SlideShare une entreprise Scribd logo
1  sur  18
Télécharger pour lire hors ligne
Master Thesis




The influence of cultural values on the adoption of privacy
          threatening features in social networks

   A first approach measuring culture and information technology user
           acceptance,
           acceptance in the environment of social network sites




Rosa Rudó Mauné
Advisor: Ph.D Francesc Miralles Torner
November 11th 2011
           11th,
Agenda


•   Introduction

•   Motivation

•   Key aspects of the Literature Review

•   Research Question

•   Hypotheses and Model

•   Research Design

•   Results

•   Discussion

•   Conclusions and Further Steps

                                    2
Introduction


•   Social network sites (SNS), such as Facebook, LinkedIn,
    MySpace, etc., offer broad functionalities: sharing photos,
    telephone numbers, etc.
•   Some of these functionalities have personal information uploaded
    from the users.
•   A voluntary or an involuntary disclosure of personal information is
    due to th
    d t the usage of privacy th t i f t
                       f i      threatening features:
     – Those features need personal information to be used.
•   The usage of these privacy threatening features can harm users.
     – For instance:
         • A teacher from Georgia was fired (Abc2 2009, Kypost 2009).
     – This is not an isolated case there are some more cases (BBC 2010
                               case,                               2010,
       FacebookNoticias 2009).


                                       3
Motivation



•   There is social anxiety about the harm that privacy threatening
    features can cause, it can be seen in:
     – Government warnings.
                  warnings
     – Newspapers.


•   However, it is not enough as can be seen in the news.

•   Therefore, what has been done and what will b d
    Th f        h th b       d        d h t ill be done i thi
                                                            in this
    knowledge area is relevant for society in order to minimize
    damage.




                                    4
Key aspects of the Literature Review (1/3)

•   Privacy threatening features can be studied from the perspective of
    IT user acceptance theories since these theories study the factors
                        theories,
    that allow a technology to be adopted.

•   According to Leidner and Kayworth (2006), culture influences the
    user acceptance of IT.

•   The main research areas of this research project are:
     – User acceptance theories of Information Technologies (IT).
     – Culture.



                                  influences         IT User
                    Culture                        Acceptance
                              Leidner & Kayworth
                                     2006


                                      5
Key aspects of the Literature Review (2/3)



                                influences         IT User
                 Culture                         Acceptance
                            Leidner & Kayworth
                                   2006


    •   Schwartz’s model (Schwartz 1992):
        – 10 values: Self-direction, Stimulation, Conformity, etc.
                                   ,            ,          y,


    •   Hofstede’s framework (Hofstede 1980):
        – Dorfman and Howell (1988)  individual level.
        – Constructs: Power Distance, Uncertainty Avoidance, Individualism,
          Masculinity, and Long- versus Short- term Orientation.
        – Bagchi et al. (2003) studied the Hofstede’s constructs that have more
          influence on IT user acceptance.
        – Hwang (2004)  Open Cultural Orientation.
                                    6
Key aspects of the Literature Review (3/3)



                               influences         IT User
                 Culture                        Acceptance
                           Leidner & Kayworth
                                  2006




    •   Theory of Planned Behavior (TPB) (Ajzen 1985).
        – Constructs: Attitude toward the Behavior, Subjetive Norm and
          Perceived Behavioral Control.
    •   Technology Acceptance Model (TAM) (Davis 1986)
                                                 1986).
        – Constructs: Perceived Usefulness and Perceived Ease of Use.
    •   Unified Theory of Acceptance and Use of Technology (UTAUT)
        (Venkatesh et al. 2003).
        – Constructs: Performance Expectancy, Effort Expectancy, Social
          Influence and Faciltating Conditions.
                                   7
Research Question


                   influences             IT User
     Culture                            Acceptance
               Leidner & Kayworth
                      2006

                                    •   e commerce
                                        e-commerce (Gefen & Straub 2000)
                                    •   Internet banking (Tan & Teo 2000)
                                    •   3G mobile communications (Wu et al. 2007)




    Do individual’s l
    D i di id l’ cultural values i fl
                           l l     influence the
                                              h
    adoption of privacy threatening features in
                  social networks?
                     i l       k ?

