Search results

1 – 10 of 565
Open Access
Article
Publication date: 15 January 2024

Christine Prince, Nessrine Omrani and Francesco Schiavone

Research on online user privacy shows that empirical evidence on how privacy literacy relates to users' information privacy empowerment is missing. To fill this gap, this paper…

1048

Abstract

Purpose

Research on online user privacy shows that empirical evidence on how privacy literacy relates to users' information privacy empowerment is missing. To fill this gap, this paper investigated the respective influence of two primary dimensions of online privacy literacy – namely declarative and procedural knowledge – on online users' information privacy empowerment.

Design/methodology/approach

An empirical analysis is conducted using a dataset collected in Europe. This survey was conducted in 2019 among 27,524 representative respondents of the European population.

Findings

The main results show that users' procedural knowledge is positively linked to users' privacy empowerment. The relationship between users' declarative knowledge and users' privacy empowerment is partially supported. While greater awareness about firms and organizations practices in terms of data collections and further uses conditions was found to be significantly associated with increased users' privacy empowerment, unpredictably, results revealed that the awareness about the GDPR and user’s privacy empowerment are negatively associated. The empirical findings reveal also that greater online privacy literacy is associated with heightened users' information privacy empowerment.

Originality/value

While few advanced studies made systematic efforts to measure changes occurred on websites since the GDPR enforcement, it remains unclear, however, how individuals perceive, understand and apply the GDPR rights/guarantees and their likelihood to strengthen users' information privacy control. Therefore, this paper contributes empirically to understanding how online users' privacy literacy shaped by both users' declarative and procedural knowledge is likely to affect users' information privacy empowerment. The study empirically investigates the effectiveness of the GDPR in raising users' information privacy empowerment from user-based perspective. Results stress the importance of greater transparency of data tracking and processing decisions made by online businesses and services to strengthen users' control over information privacy. Study findings also put emphasis on the crucial need for more educational efforts to raise users' awareness about the GDPR rights/guarantees related to data protection. Empirical findings also show that users who are more likely to adopt self-protective approaches to reinforce personal data privacy are more likely to perceive greater control over personal data. A broad implication of this finding for practitioners and E-businesses stresses the need for empowering users with adequate privacy protection tools to ensure more confidential transactions.

Details

Information Technology & People, vol. 37 no. 8
Type: Research Article
ISSN: 0959-3845

Keywords

Article
Publication date: 19 April 2024

Yingying Yu, Wencheng Su, Zhangping Lu, Guifeng Liu and Wenjing Ni

Spatial olfactory design in the library appears to be a practical approach to enhance the coordination between architectural spaces and user behaviors, shape immersive activity…

Abstract

Purpose

Spatial olfactory design in the library appears to be a practical approach to enhance the coordination between architectural spaces and user behaviors, shape immersive activity experiences and shape immersive activity experiences. Therefore, this study aims to explore the association between the olfactory elements of library space and users’ olfactory perception, providing a foundation for the practical design of olfactory space in libraries.

Design/methodology/approach

Using the olfactory perception semantic differential experiment method, this study collected feedback on the emotional experience of olfactory stimuli from 56 participants in an academic library. From the perspective of environmental psychology, the dimensions of pleasure, control and arousal of users’ olfactory perception in the academic library environment were semantically and emotionally described. In addition, the impact of fatigue state on users’ olfactory perception was analyzed through statistical methods to explore the impact path of individual physical differences on olfactory perception.

Findings

It was found that users’ olfactory perception in the academic library environment is likely semantically described from the dimensions of pleasure, arousal and control. These dimensions mutually influence users’ satisfaction with olfactory elements. Moreover, there is a close correlation between pleasure and satisfaction. In addition, fatigue states may impact users’ olfactory perception. Furthermore, users in a high-fatigue state may be more sensitive to the arousal of olfactory perception.

Originality/value

This article is an empirical exploration of users’ perception of the environmental odors in libraries. The experimental results of this paper may have practical implications for the construction of olfactory space in academic libraries.

