Search results
1 – 10 of over 25000Dillip Kumar Rath and Ajit Kumar
In today’s digitized environment, information privacy has become a prime concern for everybody. The purpose of this paper is to provide an understanding of information privacy…
Abstract
Purpose
In today’s digitized environment, information privacy has become a prime concern for everybody. The purpose of this paper is to provide an understanding of information privacy concern arising because of the application of computer-based information system in the various domains (E-Governance, E-Commerce, E-Health, E-Banking and E-Finance), and at different levels, i.e. individual, group, organizational and societal.
Design/methodology/approach
The authors performed an in-depth analysis of different research articles related to information privacy concerns and elements affecting those at certain level of applications. The primary sources of literature were articles retrieved from online databases. Various online journal and scholarly articles were searched in detail to locate information privacy-related articles.
Findings
The authors have carried out a detailed literature review to identify the different levels where the privacy is a big challenging task. This paper provides insights whether information privacy concern may obstruct in the successful dispersal and adoption of different applications in various application domains. Consumers’ attitude towards information privacy concerns have enlightened and addressed at individual levels in numerous domains. Privacy concerns at the individual level, as suggested by our analysis, seem to have been sufficiently addressed or addressed. However, information privacy concerns at other levels – group, organizational and societal levels – need the attention of researchers.
Originality/value
In this paper, the authors have posited that it will help the researchers to more focus at group level privacy perspective in the information privacy era.
Details
Keywords
Fatemeh Khozaei Ravari, Ahmad Sanusi Hassan, Muhammad Hafeez Abdul Nasir and Mohsen Mohammad Taheri
The study's main objective is to evaluate the morphological developments in the characteristics of the spatial configurations of the residential layouts in Kerman, Iran, in…
Abstract
Purpose
The study's main objective is to evaluate the morphological developments in the characteristics of the spatial configurations of the residential layouts in Kerman, Iran, in examining the impact on the level of visual privacy through the spectrum of permeability and wayfinding in space syntax analysis.
Design/methodology/approach
In this paper, plan graph analysis is used to measure the syntactic properties of seven topological residential architecture plans in Kerman, Iran, built from the 1970s to 2010s. The methodology involves the development of mathematical measurements to signify permeability and simulation of visibility graph analysis (VGA) to indicate wayfinding.
Findings
The findings reveal the residential layouts of Iranian houses tend to be less integrated over decades of design development from the 1970s to 2010s. Reduction in spatial integration corresponds to increase segregation allowing for enhanced visual privacy. The study underpins that, even with the constraints in the scale of the house and reduction in the number of nodes, as evident in the design of the modern residential layout, the efficient level of visual privacy is still achievable with regards to the standards demanded by the local culture.
Originality/value
The study examines the development in residential spatial configuration and building scale on visual privacy through a proposed methodology based on the level of permeability and wayfinding measured as a combined effect using the space syntax analysis and visual accessibility.
Details
Keywords
Vasilios Katos and Ahmed Patel
This paper aims to propose a tool to help policy makers understand the dynamic relationships between security and privacy on a strategic (macro) level.
Abstract
Purpose
This paper aims to propose a tool to help policy makers understand the dynamic relationships between security and privacy on a strategic (macro) level.
Design/methodology/approach
The methodology is ported from the discipline of Macroeconomics, and applied to the information security and privacy domain. The methodology adopted is the so‐called “cross methodology” which claims ownership of the well‐known supply/demand market equilibrium exercise.
Findings
Early evaluation reveals that this is a potentially very effective tool in understanding societal behaviour and position towards information security and privacy and therefore makes this a suitable tool for investigating and exploring scenarios that can assist in policy making.
Originality/value
Up to date, research on the economics of security and privacy has been primarily focusing on a micro level. The main contribution of this paper is a methodology for investigating privacy and security on a macro level. We believe that our approach in undertaking this research is new and looking at the issues and relationships between security and privacy at a macro level, gives a better understanding of the problems at hand and how to resolve them.
Practical implications
The proposed tool may increase the efficiency of policy making and planning as it enables the policy makers on a governmental and strategic level to run scenarios in order to investigate the effect of their decisions (for example, an introduction of a stricter law relating to computer misuse) to the delicate balance of security and privacy.
Details
Keywords
Maor Weinberger, Maayan Zhitomirsky-Geffet and Dan Bouhnik
The purpose of this paper is to investigate the attitudes and influential factors of users’ knowledge and use of the tools designated for controlling and enhancing online privacy…
Abstract
Purpose
The purpose of this paper is to investigate the attitudes and influential factors of users’ knowledge and use of the tools designated for controlling and enhancing online privacy, which are referred to as online privacy literacy (OPL). Particularly, inspired by the protection motivation theory, a motivational factor is defined as comprising several variables which reflect users’ motivation to protect their online privacy.
Design/methodology/approach
To this end, a user study was conducted based on the quantitative method with the participation of 169 students from the Israeli academia who were administered closed-ended questionnaires.
