Search results
1 – 10 of over 14000The significant cultural difference between China and Western countries, primarily the USA, suggests that it is necessary for researchers to take an emic approach to understand…
Abstract
Purpose
The significant cultural difference between China and Western countries, primarily the USA, suggests that it is necessary for researchers to take an emic approach to understand how the concept of privacy concerns is interpreted from the perspective of people from within the Chinese culture. However, all privacy concerns studies in the Chinese context have virtually adopted an etic approach. Therefore, this study aims to answer the following questions: What dimensions do privacy concerns encompass in the Chinese cultural context? What are the structural relationships among these dimensions? The authors answer these questions by conducting a mixed method research.
Design/methodology/approach
The authors first content analyzed Chinese news reports about information privacy and found that trading, management and awareness are relevant dimensions of privacy concerns. Further, the authors validated the three dimensions by surveying 185 Chinese consumers.
Findings
The data showed that Chinese consumers’ privacy concerns have a second-order factor structure, where the trading, management and awareness dimensions are first-order factors.
Originality/value
The results of this research contribute to the literature by developing the construct of privacy concerns that fits the context of Chinese culture and also point out possible managerial practices to mitigate Chinese consumers’ privacy concerns.
Details
Keywords
J. Alberto Castañeda, Francisco J. Montoso and Teodoro Luque
This study attempts to carry out an approximation both to the conceptual delimitation and to the measuring of customer concern for privacy on the electronic market.
Abstract
Purpose
This study attempts to carry out an approximation both to the conceptual delimitation and to the measuring of customer concern for privacy on the electronic market.
Design/methodology/approach
To complete the objective of this research, an overview of the literature is made in an attempt to summarise the main proposals as regards dimensions of the construct analysed. Furthermore, two studies were carried out with the aim of evaluating the instruments to measure concern for privacy on the internet and which support the conclusion concerning the construct's dimensionality, reached following the aforementioned literature overview.
Findings
From the main results reached, we can highlight that the concern for privacy on the internet construct has a structure consisting of two dimensions, which are confirmed through the scales evaluated for different contexts of use of the internet. These dimensions are: concern for control over the collecting of personal information, and its use on the electronic market.
Originality/value
The paper's main contributions are threefold: a conceptual revision of the construct; a proposal of the dimensions for the construct; and an evaluation of two scales to measure the construct in different situations.
Details
Keywords
Yuanyuan Guo, Xin Wang and Chaoyou Wang
This study examines how the different dimensions of a privacy policy separately influence perceived effectiveness of privacy policy, as well as the mediating mechanisms behind…
Abstract
Purpose
This study examines how the different dimensions of a privacy policy separately influence perceived effectiveness of privacy policy, as well as the mediating mechanisms behind these effects (i.e. vulnerability, benevolence). In addition, this study considers privacy concern as a significant moderator in the research model, to examine if the relative influences of privacy policy content are contingent upon levels of users' privacy concern.
Design/methodology/approach
The survey experiment was conducted to empirically validate the model. Specifically, three survey experiments and six scenarios were designed to manipulate high and low levels of the three privacy policy dimensions (i.e. transparency, control and protection). The authors totally distributed 450 copies of the questionnaire, of which 407 were valid.
Findings
This paper found that (1) all the three privacy policy dimensions directly influence perceived effectiveness of privacy policy; (2) all the three privacy policy dimensions indirectly influence perceived effectiveness of privacy policy by enhancing perceived corporate benevolence, whereas control also affects perceived effectiveness of privacy policy by reducing perceived vulnerability; and (3) individuals with high-privacy concern are much more impacted by privacy policy contents than individuals with low-privacy concern.
Practical implications
The findings could provide website managers with guidelines on how to design privacy policy contents by reducing user perceptions of vulnerability and enhancing user perceptions of corporate benevolence. The managers need to focus on customers' perceived vulnerability and corporate benevolence when launching or updating privacy policies. Furthermore, the managers also need to attend to users' privacy concerns, especially for multinational companies or companies with specific consumer groups.
Originality/value
This study extends the current privacy policy literature by articulating the separate influences of the three privacy policy dimensions and their impact mechanisms on perceived effectiveness of privacy policy. It also uncovers privacy concerns as a boundary condition that influence the effects of privacy policy contents on users' privacy perceptions.
Details
Keywords
Dijana Peras and Renata Mekovec
The purpose of this paper is to improve the understanding of cloud service users’ privacy concerns, which are anticipated to considerably hinder cloud service market growth. The…
Abstract
Purpose
The purpose of this paper is to improve the understanding of cloud service users’ privacy concerns, which are anticipated to considerably hinder cloud service market growth. The researchers have explored privacy concerns from dimensions that were identified as relevant in the cloud context.
Design/methodology/approach
Content analysis was used to identify privacy problems that were most often raised in previous cloud research. Multidimensional developmental theory (MDT) was used to build a conceptual model of cloud privacy concerns. Literature review was made to identify the privacy-related constructs used to measure privacy concerns in previous cloud research.
