Search results

1 – 10 of over 8000
Article
Publication date: 25 October 2022

Joana Neves, Ofir Turel and Tiago Oliveira

While social networking sites (SNS) have many positive aspects, they can have several adverse outcomes, among which privacy violations are a vital concern. The authors first posit…

Abstract

Purpose

While social networking sites (SNS) have many positive aspects, they can have several adverse outcomes, among which privacy violations are a vital concern. The authors first posit that concerns regarding privacy violations can drive attempts to reduce SNS use. Next, the authors note that these violations can have two sources: peers and the social media provider. Thus, there is a need to understand how this complex system of privacy concerns affects use reduction decisions. To do so, this paper aims to examine the separate and joint roles of institutional and peer privacy concerns in driving SNS use reduction.

Design/methodology/approach

Based on privacy calculus theory, the authors propose a theoretical model to explain SNS use reduction, with institutional and peer privacy concerns as independent variables. The authors empirically examine the research model using a sample of 258 SNS users.

Findings

This study reveals that institutional and peer privacy concerns independently increase one's intention to reduce SNS use and that institutional privacy concern strengthen the relation between peer privacy concern and the intention to reduce SNS use.

Originality/value

Research thus far has not examined how the two facets of privacy work in tandem to affect 'users' decisions to change their behaviors on SNS platforms. Considering the unique and joint effect of these facets can thus provide a more precise and realistic perspective. This paper informs theories and models of privacy and online user behavior change.

Details

Internet Research, vol. 33 no. 3
Type: Research Article
ISSN: 1066-2243

Keywords

Article
Publication date: 2 August 2019

Le Wang, Zao Sun, Xiaoyong Dai, Yixin Zhang and Hai-hua Hu

The purpose of this paper is to facilitate understanding of how to mitigate the privacy concerns of users who have experienced privacy invasions.

1545

Abstract

Purpose

The purpose of this paper is to facilitate understanding of how to mitigate the privacy concerns of users who have experienced privacy invasions.

Design/methodology/approach

Drawing on the communication privacy management theory, the authors developed a model suggesting that privacy concerns form through a cognitive process involving threat-coping appraisals, institutional privacy assurances and privacy experiences. The model was tested using data from an empirical survey with 913 randomly selected social media users.

Findings

Privacy concerns are jointly determined by perceived privacy risks and privacy self-efficacy. The perceived effectiveness of institutional privacy assurances in terms of established privacy policies and privacy protection technology influences the perceptions of privacy risks and privacy self-efficacy. More specifically, privacy invasion experiences are negatively associated with the perceived effectiveness of institutional privacy assurances.

Research limitations/implications

Privacy concerns are conceptualized as general concerns that reflect an individual’s worry about the possible loss of private information. The specific types of private information were not differentiated.

Originality/value

This paper is among the first to clarify the specific mechanisms through which privacy invasion experiences influence privacy concerns. Privacy concerns have long been viewed as resulting from individual actions. The study contributes to literature by linking privacy concerns with institutional privacy practice.

Article
Publication date: 29 March 2011

Mary Ann Eastlick and Sherry Lotz

Via an initial trust‐building model, the purpose of this paper is to examine consumers' initial trust in an unfamiliar online retailer, considering cognitive perceptions of the…

3743

Abstract

Purpose

Via an initial trust‐building model, the purpose of this paper is to examine consumers' initial trust in an unfamiliar online retailer, considering cognitive perceptions of the retailer and institutional beliefs about the online environment.

Design/methodology/approach

A random sample of 2,000 US households, resulting in 477 usable responses, was surveyed by assigning subjects to one of the two shopping scenarios portraying an online insurance retailer with a weak or strong reputation.

Findings

Structural equation modelling revealed that second‐hand cognitive and first‐hand institutional information have comparable and contrasting effects on purchase intent through formation of initial trust.

Research limitations/implications

Results imply that consumers form initial trust using a combination of cognitive perceptions about the online retailer and consumers' institutional beliefs regarding the online environment. Ways in which researchers and online retailers can shape initial trust formation via these antecedents are suggested.