                                        8
Hypotheses and Model


                                              Perceived 
   Individualism
                                              Usefulness


                    H1+                 H4+                 H7+




                             Open 
      Power        H2‐                  H5+    Perceived    H8+   Behavioral    H10+
                           Cultural                                                    Use
     Distance                                 Ease of Use          Intention
                          Orientation



                    H3‐                 H6‐
                                                            H9+




   Uncertainty                                   Social 
   Avoidance                                   Influence




CULTURE: Open Cultural Orientation             IT USER ACCEPTANCE: Simplified UTAUT
         (Hwang 2004)                                   (Venkatesh et al. 2003)


                                              9
Research Design (1/2)


•   Social Network Site  Facebook (750 m. of active users in July
                                        m
    2011 (Facebook 2011).

•   Qualitative versus quantitative approach:
     – Quantitative approach, since it is going to offer more accurate results
       of the proposed objectives (Easterby-Smith et al. 2008).
                                  (Easterby Smith


•   According to the quantitative approach and the objective of the
    research, th possible options are:
           h the      ibl    ti
     – Multiple regression.
     – Structural Equation Modeling (SEM).
                   q              g(    )
         • Covariance-based SEM.
         • Partial Least Squares (PLS).


                                      10
Research Design (2/2)

•   Implementation of the research method (PLS):
    – Data Collection  Questionnaire
                        Questionnaire.
        • The questionnaire was based on the literature review and improved with
          workshops, focus groups, etc. in order to achieve content validity.


    – Sampling:
        • 66 students from La Salle (Ramon Llull University)  International
          students of Business management bachelor
                                          bachelor.
            – 62 with Facebook profile.
            – 4 with no Facebook profile.
        • 87 students from Cracow University of Economics  National students
          of Business management bachelor.
            – 61 with Facebook profile (1 with patterns in the response).
            – 26 with no Facebook profile.
        • Number of samples > 30  They are enough to use PLS.




                                            11
Results - Introduction


•   Developed with smartPLS tool
                            tool.
    – http://www.smartpls.de


•   Steps:
    – Bootstrapping:
        • 500 bootstrap re-sample as recommended Chin (1998)
                          re sample                       (1998).
        • Estimates t-values of the model  Significance level.
    – Measurement model:
        • Convergent validity: Average Variance Extracted (AVE)
                                                           (AVE).
        • Discriminant validity: loadings of CFA and Fornell-Lackers Criterion.
        • Reliability: Cronbach’s Alpha and Composite reliability
    – St
      Structural model:
           t   l   d l
        • Path coefficients (~ regression coefficients).
        • Explained variance (R2).

                                        12
Results of La Salle, URL, sample


                                                                      Perceived
                                                                      Percei ed
Individualism                                                         Usefulness


                     H1+                           H4+                                        H7+
                       -0.274*                 0.506***                                         0.281*




   Power
   P                                Open                              Perceived                               Behavioral
                                                                                                              B h i l                                  Use
                                                                                                                                                       U
                   H2-            Cultural            H5+              Ease of                H8+                                   H10+
  Distance                                                                                                     Intention                             R2=0.337
                  0.192(ns)      Orientation        0.475***            Use                 0.058(ns)                              0.580***




                      H3-                             H6-
                                                      H6                                      H9+
                -0.125(ns)                             -0.260(ns)                        0.307**                                     Lack of reliability &
                                                                                                                                     convergent validity

                                   No significant
 Uncertainty                           item                              Social
 Avoidance                                                             Influence



                                                                    “ns”: no significance, * 10% significant level, ** 5% significant level, *** 1% significant level




                                                                    13
Results of Cracow University of Economics sample


                                             Lack of
                                                                            Perceived
Individualism                               reliability
                                                                            Usefulness


                     H1+                                  H4+                                       H7+
                       0.190(ns)                      0.087(ns)                                       0.289*




   Power
   P                                  Open                                  Perceived                               Behavioral
                                                                                                                    B h i l                                  Use
                                                                                                                                                             U
                   H2-              Cultural                H5+              Ease of                H8+                                   H10+
  Distance                                                                                                           Intention                             R2=0.372
                  0.257(ns)        Orientation            0.072(ns)           Use                 0.183(ns)                              0.554***




