Search results

1 – 10 of 532
Article
Publication date: 8 April 2024

Princely Ifinedo, Francine Vachon and Anteneh Ayanso

This paper aims to increase understanding of pertinent exogenous and endogenous antecedents that can reduce data privacy breaches.

Abstract

Purpose

This paper aims to increase understanding of pertinent exogenous and endogenous antecedents that can reduce data privacy breaches.

Design/methodology/approach

A cross-sectional survey was used to source participants' perceptions of relevant exogenous and endogenous antecedents developed from the Antecedents-Privacy Concerns-Outcomes (APCO) model and Social Cognitive Theory. A research model was proposed and tested with empirical data collected from 213 participants based in Canada.

Findings

The exogenous factors of external privacy training and external privacy self-assessment tool significantly and positively impact the study's endogenous factors of individual privacy awareness, organizational resources allocated to privacy concerns, and group behavior concerning privacy laws. Further, the proximal determinants of data privacy breaches (dependent construct) are negatively influenced by individual privacy awareness, group behavior related to privacy laws, and organizational resources allocated to privacy concerns. The endogenous factors fully mediated the relationships between the exogenous factors and the dependent construct.

Research limitations/implications

This study contributes to the budding data privacy breach literature by highlighting the impacts of personal and environmental factors in the discourse.

Practical implications

The results offer management insights on mitigating data privacy breach incidents arising from employees' actions. Roles of external privacy training and privacy self-assessment tools are signified.

Originality/value

Antecedents of data privacy breaches have been underexplored. This paper is among the first to elucidate the roles of select exogenous and endogenous antecedents encompassing personal and environmental imperatives on data privacy breaches.

Open Access
Article
Publication date: 2 January 2024

Renata Monteiro Martins, Sofia Batista Ferraz and André Francisco Alcântara Fagundes

This study aims to propose an innovative model that integrates variables and examines the influence of internet usage expertise, perceived risk and attitude toward information…

Abstract

Purpose

This study aims to propose an innovative model that integrates variables and examines the influence of internet usage expertise, perceived risk and attitude toward information control on privacy concerns (PC) and, consequently, in consumers’ willingness to disclose personal information online. The authors also propose to test the mediation role of trust between PCs and willingness to disclose information. Trust is not a predictor of PC but a causal mechanism – considering that the focus is to understand consumers’ attitudes and behavior regarding the virtual environment (not context-specific) (Martin, 2018).

Design/methodology/approach

The authors developed a survey questionnaire based on the constructs that compose the proposed model to collect data from 864 respondents. The survey questionnaire included the following scales: internet usage expertise from Ohanian (1990); perceived risk, attitude toward information control, trust and willingness to disclose personal information online from Malhotra et al. (2004); and PC from Castañeda and Montoro (2007). All items were measured on a Likert seven-point scale (1 = totally disagree; 7 = totally agree). To obtain Westin’s attitudinal categories toward privacy, respondents answered Westin’s three-item privacy index. For data analysis, the authors applied covariance-based structural equation modeling.

Findings

First, the proposed model explains the drivers of consumers’ disposition to provide personal information at a level that surpasses specific contexts (Martin, 2018), bringing the analysis to consumers’ level and considering their general perceptions toward data privacy. Second, the findings provide inputs to propose a better definition of Westin’s attitudinal categories toward privacy, which used to be defined only by individuals’ information privacy perception. Consumers’ perceptions about their abilities in using the internet, the risks, their beliefs toward information control and trust also help to delimitate and distinguish the fundamentalists, the pragmatics and the unconcerned.

Research limitations/implications

Some limitations weigh the theoretical and practical implications of this study. The sample size of pragmatic and unconcerned respondents was substantially smaller than that of fundamentalists. It might be explained by applying Westin’s self-report index to classify the groups according to their score regarding PCs. Most individuals affirm having a great concern for their data privacy but still provide online information for the benefit of personalization – known as the privacy paradox (Zeng et al., 2021). It leads to another limitation of this research, given the lack of measures that classify respondents by considering their actual behavior toward privacy.

Practical implications

PC emerges as an important predictor of consumer trust and willingness to disclose their data online, and trust also influences this disposition. Managers need to implement actions that effectively reduce consumers’ concerns about privacy and increase their trust in the company – e.g. adopting a clear and transparent policy on how the data collected is stored, treated, protected and used to benefit the consumer. Regarding the perception of risk, if managers convince consumers that the data collected on the internet is protected, they tend to be less concerned about privacy.

