on Social Media Usage among Private University Students in Klang Valley. Journal Sultan Alauddin Sulaiman Shah. 5, 257-268.
Ahmad, N. A. (2019). Information Privacy Awareness Among Young Generation in Malaysia. 5(2), 1–10.
Ali, S., Islam, N., Rauf, A., Din, I. U., Guizani, M., & Rodrigues, J. J. P. C. (2018). Privacy and security issues in online social networks. Future Internet, (12), 1–12. https://doi.org/10.3390/fi10120114.
Ajzen, I. (1991). The theory of planned behaviour. Organizational Behavior and Human Decision Processes, 50(2), 179–211.
Aldhafferi, N., Watson, C., & Sajeev, A. (2013). Personal Information Privacy Settings of Online Social Networks and Their Suitability for Mobile Internet Devices. International Journal of Security, Privacy and Trust Management,2(2), 1-17. doi:10.5121/ijsptm.2013.2201.
Aljohani M., Nisbet, A., & Blincoe, K. (2016). A survey of social media users’ privacy setting& amp; information disclosure. The Proceeding of 14th AustralianInformation Security Management Conference 67-75. https://doi.org/10.4225/75/58a693deee893.
Almadhoun, N., Dominic, P., & Woon, F. (2011). Perceived Security, Privacy, and Trust concernss within Social Networking Sites. IEEE International Conference on Control System, Computing and Engineering. 426-431.
Ampong, G., Mensah, A., Adu, A., Addae, J., Omoregie, O. K. & Ofori, K. S. (2018). Examining self-disclosure on social networking sites: A flow theory and privacy perspective. Behavioral Sciences. 8(6), 1-17.
Anderson, J. C. & Gerbing, D. W. 1988. Structural Equation Modeling in Practice: A Review and Recommended Two-Step Approach. Psychological Bulletin 103(3): 411-423.
Afifi, T. D. (2003). ‘Feeling caught’in stepfamilies: Managing boundary turbulence through appropriate communication privacy rules. Journal of Social and Personal Relationships, 20(6), 729–755.
Abranovic, W.A. (1997) Statistical Thinking and Data Analysis for Managers. Reading, MA: Addison-Wesley.
Arbuckle, J. L. 2007. Amos 16.0 User’s Guide. Chicago, USA: Amos Development Corporation..
Avkiran, N. K. (2017). An in-depth discussion and illustration of partial least squares structural equation modeling in health care. Health Care Management Science, 1-8. doi: 10.1007/s10729-017-9393-7.
Ayaburi, E. W., & Treku, D. N. (2020). Effect of penitence on social media trust and privacy concernss: The case of Facebook. International Journal of Information Management, 50(February 2019), 171–181. https://doi.org/10.1016/j.ijinfomgt.2019.05.014.
Baxter, L., Braithwaite, D., Petronio, S., & Durham, W. T. (2014). Communication Privacy Management Theory: Significance for Interpersonal Communication. Engaging Theories in Interpersonal Communication: Multiple Perspectives, 309–322. https://doi.org/10.4135/9781483329529.n23.
Baruh, L., Secinti, E., Cemalcilar, Z. (2017). Online privacy concernss and privacy management: a meta-analytical review. J. Commun. 67, 26–53.
Bagozzi, R. P. & Yi, Y. 2012. Specification, Evaluation, and Interpretation of Structural Equation Models. Journal of the Academy of Marketing Science 40(1): 8-34.
Blau, P. (1964). Exchange And Power In Social Life. New York: John Wiley & Sons.
Benson, V., Saridakis, G. & Tennakoon, H. (2015). Information disclosure of social media users: Does control over personal information, user awareness and security notices matter? Information Technology and People 426-441. 10.1108/ITP-10-2014-0232.
Bernama. Malaysia ranks top 5 globally in mobile social penetration, highest in region. Retrieved January 31, 2019, from https://www.nst.com.my/lifestyle/bots/2019/01/456119/malaysia-ranks-top-5-globally-mobile-social-media-penetration-highest
Berman, J. and Bruening, P. (2001) ‘Is privacy still possible in the twenty-first century?’, Social Research, Vol. 68, No. 1, pp.306–318.
Buchanan, R., Scevak, J., Smith, S. & Southgate, E. (2019). Disclosure in the Post digital age: University Students ' Attitudes to Social Disclosure in the Post digital age: University Students’ Attitudes to Social Media. Retrieved June, 2019, from https://www.researchgate.net/publication/333783532.
Barrett-Maitland, N., Barclay, C., & Osei-Bryson, K. M. (2016). Security in Social Networking Services: A Value-Focused Thinking Exploration in Understanding Users" Privacy and Security Concernss. Information Technology for Development, 22(3), 464–486. http://doi.org/10.1080/02681102.2016.1173002
Bhatt, Dr. Kedar, D. K. P. (2019). Role of Security and Trust in Online Consumer Behavior. (ISSN: 2394-3114 Vol-40, Special Issue-08 National), 09.
Brandtzæg, P.B., Lüders, M., Skjetne, J.H., 2010. Too many facebook “friends”? Content sharing and sociability versus the need for privacy in social network sites. Int. J. Hum.–Comput. Interact. 26 (11–12), 1006–1030.
Braithwaite, D., & Schrodt, P. (2014). Engaging Theories in Interpersonal Communication: Multiple Perspectives Social Exchange Theories : Calculating the Rewards and Costs of Personal Relationships. Engaging Theories in Interpersonal Communication: Multiple Perspectives, 377–390. https://doi.org/10.4135/9781483329529.n28
Bellman, S., Johnson, E.J., Kobrin, S.J. and Lohse, G.L. (n.d.) ‘International differences in information privacy concernss: a global survey of consumers’ [online] https://www8.gsb.columbia.edu/sites/decisionsciences/files/files/1172.pdf (accessed 19 November 2015).
Bartlett, J. E., Kotrlik, J. W. & Higgins, C. C. 2001. Organizational research: determining appropriate sample size in survey research. Learning and Performance Journal, 19, 43-50.
Beldad, A. D. (2015). Sharing to be sociable, posting to be popular: factors influencing non-static personal information disclosure on Facebook among young Dutch users. International Journal of Web Based Communities, 11(3/4), 357. https://doi.org/10.1504/ijwbc.2015.072132
Baines, P. and Chansarkar, B. (2002), Introducing Marketing Research, England: John Wiley & Sons, Ltd.
Baker, T. L. 1994. Doing social research. 2nd ed. New York: McGraw - Hill Inc. 499.
Babbie, E. R. (1990). Survey research methods Wadsworth Pub. Co Belmont, Calif, 78–82.
Bhattacherjee, A. 2012. Social Science Research: Principles, Methods, and Practices. 2nd edition. Zurich, Switzerland: Creative Commons Attribution.
Bryman, A. and Cramer, D. (2005), Quantitative Data Analysis with SPSS 12 and 13: A guide for social scientists, East Sussex: Routledge.
Buettner, R. (2015). Analyzing the Problem of Employee Internal Social Network Site Avoidance : Are Users Resistant due to their Privacy Concernss ?
Byrne, B. M. (2001), Structural Equation Modelling with Amos: Basic Concepts, Applications, and Programming, Mahwah, NJ: Erlbaum.
Byrne, B. M. 2010. Structural Equation Modeling with Amos: Basic Concepts, Applications, and Programming. 2nd edition. New York: Taylor and Francis Group.
Byrne, B. M. (2016). Structural Equation Modeling With AMOS: Basic Concepts, Applications, and Programming (3rd ed.). New York: Routledge.
Cavusoglu, H., Phan, T., Cavusoglu, H., & Airoldi, E. (2016). Assessing the impact of granular privacy controls on content sharing and disclosure on Facebook. Information Systems Research. 27(4), 848-879.
Cater, T. & Cater, B. 2010. Product and Relationship Quality Influence on Customer Commitment and Loyalty in B2b Manufacturing Relationships. Industrial Marketing Management 39(8): 1321-1333.
Chandio, F. (2011). Studying Acceptance Of Online Banking Information System: A Structural Equation Model: A thesis submitted for the degree of Doctor of Philosophy. (June), 1–269.
