Search results
1 – 10 of over 2000Jawahitha Sarabdeen and Mohamed Mazahir Mohamed Ishak
General Data Protection Regulation (GDPR) of the European Union (EU) was passed to protect data privacy. Though the GDPR intended to address issues related to data privacy in the…
Abstract
Purpose
General Data Protection Regulation (GDPR) of the European Union (EU) was passed to protect data privacy. Though the GDPR intended to address issues related to data privacy in the EU, it created an extra-territorial effect through Articles 3, 45 and 46. Extra-territorial effect refers to the application or the effect of local laws and regulations in another country. Lawmakers around the globe passed or intensified their efforts to pass laws to have personal data privacy covered so that they meet the adequacy requirement under Articles 45–46 of GDPR while providing comprehensive legislation locally. This study aims to analyze the Malaysian and Saudi Arabian legislation on health data privacy and their adequacy in meeting GDPR data privacy protection requirements.
Design/methodology/approach
The research used a systematic literature review, legal content analysis and comparative analysis to critically analyze the health data protection in Malaysia and Saudi Arabia in comparison with GDPR and to see the adequacy of health data protection that could meet the requirement of EU data transfer requirement.
Findings
The finding suggested that the private sector is better regulated in Malaysia than the public sector. Saudi Arabia has some general laws to cover health data privacy in both public and private sector organizations until the newly passed data protection law is implemented in 2024. The finding also suggested that the Personal Data Protection Act 2010 of Malaysia and the Personal Data Protection Law 2022 of Saudi Arabia could be considered “adequate” under GDPR.
Originality/value
The research would be able to identify the key principles that could identify the adequacy of the laws about health data in Malaysia and Saudi Arabia as there is a dearth of literature in this area. This will help to propose suggestions to improve the laws concerning health data protection so that various stakeholders can benefit from it.
Details
Keywords
Minghong Chen, Xiumei Huang and Xianjun Qi
In the paradox of personalized services and privacy risks, what factors influence users’ decisions is considered an interesting issue worth exploring. The current study aims to…
Abstract
Purpose
In the paradox of personalized services and privacy risks, what factors influence users’ decisions is considered an interesting issue worth exploring. The current study aims to empirically explore privacy behavior of social media users by developing a theoretical model based on privacy calculus theory.
Design/methodology/approach
Privacy risks, conceptualized as natural risks and integrated risks, were proposed to affect the intention of privacy disclosure and protection. The model was validated through a hybrid approach of structural equation modeling (SEM)-artificial neural network (ANN) to analyze the data collected from 527 effective responses.
Findings
The results from the SEM analysis indicated that social interaction and perceived enjoyment were strong determinants of perceived benefits, which in turn played a dominant role in the intention to disclose the privacy in social media. Similarly, trust and privacy invasion experience were significantly related to perceived risks that had the most considerable effect on users’ privacy protection intention. And the following ANN models revealed consistent relationships and rankings with the SEM results.
Originality/value
This study broadened the application perspective of privacy calculus theory to identify both linear and non-linear effects of privacy risks and privacy benefits on users’ intention to disclose or protect their privacy by using a state-of-the-art methodological approach combining SEM and ANN.
Details
Keywords
Annette Mills, Nelly Todorova and Jing Zhang
Disasters and other emergencies are increasing, with millions of people affected by events like earthquakes, fires and flooding. The use of mobile emergency alert systems (MEAS…
Abstract
Purpose
Disasters and other emergencies are increasing, with millions of people affected by events like earthquakes, fires and flooding. The use of mobile emergency alert systems (MEAS) can improve people’s responses by providing targeted alerts based on location and other personal details. This study aims to understand the factors that influence people’s willingness to share the personal information that is needed to provide context-specific messaging about a threat and protective actions.
Design/methodology/approach
Drawing on protection motivation theory (PMT), this study proposes and tests a model of willingness to use personalised MEAS that incorporates key factors related to an individual’s appraisal of a potential threat (i.e. perceived vulnerability and severity) and coping capacity (i.e. response efficacy and self-efficacy), with deterrents like response cost and privacy concern. This study uses survey data from 226 respondents in New Zealand and SmartPLS to assess the model.
Findings
The results show how willingness to use MEAS is influenced by people’s appraisal of an emergency threat and their perception of how using MEAS would help them to cope effectively. Fear and perceived severity are significant motivators of MEAS use, along with coping appraisal. However, when the negative influences of privacy concern and response cost are strong enough, they can dissuade use, despite knowing the risks.
Originality/value
The study addresses a gap in research on the use of alert systems like MEAS, which require sharing of personal information and continuous engagement such as the real-time disclosure of one’s location. It confirms the significance of factors not studied in prior research, such as privacy concerns, that can dissuade use. This study also extends the application of the PMT in the context of emergency management.
Details
Keywords
This study aims to analyze and synthesize literature on consumer privacy-related behavior and intelligent device-to-device interactions within the Internet of Things (IoT).
