Search results
1 – 10 of over 21000This paper aims to demonstrate how building competency in privacy can be used to transform the corporate strategy to generate a sustainable competitive advantage. A novel…
Abstract
Purpose
This paper aims to demonstrate how building competency in privacy can be used to transform the corporate strategy to generate a sustainable competitive advantage. A novel framework is presented as a guide to redesigning strategy by striking a balance between customer expectation and organizational objectives. In doing so, the paper offers four possible outcomes of accommodation, accumulation, association and affiliation, providing illustrations to each scenario for strategy formulation.
Design/methodology/approach
The relationship between privacy paradox and corporate strategy was examined through a qualitative research study. The author conducted 30 in-depth interviews on grounded theory methodology investigating customer insights on the nature and extent of privacy protection associated with e-commerce and organizational approach.
Findings
The customers are dissatisfied with existing data security strategies adopted by firms in protecting privacy. The over-reliance on systems has negatively influenced the communication between the organization and customers, leading to a possible competitive disadvantage. The firms need to redesign privacy strategy shifting from a system-driven approach to providing personalized service.
Originality/value
This paper presents a novel framework the privacy strategy matrix (PSM), introducing privacy as a strategic expedient in transforming corporate strategy facilitating privacy protection as a metaphor for differentiation. PSM framework provides a standard to evaluate the effectiveness of the corporate strategy in managing privacy manifesting a path toward deriving a sustainable competitive advantage.
Details
Keywords
Chitra Sharma and Anjali Kaushik
Offshoring is a common practice to operationalize global business strategies. Data protection and privacy assurance are major concerns in such international arrangements. This…
Abstract
Purpose
Offshoring is a common practice to operationalize global business strategies. Data protection and privacy assurance are major concerns in such international arrangements. This paper aims to examine the strategy adopted to ensure privacy assurance in offshoring arrangements.
Design/methodology/approach
This is a literature review to understand privacy assurance strategies adopted in offshoring arrangements and an exploratory case study of captive offshoring arrangement with onshore location in Canada and offshoring locations in India and Philippines. A comparative analysis of the privacy laws and privacy principles of Canada, Philippines and India has been done.
Findings
It was found that at the time of migration of process or work to the offshore location, organizations follow a conformist privacy strategy; however, once in business as usual mode, they follow entrepreneur privacy strategy. Privacy impact assessment (PIA) was found to be an important element in resolving the “administrative problem” of an offshoring organization’s privacy assurance strategy.
Research limitations/implications
The core privacy principles are outlined in the PIA templates; however, the current templates are designed to meet the conformist strategy and may need to be revised to include the cultural aspects, training, audit and information security requirements to plan and deliver on the entrepreneur strategy.
Practical implications
Offshoring organizations can benefit by planning for entrepreneur privacy assurance strategy at the inception stage. Enhancements to PIA templates to facilitate the same have been suggested.
Originality/value
Privacy assurance strategy followed by organizations while offshoring has been examined. This paper suggests extending the PIA process so that it covers privacy assurance requirements in offshoring arrangements. The learnings can be used in managing privacy assurance requirements in similar multi-country offshore arrangements.
Details
Keywords
Gajendra Liyanaarachchi, Sameer Deshpande and Scott Weaven
This paper advocates for banks to understand customers' online privacy concerns, use those insights to segment consumers and design tailored sales strategies to build a mutual…
Abstract
Purpose
This paper advocates for banks to understand customers' online privacy concerns, use those insights to segment consumers and design tailored sales strategies to build a mutual relationship through a social exchange that produces a competitive advantage.
Design/methodology/approach
A qualitative study involving 30 in-depth interviews with Australian and Asian millennials residing in Australia was conducted using a grounded theory approach to explore privacy concerns of online banking and determine the efficacy of their banks' existing sales strategy and practice.
Findings
The study revealed differences in customer perceptions of trust, confidence, responsibility and exchange. Adopting a power-dependency paradigm within a social exchange theoretical framework and power distance belief of national culture theory, the authors identified four consumer segments: exemplar, empiric, elevator and exponent. The authors propose a tailored consumer-centered sales strategy of communication, control, consolidation and collaboration.
Originality/value
The paper contributes to the research in services marketing, sales strategy and banking in three ways: first, the authors demonstrate the importance of the social exchange theory and national culture as a premise to develop a competitive advantage; second, the authors propose an innovative set of consumer segments in regards to online privacy concerns; and, third, the authors introduce four sales strategies tailored to each of the four segments.