Chang, L.; Chen, J.V. (2014). Aligning principal and agent’s incentives: A principal–agent perspective of social networking sites. Expert Syst. Appl., 41, 3091–3104.
Chang, S. J., VanWitteloostuijn, A., & Eden, L. (2010). From the editors: Common method variance in international business research. Journal of International Business Studies, 41(2), 178–184.
Chang, L. (1994). A Psychometric Evaluation of 4-Point and 6-Point Likert-Type Scales in Relation to Reliability and Validity. Applied Psychological Measurement, 18(3), 205–215. https://doi.org/10.1177/014662169401800302.
Cheng, T., Lam, D.Y.C. & Yeung, A.C.L. (2006) "Adoption of internet banking: an empirical study in Hong Kong", Decision Support Systems, vol. 42, no. 3, pp. 1558-1572.
Cheung, C., Lee, Z. W. Y. & Chan, T. K. H. (2015). Self-disclosure in social networking sites. Internet Research. 25(2), 279-299. 10.1108/IntR-09-2013-0192.
Chen, Yu-Hui and S. Barnes, 2007. ‘Initial trust and online buyer behavior’, Industrial Management & Data Systems, 107(1): 21-36.
Chin, W.W. (1998b). The partial least squares approach to structural equation modelling. In Marcoulides (Ed.), Modern Methods for Business Research. Mahwah: Lawrence Erlbaum Associates.
Chin, E., Felt, A.P., Sekar, V. and Wagner, D. (2012) ‘Measuring user confidence in smartphone security and privacy’, Proceedings of the Eighth Symposium on Usable Privacy and Security, No. 1, ACM.
Chiu, C.-M. & Wang, E. T. G. 2008. Understanding Web-Based Learning Continuance Intention: The Role of Subjective Task Value. Information & Management 45(3): 194-201.
Cho, H., Lee, J., Chung, S. (2010). Optimistic bias about online privacy risks: testing the moderating effects of perceived controllability and prior experience. Comput. Hum. Behav. 26 (5), 987–995.
Choi, B.C.F.; Land, L. (2016). The effects of general privacy concernss and transactional privacy concernss on Facebook apps usage. Inf. Manag. 53, 868–877.
Choi, S. (2016). The flipside of ubiquitous connectivity enabled by smartphone-based social networking service: Social presence and privacy concerns. Computers in Human Behavior, 65, 325–333.
Choi, Y. (2013). A structural equation model of the determinants of repeat purchase behaviour of online grocery shoppers in the UK. 230.
Cho, H., Rivera-Sánchez, M., & Lim, S. S. (2009). A multinational study on online privacy: Global concernss and local responses. New Media & Society, 11(3), 395–416. http://dx.doi.org/10.1177/1461444808101618
Churchill, G.A. 1(987), Marketing Research: Methodological Foundations, Fifth edition, The Dryden Press, New York, USA.
Clinch, J. ITIL V3 and Information Security. Best Management Practice, White Paper Retrieved 12 July 2013, from http://www.best-management-practice.com/gempdf/itilv3_and_information_security_ white_paper_may09.
Clement, J (2020). Social media-Statistics & Facts. Retrieved from https://www.statista.com/topics/1164/social-networks/
Coppola, N., Hiltz, S.R., Rotter, N. (2004). Building trust in virtual teams. IEEE Transactions on Professional Communication 47 (2), 95–104.
Coakes, S. J. & Steed, L. G. 2003. Spss Analysis without Anguish: Version 11.0 for Windows. Queensland: John Wiley & Sons Australia Ltd.
Cohen, J. & and Cohen, P. (1983) Applied multiple regression/correlation analysis for the behavioral science, 2nd edn, Hillsdale, NJL Lawrence Erlbaum Associates, Inc.
Connelly, L. M. (2008). Research Roundtable: Pilot studies. Medsurg Nursing, 17(6), 411–412. Retrieved from http://search.ebscohost.com/login.aspx?direct=true&db=a9h&AN=36085347&site=ehost-livefile://C:%5Cdownloads%5CJ#6301 Connelly MedSurgNursing 2008.pdf.
Cooper, D.R. and Schindler, P.S. (2001), Business Research Methods, 7th ed., Irwin/ McGraw-Hill, Singapore.
Courtney Walton, S.; Rice, R.E. (2013). Mediated disclosure on Twitter: The roles of gender and identity in boundary impermeability, valence, disclosure, and stage. Comput. Hum. Behav. 29, 1465–1474.
Chan, L. L., & Idris, N. (2017). Validity and Reliability of The Instrument Using Exploratory Factor Analysis and Cronbach's alpha. International Journal of Academic Research in Business and Social Sciences, 7(10), 400–410. https://doi.org/10.6007/ijarbss/v7-i10/3387
Child, J. T., Pearson, J. C., & Petronio, S. (2009). Blogging, communication, and privacy management: Development of the blogging privacy management measure. Journal of the American Society for Information Science and Technology, 60(10), 2079–2094. http://dx.doi.org/10.1002/asi.21122.
Chung, K. C., Chen, C. H., Tsai, H. H., & Chuang, Y. H. (2021). Social media privacy management strategies: A SEM analysis of user privacy behaviors. Computer Communications, 174(March), 122–130. https://doi.org/10.1016/j.comcom.2021.04.012.
Cloarec, J., Meyer-Waarden, L., & Munzel, A. (2022). The personalization–privacy paradox at the nexus of social exchange and construal level theories. Psychology and Marketing, 39(3), 647–661. https://doi.org/10.1002/mar.21587.
Cox EP. The optimal number of response alternate for a scale: A review. Journal of Marketing Research. 1980;17(4):407-422.
D. Ingram. Facebook says data leak hits 87 million users, widening privacy scandal. Reuters. Retrieved April 5, 2018, from https://www.reuters.com/article/us-facebook-privacy/facebook-says-data-leak-hits-87-million-users-widening-privacy-scandal-idUSKCN1HB2CM.
Dai, H., & Chen, Y. (2015). Effects of Exchange Benefits, Security Concerns and Situational Privacy Concerns on Mobile Commerce Adoption. Journal of International Technology and Information Management, 24(3), 41.
De Wolf, R.; Willaert, K.; Pierson, J. (2014). Managing privacy boundaries together: Exploring individual and group privacy management strategies in Facebook. Comput. Hum. Behav. 35, 444–454.
DataReportal. (2022). Digital 2022: Portugal. (January), 109. Retrieved from https://datareportal.com/reports/digital-2022-portugal
Delafrooz, N., L.H. Paim and A. Khatibi, 2011. Understanding consumer’s internet purchase intention in Malaysia. African Journal of Business Management, 5(3): 2837-2846.
Dhami, A., Agarwal, N., Chakraborty, T., Singh, B. P., & Minj, J. (2013). Impact of trust, security and privacy concernss in social networking: An exploratory study to understand the pattern of information revelation in Facebook. Proceedings of the 2013 3rd IEEE International Advance Computing Conference, IACC 2013. 2, 465-469.
Dhawan, S, Singh, K & Goel, S. (2014). Impact of privacy attitude, concerns and awareness on use of online social networking. Proceedings of the 5th International Conference on Confluence 2014: The Next Generation Information Technology Summit 14-17. 10.1109/CONFLUENCE.2014.6949226.
Dongke, P., & Sannusi, S. N. (2021). Social Media Use among University Students in Malaysia during the COVID-19 Pandemic. Higher Education and Oriental Studies, 1(4), 17–25. https://doi.org/10.54435/heos.v1i4.28.
Dwyer, C., Hiltz, S., Passerini, K. (2007). Trust and privacy concerns within social networking sites: a comparison of Facebook and MySpace. Proceedings of the Thirteenth Americas Conference on Information Systems, Keystone, Colorado.
Dwyer, C., Roxanne Hiltz, S., Passerini, K., & Roxanne, S. (2007) Association for Information Systems AIS Electronic Library (AISeL) Trust and Privacy Concerns Within Social Networking Sites: A Comparison of Facebook and MySpace Recommended Citation "Trust and Privacy Concerns Within Social Networking Sites. AIS eLibrary. 12-31.
