Search results

1 – 10 of over 1000
Open Access
Article
Publication date: 22 August 2023

Thomas Kalischko and René Riedl

The potential applications of information and communication technologies in the workplace are wide-ranging and, especially since the COVID-19 pandemic, have increasingly found…

1012

Abstract

Purpose

The potential applications of information and communication technologies in the workplace are wide-ranging and, especially since the COVID-19 pandemic, have increasingly found their way into the field of electronic performance monitoring (EPM) of employees. This study aims to examine the influence of EPM on individual performance considering the aspects of privacy invasion, organizational trust and individual stress within an organization. Thus, important insights are generated for academia as well as business.

Design/methodology/approach

A theoretical framework was developed which conceptualizes perceived EPM as independent variable and individual performance as dependent variable. Moreover, the framework conceptualizes three mediator variables (privacy invasion, organizational trust and individual stress). Based on a large-scale survey (N = 1,119), nine hypotheses were tested that were derived from the developed framework.

Findings

The results indicate that perception of EPM significantly increases privacy invasion, reduces organizational trust, increases individual stress and ultimately reduces individual performance. Moreover, it was found that privacy invasion reduces organizational trust and that this lowered trust increases individual stress. Altogether, these findings suggest that the use of EPM by employers may be associated with significant negative consequences.

Originality/value

This research enriches the literature on digital transformation, as well as human–machine interaction, by adopting a multidimensional theoretical and empirical perspective regarding EPM in the workplace context, in which the influence of EPM perceptions on individual performance is examined under the influence of different aspects (privacy invasion, organizational trust and individual stress) not currently considered in this combination in the literature.

Details

Digital Transformation and Society, vol. 3 no. 1
Type: Research Article
ISSN: 2755-0761

Keywords

Article
Publication date: 7 March 2016

Khaldoun I. Ababneh and Mohammed A. Al-Waqfi

Building on organizational justice and privacy literatures, the purpose of this paper is to test a model capturing the impacts of potentially inappropriate/discriminatory…

3681

Abstract

Purpose

Building on organizational justice and privacy literatures, the purpose of this paper is to test a model capturing the impacts of potentially inappropriate/discriminatory interview questions on job applicant perceptions and behavioral intentions in a developing economy context with a multicultural workforce.

Design/methodology/approach

An experimental design using senior undergraduate students (n=221) seeking or about to seek jobs in the United Arab Emirates was used to examine interviewees’ reactions to inappropriate/discriminatory interview questions. A questionnaire was used to collect the data. Structural equation modeling and bootstrapping were used for data analysis and hypothesis testing.

Findings

This study demonstrates that inappropriate/discriminatory interview questions influence privacy invasion perceptions, which in turn influence job applicants’ fairness perceptions and behavioral intentions. This study also demonstrates that privacy invasion perceptions fully mediate the effect of inappropriate/discriminatory employment interview questions on fairness perceptions. Moreover, the findings show that privacy invasion directly and indirectly, via fairness perceptions, influence litigation intentions. On the other hand, findings of this study indicate that privacy invasion influence organizational attractiveness and recommendation intentions only indirectly, via fairness perceptions.

Originality/value

This is the first study to examine the impact of inappropriate/discriminatory interview questions on applicant reactions in a developing economy context with social, cultural, and legal environment that is different from those prevailing in developed Western societies. This study demonstrates that privacy invasion is an important mechanism to understand job applicant reactions to inappropriate interview questions.

Article
Publication date: 9 May 2023

Ali Abdallah Alalwan, Abdullah M. Baabdullah, Mutaz M. Al-Debei, Ramakrishnan Raman, Hitmi Khalifa Alhitmi, Amjad A. Abu-ElSamen and Yogesh K. Dwivedi

There is always a need to discover how a paradox between a customer’s desire for a more personalized experience and their privacy and security concerns would shape their intention…

Abstract

Purpose

There is always a need to discover how a paradox between a customer’s desire for a more personalized experience and their privacy and security concerns would shape their intention to continue using contactless payment methods. However, personalization–privacy paradox has not been well-covered over the area of contactless payment. Therefore, this study aims to empirically examine the impact of personalization–privacy paradox on the customers’ continued intention (CIN) to use contactless payment.

