Search results

1 – 10 of over 23000
Article
Publication date: 17 November 2021

Lori Baker-Eveleth, Robert Stone and Daniel Eveleth

This study aims to identify the roles that privacy experiences and social media use play in influencing privacy-protection behaviors. As social media use expands in terms of the…

1374

Abstract

Purpose

This study aims to identify the roles that privacy experiences and social media use play in influencing privacy-protection behaviors. As social media use expands in terms of the number of users and functionality; it is important to understand social media user privacy-protection behaviors and the users’ psychological underpinnings driving those behaviors. Among these, perceptions are the users’ evaluation of their privacy concerns and data sharing benefits inherent in social media use which influence the users’ behaviors to protect their privacy.

Design/methodology/approach

To research these issues, a theoretical model and hypotheses were developed, based on self-efficacy theory. The theoretical model was empirically tested using 193 questionnaire responses collected from students enrolled in business courses at a medium-sized university in the western USA. All the respondents reported that they routinely use social media. The empirical analysis was performed using structural equations modeling in PC SAS version 9.4, procedure Calis.

Findings

The estimation of the paths in the structural model indicates that privacy concerns positively influence social media users’ protection behaviors while the perceived benefits of data sharing negatively influence protection behaviors. Privacy experience positively influences privacy concerns. Alternatively, social media use positively influences social media self-efficacy and perceived usefulness, which, in turn, have meaningful influences on data sharing benefits.

Originality/value

Previous findings about the effect of self-efficacy on protection behaviors has been inconclusive. This study adds some clarity. Specifically, the findings suggest that the effect depends upon the foci of self-efficacy. While higher self-efficacy with respect to using privacy-related features of a specific technology tends to lead to greater privacy concerns, higher self-efficacy with respect to the more general technology (e.g. social media, computer) seems to affect protection behaviors through perceived benefits. Further, the results of this study offer conclusions about the roles that privacy experiences, social media use and perceived social media benefits play in affecting protection behaviors.

Details

Information & Computer Security, vol. 30 no. 3
Type: Research Article
ISSN: 2056-4961

Keywords

Book part
Publication date: 8 August 2008

Jan Bourne-Day and Geraldine Lee-Treweek

Privacy is a highly valued ideal in western societies and the researcher is usually expected to protect the privacy of the researched. However, real world fieldwork experiences

Abstract

Privacy is a highly valued ideal in western societies and the researcher is usually expected to protect the privacy of the researched. However, real world fieldwork experiences are highly complex and the researcher can often find their private life encroached upon. The chapter uses the authors’ own field experiences to discuss this complexity. Lee-Treweek focuses upon her research experience with disabled children living in rural England and Bourne-Day on projects with refugee and asylum seekers in Staffordshire, England. Their discussions reveal that more often than not, privacy issues in the field often interconnect researcher and the researched.

Details

Access, a Zone of Comprehension, and Intrusion
Type: Book
ISBN: 978-1-84663-891-6

Article
Publication date: 4 February 2022

Emmanuel W. Ayaburi

The study aims to empirically understand individuals' tendency to disclose private information online following different forms of data breach (i.e. reversible and irreversible…

Abstract

Purpose

The study aims to empirically understand individuals' tendency to disclose private information online following different forms of data breach (i.e. reversible and irreversible victimization).

Design/methodology/approach

Survey methodology is applied to measure the perception of victims of data breaches on key indicators of information disclosure.

Findings

Analysis of responses from 309 victims of data breaches show that while victims' irreversible data breach victimization experience influences both dimensions of privacy concerns, reversible data breach victimization experiences influenced only peer privacy concerns (PPCs). Furthermore, only institutional privacy concerns impacted online disclosure and fully mediate the relationship between victimization experience and online disclosure.

Research limitations/implications

The findings contribute to the privacy literature by expanding the dimension of victimization and considering their differential effect on privacy concerns. Additionally, the study uncovers the efficacy of privacy dimension on privacy recalibration following a data breach announcement.

