Search results

1 – 10 of over 1000
Article
Publication date: 9 January 2024

Ananda Dwitha Yuniar

Privacy is a sensitive issue in business because it involves how a platform uses consumer personal data. In terms of consumer rights, personal information needs to be protected in…

Abstract

Purpose

Privacy is a sensitive issue in business because it involves how a platform uses consumer personal data. In terms of consumer rights, personal information needs to be protected in the privacy policy (PP). This study describes several aspects of the PP that consumers need to pay attention to, especially points prone to misuse of personal information.

Design/methodology/approach

This research used a taxonomy of consumer privacy concerns in e-commerce to reveal general and specific privacy concerns. The privacy calculus theory was also applied to explore consumer rationalization using (1) consumer knowledge about PP, (2) subjective perception, and (3) proximity to the PP features. Furthermore, the netnographic approach was used to combine the interrelation between technology and social construction. A sample of 378 young consumers in several major cities in Indonesia participated online and offline. Semi-structured interviews were also conducted to gain more in-depth comprehension.

Findings

The results showed that most young consumers have sufficient basic knowledge of the important points of PP. Furthermore, they tend not to read the PP because it is long and cumbersome, and therefore do not wish to expend much cognitive effort on it.

Originality/value

This study provides several results that can be utilized by policymakers or e-commerce companies to pay more attention to PPs for young groups. In addition, e-commerce companies can increase the knowledge of the privacy situation of Internet users in general.

Peer review

The peer review history for this article is available at: https://publons.com/publon/10.1108/IJSE-11-2022-0740

Details

International Journal of Social Economics, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0306-8293

Keywords

Article
Publication date: 24 August 2023

Haroon Iqbal Maseeh, Shamsun Nahar, Charles Jebarajakirthy, Mitchell Ross, Denni Arli, Manish Das, Mehak Rehman and Hafiz Ahmad Ashraf

The purpose of this study is to explore and identify the privacy concerns of smartphone app users pertinent to app usage.

Abstract

Purpose

The purpose of this study is to explore and identify the privacy concerns of smartphone app users pertinent to app usage.

Design/methodology/approach

Adopting a qualitative phenomenological approach, the authors conducted semi-structured interviews with app users to explore the app users' privacy concerns.

Findings

Credibility concerns, unauthorised secondary use and vulnerability concerns are the three major privacy concerns of app users, under which these concerns have sub-concerns, i.e. popularity, privacy policy, stalking, data sharing, hacking and personal harm.

Practical implications

The findings are useful to app marketers, app developers and app stores. App marketers, app developers and app stores can use the findings to understand and properly address app users' privacy concerns, thereby increasing the apps usage.

Originality/value

By exploring the privacy concerns of app users, the authors' study extends the literature and provides a theoretical development of individuals' privacy concerns in the context of a widely used technology, i.e. smartphone applications. Accordingly, this study contributes to the consumer privacy literature.

Details

Marketing Intelligence & Planning, vol. 41 no. 7
Type: Research Article
ISSN: 0263-4503

Keywords

Article
Publication date: 25 October 2022

Joana Neves, Ofir Turel and Tiago Oliveira

While social networking sites (SNS) have many positive aspects, they can have several adverse outcomes, among which privacy violations are a vital concern. The authors first posit…

Abstract

Purpose

While social networking sites (SNS) have many positive aspects, they can have several adverse outcomes, among which privacy violations are a vital concern. The authors first posit that concerns regarding privacy violations can drive attempts to reduce SNS use. Next, the authors note that these violations can have two sources: peers and the social media provider. Thus, there is a need to understand how this complex system of privacy concerns affects use reduction decisions. To do so, this paper aims to examine the separate and joint roles of institutional and peer privacy concerns in driving SNS use reduction.

Design/methodology/approach

Based on privacy calculus theory, the authors propose a theoretical model to explain SNS use reduction, with institutional and peer privacy concerns as independent variables. The authors empirically examine the research model using a sample of 258 SNS users.

Findings

This study reveals that institutional and peer privacy concerns independently increase one's intention to reduce SNS use and that institutional privacy concern strengthen the relation between peer privacy concern and the intention to reduce SNS use.

Originality/value

Research thus far has not examined how the two facets of privacy work in tandem to affect 'users' decisions to change their behaviors on SNS platforms. Considering the unique and joint effect of these facets can thus provide a more precise and realistic perspective. This paper informs theories and models of privacy and online user behavior change.

Details

Internet Research, vol. 33 no. 3
Type: Research Article
ISSN: 1066-2243

Keywords

Article
Publication date: 27 March 2024

Haroon Iqbal Maseeh, Charles Jebarajakirthy, Achchuthan Sivapalan, Mitchell Ross and Mehak Rehman

Smartphone apps collect users' personal information, which triggers privacy concerns for app users. Consequently, app users restrict apps from accessing their personal…

84

Abstract

Purpose

Smartphone apps collect users' personal information, which triggers privacy concerns for app users. Consequently, app users restrict apps from accessing their personal information. This may impact the effectiveness of in-app advertising. However, research has not yet demonstrated what factors impact app users' decisions to use apps with restricted permissions. This study is aimed to bridge this gap.

