Search results

1 – 10 of over 1000
Article
Publication date: 9 April 2024

Jaeyoung Park, Woosik Shin, Beomsoo Kim and Miyea Kim

This study aims to explore the spillover effects of data breaches from a consumer perspective in the e-commerce context. Specifically, we investigate how an online retailer’s data…

Abstract

Purpose

This study aims to explore the spillover effects of data breaches from a consumer perspective in the e-commerce context. Specifically, we investigate how an online retailer’s data breach affects consumers’ privacy risk perceptions of competing firms, and further how it affects shopping intention for the competitors. We also examine how the privacy risk contagion effect varies depending on the characteristics of competitors and their competitive responses.

Design/methodology/approach

We conducted two scenario-based experiments with surveys. To assess the spillover effects and the moderating effects, we employed an analysis of covariance. We also performed bootstrapping-based mediation analyses using the PROCESS macro.

Findings

We find evidence for the privacy risk contagion effect and demonstrate that it negatively influences consumers’ shopping intention for a competing firm. We also find that a competitor’s cybersecurity message is effective in avoiding the privacy risk contagion effect and the competitor even benefits from it.

Originality/value

While previous studies have examined the impacts of data breaches on customer perceptions of the breached firm, our study focuses on customer perceptions of the non-breached firms. To the best of the authors’ knowledge, this study is one of the first to provide empirical evidence for the negative spillover effects of a data breach from a consumer perspective. More importantly, this study empirically demonstrates that the non-breached competitor’s competitive response is effective in preventing unintended negative spillover in the context of the data breach.

Details

Internet Research, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1066-2243

Keywords

Article
Publication date: 13 December 2023

Yuanyuan Guo, Chaoyou Wang and Xiaoting Chen

This study aims to examine the relative effectiveness of functional and financial remedies in influencing customers' negative coping responses in the event of a data breach. It…

Abstract

Purpose

This study aims to examine the relative effectiveness of functional and financial remedies in influencing customers' negative coping responses in the event of a data breach. It also uncovers the different mediating roles played by customers' feelings of anger and fear in the process of data breach recovery. This study thus differs from the literature, which has primarily focused on the impact of financial compensation and apologies for service failures in face-to-face environments.

Design/methodology/approach

Two scenario-based experiments were conducted to empirically validate the model. The authors received 302 copies of the questionnaire, of which 269 were valid.

Findings

This study finds that functional remedies are more effective than financial remedies when sensitive information has been compromised, but there is no significant difference between the effectiveness of the two remedies when nonsensitive information has been compromised. In addition, functional remedies influence negative coping behaviors directly and indirectly; the indirect effect is achieved through the reduction of fear and anger. Contrary to the authors' expectation, financial remedies do not have a direct effect on negative coping behaviors; they can indirectly affect negative coping behaviors by reducing anger but do not affect negative coping behaviors by reducing fear.

Practical implications

This study provides key insights into how to manage customer reactions in the event of a data breach, suggesting the use of carefully designed recovery strategies. Companies must attend to customers' specific emotional responses to manage their negative coping behaviors.

Originality/value

This study extends the limited literature on data breach recovery actions by investigating the different effectiveness of functional and financial remedies in the event of a data breach. It also uncovers how functional and financial recovery strategies affect customers' negative coping behaviors by revealing the different mediating effects of fear and anger.

Details

Journal of Enterprise Information Management, vol. 37 no. 1
Type: Research Article
ISSN: 1741-0398

Keywords

Article
Publication date: 8 April 2024

Princely Ifinedo, Francine Vachon and Anteneh Ayanso

This paper aims to increase understanding of pertinent exogenous and endogenous antecedents that can reduce data privacy breaches.

Abstract

Purpose

This paper aims to increase understanding of pertinent exogenous and endogenous antecedents that can reduce data privacy breaches.

Design/methodology/approach

A cross-sectional survey was used to source participants' perceptions of relevant exogenous and endogenous antecedents developed from the Antecedents-Privacy Concerns-Outcomes (APCO) model and Social Cognitive Theory. A research model was proposed and tested with empirical data collected from 213 participants based in Canada.