Originality/value

The influence of an institutional belief, situational normality of the online environment, on initial trust has not been previously investigated by simultaneously assessing relative influences of institutional beliefs and cognitive perceptions of the online retailer.

Details

International Journal of Retail & Distribution Management, vol. 39 no. 4
Type: Research Article
ISSN: 0959-0552

Keywords

Article
Publication date: 2 June 2022

Huey Chern Boo and Bee-Lia Chua

This study aims to explain how hotel guests form attitudes toward facial recognition technology in Singapore by integrating technology acceptance model (TAM), privacy calculus…

2938

Abstract

Purpose

This study aims to explain how hotel guests form attitudes toward facial recognition technology in Singapore by integrating technology acceptance model (TAM), privacy calculus theory and personal innovativeness.

Design/methodology/approach

A self-administered online questionnaire was developed with measurements adopted from past research. Guests who stayed in four- or five-star hotels in Singapore were recruited via systematic random sampling. Structural equation modeling was conducted to examine the proposed integrated models.

Findings

Results showed that hotel guests performed calculative cognitive processes, weighing the benefits and risks of using facial recognition check-in system. Contradictory to the past research which suggested that trust activates both perceived risk and benefits, this study demonstrated that trust independently directed consumer attention on the benefits gained while risk perception was triggered by privacy concern. Furthermore, the current study revealed that the ease of use of facial recognition check-in system could possibly backfire.

Practical implications

The research indicates that the effort to adopt new technology in the hotel industry is promising in view of the growing millennials and Generation Z population who are digital natives. Furthermore, the current study highlights ways to elevate institutional trust and divert consumers’ attention from risk perception to enhance their positive attitude and behavior toward accepting facial recognition check-in system.

Originality/value

This study integrated TAM with privacy calculus theory and personal innovativeness in examining the acceptance of facial recognition check-in system in the hotel industry in Singapore. This study is also the first, to the best of the authors’ knowledge, to investigate the relationships among privacy concern, perceived risk, institutional trust and perceived benefits, as well as their effects on consumers’ attitudes and behavior toward the biometric system.

Details

International Journal of Contemporary Hospitality Management, vol. 34 no. 11
Type: Research Article
ISSN: 0959-6119

Keywords

Article
Publication date: 4 February 2022

Emmanuel W. Ayaburi

The study aims to empirically understand individuals' tendency to disclose private information online following different forms of data breach (i.e. reversible and irreversible…

Abstract

Purpose

The study aims to empirically understand individuals' tendency to disclose private information online following different forms of data breach (i.e. reversible and irreversible victimization).

Design/methodology/approach

Survey methodology is applied to measure the perception of victims of data breaches on key indicators of information disclosure.

Findings

Analysis of responses from 309 victims of data breaches show that while victims' irreversible data breach victimization experience influences both dimensions of privacy concerns, reversible data breach victimization experiences influenced only peer privacy concerns (PPCs). Furthermore, only institutional privacy concerns impacted online disclosure and fully mediate the relationship between victimization experience and online disclosure.

Research limitations/implications

The findings contribute to the privacy literature by expanding the dimension of victimization and considering their differential effect on privacy concerns. Additionally, the study uncovers the efficacy of privacy dimension on privacy recalibration following a data breach announcement.

Practical implications

For practice, the results provide insights for managers on how to manage customer restitution after a data breach. Management of the process of privacy recalibration should not be homogenous but be based on degree of consequence.

Social implications

This research provides deeper understanding of how the ascendancy of privacy breaches affect privacy management. The findings illuminate why the increasing trend in online activities is observed.

Originality/value

The study is the first to identify two dimensions of data breach victimization experience based on the breach level index (BLI). The two dimensions of victimization (i.e. reversible and irreversible privacy victimizations) were used to understand individuals' tendency to disclose private information online.

