Search results

1 – 10 of 668
Article
Publication date: 13 September 2018

Ching-Hsuan Yeh, Yi-Shun Wang, Shin-Jeng Lin, Timmy H. Tseng, Hsin-Hui Lin, Ying-Wei Shih and Yi-Hsuan Lai

Considering that users’ information privacy concerns may affect the development of e-commerce, the purpose of this paper is to explore what drives internet users’ willingness to…

1553

Abstract

Purpose

Considering that users’ information privacy concerns may affect the development of e-commerce, the purpose of this paper is to explore what drives internet users’ willingness to provide personal information; further, the paper examines how extrinsic rewards moderate the relationship between users’ information privacy concerns and willingness to provide personal information.

Design/methodology/approach

Data collected from 345 valid internet users in the context of electronic commerce were analyzed using the partial least squares approach.

Findings

The result showed that agreeableness, risk-taking propensity and experience of privacy invasion were three main antecedents of information privacy concerns among the seven individual factors. Additionally, information privacy concerns did not significantly affect users’ willingness to provide personal information in the privacy calculation mechanism; however, extrinsic rewards directly affected users’ disclosure intention. The authors found that extrinsic rewards had not moderated the relationship between users’ information privacy concerns and their willingness to provide personal information.

Originality/value

This study is an exploratory effort to develop and validate a model for explaining why internet users were willing to provide personal information. The results of this study are helpful to researchers in developing theories of information privacy concerns and to practitioners in promoting internet users’ willingness to provide personal information in an e-commerce context.

Article
Publication date: 7 August 2018

Hung-Yue Suen

The purpose of this paper is to propose a model to understand how and when employees’ perceived privacy violations and procedural injustice interact to predict intent to leave in…

Abstract

Purpose

The purpose of this paper is to propose a model to understand how and when employees’ perceived privacy violations and procedural injustice interact to predict intent to leave in the context of the use of social networking sites (SNSs) monitoring.

Design/methodology/approach

This study was conducted in a field setting of Facebook to frame the hypotheses in a structural equation model with partial least squares-structural equation modeling. Variables were measured empirically by administering questionnaires to full-time employed Facebook users who had experienced SNS monitoring.

Findings

The results showed that when an employee believed that he/she had more ability to control his/her SNS information, he/she was less likely to perceive that his/her privacy had been invaded; and when an employee believed that the transparency of the SNS data collection process was higher, he or she was more likely to perceive procedural justice in SNS monitoring.

Research limitations/implications

This research draws attention to the importance of intent to leave in the absence of perceived procedural justice under SNS monitoring, and the partial mediation of the perception of justice or injustice by perceived privacy violations.

Practical implications

For employers, the author recommends that employers come to know how to conduct SNS monitoring and data collection with limited risk of employee loss.

Social implications

For employees, the author suggests that SNS users learn how to control their SNS information and make sure to check their privacy settings on the SNS that they use frequently.

Originality/value

This study provided an initial examination and bridged the gap between employer use of SNS monitoring and employee reactions by opening a mediating and moderating black box that has rarely been assessed.

Details

Industrial Management & Data Systems, vol. 118 no. 6
Type: Research Article
ISSN: 0263-5577

Keywords

Article
Publication date: 2 August 2019

Le Wang, Zao Sun, Xiaoyong Dai, Yixin Zhang and Hai-hua Hu

The purpose of this paper is to facilitate understanding of how to mitigate the privacy concerns of users who have experienced privacy invasions.

1444

Abstract

Purpose

The purpose of this paper is to facilitate understanding of how to mitigate the privacy concerns of users who have experienced privacy invasions.

Design/methodology/approach

Drawing on the communication privacy management theory, the authors developed a model suggesting that privacy concerns form through a cognitive process involving threat-coping appraisals, institutional privacy assurances and privacy experiences. The model was tested using data from an empirical survey with 913 randomly selected social media users.

Findings

Privacy concerns are jointly determined by perceived privacy risks and privacy self-efficacy. The perceived effectiveness of institutional privacy assurances in terms of established privacy policies and privacy protection technology influences the perceptions of privacy risks and privacy self-efficacy. More specifically, privacy invasion experiences are negatively associated with the perceived effectiveness of institutional privacy assurances.

Research limitations/implications

Privacy concerns are conceptualized as general concerns that reflect an individual’s worry about the possible loss of private information. The specific types of private information were not differentiated.

Originality/value

This paper is among the first to clarify the specific mechanisms through which privacy invasion experiences influence privacy concerns. Privacy concerns have long been viewed as resulting from individual actions. The study contributes to literature by linking privacy concerns with institutional privacy practice.

