Search results

1 – 10 of over 21000
Article
Publication date: 10 July 2009

Chen Jianping and Yang Zhongwei

The purpose of this paper is to examine the extent to which financial privacy is present and necessary in dealings between banks and clients in China.

473

Abstract

Purpose

The purpose of this paper is to examine the extent to which financial privacy is present and necessary in dealings between banks and clients in China.

Design/methodology/approach

This paper provides a comparative study drawing, in particular, on developments in the USA.

Findings

It is a trend in legislation in the western developed countries that the right to privacy is taken seriously and private information in the financial activities is protected by law. The legislation in the USA is typically systematic and complete. The fact that financial privacy protection is sparsely stipulated in finance or administrative laws but the protection of privacy has yet not been systematically written into law in China so far, which is inconsistent with the current situations of the financial industry. China should deal with the relationship between banks and clients, administrative power and personal rights, judicial interpretation and legislation from the aspect of financial practice, so as to set up the legal system to protect financial privacy by learning from the legislation in the USA based on the national conditions.

Originality/value

The paper provides a systematic view of the value of financial privacy in the modern world, with recommendations for reform in China.

Details

International Journal of Law and Management, vol. 51 no. 4
Type: Research Article
ISSN: 1754-243X

Keywords

Article
Publication date: 21 March 2008

Vasilios Katos and Ahmed Patel

This paper aims to propose a tool to help policy makers understand the dynamic relationships between security and privacy on a strategic (macro) level.

1497

Abstract

Purpose

This paper aims to propose a tool to help policy makers understand the dynamic relationships between security and privacy on a strategic (macro) level.

Design/methodology/approach

The methodology is ported from the discipline of Macroeconomics, and applied to the information security and privacy domain. The methodology adopted is the so‐called “cross methodology” which claims ownership of the well‐known supply/demand market equilibrium exercise.

Findings

Early evaluation reveals that this is a potentially very effective tool in understanding societal behaviour and position towards information security and privacy and therefore makes this a suitable tool for investigating and exploring scenarios that can assist in policy making.

Originality/value

Up to date, research on the economics of security and privacy has been primarily focusing on a micro level. The main contribution of this paper is a methodology for investigating privacy and security on a macro level. We believe that our approach in undertaking this research is new and looking at the issues and relationships between security and privacy at a macro level, gives a better understanding of the problems at hand and how to resolve them.

Practical implications

The proposed tool may increase the efficiency of policy making and planning as it enables the policy makers on a governmental and strategic level to run scenarios in order to investigate the effect of their decisions (for example, an introduction of a stricter law relating to computer misuse) to the delicate balance of security and privacy.

Details

Information Management & Computer Security, vol. 16 no. 1
Type: Research Article
ISSN: 0968-5227

Keywords

Article
Publication date: 1 August 1999

Beth Simone Noveck

Looks at an attempt by a Hong Kong legislator to find out the Chinese Government’s information on her prior to their privacy law. Concludes the unwillingness of governments and…

249

Abstract

Looks at an attempt by a Hong Kong legislator to find out the Chinese Government’s information on her prior to their privacy law. Concludes the unwillingness of governments and courts to enforce basic privacy principles of international law and own national legislation, does not bode well for data privacy acts, with regard to the cots of human privacy and security.

Details

info, vol. 1 no. 4
Type: Research Article
ISSN: 1463-6697

Keywords

Article
Publication date: 14 May 2020

Gajendra Liyanaarachchi

This paper aims to demonstrate how building competency in privacy can be used to transform the corporate strategy to generate a sustainable competitive advantage. A novel…

Abstract

Purpose

This paper aims to demonstrate how building competency in privacy can be used to transform the corporate strategy to generate a sustainable competitive advantage. A novel framework is presented as a guide to redesigning strategy by striking a balance between customer expectation and organizational objectives. In doing so, the paper offers four possible outcomes of accommodation, accumulation, association and affiliation, providing illustrations to each scenario for strategy formulation.

