Search results

1 – 10 of over 2000
Article
Publication date: 6 May 2014

Syed H. Akhter

This study aims to examine the effects of internet self-efficacy and internet involvement on privacy concern and the effect of privacy concern on the frequency of online

4776

Abstract

Purpose

This study aims to examine the effects of internet self-efficacy and internet involvement on privacy concern and the effect of privacy concern on the frequency of online transactions. The study also seeks to examine the direct effect of internet self-efficacy and internet involvement on the frequency of online transactions.

Design/methodology/approach

A structural equation model was developed to test the hypotheses. The model was tested using the LISREL 8.8 software and both structural and measurement parameters were estimated.

Findings

Findings suggest that internet self-efficacy and internet involvement affect privacy concern negatively; and privacy concern, in turn, affects frequency of online transactions negatively. Findings also indicate that the direct effect of internet self-efficacy and internet involvement on the frequency of online transactions is positive. All parameters are significant and in the hypothesized direction.

Practical implications

Findings highlight the significance of internet self-efficacy and internet involvement in explaining both privacy concern and online transactions. The negative impact of privacy concern shows strategically why businesses should take measures to protect privacy of consumers and assure them that the information they provide is protected and secure.

Originality/value

This research contributes to the debate on privacy concern and adds to the growing body of literature on the impact of privacy concern on online transactions. Both antecedents and consequence of privacy concern are examined in the study.

Details

Journal of Consumer Marketing, vol. 31 no. 2
Type: Research Article
ISSN: 0736-3761

Keywords

Article
Publication date: 16 November 2021

Zhou Cheng, Kai Li and Ching-I Teng

Push notification service (PNS) is an important approach to distribute personalized information to users timely and is getting more and more popular. However, users' privacy

Abstract

Purpose

Push notification service (PNS) is an important approach to distribute personalized information to users timely and is getting more and more popular. However, users' privacy concerns are a major inhibiting factor in their continuance usage of PNS. This study investigates the effect of privacy protection functions provided by PNS sites in enhancing users' perceived fairness on the basis of justice theory to mitigate users' concerns of information privacy. The mechanism underlying such influence on users' continuance usage of PNS comprises privacy concern and privacy-control self-efficacy.

Design/methodology/approach

Four scenario-based surveys are conducted to test the proposed hypotheses. The authors test the research model with a sample of 360 participants by ANOVA and PLS.

Findings

Results show that the proposed privacy protection functions have direct positive effects on users' privacy-control self-efficacy, negative effects on privacy concern and indirectly affect their continuance usage of PNS. Furthermore, the interaction effects between two approaches have different impacts on users' privacy concern and privacy-control self-efficacy.

Originality/value

This study provides some suggestions and guidance for PNS providers to design effective privacy protection technologies.

Details

Aslib Journal of Information Management, vol. 74 no. 2
Type: Research Article
ISSN: 2050-3806

Keywords

Article
Publication date: 11 September 2017

Maor Weinberger, Maayan Zhitomirsky-Geffet and Dan Bouhnik

The purpose of this paper is to investigate the attitudes and influential factors of users’ knowledge and use of the tools designated for controlling and enhancing online privacy

1305

Abstract

Purpose

The purpose of this paper is to investigate the attitudes and influential factors of users’ knowledge and use of the tools designated for controlling and enhancing online privacy, which are referred to as online privacy literacy (OPL). Particularly, inspired by the protection motivation theory, a motivational factor is defined as comprising several variables which reflect users’ motivation to protect their online privacy.

Design/methodology/approach

To this end, a user study was conducted based on the quantitative method with the participation of 169 students from the Israeli academia who were administered closed-ended questionnaires.

Findings

Generally low to moderate levels of OPL were obtained. Interestingly, the multivariate linear regression analysis showed that motivational factors, such as users’ concern for personal information protection on the internet and users’ privacy self-efficacy and sense of anonymity when visiting a website, were among the strongest predictive factors of users’ OPL level.

Social implications

This research has social implications that might contribute to an increase in the OPL among internet users.

Originality/value

The direct influence of the examined factors on users’ OPL was not previously discussed in the literature. As a result of the study, a comprehensive model of user online privacy behavior was constructed.

Article
Publication date: 5 December 2023

Sann Ryu

The purpose of the current research is to present an explanatory framework for how people selectively attend to privacy-related news information about LBA depending on the extent…

Abstract

Purpose

The purpose of the current research is to present an explanatory framework for how people selectively attend to privacy-related news information about LBA depending on the extent to which they know about LBA already as well as their appraisals of privacy threats and efficacy.

Design/methodology/approach

The proposed model was tested using structural equation modeling based on a total of 522 useable responses obtained from an online survey.

