Search results

1 – 10 of over 13000
Article
Publication date: 6 July 2021

Yuanyuan Guo, Xin Wang and Chaoyou Wang

This study examines how the different dimensions of a privacy policy separately influence perceived effectiveness of privacy policy, as well as the mediating mechanisms behind…

1234

Abstract

Purpose

This study examines how the different dimensions of a privacy policy separately influence perceived effectiveness of privacy policy, as well as the mediating mechanisms behind these effects (i.e. vulnerability, benevolence). In addition, this study considers privacy concern as a significant moderator in the research model, to examine if the relative influences of privacy policy content are contingent upon levels of users' privacy concern.

Design/methodology/approach

The survey experiment was conducted to empirically validate the model. Specifically, three survey experiments and six scenarios were designed to manipulate high and low levels of the three privacy policy dimensions (i.e. transparency, control and protection). The authors totally distributed 450 copies of the questionnaire, of which 407 were valid.

Findings

This paper found that (1) all the three privacy policy dimensions directly influence perceived effectiveness of privacy policy; (2) all the three privacy policy dimensions indirectly influence perceived effectiveness of privacy policy by enhancing perceived corporate benevolence, whereas control also affects perceived effectiveness of privacy policy by reducing perceived vulnerability; and (3) individuals with high-privacy concern are much more impacted by privacy policy contents than individuals with low-privacy concern.

Practical implications

The findings could provide website managers with guidelines on how to design privacy policy contents by reducing user perceptions of vulnerability and enhancing user perceptions of corporate benevolence. The managers need to focus on customers' perceived vulnerability and corporate benevolence when launching or updating privacy policies. Furthermore, the managers also need to attend to users' privacy concerns, especially for multinational companies or companies with specific consumer groups.

Originality/value

This study extends the current privacy policy literature by articulating the separate influences of the three privacy policy dimensions and their impact mechanisms on perceived effectiveness of privacy policy. It also uncovers privacy concerns as a boundary condition that influence the effects of privacy policy contents on users' privacy perceptions.

Details

Journal of Enterprise Information Management, vol. 35 no. 3
Type: Research Article
ISSN: 1741-0398

Keywords

Article
Publication date: 27 September 2023

Emily Zoe Mann, Stephanie A. Jacobs, Kirsten M. Kinsley and Laura I. Spears

Building on past studies of library privacy policies, this review looks at how privacy information is shared at universities and colleges in the state of Florida. Beyond the…

Abstract

Purpose

Building on past studies of library privacy policies, this review looks at how privacy information is shared at universities and colleges in the state of Florida. Beyond the question of whether a library-specific privacy policy exists, this review evaluates what is covered in the policies – whether topics such as how student data is stored, retained, de-identified and disposed of are broached in the statements, and whether specific data sets covering instruction, reference and surveillance are mentioned. The purpose of this study is to open the door to directed exploration into student awareness of privacy policies and spark conversation about positionality of libraries regarding privacy.

Design/methodology/approach

This review was done using a cross-sectional study design through observation of public-facing library privacy policies of higher education institutions in Florida.

Findings

Findings include that the majority of Florida academic libraries do not have a public-facing privacy policy. Only 15 out of the 70 schools reviewed had one. A large portion of those came from doctoral universities with associate’s colleges having none, and baccalaureate/associate’s colleges having only two. The policies that were in place tended to be institution-centered rather than patron-centered. Most categories of listed data collected were in the area of collections, website or computer usage.

Originality/value

The value of this review is that it adds to the literature studying privacy policies in academic libraries. Going forward, this research could address statewide practice in privacy policies as well as helping to lay pathways for working with students and other library patrons to gauge their interests and concerns about privacy.

Details

Information and Learning Sciences, vol. 124 no. 9/10
Type: Research Article
ISSN: 2398-5348

Keywords

Article
Publication date: 22 April 2002

Chang Liu and Kirk P. Arnett

Although personal information privacy concerns have been around for years, the introduction of E‐commerce and its associated technologies presents privacy concerns anew. The…

366

Abstract

Although personal information privacy concerns have been around for years, the introduction of E‐commerce and its associated technologies presents privacy concerns anew. The Fortune 500 represents traditional leadership in the use of technologies and business practices. This preliminary study examines Web sites of the Fortune 500 and shows that slightly more than 50 percent of Fortune 500 Web sites provide privacy policies on their home pages. Comprehensive privacy policies to address all privacy dimensions recommended by the FTC are less common.