Design/methodology/approach

The relationship between privacy paradox and corporate strategy was examined through a qualitative research study. The author conducted 30 in-depth interviews on grounded theory methodology investigating customer insights on the nature and extent of privacy protection associated with e-commerce and organizational approach.

Findings

The customers are dissatisfied with existing data security strategies adopted by firms in protecting privacy. The over-reliance on systems has negatively influenced the communication between the organization and customers, leading to a possible competitive disadvantage. The firms need to redesign privacy strategy shifting from a system-driven approach to providing personalized service.

Originality/value

This paper presents a novel framework the privacy strategy matrix (PSM), introducing privacy as a strategic expedient in transforming corporate strategy facilitating privacy protection as a metaphor for differentiation. PSM framework provides a standard to evaluate the effectiveness of the corporate strategy in managing privacy manifesting a path toward deriving a sustainable competitive advantage.

Details

Journal of Business Strategy, vol. 41 no. 5
Type: Research Article
ISSN: 0275-6668

Keywords

Article
Publication date: 16 February 2024

Chih-Hui Shieh, I-Ling Ling and Yi-Fen Liu

As a smart service, location-based advertising (LBA) integrates advanced technologies to deliver personalized messages based on a user’s real-time geographic location and needs…

Abstract

Purpose

As a smart service, location-based advertising (LBA) integrates advanced technologies to deliver personalized messages based on a user’s real-time geographic location and needs. However, research has shown that privacy concerns threaten the diffusion of LBA. This research investigates how privacy-related factors (i.e. LBA type, privacy self-efficacy (PSE) and consumer generation) impact consumers’ value-in-use and their intention to use LBA.

Design/methodology/approach

This study developed and examined an LBA value-in-use framework that integrates the role of LBA type, consumers’ PSE and consumer generation into the technology acceptance model (TAM). Data were collected through two experiments in the field with a total of 374 consumers. The proposed relationships were tested using PROCESS modeling.

Findings

The results reveal that pull (vs push) LBA causes higher value-in-use in terms of perceived usefulness and perceived ease of use, leading to greater usage intention. Further, the differences in the mediated relationship between pull- and push-LBA are larger among consumers of low PSE (vs high PSE) and Generation Z (vs other generations). The findings suggest that the consumer value-in-use brought about by LBA diminishes when using push-LBA for low PSE and Generation Z consumers.

Originality/value

This research is the first to integrate the privacy-related interactions of LBA type and consumer characteristics into TAM to develop a TAM-based LBA value-in-use framework. This study contributes to the literature on service value-in-use, smart services and LBA by clarifying the boundary conditions that determine the effectiveness of LBA in enhancing consumers’ value-in-use.

Details

Journal of Service Theory and Practice, vol. 34 no. 2
Type: Research Article
ISSN: 2055-6225

Keywords

Open Access
Article
Publication date: 15 January 2024

Christine Prince, Nessrine Omrani and Francesco Schiavone

Research on online user privacy shows that empirical evidence on how privacy literacy relates to users' information privacy empowerment is missing. To fill this gap, this paper…

Abstract

Purpose

Research on online user privacy shows that empirical evidence on how privacy literacy relates to users' information privacy empowerment is missing. To fill this gap, this paper investigated the respective influence of two primary dimensions of online privacy literacy – namely declarative and procedural knowledge – on online users' information privacy empowerment.

Design/methodology/approach

An empirical analysis is conducted using a dataset collected in Europe. This survey was conducted in 2019 among 27,524 representative respondents of the European population.

Findings

The main results show that users' procedural knowledge is positively linked to users' privacy empowerment. The relationship between users' declarative knowledge and users' privacy empowerment is partially supported. While greater awareness about firms and organizations practices in terms of data collections and further uses conditions was found to be significantly associated with increased users' privacy empowerment, unpredictably, results revealed that the awareness about the GDPR and user’s privacy empowerment are negatively associated. The empirical findings reveal also that greater online privacy literacy is associated with heightened users' information privacy empowerment.

