Search results

1 – 10 of over 28000
Article
Publication date: 9 April 2024

Jaeyoung Park, Woosik Shin, Beomsoo Kim and Miyea Kim

This study aims to explore the spillover effects of data breaches from a consumer perspective in the e-commerce context. Specifically, we investigate how an online retailer’s data…

Abstract

Purpose

This study aims to explore the spillover effects of data breaches from a consumer perspective in the e-commerce context. Specifically, we investigate how an online retailer’s data breach affects consumers’ privacy risk perceptions of competing firms, and further how it affects shopping intention for the competitors. We also examine how the privacy risk contagion effect varies depending on the characteristics of competitors and their competitive responses.

Design/methodology/approach

We conducted two scenario-based experiments with surveys. To assess the spillover effects and the moderating effects, we employed an analysis of covariance. We also performed bootstrapping-based mediation analyses using the PROCESS macro.

Findings

We find evidence for the privacy risk contagion effect and demonstrate that it negatively influences consumers’ shopping intention for a competing firm. We also find that a competitor’s cybersecurity message is effective in avoiding the privacy risk contagion effect and the competitor even benefits from it.

Originality/value

While previous studies have examined the impacts of data breaches on customer perceptions of the breached firm, our study focuses on customer perceptions of the non-breached firms. To the best of the authors’ knowledge, this study is one of the first to provide empirical evidence for the negative spillover effects of a data breach from a consumer perspective. More importantly, this study empirically demonstrates that the non-breached competitor’s competitive response is effective in preventing unintended negative spillover in the context of the data breach.

Details

Internet Research, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1066-2243

Keywords

Article
Publication date: 8 April 2024

Princely Ifinedo, Francine Vachon and Anteneh Ayanso

This paper aims to increase understanding of pertinent exogenous and endogenous antecedents that can reduce data privacy breaches.

Abstract

Purpose

This paper aims to increase understanding of pertinent exogenous and endogenous antecedents that can reduce data privacy breaches.

Design/methodology/approach

A cross-sectional survey was used to source participants' perceptions of relevant exogenous and endogenous antecedents developed from the Antecedents-Privacy Concerns-Outcomes (APCO) model and Social Cognitive Theory. A research model was proposed and tested with empirical data collected from 213 participants based in Canada.

Findings

The exogenous factors of external privacy training and external privacy self-assessment tool significantly and positively impact the study's endogenous factors of individual privacy awareness, organizational resources allocated to privacy concerns, and group behavior concerning privacy laws. Further, the proximal determinants of data privacy breaches (dependent construct) are negatively influenced by individual privacy awareness, group behavior related to privacy laws, and organizational resources allocated to privacy concerns. The endogenous factors fully mediated the relationships between the exogenous factors and the dependent construct.

Research limitations/implications

This study contributes to the budding data privacy breach literature by highlighting the impacts of personal and environmental factors in the discourse.

Practical implications

The results offer management insights on mitigating data privacy breach incidents arising from employees' actions. Roles of external privacy training and privacy self-assessment tools are signified.

Originality/value

Antecedents of data privacy breaches have been underexplored. This paper is among the first to elucidate the roles of select exogenous and endogenous antecedents encompassing personal and environmental imperatives on data privacy breaches.

Article
Publication date: 18 April 2024

Kristen L. Walker and George R. Milne

The authors argue that privacy is integral to the well-being of consumers and an essential component in not only corporate social responsibility (CSR) but what they term uniquely…

Abstract

Purpose

The authors argue that privacy is integral to the well-being of consumers and an essential component in not only corporate social responsibility (CSR) but what they term uniquely as social media responsibility (SMR). A conceptual framework is proposed that delineates the privacy issues companies should pay attention to in artificial intelligence (AI)-fueled social media environments.

Design/methodology/approach

The authors review literature on privacy issues in social media and AI in the academic and practitioner literatures. Based on the review, arguments focus on the need for an SMR framework, proposing responsible use of consumer data that is attentive to consumers' privacy concerns.

Findings

Implications from the framework are a path forward for social media companies to treat consumer data more fairly in this new environment. The framework has implications for companies to reduce potential harms to consumers and consider addressing their power and responsibility. With social media and AI transforming consumer behavior so profoundly, there are a variety of short- and long-term social implications.

