Search results

1 – 10 of over 22000
Article
Publication date: 15 November 2022

Ning Wang, Yang Zhao, Ruoxin Zhou and Yixuan Li

Online platforms are providing diversified and personalized services with user information. Users should decide if they should give up parts of information for…

Abstract

Purpose

Online platforms are providing diversified and personalized services with user information. Users should decide if they should give up parts of information for convenience, with their information being at the risk of being illegally collected, leaked, spread and misused. This study aims to explore the main factors influencing users' online information disclosure intention from the perspectives of privacy, technology acceptance and trust, and the authors extend previous research with two moderators.

Design/methodology/approach

Based on 48 independent empirical studies, this paper conducted a meta-analysis to synthesize existing results from collected individual studies. This meta-analysis explored the main factors influencing users' online information disclosure intention from the perspectives of privacy, technology acceptance and trust.

Findings

The meta-analysis results based on 48 independent studies revealed that perceived benefit, trust, subjective norm and perceived behavioral control have significant positive effects, while perceived privacy risk and privacy concern have significant negative effects. Moreover, cultural background and platform type moderate the relationship between antecedents and online information disclosure intention.

Originality/value

This paper explored the moderating effects of an individual factor and a platform factor on users' online information disclosure intention. The moderating effect of cultural differences is examined with Hofstede's dimensions, and the moderating role of the purpose of online information disclosure is examined with platform type. This study extends online information disclosure literature with a multi-perspective meta-analysis and provides guidelines for practitioners.

Details

Aslib Journal of Information Management, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2050-3806

Keywords

Article
Publication date: 21 April 2022

Gaohui Cao and Ping Wang

Based on communication privacy management (CPM) theory, this study aimed to explore how gender and age criteria, motivational criterion (locatability), benefit-risk ratio…

Abstract

Purpose

Based on communication privacy management (CPM) theory, this study aimed to explore how gender and age criteria, motivational criterion (locatability), benefit-risk ratio criteria (perceived benefits of privacy information disclosure and privacy concerns), contextual criteria (privacy experience) and boundary coordination and turbulence (perceived effectiveness of privacy policy) interact and combine in leading to voice assistant (VA) users' intention to reveal or conceal their privacy information.

Design/methodology/approach

A questionnaire was designed and distributed to car drivers who have intelligent VA use experience while driving. A total of 230 valid responses were collected. The fuzzy-set qualitative comparative analysis (fsQCA) approach was used to analyse the data.

Findings

Via configuration analysis with fsQCA, five equivalent configurations leading to the high intention of disclosing privacy information, and one configuration leading to the intention of concealing privacy information were identified. Four theoretical configurational propositions were proposed. Moreover, the theoretical and practical implications of the findings are discussed.

Originality/value

This study offers some insightful implications in the field of private information communication in artificial intelligence applications as well as practical implications for intelligent VA application design. The findings provide empirical evidence of privacy communication management in the context of smart VA usage.

Article
Publication date: 4 February 2022

Emmanuel W. Ayaburi

The study aims to empirically understand individuals' tendency to disclose private information online following different forms of data breach (i.e. reversible and…

Abstract

Purpose

The study aims to empirically understand individuals' tendency to disclose private information online following different forms of data breach (i.e. reversible and irreversible victimization).

Design/methodology/approach

Survey methodology is applied to measure the perception of victims of data breaches on key indicators of information disclosure.

Findings

Analysis of responses from 309 victims of data breaches show that while victims' irreversible data breach victimization experience influences both dimensions of privacy concerns, reversible data breach victimization experiences influenced only peer privacy concerns (PPCs). Furthermore, only institutional privacy concerns impacted online disclosure and fully mediate the relationship between victimization experience and online disclosure.

Research limitations/implications

The findings contribute to the privacy literature by expanding the dimension of victimization and considering their differential effect on privacy concerns. Additionally, the study uncovers the efficacy of privacy dimension on privacy recalibration following a data breach announcement.