Social implications

The results suggest different aspects influencing the willingness to disclose personal information online, including different responses considering consumers’ PCs. Through their policies and legislation, the authors understand that governments must be attentive to this aspect, establishing regulations that protect consumers’ data in the virtual environment. In addition to regulatory policies, education campaigns can be carried out for both consumers and managers to raise the discussion about privacy and the availability of information in the online environment, demonstrating the importance of protecting personal data to benefit the government, consumers and organizations.

Originality/value

Although there is increasing research on consumers’ privacy, studies have not considered their attitudinal classifications – high, moderate and low concern – as moderators of willingness to disclose information online. Researchers have also increased attention to the antecedents of PCs and disclosure of information but overlooked possible mechanisms that explain the relationship between them.

Details

RAUSP Management Journal, vol. 59 no. 1
Type: Research Article
ISSN: 2531-0488

Keywords

Article
Publication date: 16 April 2024

Amir Schreiber and Ilan Schreiber

In the modern digital realm, while artificial intelligence (AI) technologies pave the way for unprecedented opportunities, they also give rise to intricate cybersecurity issues…

Abstract

Purpose

In the modern digital realm, while artificial intelligence (AI) technologies pave the way for unprecedented opportunities, they also give rise to intricate cybersecurity issues, including threats like deepfakes and unanticipated AI-induced risks. This study aims to address the insufficient exploration of AI cybersecurity awareness in the current literature.

Design/methodology/approach

Using in-depth surveys across varied sectors (N = 150), the authors analyzed the correlation between the absence of AI risk content in organizational cybersecurity awareness programs and its impact on employee awareness.

Findings

A significant AI-risk knowledge void was observed among users: despite frequent interaction with AI tools, a majority remain unaware of specialized AI threats. A pronounced knowledge difference existed between those that are trained in AI risks and those who are not, more apparent among non-technical personnel and sectors managing sensitive information.

Research limitations/implications

This study paves the way for thorough research, allowing for refinement of awareness initiatives tailored to distinct industries.

Practical implications

It is imperative for organizations to emphasize AI risk training, especially among non-technical staff. Industries handling sensitive data should be at the forefront.

Social implications

Ensuring employees are aware of AI-related threats can lead to a safer digital environment for both organizations and society at large, given the pervasive nature of AI in everyday life.

Originality/value

Unlike most of the papers about AI risks, the authors do not trust subjective data from second hand papers, but use objective authentic data from the authors’ own up-to-date anonymous survey.

Details

Information & Computer Security, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2056-4961

Keywords

Article
Publication date: 25 January 2021

Pouyan Esmaeilzadeh, Spurthy Dharanikota and Tala Mirzaei

Patient-centric exchanges, a major type of Health Information Exchange (HIE), empower patients to aggregate and manage their health information. This exchange model helps patients…

Abstract

Purpose

Patient-centric exchanges, a major type of Health Information Exchange (HIE), empower patients to aggregate and manage their health information. This exchange model helps patients access, modify and share their medical information with multiple healthcare organizations. Although existing studies examine patient engagement, more research is required to investigate patients' attitudes and willingness to play an active role in patient-centered information exchange. The study's main objective is to develop a model based on the belief-attitude-intention paradigm to empirically examine the effects of patients' attitudes toward engagement in care on their willingness to participate in patient-centric HIE.

Design/methodology/approach

The authors conducted an online survey study to identify the antecedents and consequences of patients' attitudes toward engagement in care. To empirically test the research model, the authors collected data from a national sample (n = 357) of individuals in the United States. The data were analyzed using structural equation modeling (SEM).

Findings

The proposed model categorizes the antecedents to patients' attitudes toward engagement in patient-related and healthcare system factors. The results show that patient-related factors (perceived health literacy and perceived coping ability) and health system factors (perceived experience with the healthcare organization and perceived patient-provider interaction) significantly shape patient attitude toward care management engagement. The results indicate that patients' attitudes toward engaging in their healthcare significantly contribute to their willingness to participate in medical information sharing through patient-centric HIE initiatives. Moreover, the authors’ findings also demonstrate that the link between patient engagement and willingness to participate in HIE is stronger for individuals who perceive lower levels of privacy and security concerns.

Originality/value

The authors validate the proposed model explaining patients' perceptions about their characteristics and the healthcare system significantly influence their attitude toward engaging in their care. This study also suggests that patients' favorable attitude toward engagement can bring patient-centric HIE efforts onto a path to success. The authors’ research attempts to shed light on the importance of patients' roles in adopting patient-centric HIE initiatives. Theoretical and practical contributions of this study are noticeable since they could result in a deeper understanding of the concept of patient engagement and how it may affect healthcare services in an evolving digital world. The authors’ findings can help healthcare organizations provide public citizen-centric services by introducing user-oriented approaches in healthcare delivery systems.

