Search results
1 – 10 of over 9000Hamid Reza Nikkhah, Varun Grover and Rajiv Sabherwal
This study aims to argue that user’s continued use behavior is contingent upon two perceptions (i.e. the app and the provider). This study examines the moderating effects of…
Abstract
Purpose
This study aims to argue that user’s continued use behavior is contingent upon two perceptions (i.e. the app and the provider). This study examines the moderating effects of user’s perceptions of apps and providers on the effects of security and privacy concerns and investigate whether assurance mechanisms decrease such concerns.
Design/methodology/approach
This study conducts a scenario-based survey with 694 mobile cloud computing (MCC) app users to understand their perceptions and behaviors.
Findings
This study finds that while perceived value of data transfer to the cloud moderates the effects of security and privacy concerns on continued use behavior, trust only moderates the effect of privacy concerns. This study also finds that perceived effectiveness of security and privacy intervention impacts privacy concerns but does not decrease security concerns.
Originality/value
Prior mobile app studies mainly focused on mobile apps and did not investigate the perceptions of app providers along with app features in the same study. Furthermore, International Organization for Standardization 27018 certification and privacy policy notification are the interventions that exhibit data assurance mechanisms. However, it is unknown whether these interventions are able to decrease users’ security and privacy concerns after using MCC apps.
Details
Keywords
Hamid Reza Nikkhah and Rajiv Sabherwal
In this research, the authors focus on mobile cloud computing (MCC) collaboration apps that are multiplatform and send the users’ data to the cloud. Despite their benefits, MCC…
Abstract
Purpose
In this research, the authors focus on mobile cloud computing (MCC) collaboration apps that are multiplatform and send the users’ data to the cloud. Despite their benefits, MCC collaboration apps raise privacy concerns, as the users’ information is sent to the cloud where users lack direct control. This study aims to investigate why users disclose information to MCC apps despite privacy concerns and examine the effect of security and assurance mechanisms (i.e. privacy policies and ISO/IEC 27018 certification) on users’ perceptions and information disclosure. Based on three surveys conducted in 2016 (n = 515), 2017 (n = 505) and 2018 (n = 543), this study finds mixed results regarding the relationships among security, assurance mechanisms, utilitarian benefits and information disclosure.
Design/methodology/approach
This study conducted three scenario-based surveys in the USA in 2016 (n = 515), 2017 (n = 505) and 2018 (n = 543).
Findings
This study finds mixed results of relationships among security, assurance mechanisms, utilitarian benefit and information disclosure.
Originality/value
With proliferation of MCC apps, the investigation of how users make privacy decision to disclose personal information to these apps is sparse. This study, for the first time, investigates whether the signals of assurance mechanism decrease users’ privacy concerns. This study also examines the interplay between security and privacy within information disclosure behavior. Finally, this study was conducted in 3 years to enhance the generalizability and robustness of findings.
Details
Keywords
Mauricio S. Featherman, Anthony D. Miyazaki and David E. Sprott
The paper aims to examine ways to reduce privacy risk and its effects so that adoption of e‐services can be enhanced.
Abstract
Purpose
The paper aims to examine ways to reduce privacy risk and its effects so that adoption of e‐services can be enhanced.
Design/methodology/approach
Consumers that form a viable target market for an e‐service are presented with the task of experiencing the e‐service and expressing their attitudes and intentions toward it. Structural equation modeling is used to analyze the responses.
Findings
The paper finds that consumer beliefs that the e‐service will be easy to use and that the e‐service provider is credible and capable reduce privacy risk and its effects, thus enhancing adoption likelihood.
Research limitations/implications
The focus on a financial services product (online bill paying) suggests that similar research should be conducted with other high‐risk e‐services (such as those dealing with healthcare) and lower‐risk e‐services (such as subscription services and social networks).
Practical implications
In addition to addressing consumers' privacy risk directly, e‐service providers can also reduce privacy risk and its effects by enhancing corporate credibility and perceived ease of use of the service. Increased assessments of privacy risk perceptions and efforts to reduce those perceptions will likely yield higher usage rates for e‐services.
Originality/value
The use of the technology acceptance model from information systems research, combined with a multi‐faceted conceptualization of privacy risk, moves the examination of privacy risk to a higher level, particularly in light of the examination of the additional factors of perceived ease of use and corporate credibility.
Details
Keywords
Anil Gurung and M.K. Raja
Privacy and security concerns of consumers have been touted as one of the hindrances to the growth of e-commerce. These concerns increase the risk perception of consumers…
Abstract
Purpose
Privacy and security concerns of consumers have been touted as one of the hindrances to the growth of e-commerce. These concerns increase the risk perception of consumers. Understanding the consequences of privacy and security concerns and their relationship to risk perceptions may provide a solution. The relationship between privacy and security is investigated using the theory of planned behavior. The study aims to examine the relationship of trust, privacy and security concerns to the risk perception adoption of e-commerce. The results from a survey validate the model.
Design/methodology/approach
Data were collected using survey from undergraduate business students. The respondents were requested to select a specific product that they plan to purchase in the next six months. After selecting a product, the respondents were requested to report an online company that they have recently visited which offers the selected product. The respondents were requested to fill out the survey with regard to their selected online company. Time given was approximately 20 min.