Originality/value

While few advanced studies made systematic efforts to measure changes occurred on websites since the GDPR enforcement, it remains unclear, however, how individuals perceive, understand and apply the GDPR rights/guarantees and their likelihood to strengthen users' information privacy control. Therefore, this paper contributes empirically to understanding how online users' privacy literacy shaped by both users' declarative and procedural knowledge is likely to affect users' information privacy empowerment. The study empirically investigates the effectiveness of the GDPR in raising users' information privacy empowerment from user-based perspective. Results stress the importance of greater transparency of data tracking and processing decisions made by online businesses and services to strengthen users' control over information privacy. Study findings also put emphasis on the crucial need for more educational efforts to raise users' awareness about the GDPR rights/guarantees related to data protection. Empirical findings also show that users who are more likely to adopt self-protective approaches to reinforce personal data privacy are more likely to perceive greater control over personal data. A broad implication of this finding for practitioners and E-businesses stresses the need for empowering users with adequate privacy protection tools to ensure more confidential transactions.

Details

Information Technology & People, vol. 37 no. 8
Type: Research Article
ISSN: 0959-3845

Keywords

Open Access
Article
Publication date: 1 February 2024

Meenakshi Handa, Ronika Bhalla and Parul Ahuja

Increasing incidents of privacy invasion on social networking sites (SNS) are intensifying the concerns among stakeholders about the misuse of personal data. However, there seems…

Abstract

Purpose

Increasing incidents of privacy invasion on social networking sites (SNS) are intensifying the concerns among stakeholders about the misuse of personal data. However, there seems to be limited research on exploring the impact of specific privacy concerns on users’ intention to engage in various privacy protection behaviors. This study aims to examine the role of social privacy concerns, institutional privacy concerns and privacy self-efficacy as antecedents of privacy protection–related control activities intention among young adults active on SNS.

Design/methodology/approach

Data collected from 284 young adults active on SNS was analyzed through partial least squares structural equation modeling using Smart PLS.

Findings

The results indicate that institutional privacy concerns, social privacy concerns and privacy self-efficacy positively influence the control activities intention of SNS users. The extent of privacy self-efficacy and privacy protection-related control activities intention differs among users based on gender.

Research limitations/implications

This study is limited to a population of young adults in the age group of 18–25 years.

Practical implications

The findings of this study form the basis for specific recommendations addressing the different types of privacy concerns experienced by social media users, promoting responsible privacy control behaviors on online platforms and discouraging the possible misuse of information by third parties.

Originality/value

This study validates a theoretical framework that can contribute to future investigations concerning the use of SNS. The study findings form the basis for a set of practical recommendations for policymakers, SNS platforms and users.

Details

Vilakshan - XIMB Journal of Management, vol. 21 no. 1
Type: Research Article
ISSN: 0973-1954

Keywords

Article
Publication date: 4 December 2023

David Goyeneche, Stephen Singaraju and Luis Arango

This paper explores the similarities and differences in privacy attitudes, trust and risk beliefs between younger and older adults on social networking sites. The objective of the…

Abstract

Purpose

This paper explores the similarities and differences in privacy attitudes, trust and risk beliefs between younger and older adults on social networking sites. The objective of the article is to ascertain whether any notable differences exist between younger (18–25 years old) and older (55+ years old) adults in how trust and risk are influenced by privacy concerns upon personal information disclosure on social media.

Design/methodology/approach

A Likert scale instrument validated in previous research was employed to gather the responses of 148 younger and 152 older adults. The scale was distributed through Amazon Mechanical Turk. Data were analyzed through partial least squares structural equation modeling.

Findings

No significant differences were found between younger and older adults in how social media privacy concerns related to trust and risk beliefs. Two privacy concern dimensions were found to have a significant influence on perceptions of risk for both populations: collection and control. Predictability and a sense of control are proposed as two conceptual approaches that can explain these findings.

