Search results

1 – 10 of over 1000
Open Access
Article
Publication date: 27 April 2020

Kaisa Laitinen and Anu Sivunen

The purpose of this study is to investigate the various enablers of and constraints on employees' information sharing on an enterprise social media platform. It draws on two…

7477

Abstract

Purpose

The purpose of this study is to investigate the various enablers of and constraints on employees' information sharing on an enterprise social media platform. It draws on two theoretical perspectives, communication privacy management theory and the technology affordance framework, as well as on empirical data in an attempt to paint a comprehensive picture of the factors shaping employees' decisions to share or not share information on enterprise social media.

Design/methodology/approach

This qualitative field study is based on semi-structured interviews and enterprise social media review data from a large Nordic media organization.

Findings

On an enterprise social media platform, privacy management principles shape employees' information-sharing decisions in relation to personal privacy boundaries, professional boundaries and assumed risks, online safety concerns and perceived audience. Additionally, the technological affordances of visibility, awareness, persistence and searchability shape employees' information sharing in varying and sometimes even contradictory ways. Finally, organizational factors, such as norms, tasks and media repertoires, are associated with employees' information-sharing decisions. Together, these three dimensions, personal, technological and organizational, form a model of the enablers of and constraints on employees' decisions to share information on enterprise social media.

Originality/value

This study extends the understanding of different factors shaping employees' decisions to share or not share information on enterprise social media. It extends the two applied theories by uniquely combining interpersonal privacy management principles with a technological affordance framework that focuses on the relationship between the user and the technology. This research also furthers the authors' knowledge of what privacy management principles mean in the organizational context. This study shows connections between the two theories and extends the understanding of technology affordances as not only action possibilities but also constraining factors. Additionally, by revealing what kinds of factors encourage and inhibit information sharing on enterprise social media, the results of this study support organizations in their efforts to manage information sharing on enterprise social media systems.

Details

Information Technology & People, vol. 34 no. 2
Type: Research Article
ISSN: 0959-3845

Keywords

Open Access
Article
Publication date: 22 August 2023

Thomas Kalischko and René Riedl

The potential applications of information and communication technologies in the workplace are wide-ranging and, especially since the COVID-19 pandemic, have increasingly found…

3641

Abstract

Purpose

The potential applications of information and communication technologies in the workplace are wide-ranging and, especially since the COVID-19 pandemic, have increasingly found their way into the field of electronic performance monitoring (EPM) of employees. This study aims to examine the influence of EPM on individual performance considering the aspects of privacy invasion, organizational trust and individual stress within an organization. Thus, important insights are generated for academia as well as business.

Design/methodology/approach

A theoretical framework was developed which conceptualizes perceived EPM as independent variable and individual performance as dependent variable. Moreover, the framework conceptualizes three mediator variables (privacy invasion, organizational trust and individual stress). Based on a large-scale survey (N = 1,119), nine hypotheses were tested that were derived from the developed framework.

Findings

The results indicate that perception of EPM significantly increases privacy invasion, reduces organizational trust, increases individual stress and ultimately reduces individual performance. Moreover, it was found that privacy invasion reduces organizational trust and that this lowered trust increases individual stress. Altogether, these findings suggest that the use of EPM by employers may be associated with significant negative consequences.

Originality/value

This research enriches the literature on digital transformation, as well as human–machine interaction, by adopting a multidimensional theoretical and empirical perspective regarding EPM in the workplace context, in which the influence of EPM perceptions on individual performance is examined under the influence of different aspects (privacy invasion, organizational trust and individual stress) not currently considered in this combination in the literature.

Details

Digital Transformation and Society, vol. 3 no. 1
Type: Research Article
ISSN: 2755-0761

Keywords

Open Access
Article
Publication date: 4 August 2022

Christian Matt, Mena Teebken and Beril Özcan

Studies on the coronavirus disease 2019 (COVID-19) tracing apps have mostly focused on how to optimize adoption and continuous use, but did not consider potential long-term…

Abstract

Purpose

Studies on the coronavirus disease 2019 (COVID-19) tracing apps have mostly focused on how to optimize adoption and continuous use, but did not consider potential long-term effects of their introduction. This study aims to analyse whether the characteristics of the recent introduction of tracing apps may negatively impact individuals' attitudes and intentions to adopt future tracking technology.

