Search results

1 – 10 of over 4000
Article
Publication date: 19 June 2017

Chitra Sharma and Anjali Kaushik

Offshoring is a common practice to operationalize global business strategies. Data protection and privacy assurance are major concerns in such international arrangements. This…

Abstract

Purpose

Offshoring is a common practice to operationalize global business strategies. Data protection and privacy assurance are major concerns in such international arrangements. This paper aims to examine the strategy adopted to ensure privacy assurance in offshoring arrangements.

Design/methodology/approach

This is a literature review to understand privacy assurance strategies adopted in offshoring arrangements and an exploratory case study of captive offshoring arrangement with onshore location in Canada and offshoring locations in India and Philippines. A comparative analysis of the privacy laws and privacy principles of Canada, Philippines and India has been done.

Findings

It was found that at the time of migration of process or work to the offshore location, organizations follow a conformist privacy strategy; however, once in business as usual mode, they follow entrepreneur privacy strategy. Privacy impact assessment (PIA) was found to be an important element in resolving the “administrative problem” of an offshoring organization’s privacy assurance strategy.

Research limitations/implications

The core privacy principles are outlined in the PIA templates; however, the current templates are designed to meet the conformist strategy and may need to be revised to include the cultural aspects, training, audit and information security requirements to plan and deliver on the entrepreneur strategy.

Practical implications

Offshoring organizations can benefit by planning for entrepreneur privacy assurance strategy at the inception stage. Enhancements to PIA templates to facilitate the same have been suggested.

Originality/value

Privacy assurance strategy followed by organizations while offshoring has been examined. This paper suggests extending the PIA process so that it covers privacy assurance requirements in offshoring arrangements. The learnings can be used in managing privacy assurance requirements in similar multi-country offshore arrangements.

Details

Journal of Global Operations and Strategic Sourcing, vol. 10 no. 2
Type: Research Article
ISSN: 2398-5364

Keywords

Article
Publication date: 12 November 2019

Xiang Gong, Kem Z.K. Zhang, Chongyang Chen, Christy M.K. Cheung and Matthew K.O. Lee

Drawing on the control agency theory and the network effect theory, the purpose of this paper is to examine the effect of privacy assurance approaches, network externality and…

1897

Abstract

Purpose

Drawing on the control agency theory and the network effect theory, the purpose of this paper is to examine the effect of privacy assurance approaches, network externality and technology complementarity on consumers’ self-disclosure in mobile payment (MP) applications. The authors identify four types of privacy assurance approaches: perceived effectiveness of privacy setting, perceived effectiveness of privacy policy, perceived effectiveness of industry self-regulation and perceived effectiveness of government legislation. The research model considers how these privacy assurance approaches influence privacy concerns and consumers’ self-disclosure in MP applications under boundary conditions of network externality and technology complementarity.

Design/methodology/approach

An online survey with 647 sample users was conducted to empirically validate the model. The target respondents were current consumers of a popular MP application. The empirical data were analyzed by a structural equation modeling approach.

Findings

The empirical results reveal several major findings. First, privacy assurance approaches can effectively decrease privacy concerns, which ultimately formulates consumers’ self-disclosure in MP applications. Second, network externality and technology complementarity weaken the effect of perceived effectiveness of privacy setting on privacy concerns. Third, network externality and technology complementarity strengthen the relationship between perceived effectiveness of government legislation and privacy concerns, while they have non-significant interaction effect with perceived effectiveness of privacy policy and industry self-regulation on privacy concerns.

Practical implications

MP providers and stakeholders can harness the efficacy of privacy assurance approaches in alleviating privacy concerns and promoting consumers’ self-disclosure in MP applications.

Originality/value

The authors’ work contributes to the information privacy literature by identifying effective privacy assurance approaches in promoting consumers’ self-disclosure in MP applications, and by highlighting boundary conditions of these privacy assurance approaches.

Article
Publication date: 26 August 2019

Ibrahim M. Al-Jabri, Mustafa I. Eid and Amer Abed

Customer privacy and security are major concerns. Online firms worldwide collect customer data for various reasons. This study aims to investigate factors that motivate and hinder…

1470

Abstract

Purpose

Customer privacy and security are major concerns. Online firms worldwide collect customer data for various reasons. This study aims to investigate factors that motivate and hinder a customer’s willingness to disclose personal information (WTD) to online firms on e-commerce websites.

