Search results
1 – 10 of over 14000Thanos Papaioannou, Aggeliki Tsohou and Maria Karyda
This paper aims to identify the data elements that social network sites (SNS) users consider important for shaping their digital identity and explore how users’ privacy…
Abstract
Purpose
This paper aims to identify the data elements that social network sites (SNS) users consider important for shaping their digital identity and explore how users’ privacy concerns, self-esteem and the chosen SNS shape this process.
Design/methodology/approach
This study conducted an online survey with the participation of 759 individuals, to examine the influence of privacy concerns, self-esteem and the chosen SNS platform, on the shaping of the digital identity, through a classification of identity elements that users disclose when using a SNS, the Rosenberg self-esteem scale and relevant constructs from the literature.
Findings
Findings reveal that users consider the name, gender, picture, interests and job as most important elements for shaping their digital identity. They also demonstrate that privacy concerns do not seem to affect the amount of information users choose to publish when shaping their digital identity. Specific characteristics of SNS platforms are found to affect the way that users shape their digital identity and their privacy behavior. Finally, self-esteem was found to affect privacy concerns and digital identity formation.
Research limitations/implications
To avoid a lengthy questionnaire and the risk of low participation, the respondents answered the questions for one SNS of their choice instead of answering the full questionnaire for each SNS that they use. The survey included the most popular SNSs at the time of the survey in terms of popularity.
Practical implications
The results contribute to the theory by furthering our knowledge on the elements that shape digital identity and by providing evidence with regard to the role of privacy and self-esteem within social networking. In practice, they can be useful for SNS providers, as well as for entities that design security and privacy awareness campaigns.
Originality/value
This paper identifies novel factors that influence digital identity formation, including the specific SNS used with its particular characteristics in combination with privacy concerns and self-esteem of the user.
Details
Keywords
Dillip Kumar Rath and Ajit Kumar
In today’s digitized environment, information privacy has become a prime concern for everybody. The purpose of this paper is to provide an understanding of information…
Abstract
Purpose
In today’s digitized environment, information privacy has become a prime concern for everybody. The purpose of this paper is to provide an understanding of information privacy concern arising because of the application of computer-based information system in the various domains (E-Governance, E-Commerce, E-Health, E-Banking and E-Finance), and at different levels, i.e. individual, group, organizational and societal.
Design/methodology/approach
The authors performed an in-depth analysis of different research articles related to information privacy concerns and elements affecting those at certain level of applications. The primary sources of literature were articles retrieved from online databases. Various online journal and scholarly articles were searched in detail to locate information privacy-related articles.
Findings
The authors have carried out a detailed literature review to identify the different levels where the privacy is a big challenging task. This paper provides insights whether information privacy concern may obstruct in the successful dispersal and adoption of different applications in various application domains. Consumers’ attitude towards information privacy concerns have enlightened and addressed at individual levels in numerous domains. Privacy concerns at the individual level, as suggested by our analysis, seem to have been sufficiently addressed or addressed. However, information privacy concerns at other levels – group, organizational and societal levels – need the attention of researchers.
Originality/value
In this paper, the authors have posited that it will help the researchers to more focus at group level privacy perspective in the information privacy era.
Details
Keywords
Aylin Ilhan and Kaja J. Fietkiewicz
This investigation aims to examine the differences and similarities between activity tracking technology users from two regions (the USA and Germany) in their intended…
Abstract
Purpose
This investigation aims to examine the differences and similarities between activity tracking technology users from two regions (the USA and Germany) in their intended privacy-related behavior. The focus lies on data handling after hypothetical discontinuance of use, data protection and privacy policy seeking, and privacy concerns.
Design/methodology/approach
The data was collected through an online survey in 2019. In order to identify significant differences between participants from Germany and the USA, the chi-squared test and the Mann–Whitney U test were applied.
Findings
The intensity of several privacy-related concerns was significantly different between the two groups. The majority of the participants did not inform themselves about the respective data privacy policies or terms and conditions before installing an activity tracking application. The majority of the German participants knew that they could request the deletion of all their collected data. In contrast, only 35% out of 68 participants from the US knew about this option.