Design/methodology/approach

In an online experiment across three countries (Australia, Germany, UK), the authors measured how perceived benefits of COVID-19 tracing apps as well as specific government and campaign-related factors affect privacy concerns, attitude towards future tracking apps and intention to adopt. The authors manipulated the type of provider (governmental vs private) and the type of beneficiaries of the future tracking technology app (the individual alone or also the public) as determinants of adoption.

Findings

The authors find that privacy concerns towards the COVID-19 tracing apps negatively impact attitude and intention to adopt future tracking apps. Future adoption is more likely if the app is provided by the government, whereas additional benefits to the public do not positively stimulate adoption. Second, the study analyzed different factors, including perceptions on governments and the app introduction, as well as perceived benefits.

Originality/value

Taking the introduction of COVID-19 apps in different countries as a basis, the authors link both perceived benefits and contextual factors to privacy concerns, attitudes towards and intention to adopt the related technology in the future. The authors hereby clarify the responsibility of governmental actors who conduct large-scale technology introductions for the future diffusion of related technologies.

Details

Digital Transformation and Society, vol. 1 no. 1
Type: Research Article
ISSN: 2755-0761

Keywords

Open Access
Article
Publication date: 18 August 2022

Jonna Pauliina Koponen and Saara Maria Julkunen

This paper aims to explore how and why salespeople enhance or hinder long-term business-to-business (B2B) customer relationships at the interpersonal level by considering…

4885

Abstract

Purpose

This paper aims to explore how and why salespeople enhance or hinder long-term business-to-business (B2B) customer relationships at the interpersonal level by considering self-disclosure and relational cost and reward evaluations.

Design/methodology/approach

Data from interviews (N = 47) with B2B sales professionals were analyzed, focusing on the shift of the phases in long-term B2B customer relationships.

Findings

Long-term B2B customer relationships evolve at the interpersonal level through a process of continuous relational cost and reward evaluation, self-disclosure and business disclosure in three phases: becoming business partners, collaborative partners and collaborative and personal partners. The reward evaluations progress from being business related to including even more relational benefits. Disclosure progresses through general business disclosure and general self-disclosure; strategic business disclosure and personal life self-disclosure; and synergistic business disclosure and private self-disclosure.

Research limitations/implications

The long-term B2B customer relationships could be studied at the interpersonal level from the customer’s perspective. Self-disclosure could be studied in cross-cultural settings as well as gender differences should be considered in future studies. Business and social penetration theory could be applied to investigate different types of relationships and other professional relationships, such as those between employers and employees. It would be important to test whether the business-related and self-disclosure subtypes apply to the development of other types of professional relationships or whether other disclosure subtypes exist. The authors recommend exploring salespeople’s and customers’ privacy management strategies in multiple communication channels.

Practical implications

Managers may apply the results of this study in their customer relationship management and sales training.

Originality/value

The findings outline a contextual extension of social penetration theory.

Details

European Journal of Marketing, vol. 56 no. 13
Type: Research Article
ISSN: 0309-0566

Keywords

Open Access
Article
Publication date: 11 April 2022

Grace Fox, Theo Lynn and Pierangelo Rosati

The General Data Protection Regulation (GDPR) introduces significant data protection obligations on all organizations within the European Union (EU) and those transacting with EU…

5059

Abstract

Purpose

The General Data Protection Regulation (GDPR) introduces significant data protection obligations on all organizations within the European Union (EU) and those transacting with EU citizens. This paper presents the GDPR privacy label and uses two empirical studies to examine the effectiveness of this approach in influencing consumers' privacy perceptions and related behavioral intentions.

Design/methodology/approach

The paper tests the efficacy of two GDPR privacy label designs, a consent-based label and a static label. Study 1 examines the effects of each label on perceptions of risk, control and privacy. Study 2 investigates the influence of consumers' privacy perceptions on perceived trustworthiness and willingness to interact with the organization.

