Search results

1 – 10 of over 28000
Article
Publication date: 10 July 2009

Chen Jianping and Yang Zhongwei

The purpose of this paper is to examine the extent to which financial privacy is present and necessary in dealings between banks and clients in China.

473

Abstract

Purpose

The purpose of this paper is to examine the extent to which financial privacy is present and necessary in dealings between banks and clients in China.

Design/methodology/approach

This paper provides a comparative study drawing, in particular, on developments in the USA.

Findings

It is a trend in legislation in the western developed countries that the right to privacy is taken seriously and private information in the financial activities is protected by law. The legislation in the USA is typically systematic and complete. The fact that financial privacy protection is sparsely stipulated in finance or administrative laws but the protection of privacy has yet not been systematically written into law in China so far, which is inconsistent with the current situations of the financial industry. China should deal with the relationship between banks and clients, administrative power and personal rights, judicial interpretation and legislation from the aspect of financial practice, so as to set up the legal system to protect financial privacy by learning from the legislation in the USA based on the national conditions.

Originality/value

The paper provides a systematic view of the value of financial privacy in the modern world, with recommendations for reform in China.

Details

International Journal of Law and Management, vol. 51 no. 4
Type: Research Article
ISSN: 1754-243X

Keywords

Article
Publication date: 28 February 2024

Mustafa Saritepeci, Hatice Yildiz Durak, Gül Özüdoğru and Nilüfer Atman Uslu

Online privacy pertains to an individual’s capacity to regulate and oversee the gathering and distribution of online information. Conversely, online privacy concern (OPC) pertains…

Abstract

Purpose

Online privacy pertains to an individual’s capacity to regulate and oversee the gathering and distribution of online information. Conversely, online privacy concern (OPC) pertains to the protection of personal information, along with the worries or convictions concerning potential risks and unfavorable outcomes associated with its collection, utilization and distribution. With a holistic approach to these relationships, this study aims to model the relationships between digital literacy (DL), digital data security awareness (DDSA) and OPC and how these relationships vary by gender.

Design/methodology/approach

The participants of this study are 2,835 university students. Data collection tools in the study consist of personal information form and three different scales. Partial least squares (PLS), structural equation modeling (SEM) and multi-group analysis (MGA) were used to test the framework determined in the context of the research purpose and to validate the proposed hypotheses.

Findings

DL has a direct and positive effect on digital data security awareness (DDSA), and DDSA has a positive effect on OPC. According to the MGA results, the hypothesis put forward in both male and female sub-samples was supported. The effect of DDSA on OPC is higher for males.

Originality/value

This study highlights the positive role of DL and perception of data security on OPC. In addition, MGA findings by gender reveal some differences between men and women.

Peer review

The peer review history for this article is available at: https://publons.com/publon/10.1108/OIR-03-2023-0122

Details

Online Information Review, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1468-4527

Keywords

Article
Publication date: 15 February 2024

Maosheng Yang, Lei Feng, Honghong Zhou, Shih-Chih Chen, Ming K. Lim and Ming-Lang Tseng

This study aims to empirically analyse the influence mechanism of perceived interactivity in real estate APP which affects consumers' psychological well-being. With the growing…

Abstract

Purpose

This study aims to empirically analyse the influence mechanism of perceived interactivity in real estate APP which affects consumers' psychological well-being. With the growing application of human–machine interaction in real estate APP, it is crucial to utilize human–machine interaction to stimulate perceived interactivity between humans and machines to positively impact consumers' psychological well-being and sustainable development of real estate APP. However, it is unclear whether perceived interactivity improves consumers' psychological well-being.

Design/methodology/approach

This study proposes and examines a theoretical model grounded in the perceived interactivity theory, considers the relationship between perceived interactivity and consumers' psychological well-being and explores the mediating effect of perceived value and the moderating role of privacy concerns. It takes real estate APP as the research object, analyses the data of 568 consumer samples collected through questionnaires and then employs structural equation modelling to explore and examine the proposed theoretical model of this study.

