Search results

1 – 10 of over 19000
To view the access options for this content please click here
Article
Publication date: 16 November 2021

Zhou Cheng, Kai Li and Ching-I Teng

Push notification service (PNS) is an important approach to distribute personalized information to users timely and is getting more and more popular. However, users'…

Abstract

Purpose

Push notification service (PNS) is an important approach to distribute personalized information to users timely and is getting more and more popular. However, users' privacy concerns are a major inhibiting factor in their continuance usage of PNS. This study investigates the effect of privacy protection functions provided by PNS sites in enhancing users' perceived fairness on the basis of justice theory to mitigate users' concerns of information privacy. The mechanism underlying such influence on users' continuance usage of PNS comprises privacy concern and privacy-control self-efficacy.

Design/methodology/approach

Four scenario-based surveys are conducted to test the proposed hypotheses. The authors test the research model with a sample of 360 participants by ANOVA and PLS.

Findings

Results show that the proposed privacy protection functions have direct positive effects on users' privacy-control self-efficacy, negative effects on privacy concern and indirectly affect their continuance usage of PNS. Furthermore, the interaction effects between two approaches have different impacts on users' privacy concern and privacy-control self-efficacy.

Originality/value

This study provides some suggestions and guidance for PNS providers to design effective privacy protection technologies.

Details

Aslib Journal of Information Management, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2050-3806

Keywords

To view the access options for this content please click here
Article
Publication date: 9 September 2021

Hamid Reza Nikkhah and Rajiv Sabherwal

In this research, the authors focus on mobile cloud computing (MCC) collaboration apps that are multiplatform and send the users’ data to the cloud. Despite their…

Abstract

Purpose

In this research, the authors focus on mobile cloud computing (MCC) collaboration apps that are multiplatform and send the users’ data to the cloud. Despite their benefits, MCC collaboration apps raise privacy concerns, as the users’ information is sent to the cloud where users lack direct control. This study aims to investigate why users disclose information to MCC apps despite privacy concerns and examine the effect of security and assurance mechanisms (i.e. privacy policies and ISO/IEC 27018 certification) on users’ perceptions and information disclosure. Based on three surveys conducted in 2016 (n = 515), 2017 (n = 505) and 2018 (n = 543), this study finds mixed results regarding the relationships among security, assurance mechanisms, utilitarian benefits and information disclosure.

Design/methodology/approach

This study conducted three scenario-based surveys in the USA in 2016 (n = 515), 2017 (n = 505) and 2018 (n = 543).

Findings

This study finds mixed results of relationships among security, assurance mechanisms, utilitarian benefit and information disclosure.

Originality/value

With proliferation of MCC apps, the investigation of how users make privacy decision to disclose personal information to these apps is sparse. This study, for the first time, investigates whether the signals of assurance mechanism decrease users’ privacy concerns. This study also examines the interplay between security and privacy within information disclosure behavior. Finally, this study was conducted in 3 years to enhance the generalizability and robustness of findings.

Details

Information Technology & People, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0959-3845

Keywords

To view the access options for this content please click here
Article
Publication date: 29 September 2021

Zongda Wu, Shigen Shen, Huxiong Li, Haiping Zhou and Dongdong Zou

First, the authors analyze the key problems faced by the protection of digital library readers' data privacy and behavior privacy. Second, the authors introduce the…

Abstract

Purpose

First, the authors analyze the key problems faced by the protection of digital library readers' data privacy and behavior privacy. Second, the authors introduce the characteristics of all kinds of existing approaches to privacy protection and their application limitations in the protection of readers' data privacy and behavior privacy. Lastly, the authors compare the advantages and disadvantages of each kind of existing approaches in terms of security, efficiency, accuracy and practicality and analyze the challenges faced by the protection of digital library reader privacy.

Design/methodology/approach

In this paper, the authors review a number of research achievements relevant to privacy protection and analyze and evaluate the application limitations of them in the reader privacy protection of a digital library, consequently, establishing the constraints that an ideal approach to library reader privacy protection should meet, so as to provide references for the follow-up research of the problem.