Findings
The paper provides systematization of recent cloud privacy research, proposal of a conceptual model of cloud privacy concerns, identification of measuring instruments that were used to measure privacy concerns in previous cloud research and identification of categories of problems that need to be addressed in future cloud research.
Originality/value
This paper has identified the categories of privacy problems and dimensions that have not yet been measured in the cloud context, to the best of the authors’ knowledge. Their simultaneous examination could clarify the effects of different dimensions on the privacy concerns of cloud users. The conceptual model of cloud privacy concerns will allow cloud service providers to focus on key cloud problems affecting users’ privacy concerns and use the most appropriate privacy protection communication and preservation approaches.
Details
Keywords
Kirstie Ball, Elizabeth M. Daniel and Chris Stride
The study goes beyond the more frequent interest in information privacy to identify other notions of privacy within the workplace. The purpose of this paper is to explore how…
Abstract
Purpose
The study goes beyond the more frequent interest in information privacy to identify other notions of privacy within the workplace. The purpose of this paper is to explore how these additional notions of privacy relate to key demographic and employment characteristics and how data protection training, often instigated as a means of highlighting and addressing issues relating to privacy of customers’ data, is related to employees’ notions of their own workplace privacy.
Design/methodology/approach
The study was undertaken in two telephone call centres since they offered a working environment where staff are highly monitored and hence there are likely to be issues relating to employee privacy. The study is exploratory in nature and adopts a mixed method approach based on a questionnaire survey that was followed by semi‐structured, qualitative face to face interviews.
Findings
The survey findings identified three distinct notions of privacy; the concern for personal information privacy (CfPIP), the concern for working environment privacy (CfWEP) and the concern for solitude privacy (CfSP). The findings were supported by the qualitative data provided by the interviews. CfWEP is found to be a gendered issue, with women showing a greater concern for the privacy of their working environment. Finally, the findings indicate that effective data protection training are associated with increased concern for their own privacy in the form of CfPIP, and that inclusion of data protection issues in performance reviews is associated their concern for CfWEP.
Originality/value
Previous studies of privacy in the workplace focus on the simplistic notion of information privacy. This study goes beyond such studies and provides empirically‐based evidence of multiple dimensions of privacy operant in a single, real‐world workplace setting. It also provides empirical insight to the previously unexplored issue of the association between data protection training employees’ notions of their own privacy.
Details
Keywords
The study aims to empirically understand individuals' tendency to disclose private information online following different forms of data breach (i.e. reversible and irreversible…
Abstract
Purpose
The study aims to empirically understand individuals' tendency to disclose private information online following different forms of data breach (i.e. reversible and irreversible victimization).
Design/methodology/approach
Survey methodology is applied to measure the perception of victims of data breaches on key indicators of information disclosure.
Findings
Analysis of responses from 309 victims of data breaches show that while victims' irreversible data breach victimization experience influences both dimensions of privacy concerns, reversible data breach victimization experiences influenced only peer privacy concerns (PPCs). Furthermore, only institutional privacy concerns impacted online disclosure and fully mediate the relationship between victimization experience and online disclosure.
Research limitations/implications
The findings contribute to the privacy literature by expanding the dimension of victimization and considering their differential effect on privacy concerns. Additionally, the study uncovers the efficacy of privacy dimension on privacy recalibration following a data breach announcement.
Practical implications
For practice, the results provide insights for managers on how to manage customer restitution after a data breach. Management of the process of privacy recalibration should not be homogenous but be based on degree of consequence.
Social implications
This research provides deeper understanding of how the ascendancy of privacy breaches affect privacy management. The findings illuminate why the increasing trend in online activities is observed.
Originality/value
The study is the first to identify two dimensions of data breach victimization experience based on the breach level index (BLI). The two dimensions of victimization (i.e. reversible and irreversible privacy victimizations) were used to understand individuals' tendency to disclose private information online.
Details
Keywords
David Goyeneche, Stephen Singaraju and Luis Arango
This paper explores the similarities and differences in privacy attitudes, trust and risk beliefs between younger and older adults on social networking sites. The objective of the…
Abstract
Purpose
This paper explores the similarities and differences in privacy attitudes, trust and risk beliefs between younger and older adults on social networking sites. The objective of the article is to ascertain whether any notable differences exist between younger (18–25 years old) and older (55+ years old) adults in how trust and risk are influenced by privacy concerns upon personal information disclosure on social media.
Design/methodology/approach
A Likert scale instrument validated in previous research was employed to gather the responses of 148 younger and 152 older adults. The scale was distributed through Amazon Mechanical Turk. Data were analyzed through partial least squares structural equation modeling.
Findings
No significant differences were found between younger and older adults in how social media privacy concerns related to trust and risk beliefs. Two privacy concern dimensions were found to have a significant influence on perceptions of risk for both populations: collection and control. Predictability and a sense of control are proposed as two conceptual approaches that can explain these findings.
