Search results
1 – 10 of 509Jaeyoung Park, Woosik Shin, Beomsoo Kim and Miyea Kim
This study aims to explore the spillover effects of data breaches from a consumer perspective in the e-commerce context. Specifically, we investigate how an online retailer’s data…
Abstract
Purpose
This study aims to explore the spillover effects of data breaches from a consumer perspective in the e-commerce context. Specifically, we investigate how an online retailer’s data breach affects consumers’ privacy risk perceptions of competing firms, and further how it affects shopping intention for the competitors. We also examine how the privacy risk contagion effect varies depending on the characteristics of competitors and their competitive responses.
Design/methodology/approach
We conducted two scenario-based experiments with surveys. To assess the spillover effects and the moderating effects, we employed an analysis of covariance. We also performed bootstrapping-based mediation analyses using the PROCESS macro.
Findings
We find evidence for the privacy risk contagion effect and demonstrate that it negatively influences consumers’ shopping intention for a competing firm. We also find that a competitor’s cybersecurity message is effective in avoiding the privacy risk contagion effect and the competitor even benefits from it.
Originality/value
While previous studies have examined the impacts of data breaches on customer perceptions of the breached firm, our study focuses on customer perceptions of the non-breached firms. To the best of the authors’ knowledge, this study is one of the first to provide empirical evidence for the negative spillover effects of a data breach from a consumer perspective. More importantly, this study empirically demonstrates that the non-breached competitor’s competitive response is effective in preventing unintended negative spillover in the context of the data breach.
Details
Keywords
Princely Ifinedo, Francine Vachon and Anteneh Ayanso
This paper aims to increase understanding of pertinent exogenous and endogenous antecedents that can reduce data privacy breaches.
Abstract
Purpose
This paper aims to increase understanding of pertinent exogenous and endogenous antecedents that can reduce data privacy breaches.
Design/methodology/approach
A cross-sectional survey was used to source participants' perceptions of relevant exogenous and endogenous antecedents developed from the Antecedents-Privacy Concerns-Outcomes (APCO) model and Social Cognitive Theory. A research model was proposed and tested with empirical data collected from 213 participants based in Canada.
Findings
The exogenous factors of external privacy training and external privacy self-assessment tool significantly and positively impact the study's endogenous factors of individual privacy awareness, organizational resources allocated to privacy concerns, and group behavior concerning privacy laws. Further, the proximal determinants of data privacy breaches (dependent construct) are negatively influenced by individual privacy awareness, group behavior related to privacy laws, and organizational resources allocated to privacy concerns. The endogenous factors fully mediated the relationships between the exogenous factors and the dependent construct.
Research limitations/implications
This study contributes to the budding data privacy breach literature by highlighting the impacts of personal and environmental factors in the discourse.
Practical implications
The results offer management insights on mitigating data privacy breach incidents arising from employees' actions. Roles of external privacy training and privacy self-assessment tools are signified.
Originality/value
Antecedents of data privacy breaches have been underexplored. This paper is among the first to elucidate the roles of select exogenous and endogenous antecedents encompassing personal and environmental imperatives on data privacy breaches.
Details
Keywords
Steven Muzatko and Gaurav Bansal
This research examines the relationship between the timeliness in announcing the discovery of a data breach and consumer trust in an e-commerce company, as well as later…
Abstract
Purpose
This research examines the relationship between the timeliness in announcing the discovery of a data breach and consumer trust in an e-commerce company, as well as later trust-rebuilding efforts taken by the company to compensate users impacted by the breach.
Design/methodology/approach
A survey experiment was used to examine the effect of both trust-reducing events (announced data breaches) and trust-enhancing events (provision of identity theft protection and credit monitoring) on consumer trust. The timeliness of the breach announcement by an e-commerce company was manipulated between two randomly assigned groups of subjects; one group viewed an announcement of the breach immediately upon its discovery, and the other viewed an announcement made two months after the breach was discovered. Consumer trust was measured before the breach, after the breach was announced, and finally, after the announcement of data protection.
Findings
The results suggest that companies that delay a data breach announcement are likely to suffer a larger drop in consumer trust than those that immediately disclose the data breach. The results also suggest that trust can be repaired by providing data protection. However, even after providing identity theft protection and credit monitoring, companies that fail to promptly disclose a breach have lower repaired trust than companies that promptly disclose.
Originality/value
This study contributes to the literature on e-commerce trust by examining how a company's forthrightness in reporting a data breach impacts user trust at the time of the disclosure of the data breach and after subsequent efforts to repair trust.