Details
Keywords
Gajendra Liyanaarachchi, Sameer Deshpande and Scott Weaven
This conceptual paper explores gaps in bank privacy protection practices and advocates for banks to integrate market-oriented (MO) approaches in their corporate digital…
Abstract
Purpose
This conceptual paper explores gaps in bank privacy protection practices and advocates for banks to integrate market-oriented (MO) approaches in their corporate digital responsibility (CDR) initiatives to minimize consumer data vulnerability.
Design/methodology/approach
To apply MO in CDR, this study recommends adoption of a behavior change framework comprising of the co-creation, build and engage (CBE) model and proposes the creation of consumer segments based on generational cohort and tailoring strategies through motivation, opportunity and ability (MOA) model to manage vulnerability.
Findings
The study specifies that managing consumer data vulnerability requires a unique strategy different from conventional service delivery. A holistic approach is recommended by integrating corporate digital responsibility as a pivotal element of organizational strategy and by positioning vulnerable customers as a critical stakeholder.
Originality/value
The paper contributes to the research in corporate social responsibility (CSR), privacy and data vulnerability in the banking sector in two prominent ways: first, the study demonstrates the importance of MO as a premise to develop a novel version of CDR called market-oriented digital responsibility (MODR). The study considers MODR as a strategy to reposition vulnerable consumers as a key stakeholder, and, second, the study proposes an innovative set of consumer segments based on data vulnerability and introduces a data vulnerability growth model (DVGM) connecting vulnerability with age.
Details
Keywords
Călin Gurău and Ashok Ranchhod
This paper aims on one hand to provide a comparison of mobile consumers' perceptions regarding privacy issues in three different national and cultural contexts (England, France…
Abstract
Purpose
This paper aims on one hand to provide a comparison of mobile consumers' perceptions regarding privacy issues in three different national and cultural contexts (England, France and Romania), and on the other hand, to investigate the strategic approach taken by respondents for protecting their privacy.
Design/methodology/approach
Both secondary and primary data are collected and analysed. Secondary data collection focuses on the topic of consumer privacy issues in mobile commerce. Primary data collection was realised between March‐June 2008, when 300 mobile device users answered to a face‐to‐face questionnaire, in each of the three investigated countries.
Findings
Both the country of origin and the personal profile of users, are influencing their perception regarding privacy threats in the mobile commerce environment, as well as the privacy protection strategy they adopt.
Research limitations/implications
This study has an exploratory approach, the results being mostly descriptive. The findings can provide a useful insight for marketers, legislators and consumers regarding the privacy related concerns and behaviours in the mobile commerce environment.
Originality/value
This study realises a multi‐country comparative analysis regarding the perceptions of mobile device users, and investigates the influence of their profile on the personal privacy protection strategy adopted in the mobile commerce environment.
Details
Keywords
Muhammad Al-Abdullah, Izzat Alsmadi, Ruwaida AlAbdullah and Bernie Farkas
The paper posits that a solution for businesses to use privacy-friendly data repositories for its customers’ data is to change from the traditional centralized repository to a…
Abstract
Purpose
The paper posits that a solution for businesses to use privacy-friendly data repositories for its customers’ data is to change from the traditional centralized repository to a trusted, decentralized data repository. Blockchain is a technology that provides such a data repository. However, the European Union’s General Data Protection Regulation (GDPR) assumed a centralized data repository, and it is commonly argued that blockchain technology is not usable. This paper aims to posit a framework for adopting a blockchain that follows the GDPR.
Design/methodology/approach
The paper uses the Levy and Ellis’ narrative review of literature methodology, which is based on constructivist theory posited by Lincoln and Guba. Using five information systems and computer science databases, the researchers searched for studies using the keywords GDPR and blockchain, using a forward and backward search technique. The search identified a corpus of 416 candidate studies, from which the researchers applied pre-established criteria to select 39 studies. The researchers mined this corpus for concepts, which they clustered into themes. Using the accepted computer science practice of privacy by design, the researchers combined the clustered themes into the paper’s posited framework.
Findings
The paper posits a framework that provides architectural tactics for designing a blockchain that follows GDPR to enhance privacy. The framework explicitly addresses the challenges of GDPR compliance using the unimagined decentralized storage of personal data. The framework addresses the blockchain–GDPR tension by establishing trust between a business and its customers vis-à-vis storing customers’ data. The trust is established through blockchain’s capability of providing the customer with private keys and control over their data, e.g. processing and access.
Research limitations/implications
The paper provides a framework that demonstrates that blockchain technology can be designed for use in GDPR compliant solutions. In using the framework, a blockchain-based solution provides the ability to audit and monitor privacy measures, demonstrates a legal justification for processing activities, incorporates a data privacy policy, provides a map for data processing and ensures security and privacy awareness among all actors. The research is limited to a focus on blockchain–GDPR compliance; however, future research is needed to investigate the use of the framework in specific domains.
