Search results
1 – 10 of 532Princely Ifinedo, Francine Vachon and Anteneh Ayanso
This paper aims to increase understanding of pertinent exogenous and endogenous antecedents that can reduce data privacy breaches.
Abstract
Purpose
This paper aims to increase understanding of pertinent exogenous and endogenous antecedents that can reduce data privacy breaches.
Design/methodology/approach
A cross-sectional survey was used to source participants' perceptions of relevant exogenous and endogenous antecedents developed from the Antecedents-Privacy Concerns-Outcomes (APCO) model and Social Cognitive Theory. A research model was proposed and tested with empirical data collected from 213 participants based in Canada.
Findings
The exogenous factors of external privacy training and external privacy self-assessment tool significantly and positively impact the study's endogenous factors of individual privacy awareness, organizational resources allocated to privacy concerns, and group behavior concerning privacy laws. Further, the proximal determinants of data privacy breaches (dependent construct) are negatively influenced by individual privacy awareness, group behavior related to privacy laws, and organizational resources allocated to privacy concerns. The endogenous factors fully mediated the relationships between the exogenous factors and the dependent construct.
Research limitations/implications
This study contributes to the budding data privacy breach literature by highlighting the impacts of personal and environmental factors in the discourse.
Practical implications
The results offer management insights on mitigating data privacy breach incidents arising from employees' actions. Roles of external privacy training and privacy self-assessment tools are signified.
Originality/value
Antecedents of data privacy breaches have been underexplored. This paper is among the first to elucidate the roles of select exogenous and endogenous antecedents encompassing personal and environmental imperatives on data privacy breaches.
Details
Keywords
Renata Monteiro Martins, Sofia Batista Ferraz and André Francisco Alcântara Fagundes
This study aims to propose an innovative model that integrates variables and examines the influence of internet usage expertise, perceived risk and attitude toward information…
Abstract
Purpose
This study aims to propose an innovative model that integrates variables and examines the influence of internet usage expertise, perceived risk and attitude toward information control on privacy concerns (PC) and, consequently, in consumers’ willingness to disclose personal information online. The authors also propose to test the mediation role of trust between PCs and willingness to disclose information. Trust is not a predictor of PC but a causal mechanism – considering that the focus is to understand consumers’ attitudes and behavior regarding the virtual environment (not context-specific) (Martin, 2018).
Design/methodology/approach
The authors developed a survey questionnaire based on the constructs that compose the proposed model to collect data from 864 respondents. The survey questionnaire included the following scales: internet usage expertise from Ohanian (1990); perceived risk, attitude toward information control, trust and willingness to disclose personal information online from Malhotra et al. (2004); and PC from Castañeda and Montoro (2007). All items were measured on a Likert seven-point scale (1 = totally disagree; 7 = totally agree). To obtain Westin’s attitudinal categories toward privacy, respondents answered Westin’s three-item privacy index. For data analysis, the authors applied covariance-based structural equation modeling.
Findings
First, the proposed model explains the drivers of consumers’ disposition to provide personal information at a level that surpasses specific contexts (Martin, 2018), bringing the analysis to consumers’ level and considering their general perceptions toward data privacy. Second, the findings provide inputs to propose a better definition of Westin’s attitudinal categories toward privacy, which used to be defined only by individuals’ information privacy perception. Consumers’ perceptions about their abilities in using the internet, the risks, their beliefs toward information control and trust also help to delimitate and distinguish the fundamentalists, the pragmatics and the unconcerned.
Research limitations/implications
Some limitations weigh the theoretical and practical implications of this study. The sample size of pragmatic and unconcerned respondents was substantially smaller than that of fundamentalists. It might be explained by applying Westin’s self-report index to classify the groups according to their score regarding PCs. Most individuals affirm having a great concern for their data privacy but still provide online information for the benefit of personalization – known as the privacy paradox (Zeng et al., 2021). It leads to another limitation of this research, given the lack of measures that classify respondents by considering their actual behavior toward privacy.
Practical implications
PC emerges as an important predictor of consumer trust and willingness to disclose their data online, and trust also influences this disposition. Managers need to implement actions that effectively reduce consumers’ concerns about privacy and increase their trust in the company – e.g. adopting a clear and transparent policy on how the data collected is stored, treated, protected and used to benefit the consumer. Regarding the perception of risk, if managers convince consumers that the data collected on the internet is protected, they tend to be less concerned about privacy.