Findings
The results suggest that privacy and security concerns and trust beliefs had effects on risk perception. Among these effects, trust had the largest effect followed by privacy and security concerns. Furthermore, risk perception and trust beliefs had effects on attitude. The effect of trust beliefs on attitude was larger than the effect of risk perception on attitude. Similarly, subjective norm, perceived behavioral control and attitude had a positive and direct effect on intention to be involved in e-commerce.
Research limitations/implications
The first limitation of this study is the use of student subjects. Because this study took place in an educational setting, its generalizability to the general population of consumers lacks to some degree. The second limitation of this study is mono-method bias.
Practical implications
The effect of privacy concerns on risk perception was larger than that of security concerns. Because the consumers get more experienced and sophisticated using the Web, the security concerns that they may have had at the beginning are not reflected in their risk perceptions. It is likely that they have adopted protective measures on their own to defend their privacy online. An example of such a measure would be providing false information to online companies when asked to submit personal information.
Originality/value
The major contributions of this study are developing and validating an integrative framework of e-commerce adoption at the individual level. The model includes privacy and security concerns, risk perception and trust beliefs. This study also highlighted the distinction of constructs of privacy and security concerns and showed their differential effects on other related constructs in the research model.
Details
Keywords
Marcelo Vinhal Nepomuceno, Michel Laroche, Marie‐Odile Richard and Axel Eggert
This paper aims to explore the association between intangibility and perceived risk using a sample of North American households. This relationship is explored within two purchase…
Abstract
Purpose
This paper aims to explore the association between intangibility and perceived risk using a sample of North American households. This relationship is explored within two purchase environments, namely online and offline. The authors also investigated the moderating effects of privacy, system security and general security concerns when purchasing in an online environment.
Design/methodology/approach
The survey was delivered to 156 households in a small town in the Midwest and collected upon completion.
Findings
The perception of risk is increased when two negatively loaded pieces of information are processed simultaneously (i.e. product intangibility and privacy concern). Furthermore, system security was identified as the most relevant concern in e‐commerce.
Research limitations/implications
The representativeness of the sample is limited. Theoretical and managerial implications are discussed.
Originality/value
The results provide interesting insights about the generalizability of previous findings based on student samples, and show the importance of privacy concerns, system security concerns, general security concerns for those purchasing in online environments.
Details
Keywords
Mohamed Abdelhamid, Victoria Kisekka and Spyridon Samonas
The purpose of this study is to understand why individuals choose to avoid using e-services due to security concerns and perceived risk when these factors are affected by the…
Abstract
Purpose
The purpose of this study is to understand why individuals choose to avoid using e-services due to security concerns and perceived risk when these factors are affected by the perceived degree of government cybersecurity preparedness against cyberattacks.
Design/methodology/approach
The authors adopt the information systems success model to predict the role of government security preparedness efforts in influencing the determinants of e-services avoidance. The conceptual model includes four variables: security concerns, perceived risk of cyberattacks, perceived government cybersecurity preparedness and e-services avoidance. Data from 774 participants were used to analyze our conceptual model.
Findings
First, the findings show that security concerns regarding personal information safety and perceived risk of cyberattacks are barriers to e-services use, with the former having a stronger effect. Second, the findings showed that perceived government cybersecurity preparedness significantly reduces security concerns and perceived risk of cyberattacks. Third, the post hoc group analysis between individuals with a bachelor’s degree or higher versus those without a bachelor’s degree showed that the effect of both security concerns and perceived risk of cyberattacks on e-services avoidance was greater for individuals without a bachelor’s degree. The same relationship between perceived risk of cyberattacks and e-services avoidance was not supported for individuals with a bachelor’s degree or higher.
Originality/value
Extant privacy research fails to adequately examine the role of institutional factors, such as government efforts, and how these mitigate or amplify cybersecurity concerns and risks related to e-services. This research takes the first step toward addressing this limitation by examining the influence of government cybersecurity preparedness efforts on the determinants of e-services avoidance.
Details
Keywords
Recently, the spread of malicious IT has been causing serious privacy threats to mobile device users, which hampers the efficient use of mobile devices for individual and…
Abstract
Purpose
Recently, the spread of malicious IT has been causing serious privacy threats to mobile device users, which hampers the efficient use of mobile devices for individual and business. To understand the privacy security assurance behavior of mobile device users, this study aims to develop a theoretical model based on technology threat avoidance theory (TTAT), to capture motivation factors in predicting mobile device user’s voluntary adoption of security defensive software.
Design/methodology/approach
A survey is conducted to validate the proposed research model. A total of 284 valid survey data are collected and partial least square (PLS)-based structural equation modeling is used to test the model.
Findings
Results highlight that both privacy concern and coping appraisal have a significant impact on the intention to adopt the security defensive software. Meanwhile, privacy security awareness is a crucial determinant to stimulate mobile device user’s threat and coping appraisal processes in the voluntary context. The results indicate that emotional-based coping appraisal of anticipated regret is also imperative to arouse personal intention to adopt the security tool.