Details
Keywords
Personal data is a powerful tool. The more someone know about us, the more power they got over us. But who will control the most of our personal data? Does the government and the…
Abstract
Purpose
Personal data is a powerful tool. The more someone know about us, the more power they got over us. But who will control the most of our personal data? Does the government and the big tech really care about our personal data? This paper aims to look at data practices, data-related policy making as well as its economic consequences in the context of emerging economies.
Design/methodology/approach
Using qualitative methods such as literature review and analysis of numerous government documents, this paper inquires into the dynamics in the use of data by the business sectors, explains how data governance can add value to the business sectors while ensuring customers’ data privacy protection based on the data governance mechanism framework and details what it takes.
Findings
Using the case of Indonesian recent development on data privacy regulation, this paper describes the problems and threats to personal data protection. The advent of latest computing and mobile technology is shifting power relations between the governments, the big tech, as well as the end users. To conclude, the strategy and policy recommendations for implementing data privacy protection are also presented.
Originality/value
This paper provides a timely synthesis of data practices in the context of developing countries, particularly in relation to policy making and economic consequences. This paper also identifies and shares several promising future research ideas.
Details
Keywords
Donia Waseem, Shijiao (Joseph) Chen, Zhenhua (Raymond) Xia, Nripendra P. Rana, Balkrushna Potdar and Khai Trieu Tran
In the online environment, consumers increasingly feel vulnerable due to firms’ expanding capabilities of collecting and using their data in an unsanctioned manner. Drawing from…
Abstract
Purpose
In the online environment, consumers increasingly feel vulnerable due to firms’ expanding capabilities of collecting and using their data in an unsanctioned manner. Drawing from gossip theory, this research focuses on two key suppressors of consumer vulnerability: transparency and control. Previous studies conceptualize transparency and control from rationalistic approaches that overlook individual experiences and present a unidimensional conceptualization. This research aims to understand how individuals interpret transparency and control concerning privacy vulnerability in the online environment. Additionally, it explores strategic approaches to communicating the value of transparency and control.
Design/methodology/approach
An interpretivism paradigm and phenomenology were adopted in the research design. Data were collected through semi-structured interviews with 41 participants, including consumers and experts, and analyzed through thematic analysis.
Findings
The findings identify key conceptual dimensions of transparency and control by adapting justice theory. They also reveal that firms can communicate assurance, functional, technical and social values of transparency and control to address consumer vulnerability.
Originality/value
This research makes the following contributions to the data privacy literature. The findings exhibit multidimensional and comprehensive conceptualizations of transparency and control, including user, firm and information perspectives. Additionally, the conceptual framework combines empirical insights from both experiencers and observers to offer an understanding of how transparency and control serve as justice mechanisms to effectively tackle the issue of unsanctioned transmission of personal information and subsequently address vulnerability. Lastly, the findings provide strategic approaches to communicating the value of transparency and control.
Details
Keywords
Kolawole Yusuff, Andrea Whittle and Frank Mueller
Existing literature has begun to identify the agonistic and contested aspects of the ongoing development of accountability systems. These “contests” are particularly important…
Abstract
Purpose
Existing literature has begun to identify the agonistic and contested aspects of the ongoing development of accountability systems. These “contests” are particularly important during periods of change when an accountability “deficit” has been identified, that is, when existing accountability systems are deemed inadequate and requiring revision. The purpose of this paper is to explore one such set of contests in the case of large technology and social media firms: the so-called “big tech”. The authors focus specifically on “big tech” because of increasing societal concerns about the harms associated with their products, services and business practices.
Design/methodology/approach
The authors analysed four US Congressional hearings, in which the CEO of Facebook was held to account for the company's alleged breaches and harms. The authors conducted a discourse analysis of the dialogue between the account giver (Mark Zuckerberg) and account holders (Members of Congress) in the oral testimony at the four hearings.
Findings
Two areas of contestation in the dialogue between the account giver and account holders are identified. “Epistemic contests” involved contestation about the “facts” concerning the harms the company had allegedly caused. “Responsibility contests” involved contestation about who (or what) should be held responsible for these harms and according to what standards or criteria.
Originality/value
The study advances critical dialogical accountability literature by identifying two areas of contestation during periods of change in accountability systems. In so doing, they advanced the theory by conceptualising the process of change as underpinned by discursive contests in which multiple actors construct and contest the “problem” with existing accountability systems. The outcomes of these contests are significant, the authors suggest, because they inform the development of reforms to the accountability system governing big tech firms and other industries undergoing similar periods of contestation and change.