Dinev, T., & Hart, P. (2006). An extended privacy calculus model for e-commerce transactions. Information Systems Research, 17(1), 61-80.
Davis, F.D., (1989), “Perceived Usefulness, Perceived Ease of Use, and User Acceptance of Information Technology”, MIS Quarterly, Vol. 13, No. 3, pp. 319-339.
Davis, F., Bagozzi, R. & Warshaw, P. (1989) "User Acceptance of Computer Technology: A Comparison of Two Theoretical Models", Management Science, vol. 35, no. 8, pp. 982-1003.
Dolma, S. (2010). The central role of the unit of analysis concept in research design. Istanbul University Journal of the School of Business Administration, 39(1), 169–174. Retrieved from: http://eds.b.ebscohost.com.uplib.idm.oclc.org/ehost/pdfviewer/pdfviewer?vid=33&sid=557e1ca9-810b-4e4f-ae0a-c29c73493ce2@sessionmgr103&hid=117.
Diefenbach, M.A., Weinstein, N.D., & O’Reilly, J. (1993). Scales for assessing perceptions of health hazard susceptibility. Health Education Research, 8, 181-192.
Enders, C. K. & Bandalos, D. L. 2001. The Relative Performance of Full Information Maximum Likelihood Estimation for Missing Data in Structural Equation Models. Structural Equation Modeling A Multidisciplinary Journal 8(3): 430-457.
Erkan, I. (2016). The Influence of Electronic Word of Mouth in Social Media on Consumers’ Purchase Intentions. Computers in Human Behavior, 61, 47–55.
Et.al, N. H. H. (2021). Awareness about Cyber bullying on Social Media among Female Students in a Malaysian Public University. Turkish Journal of Computer and Mathematics Education (TURCOMAT), 12(3), 1592–1601. https://doi.org/10.17762/turcomat.v12i3.972.
Etikan, I. (2017). Sampling and Sampling Methods. Biometrics & Biostatistics International Journal, 5(6), 5–7. https://doi.org/10.15406/bbij.2017.05.00149.
Fern, L., Zanariah, S., & Ishak, A. (2018). Trust and Other Factors that Drive Students’ Self -Disclosure on Social Networking Sites. 1, 25-31.
Finstad, K. (2010). Response Interpolation and Scale Sensitivity: Evidence Against 5-Point Scales Usability Metric for User Experience View project. Journal of Usability Studies, 5(3), 104–110. Retrieved from https://www.researchgate.net/publication/265929744.
Fink, A. (1995). The survey handbook. Thousand Oaks, CA: Sage Publications.
Flavián, C. and Guinalíu, M. (2006) ‘Consumer trust, perceived security and privacy policy: three basic elements of loyalty to a web site’, Industrial Management and Data Systems, Vol. 106, No. 5, pp.601–620.
Fogel, J., Nehmad, E. (2009). Internet social network communities: risk taking, trust, and privacy concernss. Computers in Human Behavior 25, 153–160.
Fornell, C. & Larcker, D. F. 1981. Evaluating Structural Equation Models with Unobservable Variables and Measurement Error. Journal of Marketing Research 18(1): 39-50.
Fornell, C., & Bookstein, F.L. (1982). two structural equation models: LISREL and PLS applied to consumer exit-voice theory. Journal of Marketing Research, 19(4), 440-452.
Fox, A.K., & Royne, M.B. (2018). Private information in a social media world: Assessing consumers’ fear and understanding of social media privacy. Journal of Marketing Theory & Practice, 26, 72- 89. https://doi.org/10.1080/10696679.2017.1389242.
Frampton, B.D.; Child, J.T. (2013). Friend or not to friend: Coworker Facebook friend requests as an application of communication privacy management theory. Comput. Hum. Behav. 29, 2257–2264.
Fairbairn, W., & Kessler, A. (2015). Practical Advice for Selecting Sample Sizes. Dced, (May), 1–11.
Fuller, C. M., Simmering, M. J., Atinc, G., Atinc, Y., & Babin, B. J. (2016). Common methods variance detection in business research. Journal of Business Research, 69(8), 3192–3198. https://doi.org/10.1016/j.jbusres.2015.12.008.
Gao, S., Mokhtarian, P. L. & Johnston, R. A. 2008. Nonnormality of Data in Structural Equation Models. Transportation Research Record: Journal of the Transportation Research Board 2082(1): 116-124.
Garrison, C. P., & Ncube, M. (2011). A Longitudinal Analysis of Data Breaches. Information Management & Computer Security, 19(4), 216–230.
Gouldner, A.W., (1960). The norm of reciprocity: a preliminary statement, Am. Sociol. Rev. 25 (2) 161–178.
Gefen, D. (2002). Reflections on the dimensions of trust and trustworthiness among online consumers. ACM SIGMIS Database: Database Adv. Inf. Syst. 33, 38–53.
Granville K. (2018). Facebook and Cambridge Analytica: What you need to know as fallout widens. New York Times, March 19, 2018. www.nytimes.com/2018/03/19/ technology/facebook-cambridge-analytica-explained.html.
Grazioli S. & Jarvenpaa, S.L. (2000). Perlis of Internet Fraud: An Empirical Investigation of Deception and Trust with Internet Consumers. Systems and Humans, 30(4), 395-410.
Greenwood S, Perrin A, Duggan M. (2016). Social Media Update 2016: Numbers, Facts and Trends Shaping the World. (Pew Research Center, Washington, DC) (pp. 1–19).
Gupta, A., & Dhami, A. (2015). Measuring the impact of security, trust and privacy in information sharing: A study on social networking sites. Journal of Direct, Data and Digital Marketing Practice. 17(1), 43-53.
Garson, G. D. 2012a. Structural Equation Modeling. Asheboro, NC USA: Statistical Associates Publishing.
Garson, G. D. 2012b. Testing Statistical Assumptions. Asheboro, NC USA: Statistical Associates Publishing.
Gaskin, J. 2013. Data Screening.Gaskination's StatWiki. http://statwiki.kolobkreations.com/index.php?title=Data_screening&oldid=49 80 [June 6, 2014].
Gaskin, J. 2012a. Common Method Bias.Gaskination's Statistics. http://youtube.com/Gaskination [20th February 2013].
Gaskin, J. 2012b. Confirmatory Factor Analysis.Gaskination's StatWiki. http://statwiki.kolobkreations.com [20th February 2013].
Goodhue, D., Lewis, W., & Thompson, R. (2006). PLS, small sample size, and statistical power in MIS research. In System Sciences, 2006. HICSS'06. Proceedings of the 39th Annual Hawaii International Conference on (Vol. 8, pp. 202b-202b). IEEE.
Groenland, E. & Stalpers, J. 2012. Structural Equation Modeling: A Verbal Approach Nyenrode Research Paper Series. Breukelen, The Netherlands, Nyenrode Business Universiteit.
Haris, A. R., Sarijan, S., & Hussin, N. (2017). Information Security Challenges: A Malaysian Context. International Journal of Academic Research in Business and Social Sciences, 7(9). https://doi.org/10.6007/ijarbss/v7-i9/3335
Hamid, N.R. and A.A. Khatibi, 2006. 'Perceived Risk and Users’ Experience Influence on Internet Technology Adoption,' WSEAS Transactions on Systems, 5(12): 2766-2773.
Haghighi, B.T., Othman, M., & Hashim, F. H. (2011). Internet Addiction and dependency: A case study in UNITEN. IEEE(Malaysia), 1-4.
Habibullah, M. S., Sanusi, N. A., Abdullah, L., Kusairi, S., Golam Hassan, A. A., & Ghazali, N. A. (2018). Does The Less Developed States In Malaysia Catching-Up To The Richer State Of Selangor? Journal of Contemporary Issues and Thought, 8, 29–40. https://doi.org/10.37134/jcit.vol8.4.2018.
Homans, G. (1961). Social Behavior. New York: Harcourt, Brace & World.
