Search results
1 – 10 of over 11000Don Heath, Ali Ardestani and Hamid Nemati
Human genomic research (HGR) demands very large pools of data to generate meaningful inference. Yet, the sharing of one’s genetic data for research is a voluntary act. The…
Abstract
Purpose
Human genomic research (HGR) demands very large pools of data to generate meaningful inference. Yet, the sharing of one’s genetic data for research is a voluntary act. The collection of data sufficient to fuel rapid advancement is contingent on individuals’ willingness to share. Privacy risks associated with sharing this unique and intensely personal data are significant. Genetic data are an unambiguous identifier. Public linkage of donor to their genetic data could reveal predisposition to diseases, behaviors, paternity, heredity, intelligence, etc. The purpose of this paper is to understand individuals’ willingness to volunteer their private information in this high-risk/high-reward context.
Design/methodology/approach
The authors collect survey data from 273 respondents and use structural equation modeling techniques to analyze responses.
Findings
The authors find statistical support for our theorization. They find that while heightened awareness of the benefits and risks of sharing correlates with increased privacy concerns, the net impact is an increase in intention to share.
Social implications
The findings suggest that prescriptive awareness might be an effective tool with which policy-makers can gain the sufficient voluntary participation from individuals necessary to drive large-scale medical research.
Originality/value
This study contributes a theoretically and empirically informed model which demonstrates the impact of awareness and privacy concern on individuals’ willingness to share their genetic data for large-scale HGR. It helps inform a rising class of data sufficiency problems related to large-scale medical research.
Details
Keywords
Princely Ifinedo, Francine Vachon and Anteneh Ayanso
This paper aims to increase understanding of pertinent exogenous and endogenous antecedents that can reduce data privacy breaches.
Abstract
Purpose
This paper aims to increase understanding of pertinent exogenous and endogenous antecedents that can reduce data privacy breaches.
Design/methodology/approach
A cross-sectional survey was used to source participants' perceptions of relevant exogenous and endogenous antecedents developed from the Antecedents-Privacy Concerns-Outcomes (APCO) model and Social Cognitive Theory. A research model was proposed and tested with empirical data collected from 213 participants based in Canada.
Findings
The exogenous factors of external privacy training and external privacy self-assessment tool significantly and positively impact the study's endogenous factors of individual privacy awareness, organizational resources allocated to privacy concerns, and group behavior concerning privacy laws. Further, the proximal determinants of data privacy breaches (dependent construct) are negatively influenced by individual privacy awareness, group behavior related to privacy laws, and organizational resources allocated to privacy concerns. The endogenous factors fully mediated the relationships between the exogenous factors and the dependent construct.
Research limitations/implications
This study contributes to the budding data privacy breach literature by highlighting the impacts of personal and environmental factors in the discourse.
Practical implications
The results offer management insights on mitigating data privacy breach incidents arising from employees' actions. Roles of external privacy training and privacy self-assessment tools are signified.
Originality/value
Antecedents of data privacy breaches have been underexplored. This paper is among the first to elucidate the roles of select exogenous and endogenous antecedents encompassing personal and environmental imperatives on data privacy breaches.
Details
Keywords
This study aims to analyze and synthesize literature on consumer privacy-related behavior and intelligent device-to-device interactions within the Internet of Things (IoT).
Abstract
Purpose
This study aims to analyze and synthesize literature on consumer privacy-related behavior and intelligent device-to-device interactions within the Internet of Things (IoT).
Design/methodology/approach
We conducted a systematic review using Elsevier’s Scopus database, focusing on studies published in English from 2000 to 2023. The review targeted articles within selected social sciences and business disciplines, specifically concerning consumer behavior in IoT contexts.
Findings
We categorized the privacy literature into three thematic clusters: legislation and policy, business implications and consumer behavior. Within the consumer behavior cluster, our analysis indicates a shift from general Internet and e-commerce privacy concerns prior to 2016, toward issues related to advertising and policy between 2017 and 2018, and increasingly toward pronounced concerns in technological systems, particularly IoT, from 2019 onwards. We identify eight distinct areas of privacy concern within IoT and propose a framework that links antecedents and privacy concerns to subsequent attitudes and behaviors. This framework highlights varying patterns of information disclosure and bridges theoretical constructs with empirical research in IoT privacy.
Originality/value
Originality lies in enhancing the Antecedents-Privacy Concerns-Outcomes (APCO) macro-model by integrating diverse theoretical perspectives on technological and individual-specific antecedents, alongside privacy concerns and beliefs. This comprehensive integration enriches the framework, enabling it to predict and categorize consumer behavior in IoT environments more effectively. The revised model provides a robust tool for understanding privacy-related behavior within the IoT, significantly enriching its theoretical relevance and practical applicability.
Details
Keywords
Christine Prince, Nessrine Omrani and Francesco Schiavone
Research on online user privacy shows that empirical evidence on how privacy literacy relates to users' information privacy empowerment is missing. To fill this gap, this paper…
Abstract
Purpose
Research on online user privacy shows that empirical evidence on how privacy literacy relates to users' information privacy empowerment is missing. To fill this gap, this paper investigated the respective influence of two primary dimensions of online privacy literacy – namely declarative and procedural knowledge – on online users' information privacy empowerment.