Details

Information Technology & People, vol. 36 no. 1
Type: Research Article
ISSN: 0959-3845

Keywords

Open Access
Article
Publication date: 1 February 2024

Meenakshi Handa, Ronika Bhalla and Parul Ahuja

Increasing incidents of privacy invasion on social networking sites (SNS) are intensifying the concerns among stakeholders about the misuse of personal data. However, there seems…

Abstract

Purpose

Increasing incidents of privacy invasion on social networking sites (SNS) are intensifying the concerns among stakeholders about the misuse of personal data. However, there seems to be limited research on exploring the impact of specific privacy concerns on users’ intention to engage in various privacy protection behaviors. This study aims to examine the role of social privacy concerns, institutional privacy concerns and privacy self-efficacy as antecedents of privacy protection–related control activities intention among young adults active on SNS.

Design/methodology/approach

Data collected from 284 young adults active on SNS was analyzed through partial least squares structural equation modeling using Smart PLS.

Findings

The results indicate that institutional privacy concerns, social privacy concerns and privacy self-efficacy positively influence the control activities intention of SNS users. The extent of privacy self-efficacy and privacy protection-related control activities intention differs among users based on gender.

Research limitations/implications

This study is limited to a population of young adults in the age group of 18–25 years.

Practical implications

The findings of this study form the basis for specific recommendations addressing the different types of privacy concerns experienced by social media users, promoting responsible privacy control behaviors on online platforms and discouraging the possible misuse of information by third parties.

Originality/value

This study validates a theoretical framework that can contribute to future investigations concerning the use of SNS. The study findings form the basis for a set of practical recommendations for policymakers, SNS platforms and users.

Details

Vilakshan - XIMB Journal of Management, vol. 21 no. 1
Type: Research Article
ISSN: 0973-1954

Keywords

Article
Publication date: 17 August 2020

Brahim Zarouali, Valerie Verdoodt, Michel Walrave, Karolien Poels, Koen Ponnet and Eva Lievens

This study aims to investigate the development of adolescents’ advertising literacy and privacy protection strategies in the context of targeted advertisements on social…

2451

Abstract

Purpose

This study aims to investigate the development of adolescents’ advertising literacy and privacy protection strategies in the context of targeted advertisements on social networking sites (SNSs).

Design/methodology/approach

A survey was conducted among 374 adolescents between 12 and 17 years of age, and 469 young adults (18–25 years) served as a comparative benchmark.

Findings

Results indicate that advertising literacy increases progressively throughout adolescence, and reaches adult-like levels only by the age of 16. In addition, adolescents have an inadequate awareness of commercial data collection practices. This awareness slowly increases as a function of their age until it reaches an adult level around the age of 20. Finally, findings reveal that adolescents take little action to cope with targeted advertisements by means of privacy protection strategies.

Practical implications

This paper devotes much attention to the formulation of specific recommendations for EU policymakers and regulatory bodies. In addition, it also holds implications for advertisers (e.g. the need for more in-depth data protection impact assessments), social media providers (e.g. adolescent-friendly privacy policy) and social caretakers (e.g. achieving advertising literacy and privacy education).

Originality/value

This paper fulfills the need to investigate adolescents’ advertising literacy and privacy-protective behaviors on SNSs, and, in turn, directly translates these insights into recommendations that can underpin the rationale of regulatory or policy decisions on a European level.

Details

Young Consumers, vol. 21 no. 3
Type: Research Article
ISSN: 1747-3616

Keywords

Article
Publication date: 19 July 2023

Hamid Reza Nikkhah, Varun Grover and Rajiv Sabherwal

This study aims to argue that user’s continued use behavior is contingent upon two perceptions (i.e. the app and the provider). This study examines the moderating effects of…

Abstract

Purpose

This study aims to argue that user’s continued use behavior is contingent upon two perceptions (i.e. the app and the provider). This study examines the moderating effects of user’s perceptions of apps and providers on the effects of security and privacy concerns and investigate whether assurance mechanisms decrease such concerns.

Design/methodology/approach

This study conducts a scenario-based survey with 694 mobile cloud computing (MCC) app users to understand their perceptions and behaviors.