Homans, G.C. (1958), “Social behavior as exchange”, American Journal ofSociology, Vol. 63 No. 6, pp. 597-606.
Hasmida, J., Zauwiyah, A., & Noorhazreen, Z. (2011). Exploratory study on Internet addiction among varsity students in Malaysia. International Conference on e-Commerce, e-Administration, e-Society, e Education, and e-Technology (e-CASE & e-TECH 2011).
H. K Tsoi & L.Chen (2011). From Privacy Concerns to Uses of Social Network Sites: A Cultural Comparison via User Survey. 2011 IEEE Third International Conference on Privacy, Security, Risk and Trust and 2011 IEEE Third International al Conference on Social Computing, pp. 457-464.
Hagen, J.M., & Choe, S. (1998). Trust in Japanese Interfirm Relations: Institutional Sanctions Matter. Academy of Management Review. 23(3), 589-600.
Hall, H., Widén, G., & Paterson, L. (2010). Not what you know, nor who you know, but who you know already: Examining online information sharing behaviours in a blogging environment through the lens of social exchange theory. Libri. 60(2), 117-128.
Hoadley, C.M.; Xu, H.; Lee, J.J.; Rosson, M.B. (2010). Privacy as information access and illusory control: The case of the Facebook News Feed privacy outcry. Electron. Commer. Res. Appl. 9, 50–60.
Hazzi, O. A., & Maaldaon, I. S. (2015). A pilot study: Vital methodological issues. Business: Theory and Practice, 16(1), 53–62. https://doi.org/10.3846/btp.2015.437
Hertzog, M. A. 2008. Considerations in Determining Sample Size for Pilot Studies. Research in Nursing & Health 31(2): 180–191.
Hair, J.F., Black, W.C., Babin, B.J., Anderson, R.E. and Tatham, R.L. (1998) Multivariate Data Analysis. Vol. 5, No. 3, 207-219, Prentice Hall, Upper Saddle River.
Hair Joseph F. Jr., Black William C., Babin Barry J., Anderson Rolph E. & Tatham Ronald L. (2006) Multivariate Data Analysis, 6th edn, Pearson Prentice Hall, Pearson Education, Inc., Upper Saddle River, New Jersey 07458.
Haenlein, M. & Kaplan, A. M. 2004. A Beginner's Guide to Partial Least Squares Analysis. Understanding Statistics 3(4): 283-297.
Hair, J. F., Ringle, C. M. & Sarstedt, M. 2011. Pls-Sem: Indeed a Silver Bullet. Journal of Marketing Theory and Practice 19(2): 139-151.
Hair J, Hult GTM, Ringle C, Sarstedt M 2014 A Primer on Partial Least Squares Structural Equation Modeling (PLS-SEM) (Los Angeles: SAGE Publications, Incorporated).
Hair, J. F., Hult, G. T. M., Ringle, C. M., & Sarstedt, M. (2017b). A primer on partial least squares structural equation modeling (PLS-SEM) (2nd ed.). Thousand Oaks, CA: Sage.
Hair, J. F., Sarstedt, M., Ringle, C. M. & Mena, J. A. 2012. An Assessment of the Use of Partial Least Squares Structural Equation Modeling in Marketing Research. Journal of the Academy of Marketing Science 40(3): 414-433.
Huck, S. W. 2012. Reading Statistics and Research. 6th edition. Boston, MA: Pearson Education, Inc
Henseler, J., Ringle, C. & Sinkovics, R. 2009. The Use of Partial Least Squares Path Modeling in International Marketing. Advances in International Marketing (AIM) 20(277-320.
Henseler, J. & Sarstedt, M. 2013. Goodness-of-Fit Indices for Partial Least Squares Path Modeling. Computational Statistics 28(2): 565-580.
Hair, J. F., Black, W. C., Babin, B. J. & Anderson, R. E. 2010. Multivariate Data Analysis: A Global Perspective. 7th edition. Upper Saddle River, New Jersey: Pearson Education Inc.
Ho, R. 2006. Handbook of Univariate and Multivariate Data Analysis and Interpretation with Spss. Boca Raton, Florida: Chapman & Hall/CRC (Taylor & Francis Group).
Hauff, S., & Veit, D. (2014). Communication privacy management in the digital age - effects of general and situational privacy concerns. 20th Americas Conference on Information Systems, AMCIS 2014, (Dillet), 1–10.
Hugl, U. (2012). Reviewing person ’ s value of privacy of online social networking. (2007). https://doi.org/10.1108/10662241111158290.
Irvine, E. J., Tack, J., Crowell, M. D., Gwee, K. A., Ke, M., Schmulson, M. J., … Spiegel, B. (2016). Design of treatment trials for functional gastrointestinal disorders. Gastroenterology, 150(6), 1469-1480.e1. https://doi.org/10.1053/j.gastro.2016.02.010.
JithiKrishna P P, Suresh Kumar R and Sreejesh V K, (2015). Impact of trust, privacy and security in Facebook information. International Journal of Emerging Trends & Technology in Computer Science (IJETTCS), 4(6), 5–9. Retrieved from www.ijettcs.org.
Jabee, R., & Afshar, M. (2016). Issues and Challenges of Cyber Security for Social Networking Sites (Facebook). International Journal of Computer Applications. 144(3), 36-40.
James, T.L.; Warkentin, M.; Collignon, S.E. (2015). A dual privacy decision model for online social networks. Inf. Manag. 52, 893–908.
Jakobsen, M., & Jensen, R. (2015). Common method bias in public management studies. International Public Management Journal, 18(1), 3–30.
Jaeschke, R., Singer, J., & Guyatt, G. H. (1989). Measurement of health status. Ascertaining the minimal clinically important difference. Controlled Clinical Trials, 10(4), 407–415. https://doi.org/10.1016/0197-2456(89)90005-6.
Jarvenpaa, S., Leidner, D. (1998). Communication and trust in global virtual teams. Journal of Computer-Mediated Communication 3 (4).
Joe, M. (2014). A Survey of Various Security Issues in Online Social Networks. International Journal of Computer Networks and Applications. 1(1), 11-14.
Jøsang, A., Ismail, R. and Boyd, C. (2007) ‘A survey of trust and reputation systems for online service provision’, Decision Support Systems, Vol. 43, No. 2, pp.618–644.
Jai, T. M., & King, N. J. (2016). Privacy versus reward: Do loyalty programs increase consumers’ willingness to share personal information with third-party advertisers and data brokers? Journal of Retailing and Consumer Services, 28, 296–303. https://doi.org/10.1016/j.jretconser.2015.01.005
Jackson, D. L., Gillaspy, J. A. & Purc-Stephenson, R. 2009. Reporting Practices in Confirmatory Factor Analysis: An Overview and Some Recommendations. Psychological Methods 14(1): 6-23.
Jeong, Y., & Kim, Y. (2017). Privacy concernss on social networking sites: Interplay among posting types, content, and audiences. Computers in Human Behavior, 69, 302–310. https://doi.org/10.1016/j.chb.2016.12.042.
Kaplan, D. (1990). Evaluating and modifying covariance structure models: A review and recommendation. Multivariate Behavioral Research, 25(2), 137-155.
Kasikci, D.N., Cagiltay, K., Karakus, T., Kursun, E., Ogan, C., (2014). European online kids project (EU kids online): Internet habits and safer Internet use among children from Turkey and Europe. Educ. Sci. 39 (171), 230–243.
Kaiser, H.F. (1974) ‘An index of factorial simplicity’, Psychometrika, Vol. 39, No. 1, pp.31–36.
Kayes, I., Kourtellis, N., Bonchi, F., & Iamnitchi, A. (2015). Privacy concernss vs. user behavior in community question answering. Proceedings of the 2015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, ASONAM 2015. 681-688. Kennedy-Lightsey, C., Martin, M., Thompson, M., Himes, K., & Clingerman, Z. (2012). Communication Privacy Management Theory: Exploring Coordination and Ownership between Friends. Communication Quarterly. 60(5), 665-680.
Krejcie, R.V. & Morgan, D.W. (1970). Determining sample size for research activities. Educational & Psychological Measurement, 30, 607-610.
