Search results

1 – 10 of over 19000
Article
Publication date: 4 September 2019

Konstantina Vemou and Maria Karyda

This paper aims to practically guide privacy impact assessment (PIA) implementation by proposing a PIA process incorporating best practices from existing PIA guidelines and privacy

Abstract

Purpose

This paper aims to practically guide privacy impact assessment (PIA) implementation by proposing a PIA process incorporating best practices from existing PIA guidelines and privacy research.

Design/methodology/approach

This paper critically reviews and assesses generic PIA methods proposed by related research, data protection authorities and standard’s organizations, to identify best practices and practically support PIA practitioners. To address identified gaps, best practices from privacy literature are proposed.

Findings

This paper proposes a PIA process based on best practices, as well as an evaluation framework for existing PIA guidelines, focusing on practical support to PIA practitioners.

Practical implications

The proposed PIA process facilitates PIA practitioners in organizing and implementing PIA projects. This paper also provides an evaluation framework, comprising a comprehensive set of 17 criteria, for PIA practitioners to assess whether PIA methods/guidelines can adequately support requirements of their PIA projects (e.g. special legal framework and needs for PIA project organization guidance).

Originality/value

This research extends PIA guidelines (e.g. ISO 29134) by providing comprehensive and practical guidance to PIA practitioners. The proposed PIA process is based on best practices identified from evaluation of nine commonly used PIA methods, enriched with guidelines from privacy literature, to accommodate gaps and support tasks that were found to be inadequately described or lacking practical guidance.

Details

Information & Computer Security, vol. 28 no. 1
Type: Research Article
ISSN: 2056-4961

Keywords

Article
Publication date: 2 June 2022

Huey Chern Boo and Bee-Lia Chua

This study aims to explain how hotel guests form attitudes toward facial recognition technology in Singapore by integrating technology acceptance model (TAM), privacy calculus…

2472

Abstract

Purpose

This study aims to explain how hotel guests form attitudes toward facial recognition technology in Singapore by integrating technology acceptance model (TAM), privacy calculus theory and personal innovativeness.

Design/methodology/approach

A self-administered online questionnaire was developed with measurements adopted from past research. Guests who stayed in four- or five-star hotels in Singapore were recruited via systematic random sampling. Structural equation modeling was conducted to examine the proposed integrated models.

Findings

Results showed that hotel guests performed calculative cognitive processes, weighing the benefits and risks of using facial recognition check-in system. Contradictory to the past research which suggested that trust activates both perceived risk and benefits, this study demonstrated that trust independently directed consumer attention on the benefits gained while risk perception was triggered by privacy concern. Furthermore, the current study revealed that the ease of use of facial recognition check-in system could possibly backfire.

Practical implications

The research indicates that the effort to adopt new technology in the hotel industry is promising in view of the growing millennials and Generation Z population who are digital natives. Furthermore, the current study highlights ways to elevate institutional trust and divert consumers’ attention from risk perception to enhance their positive attitude and behavior toward accepting facial recognition check-in system.

Originality/value

This study integrated TAM with privacy calculus theory and personal innovativeness in examining the acceptance of facial recognition check-in system in the hotel industry in Singapore. This study is also the first, to the best of the authors’ knowledge, to investigate the relationships among privacy concern, perceived risk, institutional trust and perceived benefits, as well as their effects on consumers’ attitudes and behavior toward the biometric system.

Details

International Journal of Contemporary Hospitality Management, vol. 34 no. 11
Type: Research Article
ISSN: 0959-6119

Keywords

Article
Publication date: 10 October 2016

Anil Gurung and M.K. Raja

Privacy and security concerns of consumers have been touted as one of the hindrances to the growth of e-commerce. These concerns increase the risk perception of consumers…

5681

Abstract

Purpose

Privacy and security concerns of consumers have been touted as one of the hindrances to the growth of e-commerce. These concerns increase the risk perception of consumers. Understanding the consequences of privacy and security concerns and their relationship to risk perceptions may provide a solution. The relationship between privacy and security is investigated using the theory of planned behavior. The study aims to examine the relationship of trust, privacy and security concerns to the risk perception adoption of e-commerce. The results from a survey validate the model.