Details
Keywords
Ornella Tanga Tambwe, Clinton Ohis Aigbavboa and Opeoluwa Akinradewo
Data represents a critical resource that enables construction companies’ success; thus, its management is very important. The purpose of this study is to assess the benefits of…
Abstract
Purpose
Data represents a critical resource that enables construction companies’ success; thus, its management is very important. The purpose of this study is to assess the benefits of construction data risks management (DRM) in the construction industry (CI).
Design/methodology/approach
This study adopted a quantitative method and collected data from various South African construction professionals with the aid of an e-questionnaire. These professionals involve electrical engineers, quantity surveyors, architects and mechanical, as well as civil engineers involved under a firm, or organisation within the province of Gauteng, South Africa. Standard deviation, mean item score, non-parametric Kruskal–Wallis H test and exploratory factor analysis were used to analyse the retrieved data.
Findings
The findings revealed that DRM enhances project and company data availability, promotes confidentiality and enhances integrity, which are the primary benefits of DRM that enable the success of project delivery.
Research limitations/implications
The research was carried out only in the province of Gauteng due to COVID-19 travel limitations.
Practical implications
The construction companies will have their data permanently in their possession and no interruption will be seen due to data unavailability, which, in turn, will allow long-term and overall pleasant project outcomes.
Originality/value
This study seeks to address the benefits of DRM in the CI to give additional knowledge on risk management within the built environment to promote success in every project.
Details
Keywords
Rahul Sindhwani, Abhishek Behl, Vijay Pereira, Yama Temouri and Sushmit Bagchi
The COVID-19 pandemic has showcased the lack of resilience found in the global value chains (GVCs) of multinational enterprises (MNEs). Existing evidence shows that MNEs have only…
Abstract
Purpose
The COVID-19 pandemic has showcased the lack of resilience found in the global value chains (GVCs) of multinational enterprises (MNEs). Existing evidence shows that MNEs have only recently and slowly started recovering and attempting to rebuild the resilience of their GVCs. This paper analyzes the challenges/inhibitors faced by MNEs in building their resilience through their GVCs.
Design/methodology/approach
A four-stage hybrid model was used to identify the interrelationship among the identified inhibitors and to distinguish the most critical ones by ranking them. In the first stage, we employed a modified total interpretive structural modeling (m-TISM) approach to determine the inter-relationship among the inhibitors. Additionally, we identified the inhibitors' driving power and dependency by performing a matrix multiplication applied to classification (MICMAC) analysis. In the second stage, we employed the Pythagorean fuzzy analytic hierarchy process (PF-AHP) method to determine the weight of the criteria. The next stage followed, in which we used the Pythagorean fuzzy combined compromise solution (PF-CoCoSo) method to rank the inhibitors. Finally, we performed a sensitivity analysis to determine the robustness of the framework we had built based on the criteria and inhibitors.
Findings
We find business sustainability to have the highest importance and managerial governance as the most critical inhibitor hindering the path to resilience. Based on these insights, we derive four research propositions aimed at strengthening the resilience of such GVCs, followed by their implications for theory and practice.
Originality/value
Our findings contribute to the extant literature by uncovering key inhibitors that act as barriers to MNEs. We link out our findings with a number of propositions that we derive, which may be considered for implementation by MNEs and could help them endow their GVCs with resilience.
Details
Keywords
Hitesh Sharma, Praveen Ranjan Srivastava, Sajjad M. Jasimuddin, Zuopeng Justin Zhang and Ikram Jebabli
This study aims to provide a comprehensive analysis of the current privacy concerns in the tourism industry by uncovering the key factors leading to such concerns (i.e. smart…
Abstract
Purpose
This study aims to provide a comprehensive analysis of the current privacy concerns in the tourism industry by uncovering the key factors leading to such concerns (i.e. smart public services, cyber security issues, consumer behaviour and governance). Using papers from multiple sources, the relationship between technology advancements and tourist’s privacy concerns has been established.
Design/methodology/approach
This study adopted a machine learning-based systematic literature review approach to find out the clusters. The study analysed 68 papers using the topic modelling approach. A four-cluster solution was considered to be most representative of the extant literature identified using bibliographic coupling. Finally, content analysis of the selected literature has been performed.
Findings
This study identified four factors majorly leading to privacy concerns amid increasing technological advancements. Moreover, these factors were found to have a dyadic relationship with technological advancements. To everyone’s amazement, sustainable tourism was also found to have led to privacy concerns among tourists along with a lack of governance and cyber security issues. Furthermore, cluster-wise future research directions are provided based on the content analysis.
