Search results
1 – 10 of over 3000The concept and practice of e-services has become essential in business transactions. Yet there are still many organizations that have not developed e-services optimally. This is…
Abstract
The concept and practice of e-services has become essential in business transactions. Yet there are still many organizations that have not developed e-services optimally. This is especially relevant in the context of Indonesian Airline companies. Therefore, many airline customers in Indonesia are still in doubt about it, or even do not use it. To fill this gap, this study attempts to develop a model for e-services adoption and empirically examines the factors influencing the airlines customers in Indonesia in using e-services offered by the Indonesian airline companies. Taking six Indonesian airline companies as a case example, the study investigated the antecedents of e-services usage of Indonesian airlines. This study further examined the impacts of motivation on customers in using e-services in the Indonesian context. Another important aim of this study was to investigate how ages, experiences and geographical areas moderate effects of e-services usage.
The study adopts a positivist research paradigm with a two-phase sequential mixed method design involving qualitative and quantitative approaches. An initial research model was first developed based on an extensive literature review, by combining acceptance and use of information technology theories, expectancy theory and the inter-organizational system motivation models. A qualitative field study via semi-structured interviews was then conducted to explore the present state among 15 respondents. The results of the interviews were analysed using content analysis yielding the final model of e-services usage. Eighteen antecedent factors hypotheses and three moderating factors hypotheses and 52-item questionnaire were developed. A focus group discussion of five respondents and a pilot study of 59 respondents resulted in final version of the questionnaire.
In the second phase, the main survey was conducted nationally to collect the research data among Indonesian airline customers who had already used Indonesian airline e-services. A total of 819 valid questionnaires were obtained. The data was then analysed using a partial least square (PLS) based structural equation modelling (SEM) technique to produce the contributions of links in the e-services model (22% of all the variances in e-services usage, 37.8% in intention to use, 46.6% in motivation, 39.2% in outcome expectancy, and 37.7% in effort expectancy). Meanwhile, path coefficients and t-values demonstrated various different influences of antecedent factors towards e-services usage. Additionally, a multi-group analysis based on PLS is employed with mixed results. In the final findings, 14 hypotheses were supported and 7 hypotheses were not supported.
The major findings of this study have confirmed that motivation has the strongest contribution in e-services usage. In addition, motivation affects e-services usage both directly and indirectly through intention-to-use. This study provides contributions to the existing knowledge of e-services models, and practical applications of IT usage. Most importantly, an understanding of antecedents of e-services adoption will provide guidelines for stakeholders in developing better e-services and strategies in order to promote and encourage more customers to use e-services. Finally, the accomplishment of this study can be expanded through possible adaptations in other industries and other geographical contexts.
Details
Keywords
The received wisdom underlying many guides to ethical research is that information is private, and research is consequently seen as a trespass on the private sphere. Privacy…
Abstract
The received wisdom underlying many guides to ethical research is that information is private, and research is consequently seen as a trespass on the private sphere. Privacy demands control; control requires consent; consent protects privacy. This is not wrong in every case, but it is over-generalised. The distorted perspective leads to some striking misinterpretations of the rights of research participants, and the duties of researchers. Privacy is not the same thing as data protection; consent is not adequate as a defence of privacy; seeking consent is not always required or appropriate. Beyond that, the misinterpretation can lead to conduct which is unethical, limiting the scope of research activity, obstructing the flow of information in a free society, and failing to recognise what researchers’ real duties are.