Originality/value

This article is the first one to explore age differences in privacy concerns, trust and risk on social media employing conceptual developments and an instrument specifically tailored to the social media environment. Based on the findings, several strategies are suggested to keep privacy concerns on social media at a minimum, reduce risk perceptions and increase users' trust.

Details

Industrial Management & Data Systems, vol. 124 no. 2
Type: Research Article
ISSN: 0263-5577

Keywords

Article
Publication date: 11 December 2023

Thi Huyen Pham, Thuy-Anh Phan, Phuong-Anh Trinh, Xuan Bach Mai and Quynh-Chi Le

This study aims to ascertain the impact of data collecting awareness on perceived information security concerns and information-sharing behavior on social networking sites.

Abstract

Purpose

This study aims to ascertain the impact of data collecting awareness on perceived information security concerns and information-sharing behavior on social networking sites.

Design/methodology/approach

Based on communication privacy management theory, the study forecasted the relationship between information-sharing behavior and awareness of data collecting purposes, data collection tactics and perceived security risk using structural equation modeling analysis and one-way ANOVA. The sample size of 521 young social media users in Vietnam, ages 18 to 34, was made up of 26.7% men and 73.3% women. When constructing the questionnaire survey method with lone source respondents, the individual’s unique awareness and experiences with using online social networks (OSNs) were taken into account.

Findings

The results of the investigation demonstrate a significant relationship between information-sharing and awareness of data collecting, perceptions of information security threats and behavior. Social media users have used OSN privacy settings and paid attention to the sharing restriction because they are concerned about data harvesting.

Research limitations/implications

This study was conducted among young Vietnamese social media users, reflecting specific characteristics prevalent in the Vietnamese environment, and hence may be invalid in other nations’ circumstances.

Practical implications

Social media platform providers should improve user connectivity by implementing transparent privacy policies that allow users to choose how their data are used; have clear privacy statements and specific policies governing the use of social media users’ data that respect users’ consent to use their data; and thoroughly communicate how they collect and use user data while promptly detecting any potential vulnerabilities within their systems.

Originality/value

The authors ascertain that the material presented in this manuscript will not infringe upon any statutory copyright and that the manuscript will not be submitted elsewhere while under Journal of Information, Communication and Ethics in Society review.

Details

Journal of Information, Communication and Ethics in Society, vol. 22 no. 1
Type: Research Article
ISSN: 1477-996X

Keywords

Article
Publication date: 7 November 2023

Guang Zhu, Fengjing Li, Yi Yan and Hustin Guenis

The collection and use of personal medical information for mobile health (mHealth) service raise significant privacy concerns. In this context, this study aims to explore the…

Abstract

Purpose

The collection and use of personal medical information for mobile health (mHealth) service raise significant privacy concerns. In this context, this study aims to explore the privacy paradox and its impact from the perspective of paradox resolution.

Design/methodology/approach

Based on social support theory and privacy calculus theory, this study first studies the effect of social support on perceived benefits, and explores the moderating effect of perceived health status on the privacy trade-off process. Secondly, the study examines the path of “privacy concerns – disclosure intention – disclosure behavior” to verify the existence of the privacy paradox. Following this, based on rational choice theory, the rationality degree is introduced as a moderating variable to investigate both its impact on the central route and the strength of this impact on the privacy paradox.

Findings

Empirical results show that informational support and emotional support influence perceived benefits significantly. Perceived benefits significantly influence privacy concerns, and perceived health status has a significant positive moderating effect. The authors further find that there is a privacy paradox within the mHealth context, and the privacy paradox is moderated negatively by rationality degree. The findings indicate that the impact strength of the privacy paradox will decrease with increases in rationality degree.

Research limitations/implications

The findings indicate that it is crucial to evaluate the privacy paradox and its impact from the perspective of paradox resolution.

Originality/value

This study offers a complete comprehension of the privacy paradox in mHealth and provides several valuable recommendations for enhancing both mHealth services and privacy controls.

Details

Journal of Enterprise Information Management, vol. 37 no. 1
Type: Research Article
ISSN: 1741-0398

Keywords

1 – 10 of over 21000