Details

American Journal of Business, vol. 17 no. 1
Type: Research Article
ISSN: 1935-5181

Keywords

Article
Publication date: 1 May 2006

Zeinab Karake Shalhoub

The lack of trust in online transactions is one of the main reasons for the relatively low electronic commerce adoption, especially in developing and emerging economies such as…

5638

Abstract

Purpose

The lack of trust in online transactions is one of the main reasons for the relatively low electronic commerce adoption, especially in developing and emerging economies such as those of the countries of the Gulf Cooperation Council (GCC).

Design/methodology/approach

The author conducts a content analysis of the privacy policies and security mechanisms of a sample of companies from the six countries of the GCC which are engaged in electronic commerce transactions.

Findings

It is found that a large percentage of sites with privacy statements address the issue of notice and awareness, while none of the sites has a provision to inform users in case of any complaint, as to whom they should address their complaint, what is the arbitration and settlement methods, who is the enforcement body and finally what are the penalties and sanctions applicable.

Originality/value

The paper has a number of value adding characteristics; first, it attacks a subject that has been close to being ignored in the literature, that is the issue of electronic commerce in developing economies; second, the paper is unique in that it addresses the use of electronic commerce in the six countries of the GCC (the author knows of no other study done on the region); and, third, the paper concludes with a set of recommendations to policy makers in the GCC, to help them increase consumer trust in online transactions and increase the rat of electronic commerce diffusion in their economies.

Details

Information Management & Computer Security, vol. 14 no. 3
Type: Research Article
ISSN: 0968-5227

Keywords

Article
Publication date: 1 September 2004

Kostas Moulinos, John Iliadis and Vassilis Tsoumas

In order to provide customers with a sense of security regarding the protection of their personal data, companies sign on to a “seal” programme, where rules designed by the seal…

1371

Abstract

In order to provide customers with a sense of security regarding the protection of their personal data, companies sign on to a “seal” programme, where rules designed by the seal issuer in accordance to underlying laws must be adhered to. A user can verify online that a specific organisation adheres to a published privacy policy. This paper argues that the verifications means these programmes use are vulnerable to DNS spoofing attacks and present a privacy policy verification (“seal”) scheme, which is not vulnerable to attack. It is also argued that there are disadvantages in operating seal schemes that attempt to publicly certify compliance levels with a self‐regulatory privacy protection model. On the contrary, these disadvantages are softened when used in a regulatory model that has adopted comprehensive laws to ensure privacy protection.

Details

Information Management & Computer Security, vol. 12 no. 4
Type: Research Article
ISSN: 0968-5227

Keywords

Article
Publication date: 11 July 2016

Matthew D Dean, Dinah M Payne and Brett J.L. Landry

The purpose of this paper is to advocate for and provide guidance for the development of a code of ethical conduct surrounding online privacy policies, including those concerning…

5427

Abstract

Purpose

The purpose of this paper is to advocate for and provide guidance for the development of a code of ethical conduct surrounding online privacy policies, including those concerning data mining. The hope is that this research generates thoughtful discussion on the issue of how to make data mining more effective for the business stakeholder while at the same time making it a process done in an ethical way that remains effective for the consumer. The recognition of the privacy rights of data mining subjects is paramount within this discussion.

Design/methodology/approach

The authors derive foundational principles for ethical data mining. First, philosophical literature on moral principles is used as the theoretical foundation. Then, using existing frameworks, including legislation and regulations from a range of jurisdictions, a compilation of foundational principles was derived. This compilation was then evaluated and honed through the integration of stakeholder perspective and the assimilation of moral and philosophical precepts. Evaluating a sample of privacy policies hints that current practice does not meet the proposed principles, indicating a need for changes in the way data mining is performed.

Findings

A comprehensive framework for the development a contemporary code of conduct and proposed ethical practices for online data mining was constructed.

Research limitations/implications

This paper provides a configuration upon which a code of ethical conduct for performing data mining, tailored to meet the particular needs of any organization, can be designed.

Practical implications

The implications of data mining, and a code of ethical conduct regulating it, are far-reaching. Implementation of such principles serve to improve consumer and stakeholder confidence, ensure the enduring compliance of data providers and the integrity of its collectors, and foster confidence in the security of data mining.

Originality/value

Existing legal mandates alone are insufficient to properly regulate data mining, therefore supplemental reference to ethical considerations and stakeholder interest is required. The adoption of a functional code of general application is essential to address the increasing proliferation of apprehension regarding online privacy.

