Search results

1 – 10 of over 13000
Article
Publication date: 2 August 2019

Le Wang, Zao Sun, Xiaoyong Dai, Yixin Zhang and Hai-hua Hu

The purpose of this paper is to facilitate understanding of how to mitigate the privacy concerns of users who have experienced privacy invasions.

1449

Abstract

Purpose

The purpose of this paper is to facilitate understanding of how to mitigate the privacy concerns of users who have experienced privacy invasions.

Design/methodology/approach

Drawing on the communication privacy management theory, the authors developed a model suggesting that privacy concerns form through a cognitive process involving threat-coping appraisals, institutional privacy assurances and privacy experiences. The model was tested using data from an empirical survey with 913 randomly selected social media users.

Findings

Privacy concerns are jointly determined by perceived privacy risks and privacy self-efficacy. The perceived effectiveness of institutional privacy assurances in terms of established privacy policies and privacy protection technology influences the perceptions of privacy risks and privacy self-efficacy. More specifically, privacy invasion experiences are negatively associated with the perceived effectiveness of institutional privacy assurances.

Research limitations/implications

Privacy concerns are conceptualized as general concerns that reflect an individual’s worry about the possible loss of private information. The specific types of private information were not differentiated.

Originality/value

This paper is among the first to clarify the specific mechanisms through which privacy invasion experiences influence privacy concerns. Privacy concerns have long been viewed as resulting from individual actions. The study contributes to literature by linking privacy concerns with institutional privacy practice.

Article
Publication date: 21 April 2022

Gaohui Cao and Ping Wang

Based on communication privacy management (CPM) theory, this study aimed to explore how gender and age criteria, motivational criterion (locatability), benefit-risk ratio criteria…

Abstract

Purpose

Based on communication privacy management (CPM) theory, this study aimed to explore how gender and age criteria, motivational criterion (locatability), benefit-risk ratio criteria (perceived benefits of privacy information disclosure and privacy concerns), contextual criteria (privacy experience) and boundary coordination and turbulence (perceived effectiveness of privacy policy) interact and combine in leading to voice assistant (VA) users' intention to reveal or conceal their privacy information.

Design/methodology/approach

A questionnaire was designed and distributed to car drivers who have intelligent VA use experience while driving. A total of 230 valid responses were collected. The fuzzy-set qualitative comparative analysis (fsQCA) approach was used to analyse the data.

Findings

Via configuration analysis with fsQCA, five equivalent configurations leading to the high intention of disclosing privacy information, and one configuration leading to the intention of concealing privacy information were identified. Four theoretical configurational propositions were proposed. Moreover, the theoretical and practical implications of the findings are discussed.

Originality/value

This study offers some insightful implications in the field of private information communication in artificial intelligence applications as well as practical implications for intelligent VA application design. The findings provide empirical evidence of privacy communication management in the context of smart VA usage.

Article
Publication date: 10 October 2022

Xinlin Yao, Yuxiang Chris Zhao, Shijie Song and Xiaolun Wang

While anonymous online interactions could be helpful and less risky, they are usually not enough for LGBTQ+ people to satisfy the need of expressing their marginalized identity to…

Abstract

Purpose

While anonymous online interactions could be helpful and less risky, they are usually not enough for LGBTQ+ people to satisfy the need of expressing their marginalized identity to networks of known ties (i.e. on identified social media like Facebook, WeChat, and TikTok). However, identified social media bring LGBTQ+ people both sources and challenges like “context collapse” that flattens diverse networks or audiences that are originally separated. Previous studies focus on LGBTQ+ people's disclosure and responses to context collapse, few studies investigate how their perceptions of context collapse are shaped and their privacy management beyond regulating disclosure on social media. Drawing on identity theory and communication privacy management (CPM), this study aims to investigate how the need of LGBTQ+ people for self-identity affects their perceived context collapse and results in privacy management on identified social media.

Design/methodology/approach

Given the target population is LGBTQ+ people, The authors recruited participants through active LGBTQ+ online communities, influential LGBTQ+ activists, and the snowballing sampling. The authors empirically examined the proposed model using the PLS-SEM technique with a valid sample of 232 respondents concerning their identity practices and privacy management on WeChat, a typical and popular identified social media in China.