Design/methodology/approach
An empirical analysis is conducted using a dataset collected in Europe. This survey was conducted in 2019 among 27,524 representative respondents of the European population.
Findings
The main results show that users' procedural knowledge is positively linked to users' privacy empowerment. The relationship between users' declarative knowledge and users' privacy empowerment is partially supported. While greater awareness about firms and organizations practices in terms of data collections and further uses conditions was found to be significantly associated with increased users' privacy empowerment, unpredictably, results revealed that the awareness about the GDPR and user’s privacy empowerment are negatively associated. The empirical findings reveal also that greater online privacy literacy is associated with heightened users' information privacy empowerment.
Originality/value
While few advanced studies made systematic efforts to measure changes occurred on websites since the GDPR enforcement, it remains unclear, however, how individuals perceive, understand and apply the GDPR rights/guarantees and their likelihood to strengthen users' information privacy control. Therefore, this paper contributes empirically to understanding how online users' privacy literacy shaped by both users' declarative and procedural knowledge is likely to affect users' information privacy empowerment. The study empirically investigates the effectiveness of the GDPR in raising users' information privacy empowerment from user-based perspective. Results stress the importance of greater transparency of data tracking and processing decisions made by online businesses and services to strengthen users' control over information privacy. Study findings also put emphasis on the crucial need for more educational efforts to raise users' awareness about the GDPR rights/guarantees related to data protection. Empirical findings also show that users who are more likely to adopt self-protective approaches to reinforce personal data privacy are more likely to perceive greater control over personal data. A broad implication of this finding for practitioners and E-businesses stresses the need for empowering users with adequate privacy protection tools to ensure more confidential transactions.
Details
Keywords
Mustafa Saritepeci, Hatice Yildiz Durak, Gül Özüdoğru and Nilüfer Atman Uslu
Online privacy pertains to an individual’s capacity to regulate and oversee the gathering and distribution of online information. Conversely, online privacy concern (OPC) pertains…
Abstract
Purpose
Online privacy pertains to an individual’s capacity to regulate and oversee the gathering and distribution of online information. Conversely, online privacy concern (OPC) pertains to the protection of personal information, along with the worries or convictions concerning potential risks and unfavorable outcomes associated with its collection, utilization and distribution. With a holistic approach to these relationships, this study aims to model the relationships between digital literacy (DL), digital data security awareness (DDSA) and OPC and how these relationships vary by gender.
Design/methodology/approach
The participants of this study are 2,835 university students. Data collection tools in the study consist of personal information form and three different scales. Partial least squares (PLS), structural equation modeling (SEM) and multi-group analysis (MGA) were used to test the framework determined in the context of the research purpose and to validate the proposed hypotheses.
Findings
DL has a direct and positive effect on digital data security awareness (DDSA), and DDSA has a positive effect on OPC. According to the MGA results, the hypothesis put forward in both male and female sub-samples was supported. The effect of DDSA on OPC is higher for males.
Originality/value
This study highlights the positive role of DL and perception of data security on OPC. In addition, MGA findings by gender reveal some differences between men and women.
Peer review
The peer review history for this article is available at: https://publons.com/publon/10.1108/OIR-03-2023-0122
Details
Keywords
This paper aims to investigate behavioural changes related to self-censorship (SC) in social networking sites (SNSs) as new methods of online surveillance are introduced. In…
Abstract
Purpose
This paper aims to investigate behavioural changes related to self-censorship (SC) in social networking sites (SNSs) as new methods of online surveillance are introduced. In particular, it examines the relationships between SC and four related factors: privacy concerns (PC), privacy awareness (PA), perceived vulnerability (PV) and information management (IM).
Design/methodology/approach
A national wide survey was conducted in the UK (N = 519). The data were analysed to present both descriptive and inferential statistical findings.
Findings
The level of online SC increases as the level of privacy concern increases. The level of privacy concern increases as the levels of PA and PV increase and the level of effective IM decreases.
Originality/value
This study extends the literature on online SC, showing that PCs increase the level of SC in SNSs. It provides support for three antecedent factors to PC which impact upon levels of SC when communicating in SNSs.
Details
Keywords
Recently, the spread of malicious IT has been causing serious privacy threats to mobile device users, which hampers the efficient use of mobile devices for individual and…
Abstract
Purpose
Recently, the spread of malicious IT has been causing serious privacy threats to mobile device users, which hampers the efficient use of mobile devices for individual and business. To understand the privacy security assurance behavior of mobile device users, this study aims to develop a theoretical model based on technology threat avoidance theory (TTAT), to capture motivation factors in predicting mobile device user’s voluntary adoption of security defensive software.
Design/methodology/approach
A survey is conducted to validate the proposed research model. A total of 284 valid survey data are collected and partial least square (PLS)-based structural equation modeling is used to test the model.