Design/methodology/approach

Using a quantitative research method, the authors collected the data from 384 app users via a structured questionnaire. The data were analysed using AMOS and fuzzy-set qualitative comparative analysis (fsQCA).

Findings

The findings suggest privacy concerns and risks have a significant positive effect on app usage with restricted permissions, whilst reputation, trust and perceived benefits have significant negative impact on it. Some app-related factors, such as the number of apps installed and type of apps, also impact app usage with restricted permissions.

Practical implications

Based on the findings, the authors provided several implications for app stores, app developers and app marketers.

Originality/value

This study examines the factors that influence smartphone users' decisions to use apps with restricted permission requests. By doing this, the authors' study contributes to the consumer behaviour literature in the context of smartphone app usage. Also, by explaining the underlying mechanisms through which the principles of communication privacy management theory operate in smartphone app context, the authors' research contributes to the communication privacy management theory.

Details

Information Technology & People, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0959-3845

Keywords

Article
Publication date: 1 December 2023

Ana Junça Silva and Sara Martins

Although (tele)work is increasingly being adopted and employees’ behavior is recognized to be key for organizational outcomes (e.g. performance), the current literature on…

Abstract

Purpose

Although (tele)work is increasingly being adopted and employees’ behavior is recognized to be key for organizational outcomes (e.g. performance), the current literature on counterproductive work behaviors (CWB) in telework settings is fragmented, and a valid measurement instrument is lacking. This study aims to address this gap and starts by presenting a review of the current literature on counterproductive work behavior in flexible work arrangements (i.e. telework). Based on this study, eight categories of work behavior that appear to be frequent under telework settings were identified.

Design/Methodology

Next, four studies aimed at developing and validating a measurement instrument that captures employee counterproductive work behavior when teleworking: the counterproductive [tele]work behavior scale (CTwBS).

Findings

In Study 1, the CTwBS was created, and in Study 2, its factorial validity was examined (N = 350). In Study 3, using a sample of teleworkers (N = 289), the convergent and discriminant validity of the CTwBS was tested using self-ratings of (positive and negative) affect, attitudes toward telework and frequency of CWB in general. In Study 4, a daily-diary study across five workdays (N = 232 × 5 = 1,160) examined the criterion validity of the CTwBS.

Practical implications

The results indicated that the CTwBS is a valid and reliable instrument for capturing employee counterproductive work behavior in telework settings. Theoretical and practical implications are discussed.

Originality

To the best of the authors’ knowledge, CTwBS is the first measure aimed at assessing counterproductive work behavior in telework settings.

Details

International Journal of Organizational Analysis, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1934-8835

Keywords

Article
Publication date: 19 July 2023

Hamid Reza Nikkhah, Varun Grover and Rajiv Sabherwal

This study aims to argue that user’s continued use behavior is contingent upon two perceptions (i.e. the app and the provider). This study examines the moderating effects of…

Abstract

Purpose

This study aims to argue that user’s continued use behavior is contingent upon two perceptions (i.e. the app and the provider). This study examines the moderating effects of user’s perceptions of apps and providers on the effects of security and privacy concerns and investigate whether assurance mechanisms decrease such concerns.

Design/methodology/approach

This study conducts a scenario-based survey with 694 mobile cloud computing (MCC) app users to understand their perceptions and behaviors.

Findings

This study finds that while perceived value of data transfer to the cloud moderates the effects of security and privacy concerns on continued use behavior, trust only moderates the effect of privacy concerns. This study also finds that perceived effectiveness of security and privacy intervention impacts privacy concerns but does not decrease security concerns.

Originality/value

Prior mobile app studies mainly focused on mobile apps and did not investigate the perceptions of app providers along with app features in the same study. Furthermore, International Organization for Standardization 27018 certification and privacy policy notification are the interventions that exhibit data assurance mechanisms. However, it is unknown whether these interventions are able to decrease users’ security and privacy concerns after using MCC apps.

Details

Information & Computer Security, vol. 32 no. 1
Type: Research Article
ISSN: 2056-4961

Keywords

Article
Publication date: 16 January 2024

Xiaojun Wu, Zhongyun Zhou and Shouming Chen

Artificial intelligence (AI) applications pose a potential threat to users' data security and privacy due to their high data-dependence nature. This paper aims to investigate an…

Abstract

Purpose

Artificial intelligence (AI) applications pose a potential threat to users' data security and privacy due to their high data-dependence nature. This paper aims to investigate an understudied issue in the literature, namely, how users perceive the threat of and decide to use a threatening AI application. In particular, it examines the influencing factors and the mechanisms that affect an individual’s behavioral intention to use facial recognition, a threatening AI.

Design/methodology/approach

The authors develop a research model with trust as the key mediating variable by integrating technology threat avoidance theory, the theory of planned behavior and contextual factors related to facial recognition. Then, it is tested through a sequential mixed-methods investigation, including a qualitative study (for model development) of online comments from various platforms and a quantitative study (for model validation) using field survey data.

