Chapter

A Review of Theories Utilized in Understanding Online Information Privacy Perceptions

Authors:
To read the full-text of this research, you can request a copy directly from the authors.

Abstract

Researchers from different fields of study applied numerous theories to study and understand users’ online information privacy concerns, behaviours, attitudes, preferences, as well as the outcomes of their behaviours on the website. Up to date, there are only a few studies that reviewed and integrated theories in the literature to produce an integrated theoretical framework for online information privacy. This study reviewed twelve theoretical frameworks used in online information privacy. It followed the common approach of the literature review. The initial search resulted in over 102 studies from ScienceDirect, EBSCO and Scopus databases. The findings of the study revealed that reviewed theoretical frameworks have limitations recognized in the literature which include conflicting norms/duties, as well as overlapping spaces, minimization of emotional response, ignorance of biological differences and hormonal responses, missing of constructs, such as trust and explicit focus on the individuals. There were also criticisms of reviewed theoretical frameworks noted in the literature such as oversimplified views of social influence on individuals, theories not falsifiable and the use of surveys as a form of cultural inquiry. Finally, the findings of the study revealed open issues in online information privacy such as hidden cookies, unsecured location sharing, scanning cyber security, as well as data never forgetting individuals. The study recognizes that there are various theories or frameworks in this field, all of which deal with privacy behaviour, implying that studies in the future should combine theories or frameworks to better understand users’ online information privacy perceptions.Keywordsonline information privacytheoretical frameworkinformation disclosure

No full-text available

Request Full-text Paper PDF

To read the full-text of this research,
you can request a copy directly from the authors.

... The UTAUT2 model is undoubtedly a valuable framework for understanding technology adoption (Faqih and Jaradat, 2021). Still, it can be challenging to apply in practice, especially in educational settings where resources are often limited (Malatji, VanEck and Zuva, 2023). Additionally, the model overlooks the role of technology characteristics, particularly GenAI, such as information accuracy, in technology adoption. ...
Article
Full-text available
The examination of the impact of Generative AI (GenAI) on higher education, especially from the viewpoint of students, is gaining significance. Although prior research has underscored GenAI's potential advantages in higher education, there exists a discernible research gap concerning the determinants that affect its adoption. In the present study, we aim to enhance our comprehension of the factors influencing the willingness of higher education students to adopt GenAI tools. To achieve this, we have developed an extended Unified Theory of Acceptance and Use of Technology 2 (UTAUT2) model incorporating specific GenAI constructs. Our research methodology entailed the selection of a diverse sample of 374 students through random sampling. We then analyzed their data using Structural Equation Modeling (SEM) to gain insights into the complex relationships between various variables. The study found that students are more likely to use GenAI tools when they view them as supplemental resource and effort expectancy. It also revealed that perceived costs negatively impact adoption intentions, highlighting that financial factors are a significant barrier. Interestingly, Factors like information accuracy and hedonic motivation did not significantly affect students' adoption intentions. This study offers key insights for eLearning practitioners on integrating Generative AI (GenAI) tools into educational settings. It emphasizes the significance of resource perception and effort expectancy, demonstrating GenAI's potential to personalize learning experiences. eLearning platforms can utilize GenAI to enhance active learning through engaging methods and streamline course development. Addressing cost barriers is crucial for equitable access and inclusivity. A gradual approach to integration aligned with learning objectives is recommended, along with fostering critical engagement with GenAI tools to enhance digital literacy. Lastly, the study is constrained by its specific context, potential biases in self-reported data, a narrow focus on factors influencing students' intent to use GenAI tools and a cross-sectional design. Future research should encompass a broader range of factors, employ objective measures, and integrate observational data. Longitudinal studies or experimental designs could offer more comprehensive insights into how students' perceptions and intentions develop, thus promoting a more inclusive educational environment for all students.
Chapter
Full-text available
Individuals have differing levels of information privacy concern, formed by their expectations and the confidence they have that organisations meet this in practice. Variance in privacy laws and national factors may also play a role. This study analyses individuals’ information privacy expectation and confidence across two nations, the United Kingdom and South Africa, through a survey of 1463 respondents. The findings indicate that the expectation for privacy in both countries are very high. However, numerous significant differences exist between expectations and confidence when examining privacy principles. The overall results for both countries show that there is a gap in terms of the privacy expectations of respondents compared to the confidence they have in whether organisations are meeting their expectations. Governments, regulators, and organisations with an online presence need to consider individuals’ expectations and ensure that controls that meet regulatory requirements, as well as expectations, are in place.