                     H3
                     H3-                                    H6-                                     H9+
                0.270**                                      -0.172(ns)                        -0.131(ns)                                  Lack of reliability &
                                                                                                                                           convergent validity


 Uncertainty                                                                   Social
 Avoidance                     Lack of                                       Influence
                              reliability


                                                                          “ns”: no significance, * 10% significant level, ** 5% significant level, *** 1% significant level




                                                                          14
Discussion

•   La Salle (URL) sample:
    – H4 H5 and H7 are supported
      H4,                supported.
    – H1 is not supported.
•   Cracow University of Economics sample:
    – Lack of statistical validity and reliability.
         • English comprehension difficulties.
         • Non-validated questionnaire with this sample.

•   Regarding the measurement tool:
    – Culture constructs:
         • New socio-technological environment related to initial design (1980).
         • Focused on professional employees of a multinational company.
    – IT user acceptance constructs:
         • Social Influence is not as relevant as it used to be.
         • Perceived Ease of Use does not matter for today’s higher education
           students.
                                         15
Limitations


•   Method limitations:
     – Cultural models lack a comprehensive understanding.
     – Limited possibility of an in-depth analysis of the relationship between
       constructs.


•   Design research limitations:
     es g esea c        tat o s
     – Trust and Attitude were not considered.
     – Only one SNS: Facebook.
     – Affew privacy threatening features are considered.
                i     th    t i f t                id d
     – Privacy threatening features can be used consciously and
       unconsciously.
     – Only students behavior is studied.
     – Results cannot be generalized.


                                      16
Conclusions and Further Steps

•   Conclusions about the research:
     – A questionnaire that measures students culture is proposed.
                                                          proposed
     – IT Acceptance models have been improved and tested by introducing
       individual cultural attributes in SNS environment.
•   Conclusions about th master thesis:
    C   l i      b t the    t th i
     – A comprehensive understanding of SEM methods have been
       acquired.
     – A formal research methodology approach has been applied to a
       quantitative design.


•   A starting point for further research:
     – Improving the study of culture at individual level in social media
       environment.
          i        t
     – Improving the models of IT user acceptance in social media
       environment.

                                      17
Questions and Comments




                         Rosa Rudó Mauné
                         Innova I tit t - L S ll
                         I      Institute La Salle
                            Ramon Llull University
                         Barcelona (Spain)



                         E mail:
                         E-mail:
                         rrudo@salleurl.edu

Contenu connexe

En vedette

Gift of the Sultan gift away terms and Conditions
Gift of the Sultan gift away terms and ConditionsGift of the Sultan gift away terms and Conditions
Gift of the Sultan gift away terms and ConditionsQma Markdept
 
Quacera Early Warning Report
Quacera Early Warning Report Quacera Early Warning Report
Quacera Early Warning Report Quacera L.L.C.
 
History of Olympics Press Release (English) 14.2.12
History of Olympics Press Release (English) 14.2.12History of Olympics Press Release (English) 14.2.12
History of Olympics Press Release (English) 14.2.12Qma Markdept
 
3,2,1...Let's get connected!
3,2,1...Let's get connected!3,2,1...Let's get connected!
3,2,1...Let's get connected!vipremitic
 
Venäjän ja eu 26032013
Venäjän ja eu 26032013Venäjän ja eu 26032013
Venäjän ja eu 26032013Matti Leskinen
 
Seasonal variations in water quality index of sirhind canal passing through m...
Seasonal variations in water quality index of sirhind canal passing through m...Seasonal variations in water quality index of sirhind canal passing through m...
Seasonal variations in water quality index of sirhind canal passing through m...eSAT Publishing House
 

En vedette (8)

Gift of the Sultan gift away terms and Conditions
Gift of the Sultan gift away terms and ConditionsGift of the Sultan gift away terms and Conditions
Gift of the Sultan gift away terms and Conditions
 
Quacera Early Warning Report
Quacera Early Warning Report Quacera Early Warning Report
Quacera Early Warning Report
 
History of Olympics Press Release (English) 14.2.12
History of Olympics Press Release (English) 14.2.12History of Olympics Press Release (English) 14.2.12
History of Olympics Press Release (English) 14.2.12
 
3,2,1...Let's get connected!
3,2,1...Let's get connected!3,2,1...Let's get connected!
3,2,1...Let's get connected!
 