Article
Publication date: 31 August 2004

Varvara Z. Mitliaga

This article attempts to explain and analyse the nature and characteristic features of a person’s privacy in the on‐line environment in order to assess how these features shape…

Abstract

This article attempts to explain and analyse the nature and characteristic features of a person’s privacy in the on‐line environment in order to assess how these features shape the need for protection. Since the internet has invaded our everyday lives, individual privacy is exposed in different ways in cyberspace. It is important to note that the Internet lacks the traditional characteristics of a ‘physical’ space, but the interests and inherent values protected by privacy remain the same in cyberspace. The article discusses the factors that shape a different nature of online privacy compared to its off line counterpart. Online privacy may not be a novel right, but it is definitely one exposed to a whole new environment which has its own special need for protection.

Details

Journal of Information, Communication and Ethics in Society, vol. 2 no. 3
Type: Research Article
ISSN: 1477-996X

Keywords

Open Access
Book part
Publication date: 4 June 2021

Kristen Thomasen and Suzie Dunn

Perpetrators of technology-facilitated gender-based violence are taking advantage of increasingly automated and sophisticated privacy-invasive tools to carry out their abuse…

Abstract

Perpetrators of technology-facilitated gender-based violence are taking advantage of increasingly automated and sophisticated privacy-invasive tools to carry out their abuse. Whether this be monitoring movements through stalkerware, using drones to nonconsensually film or harass, or manipulating and distributing intimate images online such as deepfakes and creepshots, invasions of privacy have become a significant form of gender-based violence. Accordingly, our normative and legal concepts of privacy must evolve to counter the harms arising from this misuse of new technology. Canada's Supreme Court recently addressed technology-facilitated violations of privacy in the context of voyeurism in R v Jarvis (2019) . The discussion of privacy in this decision appears to be a good first step toward a more equitable conceptualization of privacy protection. Building on existing privacy theories, this chapter examines what the reasoning in Jarvis might mean for “reasonable expectations of privacy” in other areas of law, and how this concept might be interpreted in response to gender-based technology-facilitated violence. The authors argue the courts in Canada and elsewhere must take the analysis in Jarvis further to fully realize a notion of privacy that protects the autonomy, dignity, and liberty of all.

Details

The Emerald International Handbook of Technology-Facilitated Violence and Abuse
Type: Book
ISBN: 978-1-83982-849-2

Keywords

Book part
Publication date: 8 August 2008

Jan Bourne-Day and Geraldine Lee-Treweek

Privacy is a highly valued ideal in western societies and the researcher is usually expected to protect the privacy of the researched. However, real world fieldwork experiences

Abstract

Privacy is a highly valued ideal in western societies and the researcher is usually expected to protect the privacy of the researched. However, real world fieldwork experiences are highly complex and the researcher can often find their private life encroached upon. The chapter uses the authors’ own field experiences to discuss this complexity. Lee-Treweek focuses upon her research experience with disabled children living in rural England and Bourne-Day on projects with refugee and asylum seekers in Staffordshire, England. Their discussions reveal that more often than not, privacy issues in the field often interconnect researcher and the researched.

Details

Access, a Zone of Comprehension, and Intrusion
Type: Book
ISBN: 978-1-84663-891-6

Article
Publication date: 10 October 2016

Karen Renaud, Stephen Flowerday, Rosanne English and Melanie Volkamer

The purpose of this study was to identify to identify reasons for the lack of protest against dragnet surveillance in the UK. As part of this investigation, a study was carried…

Abstract

Purpose

The purpose of this study was to identify to identify reasons for the lack of protest against dragnet surveillance in the UK. As part of this investigation, a study was carried out to gauge the understanding ofprivacy” and “confidentiality” by the well-informed.

Design/methodology/approach

To perform a best-case study, the authors identified a group of well-informed participants in terms of security. To gain insights into their privacy-related mental models, they were asked first to define the three core terms and then to identify the scenarios. Then, the participants were provided with privacy-related scenarios and were asked to demonstrate their understanding by classifying the scenarios and identifying violations.

Findings

Although the participants were mostly able to identify privacy and confidentiality scenarios, they experienced difficulties in articulating the actual meaning of the terms privacy, confidentiality and security.

Research limitations/implications

There were a limited number of participants, yet the findings are interesting and justify further investigation. The implications, even of this initial study, are significant in that if citizens’ privacy rights are being violated and they did not seem to know how to protest this and if indeed they had the desire to do so.

Practical implications

Had the citizens understood the meaning of privacy, and their ancient right thereto, which is enshrined in law, their response to the Snowden revelations about ongoing wide-scale surveillance might well have been more strident and insistent.

Originality/value

People in the UK, where this study was carried out, do not seem to protest the privacy invasion effected by dragnet surveillance with any verve. The authors identify a number of possible reasons for this from the literature. One possible explanation is that people do not understand privacy. Thus, this study posits that privacy is unusual in that understanding does not seem to align with the ability to articulate the rights to privacy and their disapproval of such widespread surveillance. This seems to make protests unlikely.