Article
Full-text available
The aim of this paper is to discuss and to examine the impact of the factors on Vietnamese consumers’ online shopping intention based on Technology Acceptance Model (TAM) and Theory of Planned Behavior (TPB). The questionnaire was sent directly to the respondents and through the Internet. After 5 months collecting, there were 423 valid replies being analyzed. The data were analyzed in accordance with the process from Cronbach's Alpha to EFA and multiple regression technique. The results showed that perceived usefulness, perceived ease of use, attitude and subjective norm had positive effects on consumers’ online shopping intention. While the factor of perceived risk had a negative effect on consumers’ online shopping intention.
Article
Full-text available
This study developed and empirically tested a model to predict the factors affecting students’ behavioral intentions toward using mobile learning (m-learning). This study explored the behavioral intention to use m-learning from the perspective of consumers by applying the extended unified theory of acceptance and use of technology (UTAUT) model with the addition of perceived enjoyment, mobile self-efficacy, satisfaction, trust, and perceived risk moderators. A cross-sectional study was conducted by employing a research model based on multiple technology acceptance theories. Data were derived from an online survey with 1,562 respondents and analyzed using structural equation modeling. Partial least squares (PLS) regression was used for model and hypothesis testing. The results revealed that (1) behavioral intention was significantly and positively influenced by satisfaction, trust, performance expectancy, and effort expectancy; (2) perceived enjoyment, performance expectancy, and effort expectancy had positive associations with behavioral intention; (3) mobile self-efficacy had a significantly positive effect on perceived enjoyment; and (4) perceived risk had a significantly negative moderating effect on the relationship between performance expectancy and behavioral intention. Our findings correspond with the UTAUT model and provide a practical reference for educational institutions and decision-makers involved in designing m-learning for implementation in universities.
Article
Full-text available
Online social networks expose their users to privacy leakage risks. To measure the risk, privacy scores can be computed to quantify the users’ profile exposure according to their privacy preferences or attitude. However, user privacy can be also influenced by external factors (e.g., the relative risk of the network, the position of the user within the social graph), but state-of-the-art scores do not consider such properties adequately. We define a network-aware privacy score that improves the measurement of user privacy risk according to the characteristics of the network. We assume that users that lie in an unsafe portion of the network are more at risk than users that are mostly surrounded by privacy-aware friends. The effectiveness of our measure is analyzed by means of extensive experiments on two simulated networks and a large graph of real social network users.
Article
Full-text available
We conducted an online experiment (n = 2024) on a representative sample of internet users in Germany, Sweden, Poland, Spain and the UK to explore the effect of notifications on security behaviour. Inspired by protection motivation theory (PMT), a coping message advised participants on how to minimize their exposure to risk and a threat appeal highlighted the potential negative consequences of not doing so. Both increased secure behavior – but the coping message significantly more so. The coping message was also as effective as both messages combined, but not so the threat appeal. Risk attitudes, age and country had a significant effect on behavior. Initiatives seeking to promote secure behavior should focus more on coping messages, either alone or in combination with fear appeals.
Article
Full-text available
Social commerce (s-commerce) has become increasingly impactful to e-commerce and has generated potential economic benefits. With the rise of online privacy concerns, we have seen the need to explain how concerns about privacy affect consumers' social interaction behavior and purchase decision-making on s-commerce sites. Synthesizing the privacy-trust-behavioral intention (PTB) and consumer decision-making models, this study proposes a comprehensive model by specifically refining its privacy and trust from an institutional perspective and investigating the influences of social interaction on purchase intention and actual purchase behaviors. Our results found that institutional privacy assurance positively influences institutional-based trust, which, in turn, affects online social interactions, and consequently increases the likelihood of product purchases on s-commerce sites. Theoretical development of this research contributes to both marketing and information systems disciplines in the social media era.