Mal lawal eng
Mal lawal engMal lawal eng
Mal lawal eng
 
Venäjä tietoisku - Russia WTO tariffs
Venäjä tietoisku - Russia WTO tariffsVenäjä tietoisku - Russia WTO tariffs
Venäjä tietoisku - Russia WTO tariffs
 
Venäjän ja eu 26032013
Venäjän ja eu 26032013Venäjän ja eu 26032013
Venäjän ja eu 26032013
 
Seasonal variations in water quality index of sirhind canal passing through m...
Seasonal variations in water quality index of sirhind canal passing through m...Seasonal variations in water quality index of sirhind canal passing through m...
Seasonal variations in water quality index of sirhind canal passing through m...
 

Similaire à R. Rudó

Developing Staff Competencies in Emerging Technologies
Developing Staff Competencies in Emerging TechnologiesDeveloping Staff Competencies in Emerging Technologies
Developing Staff Competencies in Emerging TechnologiesDouglas Joubert
 
Representing and Evaluating Social Context on Mobile Devices
Representing and Evaluating Social Context on Mobile DevicesRepresenting and Evaluating Social Context on Mobile Devices
Representing and Evaluating Social Context on Mobile DevicesKris Mihalic
 
2015-10-14 research seminar 2
2015-10-14 research seminar 22015-10-14 research seminar 2
2015-10-14 research seminar 2ifi8106tlu
 
Working with Social Media Data: Ethics & good practice around collecting, usi...
Working with Social Media Data: Ethics & good practice around collecting, usi...Working with Social Media Data: Ethics & good practice around collecting, usi...
Working with Social Media Data: Ethics & good practice around collecting, usi...Nicola Osborne
 
The Next 25 Years of HCI Research: Technology-Mediated Social Participation
The Next 25 Years of HCI Research: Technology-Mediated Social ParticipationThe Next 25 Years of HCI Research: Technology-Mediated Social Participation
The Next 25 Years of HCI Research: Technology-Mediated Social ParticipationUniversity of Maryland
 
Developing Staff Competencies in Emerging Technologies
Developing Staff Competencies in Emerging TechnologiesDeveloping Staff Competencies in Emerging Technologies
Developing Staff Competencies in Emerging TechnologiesDouglas Joubert
 
Getting from There to Here: Eight Characteristics of Effective Economic & Com...
Getting from There to Here: Eight Characteristics of Effective Economic & Com...Getting from There to Here: Eight Characteristics of Effective Economic & Com...
Getting from There to Here: Eight Characteristics of Effective Economic & Com...Community Development Society
 
Getting from Here to There: Eight Characteristics of Effective Economic & Com...
Getting from Here to There: Eight Characteristics of Effective Economic & Com...Getting from Here to There: Eight Characteristics of Effective Economic & Com...
Getting from Here to There: Eight Characteristics of Effective Economic & Com...Community Development Society
 
Getting from Here to There: Eight Characteristics of Effective Economic & Com...
Getting from Here to There: Eight Characteristics of Effective Economic & Com...Getting from Here to There: Eight Characteristics of Effective Economic & Com...
Getting from Here to There: Eight Characteristics of Effective Economic & Com...Community Development Society
 
Getting from Here to There: Eight Characteristics of Effective Economic & Com...
Getting from Here to There: Eight Characteristics of Effective Economic & Com...Getting from Here to There: Eight Characteristics of Effective Economic & Com...
Getting from Here to There: Eight Characteristics of Effective Economic & Com...Scott Hutcheson, Ph.D.
 