Practical implications

For practice, the results provide insights for managers on how to manage customer restitution after a data breach. Management of the process of privacy recalibration should not be homogenous but be based on degree of consequence.

Social implications

This research provides deeper understanding of how the ascendancy of privacy breaches affect privacy management. The findings illuminate why the increasing trend in online activities is observed.

Originality/value

The study is the first to identify two dimensions of data breach victimization experience based on the breach level index (BLI). The two dimensions of victimization (i.e. reversible and irreversible privacy victimizations) were used to understand individuals' tendency to disclose private information online.

Details

Information Technology & People, vol. 36 no. 1
Type: Research Article
ISSN: 0959-3845

Keywords

Article
Publication date: 2 August 2019

Le Wang, Zao Sun, Xiaoyong Dai, Yixin Zhang and Hai-hua Hu

The purpose of this paper is to facilitate understanding of how to mitigate the privacy concerns of users who have experienced privacy invasions.

1449

Abstract

Purpose

The purpose of this paper is to facilitate understanding of how to mitigate the privacy concerns of users who have experienced privacy invasions.

Design/methodology/approach

Drawing on the communication privacy management theory, the authors developed a model suggesting that privacy concerns form through a cognitive process involving threat-coping appraisals, institutional privacy assurances and privacy experiences. The model was tested using data from an empirical survey with 913 randomly selected social media users.

Findings

Privacy concerns are jointly determined by perceived privacy risks and privacy self-efficacy. The perceived effectiveness of institutional privacy assurances in terms of established privacy policies and privacy protection technology influences the perceptions of privacy risks and privacy self-efficacy. More specifically, privacy invasion experiences are negatively associated with the perceived effectiveness of institutional privacy assurances.

Research limitations/implications

Privacy concerns are conceptualized as general concerns that reflect an individual’s worry about the possible loss of private information. The specific types of private information were not differentiated.

Originality/value

This paper is among the first to clarify the specific mechanisms through which privacy invasion experiences influence privacy concerns. Privacy concerns have long been viewed as resulting from individual actions. The study contributes to literature by linking privacy concerns with institutional privacy practice.

Article
Publication date: 26 November 2019

Le Wang, Hai-Hua Hu, Jie Yan and Maggie Qiuzhu Mei

The purpose of this paper is to explore the antecedents of self-disclosure intention on mobile social applications. This study integrates privacy calculus model and elaboration…

1435

Abstract

Purpose

The purpose of this paper is to explore the antecedents of self-disclosure intention on mobile social applications. This study integrates privacy calculus model and elaboration likelihood theory to reconcile the rational and heuristic views of privacy decision making.

Design/methodology/approach

Using a “random dialing” sampling method, an empirical survey with 913 respondents was conducted. A series of regression models were employed to test the proposed relationships. Robust checks with sub-group analysis were conducted.

Findings

Self-disclosure intention develops along a dual route including the central route and the peripheral route. When the central route predominates, social media users form their attitudes toward self-disclosure based on a rational calculus of the privacy concern and perceived rewards. When the peripheral route predominates, users perform a more heuristic evaluation of relevant informational cues (information about privacy harms, the extent of information asymmetry between users and operators) and contextual cues (flow experience, privacy disclosure of friends). Peripheral cues moderate the relationships between central cues and self-disclosure intention.

Originality/value

This paper extends the Elaboration Likelihood Model by investigating the interaction between the central route and peripheral route. The results provide alternative explanations on the renowned “privacy paradox” phenomenon.