Originality

Since AI tools are becoming integral to social media company activities, this research addresses the changing responsibilities social media companies have in securing consumers' data and enabling consumers the agency to protect their privacy effectively. The authors propose an SMR framework based on CSR research and AI tools employed by social media companies.

Details

Journal of Research in Interactive Marketing, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2040-7122

Keywords

Open Access
Article
Publication date: 1 April 2024

Basmah Almekhled and Helen Petrie

This study investigated the attitudes and concerns of Saudi higher educational institution (HEI) academics about privacy and security in online teaching during the COVID-19…

Abstract

Purpose

This study investigated the attitudes and concerns of Saudi higher educational institution (HEI) academics about privacy and security in online teaching during the COVID-19 pandemic.

Design/methodology/approach

Online Questionnaire questionnaire was designed to explore Saudi HEI academic’s attitudes and concerns about privacy and security issues in online teaching. The questionnaire asked about attitudes and concerns held before the pandemic and since the pandemic. The questionnaire included four sections. At the beginning of the questionnaire, participants were asked what the phrase “online privacy and security” meant to them, to gain an initial understanding of what it meant to academics. A definition for what we intended for the survey was then provided: “that a person’s data, including their identity, is not accessible to anyone other than themselves and others whom they have authorised and that their computing devices work properly and are free from unauthorised interference” (based on my reading of a range of sources, e.g. Schatz et al., 2017; Steinberg, 2019; NCS; Windley, 2005). This was to ensure that participants did understand what I was asking about in subsequent sections.

Findings

This study investigated the attitudes and concerns of Saudi HEI academics about privacy and security in online teaching during the COVID-19 pandemic. The findings provide several key insights: Key aspects of online privacy and security for Saudi HEI academics: Saudi HEI academic’s notion of online privacy and security is about the protection of personal data, preventing unauthorized access to data and ensuring the confidentiality and integrity of data. This underscores the significance of robust measures to safeguard sensitive information in online teaching, but also the need to make academics aware of the other aspects of online privacy and security. Potential to improve policies and training about online privacy and security in Saudi HEIs: Although many participants were aware of the online privacy and security policies of their HEI, only a small percentage had received training in this area. Thus, there is a need to improve the development and dissemination of policies and to provide academics with appropriate training in this area and encourage them to take available training. Use of videoconferencing and chat technologies and cultural sensitivities: The study highlighted moderate levels of concern among Saudi HEI academics regarding the use of videoconferencing and online chat technologies, and their concerns about cultural factors around the use of these technologies. This emphasizes the need for online teaching and the growing use of technologies in such teaching to respect cultural norms and preferences, highlighting the importance of fostering a culturally sensitive approach to technology deployment and use. Surprising low webcam use: An unexpected finding is the low use of webcams by both academics and students during online teaching sessions, prompting a need for a deeper understanding of the dynamics surrounding webcam engagement in such sessions. This calls for a reevaluation of the effectiveness of webcam use in the teaching process and underscores the importance of exploring methods for enhancing engagement and interaction in online teaching. In summary, this paper investigated the attitudes and concerns about privacy and security in the online teaching of Saudi HEI academics during the coronavirus pandemic. The study reveals areas where further research and policy development can enhance the online teaching experience. As the education landscape continues to evolve, institutions must remain proactive in addressing the concerns of their academics while fostering a culturally sensitive approach to technology deployment.

Research limitations/implications

One limitation of this study is the relatively small qualitative data sample, despite the adequate size of the sample including 36 academics from various Saudi Arabian HEIs for quantitative analysis. It was necessary to make the most of the open-ended questions optional – participants did not have to answer about concerns if they did not want to, as we did not want to make the questionnaire too long and onerous to complete. Consequently, the number of academics responding to the open-ended questions was limited, emphasizing the need for additional data and alternative research methods to further these issues. The study was focused on investigating the concerns of HEI Saudi academics, recognizing that the attitudes and concerns of academics in other countries may differ. Furthermore, the research also includes an exploration of the changes in academic attitudes and concerns before and since the COVID-19 pandemic, which will be the subject of further data analysis.