Findings

As a result, the authors conclude that an ideal approach to reader privacy protection should be able to comprehensively improve the security of all kinds of readers' privacy information on the untrusted server-side as a whole, under the premise of not changing the architecture, efficiency, accuracy and practicality of a digital library system.

Originality/value

Along with the rapid development of new network technologies, such as cloud computing, the server-side of a digital library is becoming more and more untrustworthy, thereby, posing a serious threat to the privacy of library readers. In fact, the problem of reader privacy has become one of the important obstacles to the further development and application of digital libraries.

Details

Library Hi Tech, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0737-8831

Keywords

To view the access options for this content please click here
Article
Publication date: 18 May 2021

Paulus Swartz, Adele Da Veiga and Nico Martins

This study aims to conduct a survey in a bank to measure the perception of employees towards the effective governance of information privacy and at the same time…

Abstract

Purpose

This study aims to conduct a survey in a bank to measure the perception of employees towards the effective governance of information privacy and at the same time validating the information privacy governance questionnaire (IPGQ) used in this study.

Design/methodology/approach

A quantitative research approach was followed using an online survey questionnaire to collect data in a bank in South Africa.

Findings

The survey results showed that employees perceived the governance of privacy in the organisation in a positive way. Three significant differences were identified, namely, Generation-Y being significantly more positive than Generation-X regarding privacy control assessment. Also, that the contractor/vendor group was significantly more positive than permanent employees regarding organisational commitment and privacy control assessment. Exploratory factor analysis was used to validate the IPGQ and four factors were identified: privacy control assessment, personal information awareness assessment, privacy governance reporting and organisational commitment towards privacy. Cronbach’s alpha was used to establish the internal reliability of the factors and indicated good internal consistency.

Research limitations/implications

One of the potential empirical research limitations for this study is that the study was conducted in a single organisation; therefore, when generalising the results, caution must be taken.

Practical implications

Organisations, academics and the industry may find the questionnaire useful to determine employee perception towards privacy governance and to identify recommendations that could be used to improve their privacy policies, privacy programme controls and organisational commitment towards privacy. In this study, it was identified that for Generation-X employees to be more accepting towards the privacy controls, the organisation needs to implement focussed awareness training for them. To ensure permanent employees’ commitment and accountability, internal audits, monitoring and risk assessment measures need to be implemented. These can be directed through the outcomes of the survey.

Originality/value

The IPGQ can aid organisations in determining if they are governing privacy effectively, and thus assist them in meeting the accountability condition of data protection regulation.

Content available
Article
Publication date: 8 January 2021

Dillip Kumar Rath and Ajit Kumar

In today’s digitized environment, information privacy has become a prime concern for everybody. The purpose of this paper is to provide an understanding of information

Downloads
1951

Abstract

Purpose

In today’s digitized environment, information privacy has become a prime concern for everybody. The purpose of this paper is to provide an understanding of information privacy concern arising because of the application of computer-based information system in the various domains (E-Governance, E-Commerce, E-Health, E-Banking and E-Finance), and at different levels, i.e. individual, group, organizational and societal.

Design/methodology/approach

The authors performed an in-depth analysis of different research articles related to information privacy concerns and elements affecting those at certain level of applications. The primary sources of literature were articles retrieved from online databases. Various online journal and scholarly articles were searched in detail to locate information privacy-related articles.

Findings

The authors have carried out a detailed literature review to identify the different levels where the privacy is a big challenging task. This paper provides insights whether information privacy concern may obstruct in the successful dispersal and adoption of different applications in various application domains. Consumers’ attitude towards information privacy concerns have enlightened and addressed at individual levels in numerous domains. Privacy concerns at the individual level, as suggested by our analysis, seem to have been sufficiently addressed or addressed. However, information privacy concerns at other levels – group, organizational and societal levels – need the attention of researchers.

Originality/value

In this paper, the authors have posited that it will help the researchers to more focus at group level privacy perspective in the information privacy era.

