Search results

1 – 10 of 77
Article
Publication date: 16 November 2021

Zhou Cheng, Kai Li and Ching-I Teng

Push notification service (PNS) is an important approach to distribute personalized information to users timely and is getting more and more popular. However, users' privacy…

Abstract

Purpose

Push notification service (PNS) is an important approach to distribute personalized information to users timely and is getting more and more popular. However, users' privacy concerns are a major inhibiting factor in their continuance usage of PNS. This study investigates the effect of privacy protection functions provided by PNS sites in enhancing users' perceived fairness on the basis of justice theory to mitigate users' concerns of information privacy. The mechanism underlying such influence on users' continuance usage of PNS comprises privacy concern and privacy-control self-efficacy.

Design/methodology/approach

Four scenario-based surveys are conducted to test the proposed hypotheses. The authors test the research model with a sample of 360 participants by ANOVA and PLS.

Findings

Results show that the proposed privacy protection functions have direct positive effects on users' privacy-control self-efficacy, negative effects on privacy concern and indirectly affect their continuance usage of PNS. Furthermore, the interaction effects between two approaches have different impacts on users' privacy concern and privacy-control self-efficacy.

Originality/value

This study provides some suggestions and guidance for PNS providers to design effective privacy protection technologies.

Details

Aslib Journal of Information Management, vol. 74 no. 2
Type: Research Article
ISSN: 2050-3806

Keywords

Open Access
Article
Publication date: 1 February 2024

Meenakshi Handa, Ronika Bhalla and Parul Ahuja

Increasing incidents of privacy invasion on social networking sites (SNS) are intensifying the concerns among stakeholders about the misuse of personal data. However, there seems…

Abstract

Purpose

Increasing incidents of privacy invasion on social networking sites (SNS) are intensifying the concerns among stakeholders about the misuse of personal data. However, there seems to be limited research on exploring the impact of specific privacy concerns on users’ intention to engage in various privacy protection behaviors. This study aims to examine the role of social privacy concerns, institutional privacy concerns and privacy self-efficacy as antecedents of privacy protection–related control activities intention among young adults active on SNS.

Design/methodology/approach

Data collected from 284 young adults active on SNS was analyzed through partial least squares structural equation modeling using Smart PLS.

Findings

The results indicate that institutional privacy concerns, social privacy concerns and privacy self-efficacy positively influence the control activities intention of SNS users. The extent of privacy self-efficacy and privacy protection-related control activities intention differs among users based on gender.

Research limitations/implications

This study is limited to a population of young adults in the age group of 18–25 years.

Practical implications

The findings of this study form the basis for specific recommendations addressing the different types of privacy concerns experienced by social media users, promoting responsible privacy control behaviors on online platforms and discouraging the possible misuse of information by third parties.

Originality/value

This study validates a theoretical framework that can contribute to future investigations concerning the use of SNS. The study findings form the basis for a set of practical recommendations for policymakers, SNS platforms and users.

Details

Vilakshan - XIMB Journal of Management, vol. 21 no. 1
Type: Research Article
ISSN: 0973-1954

Keywords

Abstract

Details

Journal of Consumer Marketing, vol. 31 no. 2
Type: Research Article
ISSN: 0736-3761

Article
Publication date: 12 November 2019

Xiang Gong, Kem Z.K. Zhang, Chongyang Chen, Christy M.K. Cheung and Matthew K.O. Lee

Drawing on the control agency theory and the network effect theory, the purpose of this paper is to examine the effect of privacy assurance approaches, network externality and…

1898

Abstract

Purpose

Drawing on the control agency theory and the network effect theory, the purpose of this paper is to examine the effect of privacy assurance approaches, network externality and technology complementarity on consumers’ self-disclosure in mobile payment (MP) applications. The authors identify four types of privacy assurance approaches: perceived effectiveness of privacy setting, perceived effectiveness of privacy policy, perceived effectiveness of industry self-regulation and perceived effectiveness of government legislation. The research model considers how these privacy assurance approaches influence privacy concerns and consumers’ self-disclosure in MP applications under boundary conditions of network externality and technology complementarity.

Design/methodology/approach

An online survey with 647 sample users was conducted to empirically validate the model. The target respondents were current consumers of a popular MP application. The empirical data were analyzed by a structural equation modeling approach.

Findings

The empirical results reveal several major findings. First, privacy assurance approaches can effectively decrease privacy concerns, which ultimately formulates consumers’ self-disclosure in MP applications. Second, network externality and technology complementarity weaken the effect of perceived effectiveness of privacy setting on privacy concerns. Third, network externality and technology complementarity strengthen the relationship between perceived effectiveness of government legislation and privacy concerns, while they have non-significant interaction effect with perceived effectiveness of privacy policy and industry self-regulation on privacy concerns.