Article
Full-text available
Although receiving critical feedback during learning situations can be an indicator of failure, constructive feedback can help a learner improve from that failure. Many theories have outlined various components of the feedback process, but models for constructive feedback that integrate both the interpersonal nature of the feedback process as well as the vantage point of the feedback receiver are few. To understand better how constructive feedback is perceived to leverage failure for enhanced thinking, motivational, and learning processes, we conducted a series of focus group interviews with undergraduates (n = 38). Using grounded theory, we developed a process model to address underlying mechanisms for constructive criticism. The three main aspects of our model included that for feedback to be perceived as constructive, (a) criticism needed to be embedded in perceptions of care from a respect-worthy feedback giver; (b) the feedback message itself needed properties of being well-intentioned, targeted appropriately, and providing guidance as to how the work can be improved; and (c) uptake of the feedback, that is, responding to its guidance by changing the work, occurred in the context of the feedback receiver's emotions and motivation. Implications for theory and practice are discussed to promote the important role of failure and feedback while learning.
Thesis
Full-text available
The Privacy Calculus theory states that individuals always rationally weigh the potential benefits and potential risks of data disclosure decisions. The rational assumption, however, often turns out to be wrong. The scientific literature has identified some influencing factors. These can be, for example, emotions or the current mood. In addition, there are thinking styles such as the need for cognition or faith into intuition. Also, the framing of a message, status quo bias, anchoring effect, positivity bias, or peer pressure (herding effects and affective commitment) can lead to irrational data disclosure decisions. The trustworthiness and reputation (in particular the possibly resulting halo effect) can additionally lead to decisions with little cognitive effort. To identify contextual adjustments of the Privacy Calculus theory, expert interviews were conducted with ten Internet users. Respondents feel well informed about the potential benefits, but not about risks. However, information is often difficult to read, too long or not clear. Rational data disclosure decisions are more likely to be made in sensitive contexts (e.g. finance or health care), and irrational decisions tend to be made in less-sensitive contexts (e.g. social networks or e-commerce), with respondents focusing primarily on emotions, peer pressure, or trust and reputation. To investigate the impact of Privacy Calculus decisions on firm performance, a survey was conducted with 12 internet firms. Most companies explicitly consider privacy-specific characteristics when designing their products, but more likely to show the benefits than the risks of data disclosure. The Privacy Calculus theory is almost completely unknown in practice. However, if it is known, it will also be used to develop the privacy policy, business strategy and business model. However, most companies do not see an impact of Privacy Calculus decisions on firm performance.
Article
Full-text available
The increasing use of social media has changed how firms engage their brands with consumers in recent times. This triggered a need for this research to further our understanding of the influence of social presence on social brand engagement (SBE) and the moderating effects of firm-generated content and consumer commitment. Employing a quantitative survey design, 738 consumers with prior experience in following or engaging with brands on social media were randomly interviewed using an online questionnaire. While social presence positively influence social brand engagement, this relationship is significantly moderated by firm-generated content and the consumers' level of commitment in engaging with the brand. The findings also indicate that SBE encourages consumers to increase their intention to use the brand as well as engage in electronic word of mouth. Further, this study provides insights into the potential role of SBE and social presence in advancing the broader understanding of brand relationship management, brand engagement and social media research. Our conceptualisation of SBE suggests a need for managers to adopt creative strategies that will arouse consumers' interest and attention to participate in such interactions
Article
Full-text available
This article provides a review of the increasingly detailed literature on the neurodevelopment of joint attention. Many findings from this literature support and inform the hypothesis that the neurodevelopment of joint attention contributes to the functional development of neural systems for human social cognition. Joint attention begins to develop by 5 months of age and is tantamount to the ability to adopt a common perspective with another person. It involves a whole-brain system with nodes in the: (a) dorsal and medial frontal cortex, (b) orbital frontal/insula cortex, (c) anterior/ posterior cingulate cortex, (d) superior temporal cortex, (e) precuneus/parietal cortex, and (f) amygdala and striatum. This system integrates triadic information processing about: (a) self-attention/action, (b) information about others’ attention/action during social interactions that involve, (c) coordinated attention as well as processing a common referent in space. The results of this new imaging literature have the potential to advance current models of social cognition and the social brain, which rarely consider the contribution of the cognitive neurodevelopment of joint attention. The new neuroscience of joint attention is also extremely valuable for clinical research on social-cognitive neurodevelopmental disorders. This is most clearly the case for autism spectrum disorder (ASD) because it is consistent with the hypothesis of substantial functional neurodevelopmental continuity between the preschool impairments of joint attention, and childhood theory of mind ability that characterize the development of ASD.
