Search results

1 – 10 of over 1000
Article
Publication date: 22 February 2024

Ankit Suri, Yogesh Sharma, Lokesh Jindal and Rajeev Sijariya

The purpose of this study is to investigate the role of blockchain technology in reducing online fraud among Gen Y and Gen Z.

Abstract

Purpose

The purpose of this study is to investigate the role of blockchain technology in reducing online fraud among Gen Y and Gen Z.

Design/methodology/approach

This study uses a two-phase approach. Firstly, a systematic literature review is conducted to examine various aspects of blockchain technology and cyber security. Secondly, the Technology Adoption Model is used to study the adoption dynamics of blockchain-based platforms for online data exchange among 415 Gen Y and Z users.

Findings

The results indicate that efficiency and security, perceived ease of use, perceived usefulness, and trust have a positive effect on behavioral intention and attitude towards use. This is the first study to examine the role of blockchain technology to reduce fraud among Gen Y and Gen Z.

Originality/value

This study provides new insights into the adoption of blockchain-based platforms for online data exchange among Gen Y and Gen Z. The study highlights the critical areas of concern for the adoption of blockchain technology and provides managerial implications for fintech firms, banks, and e-commerce platforms. It is unique in its focus on the potential for blockchain technology to reduce fraud among Gen Y and Gen Z, which has not been previously explored in the literature.

Details

International Journal of Quality & Reliability Management, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0265-671X

Keywords

Article
Publication date: 1 December 2023

Andreas Skalkos, Aggeliki Tsohou, Maria Karyda and Spyros Kokolakis

Search engines, the most popular online services, are associated with several concerns. Users are concerned about the unauthorized processing of their personal data, as well as…

Abstract

Purpose

Search engines, the most popular online services, are associated with several concerns. Users are concerned about the unauthorized processing of their personal data, as well as about search engines keeping track of their search preferences. Various search engines have been introduced to address these concerns, claiming that they protect users’ privacy. The authors call these search engines privacy-preserving search engines (PPSEs). This paper aims to investigate the factors that motivate search engine users to use PPSEs.

Design/methodology/approach

This study adopted protection motivation theory (PMT) and associated its constructs with subjective norms to build a comprehensive research model. The authors tested the research model using survey data from 830 search engine users worldwide.

Findings

The results confirm the interpretive power of PMT in privacy-related decision-making and show that users are more inclined to take protective measures when they consider that data abuse is a more severe risk and that they are more vulnerable to data abuse. Furthermore, the results highlight the importance of subjective norms in predicting and determining PPSE use. Because subjective norms refer to perceived social influences from important others to engage or refrain from protective behavior, the authors reveal that the recommendation from people that users consider important motivates them to take protective measures and use PPSE.

Research limitations/implications

Despite its interesting results, this research also has some limitations. First, because the survey was conducted online, the study environment was less controlled. Participants may have been disrupted or affected, for example, by the presence of others or background noise during the session. Second, some of the survey items could possibly be misinterpreted by the respondents in the study questionnaire, as they did not have access to clarifications that a researcher could possibly provide. Third, another limitation refers to the use of the Amazon Turk tool. According Paolacci and Chandler (2014) in comparison to the US population, the MTurk workers are more educated, younger and less religiously and politically diverse. Fourth, another limitation of this study could be that Actual Use of PPSE is self-reported by the participants. This could cause bias because it is argued that internet users’ statements may be in contrast with their actions in real life or in an experimental scenario (Berendt et al., 2005, Jensen et al., 2005); Moreover, some limitations of this study emerge from the use of PMT as the background theory of the study. PMT identifies the main factors that affect protection motivation, but other environmental and cognitive factors can also have a significant role in determining the way an individual’s attitude is formed. As Rogers (1975) argued, PMT as proposed does not attempt to specify all of the possible factors in a fear appeal that may affect persuasion, but rather a systematic exposition of a limited set of components and cognitive mediational processes that may account for a significant portion of the variance in acceptance by users. In addition, as Tanner et al. (1991) argue, the ‘PMT’s assumption that the subjects have not already developed a coping mechanism is one of its limitations. Finally, another limitation is that the sample does not include users from China, which is the second most populated country. Unfortunately, DuckDuckGo has been blocked in China, so it has not been feasible to include users from China in this study.

Practical implications

The proposed model and, specifically, the subjective norms construct proved to be successful in predicting PPSE use. This study demonstrates the need for PPSE to exhibit and advertise the technology and measures they use to protect users’ privacy. This will contribute to the effort to persuade internet users to use these tools.