Practical implications

MP providers and stakeholders can harness the efficacy of privacy assurance approaches in alleviating privacy concerns and promoting consumers’ self-disclosure in MP applications.

Originality/value

The authors’ work contributes to the information privacy literature by identifying effective privacy assurance approaches in promoting consumers’ self-disclosure in MP applications, and by highlighting boundary conditions of these privacy assurance approaches.

Article
Publication date: 26 August 2019

Ibrahim M. Al-Jabri, Mustafa I. Eid and Amer Abed

Customer privacy and security are major concerns. Online firms worldwide collect customer data for various reasons. This study aims to investigate factors that motivate and hinder…

1472

Abstract

Purpose

Customer privacy and security are major concerns. Online firms worldwide collect customer data for various reasons. This study aims to investigate factors that motivate and hinder a customer’s willingness to disclose personal information (WTD) to online firms on e-commerce websites.

Design/methodology/approach

Based on an extensive literature review, three sets of factors have been identified. These sets of factors are privacy concern, perceived disclosure benefits and privacy assurances. It is hypothesized that privacy concerns negatively affect the disclosure of personal information, while the perceived benefits of disclosure have positive effects. Privacy assurances would positively affect information disclosure and attenuate the negative effect of privacy concerns on the disclosure of personal information. The authors gathered data from 253 online customers in Saudi Arabia.

Findings

The results indicate that perceived disclosure benefits and privacy concerns have a significant positive and negative relationship, respectively, with WTD online. Privacy assurances had neither a direct nor a moderating effect on information disclosure.

Research limitations/implications

The findings will inform online firms about the factors that prevent or motivate customers to disclose personal information.

Originality/value

The effect of privacy concerns and benefits on personal information disclosure are not fully understood in Saudi Arabia. This study reveals more insights into the specific factors that make online customers reluctant or motivated to disclose their personal information.

Details

Information & Computer Security, vol. 28 no. 2
Type: Research Article
ISSN: 2056-4961

Keywords

Article
Publication date: 13 October 2022

Chien Wen (Tina) Yuan and Nanyi Bi

In a world where different communication technologies support social connection, managing unavailability is as important as, if not more important than, managing availability. The…

Abstract

Purpose

In a world where different communication technologies support social connection, managing unavailability is as important as, if not more important than, managing availability. The need to manage unavailability becomes increasingly critical when users employ several communication tools to interact with various ties. A person's availability information disclosure may depend on different social relationships and the technologies used by the person. The study contributes to the literature by drawing on privacy management theory to investigate how users practice availability management and use its deceptive form, which is sometimes called a butler lie, with various ties across different messaging applications (apps) as part of their online privacy. Relevant factors in mediated communication, including facework, common ground, and interpersonal trust, are included in the developed model.

Design/methodology/approach

The authors conducted an online survey (n = 475) to explore the relationship between one's contact with different interactants (significant others, family members, close friends, acquaintances, groups of friends, and groups of acquaintances) and one's practice of availability management and use of butler lies with these interactants at different size levels on various messaging apps.

Findings

Factors such as facework, privacy related to technology, and privacy related to social relationships affect the practice of availability management and the use of butler lies. Notably, butler lies are used most frequently with acquaintances and groups of acquaintances and least frequently with significant others. Moreover, the practice of availability management and the use of butler lies are negatively moderated by people's conversational grounding and trust.

Originality/value

The study examined the practice of cross-app availability management with diverse social ties on mobile technologies, which is a socio-informatic practice that is widely adopted in the contemporary digital landscape but on which limited scientific and theoretic research has been conducted. No research has directly investigated users' availability management across multiple apps from a relational perspective. Building on the theoretical framework of privacy management, the paper aims to bridge the gap in the relevant literature. The results of this study can serve as a reference for library professionals to develop information literacy programs according to users' availability management needs. The results also provide insights to system designers for developing messaging tools.

Article
Publication date: 13 September 2018

Ching-Hsuan Yeh, Yi-Shun Wang, Shin-Jeng Lin, Timmy H. Tseng, Hsin-Hui Lin, Ying-Wei Shih and Yi-Hsuan Lai

Considering that users’ information privacy concerns may affect the development of e-commerce, the purpose of this paper is to explore what drives internet users’ willingness to…

1553

Abstract

Purpose

Considering that users’ information privacy concerns may affect the development of e-commerce, the purpose of this paper is to explore what drives internet users’ willingness to provide personal information; further, the paper examines how extrinsic rewards moderate the relationship between users’ information privacy concerns and willingness to provide personal information.

