Search results

1 – 10 of 811
Article
Publication date: 9 January 2024

Ananda Dwitha Yuniar

Privacy is a sensitive issue in business because it involves how a platform uses consumer personal data. In terms of consumer rights, personal information needs to be protected in…

Abstract

Purpose

Privacy is a sensitive issue in business because it involves how a platform uses consumer personal data. In terms of consumer rights, personal information needs to be protected in the privacy policy (PP). This study describes several aspects of the PP that consumers need to pay attention to, especially points prone to misuse of personal information.

Design/methodology/approach

This research used a taxonomy of consumer privacy concerns in e-commerce to reveal general and specific privacy concerns. The privacy calculus theory was also applied to explore consumer rationalization using (1) consumer knowledge about PP, (2) subjective perception, and (3) proximity to the PP features. Furthermore, the netnographic approach was used to combine the interrelation between technology and social construction. A sample of 378 young consumers in several major cities in Indonesia participated online and offline. Semi-structured interviews were also conducted to gain more in-depth comprehension.

Findings

The results showed that most young consumers have sufficient basic knowledge of the important points of PP. Furthermore, they tend not to read the PP because it is long and cumbersome, and therefore do not wish to expend much cognitive effort on it.

Originality/value

This study provides several results that can be utilized by policymakers or e-commerce companies to pay more attention to PPs for young groups. In addition, e-commerce companies can increase the knowledge of the privacy situation of Internet users in general.

Peer review

The peer review history for this article is available at: https://publons.com/publon/10.1108/IJSE-11-2022-0740

Details

International Journal of Social Economics, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0306-8293

Keywords

Article
Publication date: 27 March 2024

Haroon Iqbal Maseeh, Charles Jebarajakirthy, Achchuthan Sivapalan, Mitchell Ross and Mehak Rehman

Smartphone apps collect users' personal information, which triggers privacy concerns for app users. Consequently, app users restrict apps from accessing their personal…

86

Abstract

Purpose

Smartphone apps collect users' personal information, which triggers privacy concerns for app users. Consequently, app users restrict apps from accessing their personal information. This may impact the effectiveness of in-app advertising. However, research has not yet demonstrated what factors impact app users' decisions to use apps with restricted permissions. This study is aimed to bridge this gap.

Design/methodology/approach

Using a quantitative research method, the authors collected the data from 384 app users via a structured questionnaire. The data were analysed using AMOS and fuzzy-set qualitative comparative analysis (fsQCA).

Findings

The findings suggest privacy concerns and risks have a significant positive effect on app usage with restricted permissions, whilst reputation, trust and perceived benefits have significant negative impact on it. Some app-related factors, such as the number of apps installed and type of apps, also impact app usage with restricted permissions.

Practical implications

Based on the findings, the authors provided several implications for app stores, app developers and app marketers.

Originality/value

This study examines the factors that influence smartphone users' decisions to use apps with restricted permission requests. By doing this, the authors' study contributes to the consumer behaviour literature in the context of smartphone app usage. Also, by explaining the underlying mechanisms through which the principles of communication privacy management theory operate in smartphone app context, the authors' research contributes to the communication privacy management theory.

Details

Information Technology & People, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0959-3845

Keywords

Article
Publication date: 1 December 2023

Ana Junça Silva and Sara Martins

Although (tele)work is increasingly being adopted and employees’ behavior is recognized to be key for organizational outcomes (e.g. performance), the current literature on…

Abstract

Purpose

Although (tele)work is increasingly being adopted and employees’ behavior is recognized to be key for organizational outcomes (e.g. performance), the current literature on counterproductive work behaviors (CWB) in telework settings is fragmented, and a valid measurement instrument is lacking. This study aims to address this gap and starts by presenting a review of the current literature on counterproductive work behavior in flexible work arrangements (i.e. telework). Based on this study, eight categories of work behavior that appear to be frequent under telework settings were identified.

Design/Methodology

Next, four studies aimed at developing and validating a measurement instrument that captures employee counterproductive work behavior when teleworking: the counterproductive [tele]work behavior scale (CTwBS).

