Search results

1 – 10 of over 14000
Article
Publication date: 6 July 2020

Xiaogang Chen and Yuhui Zhang

The significant cultural difference between China and Western countries, primarily the USA, suggests that it is necessary for researchers to take an emic approach to understand…

Abstract

Purpose

The significant cultural difference between China and Western countries, primarily the USA, suggests that it is necessary for researchers to take an emic approach to understand how the concept of privacy concerns is interpreted from the perspective of people from within the Chinese culture. However, all privacy concerns studies in the Chinese context have virtually adopted an etic approach. Therefore, this study aims to answer the following questions: What dimensions do privacy concerns encompass in the Chinese cultural context? What are the structural relationships among these dimensions? The authors answer these questions by conducting a mixed method research.

Design/methodology/approach

The authors first content analyzed Chinese news reports about information privacy and found that trading, management and awareness are relevant dimensions of privacy concerns. Further, the authors validated the three dimensions by surveying 185 Chinese consumers.

Findings

The data showed that Chinese consumers’ privacy concerns have a second-order factor structure, where the trading, management and awareness dimensions are first-order factors.

Originality/value

The results of this research contribute to the literature by developing the construct of privacy concerns that fits the context of Chinese culture and also point out possible managerial practices to mitigate Chinese consumers’ privacy concerns.

Details

Nankai Business Review International, vol. 12 no. 1
Type: Research Article
ISSN: 2040-8749

Keywords

Article
Publication date: 14 August 2007

J. Alberto Castañeda, Francisco J. Montoso and Teodoro Luque

This study attempts to carry out an approximation both to the conceptual delimitation and to the measuring of customer concern for privacy on the electronic market.

3265

Abstract

Purpose

This study attempts to carry out an approximation both to the conceptual delimitation and to the measuring of customer concern for privacy on the electronic market.

Design/methodology/approach

To complete the objective of this research, an overview of the literature is made in an attempt to summarise the main proposals as regards dimensions of the construct analysed. Furthermore, two studies were carried out with the aim of evaluating the instruments to measure concern for privacy on the internet and which support the conclusion concerning the construct's dimensionality, reached following the aforementioned literature overview.

Findings

From the main results reached, we can highlight that the concern for privacy on the internet construct has a structure consisting of two dimensions, which are confirmed through the scales evaluated for different contexts of use of the internet. These dimensions are: concern for control over the collecting of personal information, and its use on the electronic market.

Originality/value

The paper's main contributions are threefold: a conceptual revision of the construct; a proposal of the dimensions for the construct; and an evaluation of two scales to measure the construct in different situations.

Details

Online Information Review, vol. 31 no. 4
Type: Research Article
ISSN: 1468-4527

Keywords

Article
Publication date: 6 July 2021

Yuanyuan Guo, Xin Wang and Chaoyou Wang

This study examines how the different dimensions of a privacy policy separately influence perceived effectiveness of privacy policy, as well as the mediating mechanisms behind…

1234

Abstract

Purpose

This study examines how the different dimensions of a privacy policy separately influence perceived effectiveness of privacy policy, as well as the mediating mechanisms behind these effects (i.e. vulnerability, benevolence). In addition, this study considers privacy concern as a significant moderator in the research model, to examine if the relative influences of privacy policy content are contingent upon levels of users' privacy concern.

Design/methodology/approach

The survey experiment was conducted to empirically validate the model. Specifically, three survey experiments and six scenarios were designed to manipulate high and low levels of the three privacy policy dimensions (i.e. transparency, control and protection). The authors totally distributed 450 copies of the questionnaire, of which 407 were valid.

Findings

This paper found that (1) all the three privacy policy dimensions directly influence perceived effectiveness of privacy policy; (2) all the three privacy policy dimensions indirectly influence perceived effectiveness of privacy policy by enhancing perceived corporate benevolence, whereas control also affects perceived effectiveness of privacy policy by reducing perceived vulnerability; and (3) individuals with high-privacy concern are much more impacted by privacy policy contents than individuals with low-privacy concern.

