Search results

1 – 10 of over 4000
Article
Publication date: 26 April 2024

Rebecca Dei Mensah, Stephen Tetteh, Jacinta Martina Annan, Raphael Papa Kweku Andoh and Elijah Osafo Amoako

The purpose of this study was to investigate the roles of employee experience and top management commitment in the relationship between human resource (HR) records management…

Abstract

Purpose

The purpose of this study was to investigate the roles of employee experience and top management commitment in the relationship between human resource (HR) records management culture and HR records privacy control in organisations in Ghana.

Design/methodology/approach

Structural equation modelling was used in analysing the data. Following the specification of the model, three main types of analyses were carried out. They were reflective measurement model analyses to test reliability and validity; formative measurement model analyses to test redundancy, collinearity, significance and relevance of the lower-order constructs; and structural model analyses to ascertain the explanatory and predictive powers of the model, significance of the hypotheses and their effect sizes.

Findings

The study confirmed that communication, privacy awareness and training and risk assessment are dimensions of HR records management culture. Concerning the hypotheses, it was established that HR records management culture is related to HR records privacy control. Also, the study showed that employee experience positively moderated the relationship HR records management culture has with HR records privacy control. However, top management commitment negatively moderated the relationship HR records management culture has with HR records privacy control.

Practical implications

Organisations committed to the privacy control of HR records need to ensure the retention of their employees, as the longer they stay with the organisation, the more they embody the HR records management culture which improves the privacy control of HR records. For top management commitment, it should be restricted to providing strategic direction for HR records privacy control, as the day-to-day influence of top management commitment on the HR records management culture does not improve the privacy control of HR records.

Originality/value

This study demonstrates that communication, privacy awareness and training and risk assessment are dimensions of HR record management culture. Also, the extent of employee experience and top management commitment required in the relationship between HR records management culture and HR records privacy control is revealed.

Details

Global Knowledge, Memory and Communication, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2514-9342

Keywords

Article
Publication date: 27 March 2024

Haroon Iqbal Maseeh, Charles Jebarajakirthy, Achchuthan Sivapalan, Mitchell Ross and Mehak Rehman

Smartphone apps collect users' personal information, which triggers privacy concerns for app users. Consequently, app users restrict apps from accessing their personal…

200

Abstract

Purpose

Smartphone apps collect users' personal information, which triggers privacy concerns for app users. Consequently, app users restrict apps from accessing their personal information. This may impact the effectiveness of in-app advertising. However, research has not yet demonstrated what factors impact app users' decisions to use apps with restricted permissions. This study is aimed to bridge this gap.

Design/methodology/approach

Using a quantitative research method, the authors collected the data from 384 app users via a structured questionnaire. The data were analysed using AMOS and fuzzy-set qualitative comparative analysis (fsQCA).

Findings

The findings suggest privacy concerns and risks have a significant positive effect on app usage with restricted permissions, whilst reputation, trust and perceived benefits have significant negative impact on it. Some app-related factors, such as the number of apps installed and type of apps, also impact app usage with restricted permissions.

Practical implications

Based on the findings, the authors provided several implications for app stores, app developers and app marketers.

Originality/value

This study examines the factors that influence smartphone users' decisions to use apps with restricted permission requests. By doing this, the authors' study contributes to the consumer behaviour literature in the context of smartphone app usage. Also, by explaining the underlying mechanisms through which the principles of communication privacy management theory operate in smartphone app context, the authors' research contributes to the communication privacy management theory.

Details

Information Technology & People, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0959-3845

Keywords

Article
Publication date: 7 May 2024

Lin Zhu, Yan Wang and Yanhong Chen

Mothers sharing images and information on social media about their children is a contemporary cultural norm. While the practice has been heavily discussed in popular media, there…

Abstract

Purpose

Mothers sharing images and information on social media about their children is a contemporary cultural norm. While the practice has been heavily discussed in popular media, there is a lack of empirical research examining the phenomenon from the perspectives of parents and adolescent children in China. The current study aims to find out whether or not mothers and their children engage in discussions about sharenting and how adolescents negotiate their privacy concerns with their mothers.