Findings

In Study 1, the CTwBS was created, and in Study 2, its factorial validity was examined (N = 350). In Study 3, using a sample of teleworkers (N = 289), the convergent and discriminant validity of the CTwBS was tested using self-ratings of (positive and negative) affect, attitudes toward telework and frequency of CWB in general. In Study 4, a daily-diary study across five workdays (N = 232 × 5 = 1,160) examined the criterion validity of the CTwBS.

Practical implications

The results indicated that the CTwBS is a valid and reliable instrument for capturing employee counterproductive work behavior in telework settings. Theoretical and practical implications are discussed.

Originality

To the best of the authors’ knowledge, CTwBS is the first measure aimed at assessing counterproductive work behavior in telework settings.

Details

International Journal of Organizational Analysis, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1934-8835

Keywords

Article
Publication date: 19 July 2023

Hamid Reza Nikkhah, Varun Grover and Rajiv Sabherwal

This study aims to argue that user’s continued use behavior is contingent upon two perceptions (i.e. the app and the provider). This study examines the moderating effects of…

Abstract

Purpose

This study aims to argue that user’s continued use behavior is contingent upon two perceptions (i.e. the app and the provider). This study examines the moderating effects of user’s perceptions of apps and providers on the effects of security and privacy concerns and investigate whether assurance mechanisms decrease such concerns.

Design/methodology/approach

This study conducts a scenario-based survey with 694 mobile cloud computing (MCC) app users to understand their perceptions and behaviors.

Findings

This study finds that while perceived value of data transfer to the cloud moderates the effects of security and privacy concerns on continued use behavior, trust only moderates the effect of privacy concerns. This study also finds that perceived effectiveness of security and privacy intervention impacts privacy concerns but does not decrease security concerns.

Originality/value

Prior mobile app studies mainly focused on mobile apps and did not investigate the perceptions of app providers along with app features in the same study. Furthermore, International Organization for Standardization 27018 certification and privacy policy notification are the interventions that exhibit data assurance mechanisms. However, it is unknown whether these interventions are able to decrease users’ security and privacy concerns after using MCC apps.

Details

Information & Computer Security, vol. 32 no. 1
Type: Research Article
ISSN: 2056-4961

Keywords

Article
Publication date: 16 January 2024

Xiaojun Wu, Zhongyun Zhou and Shouming Chen

Artificial intelligence (AI) applications pose a potential threat to users' data security and privacy due to their high data-dependence nature. This paper aims to investigate an…

Abstract

Purpose

Artificial intelligence (AI) applications pose a potential threat to users' data security and privacy due to their high data-dependence nature. This paper aims to investigate an understudied issue in the literature, namely, how users perceive the threat of and decide to use a threatening AI application. In particular, it examines the influencing factors and the mechanisms that affect an individual’s behavioral intention to use facial recognition, a threatening AI.

Design/methodology/approach

The authors develop a research model with trust as the key mediating variable by integrating technology threat avoidance theory, the theory of planned behavior and contextual factors related to facial recognition. Then, it is tested through a sequential mixed-methods investigation, including a qualitative study (for model development) of online comments from various platforms and a quantitative study (for model validation) using field survey data.

Findings

Perceived threat (triggered by perceived susceptibility and severity) and perceived avoidability (promoted by perceived effectiveness, perceived cost and self-efficacy) have negative and positive relationships, respectively, with an individual’s attitude toward facial recognition applications; these relationships are partially mediated by trust. In addition, perceived avoidability is positively related to perceived behavioral control, which along with attitude and subjective norm is positively related to individuals' intentions to use facial recognition applications.

Originality/value

This paper is among the first to examine the factors that affect the acceptance of threatening AI applications and how. The research findings extend the current literature by providing rich and novel insights into the important roles of perceived threat, perceived avoidability, and trust in affecting an individual’s attitude and intention regarding using threatening AI applications.

Details

Internet Research, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1066-2243

Keywords

Article
Publication date: 16 April 2024

Neena Sinha, Sanjay Dhingra, Ritu Sehrawat, Varnika Jain and Himanshu Himanshu

The emergence of virtual reality (VR) has the potential to revolutionize various industries, including tourism, as it delivers a simulated environment that closely emulates…

Abstract

Purpose

The emergence of virtual reality (VR) has the potential to revolutionize various industries, including tourism, as it delivers a simulated environment that closely emulates real-life experiences. Therefore, this study aims to explore how the factors, i.e. enjoyment, emotional involvement, flow state, perceived privacy risk, physical risk and cost, influence the customers’ intention to use VR for tourism.