Practical implications

For practice, the results provide insights for managers on how to manage customer restitution after a data breach. Management of the process of privacy recalibration should not be homogenous but be based on degree of consequence.

Social implications

This research provides deeper understanding of how the ascendancy of privacy breaches affect privacy management. The findings illuminate why the increasing trend in online activities is observed.

Originality/value

The study is the first to identify two dimensions of data breach victimization experience based on the breach level index (BLI). The two dimensions of victimization (i.e. reversible and irreversible privacy victimizations) were used to understand individuals' tendency to disclose private information online.

Details

Information Technology & People, vol. 36 no. 1
Type: Research Article
ISSN: 0959-3845

Keywords

Article
Publication date: 18 May 2021

Paulus Swartz, Adele Da Veiga and Nico Martins

This study aims to conduct a survey in a bank to measure the perception of employees towards the effective governance of information privacy and at the same time…

Abstract

Purpose

This study aims to conduct a survey in a bank to measure the perception of employees towards the effective governance of information privacy and at the same time validating the information privacy governance questionnaire (IPGQ) used in this study.

Design/methodology/approach

A quantitative research approach was followed using an online survey questionnaire to collect data in a bank in South Africa.

Findings

The survey results showed that employees perceived the governance of privacy in the organisation in a positive way. Three significant differences were identified, namely, Generation-Y being significantly more positive than Generation-X regarding privacy control assessment. Also, that the contractor/vendor group was significantly more positive than permanent employees regarding organisational commitment and privacy control assessment. Exploratory factor analysis was used to validate the IPGQ and four factors were identified: privacy control assessment, personal information awareness assessment, privacy governance reporting and organisational commitment towards privacy. Cronbach’s alpha was used to establish the internal reliability of the factors and indicated good internal consistency.

Research limitations/implications

One of the potential empirical research limitations for this study is that the study was conducted in a single organisation; therefore, when generalising the results, caution must be taken.

Practical implications

Organisations, academics and the industry may find the questionnaire useful to determine employee perception towards privacy governance and to identify recommendations that could be used to improve their privacy policies, privacy programme controls and organisational commitment towards privacy. In this study, it was identified that for Generation-X employees to be more accepting towards the privacy controls, the organisation needs to implement focussed awareness training for them. To ensure permanent employees’ commitment and accountability, internal audits, monitoring and risk assessment measures need to be implemented. These can be directed through the outcomes of the survey.

Originality/value

The IPGQ can aid organisations in determining if they are governing privacy effectively, and thus assist them in meeting the accountability condition of data protection regulation.

Article
Publication date: 16 November 2021

Zhou Cheng, Kai Li and Ching-I Teng

Push notification service (PNS) is an important approach to distribute personalized information to users timely and is getting more and more popular. However, users'…

Abstract

Purpose

Push notification service (PNS) is an important approach to distribute personalized information to users timely and is getting more and more popular. However, users' privacy concerns are a major inhibiting factor in their continuance usage of PNS. This study investigates the effect of privacy protection functions provided by PNS sites in enhancing users' perceived fairness on the basis of justice theory to mitigate users' concerns of information privacy. The mechanism underlying such influence on users' continuance usage of PNS comprises privacy concern and privacy-control self-efficacy.

Design/methodology/approach

Four scenario-based surveys are conducted to test the proposed hypotheses. The authors test the research model with a sample of 360 participants by ANOVA and PLS.

Findings

Results show that the proposed privacy protection functions have direct positive effects on users' privacy-control self-efficacy, negative effects on privacy concern and indirectly affect their continuance usage of PNS. Furthermore, the interaction effects between two approaches have different impacts on users' privacy concern and privacy-control self-efficacy.

Originality/value

This study provides some suggestions and guidance for PNS providers to design effective privacy protection technologies.