Originality/value
This article is the first one to explore age differences in privacy concerns, trust and risk on social media employing conceptual developments and an instrument specifically tailored to the social media environment. Based on the findings, several strategies are suggested to keep privacy concerns on social media at a minimum, reduce risk perceptions and increase users' trust.
Details
Keywords
Health information exchange (HIE) initiatives utilize sharing mechanisms through which health information is mostly transmitted without a patient's close supervision; thus…
Abstract
Purpose
Health information exchange (HIE) initiatives utilize sharing mechanisms through which health information is mostly transmitted without a patient's close supervision; thus, patient trust in the HIE is the core in this setting. Existing technology acceptance theories mainly consider cognitive beliefs resulting in adoption behavior. The study argues that existing theories should be expanded to cover not only cognitive beliefs but also the emotion provoked by the sharing nature of the technology. Based on the theory of reasoned action, the technology adoption literature, and the trust literature, we theoretically explain and empirically test the impact of perceived transparency of privacy policy on cognitive trust and emotional trust in HIEs. Moreover, the study analyzes the effects of cognitive trust and emotional trust on the intention to opt in to HIEs and willingness to disclose health information.
Design/methodology/approach
An online survey was conducted using data from individuals who were aware of HIEs through experience with at least one provider participating in an HIE network. Data were collected from a wide range of adult population groups in the United States.
Findings
The structural equation modeling analysis results provide empirical support for the proposed model. The model highlights the strategic role of the perceived transparency of the privacy policy in building trust in HIEs. When patients know more about HIE security measures, sharing procedures, and privacy terms, they feel more in control, more assured, and less at risk. The results also show that patient trust in HIEs may take the forms of intention to opt in to an HIE and willingness to disclose health information exchanged through HIE networks.
Originality/value
The findings of this study should be of interest to both academics and practitioners. The research highlights the importance of developing and using a transparent privacy policy in the diffusion of HIEs. The findings provide a deep understanding of dimensions of HIE privacy policy that should be addressed by health-care organizations to exchange personal health information in a secure and private manner.
Details
Keywords
Geoff Skinner, Song Han and Elizabeth Chang
Information Privacy is becoming an increasingly important field of research with many new definitions and terminologies. Along similar rates of increase are the use, uptake and…
Abstract
Purpose
Information Privacy is becoming an increasingly important field of research with many new definitions and terminologies. Along similar rates of increase are the use, uptake and expansion of collaborative environments (CEs). There is a need for a better understanding and classification of information privacy concepts and terms. The purpose of this paper is to provide a taxonomy of information privacy in CEs. The knowledge provided from an information privacy taxonomy can be used to formulate better information privacy policies, practices, and privacy enhancing technologies.
Design/methodology/approach
Through the hierarchical classification and categorization of information privacy concepts and principles an organized representation of these components has been produced. Each area was well surveyed and researched and then classified into a number of sub‐categories according to their nature and relevance.
Findings
A taxonomy was successfully developed with the identification of three high level dimensions of information privacy. Within each dimensional view a further three sub‐classifications were proposed each with their own unique nature.
Originality/value
This paper provides an Information Privacy taxonomy for CEs, the first of its kind to be proposed. A number of new Information privacy terms are defined that make up the categorization and classification of information privacy concepts and components.
Details
Keywords
Ali Padyab and Anna Ståhlbröst
The integration of internet of things (IoT) devices into daily life introduces challenges for the privacy of their users and those who are affected by these devices. This paper…
Abstract
Purpose
The integration of internet of things (IoT) devices into daily life introduces challenges for the privacy of their users and those who are affected by these devices. This paper explores the factors that affect individual concerns regarding IoT use and how those factors affect the dynamics of privacy management with the presence of an IoT device.
Design/methodology/approach
Four focus groups of individuals and IoT experts were studied to understand the groups’ privacy concerns. The authors adopted a qualitative research method based on grounded theory to find relevant dimensions of situational privacy concerns in IoT use situations.
Findings
The results revealed that fourteen dimensions of individuals’ privacy concerns regarding the IoT are relevant and can be categorized under four key influential factors: collection, IoT device, collected data storage and use of collected data. The authors also analyzed the focus groups using genres of disclosure theory and explored how privacy concerns affect individual privacy management regulations.
Research limitations/implications
This paper contributes to how future research can employ genres of disclosure as a theoretical framework to identify situations where privacy violations occur.
Practical implications
This study can assist service providers and IoT manufacturers in deriving design principles and decreasing concerns by addressing the information that must be communicated to their users.
Originality/value
As opposed to the previous research, which was more inclined to dispositional privacy concerns, this study provides insights into situational privacy concerns when individuals are confronted with the IoT. This study represents the first attempt to investigate the process individuals experience in managing their privacy.
Details