Social implications

This study sought to explore the privacy attitudes of search engine users using PMT and its constructs’ association with subjective norms. It used the PMT to elucidate users’ perceptions that motivate them to privacy adoption behavior, as well as how these perceptions influence the type of search engine they use. This research is a first step toward gaining a better understanding of the processes that drive people’s motivation to, or not to, protect their privacy online by means of using PPSE. At the same time, this study contributes to search engine vendors by revealing that users’ need to be persuaded not only about their policy toward privacy but also by considering and implementing new strategies of diffusion that could enhance the use of the PPSE.

Originality/value

This research is a first step toward gaining a better understanding of the processes that drive people’s motivation to, or not to, protect their privacy online by means of using PPSEs.

Details

Information & Computer Security, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2056-4961

Keywords

Article
Publication date: 21 March 2024

Zhaobin Meng, Yueheng Lu and Hongyue Duan

The purpose of this paper is to study the following two issues regarding blockchain crowdsourcing. First, to design smart contracts with lower consumption to meet the needs of…

Abstract

Purpose

The purpose of this paper is to study the following two issues regarding blockchain crowdsourcing. First, to design smart contracts with lower consumption to meet the needs of blockchain crowdsourcing services and also need to design better interaction modes to further reduce the cost of blockchain crowdsourcing services. Second, to design an effective privacy protection mechanism to protect user privacy while still providing high-quality crowdsourcing services for location-sensitive multiskilled mobile space crowdsourcing scenarios and blockchain exposure issues.

Design/methodology/approach

This paper proposes a blockchain-based privacy-preserving crowdsourcing model for multiskill mobile spaces. The model in this paper uses the zero-knowledge proof method to make the requester believe that the user is within a certain location without the user providing specific location information, thereby protecting the user’s location information and other privacy. In addition, through off-chain calculation and on-chain verification methods, gas consumption is also optimized.

Findings

This study deployed the model on Ethereum for testing. This study found that the privacy protection is feasible and the gas optimization is obvious.

Originality/value

This study designed a mobile space crowdsourcing based on a zero-knowledge proof privacy protection mechanism and optimized gas consumption.

Details

International Journal of Web Information Systems, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1744-0084

Keywords

Article
Publication date: 20 December 2023

Yafei Feng, Yan Zhang and Lifu Li

The privacy calculus based on a single stakeholder failed to explain users' co-owned information disclosure owing to the uniqueness of co-owned information. Drawing on collective…

Abstract

Purpose

The privacy calculus based on a single stakeholder failed to explain users' co-owned information disclosure owing to the uniqueness of co-owned information. Drawing on collective privacy calculus theory and impression management theory, this study attempts to explore the co-owned information disclosure of social network platform users from a collective perspective rather than an individual perspective.

Design/methodology/approach

Drawing on collective privacy calculus theory and impression management theory, this study explores the co-owned information disclosure of social network platform users from a collective perspective rather than an individual perspective based on a survey of 740 respondents.

Findings

This study finds that self-presentation and others presentation directly positively affect users' co-owned information disclosure. Also, self-presentation, others presentation and relationship presentation indirectly positively affect users' co-owned information disclosure via relationship support. Furthermore, personal privacy concern, others' privacy concern and relationship privacy concern indirectly negatively affect users' co-owned information disclosure via relationship risk.

Originality/value

The findings develop the theory of collective privacy calculus and impression management, which offer insights into the design of the collective privacy protection function of social network platform service providers.

Details

Library Hi Tech, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0737-8831

Keywords

Article
Publication date: 21 February 2022

Fatemeh Khozaei Ravari, Ahmad Sanusi Hassan, Muhammad Hafeez Abdul Nasir and Mohsen Mohammad Taheri

The study's main objective is to evaluate the morphological developments in the characteristics of the spatial configurations of the residential layouts in Kerman, Iran, in…

Abstract

Purpose

The study's main objective is to evaluate the morphological developments in the characteristics of the spatial configurations of the residential layouts in Kerman, Iran, in examining the impact on the level of visual privacy through the spectrum of permeability and wayfinding in space syntax analysis.

Design/methodology/approach

In this paper, plan graph analysis is used to measure the syntactic properties of seven topological residential architecture plans in Kerman, Iran, built from the 1970s to 2010s. The methodology involves the development of mathematical measurements to signify permeability and simulation of visibility graph analysis (VGA) to indicate wayfinding.