Practical implications
This result should be of interest to practitioners. Information security awareness training and education programs should be developed in a variety of forms to intensify personal security knowledge and skills. Besides, emotion-based warnings can be designed to arouse users’ protection behavior.
Originality/value
This paper embeds TTAT theory within the mobile security context. The authors extent TTAT by taking anticipated regret into consideration to capture emotional-based coping appraisal, and information security awareness is employed as the antecedent factor. The extent offers a useful starting point for the further empirical study of emotion elements in the information security context.
Details
Keywords
Amit Shankar, Rambalak Yadav, Abhishek Behl and Manish Gupta
This study aims to examine the effect of dataveillance on resistance towards online payment. Using a moderated-mediation framework, the study also investigates the mediating…
Abstract
Purpose
This study aims to examine the effect of dataveillance on resistance towards online payment. Using a moderated-mediation framework, the study also investigates the mediating effects of perceived privacy and security concerns and how these mediating effects are moderated by corporate credibility, consumer scepticism and consumer empowerment.
Design/methodology/approach
A scenario-based experimental design was performed to examine the proposed hypotheses. Analysis of covariance and PROCESS macro were used to examine the hypotheses by analysing 312 collected responses.
Findings
The results indicated the dataveillance positively affects consumer resistance towards online payment. The results also suggested that corporate credibility and consumer scepticism significantly moderates the association between dataveillance and resistance towards online payment.
Practical implications
The findings of this study will help online retailers to reduce consumers’ perceived privacy and security concerns, thereby reducing consumers’ resistance towards online payment.
Originality/value
Theoretically, the study contributes to privacy, consumer behaviour, online payment and cognitive-motivational-relational theory literature.
Details
Keywords
Chao Lu and Xiaohai Xin
The promotion of autonomous vehicles introduces privacy and security risks, underscoring the pressing need for responsible innovation implementation. To more effectively address…
Abstract
Purpose
The promotion of autonomous vehicles introduces privacy and security risks, underscoring the pressing need for responsible innovation implementation. To more effectively address the societal risks posed by autonomous vehicles, considering collaborative engagement of key stakeholders is essential. This study aims to provide insights into the governance of potential privacy and security issues in the innovation of autonomous driving technology by analyzing the micro-level decision-making processes of various stakeholders.
Design/methodology/approach
For this study, the authors use a nuanced approach, integrating key stakeholder theory, perceived value theory and prospect theory. The study constructs a model based on evolutionary game for the privacy and security governance mechanism of autonomous vehicles, involving enterprises, governments and consumers.
Findings
The governance of privacy and security in autonomous driving technology is influenced by key stakeholders’ decision-making behaviors and pivotal factors such as perceived value factors. The study finds that the governmental is influenced to a lesser extent by the decisions of other stakeholders, and factors such as risk preference coefficient, which contribute to perceived value, have a more significant influence than appearance factors like participation costs.
Research limitations/implications
This study lacks an investigation into the risk sensitivity of various stakeholders in different scenarios.
Originality/value
The study delineates the roles and behaviors of key stakeholders and contributes valuable insights toward addressing pertinent risk concerns within the governance of autonomous vehicles. Through the study, the practical application of Responsible Innovation theory has been enriched, addressing the shortcomings in the analysis of micro-level processes within the framework of evolutionary game.
Details
Keywords
Thi Huyen Pham, Thuy-Anh Phan, Phuong-Anh Trinh, Xuan Bach Mai and Quynh-Chi Le
This study aims to ascertain the impact of data collecting awareness on perceived information security concerns and information-sharing behavior on social networking sites.
Abstract
Purpose
This study aims to ascertain the impact of data collecting awareness on perceived information security concerns and information-sharing behavior on social networking sites.
Design/methodology/approach
Based on communication privacy management theory, the study forecasted the relationship between information-sharing behavior and awareness of data collecting purposes, data collection tactics and perceived security risk using structural equation modeling analysis and one-way ANOVA. The sample size of 521 young social media users in Vietnam, ages 18 to 34, was made up of 26.7% men and 73.3% women. When constructing the questionnaire survey method with lone source respondents, the individual’s unique awareness and experiences with using online social networks (OSNs) were taken into account.
Findings
The results of the investigation demonstrate a significant relationship between information-sharing and awareness of data collecting, perceptions of information security threats and behavior. Social media users have used OSN privacy settings and paid attention to the sharing restriction because they are concerned about data harvesting.
Research limitations/implications
This study was conducted among young Vietnamese social media users, reflecting specific characteristics prevalent in the Vietnamese environment, and hence may be invalid in other nations’ circumstances.
Practical implications
Social media platform providers should improve user connectivity by implementing transparent privacy policies that allow users to choose how their data are used; have clear privacy statements and specific policies governing the use of social media users’ data that respect users’ consent to use their data; and thoroughly communicate how they collect and use user data while promptly detecting any potential vulnerabilities within their systems.
Originality/value
The authors ascertain that the material presented in this manuscript will not infringe upon any statutory copyright and that the manuscript will not be submitted elsewhere while under Journal of Information, Communication and Ethics in Society review.
Details