Design

/methodology/approach – The empirical part of the current study was conducted in Saudi Arabia by collecting the primary data using online questionnaire from a convenience sample size of 297 actual users of contactless payment methods.

Findings

Based on structural equation modeling, personalization and privacy invasion were approved to significantly impact perceived value of information disclosure (PVD). Strong causal associations were confirmed between perceived severity, structural assurance and response cost with privacy invasion. Finally, both PVD and privacy invasion significantly predict CIN.

Research limitations/implications

There are other important factors (i.e. technology interactivity, technology readiness, social influence, trust, prior experience, etc.) were not tested in the current study. Therefore, future studies would pay more attention regarding the impact of these factors. The current study data were also collected using a convenience sample of actual users of contactless payment methods. Therefore, there is a concern regarding the generalizability of the current study results to other kind of customers who have not used contactless payment.

Originality/value

This study has integrated both personalization–privacy paradox and protection motivation theory in one model. The current study holds value in providing a new and complete picture of the inhibitors and enablers of customers’ CIN to use contactless payment, including new types of inhibitors. Furthermore, personalization–privacy paradox has not been fully examined over the related area of Fintech and contactless payment in general. Therefore, this study was able to extend the theoretical horizon personalization–privacy paradox to new area (i.e. contactless payment) and new cultural context (Saudi Arabia).

Details

International Journal of Bank Marketing, vol. 42 no. 1
Type: Research Article
ISSN: 0265-2323

Keywords

Article
Publication date: 2 August 2019

Le Wang, Zao Sun, Xiaoyong Dai, Yixin Zhang and Hai-hua Hu

The purpose of this paper is to facilitate understanding of how to mitigate the privacy concerns of users who have experienced privacy invasions.

1449

Abstract

Purpose

The purpose of this paper is to facilitate understanding of how to mitigate the privacy concerns of users who have experienced privacy invasions.

Design/methodology/approach

Drawing on the communication privacy management theory, the authors developed a model suggesting that privacy concerns form through a cognitive process involving threat-coping appraisals, institutional privacy assurances and privacy experiences. The model was tested using data from an empirical survey with 913 randomly selected social media users.

Findings

Privacy concerns are jointly determined by perceived privacy risks and privacy self-efficacy. The perceived effectiveness of institutional privacy assurances in terms of established privacy policies and privacy protection technology influences the perceptions of privacy risks and privacy self-efficacy. More specifically, privacy invasion experiences are negatively associated with the perceived effectiveness of institutional privacy assurances.

Research limitations/implications

Privacy concerns are conceptualized as general concerns that reflect an individual’s worry about the possible loss of private information. The specific types of private information were not differentiated.

Originality/value

This paper is among the first to clarify the specific mechanisms through which privacy invasion experiences influence privacy concerns. Privacy concerns have long been viewed as resulting from individual actions. The study contributes to literature by linking privacy concerns with institutional privacy practice.

Article
Publication date: 18 July 2019

Pablo Zoghbi-Manrique-de-Lara and Maryamsadat Sharifiatashgah

The purpose of this paper is twofold: first, the relationship between crowding perceptions (i.e. employees’ perceptions of insufficient personal space due to offices’ physical…

Abstract

Purpose

The purpose of this paper is twofold: first, the relationship between crowding perceptions (i.e. employees’ perceptions of insufficient personal space due to offices’ physical constraints) and deviant workplace behaviors (DWBs) directed at both the organization as a whole (DWB-O) and individuals (DWB-I); and second, privacy invasion from supervisors and peers as a mediator.

Design/methodology/approach

Data were collected from 299 respondents working in open-plan offices at four medium-to-large sized IT-based companies. Drawing on conservation of resources theory, the paper suggests that under crowding conditions employees can perceive the physical workspace as a space-related resource that is threatened leading them to engage in DWBs out of a conservation strategy.

