Search results

1 – 5 of 5
Article
Publication date: 1 January 2008

Janice C. Sipior and Burke T. Ward

The purpose of this paper is to provide a research model and hypotheses that explores software users' perceptions of privacy, trust, and US legal protection in using application…

950

Abstract

Purpose

The purpose of this paper is to provide a research model and hypotheses that explores software users' perceptions of privacy, trust, and US legal protection in using application software with embedded spyware.

Design/methodology/approach

An experimental study was undertaken requiring subjects to use an online analytical processing software product. After use, the experimental group was told spyware was embedded in the software. Questionnaire responses for the experimental and control group were compared using independent samples t‐test. Multiple regression was used to determine significant predictors of overall trust in the software vendor.

Findings

Users of software with spyware, versus users of software without spyware, have lower trust perceptions of a software vendor. Further examination of trustworthiness as a multi‐dimensional construct, reveals trustworthiness‐ability and trustworthiness‐integrity are important influences of overall trust of a vendor.

Research limitations/implications

The main limitation of the findings is the use of a convenience sample, limiting the generalizability of the results.

Practical implications

The results may provide guidance to software vendors and government regulatory agencies in addressing the concerns associated with spyware.

Originality/value

Software vendors should rethink the practice of embedding spyware in software applications, unless user trust can be maintained.

Details

Journal of Enterprise Information Management, vol. 21 no. 1
Type: Research Article
ISSN: 1741-0398

Keywords

Article
Publication date: 14 October 2013

Janice C. Sipior, Burke T. Ward and Regina Connolly

The purpose of this paper is to revisit the internet users’ information privacy concerns (IUIPC) construct, a research model, and hypotheses based on Malhotra et al. (2004) to…

1004

Abstract

Purpose

The purpose of this paper is to revisit the internet users’ information privacy concerns (IUIPC) construct, a research model, and hypotheses based on Malhotra et al. (2004) to assess the continued applicability of this construct. The relationship among privacy concerns, trusting beliefs, and risk beliefs continues to be unclear. Empirical evidence about the impact of privacy concerns on behavior is mixed.

Design/methodology/approach

A paper-based questionnaire was distributed and collected from 63 part-time graduate students of a private university in the mid-Atlantic USA. These respondents have an average of six years of full-time professional work experience and the vast majority (88.9 percent) has over seven years of experience on the internet. Questionnaire items measured the constructs of the IUIPC instrument. All measurement scales were validated using factor analysis, Cronbach's α, and reliability analysis. For hypothesis testing, multiple regression analysis was used.

Findings

The results partially support those of Malhotra et al. (2004). Consistent are the findings that the higher the trust a consumer holds for an online company, the less likely that consumer is to view providing personal information as risky. Also consistent is that the higher the trust a consumer holds for an online company, the more likely is that consumer to intend to provide personal information online. Finally, the greater risk a consumer has for providing personal information, the less willing that consumer is to reveal such information online. However, the results did not support a negative relationship between the IUIPC construct and consumer trust in an online company or a positive relationship between IUIPC and consumer risk in providing personal information to an online company. The paper concludes that the IUIPC is not the valid scale to employ in measuring information privacy concerns.

Research limitations/implications

The main limitation of the findings is the use of a small convenience sample, limiting the insights into interrelationships between various dimensions of privacy concerns and the generalizability of the results.

Practical implications

The results may provide guidance to online retailers in addressing the dimensions of privacy concerns related to trusting beliefs and risk beliefs.

Originality/value

IUIPC were measured using the IUIPC instrument. This responds to Malhotra et al.'s (2004) call to use the IUIPC scale and the associated research framework to further investigate consumer privacy concerns and the suggestion by Belanger and Crossler (2011) that more studies should explore this scale. Further, both Westin (1967), and Smith et al. (1996) recognize that privacy attitudes and concerns may change over time, providing motivation to revisit IUIPC.

Details

Journal of Enterprise Information Management, vol. 26 no. 6
Type: Research Article
ISSN: 1741-0398

Keywords

Article
Publication date: 2 August 2011

Burke T. Ward, Janice C. Sipior, Linda Volonino and Carolyn Purwin

The purpose of this paper is to explore the challenges confronting organizations in responding to the recent electronic discovery (e‐discovery) amendments to the US federal rules…

773

Abstract

Purpose

The purpose of this paper is to explore the challenges confronting organizations in responding to the recent electronic discovery (e‐discovery) amendments to the US federal rules of civil procedure. Failure to comply with these rules, even unintentionally, can have significant adverse legal consequences for parties of the lawsuit. The vast majority of information and data is electronic and stored in numerous files and on a variety of media. Thus, there is a critical need to better manage electronic content and implement a strategic approach to accommodate new rules, legislation, and ever‐changing technology. In response, the authors provide recommendations for enterprise‐wide e‐discovery readiness.

Design/methodology/approach

To investigate the legal theory for e‐discovery, the authors examine precedent‐setting legal cases for the purpose of providing managerial recommendations for developing and implementing a comprehensive policy for compliance and litigation purposes.

Findings

According to the authors' evaluation of the amendments and applicable case law, the new rules make clear that electronic information and data are discoverable, and that failure to protect and store in a retrievable format may lead to adverse legal consequences.

Practical implications

To better prepare for the duties imposed by the e‐discovery amendments, the authors recommend the formation of an enterprise‐wide multi‐functional electronically stored information Discovery Team to develop, implement, and periodically review a comprehensive electronic records management policy and procedures for compliance and litigation purposes.

Originality/value

The authors take into consideration the dearth of information systems literature addressing the critical need to better manage electronic content and to implement an enterprise‐wide strategic approach to accommodate the requirements of e‐discovery, or face costly consequences.

Details

Transforming Government: People, Process and Policy, vol. 5 no. 3
Type: Research Article
ISSN: 1750-6166

Keywords

Content available
Article
Publication date: 14 October 2013

Zahir Irani and Muhammad Kamal

226

Abstract

Details

Journal of Enterprise Information Management, vol. 26 no. 6
Type: Research Article
ISSN: 1741-0398

Content available
Article
Publication date: 2 August 2011

Maged Ali and Muhammad Kamal

329

Abstract

Details

Transforming Government: People, Process and Policy, vol. 5 no. 3
Type: Research Article
ISSN: 1750-6166

Access

Year

All dates (5)

Content type

1 – 5 of 5