Originality/value

This research delves into Saudi HEI academics' perceptions and concerns regarding privacy and security in online education during the COVID-19 Pandemic. Notably, it highlights the moderate priority placed on online privacy and security, the unexpectedly low usage of webcams and the potential for enhancing policies and training. The study emphasizes the necessity for comprehensive measures to protect sensitive data and the importance of tailored policies for educators. It also underscores the need for a more nuanced understanding of webcam usage dynamics, offering valuable insights for institutions aiming to improve online education and address educators' concerns amidst evolving educational landscapes.

Article
Publication date: 26 March 2024

Dilek Şahin, Mehmet Nurullah Kurutkan and Tuba Arslan

Today, e-government (electronic government) applications have extended to the frontiers of health-care delivery. E-Nabız contains personal health records of health services…

Abstract

Purpose

Today, e-government (electronic government) applications have extended to the frontiers of health-care delivery. E-Nabız contains personal health records of health services received, whether public or private. The use of the application by patients and physicians has provided efficiency and cost advantages. The success of e-Nabız depends on the level of technology acceptance of health-care service providers and recipients. While there is a large research literature on the technology acceptance of service recipients in health-care services, there is a limited number of studies on physicians providing services. This study aims to determine the level of influence of trust and privacy variables in addition to performance expectancy, effort expectancy, social influence and facilitating factors in the unified theory of acceptance and use of technology (UTAUT) model on the intention and behavior of using e-Nabız application.

Design/methodology/approach

The population of the study consisted of general practitioners and specialist physicians actively working in any health facility in Turkey. Data were collected cross-sectionally from 236 physicians on a voluntary basis through a questionnaire. The response rate of data collection was calculated as 47.20%. Data were collected cross-sectionally from 236 physicians through a questionnaire. Descriptive statistics, correlation analysis and structural equation modeling were used to analyze the data.

Findings

The study found that performance expectancy, effort expectancy, trust and perceived privacy had a significant effect on physicians’ behavioral intentions to adopt the e-Nabız system. In addition, facilitating conditions and behavioral intention were determinants of usage behavior (p < 0.05). However, no significant relationship was found between social influence and behavioral intention (p > 0.05).

Originality/value

This study confirms that the UTAUT model provides an appropriate framework for predicting factors influencing physicians’ behaviors and intention to use e-Nabız. In addition, the empirical findings show that trust and perceived privacy, which are additionally considered in the model, are also influential.

Details

Journal of Science and Technology Policy Management, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2053-4620

Keywords

Article
Publication date: 10 July 2009

Chen Jianping and Yang Zhongwei

The purpose of this paper is to examine the extent to which financial privacy is present and necessary in dealings between banks and clients in China.

475

Abstract

Purpose

The purpose of this paper is to examine the extent to which financial privacy is present and necessary in dealings between banks and clients in China.

Design/methodology/approach

This paper provides a comparative study drawing, in particular, on developments in the USA.

Findings

It is a trend in legislation in the western developed countries that the right to privacy is taken seriously and private information in the financial activities is protected by law. The legislation in the USA is typically systematic and complete. The fact that financial privacy protection is sparsely stipulated in finance or administrative laws but the protection of privacy has yet not been systematically written into law in China so far, which is inconsistent with the current situations of the financial industry. China should deal with the relationship between banks and clients, administrative power and personal rights, judicial interpretation and legislation from the aspect of financial practice, so as to set up the legal system to protect financial privacy by learning from the legislation in the USA based on the national conditions.

Originality/value

The paper provides a systematic view of the value of financial privacy in the modern world, with recommendations for reform in China.

Details

International Journal of Law and Management, vol. 51 no. 4
Type: Research Article
ISSN: 1754-243X

Keywords

Article
Publication date: 21 March 2008

Vasilios Katos and Ahmed Patel

This paper aims to propose a tool to help policy makers understand the dynamic relationships between security and privacy on a strategic (macro) level.

1497

Abstract

Purpose

This paper aims to propose a tool to help policy makers understand the dynamic relationships between security and privacy on a strategic (macro) level.

Design/methodology/approach

The methodology is ported from the discipline of Macroeconomics, and applied to the information security and privacy domain. The methodology adopted is the so‐called “cross methodology” which claims ownership of the well‐known supply/demand market equilibrium exercise.

Findings

Early evaluation reveals that this is a potentially very effective tool in understanding societal behaviour and position towards information security and privacy and therefore makes this a suitable tool for investigating and exploring scenarios that can assist in policy making.