Findings

Structural equation modeling results significantly supported main effects of employees’ crowding perceptions on the two types of DWBs, with privacy invasion from supervisors and peers as full mediator.

Research limitations/implications

The study could suffer from mono-method/source bias, and specificities of the studied IT-based companies and their work can raise concerns about the generalizability of the results.

Practical implications

The findings indicate that a proper physical office arrangement can be a useful tool for managers in combating employee DWB.

Originality/value

To date, the origin of workplace deviance has mainly been investigated in terms of the psychosocial work environment; however, the physical labor conditions (i.e. the layout of buildings, furniture, workspace, air conditioning, workplace density, etc.) have received little systematic attention.

Details

International Journal of Manpower, vol. 40 no. 5
Type: Research Article
ISSN: 0143-7720

Keywords

Article
Publication date: 1 August 2016

Kai Li, Xiaowen Wang, Kunrong Li and Jianguo Che

As social network sites (SNS) have increasingly become one of the most important channels for communication, the related privacy issues gain more and more attention in both…

1329

Abstract

Purpose

As social network sites (SNS) have increasingly become one of the most important channels for communication, the related privacy issues gain more and more attention in both industry and academic research fields. This study aims to connect the antecedents of information privacy disclosure on SNS.

Design/methodology/approach

Based on exchange theory, this study tries to investigate the decision-making process for information privacy disclosure on SNS. Factors from both user’s and website’s perspectives are taken into account in the proposed model.

Findings

The results suggest that an individual’s perceived benefits will increase their willingness to disclose information privacy on SNS, but perceived risks decrease this kind of willingness. The authors also find social network size, personal innovativeness and incentive provision positively affect people’s perceived benefits.

Originality/value

Moreover, privacy invasion experience enhances perceived personal risks, but website reputation helps to reduce perceived risks.

Details

Nankai Business Review International, vol. 7 no. 3
Type: Research Article
ISSN: 2040-8749

Keywords

Article
Publication date: 10 January 2022

Yingying Hu, Ling Zhao, Sumeet Gupta and Xiuhong He

The purpose of this paper is twofold: first, to explore the negative consequences of ubiquitous connectivity enabled by personal IT ensembles (PITEs) usage; and second, to…

448

Abstract

Purpose

The purpose of this paper is twofold: first, to explore the negative consequences of ubiquitous connectivity enabled by personal IT ensembles (PITEs) usage; and second, to investigate the gender differences in the adverse effects of ubiquitous connectivity.

Design/methodology/approach

This study employs a socio-technical approach to identify the technical and interpersonal dimensions of PITE-enabled ubiquitous connectivity and develops a theoretical model to investigate their stress-inducing effects based on the framework of technostress. Furthermore, the moderating role of gender is examined based on the social role theory. The authors test the model on a sample of 439 Chinese netizens.

Findings

Ubiquitous technical and interpersonal connectivity induce four stressors: information overload, communication overload, life invasion and privacy invasion. These stressors further lead to psychological exhaustion and reluctance to try new ITs. The ubiquitous technical connectivity exerts stronger effects on stressors for female users than male users, and interpersonal connectivity exerts a stronger effect for male users than female users.

Originality/value

This study primarily contributes to the small amount of research on PITE-enabled ubiquitous connectivity by considering ubiquitous connectivity from a socio-technical perspective and examining the stress-related effects and outcomes of both technical and interpersonal dimensions of ubiquitous connectivity. This study also provides valuable insights into the gender differences in the stress-inducing effects of the two dimensions of ubiquitous connectivity.

Details

Information Technology & People, vol. 36 no. 1
Type: Research Article
ISSN: 0959-3845

Keywords

Article
Publication date: 24 March 2023

Laila Dahabiyeh, Ali Farooq, Farhan Ahmad and Yousra Javed

During the past few years, social media has faced the challenge of maintaining its user base. Reports show that the social media giants such as Facebook and Twitter experienced a…

Abstract

Purpose

During the past few years, social media has faced the challenge of maintaining its user base. Reports show that the social media giants such as Facebook and Twitter experienced a decline in their users. Taking WhatsApp's recent change of its terms of use as the case of this study and using the push-pull-mooring model and a configurational perspective, this study aims to identify pathways for switching intentions.