Details

Journal of Enterprise Information Management, vol. 29 no. 4
Type: Research Article
ISSN: 1741-0398

Keywords

Content available
350

Abstract

Details

Library Hi Tech News, vol. 17 no. 3
Type: Research Article
ISSN: 0741-9058

Article
Publication date: 30 December 2022

Hao Chen and Yufei Yuan

Protection motivation theory (PMT) explains that the intention to cope with information security risks is based on informed threat and coping appraisals. However, people cannot…

Abstract

Purpose

Protection motivation theory (PMT) explains that the intention to cope with information security risks is based on informed threat and coping appraisals. However, people cannot always make appropriate assessments due to possible ignorance and cognitive biases. This study proposes a research model that introduces four antecedent factors from ignorance and bias perspectives into the PMT model and empirically tests this model with data from a survey of electronic waste (e-waste) handling.

Design/methodology/approach

The data collected from 356 Chinese samples are analyzed via structural equation modeling (SEM).

Findings

The results revealed that for threat appraisal, optimistic bias leads to a lower perception of risks. However, factual ignorance (lack of knowledge of risks) does not significantly affect the perceived threat. For coping appraisal, practical ignorance (lack of knowledge of coping with risks) leads to low response efficacy and self-efficacy and high perceptions of coping cost, but the illusion of control overestimates response efficacy and self-efficacy.

Originality/value

First, this study addresses a new type of information security problem in e-waste handling. Second, this study extends the PMT model by exploring the roles of ignorance and bias as antecedents. Finally, the authors reinvestigate the basic constructs of PMT to identify how rational threat and coping assessments affect user intentions to cope with data security risks.

Article
Publication date: 24 May 2022

Ranjan Chaudhuri, Sheshadri Chatterjee and Demetris Vrontis

This study aimed to determine the antecedents of privacy concerns and their impact on consumers' online information disclosure. It also investigated the moderating role of…

Abstract

Purpose

This study aimed to determine the antecedents of privacy concerns and their impact on consumers' online information disclosure. It also investigated the moderating role of government regulation on the relationship between privacy concerns and online information disclosure.

Design/methodology/approach

With the help of literature review and theories, a theoretical model was developed and then validated using the partial least squares structural equation modeling technique to analyze data from 309 respondents.

Findings

The study found that online users' privacy awareness, privacy experience, personality and cultural differences significantly and positively impact their privacy concerns, which in turn positively and significantly influence their online information disclosure. The study also found that government regulation has a significant impact on online information disclosure.

Research limitations/implications

The study is cross-sectional in nature and cannot be generalized, and therefore, a longitudinal study could be conducted. Also, the study identified four antecedents of online users' privacy concerns. More antecedents and more sample data with other boundary conditions could have increased the predictive power of the model.

Practical implications

This study will help practitioners to better understand the privacy concerns of online users, which could help them to develop better products and enhance service quality. Policymakers can develop regulations as per the online users' requirements to increase their confidence in disclosing personal information online and other online activities.

Originality/value

Few studies have dealt with online users' information disclosure and their privacy concerns or the moderating role of government regulations on online information disclosure. The study is unique as its proposed model is the first that accounts for both online users' privacy concerns and government regulation and their online information disclosure.

Details

EuroMed Journal of Business, vol. 18 no. 3
Type: Research Article
ISSN: 1450-2194

Keywords

Article
Publication date: 13 July 2023

Anita Katulić

The research aims to establish the predictors of the acceptance of technical and organizational measures for the protection of personal data to ensure information privacy in…

Abstract

Purpose

The research aims to establish the predictors of the acceptance of technical and organizational measures for the protection of personal data to ensure information privacy in Croatian libraries, starting from the constructs of the APCO Macro Model.

Design/methodology/approach

Two data collection methods were used: the online survey questionnaire method and the analysis of the websites of independent libraries in the Republic of Croatia.

Findings

The results show that the acceptance of measures for personal data protection by a library manager is mostly influenced by perceived knowledge, while culture and trust have a positive correlation of moderate strength. Awareness has a low positive correlation, and privacy experience is not statistically related to the acceptance of measures. There is no statistically significant difference in the acceptance of measures for the protection of personal data concerning age and work experience in the profession. There is a statistically significant correlation between compliance with the principle of transparency and the size of the library.

Originality/value

The study is valuable as it examined the characteristics of the culture of information privacy in libraries and determined the existence and impact of factors that influence ensuring the information privacy of users in Croatian libraries.

1 – 10 of over 13000