Design/methodology/approach

This study integrates the technology acceptance model, hedonic consumption theory with other factors, including cognitive response, authenticity, perceived privacy risk, perceived physical risk, perceived cost and perceived presence. Partial least squares structural equation modelling approach was used to test the proposed research model.

Findings

The finding based on the sample of 252 respondents revealed that authenticity is the most influential factor impacting behavior intention followed by perceived cost, attitude, cognitive response and enjoyment. Also, the study supported the moderating impact of personal innovativeness between attitude and behavioral intention to use VR for tourism.

Practical implications

The findings of the study offers practical implications for service providers, site managers, destination marketers, tourist organizations and policymaker to develop more effective strategies for offering VR services for tourism.

Originality/value

This study enriches the current understanding of VR adoption in context of tourism with empirical evidences.

Article
Publication date: 9 November 2023

Issam Tlemsani, Asif Zaman, Mohamed Ashmel Mohamed Hashim and Robin Matthews

This study examines the intersection of emerging Islamic economies and the digital economy in the context of the United Nations sustainable development goals (UN SDGs). This study…

Abstract

Purpose

This study examines the intersection of emerging Islamic economies and the digital economy in the context of the United Nations sustainable development goals (UN SDGs). This study aims to investigate the opportunities, challenges and barriers faced by emerging Islamic economies in the context of the digital economy. It specifically focuses on how these economies can contribute to the achievement of UN SDGs established in 2015. In addition, the study explores the prospects of Islamic digital finance and its potential to facilitate the adoption of the UN SDGs.

Design/methodology/approach

The following components outline the design, methods and approach of this study, identify and select specific UN SDGs that are relevant to the research aims. These selected goals serve as the basis for evaluating the impact of conventional and Islamic digital financial inclusion, gathered data from credible sources such as Bloomberg and Refinitiv Thomson Reuters to support the analysis. These sources provide comprehensive data on global indicators, progress and targets related to the UN SDGs, compare and evaluate the impact of both conventional and Islamic digital financial inclusion strategies on the selected UN SDGs; the study uses qualitative interpretation of the gathered data, which involves identifying patterns, themes and connections within the data to draw meaningful conclusions.

Findings

Results revealed that Islamic digital finance has the potential to contribute significantly to achieving the UN SDGs by promoting financial inclusion, encouraging ethical investments, supporting small and medium enterprises, promoting sustainable investments and leveraging technology to expand access to Islamic financial services and support sustainable investments.

Research limitations/implications

While there are many potential benefits of Islamic digital finance in helping to achieve the UN SDGs, there are also several limitations that should be considered in research, such as limited access to digital infrastructure, regulatory challenges, product offerings, scale, awareness and adoption. Addressing these limitations will be critical to maximizing the potential of Islamic digital finance to contribute to achieving the UN SDGs.

Practical implications

This study points to an important gap in the literature; for practitioners, this study has significant managerial consequences for achieving the UN SDGs in emerging economies by facilitating social impact investments and promoting ethical and sustainable investments.

Originality/value

This study’s uniqueness lies in its exploration of the limited exploration of connecting the implementation of digital financial systems to promote UN SDGs within emerging Islamic economies.

Details

Journal of Islamic Accounting and Business Research, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1759-0817

Keywords

Open Access
Article
Publication date: 1 February 2024

Meenakshi Handa, Ronika Bhalla and Parul Ahuja

Increasing incidents of privacy invasion on social networking sites (SNS) are intensifying the concerns among stakeholders about the misuse of personal data. However, there seems…

Abstract

Purpose

Increasing incidents of privacy invasion on social networking sites (SNS) are intensifying the concerns among stakeholders about the misuse of personal data. However, there seems to be limited research on exploring the impact of specific privacy concerns on users’ intention to engage in various privacy protection behaviors. This study aims to examine the role of social privacy concerns, institutional privacy concerns and privacy self-efficacy as antecedents of privacy protection–related control activities intention among young adults active on SNS.

Design/methodology/approach

Data collected from 284 young adults active on SNS was analyzed through partial least squares structural equation modeling using Smart PLS.

