Search results
1 – 10 of over 1000Privacy is a sensitive issue in business because it involves how a platform uses consumer personal data. In terms of consumer rights, personal information needs to be protected in…
Abstract
Purpose
Privacy is a sensitive issue in business because it involves how a platform uses consumer personal data. In terms of consumer rights, personal information needs to be protected in the privacy policy (PP). This study describes several aspects of the PP that consumers need to pay attention to, especially points prone to misuse of personal information.
Design/methodology/approach
This research used a taxonomy of consumer privacy concerns in e-commerce to reveal general and specific privacy concerns. The privacy calculus theory was also applied to explore consumer rationalization using (1) consumer knowledge about PP, (2) subjective perception, and (3) proximity to the PP features. Furthermore, the netnographic approach was used to combine the interrelation between technology and social construction. A sample of 378 young consumers in several major cities in Indonesia participated online and offline. Semi-structured interviews were also conducted to gain more in-depth comprehension.
Findings
The results showed that most young consumers have sufficient basic knowledge of the important points of PP. Furthermore, they tend not to read the PP because it is long and cumbersome, and therefore do not wish to expend much cognitive effort on it.
Originality/value
This study provides several results that can be utilized by policymakers or e-commerce companies to pay more attention to PPs for young groups. In addition, e-commerce companies can increase the knowledge of the privacy situation of Internet users in general.
Peer review
The peer review history for this article is available at: https://publons.com/publon/10.1108/IJSE-11-2022-0740
Details
Keywords
Haroon Iqbal Maseeh, Shamsun Nahar, Charles Jebarajakirthy, Mitchell Ross, Denni Arli, Manish Das, Mehak Rehman and Hafiz Ahmad Ashraf
The purpose of this study is to explore and identify the privacy concerns of smartphone app users pertinent to app usage.
Abstract
Purpose
The purpose of this study is to explore and identify the privacy concerns of smartphone app users pertinent to app usage.
Design/methodology/approach
Adopting a qualitative phenomenological approach, the authors conducted semi-structured interviews with app users to explore the app users' privacy concerns.
Findings
Credibility concerns, unauthorised secondary use and vulnerability concerns are the three major privacy concerns of app users, under which these concerns have sub-concerns, i.e. popularity, privacy policy, stalking, data sharing, hacking and personal harm.
Practical implications
The findings are useful to app marketers, app developers and app stores. App marketers, app developers and app stores can use the findings to understand and properly address app users' privacy concerns, thereby increasing the apps usage.
Originality/value
By exploring the privacy concerns of app users, the authors' study extends the literature and provides a theoretical development of individuals' privacy concerns in the context of a widely used technology, i.e. smartphone applications. Accordingly, this study contributes to the consumer privacy literature.
Details
Keywords
Joana Neves, Ofir Turel and Tiago Oliveira
While social networking sites (SNS) have many positive aspects, they can have several adverse outcomes, among which privacy violations are a vital concern. The authors first posit…
Abstract
Purpose
While social networking sites (SNS) have many positive aspects, they can have several adverse outcomes, among which privacy violations are a vital concern. The authors first posit that concerns regarding privacy violations can drive attempts to reduce SNS use. Next, the authors note that these violations can have two sources: peers and the social media provider. Thus, there is a need to understand how this complex system of privacy concerns affects use reduction decisions. To do so, this paper aims to examine the separate and joint roles of institutional and peer privacy concerns in driving SNS use reduction.
Design/methodology/approach
Based on privacy calculus theory, the authors propose a theoretical model to explain SNS use reduction, with institutional and peer privacy concerns as independent variables. The authors empirically examine the research model using a sample of 258 SNS users.
Findings
This study reveals that institutional and peer privacy concerns independently increase one's intention to reduce SNS use and that institutional privacy concern strengthen the relation between peer privacy concern and the intention to reduce SNS use.
Originality/value
Research thus far has not examined how the two facets of privacy work in tandem to affect 'users' decisions to change their behaviors on SNS platforms. Considering the unique and joint effect of these facets can thus provide a more precise and realistic perspective. This paper informs theories and models of privacy and online user behavior change.
Details
Keywords
Haroon Iqbal Maseeh, Charles Jebarajakirthy, Achchuthan Sivapalan, Mitchell Ross and Mehak Rehman
Smartphone apps collect users' personal information, which triggers privacy concerns for app users. Consequently, app users restrict apps from accessing their personal…
Abstract
Purpose
Smartphone apps collect users' personal information, which triggers privacy concerns for app users. Consequently, app users restrict apps from accessing their personal information. This may impact the effectiveness of in-app advertising. However, research has not yet demonstrated what factors impact app users' decisions to use apps with restricted permissions. This study is aimed to bridge this gap.