Findings
Generally low to moderate levels of OPL were obtained. Interestingly, the multivariate linear regression analysis showed that motivational factors, such as users’ concern for personal information protection on the internet and users’ privacy self-efficacy and sense of anonymity when visiting a website, were among the strongest predictive factors of users’ OPL level.
Social implications
This research has social implications that might contribute to an increase in the OPL among internet users.
Originality/value
The direct influence of the examined factors on users’ OPL was not previously discussed in the literature. As a result of the study, a comprehensive model of user online privacy behavior was constructed.
Details
Keywords
This paper aims to investigate behavioural changes related to self-censorship (SC) in social networking sites (SNSs) as new methods of online surveillance are introduced. In…
Abstract
Purpose
This paper aims to investigate behavioural changes related to self-censorship (SC) in social networking sites (SNSs) as new methods of online surveillance are introduced. In particular, it examines the relationships between SC and four related factors: privacy concerns (PC), privacy awareness (PA), perceived vulnerability (PV) and information management (IM).
Design/methodology/approach
A national wide survey was conducted in the UK (N = 519). The data were analysed to present both descriptive and inferential statistical findings.
Findings
The level of online SC increases as the level of privacy concern increases. The level of privacy concern increases as the levels of PA and PV increase and the level of effective IM decreases.
Originality/value
This study extends the literature on online SC, showing that PCs increase the level of SC in SNSs. It provides support for three antecedent factors to PC which impact upon levels of SC when communicating in SNSs.
Details
Keywords
Vasiliki Diamantopoulou and Haralambos Mouratidis
The enforcement of the General Data Protection Regulation imposes specific privacy- and -security related requirements that any organisation that processes European Union…
Abstract
Purpose
The enforcement of the General Data Protection Regulation imposes specific privacy- and -security related requirements that any organisation that processes European Union citizens’ personal data must comply with. The application of privacy- and security-by-design principles are assisting organisation in achieving compliance with the Regulation. The purpose of this study is to assist data controllers in their effort to achieve compliance with the new Regulation, by proposing the adoption of the privacy level agreement (PLA). A PLA is considered as a formal way for the data controllers and the data subjects to mutually agree the privacy settings of a service provisioned. A PLA supports privacy management, by analysing privacy threats, vulnerabilities and information systems’ trust relationships.
Design/methodology/approach
However, the concept of PLA has only been proposed on a theoretical level. To this aim, two different domains have been selected acting as real-life case studies, the public administration and the health care, where special categories of personal data are processed.
Findings
The results of the evaluation of the adoption of the PLA by the data controllers are positive. Furthermore, they indicate that the adoption of such an agreement facilitates data controllers in demonstrating transparency of their processes. Regarding data subjects, the evaluation process revealed that the use of the PLA increases trust levels on data controllers.
Originality/value
This paper proposes a novel reference architecture to enable PLA management in practice and reports on the application and evaluation of PLA management.
Details
Keywords
The concept and practice of e-services has become essential in business transactions. Yet there are still many organizations that have not developed e-services optimally. This is…
Abstract
The concept and practice of e-services has become essential in business transactions. Yet there are still many organizations that have not developed e-services optimally. This is especially relevant in the context of Indonesian Airline companies. Therefore, many airline customers in Indonesia are still in doubt about it, or even do not use it. To fill this gap, this study attempts to develop a model for e-services adoption and empirically examines the factors influencing the airlines customers in Indonesia in using e-services offered by the Indonesian airline companies. Taking six Indonesian airline companies as a case example, the study investigated the antecedents of e-services usage of Indonesian airlines. This study further examined the impacts of motivation on customers in using e-services in the Indonesian context. Another important aim of this study was to investigate how ages, experiences and geographical areas moderate effects of e-services usage.
The study adopts a positivist research paradigm with a two-phase sequential mixed method design involving qualitative and quantitative approaches. An initial research model was first developed based on an extensive literature review, by combining acceptance and use of information technology theories, expectancy theory and the inter-organizational system motivation models. A qualitative field study via semi-structured interviews was then conducted to explore the present state among 15 respondents. The results of the interviews were analysed using content analysis yielding the final model of e-services usage. Eighteen antecedent factors hypotheses and three moderating factors hypotheses and 52-item questionnaire were developed. A focus group discussion of five respondents and a pilot study of 59 respondents resulted in final version of the questionnaire.
In the second phase, the main survey was conducted nationally to collect the research data among Indonesian airline customers who had already used Indonesian airline e-services. A total of 819 valid questionnaires were obtained. The data was then analysed using a partial least square (PLS) based structural equation modelling (SEM) technique to produce the contributions of links in the e-services model (22% of all the variances in e-services usage, 37.8% in intention to use, 46.6% in motivation, 39.2% in outcome expectancy, and 37.7% in effort expectancy). Meanwhile, path coefficients and t-values demonstrated various different influences of antecedent factors towards e-services usage. Additionally, a multi-group analysis based on PLS is employed with mixed results. In the final findings, 14 hypotheses were supported and 7 hypotheses were not supported.
