Search results
1 – 10 of 565Christine Prince, Nessrine Omrani and Francesco Schiavone
Research on online user privacy shows that empirical evidence on how privacy literacy relates to users' information privacy empowerment is missing. To fill this gap, this paper…
Abstract
Purpose
Research on online user privacy shows that empirical evidence on how privacy literacy relates to users' information privacy empowerment is missing. To fill this gap, this paper investigated the respective influence of two primary dimensions of online privacy literacy – namely declarative and procedural knowledge – on online users' information privacy empowerment.
Design/methodology/approach
An empirical analysis is conducted using a dataset collected in Europe. This survey was conducted in 2019 among 27,524 representative respondents of the European population.
Findings
The main results show that users' procedural knowledge is positively linked to users' privacy empowerment. The relationship between users' declarative knowledge and users' privacy empowerment is partially supported. While greater awareness about firms and organizations practices in terms of data collections and further uses conditions was found to be significantly associated with increased users' privacy empowerment, unpredictably, results revealed that the awareness about the GDPR and user’s privacy empowerment are negatively associated. The empirical findings reveal also that greater online privacy literacy is associated with heightened users' information privacy empowerment.
Originality/value
While few advanced studies made systematic efforts to measure changes occurred on websites since the GDPR enforcement, it remains unclear, however, how individuals perceive, understand and apply the GDPR rights/guarantees and their likelihood to strengthen users' information privacy control. Therefore, this paper contributes empirically to understanding how online users' privacy literacy shaped by both users' declarative and procedural knowledge is likely to affect users' information privacy empowerment. The study empirically investigates the effectiveness of the GDPR in raising users' information privacy empowerment from user-based perspective. Results stress the importance of greater transparency of data tracking and processing decisions made by online businesses and services to strengthen users' control over information privacy. Study findings also put emphasis on the crucial need for more educational efforts to raise users' awareness about the GDPR rights/guarantees related to data protection. Empirical findings also show that users who are more likely to adopt self-protective approaches to reinforce personal data privacy are more likely to perceive greater control over personal data. A broad implication of this finding for practitioners and E-businesses stresses the need for empowering users with adequate privacy protection tools to ensure more confidential transactions.
Details
Keywords
Yingying Yu, Wencheng Su, Zhangping Lu, Guifeng Liu and Wenjing Ni
Spatial olfactory design in the library appears to be a practical approach to enhance the coordination between architectural spaces and user behaviors, shape immersive activity…
Abstract
Purpose
Spatial olfactory design in the library appears to be a practical approach to enhance the coordination between architectural spaces and user behaviors, shape immersive activity experiences and shape immersive activity experiences. Therefore, this study aims to explore the association between the olfactory elements of library space and users’ olfactory perception, providing a foundation for the practical design of olfactory space in libraries.
Design/methodology/approach
Using the olfactory perception semantic differential experiment method, this study collected feedback on the emotional experience of olfactory stimuli from 56 participants in an academic library. From the perspective of environmental psychology, the dimensions of pleasure, control and arousal of users’ olfactory perception in the academic library environment were semantically and emotionally described. In addition, the impact of fatigue state on users’ olfactory perception was analyzed through statistical methods to explore the impact path of individual physical differences on olfactory perception.
Findings
It was found that users’ olfactory perception in the academic library environment is likely semantically described from the dimensions of pleasure, arousal and control. These dimensions mutually influence users’ satisfaction with olfactory elements. Moreover, there is a close correlation between pleasure and satisfaction. In addition, fatigue states may impact users’ olfactory perception. Furthermore, users in a high-fatigue state may be more sensitive to the arousal of olfactory perception.
Originality/value
This article is an empirical exploration of users’ perception of the environmental odors in libraries. The experimental results of this paper may have practical implications for the construction of olfactory space in academic libraries.
Details
Keywords
Vibhav Singh, Niraj Kumar Vishvakarma and Vinod Kumar
E-commerce companies often manipulate customer decisions through dark patterns to meet their interests. Therefore, this study aims to identify, model and rank the enablers behind…
Abstract
Purpose
E-commerce companies often manipulate customer decisions through dark patterns to meet their interests. Therefore, this study aims to identify, model and rank the enablers behind dark patterns usage in e-commerce companies.
Design/methodology/approach
Dark pattern enablers were identified from existing literature and validated by industry experts. Total interpretive structural modeling (TISM) was used to model the enablers. In addition, “matriced impacts croisés multiplication appliquée á un classement” (MICMAC) analysis categorized and ranked the enablers into four groups.
Findings
Partial human command over cognitive biases, fighting market competition and partial human command over emotional triggers were ranked as the most influential enablers of dark patterns in e-commerce companies. At the same time, meeting long-term economic goals was identified as the most challenging enabler of dark patterns, which has the lowest dependency and impact over the other enablers.
Research limitations/implications
TISM results are reliant on the opinion of industry experts. Therefore, alternative statistical approaches could be used for validation.
Practical implications
The insights of this study could be used by business managers to eliminate dark patterns from their platforms and meet the motivations of the enablers of dark patterns with alternate strategies. Furthermore, this research would aid legal agencies and online communities in developing methods to combat dark patterns.