King, J.; Lampinen, A. (2011). Smolen, A. Privacy: Is There an App for That? In Proceedings of the Symposium on Usable Privacy and Security. Pittsburgh, PA, USA, 20–22.
King, J. (2018). Privacy, Disclosure, and Social Exchange Theory [Doctoral Dissertation, UC Berkeley]. UC Berkeley Electronic Theses and Dissertations. https://escholarship. org/uc/item/5hw5w5c1. Kline, R. (1998) Principles and Practice of Structural Equation Modeling. New York: Guildford.
Kline, R. B. (2005). Principles and practice of structural equation modeling. New York, NY: Guilford Press.
Kline, R. B. 2011. Principles and Practice of Structural Equation Modeling. 3rd edition. New York: The Guilford Press.
Kisekka, V.; Bagchi-Sen, S.; Rao, H.R. (2013). Extent of private information disclosure on online social networks: An exploration of Facebook mobile phone users. Comput. Hum. Behav. 29, 2722–2729.
Koohang, A., & Georgia, M. (2021). Social media privacy concerns , security concerns , trust , and awareness : Empirical validation of an instrument. 22(2), 133–145.
Krasnova, H., Günther, O., Spiekermann, S. and Koroleva, K. (2009) ‘Privacy concernss and identity in online social networks’, Identity in the Information Society, Vol. 2, No. 1, pp.39–63.
Krasnova, H., Spiekermann, S., Koroleva, K., & Hildebrand, T. (2010). Online social networks: Why we disclose. Journal of Information Technology, 25(2), 109–125. https://doi.org/10.1057/jit.2010.6.
Krishnamurthy, B. and Wills, C.E. (2008) ‘Characterizing privacy in online social networks’, Paper presented at the Proceedings of the First Workshop on Online Social Networks.
Kügler, M., Smolnik, S., & Raeth, P. (2013). Determining the Factors Influencing Enterprise Social Software Usage : Development of a Measurement Instrument for Empirical Assessment. https://doi.org/10.1109/HICSS.2013.173.
Lankton, N.K., Tripp, J.F., 2013. A Quantitative and Qualitative Study of Facebook Privacy using the Antecedent-Privacy Concern-Outcome Macro Model.
Lee, H.; Park, H.; Kim, J. (2013). Why do people share their context information on Social Network Services? A qualitative study and an experimental study on users’ behavior of balancing perceived benefit and risk. Int J. Hum. Comput. St. 71, 862–877.
Lee, S., & Mohamad, Z. S. (2022). The Factors of Social Media Usage and Mental Health: A Study on Malaysian Adolescents. Asian Journal of Behavioural Sciences, (June). https://doi.org/10.55057/ajbs.2022.4.2.4.
Lenhart, M., Duggan, A., Perrin, A., Stepler, R., Rainie, L., & Parker, K. (2015). Teens, social media, & technology overview. Retrieved April 9, 2015, from http://www.pewinternet.org/2015/04/09/teens-social-media-technology-2015/
Leong, M., Murad, N., Teoh, S. H., & Mohamad, M. (2020). Quality of life of university students during the COVID-19 pandemic: Assessing the level of quality of life and the associated factors after the end of movement lockdown. Research Square, 1-25. doi:https://doi.org/10.21203/rs.3.rs-104496/v2.
Lin, K.-Y. & Lu, H.-P. (2011). Why people use social networking sites: An empirical study integrating network externalities and motivation theory. Computers in Human Behavior, Vol. 27, No. 3, pp. 1152–1161.
Lin, S. W., & Liu, Y. C. (2012). The effects of motivations, trust, and privacy concerns in social networking. Service Business, 6(4), 411–424. https://doi.org/10.1007/s11628-012-0158-6.
Lin, S., & Armstrong, D. J. (2019). Beyond information: The role of territory in privacy management behavior on social networking sites. Journal of the Association for Information Systems, 20(4), 434–475. https://doi.org/10.17705/1.jais.00540.
Livingstone, S., Mascheroni, G., Ólafsson, K., & Haddon, L. (2014). Children’s online risks and opportunities: Comparative findings from EU Kids online and Net Children Go Mobile. London: EU Kids Online, LSE. July. 1-70.
Lancaster G.A, Dodd. S & Williamson. P. R. (2004). Design and analysis of pilot studies: recommendations for good practice. J Eval Clin Pract, 10(2), 307–312.
Madden, Mary, Lenhart, Amanda, Cortesi, Sandra & Gasser, Urs (2013). Teens and Mobile Apps Privacy. Pew Research Center: The Berkman Center for Internet & Society at Harvard University. Retrieved from http://www.pewinternet.org/files/old-media/Files/Reports/2013/PIP_Teens%20an d%20Mobile%20Apps%20Privacy.pdf
Malaysian Communication and Multimedia Commission. Internet User Survey. Statistical Brief Numbered Twenty-Three. Retrieved 2018, from, https://www.mcmc.gov.my/skmmgovmy/media/General/pdf/Internet-Users-Survey-2018.pdf.
Malaysian Communication and Multimedia Commission (MCMC). (2020). Internet users survey 2020: Infographic. Statistics and Data Intelligence Department, Malaysian Communications and Multimedia Commission, 1–6. Retrieved from https://www.mcmc.gov.my/ms/resources/statistics/internet-users-survey.
Malaysia Sixth Most Vulnerable To Cyber Crime. Retrieved 10 May 2017, from http://says.com/my/news/malaysia-sixth-most-vulnerable-to-cyber-crime
Malaysia Internet Users (2012). Retrieved 20 December 2013 from http://www.indexmundi.com/malaysia/internet_users.html
Malhotra N.K. (2002). Marketing Research: An Applied Orientation (4th Eds). United State, MA: Pearson Education, Inc.
Malhotra, N.K., Kim, S.S. and Agarwal, J. (2004) ‘Internet users’ information privacy concernss (IUIPC): the construct, the scale, and a causal model’, Information Systems Research, Vol. 15, No. 4, pp.336–355.
Malhotra, N. K., Kim, S. S. & Patil, A. 2006. Common Method Variance in Is Research: A Comparison of Alternative Approaches and a Reanalysis of Past Research. Management Science 52(12): 1865-1883.
Marcoulides, G.A., Chin, W.W., & Saunders, C. (2009). A critical look at Partial Least Square Modeling. MIS Quarterly, 33(1), 171-175.
Martin, K. D., & Murphy, P. E. (2017). The role of data privacy in marketing. Journal of the Academy of Marketing Science, 45(2), 135–155. https://doi.org/10.1007/s11747-016-0495-4
Masele, J. J. (2022). Information Sharing in the Social Media Era. University of Dar Es Salaam Library Journal, 16(2), 202–222. https://doi.org/10.4314/udslj.v16i2.14
Mayer R.C., Davis J.H., Schoorman F.D. (1995). An integrative model of organizational trust. Academy of Management Review, 20, 709-734.
McKnight, D.H.; Lankton, N.; Tripp, J. (2011). Social Networking Information Disclosure and Continuance Intention: A Disconnect. In Proceedings of the 44th Hawaii International Conference on System Sciences (HICSS), Washington, DC, USA, 4–7, pp. 1–10.
Metzger, M. J. (2004). Privacy, trust, and disclosure: Exploring barriers to electronic commerce. Journal of Computer-Mediated Communication, Vol. 9, No. 4, pp. 1143–1168.
Meskaran, F., Ismail, Z., & Shanmugam, B. (2013). Online Purchase Intention: Effects of Trust and Security Perception. Australian Journal of Basic and Applied Sciences, 7(6), 307–315.
Mekovec, R., & Hutinski, Z. (2020). The role of perceived privacy and perceived security in online market. (June).
Mohd Azul Mohamad Salleh, Ali Salman & Nurul Madiha Mohd Ilham (2015). Kesedaran Terhadap Isu Pengawasan Sewaktu Mengguna Aplikasi Media Sosial. Journal of Social Science and Humanities, 10(2), 217-229. Retrieved from http://ejournal.ukm.my/ebangi/article/view/11259/3646. Moallem, A. (2019). Cyber Security Awareness among College Students. Advances in Intelligent Systems and Computing. 782, 79-87. doi:10.1007/978-3-319-94782-2_8.
