Search results

1 – 10 of over 16000
Article
Publication date: 9 July 2018

Adéle Da Veiga

This paper aims to propose an information privacy culture index framework (IPCIF) with a validated information privacy culture index instrument (IPCII) to measure information

1342

Abstract

Purpose

This paper aims to propose an information privacy culture index framework (IPCIF) with a validated information privacy culture index instrument (IPCII) to measure information privacy culture across nations. The framework is based on consumers’ privacy expectations, their actual experiences when organisations process their personal information and their general privacy concerns.

Design/methodology/approach

A survey method was deployed to collect data in South Africa – the first participating country in the study – to start building a global information privacy culture index (IPCI) and to validate the questionnaire.

Findings

The IPCI revealed that there seems to be a disconnect between what consumers expect in terms of privacy and the way in which organisations are honouring (or failing to honour) those expectations, which results in a breach of trust and the social contract being violated.

Practical implications

Governments, information regulators and organisations can leverage the results of the privacy culture index to implement corrective actions and controls aimed at addressing the gaps identified from a consumer and compliance perspective. The validated IPCII can be used by both academia and industry to measure the information privacy culture of an institution, organisation or country to identify what to improve to address consumer privacy expectations and concerns.

Originality/value

The IPCIF and validated IPCII are the first tools that combine the concepts of consumer expectations and their confidence levels in whether organisations are meeting their privacy expectations, which are in line with the fair information practice principles and the privacy guidelines of the Organisation for Economic Cooperation and Development, to determine gaps and define improvement plans.

Article
Publication date: 13 July 2023

Anita Katulić

The research aims to establish the predictors of the acceptance of technical and organizational measures for the protection of personal data to ensure information privacy in…

Abstract

Purpose

The research aims to establish the predictors of the acceptance of technical and organizational measures for the protection of personal data to ensure information privacy in Croatian libraries, starting from the constructs of the APCO Macro Model.

Design/methodology/approach

Two data collection methods were used: the online survey questionnaire method and the analysis of the websites of independent libraries in the Republic of Croatia.

Findings

The results show that the acceptance of measures for personal data protection by a library manager is mostly influenced by perceived knowledge, while culture and trust have a positive correlation of moderate strength. Awareness has a low positive correlation, and privacy experience is not statistically related to the acceptance of measures. There is no statistically significant difference in the acceptance of measures for the protection of personal data concerning age and work experience in the profession. There is a statistically significant correlation between compliance with the principle of transparency and the size of the library.

Originality/value

The study is valuable as it examined the characteristics of the culture of information privacy in libraries and determined the existence and impact of factors that influence ensuring the information privacy of users in Croatian libraries.

Article
Publication date: 5 June 2017

Christina Ling-hsing Chang and Jim Q. Chen

The purpose of this paper is to understand the impact of Chinese culture on the information ethics perception gaps between Chinese and American students.

1035

Abstract

Purpose

The purpose of this paper is to understand the impact of Chinese culture on the information ethics perception gaps between Chinese and American students.

Design/methodology/approach

Using a qualitative approach, this study utilizes Kohlberg’s Cognitive Moral Development model and an open-ended questionnaire to measure and analyze the gaps among information ethics perceptions of students from Taiwan, Mainland China, Hong Kong, and the USA, and to assess the extent to which the gaps are influenced by Chinese culture.

Findings

Students’ perceptions of intellectual property, information accuracy, privacy, and accessibility (PAPA) are deeply influenced by national culture. Sub-cultures have significant impact on the perceptions. Political systems, history, and legal environment may also play a role in the differences of PAPA perceptions among the three Chinese societies. The study also revealed that accuracy and intellectual property are the most deficient areas of moral developments in both Chinese and American samples.

Research limitations/implications

The sample sizes from Hong Kong and the USA were relatively small due to resource and time constraints. In addition, the subjects from Hong Kong and the USA were a little bit older than the subjects from Taiwan and Mainland China due to the fact that universities in HK and USA tend to have more non-traditional students than in universities in Mainland China and Taiwan. Second, the questionnaire is a limited means of studying moral reasoning because the results are likely to reflect espoused theory rather than theory-in-use.