Design/methodology/approach

Data collected from 345 valid internet users in the context of electronic commerce were analyzed using the partial least squares approach.

Findings

The result showed that agreeableness, risk-taking propensity and experience of privacy invasion were three main antecedents of information privacy concerns among the seven individual factors. Additionally, information privacy concerns did not significantly affect users’ willingness to provide personal information in the privacy calculation mechanism; however, extrinsic rewards directly affected users’ disclosure intention. The authors found that extrinsic rewards had not moderated the relationship between users’ information privacy concerns and their willingness to provide personal information.

Originality/value

This study is an exploratory effort to develop and validate a model for explaining why internet users were willing to provide personal information. The results of this study are helpful to researchers in developing theories of information privacy concerns and to practitioners in promoting internet users’ willingness to provide personal information in an e-commerce context.

Book part
Publication date: 14 March 2024

Alex Deslée and Julien Cloarec

The management of consumer privacy has become a critical concern for organizations in the age of artificial intelligence–powered marketing. The impact of data on the market…

Abstract

The management of consumer privacy has become a critical concern for organizations in the age of artificial intelligence–powered marketing. The impact of data on the market environment has brought both benefits and challenges, with marketers gaining valuable insights but also raising privacy concerns. As artificial intelligence–powered marketing advances, consumer vulnerability increases due to the sensitivity of collected data. This vulnerability leads some consumers to resort to falsifying information, posing a significant threat to the digital economy. Privacy empowerment and customer control play a vital role in addressing these challenges. This chapter explores the influencing factors and ethical considerations surrounding data falsification. It also discusses strategies to mitigate perceived vulnerability through privacy controls and explores the consequences of data breaches and customer vulnerability. The chapter further emphasizes the need for organizations to balance benefits, risks, and customer trust while harnessing the value of customer data. An ethical framework for data privacy marketing audits is proposed to help organizations assess their data practices responsibly and competitively. By integrating personal data protection strategies within an ethical framework, organizations can protect consumer privacy, enhance customer trust, and maintain their competitive edge in the market.

Details

The Impact of Digitalization on Current Marketing Strategies
Type: Book
ISBN: 978-1-83753-686-3

Keywords

Article
Publication date: 11 September 2017

Maor Weinberger, Maayan Zhitomirsky-Geffet and Dan Bouhnik

The purpose of this paper is to investigate the attitudes and influential factors of users’ knowledge and use of the tools designated for controlling and enhancing online privacy…

1303

Abstract

Purpose

The purpose of this paper is to investigate the attitudes and influential factors of users’ knowledge and use of the tools designated for controlling and enhancing online privacy, which are referred to as online privacy literacy (OPL). Particularly, inspired by the protection motivation theory, a motivational factor is defined as comprising several variables which reflect users’ motivation to protect their online privacy.

Design/methodology/approach

To this end, a user study was conducted based on the quantitative method with the participation of 169 students from the Israeli academia who were administered closed-ended questionnaires.

Findings

Generally low to moderate levels of OPL were obtained. Interestingly, the multivariate linear regression analysis showed that motivational factors, such as users’ concern for personal information protection on the internet and users’ privacy self-efficacy and sense of anonymity when visiting a website, were among the strongest predictive factors of users’ OPL level.

Social implications

This research has social implications that might contribute to an increase in the OPL among internet users.

Originality/value

The direct influence of the examined factors on users’ OPL was not previously discussed in the literature. As a result of the study, a comprehensive model of user online privacy behavior was constructed.

Article
Publication date: 5 June 2017

Tao Zhou

The purpose of this paper is to draw on the elaboration likelihood model to examine location-based services (LBS) users’ privacy concern.

2447

Abstract

Purpose

The purpose of this paper is to draw on the elaboration likelihood model to examine location-based services (LBS) users’ privacy concern.

Design/methodology/approach

Based on the 266 valid responses collected from a survey, structural equation modeling was employed to examine the research model.

Findings

The results indicated that privacy concern receives a dual influence from both central cues and peripheral cues. Central cues include privacy policy and information quality, whereas peripheral cues include reputation and privacy seals. Privacy control moderates the effects of privacy policy and privacy seals on privacy concern.

Research limitations/implications

The results imply that service providers need to consider both central and peripheral cues in order to mitigate users’ privacy concern associated with using LBS.

Originality/value

Although previous research has found the effect of privacy concern on user adoption of LBS, it has seldom examined the influence processes of external factors on privacy concern. This research tries to fill the gap.

Details

Internet Research, vol. 27 no. 3
Type: Research Article
ISSN: 1066-2243

Keywords

1 – 10 of 77