Design/methodology/approach

The current study examined how parents and their children make sense of sharenting via semi-structured interviews with 16 Chinese mothers. In addition, the study enlisted 21 adolescents to examine their perspectives on sharenting. Data were analyzed using thematic analysis.

Findings

Results showed that although documentation is articulated as the primary sharenting motivation, identity management is a major drive behind sharenting. The dynamics between mothers and their children, as well as between adolescents and their parents, are also explored regarding the issues of consent, privacy and identity.

Research limitations/implications

This study has theoretical implications for the communication privacy management (CPM) theory, as it underscores the dynamic nature of privacy management, shaped by cultural norms, family dynamics and evolving communication technologies. It also adds value for campaign practitioners to provide education programs on the serious consequences of sharenting.

Originality/value

This research serves as a starting point to further explore a child’s entrance to adulthood as our culture’s first true digital natives who will bear extensive online and offline identities.

Details

Internet Research, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1066-2243

Keywords

Article
Publication date: 5 September 2024

Hoai Lan Duong, Minh Tung Tran, Thi Kim Oanh Vo and Thi Kim Cuc Tran

This paper aims to investigate the extent of personal privacy concerns expressed by university students in Vietnam while using TikTok, the influence of peer interactions and…

Abstract

Purpose

This paper aims to investigate the extent of personal privacy concerns expressed by university students in Vietnam while using TikTok, the influence of peer interactions and social norms on privacy attitudes and behaviors and the strategies used by university students in Vietnam to mitigate privacy risks on TikTok.

Design/methodology/approach

A qualitative approach using semi-structured interviews was used to gather data on the following: the degree to which Vietnamese university students express concerns about their personal privacy while using TikTok; how peer interactions and social norms influence privacy attitudes and behaviors; and the strategies these students use to mitigate privacy risks on the platform.

Findings

Findings indicate that although university students exhibit a relatively low level of concern regarding their personal privacy on TikTok, peer influences and societal norms significantly shape their attitudes and behaviors on the platform. Moreover, students use several strategies to mitigate privacy risks, such as selective content sharing and refraining from engaging with unknown links.

Practical implications

These insights provide valuable implications for the development of targeted interventions and educational initiatives aimed at fostering a more privacy-conscious TikTok user community among university students in Vietnam.

Originality/value

This research fills a critical gap in the existing literature by focusing on the influence of social norms and peer influences on privacy attitudes and behaviors on social media platforms. While prior studies have explored various factors impacting privacy concerns on social media, the role of social dynamics has been understudied. Moreover, the research specifically addresses the lack of investigation into privacy concerns on TikTok, a platform rapidly gaining popularity among younger demographics.

Details

Journal of Information, Communication and Ethics in Society, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1477-996X

Keywords

Article
Publication date: 18 September 2023

Yu Wang, Daqing Zheng and Yulin Fang

The advancement of enterprise social networks (ESNs) facilitates information sharing but also presents the challenge of managing information boundaries. This study aims to explore…

Abstract

Purpose

The advancement of enterprise social networks (ESNs) facilitates information sharing but also presents the challenge of managing information boundaries. This study aims to explore the factors that influence the information-control behavior of ESN users when continuously sharing information.

Design/methodology/approach

This study specifies the information-control behaviors in the “wall posts” channel and applies communication privacy management (CPM) theory to analyze the effects of the individual-specific factor (disposition to value information), context-specific factors (work-relatedness and information richness) and risk-benefit ratio (public benefit and public risk). Data on actual information-control behaviors extracted from ESN logs are examined using multilevel mixed-effects logistic regression analysis.

Findings

The study's findings show the direct effects of the individual-specific factor, context-specific factors and risk-benefit ratio, highlighting interactions between the individual motivation factor and ESN context factors.

Originality/value

This study reshapes the relationship of CPM theory boundary rules in the ESN context, extending information-control research and providing insights into ESNs' information-control practices.

Article
Publication date: 11 August 2022

Tingting Liu, Wenqian Li and Xingping Jia

This study aims to explore the relationships between consumer data vulnerability, peer privacy concerns and consumers' continued usage intention of sharing accommodation…

Abstract

Purpose

This study aims to explore the relationships between consumer data vulnerability, peer privacy concerns and consumers' continued usage intention of sharing accommodation platforms, as well as the moderating effects of the various benefits perceived by consumers.