Findings

The findings support the potential of GDPR privacy labels for positively influencing perceptions of risk, control, privacy and trustworthiness and enhancing consumers' willingness to transact and disclose data to online organizations.

Practical implications

The findings are useful for organizations required to comply with the GDPR and present a solution to requirements for transparent communications and explicit consent.

Originality/value

This study examines and demonstrates the efficacy of visualized privacy policies in impacting consumer privacy perceptions and behavioral intentions.

Details

Information Technology & People, vol. 35 no. 8
Type: Research Article
ISSN: 0959-3845

Keywords

Open Access
Article
Publication date: 19 June 2023

Jorge Xavier and Winnie Ng Picoto

Regulatory initiatives and related technological shifts have been imposing restrictions on data-driven marketing (DDM) practices. This paper aims to find the main restrictions for…

2107

Abstract

Purpose

Regulatory initiatives and related technological shifts have been imposing restrictions on data-driven marketing (DDM) practices. This paper aims to find the main restrictions for DDM and the key management theories applied to investigate the consequences of these restrictions.

Design/methodology/approach

The authors conducted a unified bibliometric analysis with 104 publications retrieved from both Scopus and Web of Science, followed by a qualitative, in-depth systematic literature review to identify the management theories in literature and inform a research agenda.

Findings

The fragmentation of the research outcomes was overcome by the identification of 3 main clusters and 11 management theories that structured 18 questions for future research.

Originality/value

To the best of the authors’ knowledge, this paper sets for the first time a frontier between almost three decades where DDM evolved with no significative restrictions, grounded on innovations and market autoregulation, and an era where data privacy, anti-trust and competition and data sovereignty regulations converge to impose structural changes, requiring scholars and practitioners to rethink the roles of data at the strategic level of the firm.

Details

International Journal of Law and Management, vol. 65 no. 5
Type: Research Article
ISSN: 1754-243X

Keywords

Open Access
Article
Publication date: 1 February 2024

Meenakshi Handa, Ronika Bhalla and Parul Ahuja

Increasing incidents of privacy invasion on social networking sites (SNS) are intensifying the concerns among stakeholders about the misuse of personal data. However, there seems…

Abstract

Purpose

Increasing incidents of privacy invasion on social networking sites (SNS) are intensifying the concerns among stakeholders about the misuse of personal data. However, there seems to be limited research on exploring the impact of specific privacy concerns on users’ intention to engage in various privacy protection behaviors. This study aims to examine the role of social privacy concerns, institutional privacy concerns and privacy self-efficacy as antecedents of privacy protection–related control activities intention among young adults active on SNS.

Design/methodology/approach

Data collected from 284 young adults active on SNS was analyzed through partial least squares structural equation modeling using Smart PLS.

Findings

The results indicate that institutional privacy concerns, social privacy concerns and privacy self-efficacy positively influence the control activities intention of SNS users. The extent of privacy self-efficacy and privacy protection-related control activities intention differs among users based on gender.

Research limitations/implications

This study is limited to a population of young adults in the age group of 18–25 years.

Practical implications

The findings of this study form the basis for specific recommendations addressing the different types of privacy concerns experienced by social media users, promoting responsible privacy control behaviors on online platforms and discouraging the possible misuse of information by third parties.

Originality/value

This study validates a theoretical framework that can contribute to future investigations concerning the use of SNS. The study findings form the basis for a set of practical recommendations for policymakers, SNS platforms and users.

Details

Vilakshan - XIMB Journal of Management, vol. 21 no. 1
Type: Research Article
ISSN: 0973-1954

Keywords

Open Access
Book part
Publication date: 4 May 2018

Indrayanti, Jenny Ratna Suminar, Ahmad Gimmy Pratama Siswadi and Yanti Setianti

Purpose – The study is aimed to identify the openness, empathy, supportiveness, positiveness, and equality between mother and child as the key factors for successful children. If…

Abstract

Purpose – The study is aimed to identify the openness, empathy, supportiveness, positiveness, and equality between mother and child as the key factors for successful children. If the parents are not able to give attention and love to their children, it will form feelings of insecurity and hatred towards themselves and to their surroundings. Similarly, if the parents are not able to create discipline in education, the probability of unclear future for their child will increase. A single mother has to endure a lot of problems and face the biggest challenge in their life; to be a single parent who must be able to hold multiple roles, that is as a father who works for a family living and as a mother who nurtures and educate her children. As a mother, she is required to be able to manage everything by herself; some of them include financial management, jobs, and nurture time for her children.

