Search results
1 – 10 of over 92000Hamid Reza Nikkhah, Varun Grover and Rajiv Sabherwal
This study aims to argue that user’s continued use behavior is contingent upon two perceptions (i.e. the app and the provider). This study examines the moderating effects of…
Abstract
Purpose
This study aims to argue that user’s continued use behavior is contingent upon two perceptions (i.e. the app and the provider). This study examines the moderating effects of user’s perceptions of apps and providers on the effects of security and privacy concerns and investigate whether assurance mechanisms decrease such concerns.
Design/methodology/approach
This study conducts a scenario-based survey with 694 mobile cloud computing (MCC) app users to understand their perceptions and behaviors.
Findings
This study finds that while perceived value of data transfer to the cloud moderates the effects of security and privacy concerns on continued use behavior, trust only moderates the effect of privacy concerns. This study also finds that perceived effectiveness of security and privacy intervention impacts privacy concerns but does not decrease security concerns.
Originality/value
Prior mobile app studies mainly focused on mobile apps and did not investigate the perceptions of app providers along with app features in the same study. Furthermore, International Organization for Standardization 27018 certification and privacy policy notification are the interventions that exhibit data assurance mechanisms. However, it is unknown whether these interventions are able to decrease users’ security and privacy concerns after using MCC apps.
Details
Keywords
Anil Gurung and M.K. Raja
Privacy and security concerns of consumers have been touted as one of the hindrances to the growth of e-commerce. These concerns increase the risk perception of consumers…
Abstract
Purpose
Privacy and security concerns of consumers have been touted as one of the hindrances to the growth of e-commerce. These concerns increase the risk perception of consumers. Understanding the consequences of privacy and security concerns and their relationship to risk perceptions may provide a solution. The relationship between privacy and security is investigated using the theory of planned behavior. The study aims to examine the relationship of trust, privacy and security concerns to the risk perception adoption of e-commerce. The results from a survey validate the model.
Design/methodology/approach
Data were collected using survey from undergraduate business students. The respondents were requested to select a specific product that they plan to purchase in the next six months. After selecting a product, the respondents were requested to report an online company that they have recently visited which offers the selected product. The respondents were requested to fill out the survey with regard to their selected online company. Time given was approximately 20 min.
Findings
The results suggest that privacy and security concerns and trust beliefs had effects on risk perception. Among these effects, trust had the largest effect followed by privacy and security concerns. Furthermore, risk perception and trust beliefs had effects on attitude. The effect of trust beliefs on attitude was larger than the effect of risk perception on attitude. Similarly, subjective norm, perceived behavioral control and attitude had a positive and direct effect on intention to be involved in e-commerce.
Research limitations/implications
The first limitation of this study is the use of student subjects. Because this study took place in an educational setting, its generalizability to the general population of consumers lacks to some degree. The second limitation of this study is mono-method bias.
Practical implications
The effect of privacy concerns on risk perception was larger than that of security concerns. Because the consumers get more experienced and sophisticated using the Web, the security concerns that they may have had at the beginning are not reflected in their risk perceptions. It is likely that they have adopted protective measures on their own to defend their privacy online. An example of such a measure would be providing false information to online companies when asked to submit personal information.
Originality/value
The major contributions of this study are developing and validating an integrative framework of e-commerce adoption at the individual level. The model includes privacy and security concerns, risk perception and trust beliefs. This study also highlighted the distinction of constructs of privacy and security concerns and showed their differential effects on other related constructs in the research model.
Details
Keywords
Mohamed Abdelhamid, Victoria Kisekka and Spyridon Samonas
The purpose of this study is to understand why individuals choose to avoid using e-services due to security concerns and perceived risk when these factors are affected by the…
Abstract
Purpose
The purpose of this study is to understand why individuals choose to avoid using e-services due to security concerns and perceived risk when these factors are affected by the perceived degree of government cybersecurity preparedness against cyberattacks.