Design/methodology/approach

Data were collected from 327 consumers of sharing accommodation platforms in China. Partial least squares (PLS)-structural equation modeling (SEM) was conducted to test the research hypotheses.

Findings

The results suggest that both consumer data vulnerability and peer privacy concerns have negative effects on consumer's continued usage intention of sharing accommodation platforms, which can be further mitigated by consumer perceived economic, social and emotional benefits. This study also finds that consumer data vulnerability has a positive effect on consumer's peer privacy concerns.

Practical implications

This study gives that managers of sharing accommodation platforms a better understanding of how consumers respond to their data vulnerability on sharing accommodation platforms. In addition, this study also highlights the measures that platforms may employ to mitigate the negative influence of consumer data vulnerability and consumers' peer privacy concerns, as well as the measures to reduce consumers' peer privacy concerns.

Originality/value

While previous studies mainly examined the driving forces of consumers' engagement in sharing accommodation, this study focuses on the impediment. With communication privacy management theory to explore the relationships between consumer data vulnerability, peer privacy concerns and continued usage intention of sharing accommodation platforms, as well as the moderating effects of consumers' perceived benefits, this study facilitates a more comprehensive understanding of consumers' engagement in sharing accommodation.

Details

Information Technology & People, vol. 36 no. 6
Type: Research Article
ISSN: 0959-3845

Keywords

Article
Publication date: 4 June 2024

Laura L. Lemon, Claudia Bawole, Nancy H. Brinson and Bahareh Amini

The purpose of this paper is to use the concept of boundary turbulence from Communication Privacy Management (CPM) theory to better understand how employee monitoring impacts…

Abstract

Purpose

The purpose of this paper is to use the concept of boundary turbulence from Communication Privacy Management (CPM) theory to better understand how employee monitoring impacts employee engagement. This study is one of the first in corporate communication to combine the frameworks of CPM and employee engagement to better understand employee experiences.

Design/methodology/approach

To answer the research question, we conducted an online, open-ended survey that asked 633 participants to provide feedback regarding being monitored at work and how these experiences impacted their engagement with their employer.

Findings

This study sought to understand how boundary turbulence occurs in relation to employee engagement when employees are monitored at work. In total, four examples of boundary turbulence were illustrated in the data: employer monitoring creates distrust; employees find ways to resist being monitored; monitoring doesn’t accurately capture employee engagement; and monitoring leads to disengagement.

Originality/value

The findings from this study lead to important conclusions regarding what happens when employees experience boundary turbulence, and how it relates to employee engagement. This study illustrates how employee monitoring is interpreted as an attempt to control employees, which can lead to distrust and negatively impact employee engagement. Furthermore, boundary turbulence can threaten psychological safety and presence, which can cultivate employee disengagement. Therefore, employees may seek out ways to actively resist, which reiterates that internal publics are distinctive, active, and agentic audiences that cannot be forgotten or assumed.

Details

Corporate Communications: An International Journal, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1356-3289

Keywords

Open Access
Article
Publication date: 22 August 2023

Thomas Kalischko and René Riedl

The potential applications of information and communication technologies in the workplace are wide-ranging and, especially since the COVID-19 pandemic, have increasingly found…

3660

Abstract

Purpose

The potential applications of information and communication technologies in the workplace are wide-ranging and, especially since the COVID-19 pandemic, have increasingly found their way into the field of electronic performance monitoring (EPM) of employees. This study aims to examine the influence of EPM on individual performance considering the aspects of privacy invasion, organizational trust and individual stress within an organization. Thus, important insights are generated for academia as well as business.

Design/methodology/approach

A theoretical framework was developed which conceptualizes perceived EPM as independent variable and individual performance as dependent variable. Moreover, the framework conceptualizes three mediator variables (privacy invasion, organizational trust and individual stress). Based on a large-scale survey (N = 1,119), nine hypotheses were tested that were derived from the developed framework.

Findings

The results indicate that perception of EPM significantly increases privacy invasion, reduces organizational trust, increases individual stress and ultimately reduces individual performance. Moreover, it was found that privacy invasion reduces organizational trust and that this lowered trust increases individual stress. Altogether, these findings suggest that the use of EPM by employers may be associated with significant negative consequences.