Practical implications
The paper posits a framework that identifies the strategies and tactics necessary for GDPR compliance. Practitioners need to compliment the framework with rigorous privacy risk management, i.e. conducting a privacy risk analysis, identifying strategies and tactics to address such risks and preparing a privacy impact assessment that enhances accountability and transparency of a blockchain.
Originality/value
With the increasingly strategic use of data by businesses and the contravening growth of data privacy regulation, alternative technologies could provide businesses with a means to nurture trust with its customers regarding collected data. However, it is commonly assumed that the decentralized approach of blockchain technology cannot be applied to this business need. This paper posits a framework that enables a blockchain to be designed that follows the GDPR; thereby, providing an alternative for businesses to collect customers’ data while ensuring the customers’ trust.
Details
Keywords
Hitesh Sharma, Praveen Ranjan Srivastava, Sajjad M. Jasimuddin, Zuopeng Justin Zhang and Ikram Jebabli
This study aims to provide a comprehensive analysis of the current privacy concerns in the tourism industry by uncovering the key factors leading to such concerns (i.e. smart…
Abstract
Purpose
This study aims to provide a comprehensive analysis of the current privacy concerns in the tourism industry by uncovering the key factors leading to such concerns (i.e. smart public services, cyber security issues, consumer behaviour and governance). Using papers from multiple sources, the relationship between technology advancements and tourist’s privacy concerns has been established.
Design/methodology/approach
This study adopted a machine learning-based systematic literature review approach to find out the clusters. The study analysed 68 papers using the topic modelling approach. A four-cluster solution was considered to be most representative of the extant literature identified using bibliographic coupling. Finally, content analysis of the selected literature has been performed.
Findings
This study identified four factors majorly leading to privacy concerns amid increasing technological advancements. Moreover, these factors were found to have a dyadic relationship with technological advancements. To everyone’s amazement, sustainable tourism was also found to have led to privacy concerns among tourists along with a lack of governance and cyber security issues. Furthermore, cluster-wise future research directions are provided based on the content analysis.
Originality/value
This study contributes to the literature by systematically reviewing and identifying the four dimensions leading to privacy concerns. To the best of the authors’ knowledge, the study done is the only attempt to synthesize the extant literature on tourists’ privacy concerns using an unbiased scientific approach.
目的
本研究对旅游业当前的隐私问题进行了全面分析, 以揭示导致此类担忧的关键因素(即智能公共服务、网络安全问题、消费者行为和治理)。 通过考察来自多方渠道的现有文献, 本研究确立了技术进步与游客隐私问题之间的关系。
设计/方法/途径
本研究采用基于机器学习的系统文献综述方法来找出聚类。 该研究使用主题建模方法分析了 68 篇文章。四聚类解决方案是现有文献中最具代表的 文献分类方法。最后, 本研究对所选文献进行了内容分析。
研究结果
这项研究确定了在技术进步不断增加的情况下主要导致隐私问题的四个因素。 此外, 这些因素被发现与技术进步有二元关系。 本研究还发现可持续旅游业引发了游客对隐私的担忧以及缺乏治理和网络安全问题。 此外, 通过基于内容的分析, 本研究提供了未来的聚类研究方向。
独创性
本研究对现有文献的贡献在于通过系统地文献综述和分析以确定导致隐私问题的四个维度。该研究是基于公正的科学方法综合现有游客隐私问题文献的首度尝试。
Finalidad/Objetivo
Este estudio proporciona un análisis exhaustivo de la actual preocupación por la privacidad en el sector turístico, poniendo al descubierto los factores clave que la generan (los servicios públicos inteligentes, los problemas de ciberseguridad, el comportamiento de los consumidores y la gobernanza). Gracias al uso de artículos de múltiples fuentes, se ha establecido la relación entre los avances tecnológicos y la preocupación de los turistas por la privacidad.
Diseño/Metodología/Enfoque
Este estudio adoptó un enfoque de revisión sistemática de la literatura basado en el aprendizaje automático para descubrir los conglomerados. El estudio analizó sesenta y ocho artículos utilizando el enfoque de modelización de temas. Se consideró que una solución de cuatro conglomerados era la más representativa de la literatura existente identificada mediante el acoplamiento bibliográfico. Por último, se realizó un análisis de contenido de la bibliografía seleccionada.
