Search results
1 – 10 of 197These take to 15 the number of US states with consumer privacy laws in effect or pending. Five new state privacy regimes will come into force this year, four more…
Details
DOI: 10.1108/OXAN-DB284858
ISSN: 2633-304X
Keywords
Geographic
Topical
Thi Huyen Pham, Thuy-Anh Phan, Phuong-Anh Trinh, Xuan Bach Mai and Quynh-Chi Le
This study aims to ascertain the impact of data collecting awareness on perceived information security concerns and information-sharing behavior on social networking sites.
Abstract
Purpose
This study aims to ascertain the impact of data collecting awareness on perceived information security concerns and information-sharing behavior on social networking sites.
Design/methodology/approach
Based on communication privacy management theory, the study forecasted the relationship between information-sharing behavior and awareness of data collecting purposes, data collection tactics and perceived security risk using structural equation modeling analysis and one-way ANOVA. The sample size of 521 young social media users in Vietnam, ages 18 to 34, was made up of 26.7% men and 73.3% women. When constructing the questionnaire survey method with lone source respondents, the individual’s unique awareness and experiences with using online social networks (OSNs) were taken into account.
Findings
The results of the investigation demonstrate a significant relationship between information-sharing and awareness of data collecting, perceptions of information security threats and behavior. Social media users have used OSN privacy settings and paid attention to the sharing restriction because they are concerned about data harvesting.
Research limitations/implications
This study was conducted among young Vietnamese social media users, reflecting specific characteristics prevalent in the Vietnamese environment, and hence may be invalid in other nations’ circumstances.
Practical implications
Social media platform providers should improve user connectivity by implementing transparent privacy policies that allow users to choose how their data are used; have clear privacy statements and specific policies governing the use of social media users’ data that respect users’ consent to use their data; and thoroughly communicate how they collect and use user data while promptly detecting any potential vulnerabilities within their systems.
Originality/value
The authors ascertain that the material presented in this manuscript will not infringe upon any statutory copyright and that the manuscript will not be submitted elsewhere while under Journal of Information, Communication and Ethics in Society review.
Details
Keywords
Leo Van Audenhove, Lotte Vermeire, Wendy Van den Broeck and Andy Demeulenaere
The purpose of this paper is to analyse data literacy in the new Digital Competence Framework for Citizens (DigComp 2.2). Mid-2022 the Joint Research Centre of the European…
Abstract
Purpose
The purpose of this paper is to analyse data literacy in the new Digital Competence Framework for Citizens (DigComp 2.2). Mid-2022 the Joint Research Centre of the European Commission published a new version of the DigComp (EC, 2022). This new version focusses more on the datafication of society and emerging technologies, such as artificial intelligence. This paper analyses how DigComp 2.2 defines data literacy and how the framework looks at this from a societal lens.
Design/methodology/approach
This study critically examines DigComp 2.2, using the data literacy competence model developed by the Knowledge Centre for Digital and Media Literacy Flanders-Belgium. The examples of knowledge, skills and attitudes focussing on data literacy (n = 84) are coded and mapped onto the data literacy competence model, which differentiates between using data and understanding data.
Findings
Data literacy is well-covered in the framework, but there is a stronger emphasis on understanding data rather than using data, for example, collecting data is only coded once. Thematically, DigComp 2.2 primarily focusses on security and privacy (31 codes), with less attention given to the societal impact of data, such as environmental impact or data fairness.
Originality/value
Given the datafication of society, data literacy has become increasingly important. DigComp is widely used across different disciplines and now integrates data literacy as a required competence for citizens. It is, thus, relevant to analyse its views on data literacy and emerging technologies, as it will have a strong impact on education in Europe.
Details
Keywords
David Goyeneche, Stephen Singaraju and Luis Arango
This paper explores the similarities and differences in privacy attitudes, trust and risk beliefs between younger and older adults on social networking sites. The objective of the…
Abstract
Purpose
This paper explores the similarities and differences in privacy attitudes, trust and risk beliefs between younger and older adults on social networking sites. The objective of the article is to ascertain whether any notable differences exist between younger (18–25 years old) and older (55+ years old) adults in how trust and risk are influenced by privacy concerns upon personal information disclosure on social media.
Design/methodology/approach
A Likert scale instrument validated in previous research was employed to gather the responses of 148 younger and 152 older adults. The scale was distributed through Amazon Mechanical Turk. Data were analyzed through partial least squares structural equation modeling.