Findings

Perceived threat (triggered by perceived susceptibility and severity) and perceived avoidability (promoted by perceived effectiveness, perceived cost and self-efficacy) have negative and positive relationships, respectively, with an individual’s attitude toward facial recognition applications; these relationships are partially mediated by trust. In addition, perceived avoidability is positively related to perceived behavioral control, which along with attitude and subjective norm is positively related to individuals' intentions to use facial recognition applications.

Originality/value

This paper is among the first to examine the factors that affect the acceptance of threatening AI applications and how. The research findings extend the current literature by providing rich and novel insights into the important roles of perceived threat, perceived avoidability, and trust in affecting an individual’s attitude and intention regarding using threatening AI applications.

Details

Internet Research, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1066-2243

Keywords

Article
Publication date: 5 July 2023

Manoj Kumar Kamila and Sahil Singh Jasrotia

This study aims to analyse the ethical implications associated with the development of artificial intelligence (AI) technologies and to examine the potential ethical ramifications…

1599

Abstract

Purpose

This study aims to analyse the ethical implications associated with the development of artificial intelligence (AI) technologies and to examine the potential ethical ramifications of AI technologies.

Design/methodology/approach

This study undertakes a thorough examination of existing academic literature pertaining to the ethical considerations surrounding AI. Additionally, it conducts in-depth interviews with individuals to explore the potential benefits and drawbacks of AI technology operating as autonomous ethical agents. A total of 20 semi-structured interviews were conducted, and the data were transcribed using grounded theory methodology.

Findings

The study asserts the importance of fostering an ethical environment in the progress of AI and suggests potential avenues for further investigation in the field of AI ethics. The study finds privacy and security, bias and fairness, trust and reliability, transparency and human–AI interactions as major ethical concerns.

Research limitations/implications

The implications of the study are far-reaching and span across various domains, including policy development, design of AI systems, establishment of trust, education and training, public awareness and further research. Notwithstanding the potential biases inherent in purposive sampling, the constantly evolving landscape of AI ethics and the challenge of extrapolating findings to all AI applications and contexts, limitations may still manifest.

Originality/value

The novelty of the study is attributed to its comprehensive methodology, which encompasses a wide range of stakeholder perspectives on the ethical implications of AI in the corporate sector. The ultimate goal is to promote the development of AI systems that exhibit responsibility, transparency and accountability.

Details

International Journal of Ethics and Systems, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2514-9369

Keywords

Article
Publication date: 16 April 2024

Neena Sinha, Sanjay Dhingra, Ritu Sehrawat, Varnika Jain and Himanshu Himanshu

The emergence of virtual reality (VR) has the potential to revolutionize various industries, including tourism, as it delivers a simulated environment that closely emulates…

Abstract

Purpose

The emergence of virtual reality (VR) has the potential to revolutionize various industries, including tourism, as it delivers a simulated environment that closely emulates real-life experiences. Therefore, this study aims to explore how the factors, i.e. enjoyment, emotional involvement, flow state, perceived privacy risk, physical risk and cost, influence the customers’ intention to use VR for tourism.

Design/methodology/approach

This study integrates the technology acceptance model, hedonic consumption theory with other factors, including cognitive response, authenticity, perceived privacy risk, perceived physical risk, perceived cost and perceived presence. Partial least squares structural equation modelling approach was used to test the proposed research model.

Findings

The finding based on the sample of 252 respondents revealed that authenticity is the most influential factor impacting behavior intention followed by perceived cost, attitude, cognitive response and enjoyment. Also, the study supported the moderating impact of personal innovativeness between attitude and behavioral intention to use VR for tourism.

Practical implications

The findings of the study offers practical implications for service providers, site managers, destination marketers, tourist organizations and policymaker to develop more effective strategies for offering VR services for tourism.

Originality/value

This study enriches the current understanding of VR adoption in context of tourism with empirical evidences.

Article
Publication date: 28 April 2023

Muhammad Hassaan, Gang Li and Asif Yaseen

This paper aims to understand the facilitators and inhibitors that might influence customers' adoption of smart banking services (SBS) in Pakistan.

Abstract

Purpose

This paper aims to understand the facilitators and inhibitors that might influence customers' adoption of smart banking services (SBS) in Pakistan.

Design/methodology/approach

Semi-structured interviews were conducted with 33 bank customers in Multan and Lahore using a case study design. Cases were selected using a purposive sampling strategy with maximum variation. A thematic content analysis (TCA) was performed to analyze the qualitative data.

Findings

The findings of this study support the notion that SBS has become a sine qua non of 21st-century banking owing to performance expectancy, effort expectancy, social influence, price value, facilitating conditions, habit and hedonic motivation. However, information privacy concerns and big brother effect impair customers' cognitive, personal and social experiences, creating an obstacle toward SBS adoption.

Research limitations/implications

Studying SBS adoption only in Pakistan represents the perspective of a developing country, which limits the generalizability of the findings.

Practical implications

Pakistani customers' demand for SBS can be linked to its performance. By upgrading technology, banks can improve the usefulness of these services.

Originality/value

The first scholarly inquiry explores the facilitators and inhibitors that could influence the adoption of SBS in Pakistan.

Details

Kybernetes, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0368-492X

Keywords

1 – 10 of over 1000