Details

Aslib Journal of Information Management, vol. 74 no. 2
Type: Research Article
ISSN: 2050-3806

Keywords

Article
Publication date: 9 September 2021

Hamid Reza Nikkhah and Rajiv Sabherwal

In this research, the authors focus on mobile cloud computing (MCC) collaboration apps that are multiplatform and send the users’ data to the cloud. Despite their…

Abstract

Purpose

In this research, the authors focus on mobile cloud computing (MCC) collaboration apps that are multiplatform and send the users’ data to the cloud. Despite their benefits, MCC collaboration apps raise privacy concerns, as the users’ information is sent to the cloud where users lack direct control. This study aims to investigate why users disclose information to MCC apps despite privacy concerns and examine the effect of security and assurance mechanisms (i.e. privacy policies and ISO/IEC 27018 certification) on users’ perceptions and information disclosure. Based on three surveys conducted in 2016 (n = 515), 2017 (n = 505) and 2018 (n = 543), this study finds mixed results regarding the relationships among security, assurance mechanisms, utilitarian benefits and information disclosure.

Design/methodology/approach

This study conducted three scenario-based surveys in the USA in 2016 (n = 515), 2017 (n = 505) and 2018 (n = 543).

Findings

This study finds mixed results of relationships among security, assurance mechanisms, utilitarian benefit and information disclosure.

Originality/value

With proliferation of MCC apps, the investigation of how users make privacy decision to disclose personal information to these apps is sparse. This study, for the first time, investigates whether the signals of assurance mechanism decrease users’ privacy concerns. This study also examines the interplay between security and privacy within information disclosure behavior. Finally, this study was conducted in 3 years to enhance the generalizability and robustness of findings.

Details

Information Technology & People, vol. 35 no. 7
Type: Research Article
ISSN: 0959-3845

Keywords

Article
Publication date: 29 September 2021

Zongda Wu, Shigen Shen, Huxiong Li, Haiping Zhou and Dongdong Zou

First, the authors analyze the key problems faced by the protection of digital library readers' data privacy and behavior privacy. Second, the authors introduce the…

Abstract

Purpose

First, the authors analyze the key problems faced by the protection of digital library readers' data privacy and behavior privacy. Second, the authors introduce the characteristics of all kinds of existing approaches to privacy protection and their application limitations in the protection of readers' data privacy and behavior privacy. Lastly, the authors compare the advantages and disadvantages of each kind of existing approaches in terms of security, efficiency, accuracy and practicality and analyze the challenges faced by the protection of digital library reader privacy.

Design/methodology/approach

In this paper, the authors review a number of research achievements relevant to privacy protection and analyze and evaluate the application limitations of them in the reader privacy protection of a digital library, consequently, establishing the constraints that an ideal approach to library reader privacy protection should meet, so as to provide references for the follow-up research of the problem.

Findings

As a result, the authors conclude that an ideal approach to reader privacy protection should be able to comprehensively improve the security of all kinds of readers' privacy information on the untrusted server-side as a whole, under the premise of not changing the architecture, efficiency, accuracy and practicality of a digital library system.

Originality/value

Along with the rapid development of new network technologies, such as cloud computing, the server-side of a digital library is becoming more and more untrustworthy, thereby, posing a serious threat to the privacy of library readers. In fact, the problem of reader privacy has become one of the important obstacles to the further development and application of digital libraries.

Details

Library Hi Tech, vol. 40 no. 6
Type: Research Article
ISSN: 0737-8831

Keywords

Article
Publication date: 27 December 2021

Jung-Kuei Hsieh and Hsiang-Tzu Li

With the popularity of mobile applications and increasing consumer awareness of application privacy, this paper aims to introduce a new construct of service-privacy fit…

359

Abstract

Purpose

With the popularity of mobile applications and increasing consumer awareness of application privacy, this paper aims to introduce a new construct of service-privacy fit (i.e. the perceived degree of match between the service of a mobile application and a privacy permission request) to predict consumers’ mobile application adoption.