Article
Publication date: 17 March 2022

María Lidón de Miguel, Lidia García-Soriano, Camilla Mileto and Fernando Vegas López-Manzanares

The common language behind vernacular architecture only seems to be maintained in societies that preserve a traditional way of life. Changes in these societies can threaten their…

Abstract

Purpose

The common language behind vernacular architecture only seems to be maintained in societies that preserve a traditional way of life. Changes in these societies can threaten their cultural heritage, while research may be a tool for its conservation and enhancement. In this paper, the habitat of a Mossi community is therefore studied as a first stage in analysing the possibilities of its maintenance.

Design/methodology/approach

After a previous study, data collection from a stay in Baasneere (Burkina Faso) and the analysis of 32 traditional residential units were completed. The research showed some common features which, when compared against the bibliography reviewed, could be defined as characteristic of the traditional architecture of this culture.

Findings

The home for a family unit consisted in an enclosure formed by the grouping of adobe constructions around a courtyard. As the family grew so did the compound, in a relationship directly linking the scales of architecture and the levels of kinship. The main daily activities took place in the courtyards while the individual interior spaces were understood as private shelters. Other typologies such as granaries, kitchens, warehouses and sheds were also analysed.

Originality/value

Some features of Mossi architecture already described in the existing bibliography were verified in the Baasneere case studies, showing that this tradition is still preserved. With a multidisciplinary approach, the house was examined not so much from the perspective of construction, but of its cultural configuration.

Details

Journal of Cultural Heritage Management and Sustainable Development, vol. 14 no. 3
Type: Research Article
ISSN: 2044-1266

Keywords

Article
Publication date: 16 April 2024

Berit Greulich, Cornelius J. König and Ramona Mohr

The purpose of this study is to investigate the phenomenon of defensive biasing in work stress surveys, which occurs when employees trivialize potential stressors and strains due…

Abstract

Purpose

The purpose of this study is to investigate the phenomenon of defensive biasing in work stress surveys, which occurs when employees trivialize potential stressors and strains due to fear of negative consequences from their supervisors or management. This study aims to better understand the factors that influence this behavior and to develop a scale to measure it.

Design/methodology/approach

The study used an online survey of 200 employees to investigate the factors influencing defensive biasing behavior. The researchers developed a scale for defensive biasing with the help of subject matter experts and derived possible factors from the literature. Participants were presented with a hypothetical scenario in which they imagined a work stress survey in their organization and were asked to answer related items. The data were analyzed using regression analysis.

Findings

The study found that defensive biasing behavior was significantly predicted by perceived anonymity and neuroticism. Participants who felt less anonymous and had higher levels of neuroticism were more likely to engage in defensive biasing. Job insecurity and trust in supervisors were not found to be significant predictors of defensive biasing.

Originality/value

This study contributes to the literature on work stress surveys by developing a scale for defensive biasing and investigating the factors that influence this behavior. The study highlights the importance of making the survey process more transparent to reduce defensive biasing and obtain trustworthy results.

Details

International Journal of Workplace Health Management, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1753-8351

Keywords

Article
Publication date: 16 April 2024

Puneett Bhatnagr and Anupama Rajesh

This study aims to conceptualise a customer-centric model based on an online customer experience (OCE) construct, mediated by e-loyalty (EL) and e-trust (ET), to improve the…

Abstract

Purpose

This study aims to conceptualise a customer-centric model based on an online customer experience (OCE) construct, mediated by e-loyalty (EL) and e-trust (ET), to improve the continuous usage intention (CUI) of Indian digital banks from Generation Y and Z perspectives.

Design/methodology/approach

This study used an online survey method to gather data from a sample of 466 digital banking users, from which usable questionnaires were obtained. The obtained data were subjected to thorough analysis using PLS-SEM to further study the research hypotheses.

Findings

The main factors that determine digital banks’ OCE are perceived enjoyment, e-service quality, information quality and e-convenience. Additionally, relevant constructs were evaluated using an importance-performance map analysis.

Research limitations/implications

This study used convenience sampling for the urban population using digital banking; therefore, the outcome may be generalised to a limited extent. It would be valuable to imitate studies in other countries to strengthen digital banking further.

Originality/value

There is a lack of research on digital banking and OCE in India; thus, this study helps rectify this issue while providing valuable insights. This study differs from others in that it examines the connections between OCE, EL, ET and the bottom line of financial institutions, using these factors as dependent variables instead of traditional measures.