Practical implications

The educational implication of this study calls for a renewed approach to educate students on the importance of information ethics for the sake of sustained economic development.

Originality/value

The novelty of this research lies in its interpretation of students’ PAPA perceptions and fresh insights from a Chinese guanxi perspective.

Details

Information Technology & People, vol. 30 no. 2
Type: Research Article
ISSN: 0959-3845

Keywords

Article
Publication date: 24 June 2021

Gajendra Liyanaarachchi, Sameer Deshpande and Scott Weaven

This paper advocates for banks to understand customers' online privacy concerns, use those insights to segment consumers and design tailored sales strategies to build a mutual…

2507

Abstract

Purpose

This paper advocates for banks to understand customers' online privacy concerns, use those insights to segment consumers and design tailored sales strategies to build a mutual relationship through a social exchange that produces a competitive advantage.

Design/methodology/approach

A qualitative study involving 30 in-depth interviews with Australian and Asian millennials residing in Australia was conducted using a grounded theory approach to explore privacy concerns of online banking and determine the efficacy of their banks' existing sales strategy and practice.

Findings

The study revealed differences in customer perceptions of trust, confidence, responsibility and exchange. Adopting a power-dependency paradigm within a social exchange theoretical framework and power distance belief of national culture theory, the authors identified four consumer segments: exemplar, empiric, elevator and exponent. The authors propose a tailored consumer-centered sales strategy of communication, control, consolidation and collaboration.

Originality/value

The paper contributes to the research in services marketing, sales strategy and banking in three ways: first, the authors demonstrate the importance of the social exchange theory and national culture as a premise to develop a competitive advantage; second, the authors propose an innovative set of consumer segments in regards to online privacy concerns; and, third, the authors introduce four sales strategies tailored to each of the four segments.

Details

International Journal of Bank Marketing, vol. 39 no. 6
Type: Research Article
ISSN: 0265-2323

Keywords

Article
Publication date: 1 March 2003

Norhayati Zakaria, Jeffrey M. Stanton and Shreya T.M. Sarkar‐Barney

The Internet, World Wide Web, and related information technologies, originally developed in Western countries, have rapidly spread to a great variety of countries and cultures

4793

Abstract

The Internet, World Wide Web, and related information technologies, originally developed in Western countries, have rapidly spread to a great variety of countries and cultures. Many of these technologies facilitate and mediate interpersonal communication, an activity whose modes and means bind closely to cultural values. This article provides a theoretical integration of a framework for culture values together with a model for understanding privacy and related issues that arise when personal information is shared or exchanged using information technology. The resulting hybrid framework can help understand and predict individuals’ culturally linked reactions to various communication‐related IT applications (e.g. e‐mail, e‐commerce sites, Web‐logs, bulletin boards, newsgroups) in diverse cultural contexts. An application of the framework to cultural settings in Middle Eastern nations concludes the article.

Details

Information Technology & People, vol. 16 no. 1
Type: Research Article
ISSN: 0959-3845

Keywords

Article
Publication date: 4 November 2019

Peter Bates and Brendan McLoughlin

In care homes concerns about abuse have established a culture where all information pertaining to a person must be shared, and little attention is paid to privacy in its broader…

Abstract

Purpose

In care homes concerns about abuse have established a culture where all information pertaining to a person must be shared, and little attention is paid to privacy in its broader sense. The purpose of this paper is to take a human rights perspective and consider how information governance may impact on the health, well-being and quality of life of residents. It proposes a proactive approach and presents a template for a privacy impact assessment which services could use to improve their approach to privacy, protecting the human rights of those in their care, contributing to their independence and improving outcomes.

Design/methodology/approach

A review of historical and current thinking about the value of privacy in human services and wider society leads to a series of challenges to the way in which privacy is upheld in residential care services.

Findings

Recent preoccupations with data privacy have led to a myopic neglect of broader considerations of privacy. Whilst it continues to be important to protect the confidentiality of personal data and to ensure that residents are protected from abuse, human services that provide 24 hour care in congregated settings must not neglect broader components of privacy.

Research limitations/implications

Privacy impact assessments have been widely used to check whether data privacy is being upheld. The broader concept that might be termed “Big Privacy” is introduced within which data privacy is but one section. It is suggested that big privacy is severely compromised in residential care settings, thus denying residents their human right to privacy. The extent of such violation of rights should be investigated.