Originality/value

Up to date, research on the economics of security and privacy has been primarily focusing on a micro level. The main contribution of this paper is a methodology for investigating privacy and security on a macro level. We believe that our approach in undertaking this research is new and looking at the issues and relationships between security and privacy at a macro level, gives a better understanding of the problems at hand and how to resolve them.

Practical implications

The proposed tool may increase the efficiency of policy making and planning as it enables the policy makers on a governmental and strategic level to run scenarios in order to investigate the effect of their decisions (for example, an introduction of a stricter law relating to computer misuse) to the delicate balance of security and privacy.

Details

Information Management & Computer Security, vol. 16 no. 1
Type: Research Article
ISSN: 0968-5227

Keywords

Article
Publication date: 27 March 2024

Haroon Iqbal Maseeh, Charles Jebarajakirthy, Achchuthan Sivapalan, Mitchell Ross and Mehak Rehman

Smartphone apps collect users' personal information, which triggers privacy concerns for app users. Consequently, app users restrict apps from accessing their personal…

74

Abstract

Purpose

Smartphone apps collect users' personal information, which triggers privacy concerns for app users. Consequently, app users restrict apps from accessing their personal information. This may impact the effectiveness of in-app advertising. However, research has not yet demonstrated what factors impact app users' decisions to use apps with restricted permissions. This study is aimed to bridge this gap.

Design/methodology/approach

Using a quantitative research method, the authors collected the data from 384 app users via a structured questionnaire. The data were analysed using AMOS and fuzzy-set qualitative comparative analysis (fsQCA).

Findings

The findings suggest privacy concerns and risks have a significant positive effect on app usage with restricted permissions, whilst reputation, trust and perceived benefits have significant negative impact on it. Some app-related factors, such as the number of apps installed and type of apps, also impact app usage with restricted permissions.

Practical implications

Based on the findings, the authors provided several implications for app stores, app developers and app marketers.

Originality/value

This study examines the factors that influence smartphone users' decisions to use apps with restricted permission requests. By doing this, the authors' study contributes to the consumer behaviour literature in the context of smartphone app usage. Also, by explaining the underlying mechanisms through which the principles of communication privacy management theory operate in smartphone app context, the authors' research contributes to the communication privacy management theory.

Details

Information Technology & People, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0959-3845

Keywords

Article
Publication date: 21 March 2024

Zhaobin Meng, Yueheng Lu and Hongyue Duan

The purpose of this paper is to study the following two issues regarding blockchain crowdsourcing. First, to design smart contracts with lower consumption to meet the needs of…

Abstract

Purpose

The purpose of this paper is to study the following two issues regarding blockchain crowdsourcing. First, to design smart contracts with lower consumption to meet the needs of blockchain crowdsourcing services and also need to design better interaction modes to further reduce the cost of blockchain crowdsourcing services. Second, to design an effective privacy protection mechanism to protect user privacy while still providing high-quality crowdsourcing services for location-sensitive multiskilled mobile space crowdsourcing scenarios and blockchain exposure issues.

Design/methodology/approach

This paper proposes a blockchain-based privacy-preserving crowdsourcing model for multiskill mobile spaces. The model in this paper uses the zero-knowledge proof method to make the requester believe that the user is within a certain location without the user providing specific location information, thereby protecting the user’s location information and other privacy. In addition, through off-chain calculation and on-chain verification methods, gas consumption is also optimized.

Findings

This study deployed the model on Ethereum for testing. This study found that the privacy protection is feasible and the gas optimization is obvious.

Originality/value

This study designed a mobile space crowdsourcing based on a zero-knowledge proof privacy protection mechanism and optimized gas consumption.

Details

International Journal of Web Information Systems, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1744-0084

Keywords

Article
Publication date: 1 August 1999

Beth Simone Noveck

Looks at an attempt by a Hong Kong legislator to find out the Chinese Government’s information on her prior to their privacy law. Concludes the unwillingness of governments and…

250

Abstract

Looks at an attempt by a Hong Kong legislator to find out the Chinese Government’s information on her prior to their privacy law. Concludes the unwillingness of governments and courts to enforce basic privacy principles of international law and own national legislation, does not bode well for data privacy acts, with regard to the cots of human privacy and security.

Details

info, vol. 1 no. 4
Type: Research Article
ISSN: 1463-6697

Keywords

1 – 10 of over 28000