Details

Information & Computer Security, vol. 24 no. 4
Type: Research Article
ISSN: 2056-4961

Keywords

Article
Publication date: 7 March 2016

Khaldoun I. Ababneh and Mohammed A. Al-Waqfi

Building on organizational justice and privacy literatures, the purpose of this paper is to test a model capturing the impacts of potentially inappropriate/discriminatory…

3676

Abstract

Purpose

Building on organizational justice and privacy literatures, the purpose of this paper is to test a model capturing the impacts of potentially inappropriate/discriminatory interview questions on job applicant perceptions and behavioral intentions in a developing economy context with a multicultural workforce.

Design/methodology/approach

An experimental design using senior undergraduate students (n=221) seeking or about to seek jobs in the United Arab Emirates was used to examine interviewees’ reactions to inappropriate/discriminatory interview questions. A questionnaire was used to collect the data. Structural equation modeling and bootstrapping were used for data analysis and hypothesis testing.

Findings

This study demonstrates that inappropriate/discriminatory interview questions influence privacy invasion perceptions, which in turn influence job applicants’ fairness perceptions and behavioral intentions. This study also demonstrates that privacy invasion perceptions fully mediate the effect of inappropriate/discriminatory employment interview questions on fairness perceptions. Moreover, the findings show that privacy invasion directly and indirectly, via fairness perceptions, influence litigation intentions. On the other hand, findings of this study indicate that privacy invasion influence organizational attractiveness and recommendation intentions only indirectly, via fairness perceptions.

Originality/value

This is the first study to examine the impact of inappropriate/discriminatory interview questions on applicant reactions in a developing economy context with social, cultural, and legal environment that is different from those prevailing in developed Western societies. This study demonstrates that privacy invasion is an important mechanism to understand job applicant reactions to inappropriate interview questions.

Article
Publication date: 3 August 2015

Shihyu Chou, Chi-Wen Chen and Jiun-You Lin

As the number of female customers shopping in online clothing stores increases, understanding how female customers’ e-loyalty is formed and fostered in this type of online store…

7179

Abstract

Purpose

As the number of female customers shopping in online clothing stores increases, understanding how female customers’ e-loyalty is formed and fostered in this type of online store becomes very pivotal. Yet, despite its importance, little research has been done on this issue. The purpose of this paper is to focus on female online clothing shoppers and aim to examine the mediators of e-loyalty in the context of online clothing stores: e-satisfaction and e-trust.

Design/methodology/approach

A total of 482 subjects who are female and have online clothing store shopping experience in Taiwan were obtained and structural equation modeling was performed to analyze the measurement and structural models.

Findings

The results show that both perceived online privacy and security are positively associated with e-trust, whereas web design is not. Furthermore, perceived delivery time and web site design are positively associated with e-satisfaction. Both e-trust and e-satisfaction in turn positively influence e-loyalty for female online clothing shoppers.

Research limitations/implications

On the basis of the literature review, there is a lack of theoretical knowledge of the relationships between e-loyalty, e-satisfaction, and e-trust among female online clothing shoppers. The research fulfills this important theoretical gap by extending prior studies on e-loyalty to further examine the factors that form e-satisfaction and e-trust, and how they, as mediators, influence the development of female customers’ e-loyalty in the context of online clothing stores. The result provides a model that contributes to understanding the formation of female customers’ e-loyalty.

Practical implications

The results of this study are helpful to online store managers in increasing their customers’ loyalty. Specifically, online clothing store managers have to create quick item delivery methods and friendly online shopping web sites that provide all necessary information and are easy to navigate and use so as to increase customers’ e-satisfaction. They also need to establish reliable and trustworthy web sites by letting their customers easily perceive the web sites’ privacy and security features to enhance customers’ e-trust. As e-satisfaction and e-trust increase, e-loyalty is fostered.

Originality/value

The contributions of this study are threefold. First, this study focusses on an important but previously neglected group in the context of online clothing stores: female online clothing shoppers. Second, the authors’ investigation extends the literature on e-loyalty by identifying important mediators (e-satisfaction and e-trust) and probing into their relationships to e-loyalty in the context of online clothing stores. Third, the findings contribute to academia and to future research by increasing understandings of the importance of the concerns and experiences of female online clothing shoppers and by suggesting that future research pay more attention to female online shoppers.

Details

Internet Research, vol. 25 no. 4
Type: Research Article
ISSN: 1066-2243

Keywords

Article
Publication date: 1 February 1995

Kristen Bell De Tienne and G. Stoney Alder

Employee evaluation and monitoring have been common in America since colonial times. With industrialization, employers have implemented increasingly creative ways to monitor…

Abstract

Employee evaluation and monitoring have been common in America since colonial times. With industrialization, employers have implemented increasingly creative ways to monitor employees. For example, in the early part of this century, Ford Motor Company employed investigators to enter employees' homes to verify that employees were not overly drinking and that their homes were clean

Details

Managerial Law, vol. 37 no. 2/3
Type: Research Article
ISSN: 0309-0558

1 – 10 of 668