Research limitations/implications
This study intends to raise awareness about managing the collected health and fitness data after stopping to use activity tracking technologies. Furthermore, to reduce privacy and security concerns, the involvement of the government, companies and users is necessary to handle and share data more considerably and in a sustainable way.
Originality/value
This study sheds light on users of activity tracking technologies from a broad perspective (here, participants from the USA and Germany). It incorporates not only concerns and the privacy paradox but (intended) user behavior, including seeking information on data protection and privacy policy and handling data after hypothetical discontinuance of use of the technology.
Details
Keywords
The concept and practice of e-services has become essential in business transactions. Yet there are still many organizations that have not developed e-services optimally…
Abstract
The concept and practice of e-services has become essential in business transactions. Yet there are still many organizations that have not developed e-services optimally. This is especially relevant in the context of Indonesian Airline companies. Therefore, many airline customers in Indonesia are still in doubt about it, or even do not use it. To fill this gap, this study attempts to develop a model for e-services adoption and empirically examines the factors influencing the airlines customers in Indonesia in using e-services offered by the Indonesian airline companies. Taking six Indonesian airline companies as a case example, the study investigated the antecedents of e-services usage of Indonesian airlines. This study further examined the impacts of motivation on customers in using e-services in the Indonesian context. Another important aim of this study was to investigate how ages, experiences and geographical areas moderate effects of e-services usage.
The study adopts a positivist research paradigm with a two-phase sequential mixed method design involving qualitative and quantitative approaches. An initial research model was first developed based on an extensive literature review, by combining acceptance and use of information technology theories, expectancy theory and the inter-organizational system motivation models. A qualitative field study via semi-structured interviews was then conducted to explore the present state among 15 respondents. The results of the interviews were analysed using content analysis yielding the final model of e-services usage. Eighteen antecedent factors hypotheses and three moderating factors hypotheses and 52-item questionnaire were developed. A focus group discussion of five respondents and a pilot study of 59 respondents resulted in final version of the questionnaire.
In the second phase, the main survey was conducted nationally to collect the research data among Indonesian airline customers who had already used Indonesian airline e-services. A total of 819 valid questionnaires were obtained. The data was then analysed using a partial least square (PLS) based structural equation modelling (SEM) technique to produce the contributions of links in the e-services model (22% of all the variances in e-services usage, 37.8% in intention to use, 46.6% in motivation, 39.2% in outcome expectancy, and 37.7% in effort expectancy). Meanwhile, path coefficients and t-values demonstrated various different influences of antecedent factors towards e-services usage. Additionally, a multi-group analysis based on PLS is employed with mixed results. In the final findings, 14 hypotheses were supported and 7 hypotheses were not supported.
The major findings of this study have confirmed that motivation has the strongest contribution in e-services usage. In addition, motivation affects e-services usage both directly and indirectly through intention-to-use. This study provides contributions to the existing knowledge of e-services models, and practical applications of IT usage. Most importantly, an understanding of antecedents of e-services adoption will provide guidelines for stakeholders in developing better e-services and strategies in order to promote and encourage more customers to use e-services. Finally, the accomplishment of this study can be expanded through possible adaptations in other industries and other geographical contexts.
Details
Keywords
Xiaogang Chen, Yuhui Zhang and Xiaogang Chen
The significant cultural difference between China and Western countries, primarily the USA, suggests that it is necessary for researchers to take an emic approach to…
Abstract
Purpose
The significant cultural difference between China and Western countries, primarily the USA, suggests that it is necessary for researchers to take an emic approach to understand how the concept of privacy concerns is interpreted from the perspective of people from within the Chinese culture. However, all privacy concerns studies in the Chinese context have virtually adopted an etic approach. Therefore, this study aims to answer the following questions: What dimensions do privacy concerns encompass in the Chinese cultural context? What are the structural relationships among these dimensions? The authors answer these questions by conducting a mixed method research.
Design/methodology/approach
The authors first content analyzed Chinese news reports about information privacy and found that trading, management and awareness are relevant dimensions of privacy concerns. Further, the authors validated the three dimensions by surveying 185 Chinese consumers.