Practical implications

Having set out the potential reach of the human right to privacy, important work needs to be done to find out how privacy might be upheld in the real world of congregate residential care. Some service providers may have solutions to the organisational challenges, have addressed staff training needs and revised risk assessment strategies so that privacy is upheld alongside other rights.

Social implications

Nearly half a million people live in congregate residential care settings in England, and deprivation of privacy is argued to be a significant deprivation of human rights. Occasional tragedies and scandals in congregate settings create pressure for increasing the level of surveillance, and the right to privacy is sacrificed. This paper offers a challenge to this process, arguing that competing rights need to be balanced and privacy is an essential component of a decent quality of life.

Originality/value

Personal growth and development depends to some extent on choice and control over access to privacy. Recent changes in the law regarding data protection have narrowed our thinking about privacy until it is a small concept, largely concerned with data handling. This paper invites consideration of big privacy, and invites congregate residential care settings to consider how a deep and broad definition of privacy could transform these services.

Details

The Journal of Adult Protection, vol. 21 no. 6
Type: Research Article
ISSN: 1466-8203

Keywords

Article
Publication date: 9 October 2017

Abubakar Garba Bello, David Murray and Jocelyn Armarego

This paper’s purpose is to provide a current best practice approach that can be used to identify and manage bring your own device (BYOD) security and privacy risks faced by…

1551

Abstract

Purpose

This paper’s purpose is to provide a current best practice approach that can be used to identify and manage bring your own device (BYOD) security and privacy risks faced by organisations that use mobile devices as part of their business strategy. While BYOD deployment can provide work flexibility, boost employees’ productivity and be cost cutting for organisations, there are also many information security and privacy issues, with some widely recognised, and others less understood. This paper focuses on BYOD adoption, and its associated risks and mitigation strategies, investigating how both information security and privacy can be effectively achieved in BYOD environments.

Design/methodology/approach

This research paper used a qualitative research methodology, applying the case study approach to understand both organisational and employee views, thoughts, opinions and actions in BYOD environments.

Findings

This paper identifies and understands BYOD risks, threats and influences, and determines effective controls and procedures for managing organisational and personal information resources in BYOD.

Research limitations/implications

The scope of this paper is limited to the inquiry and findings from organisations operating in Australia. This paper also suggests key implications that lie within the ability of organisations to adequately develop and deploy successful BYOD management and practices.

Originality/value

This paper expands previous research investigating BYOD practices, and also provides a current best practice approach that can be used by organisations to systematically investigate and understand how to manage security and privacy risks in BYOD environments.

Details

Information & Computer Security, vol. 25 no. 4
Type: Research Article
ISSN: 2056-4961

Keywords

Article
Publication date: 9 March 2015

Ameneh Malmir and Mohammad Malmir

– One of the main manifestations of the application of modern information and communication technologies which is considered by governments is the concept of e-government.

496

Abstract

Purpose

One of the main manifestations of the application of modern information and communication technologies which is considered by governments is the concept of e-government.

Design/methodology/approach

Developing economic and social interactions requires the government to interfere in people’s private affairs; the issues that were formerly part of the private rights of citizens are now influenced by public rights and actions resulted by the government’s regulation.

Findings

To provide their individual freedom and welfare, human beings consider it necessary to respect the privacy of each other; they do not want to be watched over or their personal information and secrets to be revealed.

Originality/value

Many international laws have been legislated in this regard to respect individuals’ privacy and prohibit natural and legal persons from accessing the information; this must be observed by governments, too.

Details

International Journal of Law and Management, vol. 57 no. 2
Type: Research Article
ISSN: 1754-243X

Keywords

Article
Publication date: 28 August 2019

Adéle Da Veiga, Ruthea Vorster, Fudong Li, Nathan Clarke and Steven M. Furnell

The purpose of this study was to investigate the difference between South Africa (SA) and the United Kingdom (UK) in terms of data protection compliance with the aim to establish…

Abstract

Purpose

The purpose of this study was to investigate the difference between South Africa (SA) and the United Kingdom (UK) in terms of data protection compliance with the aim to establish if a country that has had data protection in place for a longer period of time has a higher level of compliance with data protection requirements in comparison with a country that is preparing for compliance.