Details

Vilakshan - XIMB Journal of Management, vol. 18 no. 2
Type: Research Article
ISSN: 0973-1954

Keywords

To view the access options for this content please click here
Article
Publication date: 11 December 2020

Aylin Ilhan and Kaja J. Fietkiewicz

This investigation aims to examine the differences and similarities between activity tracking technology users from two regions (the USA and Germany) in their intended…

Abstract

Purpose

This investigation aims to examine the differences and similarities between activity tracking technology users from two regions (the USA and Germany) in their intended privacy-related behavior. The focus lies on data handling after hypothetical discontinuance of use, data protection and privacy policy seeking, and privacy concerns.

Design/methodology/approach

The data was collected through an online survey in 2019. In order to identify significant differences between participants from Germany and the USA, the chi-squared test and the Mann–Whitney U test were applied.

Findings

The intensity of several privacy-related concerns was significantly different between the two groups. The majority of the participants did not inform themselves about the respective data privacy policies or terms and conditions before installing an activity tracking application. The majority of the German participants knew that they could request the deletion of all their collected data. In contrast, only 35% out of 68 participants from the US knew about this option.

Research limitations/implications

This study intends to raise awareness about managing the collected health and fitness data after stopping to use activity tracking technologies. Furthermore, to reduce privacy and security concerns, the involvement of the government, companies and users is necessary to handle and share data more considerably and in a sustainable way.

Originality/value

This study sheds light on users of activity tracking technologies from a broad perspective (here, participants from the USA and Germany). It incorporates not only concerns and the privacy paradox but (intended) user behavior, including seeking information on data protection and privacy policy and handling data after hypothetical discontinuance of use of the technology.

Details

Aslib Journal of Information Management, vol. 73 no. 2
Type: Research Article
ISSN: 2050-3806

Keywords

To view the access options for this content please click here
Article
Publication date: 24 February 2020

Pouyan Esmaeilzadeh

Health information exchange (HIE) initiatives utilize sharing mechanisms through which health information is mostly transmitted without a patient's close supervision;…

Abstract

Purpose

Health information exchange (HIE) initiatives utilize sharing mechanisms through which health information is mostly transmitted without a patient's close supervision; thus, patient trust in the HIE is the core in this setting. Existing technology acceptance theories mainly consider cognitive beliefs resulting in adoption behavior. The study argues that existing theories should be expanded to cover not only cognitive beliefs but also the emotion provoked by the sharing nature of the technology. Based on the theory of reasoned action, the technology adoption literature, and the trust literature, we theoretically explain and empirically test the impact of perceived transparency of privacy policy on cognitive trust and emotional trust in HIEs. Moreover, the study analyzes the effects of cognitive trust and emotional trust on the intention to opt in to HIEs and willingness to disclose health information.

Design/methodology/approach

An online survey was conducted using data from individuals who were aware of HIEs through experience with at least one provider participating in an HIE network. Data were collected from a wide range of adult population groups in the United States.

Findings

The structural equation modeling analysis results provide empirical support for the proposed model. The model highlights the strategic role of the perceived transparency of the privacy policy in building trust in HIEs. When patients know more about HIE security measures, sharing procedures, and privacy terms, they feel more in control, more assured, and less at risk. The results also show that patient trust in HIEs may take the forms of intention to opt in to an HIE and willingness to disclose health information exchanged through HIE networks.

Originality/value

The findings of this study should be of interest to both academics and practitioners. The research highlights the importance of developing and using a transparent privacy policy in the diffusion of HIEs. The findings provide a deep understanding of dimensions of HIE privacy policy that should be addressed by health-care organizations to exchange personal health information in a secure and private manner.