Findings

The findings reveal the residential layouts of Iranian houses tend to be less integrated over decades of design development from the 1970s to 2010s. Reduction in spatial integration corresponds to increase segregation allowing for enhanced visual privacy. The study underpins that, even with the constraints in the scale of the house and reduction in the number of nodes, as evident in the design of the modern residential layout, the efficient level of visual privacy is still achievable with regards to the standards demanded by the local culture.

Originality/value

The study examines the development in residential spatial configuration and building scale on visual privacy through a proposed methodology based on the level of permeability and wayfinding measured as a combined effect using the space syntax analysis and visual accessibility.

Details

International Journal of Building Pathology and Adaptation, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2398-4708

Keywords

Article
Publication date: 8 April 2024

Princely Ifinedo, Francine Vachon and Anteneh Ayanso

This paper aims to increase understanding of pertinent exogenous and endogenous antecedents that can reduce data privacy breaches.

Abstract

Purpose

This paper aims to increase understanding of pertinent exogenous and endogenous antecedents that can reduce data privacy breaches.

Design/methodology/approach

A cross-sectional survey was used to source participants' perceptions of relevant exogenous and endogenous antecedents developed from the Antecedents-Privacy Concerns-Outcomes (APCO) model and Social Cognitive Theory. A research model was proposed and tested with empirical data collected from 213 participants based in Canada.

Findings

The exogenous factors of external privacy training and external privacy self-assessment tool significantly and positively impact the study's endogenous factors of individual privacy awareness, organizational resources allocated to privacy concerns, and group behavior concerning privacy laws. Further, the proximal determinants of data privacy breaches (dependent construct) are negatively influenced by individual privacy awareness, group behavior related to privacy laws, and organizational resources allocated to privacy concerns. The endogenous factors fully mediated the relationships between the exogenous factors and the dependent construct.

Research limitations/implications

This study contributes to the budding data privacy breach literature by highlighting the impacts of personal and environmental factors in the discourse.

Practical implications

The results offer management insights on mitigating data privacy breach incidents arising from employees' actions. Roles of external privacy training and privacy self-assessment tools are signified.

Originality/value

Antecedents of data privacy breaches have been underexplored. This paper is among the first to elucidate the roles of select exogenous and endogenous antecedents encompassing personal and environmental imperatives on data privacy breaches.

Article
Publication date: 9 April 2024

Ahmed Shehata and Metwaly Eldakar

Social engineering is crucial in today’s digital landscape. As technology advances, malicious individuals exploit human judgment and trust. This study explores how age, education…

Abstract

Purpose

Social engineering is crucial in today’s digital landscape. As technology advances, malicious individuals exploit human judgment and trust. This study explores how age, education and occupation affect individuals’ awareness, skills and perceptions of social engineering.

Design/methodology/approach

A quantitative research approach was used to survey a diverse demographic of Egyptian society. The survey was conducted in February 2023, and the participants were sourced from various Egyptian social media pages covering different topics. The collected data was analyzed using descriptive and inferential statistics, including independent samples t-test and ANOVA, to compare awareness and skills across different groups.

Findings

The study revealed that younger individuals and those with higher education tend to research social engineering more frequently. Males display a higher level of awareness but score lower in terms of social and psychological consequences as well as types of attacks when compared to females. The type of attack cannot be predicted based on age. Higher education is linked to greater awareness and ability to defend against attacks. Different occupations have varying levels of awareness, skills, and psychosocial consequences. The study emphasizes the importance of increasing awareness, education and implementing cybersecurity measures.

Originality/value

This study’s originality lies in its focus on diverse Egyptian demographics, innovative recruitment via social media, comprehensive exploration of variables, statistical rigor, practical insights for cybersecurity education and diversity in educational and occupational backgrounds.

Details

Library Hi Tech, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0737-8831

Keywords

Article
Publication date: 15 July 2022

Sobia Bano, Muhammad Zeeshan Mirza, Marva Sohail and Muhammad Umair Javaid

The coronavirus disease 2019 (COVID-19) epidemic has given an upsurge to online retailing in Pakistan. This shift has escalated the issues about privacy concerns among consumers…

Abstract

Purpose

The coronavirus disease 2019 (COVID-19) epidemic has given an upsurge to online retailing in Pakistan. This shift has escalated the issues about privacy concerns among consumers. Keeping in view the growing concerns, the objective of this study is to investigate customer patronage in online shopping and the role of privacy concerns in this relationship.