Findings

The results suggested that the need for expressing the self and the need for maintaining continuity of self-identity have significant influences on perceived context collapse, but vary in directions. The perceived context collapse will motivate LGBTQ+ individuals to engage in privacy management to readjust rules on ownership, access, and extension. However, only ownership management helps them regain the perceived privacy control on social media.

Originality/value

This study incorporated and highlighted the influence of LGBTQ+ identity in shaping context collapse and online privacy management. This study contributes to the literature on privacy and information communication and yields practical implications, especially on improving privacy-related interactive design for identified social media services.

Details

Journal of Documentation, vol. 79 no. 3
Type: Research Article
ISSN: 0022-0418

Keywords

Open Access
Article
Publication date: 11 April 2022

Grace Fox, Theo Lynn and Pierangelo Rosati

The General Data Protection Regulation (GDPR) introduces significant data protection obligations on all organizations within the European Union (EU) and those transacting with EU…

3805

Abstract

Purpose

The General Data Protection Regulation (GDPR) introduces significant data protection obligations on all organizations within the European Union (EU) and those transacting with EU citizens. This paper presents the GDPR privacy label and uses two empirical studies to examine the effectiveness of this approach in influencing consumers' privacy perceptions and related behavioral intentions.

Design/methodology/approach

The paper tests the efficacy of two GDPR privacy label designs, a consent-based label and a static label. Study 1 examines the effects of each label on perceptions of risk, control and privacy. Study 2 investigates the influence of consumers' privacy perceptions on perceived trustworthiness and willingness to interact with the organization.

Findings

The findings support the potential of GDPR privacy labels for positively influencing perceptions of risk, control, privacy and trustworthiness and enhancing consumers' willingness to transact and disclose data to online organizations.

Practical implications

The findings are useful for organizations required to comply with the GDPR and present a solution to requirements for transparent communications and explicit consent.

Originality/value

This study examines and demonstrates the efficacy of visualized privacy policies in impacting consumer privacy perceptions and behavioral intentions.

Details

Information Technology & People, vol. 35 no. 8
Type: Research Article
ISSN: 0959-3845

Keywords

Article
Publication date: 1 April 2003

Georgios I. Zekos

Aim of the present monograph is the economic analysis of the role of MNEs regarding globalisation and digital economy and in parallel there is a reference and examination of some…

88455

Abstract

Aim of the present monograph is the economic analysis of the role of MNEs regarding globalisation and digital economy and in parallel there is a reference and examination of some legal aspects concerning MNEs, cyberspace and e‐commerce as the means of expression of the digital economy. The whole effort of the author is focused on the examination of various aspects of MNEs and their impact upon globalisation and vice versa and how and if we are moving towards a global digital economy.

Details

Managerial Law, vol. 45 no. 1/2
Type: Research Article
ISSN: 0309-0558

Keywords

Book part
Publication date: 17 October 2018

Vitaliano Barberio, Markus A. Höllerer, Renate E. Meyer and Dennis Jancsary

This chapter explores the multiplicity, formation, and porosity of organizational boundaries in new, fluid forms of production. Conceptualizing them as “partial organizations,” we…

Abstract

This chapter explores the multiplicity, formation, and porosity of organizational boundaries in new, fluid forms of production. Conceptualizing them as “partial organizations,” we argue that both the intentional design of organizational elements (such as membership, hierarchy, rules, monitoring, and sanctioning) as well as unintended adjustments of “unorganized” aspects drive boundary formation and impact boundary porosity. In addition, we contend that structuring dynamics will create specific trajectories for boundaries over time. Empirically, we further our theoretical framework on the basis of an in-depth case study of the Apache open-source software community during its formative years (1995–2002). We find that both the salience and formalization of boundaries increase over time. However, different conceptions of boundaries (such as efficiency, competence, power, and identity) become salient at different points in time. While design and adjustment drive boundary formation with regard to all boundary conceptions in our empirical case, porosity develops differently for each of them. We also demonstrate that the formalization of boundaries does not necessarily reduce boundary porosity, but actually may increase it.