Hallazgos
En este estudio se identificaron cuatro factores principales que suscitan inquietud por la privacidad en medio de los crecientes avances tecnológicos. Además, se descubrió que estos factores tienen una relación diádica con dichos avances. Para sorpresa de todos, se halló que el turismo sostenible, junto con la falta de gobernanza y los problemas de ciberseguridad, también suscitan entre los turistas preocupaciones por su privacidad. Finalmente, el análisis de contenido ofrece orientaciones para futuras investigaciones.
Originalidad
Este estudio contribuye a la literatura haciendo una revisión sistemática e identificando las cuatro dimensiones que conducen a la preocupación por la privacidad. Este estudio es el único intento de sintetizar la bibliografía existente sobre la preocupación de los turistas por su privacidad utilizando un enfoque científico imparcial.
Details
Keywords
Hyunjin Kang, Wonsun Shin and Junru Huang
This study investigates how different parental mediation strategies (active versus restrictive) and teen Douyin users' privacy risk perceptions are associated with their privacy…
Abstract
Purpose
This study investigates how different parental mediation strategies (active versus restrictive) and teen Douyin users' privacy risk perceptions are associated with their privacy management behaviors.
Design/methodology/approach
An online survey with teen Douyin users (N = 500) was administered in mainland China.
Findings
Perceived privacy risk leads teenagers to implement stricter privacy management strategies. However, different types of parental mediation have different impacts on teens' privacy management behaviors. Discussion-based active mediation is positively correlated with privacy disclosure and privacy boundary linkage, while rule-based restrictive mediation is positively associated with privacy boundary control. In addition, active mediation encourages teens to use their own judgment about privacy risks when deciding how much personal information to disclose and with whom they want to share their information. Conversely, restrictive mediation results in teens making decisions about disclosing private information without taking their own risk assessments into account.
Originality/value
Video-sharing social media platforms like TikTok and Douyin have become a cultural trend among teen social media users. However, loss of privacy is a potentially serious downside of using such platforms. Despite the platforms' popularity among this age group, little is known about the ways teens manage their privacy on such social media platforms. By examining how teens' privacy risk perception and parental intervention shape three different aspects of privacy boundary management (i.e. privacy disclosure, privacy boundary linkage, and privacy boundary control), this study provides a comprehensive understanding of teen Douyin users' privacy management.
Details
Keywords
Oswald A. J. Mascarenhas, Ram Kesavan and Michael D. Bernacchi
Argues that online privacy rights of consumers are not absolute rights but joint ownership privileges they share with online marketers. Consumers can voluntarily transfer these…
Abstract
Argues that online privacy rights of consumers are not absolute rights but joint ownership privileges they share with online marketers. Consumers can voluntarily transfer these privileges to online marketers under certain mutually agreeable conditions. Accordingly, online marketers can facilitate, motivate and compensate such transfers by designing various innovative personalization strategies that, rather than jeopardize the privacy privileges of consumers, would benefit them. Technology and society can progress only through such partnerships. Cites two consistently successful net companies, Dell and eBay, as examples of such partnered personalizations.
Details
Keywords
Yuanyuan Guo, Chaoyou Wang and Xiaoting Chen
This study aims to examine the relative effectiveness of functional and financial remedies in influencing customers' negative coping responses in the event of a data breach. It…
Abstract
Purpose
This study aims to examine the relative effectiveness of functional and financial remedies in influencing customers' negative coping responses in the event of a data breach. It also uncovers the different mediating roles played by customers' feelings of anger and fear in the process of data breach recovery. This study thus differs from the literature, which has primarily focused on the impact of financial compensation and apologies for service failures in face-to-face environments.
Design/methodology/approach
Two scenario-based experiments were conducted to empirically validate the model. The authors received 302 copies of the questionnaire, of which 269 were valid.
Findings
This study finds that functional remedies are more effective than financial remedies when sensitive information has been compromised, but there is no significant difference between the effectiveness of the two remedies when nonsensitive information has been compromised. In addition, functional remedies influence negative coping behaviors directly and indirectly; the indirect effect is achieved through the reduction of fear and anger. Contrary to the authors' expectation, financial remedies do not have a direct effect on negative coping behaviors; they can indirectly affect negative coping behaviors by reducing anger but do not affect negative coping behaviors by reducing fear.
Practical implications
This study provides key insights into how to manage customer reactions in the event of a data breach, suggesting the use of carefully designed recovery strategies. Companies must attend to customers' specific emotional responses to manage their negative coping behaviors.
Originality/value
This study extends the limited literature on data breach recovery actions by investigating the different effectiveness of functional and financial remedies in the event of a data breach. It also uncovers how functional and financial recovery strategies affect customers' negative coping behaviors by revealing the different mediating effects of fear and anger.
Details