Practical implications

The findings could provide website managers with guidelines on how to design privacy policy contents by reducing user perceptions of vulnerability and enhancing user perceptions of corporate benevolence. The managers need to focus on customers' perceived vulnerability and corporate benevolence when launching or updating privacy policies. Furthermore, the managers also need to attend to users' privacy concerns, especially for multinational companies or companies with specific consumer groups.

Originality/value

This study extends the current privacy policy literature by articulating the separate influences of the three privacy policy dimensions and their impact mechanisms on perceived effectiveness of privacy policy. It also uncovers privacy concerns as a boundary condition that influence the effects of privacy policy contents on users' privacy perceptions.

Details

Journal of Enterprise Information Management, vol. 35 no. 3
Type: Research Article
ISSN: 1741-0398

Keywords

Open Access
Article
Publication date: 12 April 2022

Dijana Peras and Renata Mekovec

The purpose of this paper is to improve the understanding of cloud service users’ privacy concerns, which are anticipated to considerably hinder cloud service market growth. The…

1491

Abstract

Purpose

The purpose of this paper is to improve the understanding of cloud service users’ privacy concerns, which are anticipated to considerably hinder cloud service market growth. The researchers have explored privacy concerns from dimensions that were identified as relevant in the cloud context.

Design/methodology/approach

Content analysis was used to identify privacy problems that were most often raised in previous cloud research. Multidimensional developmental theory (MDT) was used to build a conceptual model of cloud privacy concerns. Literature review was made to identify the privacy-related constructs used to measure privacy concerns in previous cloud research.

Findings

The paper provides systematization of recent cloud privacy research, proposal of a conceptual model of cloud privacy concerns, identification of measuring instruments that were used to measure privacy concerns in previous cloud research and identification of categories of problems that need to be addressed in future cloud research.

Originality/value

This paper has identified the categories of privacy problems and dimensions that have not yet been measured in the cloud context, to the best of the authors’ knowledge. Their simultaneous examination could clarify the effects of different dimensions on the privacy concerns of cloud users. The conceptual model of cloud privacy concerns will allow cloud service providers to focus on key cloud problems affecting users’ privacy concerns and use the most appropriate privacy protection communication and preservation approaches.

Details

Information & Computer Security, vol. 30 no. 5
Type: Research Article
ISSN: 2056-4961

Keywords

Article
Publication date: 9 November 2012

Kirstie Ball, Elizabeth M. Daniel and Chris Stride

The study goes beyond the more frequent interest in information privacy to identify other notions of privacy within the workplace. The purpose of this paper is to explore how…

3740

Abstract

Purpose

The study goes beyond the more frequent interest in information privacy to identify other notions of privacy within the workplace. The purpose of this paper is to explore how these additional notions of privacy relate to key demographic and employment characteristics and how data protection training, often instigated as a means of highlighting and addressing issues relating to privacy of customers’ data, is related to employees’ notions of their own workplace privacy.

Design/methodology/approach

The study was undertaken in two telephone call centres since they offered a working environment where staff are highly monitored and hence there are likely to be issues relating to employee privacy. The study is exploratory in nature and adopts a mixed method approach based on a questionnaire survey that was followed by semi‐structured, qualitative face to face interviews.

Findings

The survey findings identified three distinct notions of privacy; the concern for personal information privacy (CfPIP), the concern for working environment privacy (CfWEP) and the concern for solitude privacy (CfSP). The findings were supported by the qualitative data provided by the interviews. CfWEP is found to be a gendered issue, with women showing a greater concern for the privacy of their working environment. Finally, the findings indicate that effective data protection training are associated with increased concern for their own privacy in the form of CfPIP, and that inclusion of data protection issues in performance reviews is associated their concern for CfWEP.

Originality/value

Previous studies of privacy in the workplace focus on the simplistic notion of information privacy. This study goes beyond such studies and provides empirically‐based evidence of multiple dimensions of privacy operant in a single, real‐world workplace setting. It also provides empirical insight to the previously unexplored issue of the association between data protection training employees’ notions of their own privacy.