Social implications
The results suggest different aspects influencing the willingness to disclose personal information online, including different responses considering consumers’ PCs. Through their policies and legislation, the authors understand that governments must be attentive to this aspect, establishing regulations that protect consumers’ data in the virtual environment. In addition to regulatory policies, education campaigns can be carried out for both consumers and managers to raise the discussion about privacy and the availability of information in the online environment, demonstrating the importance of protecting personal data to benefit the government, consumers and organizations.
Originality/value
Although there is increasing research on consumers’ privacy, studies have not considered their attitudinal classifications – high, moderate and low concern – as moderators of willingness to disclose information online. Researchers have also increased attention to the antecedents of PCs and disclosure of information but overlooked possible mechanisms that explain the relationship between them.
Details
Keywords
Amir Schreiber and Ilan Schreiber
In the modern digital realm, while artificial intelligence (AI) technologies pave the way for unprecedented opportunities, they also give rise to intricate cybersecurity issues…
Abstract
Purpose
In the modern digital realm, while artificial intelligence (AI) technologies pave the way for unprecedented opportunities, they also give rise to intricate cybersecurity issues, including threats like deepfakes and unanticipated AI-induced risks. This study aims to address the insufficient exploration of AI cybersecurity awareness in the current literature.
Design/methodology/approach
Using in-depth surveys across varied sectors (N = 150), the authors analyzed the correlation between the absence of AI risk content in organizational cybersecurity awareness programs and its impact on employee awareness.
Findings
A significant AI-risk knowledge void was observed among users: despite frequent interaction with AI tools, a majority remain unaware of specialized AI threats. A pronounced knowledge difference existed between those that are trained in AI risks and those who are not, more apparent among non-technical personnel and sectors managing sensitive information.
Research limitations/implications
This study paves the way for thorough research, allowing for refinement of awareness initiatives tailored to distinct industries.
Practical implications
It is imperative for organizations to emphasize AI risk training, especially among non-technical staff. Industries handling sensitive data should be at the forefront.
Social implications
Ensuring employees are aware of AI-related threats can lead to a safer digital environment for both organizations and society at large, given the pervasive nature of AI in everyday life.
Originality/value
Unlike most of the papers about AI risks, the authors do not trust subjective data from second hand papers, but use objective authentic data from the authors’ own up-to-date anonymous survey.
Details
Keywords
Pouyan Esmaeilzadeh, Spurthy Dharanikota and Tala Mirzaei
Patient-centric exchanges, a major type of Health Information Exchange (HIE), empower patients to aggregate and manage their health information. This exchange model helps patients…
Abstract
Purpose
Patient-centric exchanges, a major type of Health Information Exchange (HIE), empower patients to aggregate and manage their health information. This exchange model helps patients access, modify and share their medical information with multiple healthcare organizations. Although existing studies examine patient engagement, more research is required to investigate patients' attitudes and willingness to play an active role in patient-centered information exchange. The study's main objective is to develop a model based on the belief-attitude-intention paradigm to empirically examine the effects of patients' attitudes toward engagement in care on their willingness to participate in patient-centric HIE.
Design/methodology/approach
The authors conducted an online survey study to identify the antecedents and consequences of patients' attitudes toward engagement in care. To empirically test the research model, the authors collected data from a national sample (n = 357) of individuals in the United States. The data were analyzed using structural equation modeling (SEM).
Findings
The proposed model categorizes the antecedents to patients' attitudes toward engagement in patient-related and healthcare system factors. The results show that patient-related factors (perceived health literacy and perceived coping ability) and health system factors (perceived experience with the healthcare organization and perceived patient-provider interaction) significantly shape patient attitude toward care management engagement. The results indicate that patients' attitudes toward engaging in their healthcare significantly contribute to their willingness to participate in medical information sharing through patient-centric HIE initiatives. Moreover, the authors’ findings also demonstrate that the link between patient engagement and willingness to participate in HIE is stronger for individuals who perceive lower levels of privacy and security concerns.
Originality/value
The authors validate the proposed model explaining patients' perceptions about their characteristics and the healthcare system significantly influence their attitude toward engaging in their care. This study also suggests that patients' favorable attitude toward engagement can bring patient-centric HIE efforts onto a path to success. The authors’ research attempts to shed light on the importance of patients' roles in adopting patient-centric HIE initiatives. Theoretical and practical contributions of this study are noticeable since they could result in a deeper understanding of the concept of patient engagement and how it may affect healthcare services in an evolving digital world. The authors’ findings can help healthcare organizations provide public citizen-centric services by introducing user-oriented approaches in healthcare delivery systems.