Originality/value
Although a few studies have developed taxonomies and classified dark patterns, to the best of the authors’ knowledge, no study has identified the enablers behind the use of dark patterns by e-commerce organizations. The study further models the enablers and explains the mutual relationships.
Details
Keywords
Daria Arkhipova, Marco Montemari, Chiara Mio and Stefano Marasca
This paper aims to critically examine the accounting and information systems literature to understand the changes that are occurring in the management accounting profession. The…
Abstract
Purpose
This paper aims to critically examine the accounting and information systems literature to understand the changes that are occurring in the management accounting profession. The changes the authors are interested in are linked to technology-driven innovations in managerial decision-making and in organizational structures. In addition, the paper highlights research gaps and opportunities for future research.
Design/methodology/approach
The authors adopted a grounded theory literature review method (Wolfswinkel et al., 2013) to achieve the study’s aims.
Findings
The authors identified four research themes that describe the changes in the management accounting profession due to technology-driven innovations: structured vs unstructured data, human vs algorithm-driven decision-making, delineated vs blurred functional boundaries and hierarchical vs platform-based organizations. The authors also identified tensions mentioned in the literature for each research theme.
Originality/value
Previous studies display a rather narrow focus on the role of digital technologies in accounting work and new competences that management accountants require in the digital era. By contrast, the authors focus on the broader technology-driven shifts in organizational processes and structures, which vastly change how accounting information is collected, processed and analyzed internally to support managerial decision-making. Hence, the paper focuses on how management accountants can adapt and evolve as their organizations transition toward a digital environment.
Details
Keywords
Dan Li, Hualong Yang and Zhibin Hu
Gamification design is considered an effective way of changing users' health behavior and improving their health management performance. Even though numerous studies have…
Abstract
Purpose
Gamification design is considered an effective way of changing users' health behavior and improving their health management performance. Even though numerous studies have investigated the positive effect of gamification competition on users, little research has considered gamification's ineffectiveness and negative effects. In particular, how gamification competition affects users' technological exhaustion remains unclear.
Design/methodology/approach
According to flow theory and related research on gamification, this study discusses the nonlinear relationship between gamification competition and users' technological exhaustion. Furthermore, the authors analyze the moderating effect of user type (socializers and achievers) and users' health condition on this nonlinear relationship. Based on flow theory, the authors propose a series of research hypotheses. To test all research hypotheses, the authors collected information from 407 users via a questionnaire as the data for this study.
Findings
The empirical results found a U-shaped relationship between gamification competition and technological exhaustion. Technological exhaustion gradually decreases as competition increases until reaching the lowest point; after that, technological exhaustion gradually increases as competition increases. Further, being a socializer and health condition play a moderating role in the U-shaped relationship between competition and technological exhaustion.
Originality/value
This study's findings not only enrich the related research in flow theory and gamification, but also contribute to the effective design of gamification in health management platforms.
Details
Keywords
This study aims to investigate Bangladesh’s e-commerce regulations in light of the growing criticism that they are insufficient to curb predicate crimes like fraud and money…
Abstract
Purpose
This study aims to investigate Bangladesh’s e-commerce regulations in light of the growing criticism that they are insufficient to curb predicate crimes like fraud and money laundering in the online marketplace.
Design/methodology/approach
This study used the exploratory design to examine the latest ministerial directives and laws governing e-commerce in Bangladesh to determine why they cannot prevent fraudulent activities in this promising sector and identify potential solutions.
Findings
Bangladesh’s regulatory responses to e-commerce fraud prevention and detection are reactive and inadequate. Regulators are unwilling and unable to enforce available legal provisions for various reasons, including a lack of knowledge and coordination among the agencies.
Research limitations/implications
This paper focuses solely on the legal and regulatory framework in place to combat e-commerce fraud. Other critical issues, such as consumer rights, privacy and data protection in e-commerce, are not addressed.
Practical implications
The findings of this study will assist policymakers in revising current regulatory approaches to e-commerce to protect this sector from criminal abuse.
Originality/value
This study looked into the possibility of using a proactive risk-based approach in the e-commerce sector, similar to what the Bangladesh Financial Intelligence Unit does in the financial sector.
Details
Keywords
Meenakshi Handa, Ronika Bhalla and Parul Ahuja
Increasing incidents of privacy invasion on social networking sites (SNS) are intensifying the concerns among stakeholders about the misuse of personal data. However, there seems…
Abstract
Purpose
Increasing incidents of privacy invasion on social networking sites (SNS) are intensifying the concerns among stakeholders about the misuse of personal data. However, there seems to be limited research on exploring the impact of specific privacy concerns on users’ intention to engage in various privacy protection behaviors. This study aims to examine the role of social privacy concerns, institutional privacy concerns and privacy self-efficacy as antecedents of privacy protection–related control activities intention among young adults active on SNS.
Design/methodology/approach
Data collected from 284 young adults active on SNS was analyzed through partial least squares structural equation modeling using Smart PLS.