Article
Full-text available
The purpose of this paper are to examines the impact of professional commitment, attitude, subjective norms and perceived behavior control on whistle blowing intention. The paper uses primary data with survey method. The sample used was internal auditor (the government inspectorate) in the province of North Sumatra. SPSS was used to analyze the research purpose, that consist are descriptive statistics and hypothesis tested. Findings revealed that commitment professional do not have any significant effect on the whistle blowing intention, while the attitude, the subjective norms and perceived behavior control have a significant effect on the whistle blowing intention. Based on this research, we expected to provide input to the government inspectorate.
Article
Full-text available
This article intends to review the theoretical aspects and empirical evidences made on agency theory. It is aimed to explore the main ideas, perspectives, problems and issues related to the agency theory through a literature survey. It discusses the theoretical aspects of agency theory and the various concepts and issues related to it and documents empirical evidences on the mechanisms that diminish the agency cost. The conflict of interest and agency cost arises due to the separation of ownership from control, different risk preferences, information asymmetry and moral hazards. The literatures have cited many solutions like strong ownership control, managerial ownership, independent board members and different committees can be useful in controlling the agency conflict and its cost. This literature survey will enlighten the practitioners and researchers in understanding, analysing the agency problem and will be helpful in mitigating the agency problem.
Article
Full-text available
Purpose Privacy and security concerns of consumers have been touted as one of the hindrances to the growth of e-commerce. These concerns increase the risk perception of consumers. Understanding the consequences of privacy and security concerns and their relationship to risk perceptions may provide a solution. The relationship between privacy and security is investigated using the theory of planned behavior. The study aims to examine the relationship of trust, privacy and security concerns to the risk perception adoption of e-commerce. The results from a survey validate the model. Design/methodology/approach Data were collected using survey from undergraduate business students. The respondents were requested to select a specific product that they plan to purchase in the next six months. After selecting a product, the respondents were requested to report an online company that they have recently visited which offers the selected product. The respondents were requested to fill out the survey with regard to their selected online company. Time given was approximately 20 min. Findings The results suggest that privacy and security concerns and trust beliefs had effects on risk perception. Among these effects, trust had the largest effect followed by privacy and security concerns. Furthermore, risk perception and trust beliefs had effects on attitude. The effect of trust beliefs on attitude was larger than the effect of risk perception on attitude. Similarly, subjective norm, perceived behavioral control and attitude had a positive and direct effect on intention to be involved in e-commerce. Research limitations/implications The first limitation of this study is the use of student subjects. Because this study took place in an educational setting, its generalizability to the general population of consumers lacks to some degree. The second limitation of this study is mono-method bias. Practical implications The effect of privacy concerns on risk perception was larger than that of security concerns. Because the consumers get more experienced and sophisticated using the Web, the security concerns that they may have had at the beginning are not reflected in their risk perceptions. It is likely that they have adopted protective measures on their own to defend their privacy online. An example of such a measure would be providing false information to online companies when asked to submit personal information. Originality/value The major contributions of this study are developing and validating an integrative framework of e-commerce adoption at the individual level. The model includes privacy and security concerns, risk perception and trust beliefs. This study also highlighted the distinction of constructs of privacy and security concerns and showed their differential effects on other related constructs in the research model.
Article
Full-text available
The Unified Theory of Acceptance and Use of Technology (UTAUT) has been widely used in research involving adoption and acceptance of technologies. The theory considers factors that influence behavioural intention and use behaviour of technology. The authors of UTAUT combined eight competing theories of technology acceptance including the Diffusion of Innovation theory. Despite the involvement of the characteristics that affect technology adoption from the Diffusion of Innovation theory, the authors of UTAUT did not include the process that technology progresses through to be adopted. This paper argues conceptually that technology adoption processes should be included in UTAUT to better predict technology acceptance and that future information systems research should endeavour to include the environment and process in which technologies are used.