Findings

The results revealed two different approaches to information exposure: (1) people choose to seek out privacy-related news articles when their persuasion knowledge and perceived threat level are high, whereas (2) they tend to avoid such information when perceived threats accompany fear as well as psychological discomfort, or when they believe that they are knowledgeable about LBA practices and highly capable of protecting their privacy.

Originality/value

With the development of real-time location-tracking technologies, the practice of LBA is becoming increasingly popular. As such, however, concerns about data collection and privacy are also on the rise, garnering a great deal of media attention. Despite the importance and constant stream of news reports on the subject, a comprehensive understanding of consumers' privacy assessments and information consumption remains underexamined. By incorporating the persuasion knowledge model and extended parallel process model, the current research presents an explanatory framework for consumers' privacy perceptions and information choice.

Details

Information Technology & People, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0959-3845

Keywords

Article
Publication date: 4 July 2017

Julius Tanantaputra, Chin Wei Chong and Muhammad Sabbir Rahman

The purpose of this paper is to investigate the influence of individual factors, that is demographic factors, self-efficacy, computer anxiety and internet literacy, on concern for…

1516

Abstract

Purpose

The purpose of this paper is to investigate the influence of individual factors, that is demographic factors, self-efficacy, computer anxiety and internet literacy, on concern for information privacy (CFIP), especially in social networking and e-commerce in Malaysia.

Design/methodology/approach

Data were collected from 164 students in Multimedia University Cyberjaya and analyzed using statistical analyses.

Findings

The results of this paper indicate that most of the individual factors have significant relationships with CFIP, except age as one of the demographic factors, and internet literacy. One of the outcomes, which is continuance intention in social networking, has a strong correlation with CFIP.

Research limitations/implications

Regarding demographic profile, the statistics of age, income and especially nationality profile shows the imbalance distribution among the group categories. This might become an issue for generalization purpose.

Practical implications

The empirical findings can be used as a guideline for firms to undergo a self-check in social networking sites and data over transactions in e-commerce activities. By focusing on those significant factors, firms may develop relevant strategies to enhance the social networking or e-commerce activities.

Originality/value

This paper is perhaps the limited study about CFIP in Malaysia, but it focuses more on social networking and e-commerce as the outcomes of CFIP.

Details

Library Review, vol. 66 no. 4/5
Type: Research Article
ISSN: 0024-2535

Keywords

Article
Publication date: 5 June 2017

Jon D. Elhai, Jason C. Levine and Brian J. Hall

Despite concerns about digital privacy, little is known about emotional distress about data hacking and surveillance incidents. The purpose of this paper is to examine variables…

3320

Abstract

Purpose

Despite concerns about digital privacy, little is known about emotional distress about data hacking and surveillance incidents. The purpose of this paper is to examine variables predicting anxiety about data hacking, and the role that such anxiety and other potentially important variables have in explaining the use of digital privacy protection behavior.

Design/methodology/approach

In total, 305 participants from an online labor market were sampled who frequently use the internet, surveyed about recent anxiety (using the Generalized Anxiety Disorder-7 scale (GAD-7)), anxiety about data hacking (GAD-7, in reference to data hacking), and issues of digital privacy: news exposure, perceived importance, self-efficacy, protection behavior, and previous hacking victimization.

Findings

Profession (information technology-related) moderated the symptom structure for recent anxiety, but not data hacking anxiety. Using structural equation modeling, prior hacking victimization predicted anxiety about hacking. Digital privacy protection behavior was related to hacking anxiety and privacy self-efficacy. Data hacking anxiety mediated relations between hacking victimization and privacy protection. Privacy self-efficacy mediated relations between news exposure to hacking incidents and privacy protection.

Research limitations/implications

Limitations include the self-report nature of the instruments, and use of a selective, non-random sample.

Practical implications

Results highlight knowledge, self-efficacy, and threat appraisal among IT managers in motivating better digital security practices.

Originality/value

This is the first study using a standardized instrument of anxiety to examine distress about hacking and predictors of digital privacy protection behavior.

Details

Internet Research, vol. 27 no. 3
Type: Research Article
ISSN: 1066-2243

Keywords

Book part
Publication date: 27 November 2014

Julia Crouse Waddell, Caitlin McLaughlin, Robert LaRose, Nora Rifon and Christina Wirth-Hawkins

The purpose of this research was to utilize protection motivation theory, which states that individuals will take actions to protect themselves from threats when they have both…

Abstract

Purpose

The purpose of this research was to utilize protection motivation theory, which states that individuals will take actions to protect themselves from threats when they have both knowledge of actions that will protect them from the threat and the motivation to do so, to develop a better way of training adolescents to be safe on the Internet.

Design/methodology/approach

This study utilized an experimental approach in a high school environment to test its hypotheses. Participants were split into two groups: a group who received a tutorial about how to stay safe on the Internet (an enactive mastery tutorial that allowed students to actually try out the skills they were learning) and a group who did not receive the training. Participants were then asked about their intentions to engage in protective behaviors, their perceived ability to do so, and the likelihood that these protective behaviors would help them to stay safer on the Internet.