Findings

The exogenous factors of external privacy training and external privacy self-assessment tool significantly and positively impact the study's endogenous factors of individual privacy awareness, organizational resources allocated to privacy concerns, and group behavior concerning privacy laws. Further, the proximal determinants of data privacy breaches (dependent construct) are negatively influenced by individual privacy awareness, group behavior related to privacy laws, and organizational resources allocated to privacy concerns. The endogenous factors fully mediated the relationships between the exogenous factors and the dependent construct.

Research limitations/implications

This study contributes to the budding data privacy breach literature by highlighting the impacts of personal and environmental factors in the discourse.

Practical implications

The results offer management insights on mitigating data privacy breach incidents arising from employees' actions. Roles of external privacy training and privacy self-assessment tools are signified.

Originality/value

Antecedents of data privacy breaches have been underexplored. This paper is among the first to elucidate the roles of select exogenous and endogenous antecedents encompassing personal and environmental imperatives on data privacy breaches.

Article
Publication date: 7 July 2023

Steven Muzatko and Gaurav Bansal

This research examines the relationship between the timeliness in announcing the discovery of a data breach and consumer trust in an e-commerce company, as well as later…

Abstract

Purpose

This research examines the relationship between the timeliness in announcing the discovery of a data breach and consumer trust in an e-commerce company, as well as later trust-rebuilding efforts taken by the company to compensate users impacted by the breach.

Design/methodology/approach

A survey experiment was used to examine the effect of both trust-reducing events (announced data breaches) and trust-enhancing events (provision of identity theft protection and credit monitoring) on consumer trust. The timeliness of the breach announcement by an e-commerce company was manipulated between two randomly assigned groups of subjects; one group viewed an announcement of the breach immediately upon its discovery, and the other viewed an announcement made two months after the breach was discovered. Consumer trust was measured before the breach, after the breach was announced, and finally, after the announcement of data protection.

Findings

The results suggest that companies that delay a data breach announcement are likely to suffer a larger drop in consumer trust than those that immediately disclose the data breach. The results also suggest that trust can be repaired by providing data protection. However, even after providing identity theft protection and credit monitoring, companies that fail to promptly disclose a breach have lower repaired trust than companies that promptly disclose.

Originality/value

This study contributes to the literature on e-commerce trust by examining how a company's forthrightness in reporting a data breach impacts user trust at the time of the disclosure of the data breach and after subsequent efforts to repair trust.

Details

Internet Research, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1066-2243

Keywords

Article
Publication date: 15 July 2021

Nehemia Sugianto, Dian Tjondronegoro, Rosemary Stockdale and Elizabeth Irenne Yuwono

The paper proposes a privacy-preserving artificial intelligence-enabled video surveillance technology to monitor social distancing in public spaces.

Abstract

Purpose

The paper proposes a privacy-preserving artificial intelligence-enabled video surveillance technology to monitor social distancing in public spaces.

Design/methodology/approach

The paper proposes a new Responsible Artificial Intelligence Implementation Framework to guide the proposed solution's design and development. It defines responsible artificial intelligence criteria that the solution needs to meet and provides checklists to enforce the criteria throughout the process. To preserve data privacy, the proposed system incorporates a federated learning approach to allow computation performed on edge devices to limit sensitive and identifiable data movement and eliminate the dependency of cloud computing at a central server.

Findings

The proposed system is evaluated through a case study of monitoring social distancing at an airport. The results discuss how the system can fully address the case study's requirements in terms of its reliability, its usefulness when deployed to the airport's cameras, and its compliance with responsible artificial intelligence.

Originality/value

The paper makes three contributions. First, it proposes a real-time social distancing breach detection system on edge that extends from a combination of cutting-edge people detection and tracking algorithms to achieve robust performance. Second, it proposes a design approach to develop responsible artificial intelligence in video surveillance contexts. Third, it presents results and discussion from a comprehensive evaluation in the context of a case study at an airport to demonstrate the proposed system's robust performance and practical usefulness.