Book part
Publication date: 12 May 2017

Mitsuru Kodama

This chapter goes into deeper discussion and consideration of holistic leadership through the concept of holistic leadership presented in Part 1 and analysis of a number of case…

Abstract

This chapter goes into deeper discussion and consideration of holistic leadership through the concept of holistic leadership presented in Part 1 and analysis of a number of case studies presented in Part 2. The chapter first analyzes and considers the concept of dialectical leadership, which is an element for achieving a balance between centralized leadership and distributed leadership at the psychological boundary layer located at the boundary layer between the formal organizational layer and the informal organizational layer from the perspective of four dimensions: the time axis, spatial axis, strategic axis, and management axis. This is because there is new knowledge gained from multiple case analyses and because dialectical leadership has an impact on management elements in these four dimensions when companies execute strategic knowledge creation processes to achieve business innovation. Second, the chapter discusses the concept of leadership interaction which occurs among leaders at the individual boundaries of the three-layered structure (practice layers) of the informal organization layer located in the business community, the psychological boundary layer located in the boundary layer of the business community, and the formal organization layer located in the formal organization, and the three management layers. Third, as demonstrated in the cases of Apple, Cisco Systems, Dyson, SoftBank, and Sony, strategic collaboration with other companies including customers is extremely important for those practitioners who are promoting business ecosystem strategies across different companies. To achieve this, synchronization of leadership at the three practice layers and three management layers in holistic leadership through boundary negotiations among individual leaderships across different companies is important. These concepts are discussed in this chapter. Fourth, this chapter indicates that excellent holistic leadership is necessary for practitioners to achieve strategic knowledge creation high in quality, but this requires leadership for value creation for the formation of new business communities that originate in the formation of “Ba.” The chapter also indicates that “practical wisdom” is an important element for practitioners in such value creation, and the presence of this element is a necessary condition for generating excellent holistic leadership.

Details

Developing Holistic Leadership
Type: Book
ISBN: 978-1-78714-421-7

Keywords

Book part
Publication date: 12 May 2017

Mitsuru Kodama

As a company that has continuously achieved business innovation, Apple in the United States has successfully applied strategic knowledge creation to produce a series of products…

Abstract

As a company that has continuously achieved business innovation, Apple in the United States has successfully applied strategic knowledge creation to produce a series of products that integrate various digital devices as well as diverse contents and applications, such as the iPod, iPhone, and iPad, based on a corporate vision of a digital hub concept. At the same time, the redefining of corporate boundaries that expanded Apple’s business in a horizontal direction from the Macintosh PC business to the delivery of music, smartphones, and tablets is also an indication of the evolution of a corporate vision involving Apple’s strategic transformation. This chapter presents the strategic and creative processes that enabled practitioners, including the late Steve Jobs, to demonstrate “strategic innovation capability” by “holistic leadership” at every level of management at Apple and successfully achieve a business ecosystem strategy through “creative collaboration” across diverse boundaries within and outside the company.

Abstract

Details

Understanding Intercultural Interaction: An Analysis of Key Concepts, 2nd Edition
Type: Book
ISBN: 978-1-83753-438-8

Book part
Publication date: 19 April 2024

Lars Mjøset, Roel Meijer, Nils Butenschøn and Kristian Berg Harpviken

This study employs Stein Rokkan's methodological approach to analyse state formation in the Greater Middle East. It develops a conceptual framework distinguishing colonial…

Abstract

This study employs Stein Rokkan's methodological approach to analyse state formation in the Greater Middle East. It develops a conceptual framework distinguishing colonial, populist and democratic pacts, suitable for analysis of state formation and nation-building through to the present period. The framework relies on historical institutionalism. The methodology, however, is Rokkan's. The initial conceptual analysis also specifies differences between European and the Middle Eastern state formation processes. It is followed by a brief and selective discussion of historical preconditions. Next, the method of plotting singular cases into conceptual-typological maps is applied to 20 cases in the Greater Middle East (including Afghanistan, Iran and Turkey). For reasons of space, the empirical analysis is limited to the colonial period (1870s to the end of World War 1). Three typologies are combined into one conceptual-typological map of this period. The vertical left-hand axis provides a composite typology that clarifies cultural-territorial preconditions. The horizontal axis specifies transformations of the region's agrarian class structures since the mid-19th century reforms. The right-hand vertical axis provides a four-layered typology of processes of external intervention. A final section presents selected comparative case reconstructions. To the authors' knowledge, this is the first time such a Rokkan-style conceptual-typological map has been constructed for a non-European region.

Details

A Comparative Historical and Typological Approach to the Middle Eastern State System
Type: Book
ISBN: 978-1-83753-122-6

Keywords

1 – 10 of over 13000