Details
Keywords
Bradley J. Alge, Jerald Greenberg and Chad T. Brinsfield
We present a model of organizational monitoring that integrates organizational justice and information privacy. Specifically, we adopt the position that the formation of…
Abstract
We present a model of organizational monitoring that integrates organizational justice and information privacy. Specifically, we adopt the position that the formation of invasiveness and unfairness attitudes is a goal-driven process. We employ cybernetic control theory and identity theory to describe how monitoring systems affect one's ability to maintain a positive self-concept. Monitoring provides a particularly powerful cue that directs attention to self-awareness. People draw on fairness and privacy relevant cues inherent in monitoring systems and embedded in monitoring environments (e.g., justice climate) to evaluate their identities. Discrepancies between actual and desired personal and social identities create distress, motivating employees to engage in behavioral self-regulation to counteract potentially threatening monitoring systems. Organizational threats to personal identity goals lead to increased invasiveness attitudes and a commitment to protect and enhance the self. Threats to social identity lead to increased unfairness attitudes and lowered commitment to one's organization. Implications for theory and research on monitoring, justice, and privacy are discussed along with practical implications.
The context of this chapter is the use of data and advanced data analytics in a commercial setting. Privacy is considered as protection from vulnerability, whereby vulnerability…
Abstract
The context of this chapter is the use of data and advanced data analytics in a commercial setting. Privacy is considered as protection from vulnerability, whereby vulnerability is understood as the state of being exposed to the possibility of being harmed, either physically or emotionally, or in fundamental rights other than privacy. Therefore, privacy's policy instruments, in particular data protection law, could be seen as a means to reduce the risk of harm resulting from data use. Such harm is probabilistic and often uncertain, which, however, does not exclude analyzing costs and benefits of regulatory data protection policies. When balancing privacy protections and opportunities for knowledge gain, regulatory policy could be viewed as superior, when it expands the range of possible trade-offs between vulnerability protection and gaining socially beneficial knowledge.
Details
Keywords
Lynne Siemens, Catherine Althaus and Charlotte Stange
The ultimate objective of any learning platform is student engagement with the material, instructor, and classmates. Little is currently known about students’ concerns regarding…
Abstract
The ultimate objective of any learning platform is student engagement with the material, instructor, and classmates. Little is currently known about students’ concerns regarding privacy, confidentiality, and information safety and the potential impact these may have on engagement within an online learning environment. Existing literature and practice must be supplemented with awareness of the importance of student perceptions concerning privacy and confidentiality if online learning engagement is to be maximized. Our exploratory research shows that students do experience concerns, that these concerns can be impacted by the professional school status of the students in question, and that students take steps to create safety accordingly. As a result, student engagement within an online learning environment is different than its physical counterpart. Our findings and subsequent recommendations suggest more can be done to maximize the notion of learning safety and student online learning engagement.
Kartikeya Bajpai and Klaus Weber
We examine the translation of the concept of privacy in the advent of digital communication technologies. We analyze emerging notions of informational privacy in public discourse…
Abstract
We examine the translation of the concept of privacy in the advent of digital communication technologies. We analyze emerging notions of informational privacy in public discourse and policymaking in the United States. Our analysis shows category change to be a dynamic process that is only in part about cognitive processes of similarity. Instead, conceptions of privacy were tied to institutional orders of worth. Those orders offered theories, analogies, and vocabularies that could be deployed to extrapolate the concept of privacy into new domains, make sense of new technologies, and to shape policy agendas.
Details
Keywords
Alex Deslée and Julien Cloarec
The management of consumer privacy has become a critical concern for organizations in the age of artificial intelligence–powered marketing. The impact of data on the market…
Abstract
The management of consumer privacy has become a critical concern for organizations in the age of artificial intelligence–powered marketing. The impact of data on the market environment has brought both benefits and challenges, with marketers gaining valuable insights but also raising privacy concerns. As artificial intelligence–powered marketing advances, consumer vulnerability increases due to the sensitivity of collected data. This vulnerability leads some consumers to resort to falsifying information, posing a significant threat to the digital economy. Privacy empowerment and customer control play a vital role in addressing these challenges. This chapter explores the influencing factors and ethical considerations surrounding data falsification. It also discusses strategies to mitigate perceived vulnerability through privacy controls and explores the consequences of data breaches and customer vulnerability. The chapter further emphasizes the need for organizations to balance benefits, risks, and customer trust while harnessing the value of customer data. An ethical framework for data privacy marketing audits is proposed to help organizations assess their data practices responsibly and competitively. By integrating personal data protection strategies within an ethical framework, organizations can protect consumer privacy, enhance customer trust, and maintain their competitive edge in the market.