Details

Information Technology & People, vol. 37 no. 2
Type: Research Article
ISSN: 0959-3845

Keywords

Article
Publication date: 14 June 2022

Fabian Maximilian Johannes Teichmann and Chiara Wittmann

The threat of cybercrime is pervasive. Corporations cannot be convinced, out of sheer luck or naïve conviction, that they will remain unaffected. When targeted, the stark reality…

Abstract

Purpose

The threat of cybercrime is pervasive. Corporations cannot be convinced, out of sheer luck or naïve conviction, that they will remain unaffected. When targeted, the stark reality is that a company also incurs a liability risk. This paper aims to explore the boundaries of liability resulting from a data breach and privacy concerns according to the emerging regulations on cybersecurity.

Design/methodology/approach

The nature of cybercrime and its constant evolution is analysed as a threat of liability. Its distinctly modern developments require consideration. In response to the threat of hackers, the protection that a corporation can invoke is also considered as a mitigating factor in ascribing liability.

Findings

Preventative steps to protect a corporation from cyberthreats must remain a consistent priority in the running of a company. The influence of human behaviour has become a foreseeable element in cybersecurity and as such the management of unreliable user behaviour is a key determining factor in ascribing liability in hindsight.

Originality/value

Foresight is everything in the prevention of cyberattacks. Cyberattacks can no longer be dismissed as an unlikely eventuality. Legislation on data security and data privacy is demanding higher standards of preventative action, under the duty of care to stakeholders. There is a substantial literature deficit on data security and data liability regulations in light of the liability risk incurred by cyberattacks.

Details

Journal of Financial Crime, vol. 30 no. 6
Type: Research Article
ISSN: 1359-0790

Keywords

Book part
Publication date: 14 March 2024

Alex Deslée and Julien Cloarec

The management of consumer privacy has become a critical concern for organizations in the age of artificial intelligence–powered marketing. The impact of data on the market…

Abstract

The management of consumer privacy has become a critical concern for organizations in the age of artificial intelligence–powered marketing. The impact of data on the market environment has brought both benefits and challenges, with marketers gaining valuable insights but also raising privacy concerns. As artificial intelligence–powered marketing advances, consumer vulnerability increases due to the sensitivity of collected data. This vulnerability leads some consumers to resort to falsifying information, posing a significant threat to the digital economy. Privacy empowerment and customer control play a vital role in addressing these challenges. This chapter explores the influencing factors and ethical considerations surrounding data falsification. It also discusses strategies to mitigate perceived vulnerability through privacy controls and explores the consequences of data breaches and customer vulnerability. The chapter further emphasizes the need for organizations to balance benefits, risks, and customer trust while harnessing the value of customer data. An ethical framework for data privacy marketing audits is proposed to help organizations assess their data practices responsibly and competitively. By integrating personal data protection strategies within an ethical framework, organizations can protect consumer privacy, enhance customer trust, and maintain their competitive edge in the market.

Details

The Impact of Digitalization on Current Marketing Strategies
Type: Book
ISBN: 978-1-83753-686-3

Keywords

Article
Publication date: 18 May 2023

Beatrice Amonoo Nkrumah, Wei Qian, Amanpreet Kaur and Carol Tilt

This paper aims to examine the nature and extent of disclosure on the use of big data by online platform companies and how these disclosures address and discharge stakeholder…

1048

Abstract

Purpose

This paper aims to examine the nature and extent of disclosure on the use of big data by online platform companies and how these disclosures address and discharge stakeholder accountability.

Design/methodology/approach

Content analysis of annual reports and data policy documents of 100 online platform companies were used for this study. More specifically, the study develops a comprehensive big data disclosure framework to assess the nature and extent of disclosures provided in corporate reports. This framework also assists in evaluating the effect of the size of the company, industry and country in which they operate on disclosures.