Findings

The results indicate that institutional privacy concerns, social privacy concerns and privacy self-efficacy positively influence the control activities intention of SNS users. The extent of privacy self-efficacy and privacy protection-related control activities intention differs among users based on gender.

Research limitations/implications

This study is limited to a population of young adults in the age group of 18–25 years.

Practical implications

The findings of this study form the basis for specific recommendations addressing the different types of privacy concerns experienced by social media users, promoting responsible privacy control behaviors on online platforms and discouraging the possible misuse of information by third parties.

Originality/value

This study validates a theoretical framework that can contribute to future investigations concerning the use of SNS. The study findings form the basis for a set of practical recommendations for policymakers, SNS platforms and users.

Details

Vilakshan - XIMB Journal of Management, vol. 21 no. 1
Type: Research Article
ISSN: 0973-1954

Keywords

Article
Publication date: 15 November 2022

Ning Wang, Yang Zhao, Ruoxin Zhou and Yixuan Li

Online platforms are providing diversified and personalized services with user information. Users should decide if they should give up parts of information for convenience, with…

Abstract

Purpose

Online platforms are providing diversified and personalized services with user information. Users should decide if they should give up parts of information for convenience, with their information being at the risk of being illegally collected, leaked, spread and misused. This study aims to explore the main factors influencing users' online information disclosure intention from the perspectives of privacy, technology acceptance and trust, and the authors extend previous research with two moderators.

Design/methodology/approach

Based on 48 independent empirical studies, this paper conducted a meta-analysis to synthesize existing results from collected individual studies. This meta-analysis explored the main factors influencing users' online information disclosure intention from the perspectives of privacy, technology acceptance and trust.

Findings

The meta-analysis results based on 48 independent studies revealed that perceived benefit, trust, subjective norm and perceived behavioral control have significant positive effects, while perceived privacy risk and privacy concern have significant negative effects. Moreover, cultural background and platform type moderate the relationship between antecedents and online information disclosure intention.

Originality/value

This paper explored the moderating effects of an individual factor and a platform factor on users' online information disclosure intention. The moderating effect of cultural differences is examined with Hofstede's dimensions, and the moderating role of the purpose of online information disclosure is examined with platform type. This study extends online information disclosure literature with a multi-perspective meta-analysis and provides guidelines for practitioners.

Details

Aslib Journal of Information Management, vol. 75 no. 6
Type: Research Article
ISSN: 2050-3806

Keywords

Article
Publication date: 5 April 2024

Jawahitha Sarabdeen and Mohamed Mazahir Mohamed Ishak

General Data Protection Regulation (GDPR) of the European Union (EU) was passed to protect data privacy. Though the GDPR intended to address issues related to data privacy in the…

Abstract

Purpose

General Data Protection Regulation (GDPR) of the European Union (EU) was passed to protect data privacy. Though the GDPR intended to address issues related to data privacy in the EU, it created an extra-territorial effect through Articles 3, 45 and 46. Extra-territorial effect refers to the application or the effect of local laws and regulations in another country. Lawmakers around the globe passed or intensified their efforts to pass laws to have personal data privacy covered so that they meet the adequacy requirement under Articles 45–46 of GDPR while providing comprehensive legislation locally. This study aims to analyze the Malaysian and Saudi Arabian legislation on health data privacy and their adequacy in meeting GDPR data privacy protection requirements.

Design/methodology/approach

The research used a systematic literature review, legal content analysis and comparative analysis to critically analyze the health data protection in Malaysia and Saudi Arabia in comparison with GDPR and to see the adequacy of health data protection that could meet the requirement of EU data transfer requirement.

Findings

The finding suggested that the private sector is better regulated in Malaysia than the public sector. Saudi Arabia has some general laws to cover health data privacy in both public and private sector organizations until the newly passed data protection law is implemented in 2024. The finding also suggested that the Personal Data Protection Act 2010 of Malaysia and the Personal Data Protection Law 2022 of Saudi Arabia could be considered “adequate” under GDPR.

Originality/value

The research would be able to identify the key principles that could identify the adequacy of the laws about health data in Malaysia and Saudi Arabia as there is a dearth of literature in this area. This will help to propose suggestions to improve the laws concerning health data protection so that various stakeholders can benefit from it.

Details

International Journal of Law and Management, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1754-243X

Keywords

1 – 10 of 811