跳到主要內容

臺灣博碩士論文加值系統

(216.73.216.176) 您好!臺灣時間:2025/09/06 06:48
字體大小: 字級放大   字級縮小   預設字形  
回查詢結果 :::

詳目顯示

: 
twitterline
研究生:伊芙娜
研究生(外文):Tatiana Lishchenko
論文名稱:Job Seekers Information Privacy Concerns, Trust in Social Networking Sites (SNSs) and Behavioral Intentions to Use SNSs as Job Seeking Tool
論文名稱(外文):Job Seekers Information Privacy Concerns, Trust in Social Networking Sites (SNSs) and Behavioral Intentions to Use SNSs as Job Seeking Tool
指導教授:史習安史習安引用關係
指導教授(外文):Hsi-An Shi
學位類別:碩士
校院名稱:國立成功大學
系所名稱:國際管理碩士在職專班
學門:商業及管理學門
學類:企業管理學類
論文種類:學術論文
論文出版年:2009
畢業學年度:97
語文別:英文
論文頁數:52
外文關鍵詞:Job seekers' behavioral intentionsTrust in SNSsInformation privacy concernInternet social network sites
相關次數:
  • 被引用被引用:0
  • 點閱點閱:359
  • 評分評分:
  • 下載下載:57
  • 收藏至我的研究室書目清單書目收藏:0
Internet Social Networking sites (SNSs) are formed on the Internet allowing individuals with similar interests to interact on a social level. Companies regard this platform as a new market place, and its members as current or future customers. Recently companies have started to treat social networking sites as recruitment tool in order to avoid missing out on highly-qualified candidates who frequent these sites. It is believed that SNSs are giving employers the ability to connect with job seekers on a more personal level than before. Due to innovativeness of the topic, previous studies have not combined together recruitment and SNS, and therefore there is no model that would integrate relevant research variables to verify the cause of job seekers’ behavioral intentions to use SNS as job seeking tool. This research was intended to fill in the gap, and investigates influence of information privacy concerns and trust in SNSs on job seekers’ behavioral intentions concerning the use of the SNS as a job source.
This study surveyed and collected 154 questionnaires. The results indicated that trust in SNSs and SNS experience have significant influences on job seekers behavioral intentions in SNSs, while the influence of privacy concern on job seekers behavioral intentions is fully mediated by trust in SNSs.
ACKNOWLEDGMENT I
ABSTRACT II
TABLE OF CONTENTS III
LIST OF TABLES VI
LIST OF FIGURES VII
CHAPTER ONE INTRODUCTION 1
1.1 Research Background and Motivation. 1
1.1.1 Job Searching Tools Classifications. 3
1.1.2 Social Networking Sites Definition. 5
1.2 Research Objectives. 8
1.3 Research Project. 9
1.4 Research Procedure. 9
1.5 The Structure of this Study. 10
CHAPTER TWO LITERATURE REVIEW 12
2.1 Definitions of Relevant Research Variables. 12
2.1.1 Information Privacy Concerns. 12
2.1.2 SNS Experience. 14
2.1.3 Trust in SNSs. 14
2.1.4 Job Seekers’ Behavioral Intention in SNS. 15
2.2 Interrelationship among Research Constructs. 16
2.2.1 Influence of Information Privacy Concerns on Trust in SNSs. 16
2.2.2 Influence of SNS Experience on Behavioral Intentions in SNSs. 18
2.2.3 Influence of Trust in SNS on Job Seekers’ Behavioral Intentions in SNSs. 19
2.2.4 Influence of Information Privacy Concerns on Job Seekers’ Behavioral Intentions in SNSs. 20
CHAPTER THREE RESEARCH DESIGN AND METHODOLOGY 22
3.1 The Conceptual Model. 22
3.2 Construct Measurement. 23
3.2.1 Internet Privacy Concerns. 23
3.2.2 SNS Experience. 24
3.2.3 Trust in SNS. 25
3.2.4 Job Seekers’ Behavioral Intentions in SNS. 25
3.3 Hypotheses to Be Tested. 26
3.4 Questionnaire Design. 26
3.5 Sampling Plan. 27
3.6 Data Analysis Procedures. 27
3.6.1 Descriptive Statistics Analysis. 27
3.6.2 Factor Analysis. 27
3.6.3 Structure Equation Modeling (SEM) 28
CHAPTER FOUR RESEARCH FINDINGS 29
4.1 Samples and Data Collection Procedures. 29
4.2 Characteristics of Respondents. 29
4.3 Confirmatory Factor Analysis (CFA). 31
4.4 Descriptive Statistics and Correlation for all Variables. 34
4.5 Structure Equation Modeling (SEM). 35
4.5.1 Overall Model Fit. 38
4.5.2 Path Results. 38
CHAPTER FIVE CONCLUSION AND SUGGESTIONS 40
5.1 Research Conclusion. 40
5.2 Limitation and Future Research. 41
REFERENCES 43
APPENDIX 49
Ajzen, I. (1991). The theory of planned behavior. Organizational Behavior and Human Decision Process, 50(179-211).
Ajzen, I., & Fishbein, M. (1980). Understanding attitudes and predicting social behavior. Englewood Cliffs, NJ: Prentice Hall.
Alba, J. W., & Hutchinson, J. W. (1987). Dimensions of consumer expertise. Journal of Consumer Research, 13(March), 411-454.
