Search results

1 – 10 of over 21000
Article
Publication date: 14 May 2020

Gajendra Liyanaarachchi

This paper aims to demonstrate how building competency in privacy can be used to transform the corporate strategy to generate a sustainable competitive advantage. A novel…

Abstract

Purpose

This paper aims to demonstrate how building competency in privacy can be used to transform the corporate strategy to generate a sustainable competitive advantage. A novel framework is presented as a guide to redesigning strategy by striking a balance between customer expectation and organizational objectives. In doing so, the paper offers four possible outcomes of accommodation, accumulation, association and affiliation, providing illustrations to each scenario for strategy formulation.

Design/methodology/approach

The relationship between privacy paradox and corporate strategy was examined through a qualitative research study. The author conducted 30 in-depth interviews on grounded theory methodology investigating customer insights on the nature and extent of privacy protection associated with e-commerce and organizational approach.

Findings

The customers are dissatisfied with existing data security strategies adopted by firms in protecting privacy. The over-reliance on systems has negatively influenced the communication between the organization and customers, leading to a possible competitive disadvantage. The firms need to redesign privacy strategy shifting from a system-driven approach to providing personalized service.

Originality/value

This paper presents a novel framework the privacy strategy matrix (PSM), introducing privacy as a strategic expedient in transforming corporate strategy facilitating privacy protection as a metaphor for differentiation. PSM framework provides a standard to evaluate the effectiveness of the corporate strategy in managing privacy manifesting a path toward deriving a sustainable competitive advantage.

Details

Journal of Business Strategy, vol. 41 no. 5
Type: Research Article
ISSN: 0275-6668

Keywords

Article
Publication date: 19 June 2017

Chitra Sharma and Anjali Kaushik

Offshoring is a common practice to operationalize global business strategies. Data protection and privacy assurance are major concerns in such international arrangements. This…

Abstract

Purpose

Offshoring is a common practice to operationalize global business strategies. Data protection and privacy assurance are major concerns in such international arrangements. This paper aims to examine the strategy adopted to ensure privacy assurance in offshoring arrangements.

Design/methodology/approach

This is a literature review to understand privacy assurance strategies adopted in offshoring arrangements and an exploratory case study of captive offshoring arrangement with onshore location in Canada and offshoring locations in India and Philippines. A comparative analysis of the privacy laws and privacy principles of Canada, Philippines and India has been done.

Findings

It was found that at the time of migration of process or work to the offshore location, organizations follow a conformist privacy strategy; however, once in business as usual mode, they follow entrepreneur privacy strategy. Privacy impact assessment (PIA) was found to be an important element in resolving the “administrative problem” of an offshoring organization’s privacy assurance strategy.

Research limitations/implications

The core privacy principles are outlined in the PIA templates; however, the current templates are designed to meet the conformist strategy and may need to be revised to include the cultural aspects, training, audit and information security requirements to plan and deliver on the entrepreneur strategy.

Practical implications

Offshoring organizations can benefit by planning for entrepreneur privacy assurance strategy at the inception stage. Enhancements to PIA templates to facilitate the same have been suggested.

Originality/value

Privacy assurance strategy followed by organizations while offshoring has been examined. This paper suggests extending the PIA process so that it covers privacy assurance requirements in offshoring arrangements. The learnings can be used in managing privacy assurance requirements in similar multi-country offshore arrangements.

Details

Journal of Global Operations and Strategic Sourcing, vol. 10 no. 2
Type: Research Article
ISSN: 2398-5364

Keywords

Article
Publication date: 24 June 2021

Gajendra Liyanaarachchi, Sameer Deshpande and Scott Weaven

This paper advocates for banks to understand customers' online privacy concerns, use those insights to segment consumers and design tailored sales strategies to build a mutual…

2052

Abstract

Purpose

This paper advocates for banks to understand customers' online privacy concerns, use those insights to segment consumers and design tailored sales strategies to build a mutual relationship through a social exchange that produces a competitive advantage.