Findings
No significant differences were found between younger and older adults in how social media privacy concerns related to trust and risk beliefs. Two privacy concern dimensions were found to have a significant influence on perceptions of risk for both populations: collection and control. Predictability and a sense of control are proposed as two conceptual approaches that can explain these findings.
Originality/value
This article is the first one to explore age differences in privacy concerns, trust and risk on social media employing conceptual developments and an instrument specifically tailored to the social media environment. Based on the findings, several strategies are suggested to keep privacy concerns on social media at a minimum, reduce risk perceptions and increase users' trust.
Details
Keywords
This paper aims to examine the probable effect of the General Data Protection Regulation of the European Union on the transfer of financial intelligence to a third country without…
Abstract
Purpose
This paper aims to examine the probable effect of the General Data Protection Regulation of the European Union on the transfer of financial intelligence to a third country without an adequacy decision.
Design/methodology/approach
This is an analytical study of the financial intelligence exchange mechanisms between the Bangladesh Financial Intelligence Unit (BFIU) and its foreign counterparts. The research analyses the key challenges this national agency faces in using the Egmont Group membership to import financial intelligence from jurisdictions with a superior data protection regime.
Findings
Membership in the Egmont Group of Financial Intelligence Units does not guarantee unrestricted international intelligence exchange. Existing data protection regulations in Bangladesh are inadequate. This may forbid the transfer of the financial intelligence linked to European Union (EU) data subjects to Bangladesh.
Research limitations/implications
This paper does not cover a thorough discussion on any specific alternative tools for data transfer from the EU to a third country except for “appropriate safeguards” options.
Practical implications
The results of this study will help understand the existing legal and institutional limitations that may prevent intelligence exchange between the BFIU and its EU counterparts.
Originality/value
The study helps ascertain the legislative reform necessary in Bangladesh, a third country, to facilitate the transfer of financial intelligence from the EU.
Details
Keywords
Donia Waseem, Shijiao (Joseph) Chen, Zhenhua (Raymond) Xia, Nripendra P. Rana, Balkrushna Potdar and Khai Trieu Tran
In the online environment, consumers increasingly feel vulnerable due to firms’ expanding capabilities of collecting and using their data in an unsanctioned manner. Drawing from…
Abstract
Purpose
In the online environment, consumers increasingly feel vulnerable due to firms’ expanding capabilities of collecting and using their data in an unsanctioned manner. Drawing from gossip theory, this research focuses on two key suppressors of consumer vulnerability: transparency and control. Previous studies conceptualize transparency and control from rationalistic approaches that overlook individual experiences and present a unidimensional conceptualization. This research aims to understand how individuals interpret transparency and control concerning privacy vulnerability in the online environment. Additionally, it explores strategic approaches to communicating the value of transparency and control.
Design/methodology/approach
An interpretivism paradigm and phenomenology were adopted in the research design. Data were collected through semi-structured interviews with 41 participants, including consumers and experts, and analyzed through thematic analysis.
Findings
The findings identify key conceptual dimensions of transparency and control by adapting justice theory. They also reveal that firms can communicate assurance, functional, technical and social values of transparency and control to address consumer vulnerability.
Originality/value
This research makes the following contributions to the data privacy literature. The findings exhibit multidimensional and comprehensive conceptualizations of transparency and control, including user, firm and information perspectives. Additionally, the conceptual framework combines empirical insights from both experiencers and observers to offer an understanding of how transparency and control serve as justice mechanisms to effectively tackle the issue of unsanctioned transmission of personal information and subsequently address vulnerability. Lastly, the findings provide strategic approaches to communicating the value of transparency and control.
Details
Keywords
This article advocates that privacy literacy research and praxis mobilize people toward changing the technological and social conditions that discipline subjects toward advancing…
Abstract
Purpose
This article advocates that privacy literacy research and praxis mobilize people toward changing the technological and social conditions that discipline subjects toward advancing institutional, rather than community, goals.
Design/methodology/approach
This article analyzes theory and prior work on datafication, privacy, data literacy, privacy literacy and critical literacy to provide a vision for future privacy literacy research and praxis.
Findings
This article (1) explains why privacy is a valuable rallying point around which people can resist datafication, (2) locates privacy literacy within data literacy, (3) identifies three ways that current research and praxis have conceptualized privacy literacy (i.e. as knowledge, as a process of critical thinking and as a practice of enacting information flows) and offers a shared purpose to animate privacy literacy research and praxis toward social change and (4) explains how critical literacy can help privacy literacy scholars and practitioners orient their research and praxis toward changing the conditions that create privacy concerns.