Design/methodology/approach

Data were collected using survey from undergraduate business students. The respondents were requested to select a specific product that they plan to purchase in the next six months. After selecting a product, the respondents were requested to report an online company that they have recently visited which offers the selected product. The respondents were requested to fill out the survey with regard to their selected online company. Time given was approximately 20 min.

Findings

The results suggest that privacy and security concerns and trust beliefs had effects on risk perception. Among these effects, trust had the largest effect followed by privacy and security concerns. Furthermore, risk perception and trust beliefs had effects on attitude. The effect of trust beliefs on attitude was larger than the effect of risk perception on attitude. Similarly, subjective norm, perceived behavioral control and attitude had a positive and direct effect on intention to be involved in e-commerce.

Research limitations/implications

The first limitation of this study is the use of student subjects. Because this study took place in an educational setting, its generalizability to the general population of consumers lacks to some degree. The second limitation of this study is mono-method bias.

Practical implications

The effect of privacy concerns on risk perception was larger than that of security concerns. Because the consumers get more experienced and sophisticated using the Web, the security concerns that they may have had at the beginning are not reflected in their risk perceptions. It is likely that they have adopted protective measures on their own to defend their privacy online. An example of such a measure would be providing false information to online companies when asked to submit personal information.

Originality/value

The major contributions of this study are developing and validating an integrative framework of e-commerce adoption at the individual level. The model includes privacy and security concerns, risk perception and trust beliefs. This study also highlighted the distinction of constructs of privacy and security concerns and showed their differential effects on other related constructs in the research model.

Details

Information & Computer Security, vol. 24 no. 4
Type: Research Article
ISSN: 2056-4961

Keywords

Article
Publication date: 16 March 2022

Sophia Xiaoxia Duan and Hepu Deng

Understanding the privacy concerns of individuals in the adoption of contact tracing apps is critical for the successful control of pandemics like COVID-19. This paper explores…

1047

Abstract

Purpose

Understanding the privacy concerns of individuals in the adoption of contact tracing apps is critical for the successful control of pandemics like COVID-19. This paper explores the privacy paradox in the adoption of contact tracing apps in Australia.

Design/methodology/approach

A comprehensive review of the related literature has been conducted, leading to the development of a conceptual model based on the privacy calculus theory and the antecedent-privacy concern-outcome framework. Such a model is then tested and validated using structural equation modelling on the survey data collected in Australia.

Findings

The study shows that perceived benefit, perceived privacy risk and trust have significant influences on the adoption of contact tracing apps. It reveals that personal innovativeness and trust have significant and negative influences on perceived privacy risk. The study further finds out that personal innovativeness is insignificant to perceived benefit. It states that perceived ease of use has an insignificant influence on perceived privacy risk in the adoption of contact tracing apps.

Originality/value

This study is the first attempt to use the privacy calculus theory and the antecedent–privacy concern–outcome framework for exploring the privacy paradox in adopting contact tracing apps. This leads to a better understanding of the privacy concerns of individuals in the adoption of contact tracing apps. Such an understanding can help formulate targeted strategies and policies for promoting the adoption of contact tracing apps and inform future epidemic control through effective contact tracing for better emergency management.

Article
Publication date: 24 July 2020

Jeffrey P. Kaleta and Lakshman Mahadevan

Research of people’s perceptions of trust, privacy and risk on the internet has generally neglected the impact of the variety of channels used to access the internet. People…

Abstract

Purpose

Research of people’s perceptions of trust, privacy and risk on the internet has generally neglected the impact of the variety of channels used to access the internet. People primarily access the internet using internet channels at home, work, public Wi-Fi (hotspots) or through their mobile data network. The technology infrastructure of each of these channels combined with the vulnerabilities of the environment may form different perceptions, as it relates to trust, privacy and risk. The purpose of this study is to understand how people perceive the home and public Wi-Fi channel from a trust, privacy and risk perspective.

Design/methodology/approach

Adapting existing trust, privacy and risk scales, the authors conducted a survey of people’s perceptions, as it relates to home and public Wi-Fi internet channels.

Findings

The results of this study suggest significant differences in people’s perception of trust and risk depending on an internet channel. However, with regard to privacy, the results of this study provide non-conclusive, yet intriguing, outcomes motivating the need for future studies.