Design/methodology/approach

Based on an extensive literature review, three sets of factors have been identified. These sets of factors are privacy concern, perceived disclosure benefits and privacy assurances. It is hypothesized that privacy concerns negatively affect the disclosure of personal information, while the perceived benefits of disclosure have positive effects. Privacy assurances would positively affect information disclosure and attenuate the negative effect of privacy concerns on the disclosure of personal information. The authors gathered data from 253 online customers in Saudi Arabia.

Findings

The results indicate that perceived disclosure benefits and privacy concerns have a significant positive and negative relationship, respectively, with WTD online. Privacy assurances had neither a direct nor a moderating effect on information disclosure.

Research limitations/implications

The findings will inform online firms about the factors that prevent or motivate customers to disclose personal information.

Originality/value

The effect of privacy concerns and benefits on personal information disclosure are not fully understood in Saudi Arabia. This study reveals more insights into the specific factors that make online customers reluctant or motivated to disclose their personal information.

Details

Information & Computer Security, vol. 28 no. 2
Type: Research Article
ISSN: 2056-4961

Keywords

Article
Publication date: 11 January 2022

Sarah Hudson and Yi Liu

As mobile apps request permissions from users, protecting mobile users' personal information from being unnecessarily collected and misused becomes critical. Privacy regulations…

Abstract

Purpose

As mobile apps request permissions from users, protecting mobile users' personal information from being unnecessarily collected and misused becomes critical. Privacy regulations, such as General Data Protection Regulation in the European Union (EU), aim to protect users' online information privacy. However, one’s understanding of whether these regulations effectively make mobile users less concerned about their privacy is still limited. This work aims to study mobile users' privacy concerns towards mobile apps by examining the effects of general and specific privacy assurance statements in China and the EU.

Design/methodology/approach

Drawing on ecological rationality and heuristics theory, an online experiment and a follow-up validation experiment were conducted in the EU and China to examine the effects of privacy assurance statements on mobile users' privacy concerns.

Findings

When privacy regulation is presented, the privacy concerns of Chinese mobile users are significantly lowered compared with EU mobile users. This indicates that individuals in the two regions react differently to privacy assurances. However, when a general regulation statement is used, no effect is observed. EU and Chinese respondents remain unaffected by general assurance statements.

Originality/value

This study incorporates notions from fast and frugal heuristics end ecological rationality – where seemingly irrational decisions may make sense in different societal contexts.

Details

Information Technology & People, vol. 36 no. 1
Type: Research Article
ISSN: 0959-3845

Keywords

Article
Publication date: 27 December 2021

Jung-Kuei Hsieh and Hsiang-Tzu Li

With the popularity of mobile applications and increasing consumer awareness of application privacy, this paper aims to introduce a new construct of service-privacy fit (i.e. the…

625

Abstract

Purpose

With the popularity of mobile applications and increasing consumer awareness of application privacy, this paper aims to introduce a new construct of service-privacy fit (i.e. the perceived degree of match between the service of a mobile application and a privacy permission request) to predict consumers’ mobile application adoption.

Design/methodology/approach

Four experiments were carried out to test the hypothesized relationships. The first study investigated the direct impact of service-privacy fit on application adoption and the mediators of benefit expectancy and privacy concerns. The second, third and fourth studies further applied the moderated mediation model to analyze the moderating roles of benefit message type, regulatory focus type and privacy assurance.

Findings

The results show that service-privacy fit influences application adoption not only directly but also indirectly via the mediators of benefit expectancy and privacy concerns. Furthermore, the findings confirm the moderators of benefit message type, regulatory focus type and privacy assurance.

Originality/value

Drawn from the perspectives of task-technology fit and information boundary theory, this paper introduces a new construct of service-privacy fit as a determinant of application adoption. Grounded in privacy calculus theory, it further explains this relationship through mediating effects of benefit expectancy and privacy concerns. Furthermore, this paper proposes that benefit messages and privacy assurance are effective coping strategies to increase the benefit expectancy and reduce the privacy concerns of applications. Based on the perspective of regulatory fit theory, this study further shows that the effects of coping strategies rely on personal traits. The findings enrich the existing knowledge of mobile application adoption and application privacy, suggesting that practitioners should consider mobile consumers’ perception of service-privacy fit when developing applications.