Abstract
Purpose
This study aims to analyze and synthesize literature on consumer privacy-related behavior and intelligent device-to-device interactions within the Internet of Things (IoT).
Design/methodology/approach
We conducted a systematic review using Elsevier’s Scopus database, focusing on studies published in English from 2000 to 2023. The review targeted articles within selected social sciences and business disciplines, specifically concerning consumer behavior in IoT contexts.
Findings
We categorized the privacy literature into three thematic clusters: legislation and policy, business implications and consumer behavior. Within the consumer behavior cluster, our analysis indicates a shift from general Internet and e-commerce privacy concerns prior to 2016, toward issues related to advertising and policy between 2017 and 2018, and increasingly toward pronounced concerns in technological systems, particularly IoT, from 2019 onwards. We identify eight distinct areas of privacy concern within IoT and propose a framework that links antecedents and privacy concerns to subsequent attitudes and behaviors. This framework highlights varying patterns of information disclosure and bridges theoretical constructs with empirical research in IoT privacy.
Originality/value
Originality lies in enhancing the Antecedents-Privacy Concerns-Outcomes (APCO) macro-model by integrating diverse theoretical perspectives on technological and individual-specific antecedents, alongside privacy concerns and beliefs. This comprehensive integration enriches the framework, enabling it to predict and categorize consumer behavior in IoT environments more effectively. The revised model provides a robust tool for understanding privacy-related behavior within the IoT, significantly enriching its theoretical relevance and practical applicability.
Details
Keywords
Mustafa Saritepeci, Hatice Yildiz Durak, Gül Özüdoğru and Nilüfer Atman Uslu
Online privacy pertains to an individual’s capacity to regulate and oversee the gathering and distribution of online information. Conversely, online privacy concern (OPC) pertains…
Abstract
Purpose
Online privacy pertains to an individual’s capacity to regulate and oversee the gathering and distribution of online information. Conversely, online privacy concern (OPC) pertains to the protection of personal information, along with the worries or convictions concerning potential risks and unfavorable outcomes associated with its collection, utilization and distribution. With a holistic approach to these relationships, this study aims to model the relationships between digital literacy (DL), digital data security awareness (DDSA) and OPC and how these relationships vary by gender.
Design/methodology/approach
The participants of this study are 2,835 university students. Data collection tools in the study consist of personal information form and three different scales. Partial least squares (PLS), structural equation modeling (SEM) and multi-group analysis (MGA) were used to test the framework determined in the context of the research purpose and to validate the proposed hypotheses.
Findings
DL has a direct and positive effect on digital data security awareness (DDSA), and DDSA has a positive effect on OPC. According to the MGA results, the hypothesis put forward in both male and female sub-samples was supported. The effect of DDSA on OPC is higher for males.
Originality/value
This study highlights the positive role of DL and perception of data security on OPC. In addition, MGA findings by gender reveal some differences between men and women.
Peer review
The peer review history for this article is available at: https://publons.com/publon/10.1108/OIR-03-2023-0122
Details
Keywords
Rebecca Dei Mensah, Stephen Tetteh, Jacinta Martina Annan, Raphael Papa Kweku Andoh and Elijah Osafo Amoako
The purpose of this study was to investigate the roles of employee experience and top management commitment in the relationship between human resource (HR) records management…
Abstract
Purpose
The purpose of this study was to investigate the roles of employee experience and top management commitment in the relationship between human resource (HR) records management culture and HR records privacy control in organisations in Ghana.
Design/methodology/approach
Structural equation modelling was used in analysing the data. Following the specification of the model, three main types of analyses were carried out. They were reflective measurement model analyses to test reliability and validity; formative measurement model analyses to test redundancy, collinearity, significance and relevance of the lower-order constructs; and structural model analyses to ascertain the explanatory and predictive powers of the model, significance of the hypotheses and their effect sizes.
Findings
The study confirmed that communication, privacy awareness and training and risk assessment are dimensions of HR records management culture. Concerning the hypotheses, it was established that HR records management culture is related to HR records privacy control. Also, the study showed that employee experience positively moderated the relationship HR records management culture has with HR records privacy control. However, top management commitment negatively moderated the relationship HR records management culture has with HR records privacy control.
Practical implications
Organisations committed to the privacy control of HR records need to ensure the retention of their employees, as the longer they stay with the organisation, the more they embody the HR records management culture which improves the privacy control of HR records. For top management commitment, it should be restricted to providing strategic direction for HR records privacy control, as the day-to-day influence of top management commitment on the HR records management culture does not improve the privacy control of HR records.
Originality/value
This study demonstrates that communication, privacy awareness and training and risk assessment are dimensions of HR record management culture. Also, the extent of employee experience and top management commitment required in the relationship between HR records management culture and HR records privacy control is revealed.
Details
Keywords
Princely Ifinedo, Francine Vachon and Anteneh Ayanso
This paper aims to increase understanding of pertinent exogenous and endogenous antecedents that can reduce data privacy breaches.
Abstract
Purpose
This paper aims to increase understanding of pertinent exogenous and endogenous antecedents that can reduce data privacy breaches.