Details

Journal of Enterprise Information Management, vol. 33 no. 2
Type: Research Article
ISSN: 1741-0398

Keywords

Article
Publication date: 14 May 2021

Hichang Cho

Many internet users exhibit signs of privacy helplessness and entirely give up online privacy management. However, we know little about what privacy helplessness is, when users…

1001

Abstract

Purpose

Many internet users exhibit signs of privacy helplessness and entirely give up online privacy management. However, we know little about what privacy helplessness is, when users are likely to experience it and its implications for privacy behavior. The objectives of this study were twofold: (a) the conceptual explication of privacy helplessness as a novel construct in privacy research and (b) the development of a theoretical model that specifies the antecedents and consequences of privacy helplessness.

Design/methodology/approach

A research model of privacy helplessness that contains three subcomponents of privacy helplessness, five antecedents and one outcome was developed. The model was empirically examined based on survey data collected from 589 Facebook users in the USA.

Findings

The results of exploratory and confirmatory factor analyses showed that privacy helplessness is adequately assessed by a three-factor model with affective, cognitive and motivational components. The results of structural equation modeling indicated that these three aspects of privacy helplessness are uniquely predicted by five theoretical factors: (a) prior experience of privacy risks, (b) personal mastery, (c) perceived costs of adaptive privacy actions, (d) perceived rewards of privacy inactions and (e) perceived vulnerability. Furthermore, it was found that helplessness as motivational deficits (and cognitive helplessness via this) impedes adaptive privacy actions, while cognitive helplessness promotes adaptive privacy actions when they do not result in motivational deficits.

Originality/value

This study pioneers investigation in understanding key constituents, attributes and processes underlying privacy helplessness. First, the present study developed the first theory-derived, successively validated measurement model of privacy helplessness. Second, this research proposed a theoretical model of privacy helplessness, specifying antecedents and consequences of privacy helplessness.

Details

Internet Research, vol. 32 no. 1
Type: Research Article
ISSN: 1066-2243

Keywords

Article
Publication date: 13 July 2023

Anita Katulić

The research aims to establish the predictors of the acceptance of technical and organizational measures for the protection of personal data to ensure information privacy in…

Abstract

Purpose

The research aims to establish the predictors of the acceptance of technical and organizational measures for the protection of personal data to ensure information privacy in Croatian libraries, starting from the constructs of the APCO Macro Model.

Design/methodology/approach

Two data collection methods were used: the online survey questionnaire method and the analysis of the websites of independent libraries in the Republic of Croatia.

Findings

The results show that the acceptance of measures for personal data protection by a library manager is mostly influenced by perceived knowledge, while culture and trust have a positive correlation of moderate strength. Awareness has a low positive correlation, and privacy experience is not statistically related to the acceptance of measures. There is no statistically significant difference in the acceptance of measures for the protection of personal data concerning age and work experience in the profession. There is a statistically significant correlation between compliance with the principle of transparency and the size of the library.

Originality/value

The study is valuable as it examined the characteristics of the culture of information privacy in libraries and determined the existence and impact of factors that influence ensuring the information privacy of users in Croatian libraries.

Open Access
Article
Publication date: 26 July 2021

David D’Acunto, Serena Volo and Raffaele Filieri

This study aims to explore US hotel guests’ privacy concerns with a twofold aim as follows: to investigate the privacy categories, themes and attributes most commonly discussed by…

2583

Abstract

Purpose

This study aims to explore US hotel guests’ privacy concerns with a twofold aim as follows: to investigate the privacy categories, themes and attributes most commonly discussed by guests in their reviews and to examine the influence of cultural proximity on privacy concerns.

Design/methodology/approach

This study combined automated text analytics with content analysis. The database consisted of 68,000 hotel reviews written by US guests lodged in different types of hotels in five European cities. Linguistic Inquiry Word Count, Leximancer and SPSS software were used for data analysis. Automated text analytics and a validated privacy dictionary were used to investigate the reviews by exploring the categories, themes and attributes of privacy concerns. Content analysis was used to analyze the narratives and select representative snippets.