Design/methodology/approach

A qualitative study involving 30 in-depth interviews with Australian and Asian millennials residing in Australia was conducted using a grounded theory approach to explore privacy concerns of online banking and determine the efficacy of their banks' existing sales strategy and practice.

Findings

The study revealed differences in customer perceptions of trust, confidence, responsibility and exchange. Adopting a power-dependency paradigm within a social exchange theoretical framework and power distance belief of national culture theory, the authors identified four consumer segments: exemplar, empiric, elevator and exponent. The authors propose a tailored consumer-centered sales strategy of communication, control, consolidation and collaboration.

Originality/value

The paper contributes to the research in services marketing, sales strategy and banking in three ways: first, the authors demonstrate the importance of the social exchange theory and national culture as a premise to develop a competitive advantage; second, the authors propose an innovative set of consumer segments in regards to online privacy concerns; and, third, the authors introduce four sales strategies tailored to each of the four segments.

Details

International Journal of Bank Marketing, vol. 39 no. 6
Type: Research Article
ISSN: 0265-2323

Keywords

Article
Publication date: 9 December 2020

Gajendra Liyanaarachchi, Sameer Deshpande and Scott Weaven

This conceptual paper explores gaps in bank privacy protection practices and advocates for banks to integrate market-oriented (MO) approaches in their corporate digital…

1905

Abstract

Purpose

This conceptual paper explores gaps in bank privacy protection practices and advocates for banks to integrate market-oriented (MO) approaches in their corporate digital responsibility (CDR) initiatives to minimize consumer data vulnerability.

Design/methodology/approach

To apply MO in CDR, this study recommends adoption of a behavior change framework comprising of the co-creation, build and engage (CBE) model and proposes the creation of consumer segments based on generational cohort and tailoring strategies through motivation, opportunity and ability (MOA) model to manage vulnerability.

Findings

The study specifies that managing consumer data vulnerability requires a unique strategy different from conventional service delivery. A holistic approach is recommended by integrating corporate digital responsibility as a pivotal element of organizational strategy and by positioning vulnerable customers as a critical stakeholder.

Originality/value

The paper contributes to the research in corporate social responsibility (CSR), privacy and data vulnerability in the banking sector in two prominent ways: first, the study demonstrates the importance of MO as a premise to develop a novel version of CDR called market-oriented digital responsibility (MODR). The study considers MODR as a strategy to reposition vulnerable consumers as a key stakeholder, and, second, the study proposes an innovative set of consumer segments based on data vulnerability and introduces a data vulnerability growth model (DVGM) connecting vulnerability with age.

Details

International Journal of Bank Marketing, vol. 39 no. 4
Type: Research Article
ISSN: 0265-2323

Keywords

Article
Publication date: 30 October 2009

Călin Gurău and Ashok Ranchhod

This paper aims on one hand to provide a comparison of mobile consumers' perceptions regarding privacy issues in three different national and cultural contexts (England, France…

3906

Abstract

Purpose

This paper aims on one hand to provide a comparison of mobile consumers' perceptions regarding privacy issues in three different national and cultural contexts (England, France and Romania), and on the other hand, to investigate the strategic approach taken by respondents for protecting their privacy.

Design/methodology/approach

Both secondary and primary data are collected and analysed. Secondary data collection focuses on the topic of consumer privacy issues in mobile commerce. Primary data collection was realised between March‐June 2008, when 300 mobile device users answered to a face‐to‐face questionnaire, in each of the three investigated countries.

Findings

Both the country of origin and the personal profile of users, are influencing their perception regarding privacy threats in the mobile commerce environment, as well as the privacy protection strategy they adopt.

Research limitations/implications

This study has an exploratory approach, the results being mostly descriptive. The findings can provide a useful insight for marketers, legislators and consumers regarding the privacy related concerns and behaviours in the mobile commerce environment.

Originality/value

This study realises a multi‐country comparative analysis regarding the perceptions of mobile device users, and investigates the influence of their profile on the personal privacy protection strategy adopted in the mobile commerce environment.