The major findings of this study have confirmed that motivation has the strongest contribution in e-services usage. In addition, motivation affects e-services usage both directly and indirectly through intention-to-use. This study provides contributions to the existing knowledge of e-services models, and practical applications of IT usage. Most importantly, an understanding of antecedents of e-services adoption will provide guidelines for stakeholders in developing better e-services and strategies in order to promote and encourage more customers to use e-services. Finally, the accomplishment of this study can be expanded through possible adaptations in other industries and other geographical contexts.
Details
Keywords
The adoption of social media has been extensively discussed. However, to explain the adoption of traditional social media, considering the benefits and risks accumulated from the…
Abstract
Purpose
The adoption of social media has been extensively discussed. However, to explain the adoption of traditional social media, considering the benefits and risks accumulated from the experiences of social media use, the extent literature is limited. Thus, this paper investigated the act of traditional social media users’ switching behavior from a dynamic perspective and the level of information privacy concerns and social media privacy to measure the risks and benefit accumulated from this dynamic process.
Design/methodology/approach
This study of Facebook and Twitter users, who are regarded as representative of traditional social media, are selected as research targets surveyed and were required to answer a specially designed questionnaire in order to determine their general feeling on social media platforms they currently use. As a part of this process, quota sampling was used to collect different samples based on gender and age. In this paper, t-test, one-way ANOVA and multiple comparisons were used for the statistical analysis, conducted through SPSS.
Findings
Information privacy concerns and social media dependency affect the adoption of social media. Secondly, social media dependency is a more salient determinant for social media adoption. Therefore, social media firms should pay more attention to enhancing user dependency of social media by increasing user involvement of social media.
Originality/value
This study intends to conduct a research design that provides an overall and holistic understanding of user usage experience. To do this, it investigates the intensity of switching behavior through the level of dependency and the level of information privacy concern that users inevitably exhibit through the use of social media over long time.
Details
Keywords
Nidhi Sharma and Ravindara Bhatt
Privacy preservation is a significant concern in Internet of Things (IoT)-enabled event-driven wireless sensor networks (WSNs). Low energy utilization in the event-driven system…
Abstract
Purpose
Privacy preservation is a significant concern in Internet of Things (IoT)-enabled event-driven wireless sensor networks (WSNs). Low energy utilization in the event-driven system is essential if events do not happen. When events occur, IoT-enabled sensor network is required to deal with enormous traffic from the concentration of demand data delivery. This paper aims to explore an effective framework for safeguarding privacy at source in event-driven WSNs.
Design/methodology/approach
This paper discusses three algorithms in IoT-enabled event-driven WSNs: source location privacy for event detection (SLP_ED), chessboard alteration pattern (SLP_ED_CBA) and grid-based source location privacy (GB_SLP). Performance evaluation is done using simulation results and security analysis of the proposed scheme.
Findings
The sensors observe bound events or sensitive items within the network area in the field of interest. The open wireless channel lets an opponent search traffic designs, trace back and reach the start node or the event-detecting node. SLP_ED and SLP_ED_CBA provide better safety level results than dynamic shortest path scheme and energy-efficient source location privacy protection schemes. This paper discusses security analysis for the GB_SLP. Comparative analysis shows that the proposed scheme is more efficient on safety level than existing techniques.
Originality/value
The authors develop the privacy protection scheme in IoT-enabled event-driven WSNs. There are two categories of occurrences: nominal events and critical events. The choice of the route from source to sink relies on the two types of events: nominal or critical; the privacy level required for an event; and the energy consumption needed for the event. In addition, phantom node selection scheme is designed for source location privacy.
Details
Keywords
Aikaterini Soumelidou and Aggeliki Tsohou
The purpose of this paper is to propose visualization techniques as a new representation for privacy policies instead of traditional textual representation and to examine…
Abstract
Purpose
The purpose of this paper is to propose visualization techniques as a new representation for privacy policies instead of traditional textual representation and to examine empirically their effects on users’ information privacy awareness level.
Design/methodology/approach
The authors selected as a case the privacy policy of Instagram and conducted two empirical investigations, each one with three interventions and each representing a different version of the Instagram privacy policy to users. Through a pre- and a post-questionnaire, the authors examined the effects that each representation technique had on the users’ privacy awareness level.
Findings
The paper finds that visualized privacy policies lead to higher privacy awareness levels than conventional textual ones, especially when icons are included.
Research limitations/implications
The authors implemented two new representation techniques offering beneficial guidelines for designing more attractive privacy policy representations. However, the samples are rather limited for generalization to the wide population; nonetheless, they are significant to demonstrate the effect of visualized techniques. The findings might also be subject to bias (e.g. brand bias), although the authors took necessary methodological actions to prevent bias.
Practical implications
The results and the methodology of the paper could guide practitioners for the representation of a privacy policy, given that the authors provide systematic and concrete steps.
Originality/value
This paper examines the value of privacy policy visualization as a new approach for enabling user privacy awareness, as well as implements two visualization techniques for a given privacy policy. The paper and its findings should be useful for researchers, as well as for practitioners.
Details