Details
Keywords
María Lidón de Miguel, Lidia García-Soriano, Camilla Mileto and Fernando Vegas López-Manzanares
The common language behind vernacular architecture only seems to be maintained in societies that preserve a traditional way of life. Changes in these societies can threaten their…
Abstract
Purpose
The common language behind vernacular architecture only seems to be maintained in societies that preserve a traditional way of life. Changes in these societies can threaten their cultural heritage, while research may be a tool for its conservation and enhancement. In this paper, the habitat of a Mossi community is therefore studied as a first stage in analysing the possibilities of its maintenance.
Design/methodology/approach
After a previous study, data collection from a stay in Baasneere (Burkina Faso) and the analysis of 32 traditional residential units were completed. The research showed some common features which, when compared against the bibliography reviewed, could be defined as characteristic of the traditional architecture of this culture.
Findings
The home for a family unit consisted in an enclosure formed by the grouping of adobe constructions around a courtyard. As the family grew so did the compound, in a relationship directly linking the scales of architecture and the levels of kinship. The main daily activities took place in the courtyards while the individual interior spaces were understood as private shelters. Other typologies such as granaries, kitchens, warehouses and sheds were also analysed.
Originality/value
Some features of Mossi architecture already described in the existing bibliography were verified in the Baasneere case studies, showing that this tradition is still preserved. With a multidisciplinary approach, the house was examined not so much from the perspective of construction, but of its cultural configuration.
Details
Keywords
Berit Greulich, Cornelius J. König and Ramona Mohr
The purpose of this study is to investigate the phenomenon of defensive biasing in work stress surveys, which occurs when employees trivialize potential stressors and strains due…
Abstract
Purpose
The purpose of this study is to investigate the phenomenon of defensive biasing in work stress surveys, which occurs when employees trivialize potential stressors and strains due to fear of negative consequences from their supervisors or management. This study aims to better understand the factors that influence this behavior and to develop a scale to measure it.
Design/methodology/approach
The study used an online survey of 200 employees to investigate the factors influencing defensive biasing behavior. The researchers developed a scale for defensive biasing with the help of subject matter experts and derived possible factors from the literature. Participants were presented with a hypothetical scenario in which they imagined a work stress survey in their organization and were asked to answer related items. The data were analyzed using regression analysis.
Findings
The study found that defensive biasing behavior was significantly predicted by perceived anonymity and neuroticism. Participants who felt less anonymous and had higher levels of neuroticism were more likely to engage in defensive biasing. Job insecurity and trust in supervisors were not found to be significant predictors of defensive biasing.
Originality/value
This study contributes to the literature on work stress surveys by developing a scale for defensive biasing and investigating the factors that influence this behavior. The study highlights the importance of making the survey process more transparent to reduce defensive biasing and obtain trustworthy results.
Details
Keywords
Puneett Bhatnagr and Anupama Rajesh
This study aims to conceptualise a customer-centric model based on an online customer experience (OCE) construct, mediated by e-loyalty (EL) and e-trust (ET), to improve the…
Abstract
Purpose
This study aims to conceptualise a customer-centric model based on an online customer experience (OCE) construct, mediated by e-loyalty (EL) and e-trust (ET), to improve the continuous usage intention (CUI) of Indian digital banks from Generation Y and Z perspectives.
Design/methodology/approach
This study used an online survey method to gather data from a sample of 466 digital banking users, from which usable questionnaires were obtained. The obtained data were subjected to thorough analysis using PLS-SEM to further study the research hypotheses.
Findings
The main factors that determine digital banks’ OCE are perceived enjoyment, e-service quality, information quality and e-convenience. Additionally, relevant constructs were evaluated using an importance-performance map analysis.
Research limitations/implications
This study used convenience sampling for the urban population using digital banking; therefore, the outcome may be generalised to a limited extent. It would be valuable to imitate studies in other countries to strengthen digital banking further.
Originality/value
There is a lack of research on digital banking and OCE in India; thus, this study helps rectify this issue while providing valuable insights. This study differs from others in that it examines the connections between OCE, EL, ET and the bottom line of financial institutions, using these factors as dependent variables instead of traditional measures.