Originality/value
This article uniquely synthesizes existing scholarship on data literacy, privacy literacy and critical literacy to provide a vision for how privacy literacy research and praxis can go beyond improving individual understanding and toward enacting social change.
Details
Keywords
Bassam Samir Al-Romeedy and Hazem Ahmed Khairy
This study aims to explore how job performance (EJP) is affected by employees’ perception of organizational politics (POP). It also investigates the mediating roles of workplace…
Abstract
Purpose
This study aims to explore how job performance (EJP) is affected by employees’ perception of organizational politics (POP). It also investigates the mediating roles of workplace stress (WS) and counterproductive work behavior (CWB).
Design/methodology/approach
Data was gathered from employees working in category (A) travel agencies and five-star hotels in Egypt. A partial least squares structural equation modeling analysis was conducted using 468 valid responses.
Findings
The findings indicate that there is a negative correlation between POP and EJP. Additionally, there is a positive correlation between POP and CWB as well as WS. The results also demonstrate a negative correlation between WS and CWB with EJP. Moreover, the findings suggest that CWB and WS act as partial mediators in the relationship between POP and EJP.
Originality/value
The research included some ground-breaking investigations. Currently, research on the effects of POP on CWB, WS and EJP is insufficient. As well, the current study attempts to measure the mediating role of CWB and WS in the link between POP and EJP. The current study has filled a gap in the tourism and hospitality literature, human resources management literature and organizational behavior literature by empirically analyzing these links in the context of Egyptian hotels and travel agencies.
目的
本研究旨在探讨员工对组织政治(POP)的看法如何影响工作绩效(EJP)。它还调查了工作场所压力(WS)和适得其反的工作行为(CWB)的中介作用。
设计/方法论/途径
调查收集了埃及 (A) 类旅行社和五星级酒店员工的反馈。对 468 个有效回复进行了 PLS-SEM 分析。
发现
结果显示, POP与员工工作绩效呈负相关, 此外, POP与反生产力工作行为和工作场所压力呈正相关。研究结果还表明, 工作场所压力和适得其反的工作行为与员工的工作绩效之间存在负相关关系。此外, 研究结果表明 CWB 和 WS 调节 POP 和 EJP 之间的关系。
原创性/价值
该研究包括一些开创性的调查。目前, POP对CWB、WS、EJP影响的研究还不够。从上下文相关性的角度来看, 无法对酒店和旅行社中这些变量之间的联系进行实证分析。当前的研究通过在埃及酒店和旅行社的背景下对这些联系进行实证分析, 填补了旅游和酒店文献、人力资源管理文献和组织行为文献的空白。
Objetivo
Este estudio pretende explorar cómo el desempeño laboral (EJP) se ve afectado por la percepción que tienen los empleados de la política organizativa (POP). También investiga los papeles mediadores del estrés laboral (WS) y el comportamiento laboral contraproducente (CWB).
Diseño/metodología/enfoque
Se recopilaron datos de empleados que trabajaban en agencias de viajes de categoría (A) y hoteles de cinco estrellas en Egipto. Se realizó un análisis de Modelización de Ecuaciones Estructurales por Mínimos Cuadrados Parciales (PLS-SEM) utilizando 468 respuestas válidas.
Resultados
Los resultados indican que existe una correlación negativa entre POP y EJP. Además, existe una correlación positiva entre POP y CWB, así como WS. Los resultados también demuestran una correlación negativa entre WS y CWB con EJP. Además, los resultados sugieren que CWB y WS actúan como mediadores parciales en la relación entre POP y EJP.
Originalidad/valor
La investigación incluye algunas investigaciones pioneras. En la actualidad, la investigación sobre los efectos de la POP en la CWB, la WS y la EJP es insuficiente. Además, el presente estudio intenta medir el papel mediador de la CWB y la WS en el vínculo entre la POP y la EJP. El presente estudio ha llenado un vacío en la literatura sobre turismo y hotelería, en la literatura sobre gestión de recursos humanos y en la literatura sobre comportamiento organizativo al analizar empíricamente estos vínculos en el contexto de los hoteles y agencias de viajes egipcios.
Details
Keywords
- COVID-19
- Crisis
- Airline promotion
- Message framing
- Risk
- Regulatory focus
- Prevention focus
- Promotion focus
- Framing
- Regulatory
- Message
- 关键词 组织政治认知
- 组织政治工作表现
- 工作压力
- 适得其反的工作行为
- 酒店和旅游业。
- Palabras clave Percepción de la política organizacional
- Rendimiento laboral
- Estrés laboral
- Comportamiento laboral contraproducente
- Industria del turismo y la hotelería