Article
Full-text available
Information systems (IS) research frequently uses survey data to measure the interplay between technological systems and human beings. Researchers have developed sophisticated procedures to build and validate multi-item scales that measure latent constructs. The vast majority of IS studies uses classical test theory (CTT), but this approach suffers from three major theoretical shortcomings: (1) it assumes a linear relationship between the latent variable and observed scores, which rarely represents the empirical reality of behavioral constructs; (2) the true score can either not be estimated directly or only by making assumptions that are difficult to be met; and (3) parameters such as reliability, discrimination, location, or factor loadings depend on the sample being used. To address these issues, we present item response theory (IRT) as a collection of viable alternatives for measuring continuous latent variables by means of categorical indicators (i.e., measurement variables). IRT offers several advantages: (1) it assumes nonlinear relationships; (2) it allows more appropriate estimation of the true score; (3) it can estimate item parameters independently of the sample being used; (4) it allows the researcher to select items that are in accordance with a desired model; and (5) it applies and generalizes concepts such as reliability and internal consistency, and thus allows researchers to derive more information about the measurement process. We use a CTT approach as well as Rasch models (a special class of IRT models) to demonstrate how a scale for measuring hedonic aspects of websites is developed under both approaches. The results illustrate how IRT can be successfully applied in IS research and provide better scale results than CTT. We conclude by explaining the most appropriate circumstances for applying IRT, as well as the limitations of IRT.
Article
Full-text available
This study aims to analyze how privacy concerns about the Internet have an impact on the consumer's intention to make online purchases. A research model was developed establishing that this impact takes place via the connection of privacy concerns with the theories of trust and risk, the theory of planned behaviour and the technology acceptance model. The empirical study was based on an online survey that collected data from 900 individuals. The results confirmed the acceptance of all proposed hypotheses and the overall validation of the research model. Implications and further research suggestions are presented.
Article
Full-text available
Operating in a global market provides challenges for managers concerned with information privacy. This work builds on a branch of research that has evolved to examine the relationship between culture and attitudes to information privacy. Our approach is unique in that our dependent variable is a count variable designed to measure the rate of uptake of privacy laws. It is a departure from studying cultural variables at the individual level. We also identify the cultural impact of legislation at the national level. Previous models generally use a relatively crude division of legislative codes. By contrast, this work examines the impact of culture on baskets of privacy elements drawn from the EU directive. These attributes are candidates for codification in law, but are taken up at varying rates. A key originality and challenge of the work is the use of the GLOBE variables for culture. Results suggest that group collectivism, power distance, assertiveness and uncertainty avoidance are the most powerful cultural predictors of the level of privacy legislation provision.
Article
Full-text available
Research dealing with various aspects of* the theory of planned behavior (Ajzen, 1985, 1987) is reviewed, and some unresolved issues are discussed. In broad terms, the theory is found to be well supported by empirical evidence. Intentions to perform behaviors of different kinds can be predicted with high accuracy from attitudes toward the behavior, subjective norms, and perceived behavioral control; and these intentions, together with perceptions of behavioral control, account for considerable variance in actual behavior. Attitudes, subjective norms, and perceived behavioral control are shown to be related to appropriate sets of salient behavioral, normative, and control beliefs about the behavior, but the exact nature of these relations is still uncertain. Expectancy— value formulations are found to be only partly successful in dealing with these relations. Optimal rescaling of expectancy and value measures is offered as a means of dealing with measurement limitations. Finally, inclusion of past behavior in the prediction equation is shown to provide a means of testing the theory*s sufficiency, another issue that remains unresolved. The limited available evidence concerning this question shows that the theory is predicting behavior quite well in comparison to the ceiling imposed by behavioral reliability.
Article
Full-text available
Recent scholarship in philosophy, law, and information systems suggests that respecting privacy entails understanding the implicit privacy norms about what, why, and to whom information is shared within specific relationships. These social contracts are important to understand if firms are to adequately manage the privacy expectations of stakeholders. This paper explores a social contract approach to developing, acknowledging, and protecting privacy norms within specific contexts. While privacy as a social contract – a mutually beneficial agreement within a community about sharing and using information – has been introduced theoretically and empirically, the full impact on firms of an alternative framework to respecting the privacy expectations of stakeholders has not been examined. The goal of this paper is to examine how privacy norms develop through social contract’s narrative, to redescribe privacy violations given the social contract approach, and to critically examine the role of business as a contractor in developing privacy norms. A social contract narrative dealing specifically with issues of privacy is an important next step in exploring a social contract approach to privacy. Here, the narrative is used to explain to analyze the dynamic process of privacy norm generation within particular communities. Based on this narrative, individuals within a given community discriminately share information with a particular set of obligations in mind as to who has access to the information and how it will be used – rather than giving away privacy, individuals discriminately share information within a particular community and with norms governing the use of their information. Similar to contractual business ethics’ impact on global commerce in explaining how and why norms vary across global contexts, the social contract approach to privacy explains how and why norms vary across communities of actors. Focusing on agreements around privacy expectations shifts the responsibility of firms from adequate notification to the responsibility of firms as contractors to maintain a mutually beneficial and sustainable solution.