Details
Keywords
Shuai Zhan and Zhilan Wan
The credit of agricultural product quality and safety reflects the ability of the main actors involved in the supply chain to provide reliable agricultural products to consumers…
Abstract
Purpose
The credit of agricultural product quality and safety reflects the ability of the main actors involved in the supply chain to provide reliable agricultural products to consumers. To fundamentally solve the problem of agricultural product quality and safety, it is worth studying how to make the credit awareness and integrity self-discipline of the supply chain agriculture-related subjects strengthened and the role and value of credit supervision given full play. Starting from the application of blockchain in the agricultural product supply chain, this paper aims to investigate the main factors affecting the credit regulation of agricultural product quality.
Design/methodology/approach
Using the DEMATEL-ISM (decision-making trial and evaluation laboratory–interpretative structural modeling) method, we analyze the credit influencing factors of agricultural quality and safety empowered by blockchain technology, find the causal relationship between the crucial influencing factors and deeply explore the hierarchical transmission relationship between the influencing factors. Then, the path analysis in structural equation modeling is utilized to verify and measure the significance and effect value of the transmission relationship among the crucial influencing factors of credit regulation.
Findings
The results show that the quality and safety credit regulation of agricultural products is influenced by a combination of direct and deep influencing factors. Long-term stable cooperative relationship, Quality and safety credit evaluation, Supply chain risk control ability, Quality and safety testing, Constraints of the smart contract are the main influence path of blockchain embedded in agricultural product supply chain quality and safety credit supervision.
Originality/value
Credit supervision is an important means to improve the ability and level of social governance and standardize the market order. From the perspective of blockchain embedded in the agricultural supply chain, the regulatory body is transformed from the product body to the supply chain body. Take the credit supervision of supply chain subjects as the basis of agricultural product quality supervision. With the help of blockchain technology to improve the effectiveness of agricultural product quality and safety credit supervision, credit supervision is used to constrain and incentivize the behavior of agricultural subjects.
Details
Keywords
Edward Shih-Tse Wang and Hung-Chou Lin
In this study, we drew on the theories of social exchange and social learning and hypothesized that the online social capital (SC) and offline SC of social networking affect the…
Abstract
Purpose
In this study, we drew on the theories of social exchange and social learning and hypothesized that the online social capital (SC) and offline SC of social networking affect the online self-disclosure (OSD) of individuals through social self-efficacy (SSE).
Design/methodology/approach
After retrieving 514 valid questionnaires, we used structural equation modeling to analyze the data.
Findings
The results indicated that the users’ SSE affected their OSD, and that both online and offline bridging and bonding SC increased their SSE. However, online bonding SC directly affected their OSD, whereas online bridging SC did not considerably affect their OSD. Given these findings, we presented both theoretical and practical implications to elucidate SSE and OSD behavior from the perspective of online and offline bridging and bonding SC.
Originality/value
In this study, we drew on theories of social exchange and social learning to examine the effects of online and offline bridging and bonding SC on users’ SSE and OSD on SNSs. Given the importance of SC and SSE in social relationships and the effects of OSD on SNSs, our goal was to provide SNS marketers with a thorough understanding of how to facilitate SSE and OSD from the perspective of online and offline bridging and bonding SC.
Details
Keywords
Jaeyoung Park, Woosik Shin, Beomsoo Kim and Miyea Kim
This study aims to explore the spillover effects of data breaches from a consumer perspective in the e-commerce context. Specifically, we investigate how an online retailer’s data…
Abstract
Purpose
This study aims to explore the spillover effects of data breaches from a consumer perspective in the e-commerce context. Specifically, we investigate how an online retailer’s data breach affects consumers’ privacy risk perceptions of competing firms, and further how it affects shopping intention for the competitors. We also examine how the privacy risk contagion effect varies depending on the characteristics of competitors and their competitive responses.
Design/methodology/approach
We conducted two scenario-based experiments with surveys. To assess the spillover effects and the moderating effects, we employed an analysis of covariance. We also performed bootstrapping-based mediation analyses using the PROCESS macro.
Findings
We find evidence for the privacy risk contagion effect and demonstrate that it negatively influences consumers’ shopping intention for a competing firm. We also find that a competitor’s cybersecurity message is effective in avoiding the privacy risk contagion effect and the competitor even benefits from it.
Originality/value
While previous studies have examined the impacts of data breaches on customer perceptions of the breached firm, our study focuses on customer perceptions of the non-breached firms. To the best of the authors’ knowledge, this study is one of the first to provide empirical evidence for the negative spillover effects of a data breach from a consumer perspective. More importantly, this study empirically demonstrates that the non-breached competitor’s competitive response is effective in preventing unintended negative spillover in the context of the data breach.
Details