Details

Library Hi Tech, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0737-8831

Keywords

Article
Publication date: 17 April 2024

Vibhav Singh, Niraj Kumar Vishvakarma and Vinod Kumar

E-commerce companies often manipulate customer decisions through dark patterns to meet their interests. Therefore, this study aims to identify, model and rank the enablers behind…

Abstract

Purpose

E-commerce companies often manipulate customer decisions through dark patterns to meet their interests. Therefore, this study aims to identify, model and rank the enablers behind dark patterns usage in e-commerce companies.

Design/methodology/approach

Dark pattern enablers were identified from existing literature and validated by industry experts. Total interpretive structural modeling (TISM) was used to model the enablers. In addition, “matriced impacts croisés multiplication appliquée á un classement” (MICMAC) analysis categorized and ranked the enablers into four groups.

Findings

Partial human command over cognitive biases, fighting market competition and partial human command over emotional triggers were ranked as the most influential enablers of dark patterns in e-commerce companies. At the same time, meeting long-term economic goals was identified as the most challenging enabler of dark patterns, which has the lowest dependency and impact over the other enablers.

Research limitations/implications

TISM results are reliant on the opinion of industry experts. Therefore, alternative statistical approaches could be used for validation.

Practical implications

The insights of this study could be used by business managers to eliminate dark patterns from their platforms and meet the motivations of the enablers of dark patterns with alternate strategies. Furthermore, this research would aid legal agencies and online communities in developing methods to combat dark patterns.

Originality/value

Although a few studies have developed taxonomies and classified dark patterns, to the best of the authors’ knowledge, no study has identified the enablers behind the use of dark patterns by e-commerce organizations. The study further models the enablers and explains the mutual relationships.

Details

Global Knowledge, Memory and Communication, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2514-9342

Keywords

Open Access
Article
Publication date: 16 April 2024

Daria Arkhipova, Marco Montemari, Chiara Mio and Stefano Marasca

This paper aims to critically examine the accounting and information systems literature to understand the changes that are occurring in the management accounting profession. The…

Abstract

Purpose

This paper aims to critically examine the accounting and information systems literature to understand the changes that are occurring in the management accounting profession. The changes the authors are interested in are linked to technology-driven innovations in managerial decision-making and in organizational structures. In addition, the paper highlights research gaps and opportunities for future research.

Design/methodology/approach

The authors adopted a grounded theory literature review method (Wolfswinkel et al., 2013) to achieve the study’s aims.

Findings

The authors identified four research themes that describe the changes in the management accounting profession due to technology-driven innovations: structured vs unstructured data, human vs algorithm-driven decision-making, delineated vs blurred functional boundaries and hierarchical vs platform-based organizations. The authors also identified tensions mentioned in the literature for each research theme.

Originality/value

Previous studies display a rather narrow focus on the role of digital technologies in accounting work and new competences that management accountants require in the digital era. By contrast, the authors focus on the broader technology-driven shifts in organizational processes and structures, which vastly change how accounting information is collected, processed and analyzed internally to support managerial decision-making. Hence, the paper focuses on how management accountants can adapt and evolve as their organizations transition toward a digital environment.

Details

Meditari Accountancy Research, vol. 32 no. 7
Type: Research Article
ISSN: 2049-372X

Keywords

Article
Publication date: 12 April 2023

Dan Li, Hualong Yang and Zhibin Hu

Gamification design is considered an effective way of changing users' health behavior and improving their health management performance. Even though numerous studies have…

Abstract

Purpose

Gamification design is considered an effective way of changing users' health behavior and improving their health management performance. Even though numerous studies have investigated the positive effect of gamification competition on users, little research has considered gamification's ineffectiveness and negative effects. In particular, how gamification competition affects users' technological exhaustion remains unclear.

Design/methodology/approach

According to flow theory and related research on gamification, this study discusses the nonlinear relationship between gamification competition and users' technological exhaustion. Furthermore, the authors analyze the moderating effect of user type (socializers and achievers) and users' health condition on this nonlinear relationship. Based on flow theory, the authors propose a series of research hypotheses. To test all research hypotheses, the authors collected information from 407 users via a questionnaire as the data for this study.

Findings

The empirical results found a U-shaped relationship between gamification competition and technological exhaustion. Technological exhaustion gradually decreases as competition increases until reaching the lowest point; after that, technological exhaustion gradually increases as competition increases. Further, being a socializer and health condition play a moderating role in the U-shaped relationship between competition and technological exhaustion.