Anderson, J. C., & Gerbin, D. W. (1988). Structural equation modeling in practice: A review and recommended two-step approach. Psychological Bulletin, 103(3), 411-423.
Andrews, S. (2002). Privacy and human rights 2002: An international survey of privacy laws and developments. Retrieved January, 19, 2009, from http://www.privacyinternational.org/survey/phr2002/
Bagozzi, R. P., & Edwards, J. R. (1998). A general approach for representing constructs in organizational research. Organiational Research Methods, 1, 45-87.
Barak, A. (2008). Psychological Aspects of Cyberspace: Cambridge University Press.
Baumgartner, H., & Homburg, C. (1996). Applications of structural equation modeling in marketing and consumer research: A review. International Journal of Research in Marketing, 13(2), 139-161.
Bentler, P. M. (2007). On tests and indices for evaluating structural model. Personality and Individual Differences, 42(5), 825-829.
Berne, C., Mugica, J. M., & Rivera, P. (2005). The managerial ability to control the varied behavior of regular customers in retailing: Interformat differences. Journal of Retailing and Consumer Services, 12(3), 151-164.
Betts, M. (2001). Turning browsers into buyers. MIT Sloan Management Review(Winter), 8-9.
Beyond.com. (2008). Social networking and its impact on online recruitment Retrieved January 20, 2008, from http://www.careermag.com/articles/i/ad3637/blogs/business-professional/social-networking-its-impact-on-online-recruitment.htm
Blessing, J. (2008). Facing up the talent crunch [Electronic Version]. Taleo. Retrieved January 18, 2009, from http://www.taleo.com/products/media/pdf/FacingUp_advertorial_0308.pdf
Borstorff, P. C., Marker, M. B., & Bennett, D. S. (2007). Online recruitment: Attitudes and behaviors for job seekers. Journal of Strategic E-commerce, 5, 1-23.
Boyd, D. M., & Ellison, N. B. (2008). Social networking sites: Definitions, history, and scholarship. Journal of Computer-Mediated Communication, 13, 210-230.
Byrne, B. M. (2006). Structural equation modeling with AMOS: Basic concepts, applications, and programming. New Jersey: Lawrence Erlbaum Associates.
Cambell, A. J. (1997). Relationship marketing in consumer markets: A comparison of managerial and consumer attitudes about information privacy. Journal of Direct Marketing, 11(3), 44-57.
Chellappa, R. K., & Sin, R. G. (2005). Personalization versus privacy: An empirical examination of the online consumer's dilemma. Information Technology and Management, 6, 181-202.
Chen, C.-C., & Su-Chao, C. (2005). Discussion on the behavior intention model of consumer online shopping. Journal of Business & Management, 11(1), 41-57.
Cooper, D. R., & Schindler, P. S. (2001). Business research methods. New York: McGraw-Hill.
Cooper, D. R., & Schindler, P. S. (2003). Business research methods. New York: McGraw-Hill.
Costello, S. (2001). Surfers balk at providing personal data. PCWorld.
Culnan, M. J. (1995). Consumer awareness of name removal procedures: Implications for direct marketing. Journal of Direct Marketing, 9(2), 10-19.
Culnan, M. J., & Armstrong, P. (1999). Information privacy concerns, procedural fairness, and impersonal trust: An empirical investigation. Organizational Science, 10(1), 104-115.
Culnan, M. J., & Bies, R. J. (2003). Consumer privacy: Balancing economic and justice considerations. The Society for the Psychological Study of Social Issues, 59(2), 323-342.
Dinev, T., & Hart, P. (2003). Privacy concerns and Internet use - A model of trade -off factors. Paper presented at the Annual Academy of Management Conference.
Eagley, A. H., & Chaiken, S. (1993). The psychology of attitudes. Orlando, FL: Harcourt Brace Jovanovich Inc.
Executive job board survey. How can you develop your career and personal brand on the web? [Electronic. (2008). Version]. Harvey Nash. The Power of Talent. Retrieved January 20, 2008, from http://www.exec-appointments.com/images/articles/Executive%20Job%20Board%20Survey%202008.pdf
Farley, J. U., Lehmann, D. R., & Ryan, M. J. (1981). Generalizing from "imperfect" replication. Journal of Business, 54, 597-610.
Fazio, R. H., & Zanna, M. (1978). Attitudinal qualities relating to the strength of the attitude behavior relationship. Journal of Experimental Social Psychology, 14(4), 398-408.
Feldman, D. C., & Klaas, B. S. (2002). Internet job hunting: A field study of applicant experiences with on-line recruiting. Human Resource Management, 41(2), 175.