Findings

The findings are that perceived interactivity (i.e. human–human interaction and human–information interaction) positively influences perceived value, which in turn affects psychological well-being, and that perceived value partially mediates the effect of perceived interaction on psychological well-being. More important findings are that privacy concerns not only negatively moderate human–information interaction on perceived value, but also negatively moderate the indirect effects of human–information interaction on users' psychological well-being through perceived value.

Originality/value

This study expands the context on perceived interaction and psychological well-being in the field of real estate APP, validating the mediating role and boundary conditions of perceived interactivity created by human–machine interaction on consumers' psychological well-being, and suggesting positive implications for practitioners exploring human–machine interaction technologies to improve the perceived interaction between humans and machines and thus enhance consumer psychological well-being and span sustainable development of real estate APP.

Details

Industrial Management & Data Systems, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0263-5577

Keywords

Open Access
Article
Publication date: 1 February 2024

Meenakshi Handa, Ronika Bhalla and Parul Ahuja

Increasing incidents of privacy invasion on social networking sites (SNS) are intensifying the concerns among stakeholders about the misuse of personal data. However, there seems…

Abstract

Purpose

Increasing incidents of privacy invasion on social networking sites (SNS) are intensifying the concerns among stakeholders about the misuse of personal data. However, there seems to be limited research on exploring the impact of specific privacy concerns on users’ intention to engage in various privacy protection behaviors. This study aims to examine the role of social privacy concerns, institutional privacy concerns and privacy self-efficacy as antecedents of privacy protection–related control activities intention among young adults active on SNS.

Design/methodology/approach

Data collected from 284 young adults active on SNS was analyzed through partial least squares structural equation modeling using Smart PLS.

Findings

The results indicate that institutional privacy concerns, social privacy concerns and privacy self-efficacy positively influence the control activities intention of SNS users. The extent of privacy self-efficacy and privacy protection-related control activities intention differs among users based on gender.

Research limitations/implications

This study is limited to a population of young adults in the age group of 18–25 years.

Practical implications

The findings of this study form the basis for specific recommendations addressing the different types of privacy concerns experienced by social media users, promoting responsible privacy control behaviors on online platforms and discouraging the possible misuse of information by third parties.

Originality/value

This study validates a theoretical framework that can contribute to future investigations concerning the use of SNS. The study findings form the basis for a set of practical recommendations for policymakers, SNS platforms and users.

Details

Vilakshan - XIMB Journal of Management, vol. 21 no. 1
Type: Research Article
ISSN: 0973-1954

Keywords

Article
Publication date: 21 March 2008

Vasilios Katos and Ahmed Patel

This paper aims to propose a tool to help policy makers understand the dynamic relationships between security and privacy on a strategic (macro) level.

1497

Abstract

Purpose

This paper aims to propose a tool to help policy makers understand the dynamic relationships between security and privacy on a strategic (macro) level.

Design/methodology/approach

The methodology is ported from the discipline of Macroeconomics, and applied to the information security and privacy domain. The methodology adopted is the so‐called “cross methodology” which claims ownership of the well‐known supply/demand market equilibrium exercise.

Findings

Early evaluation reveals that this is a potentially very effective tool in understanding societal behaviour and position towards information security and privacy and therefore makes this a suitable tool for investigating and exploring scenarios that can assist in policy making.

Originality/value

Up to date, research on the economics of security and privacy has been primarily focusing on a micro level. The main contribution of this paper is a methodology for investigating privacy and security on a macro level. We believe that our approach in undertaking this research is new and looking at the issues and relationships between security and privacy at a macro level, gives a better understanding of the problems at hand and how to resolve them.

Practical implications

The proposed tool may increase the efficiency of policy making and planning as it enables the policy makers on a governmental and strategic level to run scenarios in order to investigate the effect of their decisions (for example, an introduction of a stricter law relating to computer misuse) to the delicate balance of security and privacy.