Design/methodology/approach

Data were collected from 624 WhatsApp users recruited from Amazon Mechanical Turk and analyzed using fuzzy set qualitative comparative analysis (fsQCA).

Findings

The findings identify seven configurations for high switching intentions and four configurations for low intentions to switch. Firm reputation and critical mass increase intention to switch, while low firm reputation and absence of attractive alternatives hinder switching.

Research limitations/implications

This study extends extant literature on social media migration by identifying configurations that result in high and low switching intention among messaging applications.

Practical implications

The study identifies factors the technology service providers should consider to attract new users and retain existing users.

Originality/value

This study complements the extant literature on switching intention that explains the phenomenon based on a net-effect approach by offering an alternative view that focuses on the existence of multiple pathways to social media switching. It further advances the authors’ understanding of the relevant importance of switching factors.

Details

Information Technology & People, vol. 37 no. 3
Type: Research Article
ISSN: 0959-3845

Keywords

Article
Publication date: 13 September 2018

Ching-Hsuan Yeh, Yi-Shun Wang, Shin-Jeng Lin, Timmy H. Tseng, Hsin-Hui Lin, Ying-Wei Shih and Yi-Hsuan Lai

Considering that users’ information privacy concerns may affect the development of e-commerce, the purpose of this paper is to explore what drives internet users’ willingness to…

1556

Abstract

Purpose

Considering that users’ information privacy concerns may affect the development of e-commerce, the purpose of this paper is to explore what drives internet users’ willingness to provide personal information; further, the paper examines how extrinsic rewards moderate the relationship between users’ information privacy concerns and willingness to provide personal information.

Design/methodology/approach

Data collected from 345 valid internet users in the context of electronic commerce were analyzed using the partial least squares approach.

Findings

The result showed that agreeableness, risk-taking propensity and experience of privacy invasion were three main antecedents of information privacy concerns among the seven individual factors. Additionally, information privacy concerns did not significantly affect users’ willingness to provide personal information in the privacy calculation mechanism; however, extrinsic rewards directly affected users’ disclosure intention. The authors found that extrinsic rewards had not moderated the relationship between users’ information privacy concerns and their willingness to provide personal information.

Originality/value

This study is an exploratory effort to develop and validate a model for explaining why internet users were willing to provide personal information. The results of this study are helpful to researchers in developing theories of information privacy concerns and to practitioners in promoting internet users’ willingness to provide personal information in an e-commerce context.

Article
Publication date: 1 December 1994

Philip E. Agre and Christine A. Harbs

Broad coalitions of companies, governments, and research institutions inseveral countries are currently designing massive electronicinfrastructures for their roadways. Known…

1049

Abstract

Broad coalitions of companies, governments, and research institutions in several countries are currently designing massive electronic infrastructures for their roadways. Known collectively as intelligent vehicle‐highway systems (IVHS), these technologies are intended to ease toll collection and commercial vehicle regulation, provide drivers with route and traffic information, improve safety and ultimately support fully automated vehicles. Although many aspects of IVHS are uncertain, some proposed designs require the system to collect vast amounts of data on individuals′ travel patterns, thus raising the potential for severe invasions of privacy. To make social choices about IVHS, it is necessary to reason about potentials for authoritarian uses of an IVHS infrastructure in the hypothetical future. Yet such reasoning is difficult, often veering towards Utopian or dystopian extremes. To help anchor the privacy debate, places IVHS privacy concerns in an institutional context, offering conceptual frameworks to discuss the potential interactions between IVHS technologies and the computer design profession, standards‐setting bodies, marketing organizations, the legal system and government administrative agencies.

Details

Information Technology & People, vol. 7 no. 4
Type: Research Article
ISSN: 0959-3845

Keywords

1 – 10 of over 1000