Originality/value

To the best of the authors’ knowledge, this is the first study that parses out people’s perceptions of trust, privacy and risk, as it pertains to specific internet channels. The authors expect future research to benefit from their findings of how different channel perceptions influence people’s online activities.

Details

Journal of Systems and Information Technology, vol. 22 no. 3
Type: Research Article
ISSN: 1328-7265

Keywords

Article
Publication date: 20 November 2023

Xiao Zhou Liu, Shuang Ling and Ying Liu

This study aims to empirically examine the relationship between Internet use and personal privacy risk perceptions, the mediating effect of trust and the moderating effect of…

Abstract

Purpose

This study aims to empirically examine the relationship between Internet use and personal privacy risk perceptions, the mediating effect of trust and the moderating effect of satisfaction on that relationship, which is exactly conducive to the practice of personal information protection.

Design/methodology/approach

A moderated mediation model will be employed to test the hypothesized relationships using the 2017 Chinese Society Survey data.

Findings

The authors find that Internet use positively relates to citizens' risk perceptions toward privacy security, and trust partially mediates the relationship between Internet use and privacy risk perception. In addition, the analysis of moderating effects showed that satisfaction with social life significantly enhances the negative impact on individuals' privacy risk perceptions of interpersonal trust. The positively moderating effect of satisfaction with local governments' work mainly reveals the relationship between interpersonal trust (or institutional trust) and citizens' privacy risk perception. Moreover, satisfaction with Internet platforms positively moderates the relationship between consumer trust and privacy risk perception.

Originality/value

This article contributes to the social risk amplification framework by applying it to the personal privacy information protection field, which was rarely discussed before. It also enriches privacy research by identifying the internal mechanism of how Internet use influences citizens' risk perceptions towards privacy information leakage.

Details

Online Information Review, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1468-4527

Keywords

Article
Publication date: 18 May 2020

Eleni-Laskarina Makri, Zafeiroula Georgiopoulou and Costas Lambrinoudakis

This study aims to assist organizations to protect the privacy of their users and the security of the data that they store and process. Users may be the customers of the…

Abstract

Purpose

This study aims to assist organizations to protect the privacy of their users and the security of the data that they store and process. Users may be the customers of the organization (people using the offered services) or the employees (users who operate the systems of the organization). To be more specific, this paper proposes a privacy impact assessment (PIA) method that explicitly takes into account the organizational characteristics and employs a list of well-defined metrics as input, demonstrating its applicability to two hospital information systems with different characteristics.

Design/methodology/approach

This paper presents a PIA method that employs metrics and takes into account the peculiarities and other characteristics of the organization. The applicability of the method has been demonstrated on two Hospital Information Systems with different characteristics. The aim is to assist the organizations to estimate the criticality of potential privacy breaches and, thus, to select the appropriate security measures for the protection of the data that they collect, process and store.

Findings

The results of the proposed PIA method highlight the criticality of each privacy principle for every data set maintained by the organization. The method employed for the calculation of the criticality level, takes into account the consequences that the organization may experience in case of a security or privacy violation incident on a specific data set, the weighting of each privacy principle and the unique characteristics of each organization. So, the results of the proposed PIA method offer a strong indication of the security measures and privacy enforcement mechanisms that the organization should adopt to effectively protect its data.

Originality/value

The novelty of the method is that it handles security and privacy requirements simultaneously, as it uses the results of risk analysis together with those of a PIA. A further novelty of the method is that it introduces metrics for the quantification of the requirements and also that it takes into account the specific characteristics of the organization.

Details

Information & Computer Security, vol. 28 no. 4
Type: Research Article
ISSN: 2056-4961

Keywords

Article
Publication date: 20 January 2022

Yongqiang Sun, Fei Zhang and Yafei Feng

This paper aimed to explain why individuals still tend to disclose their privacy information even when privacy risks are high and whether individuals disclose or withhold…

Abstract

Purpose

This paper aimed to explain why individuals still tend to disclose their privacy information even when privacy risks are high and whether individuals disclose or withhold information following the same logic.