Molla, A., Licker, P.S. (2001), “E-Commerce System Success: An Attempt to Extend and Respceify the Delone and Maclean Model of IS Success”, Journal of Electronic Commerce Research, vol. 2, no 4.
Mohamed, N. and Ahmad, I.H. (2012) ‘Information privacy concernss, antecedents and privacy measure use in social networking sites: evidence from Malaysia’, Computers in Human Behaviour, Vol. 28, No. 6, pp.2366–2375.
Mohd Sobhi, I. 2013. Part C: Mediating, Moderating & Control Variable. Workshop Handout. Universiti Utara Malaysia. Kedah, Malaysia 22 - 23 February 2013.
Mobile Apps Privacy. Pew Research Center: The Berkman Center for Internet & Society at Harvard University. Retrieved from, http://www.pewinternet.org/files/old-media/Files/Reports/2013/PIP_Teens%20and%20Mobile%20Apps%20Privacy.pdf.
Mostafa, S. A., & Ahmad, I. A. (2018). Recent developments in systematic sampling: A review. Journal of Statistical Theory and Practice, 12(2), 290–310. https://doi.org/10.1080/15598608.2017.1353456.
Mulisa, F. & Getahun, D. A. (2018). Perceived Benefits and Risks of Social Media: Ethiopian Secondary School Students’ Perspectives. Journal of Technology in Behavioral Science. 3(4), 294-300.
Mustafa, S. & Hamzah, A. (2011). Online Social Networking: A New Form of Social Interaction. International Journal of Social Science and Humanity. 1(2), 96-104.
Ministry of Education, M. (2019). Educational Planning and Research Division MINISTRY OF EDUCATION MALAYSIA With Best Compliments.
Martin, P. & Bateson, P. (1986). Measuring Behaviour: An Introductory Guide. Cambridge: Cambridge University Press.
Moon, J.W. & Kim, Y.G. (2001), "Extending the TAM for a World-Wide-Web context", Information & Management, vol. 38, no. 4, pp. 217-230.
Neuman, W.L. (2006). Social Research Methods: Qualitative and Quantitative Approaches (6th Eds). Boston, OH: Pearson Education, Inc.
Nielsen, 2011. The Southeast Asia Digital Consumer Report, June 2011. Retrieved from https://www.sphmagazines.com.sg/blog/research/sph-magazines-360/2011/the-southeast-asia-digital-consumer-by-nielsen
Nunnally, J. (1978), Psychometric theory, New York: McGraw-Hill.
Nurhilyana A. , zaid M. & aminatul (2013). Prevalence of internet usage and academic purpose among pre-degree student: a case study. Proceeding of the International Conference on Social Science Research, ICSSR 2013, 2013, pp. 1064-1070). O’Bien, D.; Torres, A. (2012). Social Networking and Online Privacy: Facebook Users’ Perceptions. Ir. J. Manag. 31, 63–97.
Olajide, A. A., & Olayiwola, J. O. (2021). Development of a Proposed Model for Online Social Media Users ’ Information Disclosure. 11(1), 1002–1016. https://doi.org/10.20533/ijisr.2042.4639.2021.0114.
Oke, A. E., Ogunsami, D. R. & Ogunlana, S. 2012. Establishing a Common Ground for the Use of Structural Equation Modelling for Construction Related Research Studies. Australasian Journal of Construction Economics and Building 12(3): 89-94.
Othman, N. F., Ahmad, R., & Yusoff, M. (2013). Information Security and Privacy Awareness in Online Social Networks among UTem Students. Journal of Human Capital Development, 6(1), 101–110. https://doi.org/10.1016/j.trd.2014.11.018.
Padyab, A., Päivärinta, T., Ståhlbröst, A., Bergvall. K & Birgitta (2019). Awareness of Indirect Information Disclosure on Social Network Sites. SAGE Journals. 1-14. Doi: 10.1177/2056305118824199.
Paramarta, V., Jihad, M., Dharma, A., Hapsari, I. C., Sandhyaduhita, P. I., Hidayanto, & Achmad, N. (2019). Impact of user awareness, trust, and privacy concernss on sharing personal information on social media: Facebook, twitter, and Instagram. 2018 International Conference on Advanced Computer Science and Information Systems, ICACSIS 2018. 271-276.
Park, J. S., Kwiat, K. A., Kamhoua, C. A., White, J., & Kim, S. (2014). Trusted online social network (osn) services with optimal data management. Computers & Security, 42:116–136.
Petronio, S. (2002). Boundary of Privacy: Dialectics of Disclosure; State University of New York Press: Albany, NY, USA.
Petronio, S., & Caughlin, J. P. (2006). Communication Privacy Management Theory: Understanding families. In D. O. Braithwaite & L. A. Baxter (Eds.), Engaging theories in family communi- cation: Multiple perspectives (pp. 35–49). Thousand Oaks, CA: Sage.
Petronio, S. (2013). Brief status report on communication privacy management theory. Journal of Family Communication, 13, 6–14.
Petronio, S.; Durham, W. (2014). Communication Privacy Management Theory: Significance for Interpersonal Communication. Engaging Theories in Interpersonal Communication: Multiple Perspectives, 2nd ed. Braithwaite, D.O., Schrodt, P., Eds.; Sage Publications: Saunders Oaks, CA, USA, 2014; pp. 335–347.
Petronio, S.; Hernandez, R. (2019). Communication Privacy Management Theory. Retrieved from https://oxfordre.com/communication/view/10.1093/acrefore/9780190228613.001.0001/acrefore-9780190228613-e-373.
Planning, Research and Policy Coordination Division, Higher Education Sector, MOE. Retrieved 31st December, 2017, from,https://www.moe.gov.my/penerbitan/1587-quick-facts-2018-malaysia-educational-statistics-1/file.
Perrin, A. (2015). Social Media Usage: 2005-2015, (October), 2005–2015. Retrieved from www.pewinternet.org/2015/10/08/social-networking-usage-2005-2015/.
Parasuraman, A. (1991), Marketing research, end edn, Addison-Wesley publishing.
Pallant, J. 2007. Spss Survival Manual: A Step-by-Step Guide to Data Analysis Using Spss for Windows. 3rd Edition. New York: Open University Press.
Podsakoff, P.M., & Organ, D.W. (1986). Self-reports in organizational research: Problems and prospects. Journal of Management, 12,69–82.
Podsakoff, P. M., Mackenzie, S. B., Lee, J.-Y. & Podsakoff, N. P. 2003. Common Method Biases in Behavioral Research: A Critical Review of the Literature and Recommended Remedies. Journal of applied psychology 88(5): 879- 903.
Podsakoff, P. M., Mackenzie, S. B. & Podsakoff, N. P. 2012. Sources of Method Bias in Social Science Research and Recommendations on How to Control It. Annual Review of Psychology 63(1): 539-569.
Pikkarainen, T., Pikkarainen, K., Karjaluoto, H. & Pahnila, S. (2004), "Consumer acceptance of online banking: an extension of the technology acceptance model", Internet research, vol. 14, no. 3, pp. 224-235.
Ramayah, T., Lee, J. W. C. & Mohamad, O. 2010. Green Product Purchase Intention: Some Insights from a Developing Country. Resources, Conservation and Recycling 54(12): 1419-1427.
Raeth, P., & Smolnik, S. (2010). Antecedents and Consequences of Corporate Weblog Usage in the Intranet : A Process Perspective. 1–10.
Ranganathan, C. and S. Sanjeev, 2007. Examining online purchase intentions in B2C ecommerce: Testing an integrated model, Information Resources Management Journal, 20(4): 48-64.
Rajan, P. M., Alam, S., Kia, K. K., & Subramaniam, C. R. S. (2021). Predicting Intercultural Communication in Malaysian Public Universities from the Perspective of Anxiety/Uncertainty Management (AUM) Theory. Journal of Intercultural Communication, 21(1), 62–79. https://doi.org/10.36923/jicc.v21i1.6.