Details

Information Management & Computer Security, vol. 16 no. 1
Type: Research Article
ISSN: 0968-5227

Keywords

Article
Publication date: 1 August 1999

Beth Simone Noveck

Looks at an attempt by a Hong Kong legislator to find out the Chinese Government’s information on her prior to their privacy law. Concludes the unwillingness of governments and…

249

Abstract

Looks at an attempt by a Hong Kong legislator to find out the Chinese Government’s information on her prior to their privacy law. Concludes the unwillingness of governments and courts to enforce basic privacy principles of international law and own national legislation, does not bode well for data privacy acts, with regard to the cots of human privacy and security.

Details

info, vol. 1 no. 4
Type: Research Article
ISSN: 1463-6697

Keywords

Article
Publication date: 19 February 2024

Donia Waseem, Shijiao (Joseph) Chen, Zhenhua (Raymond) Xia, Nripendra P. Rana, Balkrushna Potdar and Khai Trieu Tran

In the online environment, consumers increasingly feel vulnerable due to firms’ expanding capabilities of collecting and using their data in an unsanctioned manner. Drawing from…

Abstract

Purpose

In the online environment, consumers increasingly feel vulnerable due to firms’ expanding capabilities of collecting and using their data in an unsanctioned manner. Drawing from gossip theory, this research focuses on two key suppressors of consumer vulnerability: transparency and control. Previous studies conceptualize transparency and control from rationalistic approaches that overlook individual experiences and present a unidimensional conceptualization. This research aims to understand how individuals interpret transparency and control concerning privacy vulnerability in the online environment. Additionally, it explores strategic approaches to communicating the value of transparency and control.

Design/methodology/approach

An interpretivism paradigm and phenomenology were adopted in the research design. Data were collected through semi-structured interviews with 41 participants, including consumers and experts, and analyzed through thematic analysis.

Findings

The findings identify key conceptual dimensions of transparency and control by adapting justice theory. They also reveal that firms can communicate assurance, functional, technical and social values of transparency and control to address consumer vulnerability.

Originality/value

This research makes the following contributions to the data privacy literature. The findings exhibit multidimensional and comprehensive conceptualizations of transparency and control, including user, firm and information perspectives. Additionally, the conceptual framework combines empirical insights from both experiencers and observers to offer an understanding of how transparency and control serve as justice mechanisms to effectively tackle the issue of unsanctioned transmission of personal information and subsequently address vulnerability. Lastly, the findings provide strategic approaches to communicating the value of transparency and control.

Details

Internet Research, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1066-2243

Keywords

Article
Publication date: 14 May 2020

Gajendra Liyanaarachchi

This paper aims to demonstrate how building competency in privacy can be used to transform the corporate strategy to generate a sustainable competitive advantage. A novel…

Abstract

Purpose

This paper aims to demonstrate how building competency in privacy can be used to transform the corporate strategy to generate a sustainable competitive advantage. A novel framework is presented as a guide to redesigning strategy by striking a balance between customer expectation and organizational objectives. In doing so, the paper offers four possible outcomes of accommodation, accumulation, association and affiliation, providing illustrations to each scenario for strategy formulation.

Design/methodology/approach

The relationship between privacy paradox and corporate strategy was examined through a qualitative research study. The author conducted 30 in-depth interviews on grounded theory methodology investigating customer insights on the nature and extent of privacy protection associated with e-commerce and organizational approach.

Findings

The customers are dissatisfied with existing data security strategies adopted by firms in protecting privacy. The over-reliance on systems has negatively influenced the communication between the organization and customers, leading to a possible competitive disadvantage. The firms need to redesign privacy strategy shifting from a system-driven approach to providing personalized service.