Design/methodology/approach
The authors adopt the information systems success model to predict the role of government security preparedness efforts in influencing the determinants of e-services avoidance. The conceptual model includes four variables: security concerns, perceived risk of cyberattacks, perceived government cybersecurity preparedness and e-services avoidance. Data from 774 participants were used to analyze our conceptual model.
Findings
First, the findings show that security concerns regarding personal information safety and perceived risk of cyberattacks are barriers to e-services use, with the former having a stronger effect. Second, the findings showed that perceived government cybersecurity preparedness significantly reduces security concerns and perceived risk of cyberattacks. Third, the post hoc group analysis between individuals with a bachelor’s degree or higher versus those without a bachelor’s degree showed that the effect of both security concerns and perceived risk of cyberattacks on e-services avoidance was greater for individuals without a bachelor’s degree. The same relationship between perceived risk of cyberattacks and e-services avoidance was not supported for individuals with a bachelor’s degree or higher.
Originality/value
Extant privacy research fails to adequately examine the role of institutional factors, such as government efforts, and how these mitigate or amplify cybersecurity concerns and risks related to e-services. This research takes the first step toward addressing this limitation by examining the influence of government cybersecurity preparedness efforts on the determinants of e-services avoidance.
Details
Keywords
Marcelo Vinhal Nepomuceno, Michel Laroche, Marie‐Odile Richard and Axel Eggert
This paper aims to explore the association between intangibility and perceived risk using a sample of North American households. This relationship is explored within two purchase…
Abstract
Purpose
This paper aims to explore the association between intangibility and perceived risk using a sample of North American households. This relationship is explored within two purchase environments, namely online and offline. The authors also investigated the moderating effects of privacy, system security and general security concerns when purchasing in an online environment.
Design/methodology/approach
The survey was delivered to 156 households in a small town in the Midwest and collected upon completion.
Findings
The perception of risk is increased when two negatively loaded pieces of information are processed simultaneously (i.e. product intangibility and privacy concern). Furthermore, system security was identified as the most relevant concern in e‐commerce.
Research limitations/implications
The representativeness of the sample is limited. Theoretical and managerial implications are discussed.
Originality/value
The results provide interesting insights about the generalizability of previous findings based on student samples, and show the importance of privacy concerns, system security concerns, general security concerns for those purchasing in online environments.
Details
Keywords
Basmah Almekhled and Helen Petrie
This study investigated the attitudes and concerns of Saudi higher educational institution (HEI) academics about privacy and security in online teaching during the COVID-19…
Abstract
Purpose
This study investigated the attitudes and concerns of Saudi higher educational institution (HEI) academics about privacy and security in online teaching during the COVID-19 pandemic.
Design/methodology/approach
Online Questionnaire questionnaire was designed to explore Saudi HEI academic’s attitudes and concerns about privacy and security issues in online teaching. The questionnaire asked about attitudes and concerns held before the pandemic and since the pandemic. The questionnaire included four sections. At the beginning of the questionnaire, participants were asked what the phrase “online privacy and security” meant to them, to gain an initial understanding of what it meant to academics. A definition for what we intended for the survey was then provided: “that a person’s data, including their identity, is not accessible to anyone other than themselves and others whom they have authorised and that their computing devices work properly and are free from unauthorised interference” (based on my reading of a range of sources, e.g. Schatz et al., 2017; Steinberg, 2019; NCS; Windley, 2005). This was to ensure that participants did understand what I was asking about in subsequent sections.