Originality/value
This study contributes to the literature by systematically reviewing and identifying the four dimensions leading to privacy concerns. To the best of the authors’ knowledge, the study done is the only attempt to synthesize the extant literature on tourists’ privacy concerns using an unbiased scientific approach.
目的
本研究对旅游业当前的隐私问题进行了全面分析, 以揭示导致此类担忧的关键因素(即智能公共服务、网络安全问题、消费者行为和治理)。 通过考察来自多方渠道的现有文献, 本研究确立了技术进步与游客隐私问题之间的关系。
设计/方法/途径
本研究采用基于机器学习的系统文献综述方法来找出聚类。 该研究使用主题建模方法分析了 68 篇文章。四聚类解决方案是现有文献中最具代表的 文献分类方法。最后, 本研究对所选文献进行了内容分析。
研究结果
这项研究确定了在技术进步不断增加的情况下主要导致隐私问题的四个因素。 此外, 这些因素被发现与技术进步有二元关系。 本研究还发现可持续旅游业引发了游客对隐私的担忧以及缺乏治理和网络安全问题。 此外, 通过基于内容的分析, 本研究提供了未来的聚类研究方向。
独创性
本研究对现有文献的贡献在于通过系统地文献综述和分析以确定导致隐私问题的四个维度。该研究是基于公正的科学方法综合现有游客隐私问题文献的首度尝试。
Finalidad/Objetivo
Este estudio proporciona un análisis exhaustivo de la actual preocupación por la privacidad en el sector turístico, poniendo al descubierto los factores clave que la generan (los servicios públicos inteligentes, los problemas de ciberseguridad, el comportamiento de los consumidores y la gobernanza). Gracias al uso de artículos de múltiples fuentes, se ha establecido la relación entre los avances tecnológicos y la preocupación de los turistas por la privacidad.
Diseño/Metodología/Enfoque
Este estudio adoptó un enfoque de revisión sistemática de la literatura basado en el aprendizaje automático para descubrir los conglomerados. El estudio analizó sesenta y ocho artículos utilizando el enfoque de modelización de temas. Se consideró que una solución de cuatro conglomerados era la más representativa de la literatura existente identificada mediante el acoplamiento bibliográfico. Por último, se realizó un análisis de contenido de la bibliografía seleccionada.
Hallazgos
En este estudio se identificaron cuatro factores principales que suscitan inquietud por la privacidad en medio de los crecientes avances tecnológicos. Además, se descubrió que estos factores tienen una relación diádica con dichos avances. Para sorpresa de todos, se halló que el turismo sostenible, junto con la falta de gobernanza y los problemas de ciberseguridad, también suscitan entre los turistas preocupaciones por su privacidad. Finalmente, el análisis de contenido ofrece orientaciones para futuras investigaciones.
Originalidad
Este estudio contribuye a la literatura haciendo una revisión sistemática e identificando las cuatro dimensiones que conducen a la preocupación por la privacidad. Este estudio es el único intento de sintetizar la bibliografía existente sobre la preocupación de los turistas por su privacidad utilizando un enfoque científico imparcial.
Details
Keywords
Matthew Tickle, Sarah Schiffling and Gaurav Verma
This paper aims to explore the impact of fourth-party logistics (4PL) adoption on the agility, adaptability and alignment (AAA) capabilities within humanitarian supply chains…
Abstract
Purpose
This paper aims to explore the impact of fourth-party logistics (4PL) adoption on the agility, adaptability and alignment (AAA) capabilities within humanitarian supply chains (HSCs).
Design/methodology/approach
Semi-structured interviews with individuals from a large non-government organisation were combined with secondary data to assess the influence of 4PL adoption on AAA capabilities in HSCs.
Findings
The results indicate that HSCs exhibit some of the AAA antecedents but not all are fully realised. While 4PL positively affects the AAA capabilities of HSCs, its adoption faces challenges such as the funding environment, data security/confidentiality and alignment with humanitarian principles. The study suggests an AAA antecedent realignment, positioning alignment as a precursor to agility and adaptability. It also identifies three core antecedents in HSCs: flexibility, speed and environmental uncertainty.
Practical implications
The study shows the positive impact 4PL adoption can have on the AAA capabilities of HSCs. The findings have practical relevance for those wishing to optimise HSC performance through 4PL adoption, by identifying the inhibiting factors to its adoption as well as strategies to address them.
Originality/value
This research empirically explores 4PL’s impact on AAA capabilities in HSCs, highlighting the facilitating and hindering factors of 4PL adoption in this environment as well as endorsing a realignment of AAA antecedents. It also contributes to the growing research on SC operations in volatile settings.
Details