Originality/value

This study's findings not only enrich the related research in flow theory and gamification, but also contribute to the effective design of gamification in health management platforms.

Details

Information Technology & People, vol. 37 no. 3
Type: Research Article
ISSN: 0959-3845

Keywords

Article
Publication date: 14 April 2023

Md. Zahurul Haq

This study aims to investigate Bangladesh’s e-commerce regulations in light of the growing criticism that they are insufficient to curb predicate crimes like fraud and money…

Abstract

Purpose

This study aims to investigate Bangladesh’s e-commerce regulations in light of the growing criticism that they are insufficient to curb predicate crimes like fraud and money laundering in the online marketplace.

Design/methodology/approach

This study used the exploratory design to examine the latest ministerial directives and laws governing e-commerce in Bangladesh to determine why they cannot prevent fraudulent activities in this promising sector and identify potential solutions.

Findings

Bangladesh’s regulatory responses to e-commerce fraud prevention and detection are reactive and inadequate. Regulators are unwilling and unable to enforce available legal provisions for various reasons, including a lack of knowledge and coordination among the agencies.

Research limitations/implications

This paper focuses solely on the legal and regulatory framework in place to combat e-commerce fraud. Other critical issues, such as consumer rights, privacy and data protection in e-commerce, are not addressed.

Practical implications

The findings of this study will assist policymakers in revising current regulatory approaches to e-commerce to protect this sector from criminal abuse.

Originality/value

This study looked into the possibility of using a proactive risk-based approach in the e-commerce sector, similar to what the Bangladesh Financial Intelligence Unit does in the financial sector.

Details

Journal of Money Laundering Control, vol. 27 no. 3
Type: Research Article
ISSN: 1368-5201

Keywords

Open Access
Article
Publication date: 1 February 2024

Meenakshi Handa, Ronika Bhalla and Parul Ahuja

Increasing incidents of privacy invasion on social networking sites (SNS) are intensifying the concerns among stakeholders about the misuse of personal data. However, there seems…

Abstract

Purpose

Increasing incidents of privacy invasion on social networking sites (SNS) are intensifying the concerns among stakeholders about the misuse of personal data. However, there seems to be limited research on exploring the impact of specific privacy concerns on users’ intention to engage in various privacy protection behaviors. This study aims to examine the role of social privacy concerns, institutional privacy concerns and privacy self-efficacy as antecedents of privacy protection–related control activities intention among young adults active on SNS.

Design/methodology/approach

Data collected from 284 young adults active on SNS was analyzed through partial least squares structural equation modeling using Smart PLS.

Findings

The results indicate that institutional privacy concerns, social privacy concerns and privacy self-efficacy positively influence the control activities intention of SNS users. The extent of privacy self-efficacy and privacy protection-related control activities intention differs among users based on gender.

Research limitations/implications

This study is limited to a population of young adults in the age group of 18–25 years.

Practical implications

The findings of this study form the basis for specific recommendations addressing the different types of privacy concerns experienced by social media users, promoting responsible privacy control behaviors on online platforms and discouraging the possible misuse of information by third parties.

Originality/value

This study validates a theoretical framework that can contribute to future investigations concerning the use of SNS. The study findings form the basis for a set of practical recommendations for policymakers, SNS platforms and users.

Details

Vilakshan - XIMB Journal of Management, vol. 21 no. 1
Type: Research Article
ISSN: 0973-1954

Keywords

Article
Publication date: 17 March 2023

Tu Lyu, Yulin Guo and Hao Chen

Based on the cognition–affect–conation pattern, this study explores the factors that affect the intention to use facial recognition services (FRS). The study adopts the driving…

Abstract

Purpose

Based on the cognition–affect–conation pattern, this study explores the factors that affect the intention to use facial recognition services (FRS). The study adopts the driving factor perspective to examine how network externalities influence FRS use intention through the mediating role of satisfaction and the barrier factor perspective to analyze how perceived privacy risk affects FRS use intention through the mediating role of privacy cynicism.

Design/methodology/approach

The data collected from 478 Chinese FRS users are analyzed via partial least squares-based structural equation modeling (PLS-SEM).