Details

Journal of Consumer Marketing, vol. 26 no. 7
Type: Research Article
ISSN: 0736-3761

Keywords

Article
Publication date: 26 November 2020

Muhammad Al-Abdullah, Izzat Alsmadi, Ruwaida AlAbdullah and Bernie Farkas

The paper posits that a solution for businesses to use privacy-friendly data repositories for its customers’ data is to change from the traditional centralized repository to a…

Abstract

Purpose

The paper posits that a solution for businesses to use privacy-friendly data repositories for its customers’ data is to change from the traditional centralized repository to a trusted, decentralized data repository. Blockchain is a technology that provides such a data repository. However, the European Union’s General Data Protection Regulation (GDPR) assumed a centralized data repository, and it is commonly argued that blockchain technology is not usable. This paper aims to posit a framework for adopting a blockchain that follows the GDPR.

Design/methodology/approach

The paper uses the Levy and Ellis’ narrative review of literature methodology, which is based on constructivist theory posited by Lincoln and Guba. Using five information systems and computer science databases, the researchers searched for studies using the keywords GDPR and blockchain, using a forward and backward search technique. The search identified a corpus of 416 candidate studies, from which the researchers applied pre-established criteria to select 39 studies. The researchers mined this corpus for concepts, which they clustered into themes. Using the accepted computer science practice of privacy by design, the researchers combined the clustered themes into the paper’s posited framework.

Findings

The paper posits a framework that provides architectural tactics for designing a blockchain that follows GDPR to enhance privacy. The framework explicitly addresses the challenges of GDPR compliance using the unimagined decentralized storage of personal data. The framework addresses the blockchain–GDPR tension by establishing trust between a business and its customers vis-à-vis storing customers’ data. The trust is established through blockchain’s capability of providing the customer with private keys and control over their data, e.g. processing and access.

Research limitations/implications

The paper provides a framework that demonstrates that blockchain technology can be designed for use in GDPR compliant solutions. In using the framework, a blockchain-based solution provides the ability to audit and monitor privacy measures, demonstrates a legal justification for processing activities, incorporates a data privacy policy, provides a map for data processing and ensures security and privacy awareness among all actors. The research is limited to a focus on blockchain–GDPR compliance; however, future research is needed to investigate the use of the framework in specific domains.

Practical implications

The paper posits a framework that identifies the strategies and tactics necessary for GDPR compliance. Practitioners need to compliment the framework with rigorous privacy risk management, i.e. conducting a privacy risk analysis, identifying strategies and tactics to address such risks and preparing a privacy impact assessment that enhances accountability and transparency of a blockchain.

Originality/value

With the increasingly strategic use of data by businesses and the contravening growth of data privacy regulation, alternative technologies could provide businesses with a means to nurture trust with its customers regarding collected data. However, it is commonly assumed that the decentralized approach of blockchain technology cannot be applied to this business need. This paper posits a framework that enables a blockchain to be designed that follows the GDPR; thereby, providing an alternative for businesses to collect customers’ data while ensuring the customers’ trust.

Details

Digital Policy, Regulation and Governance, vol. 22 no. 5/6
Type: Research Article
ISSN: 2398-5038

Keywords

Article
Publication date: 28 November 2023

Hitesh Sharma, Praveen Ranjan Srivastava, Sajjad M. Jasimuddin, Zuopeng Justin Zhang and Ikram Jebabli

This study aims to provide a comprehensive analysis of the current privacy concerns in the tourism industry by uncovering the key factors leading to such concerns (i.e. smart…

Abstract

Purpose

This study aims to provide a comprehensive analysis of the current privacy concerns in the tourism industry by uncovering the key factors leading to such concerns (i.e. smart public services, cyber security issues, consumer behaviour and governance). Using papers from multiple sources, the relationship between technology advancements and tourist’s privacy concerns has been established.