Design/methodology/approach
A cross-sectional survey was used to source participants' perceptions of relevant exogenous and endogenous antecedents developed from the Antecedents-Privacy Concerns-Outcomes (APCO) model and Social Cognitive Theory. A research model was proposed and tested with empirical data collected from 213 participants based in Canada.
Findings
The exogenous factors of external privacy training and external privacy self-assessment tool significantly and positively impact the study's endogenous factors of individual privacy awareness, organizational resources allocated to privacy concerns, and group behavior concerning privacy laws. Further, the proximal determinants of data privacy breaches (dependent construct) are negatively influenced by individual privacy awareness, group behavior related to privacy laws, and organizational resources allocated to privacy concerns. The endogenous factors fully mediated the relationships between the exogenous factors and the dependent construct.
Research limitations/implications
This study contributes to the budding data privacy breach literature by highlighting the impacts of personal and environmental factors in the discourse.
Practical implications
The results offer management insights on mitigating data privacy breach incidents arising from employees' actions. Roles of external privacy training and privacy self-assessment tools are signified.
Originality/value
Antecedents of data privacy breaches have been underexplored. This paper is among the first to elucidate the roles of select exogenous and endogenous antecedents encompassing personal and environmental imperatives on data privacy breaches.
Details
Keywords
Carol Azungi Dralega, Wise Kwame Osei, Daniel Kudakwashe Mpala, Gezahgn Berhie Kidanu, Bai Santigie Kanu and Amia Pamela
This study explores how the national artificial intelligence (AI) strategies and policies in four sub-Saharan African countries – Mauritius, South Africa, Ghana and Gabon …
Abstract
This study explores how the national artificial intelligence (AI) strategies and policies in four sub-Saharan African countries – Mauritius, South Africa, Ghana and Gabon – influence the adoption of AI in journalism. In the journalistic world, AI have been mainly used for news gathering, production and distribution. Irrespective of the prospects, the pervasive nature of AI brings with it a host of challenges concerning privacy, gender, and ethnic bias. Despite its relevance to journalism, the challenges associated with using AI necessitate the need for policy frameworks that guide the development and usage of these technologies. At a global level, UNESCO has established a normative framework which lays out principles and standards regarding how member states formulate policies that ensures ethical and healthy development of AI. Using document analysis and the technological determinism theory, the study investigated how the national AI policies and strategies of these countries is impacting journalism and highlights the challenges to the adoption of the technology in the field. In lieu of the AI-specific laws, the countries seem to loosely rely on their data protection acts to govern aspects of AI use involving automated decision making. Mauritius was found to be the only country in the study with a set national AI strategy.
Details
Keywords
Hao Sun and Kaede Sano
Smart tourism has become an inevitable trend in future tourism development. However, despite significant investment in its technological foundation, little is known about whether…
Abstract
Purpose
Smart tourism has become an inevitable trend in future tourism development. However, despite significant investment in its technological foundation, little is known about whether and when tourists are willing to be involved in smart tourism. This study explores tourists' willingness to contribute to smart tourism development by empirically examining their intention to share personal information and use smart technology.
Design/methodology/approach
Based on construal level theory (CLT), a 2 (far/near spatial distance) × 2 (gain/loss persuasive information frame) × 2 (altruistic/egoistic value orientation) laboratory experiment with different contextual features was designed to examine tourists' willingness to contribute to smart tourism.
Findings
Tourists are most willing to share personal information and use smart technologies when spatial distance aligns with information framing, spatial distance aligns with value orientation and information framing aligns with value orientation.
Practical implications
This study provides essential insights for destination management organizations (DMOs) about tourists' perceptions of smart tourism, enabling DMOs to develop more precise marketing strategies to encourage tourists to contribute to smart tourism development and enrich tourists' travel experiences.
Originality/value
This study enriches theoretical knowledge of DMOs' boundaries in encouraging tourists to contribute to smart tourism and provides critical insights into future smart tourism development for researchers and practitioners.
Details
Keywords
Balakrishnan Unny R., Samik Shome, Amit Shankar and Saroj Kumar Pani
This study aims to provide a systematic review of consumer privacy literature in the context of smartphones and undertake a comprehensive analysis of academic research on this…
Abstract
Purpose
This study aims to provide a systematic review of consumer privacy literature in the context of smartphones and undertake a comprehensive analysis of academic research on this evolving research area.
Design/methodology/approach
This review synthesises antecedents, consequences and mediators reported in consumer privacy literature and presents these factors in a conceptual framework to demonstrate the consumer privacy phenomenon.
Findings
Based on the synthesis of constructs reported in the existing literature, a conceptual framework is proposed highlighting antecedents, mediators and outcomes of experiential marketing efforts. Finally, this study deciphers overlooked areas of consumer privacy in the context of smartphone research and provides insightful directions to advance research in this domain in terms of theory development, context, characteristics and methodology.
Originality/value
This study significantly contributes to consumer behaviour literature, specifically consumer privacy literature.
Details