On data-driven systems analyzing, supporting and enhancing users’ interaction...
On data-driven systems analyzing, supporting and enhancing users’ interaction...On data-driven systems analyzing, supporting and enhancing users’ interaction...
On data-driven systems analyzing, supporting and enhancing users’ interaction...Grial - University of Salamanca
 
Interaction design: desiging user interfaces for digital products
Interaction design: desiging user interfaces for digital productsInteraction design: desiging user interfaces for digital products
Interaction design: desiging user interfaces for digital productsDavid Little
 
Muller - Grounded Theory Method (revised 2012)
Muller - Grounded Theory Method (revised 2012)Muller - Grounded Theory Method (revised 2012)
Muller - Grounded Theory Method (revised 2012)Michael Muller
 
Grounded Theory Method - Muller
Grounded Theory Method - MullerGrounded Theory Method - Muller
Grounded Theory Method - MullerMichael Muller
 
Extreme Citizen Science technologies: attempting to embed values in code
Extreme Citizen Science technologies: attempting to embed values in codeExtreme Citizen Science technologies: attempting to embed values in code
Extreme Citizen Science technologies: attempting to embed values in codeMuki Haklay
 
University of North Carolina talk 28 May 2012
University of North Carolina talk 28 May 2012University of North Carolina talk 28 May 2012
University of North Carolina talk 28 May 2012Chris Batt
 
Phd defence-pvalente
Phd defence-pvalentePhd defence-pvalente
Phd defence-pvalentePedro Valente
 

Similaire à R. Rudó (20)

Developing Staff Competencies in Emerging Technologies
Developing Staff Competencies in Emerging TechnologiesDeveloping Staff Competencies in Emerging Technologies
Developing Staff Competencies in Emerging Technologies
 
Representing and Evaluating Social Context on Mobile Devices
Representing and Evaluating Social Context on Mobile DevicesRepresenting and Evaluating Social Context on Mobile Devices
Representing and Evaluating Social Context on Mobile Devices
 
2015-10-14 research seminar 2
2015-10-14 research seminar 22015-10-14 research seminar 2
2015-10-14 research seminar 2
 
Working with Social Media Data: Ethics & good practice around collecting, usi...
Working with Social Media Data: Ethics & good practice around collecting, usi...Working with Social Media Data: Ethics & good practice around collecting, usi...
Working with Social Media Data: Ethics & good practice around collecting, usi...
 
The Next 25 Years of HCI Research: Technology-Mediated Social Participation
The Next 25 Years of HCI Research: Technology-Mediated Social ParticipationThe Next 25 Years of HCI Research: Technology-Mediated Social Participation
The Next 25 Years of HCI Research: Technology-Mediated Social Participation
 
Developing Staff Competencies in Emerging Technologies
Developing Staff Competencies in Emerging TechnologiesDeveloping Staff Competencies in Emerging Technologies
Developing Staff Competencies in Emerging Technologies
 
Getting from There to Here: Eight Characteristics of Effective Economic & Com...
Getting from There to Here: Eight Characteristics of Effective Economic & Com...Getting from There to Here: Eight Characteristics of Effective Economic & Com...
Getting from There to Here: Eight Characteristics of Effective Economic & Com...
 
Getting from Here to There: Eight Characteristics of Effective Economic & Com...
Getting from Here to There: Eight Characteristics of Effective Economic & Com...Getting from Here to There: Eight Characteristics of Effective Economic & Com...
Getting from Here to There: Eight Characteristics of Effective Economic & Com...
 
Getting from Here to There: Eight Characteristics of Effective Economic & Com...
Getting from Here to There: Eight Characteristics of Effective Economic & Com...Getting from Here to There: Eight Characteristics of Effective Economic & Com...
Getting from Here to There: Eight Characteristics of Effective Economic & Com...
 
Getting from Here to There: Eight Characteristics of Effective Economic & Com...
Getting from Here to There: Eight Characteristics of Effective Economic & Com...Getting from Here to There: Eight Characteristics of Effective Economic & Com...
Getting from Here to There: Eight Characteristics of Effective Economic & Com...
 
ICS2208 Lecture 5
ICS2208 Lecture 5ICS2208 Lecture 5
ICS2208 Lecture 5
 
On data-driven systems analyzing, supporting and enhancing users’ interaction...
On data-driven systems analyzing, supporting and enhancing users’ interaction...On data-driven systems analyzing, supporting and enhancing users’ interaction...
On data-driven systems analyzing, supporting and enhancing users’ interaction...
 