Fishbein, M., & Ajzen, I. (1975). Understanding attitudes and predicting social behavior. Englewood Cliffs, NJ: Prentice-Hall.
Flicker, M. H. (2004). Securities trading on the Internet. In H. Bidgoli (Ed.), The Internet encyclopedia (pp. 944): John Wiley and Sons.
Fox, S. (2000). Trust and privacy online: Why Americans want to rewrite the rules: The Pew Internet and American Life Project.
Fukuyama, F. (1996). Trust still counts in a virtual world. Forbes ASAP Supplement, No. 01227051, 33-69.
Gefen, D. (2000). E-commerce: The role of familiarity and trust. Omega, 28(6), 725.
Gefen, D., Karahanna, E., & Straub, D. W. (2003). Trust and TAM in online shopping: An intergative model. MIS Quarterly, 27(1), 51-90.
George, J. F. (2002). Influence on the intent to make Internet purchases. Internet Research, 12(2), 165-180.
Golob, R. D. (2003). Assesing the adequacy of structural equation models: Golden rules and editorial policies. Transportation Research: Part B, 37(1), 1-25.
Grazioli, S., & Jarvenpaa, S. L. (2000). Perils of internet fraud: An empirical investigation of deception and trust with experienced Internet consumers. IEEE Transaction on Systems, Man, and Cybernetics, Part A: Systems and Humans, 30(4), 395-410.
Hair Jr., B., Black, W., Babin, B. J., Andrews, R. E., & Tatham, R. L. (2006). Multivariate data analysis (6th.ed). New Jersey: Prentice Hall.
Hamilton, B. (2006). Internet becomes primary hiring source. Expansion Management, 21(3), 4.
Hoffman, R. D., & Novak, T. (2002). Building consumer trust online. Communications of the Association for Computing Machinery, 42(4), 80-85.
Jarvenpaa, S. L., & Leidner, D. (1998). Communication and trust in global virtual teams. Journal of Computer-Mediated Communication, 3, 4.
Joreskog, K. G., & Sorbom, D. (1982). Recent developments in structural equation modelling. Journal of Marketing Research, 19(4), 404-416.
Khosrow-Pour, M. (2007). Web technologies for commerce and services online: Idea Group Inc.
Kim, H., Xu, Y., & Koh, J. (2004). A comparison of online trust building factors between potential customers and repeat customers. Journal of Association for Information Systems, 5(10), 392-420.
Lin, B., & Staisnskaya, V. S. (2002). Data warehousing management issues in online recruiting. Human Systems Management, 21, 1-8.
Liu, C., Marchewka, J. T., Lu, J., & Yu, C.-S. (2005). Beyond concern - a privacy-trust-behavioral intention model of electronic commerce. Information Management, 42(2), 289-304.
Malhotra, N. K., Kim, S. S., & Agarwal, J. (2004). Internet user' information privacy concerns (IUIPC): The construct, the scale, and a causal model. Information Systems Research, 15(4), 336-355.
Mayer, R. C., Davis, J. H., & Schoorman, F. D. (1995). An integrative model of organizational trust. The Academy of Management Review, 20(3), 709-734.
McIntosh, C. N. (2007). Rethinking fit assessment in structural equation modelling: A commentary and elaboration of Barrett. Personality and Individual Differences, 42(5), 859-867.
McKnight, D. H., Cummings, L. L., & Chervany, N. L. (1998). Initial trust formation in new organizational relationships. Academy of Management Review, 23(3), 473-490.
McLean, C. (2006). A foot in the door: IT. Certification Magazine, 8(4), 38-40.
Metzger, M. J. (2004). Privacy, trust and disclosure: Exploring barriers to electoronic commerce. Journal of Computer-Mediated Communication, 9(4).
Metzger, M. J. (2006). Privacy, trust, and disclosure: Exploring barriers to electronic commerce, Journal of Computer-Mediated Communication (Vol. 9).
Meyerson, D., Weick, K. E., & Kramer, R. M. (1996). "Shift trust and temporary groups", in R.M. Kramer, Tyler, T.R.(Ed.) Trust in organizations: Frontiers of theory and research. Thousands Oacks, CA: Sage Publications.
Milberg, S. J., Burke, S. J., Smith, H. J., & Kallman, E. A. (1995). Values, personal information privacy concerns, and regulatory approaches. Communications of the Association for Computing Machinery, 38(12), 65-74.
News, N. M. (2007). Internet job hunting - utilizing social media [Electronic Version]. Retrieved January 6, 2009, from http://www.newmedia.org/articles/91/1/Internet-Job-Hunting---Utilizing-Social-Media/Page1.html
Nysveen, H., & Pedersen, P. E. (2003). An exploratory study of customers' perception of company web sites offering various interactive applications: moderating effects of customer's Internet experience. Decision Support Systems, 27(1).
