Search results

1 – 10 of over 2000
Article
Publication date: 5 April 2024

Jawahitha Sarabdeen and Mohamed Mazahir Mohamed Ishak

General Data Protection Regulation (GDPR) of the European Union (EU) was passed to protect data privacy. Though the GDPR intended to address issues related to data privacy in the…

Abstract

Purpose

General Data Protection Regulation (GDPR) of the European Union (EU) was passed to protect data privacy. Though the GDPR intended to address issues related to data privacy in the EU, it created an extra-territorial effect through Articles 3, 45 and 46. Extra-territorial effect refers to the application or the effect of local laws and regulations in another country. Lawmakers around the globe passed or intensified their efforts to pass laws to have personal data privacy covered so that they meet the adequacy requirement under Articles 45–46 of GDPR while providing comprehensive legislation locally. This study aims to analyze the Malaysian and Saudi Arabian legislation on health data privacy and their adequacy in meeting GDPR data privacy protection requirements.

Design/methodology/approach

The research used a systematic literature review, legal content analysis and comparative analysis to critically analyze the health data protection in Malaysia and Saudi Arabia in comparison with GDPR and to see the adequacy of health data protection that could meet the requirement of EU data transfer requirement.

Findings

The finding suggested that the private sector is better regulated in Malaysia than the public sector. Saudi Arabia has some general laws to cover health data privacy in both public and private sector organizations until the newly passed data protection law is implemented in 2024. The finding also suggested that the Personal Data Protection Act 2010 of Malaysia and the Personal Data Protection Law 2022 of Saudi Arabia could be considered “adequate” under GDPR.

Originality/value

The research would be able to identify the key principles that could identify the adequacy of the laws about health data in Malaysia and Saudi Arabia as there is a dearth of literature in this area. This will help to propose suggestions to improve the laws concerning health data protection so that various stakeholders can benefit from it.

Details

International Journal of Law and Management, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1754-243X

Keywords

Article
Publication date: 17 May 2024

Minghong Chen, Xiumei Huang and Xianjun Qi

In the paradox of personalized services and privacy risks, what factors influence users’ decisions is considered an interesting issue worth exploring. The current study aims to…

Abstract

Purpose

In the paradox of personalized services and privacy risks, what factors influence users’ decisions is considered an interesting issue worth exploring. The current study aims to empirically explore privacy behavior of social media users by developing a theoretical model based on privacy calculus theory.

Design/methodology/approach

Privacy risks, conceptualized as natural risks and integrated risks, were proposed to affect the intention of privacy disclosure and protection. The model was validated through a hybrid approach of structural equation modeling (SEM)-artificial neural network (ANN) to analyze the data collected from 527 effective responses.

Findings

The results from the SEM analysis indicated that social interaction and perceived enjoyment were strong determinants of perceived benefits, which in turn played a dominant role in the intention to disclose the privacy in social media. Similarly, trust and privacy invasion experience were significantly related to perceived risks that had the most considerable effect on users’ privacy protection intention. And the following ANN models revealed consistent relationships and rankings with the SEM results.

Originality/value

This study broadened the application perspective of privacy calculus theory to identify both linear and non-linear effects of privacy risks and privacy benefits on users’ intention to disclose or protect their privacy by using a state-of-the-art methodological approach combining SEM and ANN.

Details

Industrial Management & Data Systems, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0263-5577

Keywords

Article
Publication date: 16 January 2024

Annette Mills, Nelly Todorova and Jing Zhang

Disasters and other emergencies are increasing, with millions of people affected by events like earthquakes, fires and flooding. The use of mobile emergency alert systems (MEAS…

Abstract

Purpose

Disasters and other emergencies are increasing, with millions of people affected by events like earthquakes, fires and flooding. The use of mobile emergency alert systems (MEAS) can improve people’s responses by providing targeted alerts based on location and other personal details. This study aims to understand the factors that influence people’s willingness to share the personal information that is needed to provide context-specific messaging about a threat and protective actions.