U mpres
U mpresU mpres
U mpres
 
Interaction design: desiging user interfaces for digital products
Interaction design: desiging user interfaces for digital productsInteraction design: desiging user interfaces for digital products
Interaction design: desiging user interfaces for digital products
 
Internet studies
Internet studiesInternet studies
Internet studies
 
Muller - Grounded Theory Method (revised 2012)
Muller - Grounded Theory Method (revised 2012)Muller - Grounded Theory Method (revised 2012)
Muller - Grounded Theory Method (revised 2012)
 
Grounded Theory Method - Muller
Grounded Theory Method - MullerGrounded Theory Method - Muller
Grounded Theory Method - Muller
 
Extreme Citizen Science technologies: attempting to embed values in code
Extreme Citizen Science technologies: attempting to embed values in codeExtreme Citizen Science technologies: attempting to embed values in code
Extreme Citizen Science technologies: attempting to embed values in code
 
University of North Carolina talk 28 May 2012
University of North Carolina talk 28 May 2012University of North Carolina talk 28 May 2012
University of North Carolina talk 28 May 2012
 
Phd defence-pvalente
Phd defence-pvalentePhd defence-pvalente
Phd defence-pvalente
 

Plus de Innova Institute at La Salle Campus Barcelona

Plus de Innova Institute at La Salle Campus Barcelona (12)

Social Media engagement as an e-commerce driver, a consumer behavior perspect...
Social Media engagement as an e-commerce driver, a consumer behavior perspect...Social Media engagement as an e-commerce driver, a consumer behavior perspect...
Social Media engagement as an e-commerce driver, a consumer behavior perspect...
 
Teaching and Coaching Innovation - NITIM Research Seminar Barcelona
Teaching and Coaching Innovation - NITIM Research Seminar BarcelonaTeaching and Coaching Innovation - NITIM Research Seminar Barcelona
Teaching and Coaching Innovation - NITIM Research Seminar Barcelona
 
¿Cómo las patentes están modelando la industria móvil? - Enric Batalla
¿Cómo las patentes están modelando la industria móvil? - Enric Batalla¿Cómo las patentes están modelando la industria móvil? - Enric Batalla
¿Cómo las patentes están modelando la industria móvil? - Enric Batalla
 
Club de Innovacion La Salle - AMETIC: El futuro de la TV (Mayo 2013)
Club de Innovacion La Salle - AMETIC: El futuro de la TV (Mayo 2013)Club de Innovacion La Salle - AMETIC: El futuro de la TV (Mayo 2013)
Club de Innovacion La Salle - AMETIC: El futuro de la TV (Mayo 2013)
 
Programa II MiniWorkshop 2012/13
Programa II MiniWorkshop 2012/13Programa II MiniWorkshop 2012/13
Programa II MiniWorkshop 2012/13
 
Treballs mind map
Treballs mind mapTreballs mind map
Treballs mind map
 
Research MiniWorkshop 2012
Research MiniWorkshop 2012Research MiniWorkshop 2012
Research MiniWorkshop 2012
 
Emprendimiento tecnológico: mitos y retos
Emprendimiento tecnológico: mitos y retosEmprendimiento tecnológico: mitos y retos
Emprendimiento tecnológico: mitos y retos
 
Workshop CENIT Social Media
Workshop CENIT Social MediaWorkshop CENIT Social Media
Workshop CENIT Social Media
 
Canals Social Media - Workshop
Canals Social Media - WorkshopCanals Social Media - Workshop
Canals Social Media - Workshop
 
F.Giones, Z.Zhou, F.Miralles & B.Katzy - ISPIM Conference 2012
F.Giones, Z.Zhou, F.Miralles & B.Katzy - ISPIM Conference 2012F.Giones, Z.Zhou, F.Miralles & B.Katzy - ISPIM Conference 2012
F.Giones, Z.Zhou, F.Miralles & B.Katzy - ISPIM Conference 2012
 
F.Miralles & C.Riverola - ISPIM Conference 2012
F.Miralles & C.Riverola - ISPIM Conference 2012F.Miralles & C.Riverola - ISPIM Conference 2012
F.Miralles & C.Riverola - ISPIM Conference 2012
 

Dernier

"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DayH2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DaySri Ambati
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 

Dernier (20)

"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DayH2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 