Findings
The results indicate that institutional privacy concerns, social privacy concerns and privacy self-efficacy positively influence the control activities intention of SNS users. The extent of privacy self-efficacy and privacy protection-related control activities intention differs among users based on gender.
Research limitations/implications
This study is limited to a population of young adults in the age group of 18–25 years.
Practical implications
The findings of this study form the basis for specific recommendations addressing the different types of privacy concerns experienced by social media users, promoting responsible privacy control behaviors on online platforms and discouraging the possible misuse of information by third parties.
Originality/value
This study validates a theoretical framework that can contribute to future investigations concerning the use of SNS. The study findings form the basis for a set of practical recommendations for policymakers, SNS platforms and users.
Details
Keywords
Abstract
Purpose
Based on the cognition–affect–conation pattern, this study explores the factors that affect the intention to use facial recognition services (FRS). The study adopts the driving factor perspective to examine how network externalities influence FRS use intention through the mediating role of satisfaction and the barrier factor perspective to analyze how perceived privacy risk affects FRS use intention through the mediating role of privacy cynicism.
Design/methodology/approach
The data collected from 478 Chinese FRS users are analyzed via partial least squares-based structural equation modeling (PLS-SEM).
Findings
The study produces the following results. (1) FRS use intention is motivated directly by the positive affective factor of satisfaction and the negative affective factor of privacy cynicism. (2) Satisfaction is affected by cognitive factors related to network externalities. Perceived complementarity and perceived compatibility, two indirect network externalities, positively affect satisfaction, whereas perceived critical mass, a direct network externality, does not significantly affect satisfaction. In addition, perceived privacy risk generates privacy cynicism. (3) Resistance to change positively moderates the relationship between privacy cynicism and intention to use FRS.
Originality/value
This study extends knowledge on people's use of FRS by exploring affect- and cognitive-based factors and finding that the affect-based factors (satisfaction and privacy cynicism) play fully mediating roles in the relationship between the cognitive-based factors and use intention. This study also expands the cognitive boundaries of FRS use by exploring the functional condition between affect-based factors and use intention, that is, the moderating role of resistance to use.
Details
Keywords
Chunmei Gan, Hongxiu Li and Yong Liu
To understand the mechanisms underlying social media discontinuance behavior, this study explores factors affecting social media discontinuance behavior from the perspective of…
Abstract
Purpose
To understand the mechanisms underlying social media discontinuance behavior, this study explores factors affecting social media discontinuance behavior from the perspective of social cognitive theory (SCT).
Design/methodology/approach
Based on SCT, this study puts forward a theoretical model incorporating habit, excessive use and negative emotions to predict social media discontinuance behavior. The proposed research model was empirically tested with 465 responses collected from WeChat users in China via an online survey. WeChat is one of the most popular social media in China. However, WeChat also faces the challenges of reduced or terminated usage among its users. Partial least squares structural equation modeling (PLS-SEM) technique was used to analyze the data.
Findings
The research results in this study show that habit exerts a negative effect on social media discontinuance behavior, while exhaustion and regret have positive influences. In addition, habit positively affects excessive use, which further leads to negative emotions of social media exhaustion and regret. Moreover, gender moderates the relationship between habit and social media discontinuance behavior.
Originality/value
This study adds to the literature of information system (IS) use lifecycle by investigating user behavioral changes regarding a transition from habituated to excessive use and further to discontinuance behavior. This study also helps elucidate the complex role of habit by explaining social media discontinuance from the social cognitive view. Furthermore, this study advances the current understanding of gender difference in social media discontinuance in the Chinese context. The study also offers insights to practitioners on how to prevent individuals from discontinuing their use of social media.
Details
Keywords
Hassan Jamil, Tanveer Zia, Tahmid Nayeem, Monica T. Whitty and Steven D'Alessandro
The current advancements in technologies and the internet industry provide users with many innovative digital devices for entertainment, communication and trade. However…
Abstract
Purpose
The current advancements in technologies and the internet industry provide users with many innovative digital devices for entertainment, communication and trade. However, simultaneous development and the rising sophistication of cybercrimes bring new challenges. Micro businesses use technology like how people use it at home, but face higher cyber risks during riskier transactions, with human error playing a significant role. Moreover, information security researchers have often studied individuals’ adherence to compliance behaviour in response to cyber threats. The study aims to examine the protection motivation theory (PMT)-based model to understand individuals’ tendency to adopt secure behaviours.
Design/methodology/approach
The study focuses on Australian micro businesses since they are more susceptible to cyberattacks due to the least security measures in place. Out of 877 questionnaires distributed online to Australian micro business owners through survey panel provider “Dynata,” 502 (N = 502) complete responses were included. Structural equational modelling was used to analyse the relationships among the variables.
Findings
The results indicate that all constructs of the protection motivation, except threat susceptibility, successfully predict the user protective behaviours. Also, increased cybersecurity costs negatively impact users’ safe cyber practices.
Originality/value
The study has critical implications for understanding micro business owners’ cyber security behaviours. The study contributes to the current knowledge of cyber security in micro businesses through the lens of PMT.
Details