Design/methodology/approach

Drawing on protection motivation theory (PMT), this study proposes and tests a model of willingness to use personalised MEAS that incorporates key factors related to an individual’s appraisal of a potential threat (i.e. perceived vulnerability and severity) and coping capacity (i.e. response efficacy and self-efficacy), with deterrents like response cost and privacy concern. This study uses survey data from 226 respondents in New Zealand and SmartPLS to assess the model.

Findings

The results show how willingness to use MEAS is influenced by people’s appraisal of an emergency threat and their perception of how using MEAS would help them to cope effectively. Fear and perceived severity are significant motivators of MEAS use, along with coping appraisal. However, when the negative influences of privacy concern and response cost are strong enough, they can dissuade use, despite knowing the risks.

Originality/value

The study addresses a gap in research on the use of alert systems like MEAS, which require sharing of personal information and continuous engagement such as the real-time disclosure of one’s location. It confirms the significance of factors not studied in prior research, such as privacy concerns, that can dissuade use. This study also extends the application of the PMT in the context of emergency management.

Details

Information Technology & People, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0959-3845

Keywords

Article
Publication date: 4 June 2024

Ana Alina Tudoran

This study aims to analyze and synthesize literature on consumer privacy-related behavior and intelligent device-to-device interactions within the Internet of Things (IoT).

Abstract

Purpose

This study aims to analyze and synthesize literature on consumer privacy-related behavior and intelligent device-to-device interactions within the Internet of Things (IoT).

Design/methodology/approach

We conducted a systematic review using Elsevier’s Scopus database, focusing on studies published in English from 2000 to 2023. The review targeted articles within selected social sciences and business disciplines, specifically concerning consumer behavior in IoT contexts.

Findings

We categorized the privacy literature into three thematic clusters: legislation and policy, business implications and consumer behavior. Within the consumer behavior cluster, our analysis indicates a shift from general Internet and e-commerce privacy concerns prior to 2016, toward issues related to advertising and policy between 2017 and 2018, and increasingly toward pronounced concerns in technological systems, particularly IoT, from 2019 onwards. We identify eight distinct areas of privacy concern within IoT and propose a framework that links antecedents and privacy concerns to subsequent attitudes and behaviors. This framework highlights varying patterns of information disclosure and bridges theoretical constructs with empirical research in IoT privacy.

Originality/value

Originality lies in enhancing the Antecedents-Privacy Concerns-Outcomes (APCO) macro-model by integrating diverse theoretical perspectives on technological and individual-specific antecedents, alongside privacy concerns and beliefs. This comprehensive integration enriches the framework, enabling it to predict and categorize consumer behavior in IoT environments more effectively. The revised model provides a robust tool for understanding privacy-related behavior within the IoT, significantly enriching its theoretical relevance and practical applicability.

Details

Internet Research, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1066-2243

Keywords

Article
Publication date: 28 February 2024

Mustafa Saritepeci, Hatice Yildiz Durak, Gül Özüdoğru and Nilüfer Atman Uslu

Online privacy pertains to an individual’s capacity to regulate and oversee the gathering and distribution of online information. Conversely, online privacy concern (OPC) pertains…

Abstract

Purpose

Online privacy pertains to an individual’s capacity to regulate and oversee the gathering and distribution of online information. Conversely, online privacy concern (OPC) pertains to the protection of personal information, along with the worries or convictions concerning potential risks and unfavorable outcomes associated with its collection, utilization and distribution. With a holistic approach to these relationships, this study aims to model the relationships between digital literacy (DL), digital data security awareness (DDSA) and OPC and how these relationships vary by gender.

Design/methodology/approach

The participants of this study are 2,835 university students. Data collection tools in the study consist of personal information form and three different scales. Partial least squares (PLS), structural equation modeling (SEM) and multi-group analysis (MGA) were used to test the framework determined in the context of the research purpose and to validate the proposed hypotheses.

Findings

DL has a direct and positive effect on digital data security awareness (DDSA), and DDSA has a positive effect on OPC. According to the MGA results, the hypothesis put forward in both male and female sub-samples was supported. The effect of DDSA on OPC is higher for males.