Findings

The analysis reveals that most companies made limited disclosure on how they manage big data. Only two of the 100 online platform companies have provided moderate disclosures on big data related issues. The focus of disclosure by the online platform companies is more on data regulation compliance and privacy protection, but significantly less on the accountability and ethical issues of big data use. More specifically, critical issues, such as stakeholder engagement, breaches of customer information and data reporting and controlling mechanisms are largely overlooked in current disclosures. The analysis confirms that current attention has been predominantly given to powerful stakeholders such as regulators as a result of compliance pressure while the accountability pressure has yet to keep up the pace.

Research limitations/implications

The study findings may be limited by the use of a new accountability disclosure index and the specific focus on online platform companies.

Practical implications

Although big data permeates, the number of users and uses grow and big data use has become more ingrained into society, this study provides evidence that ethical and accountability issues persist, even among the largest online companies. The findings of this study improve the understanding of the current state of online companies’ reporting practices on big data use, particularly the issues and gaps in the reporting process, which will help policymakers and standard setters develop future data disclosure policies.

Social implications

From these findings, the study improves the understanding of the current state of online companies’ reporting practices on big data use, particularly the issues and gaps in the reporting process – which are helpful for policymakers and standard setters to develop data disclosure policies.

Originality/value

This study provides an analysis of ethical and social issues surrounding big data accountability, an emerging but increasingly important area that needs urgent attention and more research. It also adds a new disclosure dimension to the existing accountability literature and provides practical suggestions to balance the interaction between online platform companies and their stakeholders to promote the responsible use of big data.

Details

Qualitative Research in Accounting & Management, vol. 20 no. 4
Type: Research Article
ISSN: 1176-6093

Keywords

Abstract

Details

The Cybersecurity Workforce of Tomorrow
Type: Book
ISBN: 978-1-80382-918-0

Article
Publication date: 18 May 2023

Xiukun Ge

This article analyses the existing retail and distribution legal framework in which Internet companies operate, focusing on data breaches and other issues of relevance to these…

Abstract

Purpose

This article analyses the existing retail and distribution legal framework in which Internet companies operate, focusing on data breaches and other issues of relevance to these companies. In order to identify who should be responsible for the largest share of improving people's quality of life, this study takes into account the perspectives of both consumers and businesses (or service provider). The author states that where there is a high probability of a security or privacy breach and the customer suffers moderate to severe damage, the burden of proof may shift to the corporation. However, the customer's obligation is conditioned by factors such as the customer's risk tolerance, the customer's losses and the efficiency of the security investment.

Design/methodology/approach

The author suggests that the decentralized nature of blockchain, information sharing, immutability and smart contracting capabilities have the potential to disrupt established business models and social norms. Challenges related to trust, customs oversight and payments are discussed, as well as the process of creating the framework for electronic commerce. As part of this research, the author has taken into consideration the increasing popularity of Internet shopping.

Findings

The author demonstrates that due to the worldwide reach of the internet and the fast advancement of computer technology, the economies of the globe have grown increasingly linked. Even though e-commerce has been growing rapidly in recent years due to innovations in both technology and international retail and distribution forms, it still confronts a number of challenges.

Research limitations/implications

In e-commerce that makes use of blockchain technology, there are significant costs associated with transferring data formats, a lack of consensus and limited emissivity in the flow of law and information. Reduced costs and associated negative externalities would be tremendously beneficial for both private enterprise and forward-thinking public policy.

Practical implications

This paper examines the potential liability concerns that may arise in the context of electronic transactions should a breach of security or privacy occur, as the author shows from a practical standpoint. Computers, mobile devices, tablets, sensors, smart meters and even autos are just some of the many channels via which data may be sent. It is conceivable for data flows in e-commerce, cloud and the Internet of Things to follow a regular pattern. This may endanger the confidentiality or security of the data. These have evolved into a significant barrier that web stores must overcome.

Originality/value

The author argues that resolving disputes related to the processing of electronic transactions is crucial to the growth of e-commerce businesses since customer happiness is directly correlated with business success.

Details

International Journal of Retail & Distribution Management, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0959-0552

Keywords

1 – 10 of over 1000