Olivero, N., & Lunt, P. (2004). Privacy versus willingness to disclose in e-commerce exchanges: The effect of risk awareness on the relative role of trust and control. Journal of Economic Psychology, 25(243-262).
Pavlou, P. A. (2002). What drives electronic commerce? A theory of planned behavior perspective [Electronic Version]. Academy of Management Proceedings, A1-A6, from http://search.ebscohost.com/login.aspx?direct=true&db=bth&AN=7517579&lang=zh-tw&site=ehost-live
Pavlou, P. A., & Fygenson, M. (2006). Understanding and predicting electronic commerce adoption: An extension of theory of planned behavior. MIS Quarterly, 30(1), 115-143.
Piccoli, G., & Ives, B. (2003). Trust and the unintended effects of behavioral control in virtual teams. MIS Quarterly, 27(3), 365-339.
Schofield, C. B., Joinson, A. N., Reips, U.-D., & Buchanan, T. (2008). Privacy, trust, disclosure and the Internet. In A. Barak (Ed.), Phychological Aspects of Cyberspace Theory, Research Applications (pp. 13-31). UK: Cambridge University Press.
Sheeran, P. (2002). Intention-behavior relations: A conceptual and empirical review. In W. Stroebe & M. Hewstone (Eds.), European Review of Social Psychology (Vol. 2, pp. 1-36). New York: John Wiley & Sons, Ltd.
Smith, H. J., Milberg, S. J., & Burke, S. J. (1996). Information privacy: Measuring individuals' concerns about organizational practices. MIS Quarterly, 20, 167-196.
Stewart, K. A., & Segars, A. H. (2002). An empirical examination of the concern for information privacy instrument. Information Systems Research, 13, 36-49.
Stone, E. F., Gueutal, H. G., Gamdner, D. G., & McClure, S. (1983). A field experiment comparing information-privacy values, beliefs and attitudes across several types of organizations. Journal of Applied Psychology, 68(3), 459-468.
Study of recruiting practices. Insight from the nation's hiring managers. (2008). Portland, OR: Inavero Institute for Service Research o. Document Number)
Subramanian, R. (2008). Computer security, privacy, and politics: Current issues, challenges and solutions. Retrieved April 10th, from http://books.google.com/books?id=aOemIlnXKXIC
Taylor, S., & Todd, P. (1995). Assessing IT usage: The role of prior experience. MIS Quarterly, 19(4), 561-570.
Taylor, S., & Todd, P. A. (1995). Understanding information technology usage: A test of competing models. Information Systems Research, 6, 144-176.
Thomas, S. L., & Ray, K. (2000). Recruiting and the web: High-tech hiring. Business Horizons, 43(3), 43.
Types of online social networks. (2009). Retrieved January 20, 2009, from http://onlinebrandmanager.org/social-media/social-network-types/
Van, D. T. P., Midha, V., & Nemati, H. (2007). The effect of consumer privacy empowerment on trust and privacy concerns in e-commerce. Electronic Markets, 17, 68-81.
Vople, L., & Tucekr, J. (2004). Third-party recruiting (Publication. Retrieved May 18, 2005, from Wiley Interscience database:
Warsaw, P. R., & Davis, F. D. (2001). The accuracy of behavioral intention versus predicting behavioral goals. The Journal of Psychology, 119(6), 599-602.
Warshaw, P. R., & Davis, F. D. (1985). Disentangling behavioral intention and behavioral expectation. Journal of Experimental Social Psychology, 21(3), 213-228.
Wellman, B., & Haythornthwaite, C. A. (2002). The Internet in everyday life: Blackwell Publishing.
Westin, A. F. (1967). Privacy and Freedom. New York: Athenueum.
Westin, A. F. (2003). Social and political dimensions of privacy. Journal of Social Issues, 59(2), 431-453.
Young, R. (2008). How social networks are changing job search and career management. Retrieved January 6, 2009, from http://mn.iabc.com/?p=555
Zhang, A., & Reichgelt, H. (2007). Product complexity as a determinant of transaction governance structure: An empirical comparison of Web-only and traditional banks. In M. Khosrow-Pour (Ed.), Web Technologies for Commerce and Service Online (pp. 40-109): Idea Group Inc.
QRCODE
 
 
 
 
 
                                                                                                                                                                                                                                                                                                                                                                                                               
第一頁 上一頁 下一頁 最後一頁 top