Design/methodology/approach

Four experiments were carried out to test the hypothesized relationships. The first study investigated the direct impact of service-privacy fit on application adoption and the mediators of benefit expectancy and privacy concerns. The second, third and fourth studies further applied the moderated mediation model to analyze the moderating roles of benefit message type, regulatory focus type and privacy assurance.

Findings

The results show that service-privacy fit influences application adoption not only directly but also indirectly via the mediators of benefit expectancy and privacy concerns. Furthermore, the findings confirm the moderators of benefit message type, regulatory focus type and privacy assurance.

Originality/value

Drawn from the perspectives of task-technology fit and information boundary theory, this paper introduces a new construct of service-privacy fit as a determinant of application adoption. Grounded in privacy calculus theory, it further explains this relationship through mediating effects of benefit expectancy and privacy concerns. Furthermore, this paper proposes that benefit messages and privacy assurance are effective coping strategies to increase the benefit expectancy and reduce the privacy concerns of applications. Based on the perspective of regulatory fit theory, this study further shows that the effects of coping strategies rely on personal traits. The findings enrich the existing knowledge of mobile application adoption and application privacy, suggesting that practitioners should consider mobile consumers’ perception of service-privacy fit when developing applications.

Article
Publication date: 16 March 2015

Jennifer Fries Taylor, Jodie Ferguson and Pamela Scholder Ellen

The purpose of this paper is to advance our understanding of how information privacy concerns are derived from the combination effects of individual traits, compound…

2343

Abstract

Purpose

The purpose of this paper is to advance our understanding of how information privacy concerns are derived from the combination effects of individual traits, compound traits, situational traits and surface traits that ultimately influence the consumer’s attitude toward data collection programs. The study investigates a hierarchical model of individual traits, information privacy orientation and consumer privacy concerns.

Design/methodology/approach

The empirical research utilizes structural equation modeling to analyze the responses from 964 respondents.

Findings

The results suggest that consumer attitudes toward data collection programs associated with personal shopping information (e.g. retail loyalty card programs) are determined through a hierarchical model of personal traits and contextual-dependent variables. Specifically, the authors find that the compound traits of risk orientation and need for cognition influence the situational trait of information privacy orientation which leads to the surface trait of consumer privacy concern and ultimately attitude toward the information collection program.

Practical implications

The results suggest several means to increase participation in data collection programs. Although high need for cognition and high risk orientation cannot be changed, communication plans can provide guarantees that mitigate perceived risk associated with sharing personal information and highlight the information value to the individual’s sharing of information.

Originality/value

While previous research focuses on either the internal traits or external traits, this research contributes to the current literature by offering insights into how privacy evolves from more abstract personality traits to more situational-specific behavioral tendencies, which then influence attitudes and behavior.

Details

Journal of Consumer Marketing, vol. 32 no. 2
Type: Research Article
ISSN: 0736-3761

Keywords

Article
Publication date: 3 April 2009

Maria Karyda, Stefanos Gritzalis, Jong Hyuk Park and Spyros Kokolakis

This paper aims to contribute to the ongoing discourse about the nature of privacy and its role in ubiquitous environments and provide insights for future research.

1396

Abstract

Purpose

This paper aims to contribute to the ongoing discourse about the nature of privacy and its role in ubiquitous environments and provide insights for future research.

Design/methodology/approach

The paper analyses the privacy implications of particular characteristics of ubiquitous applications and discusses the fundamental principles and information practices used in digital environments for protecting individuals' private data.

Findings

A significant trend towards shifting privacy protection responsibility from government to the individuals is identified. Also, specific directions for future research are provided with a focus on interdisciplinary research.

Research limitations/implications

This paper identifies key research issues and provides directions for future research.

Originality/value

This study contributes by identifying major challenges that should be addressed, so that a set of “fair information principles” can be applied in the context of ubiquitous environments. It also discusses the limitations of these principles and provides recommendations for future research.

Details

Internet Research, vol. 19 no. 2
Type: Research Article
ISSN: 1066-2243

Keywords

1 – 10 of over 22000