Methodology – employed in this study was in-depth interview to observe inhibiting factors that experienced by single parents in parenting pattern that they apply in nurturing their children.

Finding – Result showed that frequency and intensity play important role in creating openness, empathy, supportive attitude, positive attitude, and equality as well as automatically able to form inclusion, control, and affection between mother and children. The expected final result is the discovery of an ideal way of single parent role for their children.

Implications – the research results showed that frequent communication behavior and sufficient intensity are used to give children more confident in their activities at home or school environment and by which, the children will be able to reach success in their life.

Value originality – the research is the existence of communication pattern formed by single mother family and her children.

Details

Proceedings of MICoMS 2017
Type: Book
ISBN:

Keywords

Open Access
Article
Publication date: 31 July 2020

Ado Adamou Abba Ari, Olga Kengni Ngangmo, Chafiq Titouna, Ousmane Thiare, Kolyang, Alidou Mohamadou and Abdelhak Mourad Gueroui

The Cloud of Things (IoT) that refers to the integration of the Cloud Computing (CC) and the Internet of Things (IoT), has dramatically changed the way treatments are done in the…

8627

Abstract

The Cloud of Things (IoT) that refers to the integration of the Cloud Computing (CC) and the Internet of Things (IoT), has dramatically changed the way treatments are done in the ubiquitous computing world. This integration has become imperative because the important amount of data generated by IoT devices needs the CC as a storage and processing infrastructure. Unfortunately, security issues in CoT remain more critical since users and IoT devices continue to share computing as well as networking resources remotely. Moreover, preserving data privacy in such an environment is also a critical concern. Therefore, the CoT is continuously growing up security and privacy issues. This paper focused on security and privacy considerations by analyzing some potential challenges and risks that need to be resolved. To achieve that, the CoT architecture and existing applications have been investigated. Furthermore, a number of security as well as privacy concerns and issues as well as open challenges, are discussed in this work.

Details

Applied Computing and Informatics, vol. 20 no. 1/2
Type: Research Article
ISSN: 2634-1964

Keywords

Open Access
Article
Publication date: 12 April 2022

Dijana Peras and Renata Mekovec

The purpose of this paper is to improve the understanding of cloud service users’ privacy concerns, which are anticipated to considerably hinder cloud service market growth. The…

1663

Abstract

Purpose

The purpose of this paper is to improve the understanding of cloud service users’ privacy concerns, which are anticipated to considerably hinder cloud service market growth. The researchers have explored privacy concerns from dimensions that were identified as relevant in the cloud context.

Design/methodology/approach

Content analysis was used to identify privacy problems that were most often raised in previous cloud research. Multidimensional developmental theory (MDT) was used to build a conceptual model of cloud privacy concerns. Literature review was made to identify the privacy-related constructs used to measure privacy concerns in previous cloud research.

Findings

The paper provides systematization of recent cloud privacy research, proposal of a conceptual model of cloud privacy concerns, identification of measuring instruments that were used to measure privacy concerns in previous cloud research and identification of categories of problems that need to be addressed in future cloud research.

Originality/value

This paper has identified the categories of privacy problems and dimensions that have not yet been measured in the cloud context, to the best of the authors’ knowledge. Their simultaneous examination could clarify the effects of different dimensions on the privacy concerns of cloud users. The conceptual model of cloud privacy concerns will allow cloud service providers to focus on key cloud problems affecting users’ privacy concerns and use the most appropriate privacy protection communication and preservation approaches.

Details

Information & Computer Security, vol. 30 no. 5
Type: Research Article
ISSN: 2056-4961

Keywords

1 – 10 of over 1000