Article
Publication date: 17 March 2022

Naeem Akhtar, Umar Iqbal Siddiqi, Tahir Islam and Justin Paul

The study aims to investigate how hotel booking attributes (i.e. perceived privacy, perceived certification and perceived assurance) engender consumers’ untrust and consequent…

1040

Abstract

Purpose

The study aims to investigate how hotel booking attributes (i.e. perceived privacy, perceived certification and perceived assurance) engender consumers’ untrust and consequent behavioral intentions (i.e. altruistic behavior and trusting intentions). It also unveils the role of hotel attributes performance as a moderator between hotel booking attributes and consumers’ untrust.

Design/methodology/approach

Data were collected through an online platform by engaging 454 Chinese respondents. SPSS 25.0 and AMOS 24.0 (structural equation modeling) were used for data analysis and interpretation.

Findings

Results demonstrate that hotel booking attributes positively substantiate consumers’ untrust which, in turn, develops altruistic behavior and negative trusting intentions. Moreover, hotel attribute experience significantly moderates the relationships between perceived privacy, perceived certification and consumers’ untrust. Notably, hotel attribute performance insignificantly influences the association between perceived assurance and untrust.

Research limitations/implications

This study used the Chinese context and examined Chinese domestic travelers and the nonbranded hotel industry. Notwithstanding its limitations, the findings help hospitality and tourism firms, en bloc, to manage their review websites by explicitly disclosing policies regarding customers’ privacy and assurance, winning their trust through third-party certification and employing data scientists to develop algorithms to sieve fake information proactively.

Originality/value

This study develops an original conceptual framework by using the untrust model in this research. Our findings add to the research on consumer behavior, information processing, service management and trust and suggest practical implications for hospitality firms.

Details

International Journal of Contemporary Hospitality Management, vol. 34 no. 5
Type: Research Article
ISSN: 0959-6119

Keywords

Article
Publication date: 2 August 2019

Le Wang, Zao Sun, Xiaoyong Dai, Yixin Zhang and Hai-hua Hu

The purpose of this paper is to facilitate understanding of how to mitigate the privacy concerns of users who have experienced privacy invasions.

1445

Abstract

Purpose

The purpose of this paper is to facilitate understanding of how to mitigate the privacy concerns of users who have experienced privacy invasions.

Design/methodology/approach

Drawing on the communication privacy management theory, the authors developed a model suggesting that privacy concerns form through a cognitive process involving threat-coping appraisals, institutional privacy assurances and privacy experiences. The model was tested using data from an empirical survey with 913 randomly selected social media users.

Findings

Privacy concerns are jointly determined by perceived privacy risks and privacy self-efficacy. The perceived effectiveness of institutional privacy assurances in terms of established privacy policies and privacy protection technology influences the perceptions of privacy risks and privacy self-efficacy. More specifically, privacy invasion experiences are negatively associated with the perceived effectiveness of institutional privacy assurances.

Research limitations/implications

Privacy concerns are conceptualized as general concerns that reflect an individual’s worry about the possible loss of private information. The specific types of private information were not differentiated.

Originality/value

This paper is among the first to clarify the specific mechanisms through which privacy invasion experiences influence privacy concerns. Privacy concerns have long been viewed as resulting from individual actions. The study contributes to literature by linking privacy concerns with institutional privacy practice.

Article
Publication date: 24 April 2019

Alan Toy, David Lau, David Hay and Gehan Gunasekara

This paper aims to uncover the practices of different privacy auditors to reveal the extent of any similarities in such practices. The purpose is to investigate the drivers of…

Abstract

Purpose

This paper aims to uncover the practices of different privacy auditors to reveal the extent of any similarities in such practices. The purpose is to investigate the drivers of practices used by privacy auditors and to identify potential for improvements in the practice of privacy auditing so that privacy audits may better serve stakeholders.

Design/methodology/approach

Six semi-structured interviews with seven privacy auditors and regulators and an analyst across Australia, Canada, New Zealand and the USA are used as the basis for our analysis.