Findings

The findings revealed various categories, themes and concepts related to privacy concerns. The two most commonly discussed categories were privacy restriction and outcome state. The main themes discussed in association with privacy were “room,” “hotel,” “breakfast” and several concepts within each of these themes were identified. Furthermore, US guests showed the lowest levels of privacy concerns when staying at American hotel chains as opposed to non-American chains or independent hotels, highlighting the role of cultural proximity in privacy concerns.

Practical implications

Hotel managers can benefit from the results by improving their understanding of hotel and service attributes mostly associated with privacy concerns. Specific suggestions are provided to hoteliers on how to increase guests’ privacy and on how to manage issues related to cultural distance with guests.

Originality/value

This study contributes to the hospitality literature by investigating a neglected issue: on-site hotel guests’ privacy concerns. Using an unobtrusive method of data collection and text analytics, this study offers valuable insights into the categories of privacy, the most recurrent themes in hotel guests’ reviews and the potential relationship between cultural proximity and privacy concerns.

Details

International Journal of Contemporary Hospitality Management, vol. 33 no. 8
Type: Research Article
ISSN: 0959-6119

Keywords

Article
Publication date: 21 April 2022

Gaohui Cao and Ping Wang

Based on communication privacy management (CPM) theory, this study aimed to explore how gender and age criteria, motivational criterion (locatability), benefit-risk ratio criteria…

Abstract

Purpose

Based on communication privacy management (CPM) theory, this study aimed to explore how gender and age criteria, motivational criterion (locatability), benefit-risk ratio criteria (perceived benefits of privacy information disclosure and privacy concerns), contextual criteria (privacy experience) and boundary coordination and turbulence (perceived effectiveness of privacy policy) interact and combine in leading to voice assistant (VA) users' intention to reveal or conceal their privacy information.

Design/methodology/approach

A questionnaire was designed and distributed to car drivers who have intelligent VA use experience while driving. A total of 230 valid responses were collected. The fuzzy-set qualitative comparative analysis (fsQCA) approach was used to analyse the data.

Findings

Via configuration analysis with fsQCA, five equivalent configurations leading to the high intention of disclosing privacy information, and one configuration leading to the intention of concealing privacy information were identified. Four theoretical configurational propositions were proposed. Moreover, the theoretical and practical implications of the findings are discussed.

Originality/value

This study offers some insightful implications in the field of private information communication in artificial intelligence applications as well as practical implications for intelligent VA application design. The findings provide empirical evidence of privacy communication management in the context of smart VA usage.

Article
Publication date: 13 September 2018

Ching-Hsuan Yeh, Yi-Shun Wang, Shin-Jeng Lin, Timmy H. Tseng, Hsin-Hui Lin, Ying-Wei Shih and Yi-Hsuan Lai

Considering that users’ information privacy concerns may affect the development of e-commerce, the purpose of this paper is to explore what drives internet users’ willingness to…

1556

Abstract

Purpose

Considering that users’ information privacy concerns may affect the development of e-commerce, the purpose of this paper is to explore what drives internet users’ willingness to provide personal information; further, the paper examines how extrinsic rewards moderate the relationship between users’ information privacy concerns and willingness to provide personal information.

Design/methodology/approach

Data collected from 345 valid internet users in the context of electronic commerce were analyzed using the partial least squares approach.

Findings

The result showed that agreeableness, risk-taking propensity and experience of privacy invasion were three main antecedents of information privacy concerns among the seven individual factors. Additionally, information privacy concerns did not significantly affect users’ willingness to provide personal information in the privacy calculation mechanism; however, extrinsic rewards directly affected users’ disclosure intention. The authors found that extrinsic rewards had not moderated the relationship between users’ information privacy concerns and their willingness to provide personal information.

Originality/value

This study is an exploratory effort to develop and validate a model for explaining why internet users were willing to provide personal information. The results of this study are helpful to researchers in developing theories of information privacy concerns and to practitioners in promoting internet users’ willingness to provide personal information in an e-commerce context.

1 – 10 of over 23000