Findings
This study investigated the attitudes and concerns of Saudi HEI academics about privacy and security in online teaching during the COVID-19 pandemic. The findings provide several key insights: Key aspects of online privacy and security for Saudi HEI academics: Saudi HEI academic’s notion of online privacy and security is about the protection of personal data, preventing unauthorized access to data and ensuring the confidentiality and integrity of data. This underscores the significance of robust measures to safeguard sensitive information in online teaching, but also the need to make academics aware of the other aspects of online privacy and security. Potential to improve policies and training about online privacy and security in Saudi HEIs: Although many participants were aware of the online privacy and security policies of their HEI, only a small percentage had received training in this area. Thus, there is a need to improve the development and dissemination of policies and to provide academics with appropriate training in this area and encourage them to take available training. Use of videoconferencing and chat technologies and cultural sensitivities: The study highlighted moderate levels of concern among Saudi HEI academics regarding the use of videoconferencing and online chat technologies, and their concerns about cultural factors around the use of these technologies. This emphasizes the need for online teaching and the growing use of technologies in such teaching to respect cultural norms and preferences, highlighting the importance of fostering a culturally sensitive approach to technology deployment and use. Surprising low webcam use: An unexpected finding is the low use of webcams by both academics and students during online teaching sessions, prompting a need for a deeper understanding of the dynamics surrounding webcam engagement in such sessions. This calls for a reevaluation of the effectiveness of webcam use in the teaching process and underscores the importance of exploring methods for enhancing engagement and interaction in online teaching. In summary, this paper investigated the attitudes and concerns about privacy and security in the online teaching of Saudi HEI academics during the coronavirus pandemic. The study reveals areas where further research and policy development can enhance the online teaching experience. As the education landscape continues to evolve, institutions must remain proactive in addressing the concerns of their academics while fostering a culturally sensitive approach to technology deployment.
Research limitations/implications
One limitation of this study is the relatively small qualitative data sample, despite the adequate size of the sample including 36 academics from various Saudi Arabian HEIs for quantitative analysis. It was necessary to make the most of the open-ended questions optional – participants did not have to answer about concerns if they did not want to, as we did not want to make the questionnaire too long and onerous to complete. Consequently, the number of academics responding to the open-ended questions was limited, emphasizing the need for additional data and alternative research methods to further these issues. The study was focused on investigating the concerns of HEI Saudi academics, recognizing that the attitudes and concerns of academics in other countries may differ. Furthermore, the research also includes an exploration of the changes in academic attitudes and concerns before and since the COVID-19 pandemic, which will be the subject of further data analysis.
Originality/value
This research delves into Saudi HEI academics' perceptions and concerns regarding privacy and security in online education during the COVID-19 Pandemic. Notably, it highlights the moderate priority placed on online privacy and security, the unexpectedly low usage of webcams and the potential for enhancing policies and training. The study emphasizes the necessity for comprehensive measures to protect sensitive data and the importance of tailored policies for educators. It also underscores the need for a more nuanced understanding of webcam usage dynamics, offering valuable insights for institutions aiming to improve online education and address educators' concerns amidst evolving educational landscapes.
Details
Keywords
Hamid Reza Nikkhah and Rajiv Sabherwal
In this research, the authors focus on mobile cloud computing (MCC) collaboration apps that are multiplatform and send the users’ data to the cloud. Despite their benefits, MCC…
Abstract
Purpose
In this research, the authors focus on mobile cloud computing (MCC) collaboration apps that are multiplatform and send the users’ data to the cloud. Despite their benefits, MCC collaboration apps raise privacy concerns, as the users’ information is sent to the cloud where users lack direct control. This study aims to investigate why users disclose information to MCC apps despite privacy concerns and examine the effect of security and assurance mechanisms (i.e. privacy policies and ISO/IEC 27018 certification) on users’ perceptions and information disclosure. Based on three surveys conducted in 2016 (n = 515), 2017 (n = 505) and 2018 (n = 543), this study finds mixed results regarding the relationships among security, assurance mechanisms, utilitarian benefits and information disclosure.
Design/methodology/approach
This study conducted three scenario-based surveys in the USA in 2016 (n = 515), 2017 (n = 505) and 2018 (n = 543).
Findings
This study finds mixed results of relationships among security, assurance mechanisms, utilitarian benefit and information disclosure.
Originality/value
With proliferation of MCC apps, the investigation of how users make privacy decision to disclose personal information to these apps is sparse. This study, for the first time, investigates whether the signals of assurance mechanism decrease users’ privacy concerns. This study also examines the interplay between security and privacy within information disclosure behavior. Finally, this study was conducted in 3 years to enhance the generalizability and robustness of findings.