Originality/value

This study highlights the positive role of DL and perception of data security on OPC. In addition, MGA findings by gender reveal some differences between men and women.

Peer review

The peer review history for this article is available at: https://publons.com/publon/10.1108/OIR-03-2023-0122

Details

Online Information Review, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1468-4527

Keywords

Article
Publication date: 26 April 2024

Rebecca Dei Mensah, Stephen Tetteh, Jacinta Martina Annan, Raphael Papa Kweku Andoh and Elijah Osafo Amoako

The purpose of this study was to investigate the roles of employee experience and top management commitment in the relationship between human resource (HR) records management…

Abstract

Purpose

The purpose of this study was to investigate the roles of employee experience and top management commitment in the relationship between human resource (HR) records management culture and HR records privacy control in organisations in Ghana.

Design/methodology/approach

Structural equation modelling was used in analysing the data. Following the specification of the model, three main types of analyses were carried out. They were reflective measurement model analyses to test reliability and validity; formative measurement model analyses to test redundancy, collinearity, significance and relevance of the lower-order constructs; and structural model analyses to ascertain the explanatory and predictive powers of the model, significance of the hypotheses and their effect sizes.

Findings

The study confirmed that communication, privacy awareness and training and risk assessment are dimensions of HR records management culture. Concerning the hypotheses, it was established that HR records management culture is related to HR records privacy control. Also, the study showed that employee experience positively moderated the relationship HR records management culture has with HR records privacy control. However, top management commitment negatively moderated the relationship HR records management culture has with HR records privacy control.

Practical implications

Organisations committed to the privacy control of HR records need to ensure the retention of their employees, as the longer they stay with the organisation, the more they embody the HR records management culture which improves the privacy control of HR records. For top management commitment, it should be restricted to providing strategic direction for HR records privacy control, as the day-to-day influence of top management commitment on the HR records management culture does not improve the privacy control of HR records.

Originality/value

This study demonstrates that communication, privacy awareness and training and risk assessment are dimensions of HR record management culture. Also, the extent of employee experience and top management commitment required in the relationship between HR records management culture and HR records privacy control is revealed.

Details

Global Knowledge, Memory and Communication, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2514-9342

Keywords

Article
Publication date: 8 April 2024

Princely Ifinedo, Francine Vachon and Anteneh Ayanso

This paper aims to increase understanding of pertinent exogenous and endogenous antecedents that can reduce data privacy breaches.

Abstract

Purpose

This paper aims to increase understanding of pertinent exogenous and endogenous antecedents that can reduce data privacy breaches.

Design/methodology/approach

A cross-sectional survey was used to source participants' perceptions of relevant exogenous and endogenous antecedents developed from the Antecedents-Privacy Concerns-Outcomes (APCO) model and Social Cognitive Theory. A research model was proposed and tested with empirical data collected from 213 participants based in Canada.

Findings

The exogenous factors of external privacy training and external privacy self-assessment tool significantly and positively impact the study's endogenous factors of individual privacy awareness, organizational resources allocated to privacy concerns, and group behavior concerning privacy laws. Further, the proximal determinants of data privacy breaches (dependent construct) are negatively influenced by individual privacy awareness, group behavior related to privacy laws, and organizational resources allocated to privacy concerns. The endogenous factors fully mediated the relationships between the exogenous factors and the dependent construct.

Research limitations/implications

This study contributes to the budding data privacy breach literature by highlighting the impacts of personal and environmental factors in the discourse.

Practical implications

The results offer management insights on mitigating data privacy breach incidents arising from employees' actions. Roles of external privacy training and privacy self-assessment tools are signified.

Originality/value

Antecedents of data privacy breaches have been underexplored. This paper is among the first to elucidate the roles of select exogenous and endogenous antecedents encompassing personal and environmental imperatives on data privacy breaches.