Findings
Results highlight that both privacy concern and coping appraisal have a significant impact on the intention to adopt the security defensive software. Meanwhile, privacy security awareness is a crucial determinant to stimulate mobile device user’s threat and coping appraisal processes in the voluntary context. The results indicate that emotional-based coping appraisal of anticipated regret is also imperative to arouse personal intention to adopt the security tool.
Practical implications
This result should be of interest to practitioners. Information security awareness training and education programs should be developed in a variety of forms to intensify personal security knowledge and skills. Besides, emotion-based warnings can be designed to arouse users’ protection behavior.
Originality/value
This paper embeds TTAT theory within the mobile security context. The authors extent TTAT by taking anticipated regret into consideration to capture emotional-based coping appraisal, and information security awareness is employed as the antecedent factor. The extent offers a useful starting point for the further empirical study of emotion elements in the information security context.
Details
Keywords
Bradley J. Alge, Jerald Greenberg and Chad T. Brinsfield
We present a model of organizational monitoring that integrates organizational justice and information privacy. Specifically, we adopt the position that the formation of…
Abstract
We present a model of organizational monitoring that integrates organizational justice and information privacy. Specifically, we adopt the position that the formation of invasiveness and unfairness attitudes is a goal-driven process. We employ cybernetic control theory and identity theory to describe how monitoring systems affect one's ability to maintain a positive self-concept. Monitoring provides a particularly powerful cue that directs attention to self-awareness. People draw on fairness and privacy relevant cues inherent in monitoring systems and embedded in monitoring environments (e.g., justice climate) to evaluate their identities. Discrepancies between actual and desired personal and social identities create distress, motivating employees to engage in behavioral self-regulation to counteract potentially threatening monitoring systems. Organizational threats to personal identity goals lead to increased invasiveness attitudes and a commitment to protect and enhance the self. Threats to social identity lead to increased unfairness attitudes and lowered commitment to one's organization. Implications for theory and research on monitoring, justice, and privacy are discussed along with practical implications.
Wen-Lung Shiau, Chang Liu, Mengru Zhou and Ye Yuan
Facial recognition payment is an emerging mobile payment method that uses human biometrics for personal identification. The purpose of this study is to examine how users' salient…
Abstract
Purpose
Facial recognition payment is an emerging mobile payment method that uses human biometrics for personal identification. The purpose of this study is to examine how users' salient beliefs regarding the technology–organization–environment–individual (TOE–I) dimensions affect their attitudes and how attitudes subsequently influence the intention to use facial recognition payment in offline contactless services.
Design/methodology/approach
This study comprehensively investigates customers' decision-making psychological mechanism of using facial recognition payment by integrating the belief–attitude–intention (B–A–I) model and the extended TOE–I framework. Data from 420 valid samples were collected through an online survey and analyzed using partial least squares structural equation modeling.
Findings
Research results indicate that convenience and perceived herd exert positive effects on trust and satisfaction. Meanwhile, familiarity has a significantly positive effect only on trust but not on satisfaction. In contrast, perceived privacy risk exhibits a negative effect on both trust and satisfaction. Trust and satisfaction positively influence the intention to use facial recognition payment. Unexpectedly, self-awareness negatively moderates the effect of satisfaction on intention to use, but its effect on the relationship between trust and intention to use is non-significant.
Originality/value
To the best of the authors’ knowledge, this study is one of the early studies that explicate customers' psychological mechanism in facial recognition payment in offline contactless services through an understanding of the B–A–I causal linkages with the identification of users' perceptions from a comprehensive context-specific perspective. This study enriches the literature on facial recognition payment and explores the moderating role of self-awareness in the relationship between users' attitudes and intention to use, thereby revealing a complex psychological process in the usage of offline facial recognition payment systems.
Details
Keywords
Ali Padyab and Anna Ståhlbröst
The integration of internet of things (IoT) devices into daily life introduces challenges for the privacy of their users and those who are affected by these devices. This paper…
Abstract
Purpose
The integration of internet of things (IoT) devices into daily life introduces challenges for the privacy of their users and those who are affected by these devices. This paper explores the factors that affect individual concerns regarding IoT use and how those factors affect the dynamics of privacy management with the presence of an IoT device.
Design/methodology/approach
Four focus groups of individuals and IoT experts were studied to understand the groups’ privacy concerns. The authors adopted a qualitative research method based on grounded theory to find relevant dimensions of situational privacy concerns in IoT use situations.
Findings
The results revealed that fourteen dimensions of individuals’ privacy concerns regarding the IoT are relevant and can be categorized under four key influential factors: collection, IoT device, collected data storage and use of collected data. The authors also analyzed the focus groups using genres of disclosure theory and explored how privacy concerns affect individual privacy management regulations.
Research limitations/implications
This paper contributes to how future research can employ genres of disclosure as a theoretical framework to identify situations where privacy violations occur.
Practical implications
This study can assist service providers and IoT manufacturers in deriving design principles and decreasing concerns by addressing the information that must be communicated to their users.
Originality/value
As opposed to the previous research, which was more inclined to dispositional privacy concerns, this study provides insights into situational privacy concerns when individuals are confronted with the IoT. This study represents the first attempt to investigate the process individuals experience in managing their privacy.
Details