Design/methodology/approach
Using a quantitative research method, the authors collected the data from 384 app users via a structured questionnaire. The data were analysed using AMOS and fuzzy-set qualitative comparative analysis (fsQCA).
Findings
The findings suggest privacy concerns and risks have a significant positive effect on app usage with restricted permissions, whilst reputation, trust and perceived benefits have significant negative impact on it. Some app-related factors, such as the number of apps installed and type of apps, also impact app usage with restricted permissions.
Practical implications
Based on the findings, the authors provided several implications for app stores, app developers and app marketers.
Originality/value
This study examines the factors that influence smartphone users' decisions to use apps with restricted permission requests. By doing this, the authors' study contributes to the consumer behaviour literature in the context of smartphone app usage. Also, by explaining the underlying mechanisms through which the principles of communication privacy management theory operate in smartphone app context, the authors' research contributes to the communication privacy management theory.
Details
Keywords
Ana Junça Silva and Sara Martins
Although (tele)work is increasingly being adopted and employees’ behavior is recognized to be key for organizational outcomes (e.g. performance), the current literature on…
Abstract
Purpose
Although (tele)work is increasingly being adopted and employees’ behavior is recognized to be key for organizational outcomes (e.g. performance), the current literature on counterproductive work behaviors (CWB) in telework settings is fragmented, and a valid measurement instrument is lacking. This study aims to address this gap and starts by presenting a review of the current literature on counterproductive work behavior in flexible work arrangements (i.e. telework). Based on this study, eight categories of work behavior that appear to be frequent under telework settings were identified.
Design/Methodology
Next, four studies aimed at developing and validating a measurement instrument that captures employee counterproductive work behavior when teleworking: the counterproductive [tele]work behavior scale (CTwBS).
Findings
In Study 1, the CTwBS was created, and in Study 2, its factorial validity was examined (N = 350). In Study 3, using a sample of teleworkers (N = 289), the convergent and discriminant validity of the CTwBS was tested using self-ratings of (positive and negative) affect, attitudes toward telework and frequency of CWB in general. In Study 4, a daily-diary study across five workdays (N = 232 × 5 = 1,160) examined the criterion validity of the CTwBS.
Practical implications
The results indicated that the CTwBS is a valid and reliable instrument for capturing employee counterproductive work behavior in telework settings. Theoretical and practical implications are discussed.
Originality
To the best of the authors’ knowledge, CTwBS is the first measure aimed at assessing counterproductive work behavior in telework settings.
Details
Keywords
Hamid Reza Nikkhah, Varun Grover and Rajiv Sabherwal
This study aims to argue that user’s continued use behavior is contingent upon two perceptions (i.e. the app and the provider). This study examines the moderating effects of…
Abstract
Purpose
This study aims to argue that user’s continued use behavior is contingent upon two perceptions (i.e. the app and the provider). This study examines the moderating effects of user’s perceptions of apps and providers on the effects of security and privacy concerns and investigate whether assurance mechanisms decrease such concerns.
Design/methodology/approach
This study conducts a scenario-based survey with 694 mobile cloud computing (MCC) app users to understand their perceptions and behaviors.
Findings
This study finds that while perceived value of data transfer to the cloud moderates the effects of security and privacy concerns on continued use behavior, trust only moderates the effect of privacy concerns. This study also finds that perceived effectiveness of security and privacy intervention impacts privacy concerns but does not decrease security concerns.
Originality/value
Prior mobile app studies mainly focused on mobile apps and did not investigate the perceptions of app providers along with app features in the same study. Furthermore, International Organization for Standardization 27018 certification and privacy policy notification are the interventions that exhibit data assurance mechanisms. However, it is unknown whether these interventions are able to decrease users’ security and privacy concerns after using MCC apps.
Details
Keywords
Xiaojun Wu, Zhongyun Zhou and Shouming Chen
Artificial intelligence (AI) applications pose a potential threat to users' data security and privacy due to their high data-dependence nature. This paper aims to investigate an…
Abstract
Purpose
Artificial intelligence (AI) applications pose a potential threat to users' data security and privacy due to their high data-dependence nature. This paper aims to investigate an understudied issue in the literature, namely, how users perceive the threat of and decide to use a threatening AI application. In particular, it examines the influencing factors and the mechanisms that affect an individual’s behavioral intention to use facial recognition, a threatening AI.
Design/methodology/approach
The authors develop a research model with trust as the key mediating variable by integrating technology threat avoidance theory, the theory of planned behavior and contextual factors related to facial recognition. Then, it is tested through a sequential mixed-methods investigation, including a qualitative study (for model development) of online comments from various platforms and a quantitative study (for model validation) using field survey data.