Findings
The data showed that Chinese consumers’ privacy concerns have a second-order factor structure, where the trading, management and awareness dimensions are first-order factors.
Originality/value
The results of this research contribute to the literature by developing the construct of privacy concerns that fits the context of Chinese culture and also point out possible managerial practices to mitigate Chinese consumers’ privacy concerns.
Details
Keywords
Jie Tang, Umair Akram and Wenjing Shi
Mobile Applications (App) privacy has become a prominent social problem. Compared with privacy concerns, this study examines a relatively novel concept of privacy fatigue…
Abstract
Purpose
Mobile Applications (App) privacy has become a prominent social problem. Compared with privacy concerns, this study examines a relatively novel concept of privacy fatigue and explores its effect on the users’ intention to disclose their personal information via mobile Apps. In addition, the personality traits are proposed as antecedents that will induce the personal perception of privacy fatigue and privacy concerns differently.
Design/methodology/approach
Data were collected from 426 respondents. Structure equation modeling was used to test the hypotheses.
Findings
The findings describe that App users’ intention toward personal information disclosure is determined by privacy fatigue and privacy concerns, but the former has a greater impact. With minor exceptions, the two factors are also influenced by different personality traits. Specifically, neuroticism has positive effects on privacy fatigue, but agreeableness and extraversion have presented the opposite results on the two variables.
Practical implications
This research is very scarce to examine the joint effects of privacy fatigue, privacy concerns and personality traits on App users’ disclosing intention. In doing so, these results will be of benefit to App providers and platform managers and can be the basis for a variety of follow-up studies.
Originality/value
While previous research just focuses on privacy concerns, this study explores the critical roles of privacy fatigue and opens up a new avenue of emotion-attitude analysis that can further increase the specificity and richness of users’ privacy research. Additionally, implications for personality traits as antecedents in the impact of App users’ privacy emotions and attitudes are discussed.
Details
Keywords
Yang Li, Hefu Liu, Matthew Lee and Qian Huang
Previous studies have attempted to address online uncertainties from the relationship marketing perspective. The purpose of this paper is to argue that the integration of…
Abstract
Purpose
Previous studies have attempted to address online uncertainties from the relationship marketing perspective. The purpose of this paper is to argue that the integration of media richness theory (MRT) and cognitive fit theory (CFT) can contribute a new perspective in addressing consumers’ transaction-specific uncertainties in online retailing.
Design/methodology/approach
On the basis of MRT and CFT, a research model was developed by correlating online channel media richness (OCMR), online–offline information integration (OOII), information privacy concern, perceived deception and online loyalty. The model was empirically examined based on survey data collected from 258 multi-channel consumers in China.
Findings
An analysis of structural equation model showed that OCMR is negatively associated with information privacy concern and perceived deception but is not significant to online loyalty. Information privacy concern has a negative influence on online loyalty, but the effect of perceived deception is not significant. Moreover, information privacy concern is positively related to perceived deception. The OOII strengthens the influence of OCMR but not the moderating effect of integrated promotion, product and price information on the relationship between OCMR and online loyalty.
Originality/value
This study contributes to the extant literature on online retailing by examining the effect of OCMR on online transaction uncertainties. Information integrity in the form of OOII was proposed to complement OCMR. Results have shown that OCMR is significant in reducing online uncertainties, and OOII strengthens this effect, thereby enhancing online loyalty.
Details
Keywords
Le Wang, Zao Sun, Xiaoyong Dai, Yixin Zhang and Hai-hua Hu
The purpose of this paper is to facilitate understanding of how to mitigate the privacy concerns of users who have experienced privacy invasions.
Abstract
Purpose
The purpose of this paper is to facilitate understanding of how to mitigate the privacy concerns of users who have experienced privacy invasions.
Design/methodology/approach
Drawing on the communication privacy management theory, the authors developed a model suggesting that privacy concerns form through a cognitive process involving threat-coping appraisals, institutional privacy assurances and privacy experiences. The model was tested using data from an empirical survey with 913 randomly selected social media users.