Originality/value

This research enriches the literature on digital transformation, as well as human–machine interaction, by adopting a multidimensional theoretical and empirical perspective regarding EPM in the workplace context, in which the influence of EPM perceptions on individual performance is examined under the influence of different aspects (privacy invasion, organizational trust and individual stress) not currently considered in this combination in the literature.

Details

Digital Transformation and Society, vol. 3 no. 1
Type: Research Article
ISSN: 2755-0761

Keywords

Article
Publication date: 9 July 2024

Yuling Wei, Mirkó Gáti and Attila Endre Simay

Our research investigated how the perceived effectiveness of privacy, perceived privacy risk, and perceived security influenced consumers' behavioral intention to use mobile…

Abstract

Purpose

Our research investigated how the perceived effectiveness of privacy, perceived privacy risk, and perceived security influenced consumers' behavioral intention to use mobile payment applications during the COVID-19 pandemic.

Design/methodology/approach

We applied a quantitative method using a cross-sectional online survey conducted over three years. We collected a sample of 1,471 survey responses focused on ages 18–39. Using descriptive statistics, confirmatory factor analysis, and structural equation modeling, we tested our hypotheses with SPSS 27 and AMOS 27.

Findings

Results of the study indicate that the perceived effectiveness of privacy positively influences perceived privacy risk, perceived security, and behavioral intention. Moreover, perceived privacy risk has a positive effect on perceived security. We found no significant relationship between perceived privacy risk and behavioral intention, although perceived security has a positive effect on behavioral intention. Further mediation analyses showed that perceived privacy risk and perceived security mediate the relationship between the perceived effectiveness of privacy and behavioral intention.

Originality/value

This research sheds new light on the role of perceived privacy effectiveness in mobile payment adoption in Hungary, particularly during the COVID-19 pandemic. Our research also explains why and how perceived privacy effectiveness influences consumers' perceived privacy risk, perceived security, and behavioral intention.

Details

International Journal of Bank Marketing, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0265-2323

Keywords

Article
Publication date: 11 December 2023

Thi Huyen Pham, Thuy-Anh Phan, Phuong-Anh Trinh, Xuan Bach Mai and Quynh-Chi Le

This study aims to ascertain the impact of data collecting awareness on perceived information security concerns and information-sharing behavior on social networking sites.

Abstract

Purpose

This study aims to ascertain the impact of data collecting awareness on perceived information security concerns and information-sharing behavior on social networking sites.

Design/methodology/approach

Based on communication privacy management theory, the study forecasted the relationship between information-sharing behavior and awareness of data collecting purposes, data collection tactics and perceived security risk using structural equation modeling analysis and one-way ANOVA. The sample size of 521 young social media users in Vietnam, ages 18 to 34, was made up of 26.7% men and 73.3% women. When constructing the questionnaire survey method with lone source respondents, the individual’s unique awareness and experiences with using online social networks (OSNs) were taken into account.

Findings

The results of the investigation demonstrate a significant relationship between information-sharing and awareness of data collecting, perceptions of information security threats and behavior. Social media users have used OSN privacy settings and paid attention to the sharing restriction because they are concerned about data harvesting.

Research limitations/implications

This study was conducted among young Vietnamese social media users, reflecting specific characteristics prevalent in the Vietnamese environment, and hence may be invalid in other nations’ circumstances.

Practical implications

Social media platform providers should improve user connectivity by implementing transparent privacy policies that allow users to choose how their data are used; have clear privacy statements and specific policies governing the use of social media users’ data that respect users’ consent to use their data; and thoroughly communicate how they collect and use user data while promptly detecting any potential vulnerabilities within their systems.

Originality/value

The authors ascertain that the material presented in this manuscript will not infringe upon any statutory copyright and that the manuscript will not be submitted elsewhere while under Journal of Information, Communication and Ethics in Society review.

Details

Journal of Information, Communication and Ethics in Society, vol. 22 no. 1
Type: Research Article
ISSN: 1477-996X

Keywords

1 – 10 of over 4000