To view the access options for this content please click here
Article
Publication date: 6 July 2020

Xiaogang Chen and Yuhui Zhang

The significant cultural difference between China and Western countries, primarily the USA, suggests that it is necessary for researchers to take an emic approach to…

Abstract

Purpose

The significant cultural difference between China and Western countries, primarily the USA, suggests that it is necessary for researchers to take an emic approach to understand how the concept of privacy concerns is interpreted from the perspective of people from within the Chinese culture. However, all privacy concerns studies in the Chinese context have virtually adopted an etic approach. Therefore, this study aims to answer the following questions: What dimensions do privacy concerns encompass in the Chinese cultural context? What are the structural relationships among these dimensions? The authors answer these questions by conducting a mixed method research.

Design/methodology/approach

The authors first content analyzed Chinese news reports about information privacy and found that trading, management and awareness are relevant dimensions of privacy concerns. Further, the authors validated the three dimensions by surveying 185 Chinese consumers.

Findings

The data showed that Chinese consumers’ privacy concerns have a second-order factor structure, where the trading, management and awareness dimensions are first-order factors.

Originality/value

The results of this research contribute to the literature by developing the construct of privacy concerns that fits the context of Chinese culture and also point out possible managerial practices to mitigate Chinese consumers’ privacy concerns.

Details

Nankai Business Review International, vol. 12 no. 1
Type: Research Article
ISSN: 2040-8749

Keywords

To view the access options for this content please click here
Article
Publication date: 16 March 2015

Jennifer Fries Taylor, Jodie Ferguson and Pamela Scholder Ellen

The purpose of this paper is to advance our understanding of how information privacy concerns are derived from the combination effects of individual traits, compound…

Downloads
2195

Abstract

Purpose

The purpose of this paper is to advance our understanding of how information privacy concerns are derived from the combination effects of individual traits, compound traits, situational traits and surface traits that ultimately influence the consumer’s attitude toward data collection programs. The study investigates a hierarchical model of individual traits, information privacy orientation and consumer privacy concerns.

Design/methodology/approach

The empirical research utilizes structural equation modeling to analyze the responses from 964 respondents.

Findings

The results suggest that consumer attitudes toward data collection programs associated with personal shopping information (e.g. retail loyalty card programs) are determined through a hierarchical model of personal traits and contextual-dependent variables. Specifically, the authors find that the compound traits of risk orientation and need for cognition influence the situational trait of information privacy orientation which leads to the surface trait of consumer privacy concern and ultimately attitude toward the information collection program.

Practical implications

The results suggest several means to increase participation in data collection programs. Although high need for cognition and high risk orientation cannot be changed, communication plans can provide guarantees that mitigate perceived risk associated with sharing personal information and highlight the information value to the individual’s sharing of information.

Originality/value

While previous research focuses on either the internal traits or external traits, this research contributes to the current literature by offering insights into how privacy evolves from more abstract personality traits to more situational-specific behavioral tendencies, which then influence attitudes and behavior.

Details

Journal of Consumer Marketing, vol. 32 no. 2
Type: Research Article
ISSN: 0736-3761

Keywords

To view the access options for this content please click here
Article
Publication date: 3 April 2009

Maria Karyda, Stefanos Gritzalis, Jong Hyuk Park and Spyros Kokolakis

This paper aims to contribute to the ongoing discourse about the nature of privacy and its role in ubiquitous environments and provide insights for future research.

Downloads
1309

Abstract

Purpose

This paper aims to contribute to the ongoing discourse about the nature of privacy and its role in ubiquitous environments and provide insights for future research.

Design/methodology/approach

The paper analyses the privacy implications of particular characteristics of ubiquitous applications and discusses the fundamental principles and information practices used in digital environments for protecting individuals' private data.

Findings

A significant trend towards shifting privacy protection responsibility from government to the individuals is identified. Also, specific directions for future research are provided with a focus on interdisciplinary research.

Research limitations/implications

This paper identifies key research issues and provides directions for future research.

Originality/value

This study contributes by identifying major challenges that should be addressed, so that a set of “fair information principles” can be applied in the context of ubiquitous environments. It also discusses the limitations of these principles and provides recommendations for future research.

Details

Internet Research, vol. 19 no. 2
Type: Research Article
ISSN: 1066-2243

Keywords

1 – 10 of over 19000