Findings

The study shows that some privacy auditors view privacy as an organizational issue, which means that all staff within an organization should understand the privacy issues that are relevant to the organization and to its customers. Because this practice goes beyond a mere compliance approach to privacy auditing, it indicates that there is a way to avoid the approach of merely applying standards from national data privacy laws which is an approach that has been subject to criticism because it is not applicable to the current situation of global applications and cross-border data. The interview themes demonstrate that privacy audits face significant challenges, such as the lack of a privacy auditing profession and the difficulty of raising the awareness of organizations and individuals regarding information privacy rights and duties.

Originality/value

Privacy auditing is mostly unexplored by academic research and little is known about the drivers behind the practice of privacy auditing. This study is the first to document the views of privacy auditors regarding the practices that they use. It also presents novel results regarding the drivers of the practice of privacy auditing and the interests of the beneficiaries of privacy audits. It builds on research that argues for the existence of best practices for privacy (Toy, 2013; Toy and Hay, 2015) and it extends this argument by providing reasons why privacy auditors may benefit from the use of best practices for privacy.

Details

Meditari Accountancy Research, vol. 27 no. 3
Type: Research Article
ISSN: 2049-372X

Keywords

Open Access
Article
Publication date: 11 April 2022

Grace Fox, Theo Lynn and Pierangelo Rosati

The General Data Protection Regulation (GDPR) introduces significant data protection obligations on all organizations within the European Union (EU) and those transacting with EU…

3765

Abstract

Purpose

The General Data Protection Regulation (GDPR) introduces significant data protection obligations on all organizations within the European Union (EU) and those transacting with EU citizens. This paper presents the GDPR privacy label and uses two empirical studies to examine the effectiveness of this approach in influencing consumers' privacy perceptions and related behavioral intentions.

Design/methodology/approach

The paper tests the efficacy of two GDPR privacy label designs, a consent-based label and a static label. Study 1 examines the effects of each label on perceptions of risk, control and privacy. Study 2 investigates the influence of consumers' privacy perceptions on perceived trustworthiness and willingness to interact with the organization.

Findings

The findings support the potential of GDPR privacy labels for positively influencing perceptions of risk, control, privacy and trustworthiness and enhancing consumers' willingness to transact and disclose data to online organizations.

Practical implications

The findings are useful for organizations required to comply with the GDPR and present a solution to requirements for transparent communications and explicit consent.

Originality/value

This study examines and demonstrates the efficacy of visualized privacy policies in impacting consumer privacy perceptions and behavioral intentions.

Details

Information Technology & People, vol. 35 no. 8
Type: Research Article
ISSN: 0959-3845

Keywords

Article
Publication date: 28 July 2023

Bidyut Hazarika, Utkarsh Shrivastava, Vivek Kumar Singh and Alan Rea

The COVID-19 pandemic has had far-reaching effects on society and will continue to be a subject of study for researchers in the years to come. Businesses have implemented…

Abstract

Purpose

The COVID-19 pandemic has had far-reaching effects on society and will continue to be a subject of study for researchers in the years to come. Businesses have implemented technologies that reduce reliance on physical currencies, such as e-commerce sites and contactless payments. This study aims to examine the users’ attitudes and behaviors toward mobile payments. The focus is on identifying the most effective techniques and approaches that businesses can use to encourage user adoption of mobile payments.

Design/methodology/approach

This study uses survey data from 396 active mobile payment users across the mid-west region of the USA to test the proposed hypothesis. The snowball sampling approach is used to sample the participants for the data collection. This study uses partial least squares structural equation modeling to test the ten hypotheses proposed in this study.

Findings

This study finds that organizational commitment and privacy customization can significantly overcome users’ protective attitudes toward mobile payments during the pandemic. In addition, providing users with privacy customization options can significantly encourage self-disclosure, which is crucial for transaction authentication and fraud detection.

Originality/value

Envisioned in the backdrop of the COVID pandemic, this is one of the earliest studies investigating the role of privacy customization, self-disclosure and organizational commitment on mobile payment adoption.

Details

Global Knowledge, Memory and Communication, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2514-9342

Keywords

1 – 10 of over 4000