Details

Information Technology & People, vol. 25 no. 4
Type: Research Article
ISSN: 0959-3845

Keywords

Article
Publication date: 4 February 2022

Emmanuel W. Ayaburi

The study aims to empirically understand individuals' tendency to disclose private information online following different forms of data breach (i.e. reversible and irreversible…

Abstract

Purpose

The study aims to empirically understand individuals' tendency to disclose private information online following different forms of data breach (i.e. reversible and irreversible victimization).

Design/methodology/approach

Survey methodology is applied to measure the perception of victims of data breaches on key indicators of information disclosure.

Findings

Analysis of responses from 309 victims of data breaches show that while victims' irreversible data breach victimization experience influences both dimensions of privacy concerns, reversible data breach victimization experiences influenced only peer privacy concerns (PPCs). Furthermore, only institutional privacy concerns impacted online disclosure and fully mediate the relationship between victimization experience and online disclosure.

Research limitations/implications

The findings contribute to the privacy literature by expanding the dimension of victimization and considering their differential effect on privacy concerns. Additionally, the study uncovers the efficacy of privacy dimension on privacy recalibration following a data breach announcement.

Practical implications

For practice, the results provide insights for managers on how to manage customer restitution after a data breach. Management of the process of privacy recalibration should not be homogenous but be based on degree of consequence.

Social implications

This research provides deeper understanding of how the ascendancy of privacy breaches affect privacy management. The findings illuminate why the increasing trend in online activities is observed.

Originality/value

The study is the first to identify two dimensions of data breach victimization experience based on the breach level index (BLI). The two dimensions of victimization (i.e. reversible and irreversible privacy victimizations) were used to understand individuals' tendency to disclose private information online.

Details

Information Technology & People, vol. 36 no. 1
Type: Research Article
ISSN: 0959-3845

Keywords

Article
Publication date: 4 December 2023

David Goyeneche, Stephen Singaraju and Luis Arango

This paper explores the similarities and differences in privacy attitudes, trust and risk beliefs between younger and older adults on social networking sites. The objective of the…

Abstract

Purpose

This paper explores the similarities and differences in privacy attitudes, trust and risk beliefs between younger and older adults on social networking sites. The objective of the article is to ascertain whether any notable differences exist between younger (18–25 years old) and older (55+ years old) adults in how trust and risk are influenced by privacy concerns upon personal information disclosure on social media.

Design/methodology/approach

A Likert scale instrument validated in previous research was employed to gather the responses of 148 younger and 152 older adults. The scale was distributed through Amazon Mechanical Turk. Data were analyzed through partial least squares structural equation modeling.

Findings

No significant differences were found between younger and older adults in how social media privacy concerns related to trust and risk beliefs. Two privacy concern dimensions were found to have a significant influence on perceptions of risk for both populations: collection and control. Predictability and a sense of control are proposed as two conceptual approaches that can explain these findings.

Originality/value

This article is the first one to explore age differences in privacy concerns, trust and risk on social media employing conceptual developments and an instrument specifically tailored to the social media environment. Based on the findings, several strategies are suggested to keep privacy concerns on social media at a minimum, reduce risk perceptions and increase users' trust.

Details

Industrial Management & Data Systems, vol. 124 no. 2
Type: Research Article
ISSN: 0263-5577

Keywords

Article
Publication date: 24 February 2020

Pouyan Esmaeilzadeh

Health information exchange (HIE) initiatives utilize sharing mechanisms through which health information is mostly transmitted without a patient's close supervision; thus…

1341

Abstract

Purpose

Health information exchange (HIE) initiatives utilize sharing mechanisms through which health information is mostly transmitted without a patient's close supervision; thus, patient trust in the HIE is the core in this setting. Existing technology acceptance theories mainly consider cognitive beliefs resulting in adoption behavior. The study argues that existing theories should be expanded to cover not only cognitive beliefs but also the emotion provoked by the sharing nature of the technology. Based on the theory of reasoned action, the technology adoption literature, and the trust literature, we theoretically explain and empirically test the impact of perceived transparency of privacy policy on cognitive trust and emotional trust in HIEs. Moreover, the study analyzes the effects of cognitive trust and emotional trust on the intention to opt in to HIEs and willingness to disclose health information.