Details
Keywords
Adewumi Israel Badiora, Christopher A. Wojuade and Adeniyi S. Adeyemi
Crime in public places is an increasing concern for the police, users of public places and the general public at large. Significantly, users of public transport facilities…
Abstract
Purpose
Crime in public places is an increasing concern for the police, users of public places and the general public at large. Significantly, users of public transport facilities consistently perceive their risks from crime to be considerably higher, hurting levels of patronage. The aim of this study is to examine concerns for personal safety and measures that could improve sense of personal safety in a Nigerian public transport facility. This study further examines whether respondents’ perceptions determine frequent use of this public place. Explanatory factors are personal safety and place improvements concerns ratings.
Design/methodology/approach
The study adopted a case study. The selection of this was accomplished using carefully defined criteria in previous studies. The research process consists of three steps the on-site assessment, objective insecurity assessment and subjective insecurity survey. Both quantitative and qualitative data were collected. Quantitative data were explored using mean ranking, percentages and correlation, whereas qualitative information was analysed using narrative techniques of reporting. To define the major determinants of the frequent use of this public place, a multiple ordinary least squares regression was constructed for variables in the correlation model.
Findings
Results show that places within the site are not designed to meet crime prevention through environmental design strategies, as 625 crimes were documented with thefts well above other listed crimes. Respondents exhibited a significant level of concern for their safety across all the factors enumerated while the most important improvements concern was enhancements to lighting. Generally, findings suggest that there is still much to be done to improve elements of surveillance, access control, territoriality, image management and activity support on the site. Regression model shows that efforts to enhance perceived safety of users would have major significance on the frequent use of this facility.
Practical implications
Policies on public place developments should be mainly in terms of tackling the environmental design of car parks and the effects of darkness at night time. This should involve improvement of lighting and the installation of CCTV, security camera as well as constant maintenance of bushes, vegetation, plants, trees and other elements of the landscape. Furthermore, the aesthetics of the site has to be attractive to users. The site and its closest surroundings have to be well-maintained and cared for. Besides, place lines and private areas must be defined with plants, pavement treatments, short walls or fences.
Originality/value
Previous studies on safety and security of public transport places, particularly rail facility, have mainly concentrated on the relations between fear of crime, perceived safety and place improvement concerns. To the best of authors’ knowledge, no study till date has explored how they correlate to the patronage of the transport facility, particularly in the sub-Saharan nations. This study contributes to existing literature having revealed perceived personal safety and transport place improvements concerns to be another important dimension of rail transport patronage in the Nigerian context.
Details
Keywords
Shing Cheong Hui, Ming Yung Kwok, Elaine W.S. Kong and Dickson K.W. Chiu
Although cloud storage services can bring users valuable convenience, they can be technically complex and intrinsically insecure. Therefore, this research explores the concerns of…
Abstract
Purpose
Although cloud storage services can bring users valuable convenience, they can be technically complex and intrinsically insecure. Therefore, this research explores the concerns of academic users regarding cloud security and technical issues and how such problems may influence their continuous use in daily life.
Design/methodology/approach
This qualitative study used a semi-structured interview approach comprising six main open-ended questions to explore the information security and technical issues for the continuous use of cloud storage services by 20 undergraduate students in Hong Kong.
Findings
The analysis revealed cloud storage service users' major security and technical concerns, particularly synchronization and backup issues, were the most significant technical barrier to the continuing personal use of cloud storage services.
Originality/value
Existing literature has focused on how cloud computing services could bring benefits and security and privacy-related risks to organizations rather than security and technical issues of personal use, especially in the Asian academic context.
Details
Keywords
Shrawan Kumar Trivedi and Mohit Yadav
Shopping online is a fast-growing phenomenon. A look into the rapid exponential growth of the primary players in this sector shows huge market potential for e-commerce. Given the…
Abstract
Purpose
Shopping online is a fast-growing phenomenon. A look into the rapid exponential growth of the primary players in this sector shows huge market potential for e-commerce. Given the convenience of internet shopping, e-commerce is seen as an emerging trend among consumers, specifically the younger generation (Gen Y). The popularity of e-commerce and online shopping has captured the attention of e-retailers, encouraging researchers to focus on this area. This paper aims to examine the relationship between online repurchase intention and other variables such as security, privacy concerns, trust and ease of use (EOU), mediated by e-satisfaction.