Findings
Privacy concerns are jointly determined by perceived privacy risks and privacy self-efficacy. The perceived effectiveness of institutional privacy assurances in terms of established privacy policies and privacy protection technology influences the perceptions of privacy risks and privacy self-efficacy. More specifically, privacy invasion experiences are negatively associated with the perceived effectiveness of institutional privacy assurances.
Research limitations/implications
Privacy concerns are conceptualized as general concerns that reflect an individual’s worry about the possible loss of private information. The specific types of private information were not differentiated.
Originality/value
This paper is among the first to clarify the specific mechanisms through which privacy invasion experiences influence privacy concerns. Privacy concerns have long been viewed as resulting from individual actions. The study contributes to literature by linking privacy concerns with institutional privacy practice.
Details
Keywords
Xiang Gong, Kem Z.K. Zhang, Chongyang Chen, Christy M.K. Cheung and Matthew K.O. Lee
Drawing on the control agency theory and the network effect theory, the purpose of this paper is to examine the effect of privacy assurance approaches, network externality…
Abstract
Purpose
Drawing on the control agency theory and the network effect theory, the purpose of this paper is to examine the effect of privacy assurance approaches, network externality and technology complementarity on consumers’ self-disclosure in mobile payment (MP) applications. The authors identify four types of privacy assurance approaches: perceived effectiveness of privacy setting, perceived effectiveness of privacy policy, perceived effectiveness of industry self-regulation and perceived effectiveness of government legislation. The research model considers how these privacy assurance approaches influence privacy concerns and consumers’ self-disclosure in MP applications under boundary conditions of network externality and technology complementarity.
Design/methodology/approach
An online survey with 647 sample users was conducted to empirically validate the model. The target respondents were current consumers of a popular MP application. The empirical data were analyzed by a structural equation modeling approach.
Findings
The empirical results reveal several major findings. First, privacy assurance approaches can effectively decrease privacy concerns, which ultimately formulates consumers’ self-disclosure in MP applications. Second, network externality and technology complementarity weaken the effect of perceived effectiveness of privacy setting on privacy concerns. Third, network externality and technology complementarity strengthen the relationship between perceived effectiveness of government legislation and privacy concerns, while they have non-significant interaction effect with perceived effectiveness of privacy policy and industry self-regulation on privacy concerns.
Practical implications
MP providers and stakeholders can harness the efficacy of privacy assurance approaches in alleviating privacy concerns and promoting consumers’ self-disclosure in MP applications.
Originality/value
The authors’ work contributes to the information privacy literature by identifying effective privacy assurance approaches in promoting consumers’ self-disclosure in MP applications, and by highlighting boundary conditions of these privacy assurance approaches.
Details
Keywords
Ibrahim M. Al-Jabri, Mustafa I. Eid and Amer Abed
Customer privacy and security are major concerns. Online firms worldwide collect customer data for various reasons. This study aims to investigate factors that motivate…
Abstract
Purpose
Customer privacy and security are major concerns. Online firms worldwide collect customer data for various reasons. This study aims to investigate factors that motivate and hinder a customer’s willingness to disclose personal information (WTD) to online firms on e-commerce websites.
Design/methodology/approach
Based on an extensive literature review, three sets of factors have been identified. These sets of factors are privacy concern, perceived disclosure benefits and privacy assurances. It is hypothesized that privacy concerns negatively affect the disclosure of personal information, while the perceived benefits of disclosure have positive effects. Privacy assurances would positively affect information disclosure and attenuate the negative effect of privacy concerns on the disclosure of personal information. The authors gathered data from 253 online customers in Saudi Arabia.
Findings
The results indicate that perceived disclosure benefits and privacy concerns have a significant positive and negative relationship, respectively, with WTD online. Privacy assurances had neither a direct nor a moderating effect on information disclosure.
Research limitations/implications
The findings will inform online firms about the factors that prevent or motivate customers to disclose personal information.
Originality/value
The effect of privacy concerns and benefits on personal information disclosure are not fully understood in Saudi Arabia. This study reveals more insights into the specific factors that make online customers reluctant or motivated to disclose their personal information.
Details