Design/methodology/approach

An online survey was conducted using data from individuals who were aware of HIEs through experience with at least one provider participating in an HIE network. Data were collected from a wide range of adult population groups in the United States.

Findings

The structural equation modeling analysis results provide empirical support for the proposed model. The model highlights the strategic role of the perceived transparency of the privacy policy in building trust in HIEs. When patients know more about HIE security measures, sharing procedures, and privacy terms, they feel more in control, more assured, and less at risk. The results also show that patient trust in HIEs may take the forms of intention to opt in to an HIE and willingness to disclose health information exchanged through HIE networks.

Originality/value

The findings of this study should be of interest to both academics and practitioners. The research highlights the importance of developing and using a transparent privacy policy in the diffusion of HIEs. The findings provide a deep understanding of dimensions of HIE privacy policy that should be addressed by health-care organizations to exchange personal health information in a secure and private manner.

Article
Publication date: 1 August 2006

Geoff Skinner, Song Han and Elizabeth Chang

Information Privacy is becoming an increasingly important field of research with many new definitions and terminologies. Along similar rates of increase are the use, uptake and…

1862

Abstract

Purpose

Information Privacy is becoming an increasingly important field of research with many new definitions and terminologies. Along similar rates of increase are the use, uptake and expansion of collaborative environments (CEs). There is a need for a better understanding and classification of information privacy concepts and terms. The purpose of this paper is to provide a taxonomy of information privacy in CEs. The knowledge provided from an information privacy taxonomy can be used to formulate better information privacy policies, practices, and privacy enhancing technologies.

Design/methodology/approach

Through the hierarchical classification and categorization of information privacy concepts and principles an organized representation of these components has been produced. Each area was well surveyed and researched and then classified into a number of sub‐categories according to their nature and relevance.

Findings

A taxonomy was successfully developed with the identification of three high level dimensions of information privacy. Within each dimensional view a further three sub‐classifications were proposed each with their own unique nature.

Originality/value

This paper provides an Information Privacy taxonomy for CEs, the first of its kind to be proposed. A number of new Information privacy terms are defined that make up the categorization and classification of information privacy concepts and components.

Details

Information Management & Computer Security, vol. 14 no. 4
Type: Research Article
ISSN: 0968-5227

Keywords

Article
Publication date: 5 October 2018

Ali Padyab and Anna Ståhlbröst

The integration of internet of things (IoT) devices into daily life introduces challenges for the privacy of their users and those who are affected by these devices. This paper…

1347

Abstract

Purpose

The integration of internet of things (IoT) devices into daily life introduces challenges for the privacy of their users and those who are affected by these devices. This paper explores the factors that affect individual concerns regarding IoT use and how those factors affect the dynamics of privacy management with the presence of an IoT device.

Design/methodology/approach

Four focus groups of individuals and IoT experts were studied to understand the groups’ privacy concerns. The authors adopted a qualitative research method based on grounded theory to find relevant dimensions of situational privacy concerns in IoT use situations.

Findings

The results revealed that fourteen dimensions of individuals’ privacy concerns regarding the IoT are relevant and can be categorized under four key influential factors: collection, IoT device, collected data storage and use of collected data. The authors also analyzed the focus groups using genres of disclosure theory and explored how privacy concerns affect individual privacy management regulations.

Research limitations/implications

This paper contributes to how future research can employ genres of disclosure as a theoretical framework to identify situations where privacy violations occur.

Practical implications

This study can assist service providers and IoT manufacturers in deriving design principles and decreasing concerns by addressing the information that must be communicated to their users.

Originality/value

As opposed to the previous research, which was more inclined to dispositional privacy concerns, this study provides insights into situational privacy concerns when individuals are confronted with the IoT. This study represents the first attempt to investigate the process individuals experience in managing their privacy.

Details

Digital Policy, Regulation and Governance, vol. 20 no. 6
Type: Research Article
ISSN: 2398-5038

Keywords

1 – 10 of over 14000