Findings

The study produces the following results. (1) FRS use intention is motivated directly by the positive affective factor of satisfaction and the negative affective factor of privacy cynicism. (2) Satisfaction is affected by cognitive factors related to network externalities. Perceived complementarity and perceived compatibility, two indirect network externalities, positively affect satisfaction, whereas perceived critical mass, a direct network externality, does not significantly affect satisfaction. In addition, perceived privacy risk generates privacy cynicism. (3) Resistance to change positively moderates the relationship between privacy cynicism and intention to use FRS.

Originality/value

This study extends knowledge on people's use of FRS by exploring affect- and cognitive-based factors and finding that the affect-based factors (satisfaction and privacy cynicism) play fully mediating roles in the relationship between the cognitive-based factors and use intention. This study also expands the cognitive boundaries of FRS use by exploring the functional condition between affect-based factors and use intention, that is, the moderating role of resistance to use.

Details

Information Technology & People, vol. 37 no. 3
Type: Research Article
ISSN: 0959-3845

Keywords

Article
Publication date: 13 April 2023

Chunmei Gan, Hongxiu Li and Yong Liu

To understand the mechanisms underlying social media discontinuance behavior, this study explores factors affecting social media discontinuance behavior from the perspective of…

Abstract

Purpose

To understand the mechanisms underlying social media discontinuance behavior, this study explores factors affecting social media discontinuance behavior from the perspective of social cognitive theory (SCT).

Design/methodology/approach

Based on SCT, this study puts forward a theoretical model incorporating habit, excessive use and negative emotions to predict social media discontinuance behavior. The proposed research model was empirically tested with 465 responses collected from WeChat users in China via an online survey. WeChat is one of the most popular social media in China. However, WeChat also faces the challenges of reduced or terminated usage among its users. Partial least squares structural equation modeling (PLS-SEM) technique was used to analyze the data.

Findings

The research results in this study show that habit exerts a negative effect on social media discontinuance behavior, while exhaustion and regret have positive influences. In addition, habit positively affects excessive use, which further leads to negative emotions of social media exhaustion and regret. Moreover, gender moderates the relationship between habit and social media discontinuance behavior.

Originality/value

This study adds to the literature of information system (IS) use lifecycle by investigating user behavioral changes regarding a transition from habituated to excessive use and further to discontinuance behavior. This study also helps elucidate the complex role of habit by explaining social media discontinuance from the social cognitive view. Furthermore, this study advances the current understanding of gender difference in social media discontinuance in the Chinese context. The study also offers insights to practitioners on how to prevent individuals from discontinuing their use of social media.

Details

Information Technology & People, vol. 37 no. 3
Type: Research Article
ISSN: 0959-3845

Keywords

Article
Publication date: 17 April 2024

Hassan Jamil, Tanveer Zia, Tahmid Nayeem, Monica T. Whitty and Steven D'Alessandro

The current advancements in technologies and the internet industry provide users with many innovative digital devices for entertainment, communication and trade. However…

Abstract

Purpose

The current advancements in technologies and the internet industry provide users with many innovative digital devices for entertainment, communication and trade. However, simultaneous development and the rising sophistication of cybercrimes bring new challenges. Micro businesses use technology like how people use it at home, but face higher cyber risks during riskier transactions, with human error playing a significant role. Moreover, information security researchers have often studied individuals’ adherence to compliance behaviour in response to cyber threats. The study aims to examine the protection motivation theory (PMT)-based model to understand individuals’ tendency to adopt secure behaviours.

Design/methodology/approach

The study focuses on Australian micro businesses since they are more susceptible to cyberattacks due to the least security measures in place. Out of 877 questionnaires distributed online to Australian micro business owners through survey panel provider “Dynata,” 502 (N = 502) complete responses were included. Structural equational modelling was used to analyse the relationships among the variables.

Findings

The results indicate that all constructs of the protection motivation, except threat susceptibility, successfully predict the user protective behaviours. Also, increased cybersecurity costs negatively impact users’ safe cyber practices.

Originality/value

The study has critical implications for understanding micro business owners’ cyber security behaviours. The study contributes to the current knowledge of cyber security in micro businesses through the lens of PMT.

Details

Information & Computer Security, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2056-4961

Keywords

1 – 10 of 565