Design/methodology/approach

This study develops a configurational decision tree model (CDTM) for precisely understanding individuals' decision-making process of privacy disclosure. A survey of location-based social network service (LBSNS) users was conducted to collect data, and fuzzy-set qualitative comparative analysis (fsQCA) was adopted to validate the hypotheses.

Findings

This paper identified two configurations for high and low disclosure, respectively, and found that the benefits and the risks did not function independently but interdependently, and the justice would play a crucial role when both the benefits and the risks were high. Furthermore, the authors found that there were asymmetric mechanisms for high disclosure and low disclosure, and males focused more on perceived usefulness, while females concerned more about perceived enjoyment, privacy risks and perceived justice.

Originality/value

This paper further extends privacy calculus model (PCM) and deepens the understanding of the privacy calculus process from a configurational perspective. In addition, this study also provides guidance for future research on how to adopt the configurational approach with qualitative comparative analysis (QCA) to revise and improve relevant theories for information systems (IS) behavioral research.

Details

Aslib Journal of Information Management, vol. 74 no. 4
Type: Research Article
ISSN: 2050-3806

Keywords

Article
Publication date: 16 July 2021

Hyunjin Kang, Wonsun Shin and Junru Huang

This study investigates how different parental mediation strategies (active versus restrictive) and teen Douyin users' privacy risk perceptions are associated with their privacy

2859

Abstract

Purpose

This study investigates how different parental mediation strategies (active versus restrictive) and teen Douyin users' privacy risk perceptions are associated with their privacy management behaviors.

Design/methodology/approach

An online survey with teen Douyin users (N = 500) was administered in mainland China.

Findings

Perceived privacy risk leads teenagers to implement stricter privacy management strategies. However, different types of parental mediation have different impacts on teens' privacy management behaviors. Discussion-based active mediation is positively correlated with privacy disclosure and privacy boundary linkage, while rule-based restrictive mediation is positively associated with privacy boundary control. In addition, active mediation encourages teens to use their own judgment about privacy risks when deciding how much personal information to disclose and with whom they want to share their information. Conversely, restrictive mediation results in teens making decisions about disclosing private information without taking their own risk assessments into account.

Originality/value

Video-sharing social media platforms like TikTok and Douyin have become a cultural trend among teen social media users. However, loss of privacy is a potentially serious downside of using such platforms. Despite the platforms' popularity among this age group, little is known about the ways teens manage their privacy on such social media platforms. By examining how teens' privacy risk perception and parental intervention shape three different aspects of privacy boundary management (i.e. privacy disclosure, privacy boundary linkage, and privacy boundary control), this study provides a comprehensive understanding of teen Douyin users' privacy management.

Article
Publication date: 25 May 2010

Mauricio S. Featherman, Anthony D. Miyazaki and David E. Sprott

The paper aims to examine ways to reduce privacy risk and its effects so that adoption of e‐services can be enhanced.

8217

Abstract

Purpose

The paper aims to examine ways to reduce privacy risk and its effects so that adoption of e‐services can be enhanced.

Design/methodology/approach

Consumers that form a viable target market for an e‐service are presented with the task of experiencing the e‐service and expressing their attitudes and intentions toward it. Structural equation modeling is used to analyze the responses.

Findings

The paper finds that consumer beliefs that the e‐service will be easy to use and that the e‐service provider is credible and capable reduce privacy risk and its effects, thus enhancing adoption likelihood.

Research limitations/implications

The focus on a financial services product (online bill paying) suggests that similar research should be conducted with other high‐risk e‐services (such as those dealing with healthcare) and lower‐risk e‐services (such as subscription services and social networks).

Practical implications

In addition to addressing consumers' privacy risk directly, e‐service providers can also reduce privacy risk and its effects by enhancing corporate credibility and perceived ease of use of the service. Increased assessments of privacy risk perceptions and efforts to reduce those perceptions will likely yield higher usage rates for e‐services.

Originality/value

The use of the technology acceptance model from information systems research, combined with a multi‐faceted conceptualization of privacy risk, moves the examination of privacy risk to a higher level, particularly in light of the examination of the additional factors of perceived ease of use and corporate credibility.

Details

Journal of Services Marketing, vol. 24 no. 3
Type: Research Article
ISSN: 0887-6045

Keywords

1 – 10 of over 19000