R. Rudó

  • 1. Master Thesis The influence of cultural values on the adoption of privacy threatening features in social networks A first approach measuring culture and information technology user acceptance, acceptance in the environment of social network sites Rosa Rudó Mauné Advisor: Ph.D Francesc Miralles Torner November 11th 2011 11th,
  • 2. Agenda • Introduction • Motivation • Key aspects of the Literature Review • Research Question • Hypotheses and Model • Research Design • Results • Discussion • Conclusions and Further Steps 2
  • 3. Introduction • Social network sites (SNS), such as Facebook, LinkedIn, MySpace, etc., offer broad functionalities: sharing photos, telephone numbers, etc. • Some of these functionalities have personal information uploaded from the users. • A voluntary or an involuntary disclosure of personal information is due to th d t the usage of privacy th t i f t f i threatening features: – Those features need personal information to be used. • The usage of these privacy threatening features can harm users. – For instance: • A teacher from Georgia was fired (Abc2 2009, Kypost 2009). – This is not an isolated case there are some more cases (BBC 2010 case, 2010, FacebookNoticias 2009). 3
  • 4. Motivation • There is social anxiety about the harm that privacy threatening features can cause, it can be seen in: – Government warnings. warnings – Newspapers. • However, it is not enough as can be seen in the news. • Therefore, what has been done and what will b d Th f h th b d d h t ill be done i thi in this knowledge area is relevant for society in order to minimize damage. 4
  • 5. Key aspects of the Literature Review (1/3) • Privacy threatening features can be studied from the perspective of IT user acceptance theories since these theories study the factors theories, that allow a technology to be adopted. • According to Leidner and Kayworth (2006), culture influences the user acceptance of IT. • The main research areas of this research project are: – User acceptance theories of Information Technologies (IT). – Culture. influences IT User Culture Acceptance Leidner & Kayworth 2006 5
  • 6. Key aspects of the Literature Review (2/3) influences IT User Culture Acceptance Leidner & Kayworth 2006 • Schwartz’s model (Schwartz 1992): – 10 values: Self-direction, Stimulation, Conformity, etc. , , y, • Hofstede’s framework (Hofstede 1980): – Dorfman and Howell (1988)  individual level. – Constructs: Power Distance, Uncertainty Avoidance, Individualism, Masculinity, and Long- versus Short- term Orientation. – Bagchi et al. (2003) studied the Hofstede’s constructs that have more influence on IT user acceptance. – Hwang (2004)  Open Cultural Orientation. 6
  • 7. Key aspects of the Literature Review (3/3) influences IT User Culture Acceptance Leidner & Kayworth 2006 • Theory of Planned Behavior (TPB) (Ajzen 1985). – Constructs: Attitude toward the Behavior, Subjetive Norm and Perceived Behavioral Control. • Technology Acceptance Model (TAM) (Davis 1986) 1986). – Constructs: Perceived Usefulness and Perceived Ease of Use. • Unified Theory of Acceptance and Use of Technology (UTAUT) (Venkatesh et al. 2003). – Constructs: Performance Expectancy, Effort Expectancy, Social Influence and Faciltating Conditions. 7
  • 8. Research Question influences IT User Culture Acceptance Leidner & Kayworth 2006 • e commerce e-commerce (Gefen & Straub 2000) • Internet banking (Tan & Teo 2000) • 3G mobile communications (Wu et al. 2007) Do individual’s l D i di id l’ cultural values i fl l l influence the h adoption of privacy threatening features in social networks? i l k ? 8
  • 9. Hypotheses and Model Perceived  Individualism Usefulness H1+ H4+ H7+ Open  Power  H2‐ H5+ Perceived  H8+ Behavioral  H10+ Cultural  Use Distance Ease of Use Intention Orientation H3‐ H6‐ H9+ Uncertainty  Social  Avoidance Influence CULTURE: Open Cultural Orientation IT USER ACCEPTANCE: Simplified UTAUT (Hwang 2004) (Venkatesh et al. 2003) 9
  • 10. Research Design (1/2) • Social Network Site  Facebook (750 m. of active users in July m 2011 (Facebook 2011). • Qualitative versus quantitative approach: – Quantitative approach, since it is going to offer more accurate results of the proposed objectives (Easterby-Smith et al. 2008). (Easterby Smith • According to the quantitative approach and the objective of the research, th possible options are: h the ibl ti – Multiple regression. – Structural Equation Modeling (SEM). q g( ) • Covariance-based SEM. • Partial Least Squares (PLS). 10