Design/methodology/approach

An insurance industry multi-case study within the online insurance services environment was conducted. Personal information of four newly created consumer profiles was deposited to 10 random insurance organisation websites in each country to evaluate a number of data privacy requirements of the Data Protection Act and Protection of Personal Information Act.

Findings

The results demonstrate that not all the insurance organisations honored the selected opt-out preference for receiving direct marketing material. This was evident in direct marketing material that was sent from the insurance organisations in the sample to both the SA and UK consumer profiles who opted out for it. A total of 42 unsolicited third-party contacts were received by the SA consumer profiles, whereas the UK consumer profiles did not receive any third-party direct marketing. It was also found that the minimality principle is not always met by both SA and UK organisations.

Research limitations/implications

As a jurisdiction with a heavy stance towards privacy implementation and regulation, it was found that the UK is more compliant than SA in terms of implementation of the evaluated data protection requirements included in the scope of this study, however not fully compliant.

Originality/value

Based upon the results obtained from this research, it suggests that the SA insurance organisations should ensure that the non-compliance aspects relating to direct marketing and sharing data with third parties are addressed. SA insurance companies should learn from the manner in which the UK insurance organisations implement these privacy requirements. Furthermore, the UK insurance organisations should focus on improved compliance for direct marking and the minimality principle. The study indicates the positive role that data protection legislation plays in a county like the UK, with a more mature stance toward compliance with data protection legislation.

Article
Publication date: 14 October 2013

Janice C. Sipior, Burke T. Ward and Regina Connolly

The purpose of this paper is to revisit the internet users’ information privacy concerns (IUIPC) construct, a research model, and hypotheses based on Malhotra et al. (2004) to…

1020

Abstract

Purpose

The purpose of this paper is to revisit the internet users’ information privacy concerns (IUIPC) construct, a research model, and hypotheses based on Malhotra et al. (2004) to assess the continued applicability of this construct. The relationship among privacy concerns, trusting beliefs, and risk beliefs continues to be unclear. Empirical evidence about the impact of privacy concerns on behavior is mixed.

Design/methodology/approach

A paper-based questionnaire was distributed and collected from 63 part-time graduate students of a private university in the mid-Atlantic USA. These respondents have an average of six years of full-time professional work experience and the vast majority (88.9 percent) has over seven years of experience on the internet. Questionnaire items measured the constructs of the IUIPC instrument. All measurement scales were validated using factor analysis, Cronbach's α, and reliability analysis. For hypothesis testing, multiple regression analysis was used.

Findings

The results partially support those of Malhotra et al. (2004). Consistent are the findings that the higher the trust a consumer holds for an online company, the less likely that consumer is to view providing personal information as risky. Also consistent is that the higher the trust a consumer holds for an online company, the more likely is that consumer to intend to provide personal information online. Finally, the greater risk a consumer has for providing personal information, the less willing that consumer is to reveal such information online. However, the results did not support a negative relationship between the IUIPC construct and consumer trust in an online company or a positive relationship between IUIPC and consumer risk in providing personal information to an online company. The paper concludes that the IUIPC is not the valid scale to employ in measuring information privacy concerns.

Research limitations/implications

The main limitation of the findings is the use of a small convenience sample, limiting the insights into interrelationships between various dimensions of privacy concerns and the generalizability of the results.

Practical implications

The results may provide guidance to online retailers in addressing the dimensions of privacy concerns related to trusting beliefs and risk beliefs.

Originality/value

IUIPC were measured using the IUIPC instrument. This responds to Malhotra et al.'s (2004) call to use the IUIPC scale and the associated research framework to further investigate consumer privacy concerns and the suggestion by Belanger and Crossler (2011) that more studies should explore this scale. Further, both Westin (1967), and Smith et al. (1996) recognize that privacy attitudes and concerns may change over time, providing motivation to revisit IUIPC.

Details

Journal of Enterprise Information Management, vol. 26 no. 6
Type: Research Article
ISSN: 1741-0398

Keywords

1 – 10 of over 16000