Findings
Perceived threat (triggered by perceived susceptibility and severity) and perceived avoidability (promoted by perceived effectiveness, perceived cost and self-efficacy) have negative and positive relationships, respectively, with an individual’s attitude toward facial recognition applications; these relationships are partially mediated by trust. In addition, perceived avoidability is positively related to perceived behavioral control, which along with attitude and subjective norm is positively related to individuals' intentions to use facial recognition applications.
Originality/value
This paper is among the first to examine the factors that affect the acceptance of threatening AI applications and how. The research findings extend the current literature by providing rich and novel insights into the important roles of perceived threat, perceived avoidability, and trust in affecting an individual’s attitude and intention regarding using threatening AI applications.
Details
Keywords
Manoj Kumar Kamila and Sahil Singh Jasrotia
This study aims to analyse the ethical implications associated with the development of artificial intelligence (AI) technologies and to examine the potential ethical ramifications…
Abstract
Purpose
This study aims to analyse the ethical implications associated with the development of artificial intelligence (AI) technologies and to examine the potential ethical ramifications of AI technologies.
Design/methodology/approach
This study undertakes a thorough examination of existing academic literature pertaining to the ethical considerations surrounding AI. Additionally, it conducts in-depth interviews with individuals to explore the potential benefits and drawbacks of AI technology operating as autonomous ethical agents. A total of 20 semi-structured interviews were conducted, and the data were transcribed using grounded theory methodology.
Findings
The study asserts the importance of fostering an ethical environment in the progress of AI and suggests potential avenues for further investigation in the field of AI ethics. The study finds privacy and security, bias and fairness, trust and reliability, transparency and human–AI interactions as major ethical concerns.
Research limitations/implications
The implications of the study are far-reaching and span across various domains, including policy development, design of AI systems, establishment of trust, education and training, public awareness and further research. Notwithstanding the potential biases inherent in purposive sampling, the constantly evolving landscape of AI ethics and the challenge of extrapolating findings to all AI applications and contexts, limitations may still manifest.
Originality/value
The novelty of the study is attributed to its comprehensive methodology, which encompasses a wide range of stakeholder perspectives on the ethical implications of AI in the corporate sector. The ultimate goal is to promote the development of AI systems that exhibit responsibility, transparency and accountability.
Details
Keywords
Neena Sinha, Sanjay Dhingra, Ritu Sehrawat, Varnika Jain and Himanshu Himanshu
The emergence of virtual reality (VR) has the potential to revolutionize various industries, including tourism, as it delivers a simulated environment that closely emulates…
Abstract
Purpose
The emergence of virtual reality (VR) has the potential to revolutionize various industries, including tourism, as it delivers a simulated environment that closely emulates real-life experiences. Therefore, this study aims to explore how the factors, i.e. enjoyment, emotional involvement, flow state, perceived privacy risk, physical risk and cost, influence the customers’ intention to use VR for tourism.
Design/methodology/approach
This study integrates the technology acceptance model, hedonic consumption theory with other factors, including cognitive response, authenticity, perceived privacy risk, perceived physical risk, perceived cost and perceived presence. Partial least squares structural equation modelling approach was used to test the proposed research model.
Findings
The finding based on the sample of 252 respondents revealed that authenticity is the most influential factor impacting behavior intention followed by perceived cost, attitude, cognitive response and enjoyment. Also, the study supported the moderating impact of personal innovativeness between attitude and behavioral intention to use VR for tourism.
Practical implications
The findings of the study offers practical implications for service providers, site managers, destination marketers, tourist organizations and policymaker to develop more effective strategies for offering VR services for tourism.
Originality/value
This study enriches the current understanding of VR adoption in context of tourism with empirical evidences.
Details
Keywords
Muhammad Hassaan, Gang Li and Asif Yaseen
This paper aims to understand the facilitators and inhibitors that might influence customers' adoption of smart banking services (SBS) in Pakistan.
Abstract
Purpose
This paper aims to understand the facilitators and inhibitors that might influence customers' adoption of smart banking services (SBS) in Pakistan.
Design/methodology/approach
Semi-structured interviews were conducted with 33 bank customers in Multan and Lahore using a case study design. Cases were selected using a purposive sampling strategy with maximum variation. A thematic content analysis (TCA) was performed to analyze the qualitative data.
Findings
The findings of this study support the notion that SBS has become a sine qua non of 21st-century banking owing to performance expectancy, effort expectancy, social influence, price value, facilitating conditions, habit and hedonic motivation. However, information privacy concerns and big brother effect impair customers' cognitive, personal and social experiences, creating an obstacle toward SBS adoption.
Research limitations/implications
Studying SBS adoption only in Pakistan represents the perspective of a developing country, which limits the generalizability of the findings.
Practical implications
Pakistani customers' demand for SBS can be linked to its performance. By upgrading technology, banks can improve the usefulness of these services.
Originality/value
The first scholarly inquiry explores the facilitators and inhibitors that could influence the adoption of SBS in Pakistan.
Details