Details
Keywords
Jo En Yap, Michael B. Beverland and Liliana L. Bove
Purpose – The objectives of this study are to explore how consumers achieve, maintain, and/or regain privacy and to more fully understand the meaning consumers ascribe to…
Abstract
Purpose – The objectives of this study are to explore how consumers achieve, maintain, and/or regain privacy and to more fully understand the meaning consumers ascribe to privacy.
Methodology/approach – Image-elicited depth interviews were conducted on a theoretical sample of 23 informants.
Findings – Consumers are active participants who assert their dominance in the marketplace and resist organizational practices that impinge upon their privacy. Seven categories of privacy management practices were identified: withdraw, defend, feint, neutralize, attack, perception management, and reconcile. The findings also reveal that when informants desire privacy and engage in these practices, they are ultimately in a quest for the meta-goal of sovereignty over their respective personal domains.
Research limitations/implications – This study provides support for and expands upon knowledge of the privacy management practices identified in extant literature, and offers an encompassing conceptualization of privacy as it applies in the context of contemporary consumption.
Social implications – This study may assist policy makers and managers in their efforts to develop appropriate solutions to manage consumers’ privacy concerns and support them in their pursuit of privacy.
Originality/value of the paper – This study injects the voice of the consumer into the privacy debate. A broad theoretical framework for understanding what consumers mean when they talk about privacy and the practices they engage in to “do privacy” is presented. It is hoped that this study provides a basis for managing consumer privacy concerns and future research on the issue so that improved outcomes can be attained for all.
Details
Keywords
Mobile dating apps are widely used in the queer community. Whether for sexual exploration or dating, mobile and geosocial dating apps facilitate connection. But they also bring…
Abstract
Mobile dating apps are widely used in the queer community. Whether for sexual exploration or dating, mobile and geosocial dating apps facilitate connection. But they also bring attendant privacy risks. This chapter is based on original research about the ways gay and bisexual men navigate their privacy on geosocial dating apps geared toward the LGBTQI community. It argues that, contrary to the conventional wisdom that people who share semi-nude or nude photos do not care about their privacy, gay and bisexual users of geosocial dating apps care very much about their privacy and engage in complex, overlapping privacy navigation techniques when sharing photos. They share semi-nude and nude photos for a variety of reasons, but generally do so only after building organic trust with another person. Because trust can easily break down without supportive institutions, this chapter argues that law and design must help individuals protect their privacy on geosocial dating apps.
Details
Keywords
The study focusses on the legal issues surrounding artificial intelligence (AI), which are being investigated and debated about several European Union initiatives to manage and…
Abstract
The study focusses on the legal issues surrounding artificial intelligence (AI), which are being investigated and debated about several European Union initiatives to manage and regulate Information and Communication Technologies. The goal is to discuss the benefits and drawbacks of adopting AI technology and the ramifications for the articulations of law and politics in democratic constitutional countries. Thus, the study aims to identify socio-legal concerns and possible solutions to protect individuals’ interests. The exploratory study is based on statutes, rules, and committee reports. The study has used news pieces, reports issued by organisations and legal websites. The study revealed computer security vulnerabilities, unfairness, bias and discrimination, and legal personhood and intellectual property issues. Issues with privacy and data protection, liability for harm, and lack of accountability will all be discussed. The vulnerability framework is utilised in this chapter to strengthen comprehension of key areas of concern and to motivate risk and impact mitigation solutions to safeguard human welfare. Given the importance of AI’s effects on weak individuals and groups as well as their legal rights, this chapter contributes to the discourse, which is essential. The chapter advances the conversation while appreciating the legal work done in AI and the fact that this sector needs constant review and flexibility. As AI technology advances, new legal challenges, vulnerabilities, and implications for data privacy will inevitably arise, necessitating increased monitoring and research.
Details