Design/methodology/approach

This study adopted a machine learning-based systematic literature review approach to find out the clusters. The study analysed 68 papers using the topic modelling approach. A four-cluster solution was considered to be most representative of the extant literature identified using bibliographic coupling. Finally, content analysis of the selected literature has been performed.

Findings

This study identified four factors majorly leading to privacy concerns amid increasing technological advancements. Moreover, these factors were found to have a dyadic relationship with technological advancements. To everyone’s amazement, sustainable tourism was also found to have led to privacy concerns among tourists along with a lack of governance and cyber security issues. Furthermore, cluster-wise future research directions are provided based on the content analysis.

Originality/value

This study contributes to the literature by systematically reviewing and identifying the four dimensions leading to privacy concerns. To the best of the authors’ knowledge, the study done is the only attempt to synthesize the extant literature on tourists’ privacy concerns using an unbiased scientific approach.

目的

本研究对旅游业当前的隐私问题进行了全面分析, 以揭示导致此类担忧的关键因素(即智能公共服务、网络安全问题、消费者行为和治理)。 通过考察来自多方渠道的现有文献, 本研究确立了技术进步与游客隐私问题之间的关系。

设计/方法/途径

本研究采用基于机器学习的系统文献综述方法来找出聚类。 该研究使用主题建模方法分析了 68 篇文章。四聚类解决方案是现有文献中最具代表的 文献分类方法。最后, 本研究对所选文献进行了内容分析。

研究结果

这项研究确定了在技术进步不断增加的情况下主要导致隐私问题的四个因素。 此外, 这些因素被发现与技术进步有二元关系。 本研究还发现可持续旅游业引发了游客对隐私的担忧以及缺乏治理和网络安全问题。 此外, 通过基于内容的分析, 本研究提供了未来的聚类研究方向。

独创性

本研究对现有文献的贡献在于通过系统地文献综述和分析以确定导致隐私问题的四个维度。该研究是基于公正的科学方法综合现有游客隐私问题文献的首度尝试。

Finalidad/Objetivo

Este estudio proporciona un análisis exhaustivo de la actual preocupación por la privacidad en el sector turístico, poniendo al descubierto los factores clave que la generan (los servicios públicos inteligentes, los problemas de ciberseguridad, el comportamiento de los consumidores y la gobernanza). Gracias al uso de artículos de múltiples fuentes, se ha establecido la relación entre los avances tecnológicos y la preocupación de los turistas por la privacidad.

Diseño/Metodología/Enfoque

Este estudio adoptó un enfoque de revisión sistemática de la literatura basado en el aprendizaje automático para descubrir los conglomerados. El estudio analizó sesenta y ocho artículos utilizando el enfoque de modelización de temas. Se consideró que una solución de cuatro conglomerados era la más representativa de la literatura existente identificada mediante el acoplamiento bibliográfico. Por último, se realizó un análisis de contenido de la bibliografía seleccionada.

Hallazgos

En este estudio se identificaron cuatro factores principales que suscitan inquietud por la privacidad en medio de los crecientes avances tecnológicos. Además, se descubrió que estos factores tienen una relación diádica con dichos avances. Para sorpresa de todos, se halló que el turismo sostenible, junto con la falta de gobernanza y los problemas de ciberseguridad, también suscitan entre los turistas preocupaciones por su privacidad. Finalmente, el análisis de contenido ofrece orientaciones para futuras investigaciones.

Originalidad

Este estudio contribuye a la literatura haciendo una revisión sistemática e identificando las cuatro dimensiones que conducen a la preocupación por la privacidad. Este estudio es el único intento de sintetizar la bibliografía existente sobre la preocupación de los turistas por su privacidad utilizando un enfoque científico imparcial.

Article
Publication date: 16 July 2021

Hyunjin Kang, Wonsun Shin and Junru Huang

This study investigates how different parental mediation strategies (active versus restrictive) and teen Douyin users' privacy risk perceptions are associated with their privacy

2921

Abstract

Purpose

This study investigates how different parental mediation strategies (active versus restrictive) and teen Douyin users' privacy risk perceptions are associated with their privacy management behaviors.