Design/methodology/approach
A self-administered survey method is used, and students aged between 20 and 35 years at universities in northern India are selected as subjects. To test the hypotheses of this study, an online questionnaire is distributed to participants, with 309 legitimate responses received. The data are analyzed using SPSS version 20.0 and AMOS version 20.0. Structural equation modeling is used to examine the model and to test the hypotheses.
Findings
The results of this study show that security, privacy concerns, trust and EOU have a positive significant relationship with repurchase intention. The findings also reveal that e-satisfaction has a full mediation effect between security and repurchase intention and also between trust and repurchase intention. In addition, a partial mediation effect of e-satisfaction is noted between EOU and repurchase intention and between privacy concerns and repurchase intention.
Practical implications
The results show that security, trust, EOU and privacy concerns are the factors that have most impact on consumer purchasing behavior. In terms of the repurchase intention of Gen Y consumers, what is needed are strong security features, an easy-to-use interface, a trusted privacy policy and the creation of trust. Furthermore, it may be beneficial to observe e-satisfaction as a mediator when identifying potential problems; online satisfaction is important for the group in this study, and the results show that it impacts on the relation between repurchase intention and other factors.
Social implications
In terms of the repurchase intention of Gen Y consumers, what is needed are strong security features, an easy-to-use interface, a trusted privacy policy and the creation of trust. Furthermore, it may be beneficial to observe e-satisfaction as a mediator when identifying potential problems; online satisfaction is important for the group in this study, and the results show that it impacts on the relation between repurchase intention and other factors.
Originality/value
This research determines the impact of security, privacy concerns, EOU and trust on the online repurchasing behavior of Gen Y in India. The mediation effect of e-satisfaction is also determined.
Details
Keywords
Bilal Naqvi, Nathan Clarke and Jari Porras
The purpose of this paper is to present an integrative framework for handling the security and usability conflicts during the system development lifecycle. The framework has been…
Abstract
Purpose
The purpose of this paper is to present an integrative framework for handling the security and usability conflicts during the system development lifecycle. The framework has been formulated while considering key concerns raised after conducting a series of interviews with practitioners from the industry. The framework is aimed at assisting system designers and developers in making reasonably accurate choices when it comes to the trade-offs between security and usability. The outcomes of using the framework are documented as design patterns, which are disseminated among the community of system designers and developers for use in other but similar contexts.
Design/methodology/approach
A design science research approach was used to develop the integrative framework for usable security. Interviews were conducted for identification of the key concerns; however, the framework was validated during a workshop. Moreover, to validate the patterns’ template and the usable security pattern identified after instantiating the framework, a survey instrument was used.
Findings
It is important to consider the usability aspect in the development of security systems; otherwise, the systems, despite being secure against attacks, would be susceptible to user mistakes leading to compromises. It is worthwhile to handle usable security concerns right from the start of system development life cycle. Design patterns can help the developers in assessing the usability of their security options.
Practical implications
Practical implications
The framework would assist the designers and developers in handling the security and usability conflicts right from the start of the system development life cycle. The patterns documented after using the framework would help not only the designers and developers working in the industry but also freelancers.
Originality/value
The authors present a novel framework to handle the security and usability conflicts during the system development life cycle. The development process of the framework was driven by the concerns raised after a series of interviews with the practitioners from industry. The framework presented in this paper was validated during a workshop in which it was exposed for review and comments by the participants from the industry. To demonstrate the use of patterns in general and the framework in particular, a case study featuring smart grids from the domain of cyber-physical systems is presented, which (to the best of the authors’ knowledge) features the first work relevant to usable security in the domain of cyber-physical systems.
Details