R. Gross, A. Acquisti, & H. J. H. Ill. (2005). Information revelation and privacy in online social networks. WPES, pp. 71-80.
Reddy, K. & Reddy, E. S. (2019). Integrated approach to detect spam in social media networks using hybrid features. International Journal of Electrical and Computer Engineering (IJECE). 9(1), 562.
Reisinger, Y. & Mavondo, F. 2007. Structural Equation Modeling. Journal of Travel & Tourism Marketing 21(4): 41-71.
Rigdon, E.E. (2012), “Rethinking partial least squares path modeling: in praise of simple methods”, Long Range Planning, Vol. 45 Nos 5/6, pp. 341-358.
Rigdon, E.E., Sarstedt, M. and Ringle, C.M. (2017), “On comparing results from CB-SEM and PLS-SEM. Five perspectives and five recommendations”, Marketing Zfp, Vol. 39 No. 3, pp. 4-16.
Richter, N. F., Sinkovics, R. R., Ringle, C. M., & Schlägel, C. (2016). A critical look at the use of SEM in international business research. International Marketing Review, 33(3), 376-404. doi: https://doi.org/10.1108/IMR-04-2014-0148.
RiskBasedSecurity (2020). "Personal Data of 350,000+ Social Media Influencers and Users Compromised." Retrieved March 15, 2021 from https://www.riskbasedsecurity.com/2020/06/24/personal-data-of-350000-social-media- influencers-and-users-compromised-following-preen-me-hack/
Roloff, M. E. (1981). Interpersonal communication: The social exchange approach. Sage Publications Inc, Beverly Hills, CA.
Rousseau, D.M., Sitkin, S.B., Burt, R.S., Camerer, C. (1998). Not So Different After All: a Cross-discipline View of Trust. Acad. Manag. Rev. 23 (3), 393–404.
Rouse, A.C., & Corbitt, B. (2008). There's SEM and "SEM": A critique of the use of PLS regression in Information System research. AIS. Symposium conducted at the meeting of the 19th Australasian Conference on Information Systems, Christchurch, New Zealand.
Roscoe, J.T. (1975) Fundamental Research Statistics for the Behavioural Sciences, 2nd edition. New York: Holt Rinehart & Winston.
Ronkko, M. & Evermann, J. 2013. A Critical Examination of Common Beliefs About Partial Least Squares Path Modeling. Organizational Research Methods 16(3): 425-448.
S. Rathore, P. K. Sharma, V. Loia, Y. S. Jeong, J. H. Park. (2017). Social network security: Issues, challenges, threats, and solutions. Information Sciences, vol. 421, pp. 43-69.
Saleh Zolait, A., Al-Anizi, R., Ababneh, S., BuAsalli, F. and Butaiba, N. (2014). User awareness of social media security: The public sector framework. International Journal of Business Information Systems. 17(3), 261-282.
Surma, J. (2016). Social exchange in online social networks. the reciprocity phenomenon on Facebook. Computer Communications, 73, 342–346. https://doi.org/10.1016/j.comcom.2015.06.017
Saleh, Zakaria and Mashour, A. (2016). Evaluating Security Awareness Impact On Perceived Risk and Trust: The Case of Social Networks. International Journal in IT and Engineering, 4(5), 99–110.
Salleh M. A. M., Salman, A. & Ilham, N. M. M. (2015). Awareness towards the issue of surveilance in using Social Media applications. Journal of Social Science and Humanities. 10(2), 217-229.
Salaway, G., Caruso, J. B., & Introduction, R. N. (2007). 2007 The ECAR Study of Undergraduate Students and Information Technology , 2007. 6.
Schrobsdorff, S. (2006) “Predators Playground?” in Newsweek, January 27, 2006. Schumacker, R. E. & Lomax, R. G. 2004. A Beginner's Guide to Structural Equation Modeling. Second edition. Lawrence Erlbaum Associates.
Symantec. (2016). Cybersecurity Threats: The Risk Is Real In Malaysia. Retrieved November30, 2016, from http://www.malaysiandigest.com/technology/605954-cybersecurity- threats-the-risk-is-real-in-malaysia.
Salam, A. F., Rao, H. R., & Pegels, C. C. (1998). An investigation of consumer- perceived risk on electronic commerce transactions: The role of institutional trust, and economic incentive in a social exchange framework. In Paper presented at Americas conference on information systems. Baltimore, MD, USA.
Saunders, M., Lewis, P. and Thornhill, A. (2007). Research Methods for Business Students. (4th Edition), Financial Times Prentice Hall, Edinburgh Gate, Harlow.
Saunders, M., Lewis, P. & Thornhill, A. (2012). Research Methods for Business Students (6th Ed). London: Pearson Education.
Savolainen, R. (2017). Information sharing and knowledge sharing as communicative activities. Information Research, 22(3), 767.
Sharbaugh, P. and Le Trang, P.T. (2012) What’s Mine Is Yours: An Exploratory Study of Online Personal Privacy in the Socialist Republic of Vietnam, Unpublished work in International Communication Association 2012, Phoenix.
Shiau, W. L., & Luo, M. M. (2012). Factors affecting online group buying intention and satisfaction: A social exchange theory perspective. Computers in Human Behavior, 28(6), 2431–2444. https://doi.org/10.1016/j.chb.2012.07.030
Salkind, N. J. (1997). Exploring research (3rded.). Upper Saddle River, NJ: Prentice Hall.
Sekaran, U. (2003). Research Method for Business Student (3rd Eds). Harlow, MA: Financial Times Prentice Hall/Pearson Education.
Sekaran, U. (2000), Research Methods for Business: A Skill Building Approach, John Wiley and Sons.
Selwyn, N. 2013. Social Media in Higher Education. Europa World Learning.1:1-10. Shin, D. (2010). The effects of trust, security and privacy in social networking: A security-based approach to understand the pattern of adoption. Interacting with Computers. 22(5), 428-438.
Skeels, M. M., &Grudin, J. (2009, May). When Social Networks Cross Boundaries: A Case Study Of Workplace Use Of Facebook And Linkedin. In Proceedings Of The ACM 2009 International Conference On Supporting Group Work.ACM.95-104.
Slusky L. & Partow-Navid P. (2014) Students Information Security Practices and Aware- ness. Journal of Information Privacy and Security. 3-26. Retrieved July 7, 2014, from http://www.tandfonline.com/doi/abs/10.1080/15536548.2012.10845664.
Social Media – Statistics & Facts. Global social penetration rate. Retrieved September 4, 2019, from https://www.statista.com/topics/1164/social-networks/.
Sriratanaviriyakul, N., Nkhoma, M., Felipe, A. L., Cao, T. K., Ha Tran, Q., Epworth, R., … Quang, H. Le. (2017). ASEAN users’ privacy concernss and security in using online social networks. International Journal of Electronic Security and Digital Forensics, 9(1), 84–99. https://doi.org/10.1504/IJESDF.2017.081787
Saunders, M., Lewis, P. & Thornhill, A. 2009. Research Methods for Business Students. 5th edition. Essex: Pearson Education Limited.
Stutzman, F. (2006) ‘An evaluation of identity-sharing behavior in social network communities’, International Digital and Media Arts Journal, Vol. 3, No. 1, pp.10–18.
Tan, X., Qin, L., Kim, Y. and Hsu, J. (2012) ‘Impact of privacy concerns in social networking web sites’, Internet Research, Vol. 22, No. 2, pp.211–233.
Taddei, S., & Contena, B. (2013). Privacy, trust and control: Which relationships with online self-disclosure? Computers in Human Behavior. 29(3), 821–826.
Teong, K. V., & Ang, M. C. H. (2016). Internet Use and Addiction among Students in Malaysian Public Universities in East Malaysia: Some Empirical Evidence. Journal of Management Research, 8(2), 31. https://doi.org/10.5296/jmr.v8i2.9092.
Tess, P. A. (2013). The Role of Social Media in Higher Education Classes (Real and Virtual)–A Literature Review. Computers in Human Behavior. 29(5):60-68.