Design/methodology/approach

To generalize the relationship between antecedents and outcomes of privacy concerns, a cross-disciplinary macro model was used. Data were collected through a survey method from the consumers who used credit and debit cards during online shopping.

Findings

Results show that government regulations have a significant positive relationship with privacy concerns and customer patronage. Privacy concerns are found to have a significant negative relationship with organizational ethical care while customer patronage was found to have a significant positive relationship with organizational ethical care. Customer patronage was also found to have a significant negative relationship with privacy concerns. Privacy concerns mediated the relationship between government regulations and customer patronage, whereas privacy concerns does not mediate the relationship between organizational ethical care and customer patronage.

Originality/value

The research adds to the existing literature and highlights the customer behavior toward online shopping/e-commerce in developing economies. The research gives a direction to stakeholders to counter privacy concerns and ensure safer e-commerce practices.

Details

EuroMed Journal of Business, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1450-2194

Keywords

Open Access
Article
Publication date: 24 November 2023

Ornella Tanga Tambwe, Clinton Ohis Aigbavboa and Opeoluwa Akinradewo

Data represents a critical resource that enables construction companies’ success; thus, its management is very important. The purpose of this study is to assess the benefits of…

Abstract

Purpose

Data represents a critical resource that enables construction companies’ success; thus, its management is very important. The purpose of this study is to assess the benefits of construction data risks management (DRM) in the construction industry (CI).

Design/methodology/approach

This study adopted a quantitative method and collected data from various South African construction professionals with the aid of an e-questionnaire. These professionals involve electrical engineers, quantity surveyors, architects and mechanical, as well as civil engineers involved under a firm, or organisation within the province of Gauteng, South Africa. Standard deviation, mean item score, non-parametric Kruskal–Wallis H test and exploratory factor analysis were used to analyse the retrieved data.

Findings

The findings revealed that DRM enhances project and company data availability, promotes confidentiality and enhances integrity, which are the primary benefits of DRM that enable the success of project delivery.

Research limitations/implications

The research was carried out only in the province of Gauteng due to COVID-19 travel limitations.

Practical implications

The construction companies will have their data permanently in their possession and no interruption will be seen due to data unavailability, which, in turn, will allow long-term and overall pleasant project outcomes.

Originality/value

This study seeks to address the benefits of DRM in the CI to give additional knowledge on risk management within the built environment to promote success in every project.

Details

Journal of Engineering, Design and Technology , vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1726-0531

Keywords

Article
Publication date: 11 January 2024

Andrei Khurshudov

A smart city integrates a comprehensive suite of technologies, which inherently require data to function effectively. It is designed with the intention of amassing all available…

Abstract

Purpose

A smart city integrates a comprehensive suite of technologies, which inherently require data to function effectively. It is designed with the intention of amassing all available data concerning machines, devices, infrastructure, individuals and their surroundings. This commentary addresses the evolution of smart cities over time, the increasing extent of data collection, the growing pressure on personal privacy and people's reactions to these trends. The article highlights the contradiction between the needs of the city and the desires of its inhabitants. It notes that people react differently to gradual versus abrupt changes in data-collecting technologies and services. It also suggests that more work needs to be done to prepare both smart cities and the human population for a sustainable, mutually beneficial future.

Design/methodology/approach

This commentary presents a viewpoint on the subject of data collection and privacy in smart cities, drawing on various sources to support its observations and conclusions.

Findings

The primary focus of this discussion is on the technological evolution of the cities. It emphasizes that, as cities get smarter, they offer more conveniences in exchange for various types of data, highlighting the likelihood that pressure on personal privacy will continue to escalate. This is due to the increasing pervasiveness of data-collecting technologies in every aspect of lives and urban environments. These environments are expected to become progressively smarter each year. Given this context, and to ensure a seamless transition to smart and sustainable cities, it is imperative that today's privacy discussions start to focus not only just on the existing but also on the future conditions and challenges that citizens are expected to encounter.

Originality/value

This commentary delves into the existing gaps in understanding the contradiction between the data-collection “needs” of smart cities, the direction in which the cities are evolving and people's awareness of how much data they will have to surrender in the future. It also highlights the risk of people gradually relinquishing nearly all their privacy, often without noticing, in exchange for the ever-increasing conveniences offered by smart cities.

Details

Smart and Sustainable Built Environment, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2046-6099

Keywords

1 – 10 of over 1000