Details

Journal of Financial Reporting and Accounting, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1985-2517

Keywords

Article
Publication date: 9 April 2024

Shuai Zhan and Zhilan Wan

The credit of agricultural product quality and safety reflects the ability of the main actors involved in the supply chain to provide reliable agricultural products to consumers…

Abstract

Purpose

The credit of agricultural product quality and safety reflects the ability of the main actors involved in the supply chain to provide reliable agricultural products to consumers. To fundamentally solve the problem of agricultural product quality and safety, it is worth studying how to make the credit awareness and integrity self-discipline of the supply chain agriculture-related subjects strengthened and the role and value of credit supervision given full play. Starting from the application of blockchain in the agricultural product supply chain, this paper aims to investigate the main factors affecting the credit regulation of agricultural product quality.

Design/methodology/approach

Using the DEMATEL-ISM (decision-making trial and evaluation laboratory–interpretative structural modeling) method, we analyze the credit influencing factors of agricultural quality and safety empowered by blockchain technology, find the causal relationship between the crucial influencing factors and deeply explore the hierarchical transmission relationship between the influencing factors. Then, the path analysis in structural equation modeling is utilized to verify and measure the significance and effect value of the transmission relationship among the crucial influencing factors of credit regulation.

Findings

The results show that the quality and safety credit regulation of agricultural products is influenced by a combination of direct and deep influencing factors. Long-term stable cooperative relationship, Quality and safety credit evaluation, Supply chain risk control ability, Quality and safety testing, Constraints of the smart contract are the main influence path of blockchain embedded in agricultural product supply chain quality and safety credit supervision.

Originality/value

Credit supervision is an important means to improve the ability and level of social governance and standardize the market order. From the perspective of blockchain embedded in the agricultural supply chain, the regulatory body is transformed from the product body to the supply chain body. Take the credit supervision of supply chain subjects as the basis of agricultural product quality supervision. With the help of blockchain technology to improve the effectiveness of agricultural product quality and safety credit supervision, credit supervision is used to constrain and incentivize the behavior of agricultural subjects.

Details

Industrial Management & Data Systems, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0263-5577

Keywords

Article
Publication date: 18 April 2024

Edward Shih-Tse Wang and Hung-Chou Lin

In this study, we drew on the theories of social exchange and social learning and hypothesized that the online social capital (SC) and offline SC of social networking affect the…

Abstract

Purpose

In this study, we drew on the theories of social exchange and social learning and hypothesized that the online social capital (SC) and offline SC of social networking affect the online self-disclosure (OSD) of individuals through social self-efficacy (SSE).

Design/methodology/approach

After retrieving 514 valid questionnaires, we used structural equation modeling to analyze the data.

Findings

The results indicated that the users’ SSE affected their OSD, and that both online and offline bridging and bonding SC increased their SSE. However, online bonding SC directly affected their OSD, whereas online bridging SC did not considerably affect their OSD. Given these findings, we presented both theoretical and practical implications to elucidate SSE and OSD behavior from the perspective of online and offline bridging and bonding SC.

Originality/value

In this study, we drew on theories of social exchange and social learning to examine the effects of online and offline bridging and bonding SC on users’ SSE and OSD on SNSs. Given the importance of SC and SSE in social relationships and the effects of OSD on SNSs, our goal was to provide SNS marketers with a thorough understanding of how to facilitate SSE and OSD from the perspective of online and offline bridging and bonding SC.

Details

Aslib Journal of Information Management, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2050-3806

Keywords

Article
Publication date: 9 April 2024

Jaeyoung Park, Woosik Shin, Beomsoo Kim and Miyea Kim

This study aims to explore the spillover effects of data breaches from a consumer perspective in the e-commerce context. Specifically, we investigate how an online retailer’s data…

Abstract

Purpose

This study aims to explore the spillover effects of data breaches from a consumer perspective in the e-commerce context. Specifically, we investigate how an online retailer’s data breach affects consumers’ privacy risk perceptions of competing firms, and further how it affects shopping intention for the competitors. We also examine how the privacy risk contagion effect varies depending on the characteristics of competitors and their competitive responses.

Design/methodology/approach

We conducted two scenario-based experiments with surveys. To assess the spillover effects and the moderating effects, we employed an analysis of covariance. We also performed bootstrapping-based mediation analyses using the PROCESS macro.

Findings

We find evidence for the privacy risk contagion effect and demonstrate that it negatively influences consumers’ shopping intention for a competing firm. We also find that a competitor’s cybersecurity message is effective in avoiding the privacy risk contagion effect and the competitor even benefits from it.

Originality/value

While previous studies have examined the impacts of data breaches on customer perceptions of the breached firm, our study focuses on customer perceptions of the non-breached firms. To the best of the authors’ knowledge, this study is one of the first to provide empirical evidence for the negative spillover effects of a data breach from a consumer perspective. More importantly, this study empirically demonstrates that the non-breached competitor’s competitive response is effective in preventing unintended negative spillover in the context of the data breach.

Details

Internet Research, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1066-2243

Keywords

1 – 10 of 532