Tuunainen V. K., Pitkanen, O. and Hovi, M. (2009). Users’ Awareness of Privacy on Online Social Networking Sites — Case Facebook. 22nd Bled eConference eEnablement: Facilitating an Open, Effective and Representative eSociety.
Teijlingen van, E.; Rennie, A. M.; Hundley, V.; Graham, W. 2001. The importance of conducting and reporting pilot studies: the example of the Scottish Births Survey, Journal of Advanced Nursing 34(3): 289–295. http://dx.doi.org/10.1046/j.1365?2648.2001.01757.x
Tabachnick, B. G. & Fidell, L. S. 2007. Using Multivariate Statistics. 5th edition. Boston, MA: Pearson Education. Inc.
Tabachnick, B. & Fidell, L. (2001), “Using multivariate statistics”, Boston: Allyn and Bacon.
Urbach, N. & Ahlemann, F. 2010. Structural Equation Modeling in Information Systems Research Using Partial Least Squares. Journal of Information Technology Theory and Application (JITTA) 11(2): 5-40.
Urbonavicius, S., Degutis, M., Zimaitis, I., Kaduskeviciute, V., & Skare, V. (2021). From social networking to willingness to disclose personal data when shopping online: Modelling in the context of social exchange theory. Journal of Business Research, 136(December 2020), 76–85. https://doi.org/10.1016/j.jbusres.2021.07.031
Vemprala, N., & Dietrich, G. (2019). A Social Network Analysis (SNA) Study On Data Breach Concernss Over Social Media. Proceedings of the 52nd Hawaii International Conference on System Sciences, 6, 7186–7193. https://doi.org/10.24251/hicss.2019.862
Van De Garde-Perik, E., Markopoulos, P., De Ruyter, B., Eggen, B. and Ijsselsteijn, W. (2008) ‘Investigating privacy attitudes and behavior in relation to personalization’, Social Science Computer Review, Vol. 26, No. 1, pp.20–43.
Vesel, P. & Zabkar, V. 2010. Comprehension of Relationship Quality in the Retail Environment. Managing Service Quality 20(3): 213-235.
Venkatesh, V., Davis, F.D., (2000), “Theoretical extension of the technology acceptance model: four longitudinal field studies”, Management Science, Vol. 46(2): 186-204.
Wan Mohamad Asyraf Bin Wan Afthanorhan. (2013). A Comparison of Partial Least Square Structural Equation Modeling (PLS-SEM) and Covariance Based Structural Equation Modeling (CB-SEM) for Confirmatory Factor Analysis. International Journal of Engineering Science and Innovative Technology (IJESIT), 2(5), 9.
Wang, Y.S., Wang, Y.M., Lin, H.H. & Tang, T.I. (2003), "Determinants of user acceptance of Internet banking: an empirical study", International Journal of Service Industry Management, vol. 14, no. 5, pp. 501-519.
Wetzels, M., Odekerken-Schroder, G., & van Oppen, C. (2009). Using PLS path modeling for assessing hiererchical construct models: Guidelines and empirical illustration. MIS Quarterly, 33(1), 177-195.
Wild, J. A. Cant, M. C. and Nell, C. E. (2014). Perceptions and Uses of Social Media Networking Systems By South African Students. International Business & Economics Research Journal (IBER). 13(4):715-726.
Willoughby, M. (2018). A review of the risks associated with children and young people’s social media use and the implications for social work practice. Journal of Social Work Practice. 0533(5), 1-14.
Waters, S., & Ackerman, J. (2011). Exploring privacy management on Facebook: motivations and perceived consequences of voluntary disclosure. Journal of Computer-Mediated Communication, 17(1), 101-115.
Widjaja, A. E., Chen, J. V., Sukoco, B. M., & Ha, Q. A. (2019). Understanding users’ willingness to put their personal information on the personal cloud-based storage applications: An empirical study. Computers in Human Behavior, 91(September 2018), 167–185. https://doi.org/10.1016/j.chb.2018.09.034.
Wu, I. L., Chuang, C. H., & Hsu, C. H. (2014). Information sharing and collaborative behaviors in enabling supply chain performance: A social exchange perspective. International Journal of Production Economics, 148, 122–132. https://doi.org/10.1016/j.ijpe.2013.09.016.
Yahia, I. B, Al-Neama, N. & Kerbache, L. (2018). Investigating the drivers for social commerce in social media platforms: Importance of trust, social support and the platform perceived usage. Journal of Retailing and Consumer Services 11-19. 10.1016/j.jretconser.2017.10.021.
Yang, J., Wang, J., Wong, C.W.Y., Lai, K.H. (2008). Relational stability and alliance performance in supply chain. Omega 36 (4), 600–608.
Yang, X. (2019). How perceived social distance and trust influence reciprocity expectations and eWOM sharing intention in social commerce. Industrial Management & Data Systems, 119(4), 867–880. https://doi.org/10.1108/IMDS-04-2018-0139.
Yin, R.K. (1994), Case Study Research: Design and Methods, Sage, Beverley Hills, CA.
Yuen Meikeng, Lim May Lee, & Clarissa Say, (2018). Our teens are bullies. Retrieved 18 March, 2018, from https://www.thestar.com.my/news/nation/2018/03/18/behaving-badly-in-cyberspace-malaysian-teens-more-likely-to-be-cyberbullies-than-victims-says-study.
Yusliza Yakimir Abd Talib (2015, November 25). Always keep your identity safe. Retrieved from http://www.hmetro.com.my/node/95657?m=1.
Yvette Reisinger, & Mavondo, F. (2008). Structural Equation Modeling : Critical Issues and New Developments. Journal of Travel & Tourism Marketing, (July 2013), 37–41. https://doi.org/10.1300/J073v21n04.
Zhou, T., Li, H. (2014). Understanding mobile SNS continuance usage in China from the perspectives of social influence and privacy concerns. Comput. Hum. Behav. 37, 283–289.
Zikmund, W.G. (2003). Business Research Methods (7th Eds). Mason, OH: South Western/Thompson.
Zikmund, W. G. (2000). Business research methods (6th ed.). FL: The Dryden Press.
Zikmund, W. G. & Babin, B. J. 2006. Exploring Marketing Research. Mason, Ohio: Thomson South-Western.
Zlatolas, L. N., Welzer, T., Hericko, M. & Hölbl, M. (2015). Privacy antecedents for SNS self-disclosure: The case of Facebook. Computers in Human Behavior. 45, 158-167.
Zlatolas, L. N., Welzer, T., Hölbl, M., & Heri., M. (2019). A Model of Perception of Privacy , Trust , and Self-Disclosure on Online Social Networks. Entropy, 21, 772. doi:10.3390/e21080772.
Zainol, Z., (2018). Structural equation modeling using AMOS: A step by step approach. Malaysia.
Zakaria, M. H., Watson, J., & Edwards, S. L. (2010). Investigating the use of Web 2.0 technology by Malaysian students. Multicultural Education & Technology Journal, 4(1), 17–29.
Zainol, Z., Omar, N. A., Osman, J., & Habidin, N. F. (2016). The Effect of Customer–Brand Relationship Investments’ Dimensions on Customer Engagement in Emerging Markets. Journal of Relationship Marketing, 15(3), 172–199. https://doi.org/10.1080/15332667.2016.1209051
Zaefarian, G., Henneberg, S. C. & Naudé, P. 2013. Assessing the Strategic Fit between Business Strategies and Business Relationships in Knowledge- Intensive Business Services. Industrial Marketing Management 42(2): 260- 272.
Zainudin, A. 2012. Research Methodology and Data Analysis. 2nd edition. Shah Alam, Selangor: UiTM Press.
Zlatolas, L. N., Hrgarek, L., Welzer, T., & Hölbl, M. (2022). Models of Privacy and Disclosure on Social Networking Sites: A Systematic Literature Review. Mathematics, 10(1). https://doi.org/10.3390/math10010146
|
This material may be protected under Copyright Act which governs the making of photocopies or reproductions of copyrighted materials. You may use the digitized material for private study, scholarship, or research. |