Originality/value

This paper presents a novel framework the privacy strategy matrix (PSM), introducing privacy as a strategic expedient in transforming corporate strategy facilitating privacy protection as a metaphor for differentiation. PSM framework provides a standard to evaluate the effectiveness of the corporate strategy in managing privacy manifesting a path toward deriving a sustainable competitive advantage.

Details

Journal of Business Strategy, vol. 41 no. 5
Type: Research Article
ISSN: 0275-6668

Keywords

Open Access
Article
Publication date: 14 February 2024

Chao Lu and Xiaohai Xin

The promotion of autonomous vehicles introduces privacy and security risks, underscoring the pressing need for responsible innovation implementation. To more effectively address…

Abstract

Purpose

The promotion of autonomous vehicles introduces privacy and security risks, underscoring the pressing need for responsible innovation implementation. To more effectively address the societal risks posed by autonomous vehicles, considering collaborative engagement of key stakeholders is essential. This study aims to provide insights into the governance of potential privacy and security issues in the innovation of autonomous driving technology by analyzing the micro-level decision-making processes of various stakeholders.

Design/methodology/approach

For this study, the authors use a nuanced approach, integrating key stakeholder theory, perceived value theory and prospect theory. The study constructs a model based on evolutionary game for the privacy and security governance mechanism of autonomous vehicles, involving enterprises, governments and consumers.

Findings

The governance of privacy and security in autonomous driving technology is influenced by key stakeholders’ decision-making behaviors and pivotal factors such as perceived value factors. The study finds that the governmental is influenced to a lesser extent by the decisions of other stakeholders, and factors such as risk preference coefficient, which contribute to perceived value, have a more significant influence than appearance factors like participation costs.

Research limitations/implications

This study lacks an investigation into the risk sensitivity of various stakeholders in different scenarios.

Originality/value

The study delineates the roles and behaviors of key stakeholders and contributes valuable insights toward addressing pertinent risk concerns within the governance of autonomous vehicles. Through the study, the practical application of Responsible Innovation theory has been enriched, addressing the shortcomings in the analysis of micro-level processes within the framework of evolutionary game.

Details

Asia Pacific Journal of Innovation and Entrepreneurship, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2071-1395

Keywords

Article
Publication date: 16 February 2024

Chih-Hui Shieh, I-Ling Ling and Yi-Fen Liu

As a smart service, location-based advertising (LBA) integrates advanced technologies to deliver personalized messages based on a user’s real-time geographic location and needs…

Abstract

Purpose

As a smart service, location-based advertising (LBA) integrates advanced technologies to deliver personalized messages based on a user’s real-time geographic location and needs. However, research has shown that privacy concerns threaten the diffusion of LBA. This research investigates how privacy-related factors (i.e. LBA type, privacy self-efficacy (PSE) and consumer generation) impact consumers’ value-in-use and their intention to use LBA.

Design/methodology/approach

This study developed and examined an LBA value-in-use framework that integrates the role of LBA type, consumers’ PSE and consumer generation into the technology acceptance model (TAM). Data were collected through two experiments in the field with a total of 374 consumers. The proposed relationships were tested using PROCESS modeling.

Findings

The results reveal that pull (vs push) LBA causes higher value-in-use in terms of perceived usefulness and perceived ease of use, leading to greater usage intention. Further, the differences in the mediated relationship between pull- and push-LBA are larger among consumers of low PSE (vs high PSE) and Generation Z (vs other generations). The findings suggest that the consumer value-in-use brought about by LBA diminishes when using push-LBA for low PSE and Generation Z consumers.

Originality/value

This research is the first to integrate the privacy-related interactions of LBA type and consumer characteristics into TAM to develop a TAM-based LBA value-in-use framework. This study contributes to the literature on service value-in-use, smart services and LBA by clarifying the boundary conditions that determine the effectiveness of LBA in enhancing consumers’ value-in-use.

Details

Journal of Service Theory and Practice, vol. 34 no. 2
Type: Research Article
ISSN: 2055-6225

Keywords

1 – 10 of over 28000