Findings

This study finds that while perceived value of data transfer to the cloud moderates the effects of security and privacy concerns on continued use behavior, trust only moderates the effect of privacy concerns. This study also finds that perceived effectiveness of security and privacy intervention impacts privacy concerns but does not decrease security concerns.

Originality/value

Prior mobile app studies mainly focused on mobile apps and did not investigate the perceptions of app providers along with app features in the same study. Furthermore, International Organization for Standardization 27018 certification and privacy policy notification are the interventions that exhibit data assurance mechanisms. However, it is unknown whether these interventions are able to decrease users’ security and privacy concerns after using MCC apps.

Details

Information & Computer Security, vol. 32 no. 1
Type: Research Article
ISSN: 2056-4961

Keywords

Article
Publication date: 11 February 2019

Mohamed Abdelhamid, Victoria Kisekka and Spyridon Samonas

The purpose of this study is to understand why individuals choose to avoid using e-services due to security concerns and perceived risk when these factors are affected by the…

1161

Abstract

Purpose

The purpose of this study is to understand why individuals choose to avoid using e-services due to security concerns and perceived risk when these factors are affected by the perceived degree of government cybersecurity preparedness against cyberattacks.

Design/methodology/approach

The authors adopt the information systems success model to predict the role of government security preparedness efforts in influencing the determinants of e-services avoidance. The conceptual model includes four variables: security concerns, perceived risk of cyberattacks, perceived government cybersecurity preparedness and e-services avoidance. Data from 774 participants were used to analyze our conceptual model.

Findings

First, the findings show that security concerns regarding personal information safety and perceived risk of cyberattacks are barriers to e-services use, with the former having a stronger effect. Second, the findings showed that perceived government cybersecurity preparedness significantly reduces security concerns and perceived risk of cyberattacks. Third, the post hoc group analysis between individuals with a bachelor’s degree or higher versus those without a bachelor’s degree showed that the effect of both security concerns and perceived risk of cyberattacks on e-services avoidance was greater for individuals without a bachelor’s degree. The same relationship between perceived risk of cyberattacks and e-services avoidance was not supported for individuals with a bachelor’s degree or higher.

Originality/value

Extant privacy research fails to adequately examine the role of institutional factors, such as government efforts, and how these mitigate or amplify cybersecurity concerns and risks related to e-services. This research takes the first step toward addressing this limitation by examining the influence of government cybersecurity preparedness efforts on the determinants of e-services avoidance.

Details

Information & Computer Security, vol. 27 no. 1
Type: Research Article
ISSN: 2056-4961

Keywords

Article
Publication date: 21 April 2022

Gaohui Cao and Ping Wang

Based on communication privacy management (CPM) theory, this study aimed to explore how gender and age criteria, motivational criterion (locatability), benefit-risk ratio criteria…

1017

Abstract

Purpose

Based on communication privacy management (CPM) theory, this study aimed to explore how gender and age criteria, motivational criterion (locatability), benefit-risk ratio criteria (perceived benefits of privacy information disclosure and privacy concerns), contextual criteria (privacy experience) and boundary coordination and turbulence (perceived effectiveness of privacy policy) interact and combine in leading to voice assistant (VA) users' intention to reveal or conceal their privacy information.

Design/methodology/approach

A questionnaire was designed and distributed to car drivers who have intelligent VA use experience while driving. A total of 230 valid responses were collected. The fuzzy-set qualitative comparative analysis (fsQCA) approach was used to analyse the data.

Findings

Via configuration analysis with fsQCA, five equivalent configurations leading to the high intention of disclosing privacy information, and one configuration leading to the intention of concealing privacy information were identified. Four theoretical configurational propositions were proposed. Moreover, the theoretical and practical implications of the findings are discussed.

Originality/value

This study offers some insightful implications in the field of private information communication in artificial intelligence applications as well as practical implications for intelligent VA application design. The findings provide empirical evidence of privacy communication management in the context of smart VA usage.

1 – 10 of over 8000