Findings

The findings indicated that an enactive mastery training program increased intentions to engage in safe online behavior in the future, offering a foundation for the development of future theory-based online safety interventions.

Research limitations/implications

This study was conducted in a small geographic region in schools that agreed to utilize a class period to test the enactive mastery tutorial, which limits its external validity. Furthermore, this study only measured intentions to engage in protective behaviors, not actual behaviors.

Practical implications

This research provides a guideline for an effective way of increasing the likelihood that adolescents will engage in protective behaviors online, which has great practical applications for teachers, administrators, PSA advertisers, etc.

Originality/value

This chapter provides a framework for creating programs to help adolescents engage in safer behavior. Furthermore, it introduces the idea of involvement to the protection motivation theory literature, which is a valuable variable to consider when determining how to create an effective campaign to change behavior.

Details

Communication and Information Technologies Annual
Type: Book
ISBN: 978-1-78350-629-3

Keywords

Article
Publication date: 28 October 2009

Rajendran Sriramachandramurthy, Siva K. Balasubramanian and Monica Alexandra Hodis

The spread of broadband Internet has resulted in the increase of spyware and adware. This study highlights their damaging effects and proposes a model that captures defensive…

Abstract

The spread of broadband Internet has resulted in the increase of spyware and adware. This study highlights their damaging effects and proposes a model that captures defensive measures adopted by Internet users. Specifically, our model indicates that knowledge has a positive impact on self‐efficacy that, in turn, is presumed to trigger technical defensive measures. Moreover, concerns for privacy and previous experience with spyware and adware are likely to evoke both tactical and technical defense measures. Data collected by the PEW Internet and American Life research project are utilized to test the proposed model and the findings are discussed.

Details

American Journal of Business, vol. 24 no. 2
Type: Research Article
ISSN: 1935-5181

Keywords

Open Access
Article
Publication date: 1 February 2024

Meenakshi Handa, Ronika Bhalla and Parul Ahuja

Increasing incidents of privacy invasion on social networking sites (SNS) are intensifying the concerns among stakeholders about the misuse of personal data. However, there seems…

Abstract

Purpose

Increasing incidents of privacy invasion on social networking sites (SNS) are intensifying the concerns among stakeholders about the misuse of personal data. However, there seems to be limited research on exploring the impact of specific privacy concerns on users’ intention to engage in various privacy protection behaviors. This study aims to examine the role of social privacy concerns, institutional privacy concerns and privacy self-efficacy as antecedents of privacy protection–related control activities intention among young adults active on SNS.

Design/methodology/approach

Data collected from 284 young adults active on SNS was analyzed through partial least squares structural equation modeling using Smart PLS.

Findings

The results indicate that institutional privacy concerns, social privacy concerns and privacy self-efficacy positively influence the control activities intention of SNS users. The extent of privacy self-efficacy and privacy protection-related control activities intention differs among users based on gender.

Research limitations/implications

This study is limited to a population of young adults in the age group of 18–25 years.

Practical implications

The findings of this study form the basis for specific recommendations addressing the different types of privacy concerns experienced by social media users, promoting responsible privacy control behaviors on online platforms and discouraging the possible misuse of information by third parties.

Originality/value

This study validates a theoretical framework that can contribute to future investigations concerning the use of SNS. The study findings form the basis for a set of practical recommendations for policymakers, SNS platforms and users.

Details

Vilakshan - XIMB Journal of Management, vol. 21 no. 1
Type: Research Article
ISSN: 0973-1954

Keywords

Article
Publication date: 31 August 2021

Tessa Withorn, Jillian Eslami, Hannah Lee, Maggie Clarke, Carolyn Caffrey, Cristina Springfield, Dana Ospina, Anthony Andora, Amalia Castañeda, Alexandra Mitchell, Joanna Messer Kimmitt, Wendolyn Vermeer and Aric Haas

This paper presents recently published resources on library instruction and information literacy, providing an introductory overview and a selected annotated bibliography of…

5377

Abstract

Purpose

This paper presents recently published resources on library instruction and information literacy, providing an introductory overview and a selected annotated bibliography of publications covering various library types, study populations and research contexts.

Design/methodology/approach

This paper introduces and annotates English-language periodical articles, monographs, dissertations, reports and other materials on library instruction and information literacy published in 2020.

Findings

The paper provides a brief description of all 440 sources and highlights sources that contain unique or significant scholarly contributions.

Originality/value

The information may be used by librarians, researchers and anyone interested in a quick and comprehensive reference to literature on library instruction and information literacy.

Details

Reference Services Review, vol. 49 no. 3/4
Type: Research Article
ISSN: 0090-7324

Keywords

1 – 10 of over 2000