Design/methodology/approach

An online survey with teen Douyin users (N = 500) was administered in mainland China.

Findings

Perceived privacy risk leads teenagers to implement stricter privacy management strategies. However, different types of parental mediation have different impacts on teens' privacy management behaviors. Discussion-based active mediation is positively correlated with privacy disclosure and privacy boundary linkage, while rule-based restrictive mediation is positively associated with privacy boundary control. In addition, active mediation encourages teens to use their own judgment about privacy risks when deciding how much personal information to disclose and with whom they want to share their information. Conversely, restrictive mediation results in teens making decisions about disclosing private information without taking their own risk assessments into account.

Originality/value

Video-sharing social media platforms like TikTok and Douyin have become a cultural trend among teen social media users. However, loss of privacy is a potentially serious downside of using such platforms. Despite the platforms' popularity among this age group, little is known about the ways teens manage their privacy on such social media platforms. By examining how teens' privacy risk perception and parental intervention shape three different aspects of privacy boundary management (i.e. privacy disclosure, privacy boundary linkage, and privacy boundary control), this study provides a comprehensive understanding of teen Douyin users' privacy management.

Article
Publication date: 1 December 2003

Oswald A. J. Mascarenhas, Ram Kesavan and Michael D. Bernacchi

Argues that online privacy rights of consumers are not absolute rights but joint ownership privileges they share with online marketers. Consumers can voluntarily transfer these…

2717

Abstract

Argues that online privacy rights of consumers are not absolute rights but joint ownership privileges they share with online marketers. Consumers can voluntarily transfer these privileges to online marketers under certain mutually agreeable conditions. Accordingly, online marketers can facilitate, motivate and compensate such transfers by designing various innovative personalization strategies that, rather than jeopardize the privacy privileges of consumers, would benefit them. Technology and society can progress only through such partnerships. Cites two consistently successful net companies, Dell and eBay, as examples of such partnered personalizations.

Details

Journal of Consumer Marketing, vol. 20 no. 7
Type: Research Article
ISSN: 0736-3761

Keywords

Article
Publication date: 13 December 2023

Yuanyuan Guo, Chaoyou Wang and Xiaoting Chen

This study aims to examine the relative effectiveness of functional and financial remedies in influencing customers' negative coping responses in the event of a data breach. It…

Abstract

Purpose

This study aims to examine the relative effectiveness of functional and financial remedies in influencing customers' negative coping responses in the event of a data breach. It also uncovers the different mediating roles played by customers' feelings of anger and fear in the process of data breach recovery. This study thus differs from the literature, which has primarily focused on the impact of financial compensation and apologies for service failures in face-to-face environments.

Design/methodology/approach

Two scenario-based experiments were conducted to empirically validate the model. The authors received 302 copies of the questionnaire, of which 269 were valid.

Findings

This study finds that functional remedies are more effective than financial remedies when sensitive information has been compromised, but there is no significant difference between the effectiveness of the two remedies when nonsensitive information has been compromised. In addition, functional remedies influence negative coping behaviors directly and indirectly; the indirect effect is achieved through the reduction of fear and anger. Contrary to the authors' expectation, financial remedies do not have a direct effect on negative coping behaviors; they can indirectly affect negative coping behaviors by reducing anger but do not affect negative coping behaviors by reducing fear.

Practical implications

This study provides key insights into how to manage customer reactions in the event of a data breach, suggesting the use of carefully designed recovery strategies. Companies must attend to customers' specific emotional responses to manage their negative coping behaviors.

Originality/value

This study extends the limited literature on data breach recovery actions by investigating the different effectiveness of functional and financial remedies in the event of a data breach. It also uncovers how functional and financial recovery strategies affect customers' negative coping behaviors by revealing the different mediating effects of fear and anger.

Details

Journal of Enterprise Information Management, vol. 37 no. 1
Type: Research Article
ISSN: 1741-0398

Keywords

1 – 10 of over 21000