Book part
Publication date: 14 December 2023

Carol Azungi Dralega, Wise Kwame Osei, Daniel Kudakwashe Mpala, Gezahgn Berhie Kidanu, Bai Santigie Kanu and Amia Pamela

This study explores how the national artificial intelligence (AI) strategies and policies in four sub-Saharan African countries – Mauritius, South Africa, Ghana and Gabon …

Abstract

This study explores how the national artificial intelligence (AI) strategies and policies in four sub-Saharan African countries – Mauritius, South Africa, Ghana and Gabon – influence the adoption of AI in journalism. In the journalistic world, AI have been mainly used for news gathering, production and distribution. Irrespective of the prospects, the pervasive nature of AI brings with it a host of challenges concerning privacy, gender, and ethnic bias. Despite its relevance to journalism, the challenges associated with using AI necessitate the need for policy frameworks that guide the development and usage of these technologies. At a global level, UNESCO has established a normative framework which lays out principles and standards regarding how member states formulate policies that ensures ethical and healthy development of AI. Using document analysis and the technological determinism theory, the study investigated how the national AI policies and strategies of these countries is impacting journalism and highlights the challenges to the adoption of the technology in the field. In lieu of the AI-specific laws, the countries seem to loosely rely on their data protection acts to govern aspects of AI use involving automated decision making. Mauritius was found to be the only country in the study with a set national AI strategy.

Details

Digitisation, AI and Algorithms in African Journalism and Media Contexts
Type: Book
ISBN: 978-1-80455-135-6

Keywords

Article
Publication date: 11 December 2023

Hao Sun and Kaede Sano

Smart tourism has become an inevitable trend in future tourism development. However, despite significant investment in its technological foundation, little is known about whether…

Abstract

Purpose

Smart tourism has become an inevitable trend in future tourism development. However, despite significant investment in its technological foundation, little is known about whether and when tourists are willing to be involved in smart tourism. This study explores tourists' willingness to contribute to smart tourism development by empirically examining their intention to share personal information and use smart technology.

Design/methodology/approach

Based on construal level theory (CLT), a 2 (far/near spatial distance) × 2 (gain/loss persuasive information frame) × 2 (altruistic/egoistic value orientation) laboratory experiment with different contextual features was designed to examine tourists' willingness to contribute to smart tourism.

Findings

Tourists are most willing to share personal information and use smart technologies when spatial distance aligns with information framing, spatial distance aligns with value orientation and information framing aligns with value orientation.

Practical implications

This study provides essential insights for destination management organizations (DMOs) about tourists' perceptions of smart tourism, enabling DMOs to develop more precise marketing strategies to encourage tourists to contribute to smart tourism development and enrich tourists' travel experiences.

Originality/value

This study enriches theoretical knowledge of DMOs' boundaries in encouraging tourists to contribute to smart tourism and provides critical insights into future smart tourism development for researchers and practitioners.

Details

Journal of Hospitality and Tourism Insights, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2514-9792

Keywords

Article
Publication date: 11 September 2023

Balakrishnan Unny R., Samik Shome, Amit Shankar and Saroj Kumar Pani

This study aims to provide a systematic review of consumer privacy literature in the context of smartphones and undertake a comprehensive analysis of academic research on this…

Abstract

Purpose

This study aims to provide a systematic review of consumer privacy literature in the context of smartphones and undertake a comprehensive analysis of academic research on this evolving research area.

Design/methodology/approach

This review synthesises antecedents, consequences and mediators reported in consumer privacy literature and presents these factors in a conceptual framework to demonstrate the consumer privacy phenomenon.

Findings

Based on the synthesis of constructs reported in the existing literature, a conceptual framework is proposed highlighting antecedents, mediators and outcomes of experiential marketing efforts. Finally, this study deciphers overlooked areas of consumer privacy in the context of smartphone research and provides insightful directions to advance research in this domain in terms of theory development, context, characteristics and methodology.

Originality/value

This study significantly contributes to consumer behaviour literature, specifically consumer privacy literature.

Details

Journal of Consumer Marketing, vol. 41 no. 1
Type: Research Article
ISSN: 0736-3761

Keywords

1 – 10 of over 2000