  • 11. Research Design (2/2) • Implementation of the research method (PLS): – Data Collection  Questionnaire Questionnaire. • The questionnaire was based on the literature review and improved with workshops, focus groups, etc. in order to achieve content validity. – Sampling: • 66 students from La Salle (Ramon Llull University)  International students of Business management bachelor bachelor. – 62 with Facebook profile. – 4 with no Facebook profile. • 87 students from Cracow University of Economics  National students of Business management bachelor. – 61 with Facebook profile (1 with patterns in the response). – 26 with no Facebook profile. • Number of samples > 30  They are enough to use PLS. 11
  • 12. Results - Introduction • Developed with smartPLS tool tool. – http://www.smartpls.de • Steps: – Bootstrapping: • 500 bootstrap re-sample as recommended Chin (1998) re sample (1998). • Estimates t-values of the model  Significance level. – Measurement model: • Convergent validity: Average Variance Extracted (AVE) (AVE). • Discriminant validity: loadings of CFA and Fornell-Lackers Criterion. • Reliability: Cronbach’s Alpha and Composite reliability – St Structural model: t l d l • Path coefficients (~ regression coefficients). • Explained variance (R2). 12
  • 13. Results of La Salle, URL, sample Perceived Percei ed Individualism Usefulness H1+ H4+ H7+ -0.274* 0.506*** 0.281* Power P Open Perceived Behavioral B h i l Use U H2- Cultural H5+ Ease of H8+ H10+ Distance Intention R2=0.337 0.192(ns) Orientation 0.475*** Use 0.058(ns) 0.580*** H3- H6- H6 H9+ -0.125(ns) -0.260(ns) 0.307** Lack of reliability & convergent validity No significant Uncertainty item Social Avoidance Influence “ns”: no significance, * 10% significant level, ** 5% significant level, *** 1% significant level 13
  • 14. Results of Cracow University of Economics sample Lack of Perceived Individualism reliability Usefulness H1+ H4+ H7+ 0.190(ns) 0.087(ns) 0.289* Power P Open Perceived Behavioral B h i l Use U H2- Cultural H5+ Ease of H8+ H10+ Distance Intention R2=0.372 0.257(ns) Orientation 0.072(ns) Use 0.183(ns) 0.554*** H3 H3- H6- H9+ 0.270** -0.172(ns) -0.131(ns) Lack of reliability & convergent validity Uncertainty Social Avoidance Lack of Influence reliability “ns”: no significance, * 10% significant level, ** 5% significant level, *** 1% significant level 14
  • 15. Discussion • La Salle (URL) sample: – H4 H5 and H7 are supported H4, supported. – H1 is not supported. • Cracow University of Economics sample: – Lack of statistical validity and reliability. • English comprehension difficulties. • Non-validated questionnaire with this sample. • Regarding the measurement tool: – Culture constructs: • New socio-technological environment related to initial design (1980). • Focused on professional employees of a multinational company. – IT user acceptance constructs: • Social Influence is not as relevant as it used to be. • Perceived Ease of Use does not matter for today’s higher education students. 15
  • 16. Limitations • Method limitations: – Cultural models lack a comprehensive understanding. – Limited possibility of an in-depth analysis of the relationship between constructs. • Design research limitations: es g esea c tat o s – Trust and Attitude were not considered. – Only one SNS: Facebook. – Affew privacy threatening features are considered. i th t i f t id d – Privacy threatening features can be used consciously and unconsciously. – Only students behavior is studied. – Results cannot be generalized. 16
  • 17. Conclusions and Further Steps • Conclusions about the research: – A questionnaire that measures students culture is proposed. proposed – IT Acceptance models have been improved and tested by introducing individual cultural attributes in SNS environment. • Conclusions about th master thesis: C l i b t the t th i – A comprehensive understanding of SEM methods have been acquired. – A formal research methodology approach has been applied to a quantitative design. • A starting point for further research: – Improving the study of culture at individual level in social media environment. i t – Improving the models of IT user acceptance in social media environment. 17
  • 18. Questions and Comments Rosa Rudó Mauné Innova I tit t - L S ll I Institute La Salle Ramon Llull University Barcelona (Spain) E mail: E-mail: rrudo@salleurl.edu