Article
Full-text available
Background Childhood obesity has reached epidemic proportions in many nations around the world. The theory of planned behavior (TPB) and the theory of reasoned action (TRA) have been used to successfully plan and evaluate numerous interventions for many different behaviors. The aim of this study was to systematically review and synthesize TPB and TRA-based dietary behavior interventions targeting adolescents and young adults. Methods The following databases were systematically searched to find articles for this review: Academic Search Premier; Cumulative Index to Nursing and Allied Health (CINAHL); Education Resources Information Center (ERIC); Health Source: Nursing/Academic Edition; Cochrane Central Register of Controlled Trials (CENTRAL); and MEDLINE. Inclusion criteria for articles were: 1) primary or secondary interventions, 2) with any quantitative design, 3) published in the English language, 4) between January 2003 and March 2014, 5) that targeted adolescents or young adults, 6) which included dietary change behavior as the outcome, and 7) utilized TPB or TRA. Results Of the eleven intervention studies evaluated, nine resulted in dietary behavior change that was attributed to the treatment. Additionally, all but one study found there to be a change in at least one construct of TRA or TPB, while one study did not measure constructs. All of the studies utilized some type of quantitative design, with two employing quasi-experimental, and eight employing randomized control trial design. Among the studies, four utilized technology including emails, social media posts, information on school websites, web-based activities, audio messages in classrooms, interactive DVDs, and health-related websites. Two studies incorporated goal setting and four employed persuasive communication. Conclusion Interventions directed toward changing dietary behaviors in adolescents should aim to incorporate multi-faceted, theory-based approaches. Future studies should consider utilizing randomized control trial design and operationalize variables. More research is needed to identify the optimal TPB and TRA modalities to modify dietary behaviors.
Article
Full-text available
Nowadays, online learning has become a popular option for students because of its flexibility and more online programs are customized to students’ needs. Among all the factors that affect students’ online learning experience, social presence is worth much study considering the asynchronous nature of online learning and communication issues between online instructors and students. This paper reviews the origin, major definitions of social presence and research studies throughout history. Authors also document arguments of the optimal amount of social presence and provide instructional design suggestions for the development of online social presence. Further trends for social presence studies are also proposed at the end of the article.
Article
Full-text available
By using the protection motivation theory, this article tests a model of password protection intentions for online users. Hypotheses are proposed concerning the intention to engage in good password practices. Data were collected from 182 college students of 3 universities in the southern United States. The results suggest that fear, response cost, and response efficacy are significantly related to online password protection intentions. However, perceived severity and vulnerability are not significant predictors. The study suggests that reducing cognitive costs for passwords is imperative.
Article
Full-text available
Computer systems cannot improve organizational performance if they aren't used. Unfortunately, resistance to end-user systems by managers and professionals is a widespread problem. To better predict, explain, and increase user acceptance, we need to better understand why people accept or reject computers. This research addresses the ability to predict peoples' computer acceptance from a measure of their intentions, and the ability to explain their intentions in terms of their attitudes, subjective norms, perceived usefulness, perceived ease of use, and related variables. In a longitudinal study of 107 users, intentions to use a specific system, measured after a one-hour introduction to the system, were correlated 0.35 with system use 14 weeks later. The intention-usage correlation was 0.63 at the end of this time period. Perceived usefulness strongly influenced peoples' intentions, explaining more than half of the variance in intentions at the end of 14 weeks. Perceived ease of use had a small but significant effect on intentions as well, although this effect subsided over time. Attitudes only partially mediated the effects of these beliefs on intentions. Subjective norms had no effect on intentions. These results suggest the possibility of simple but powerful models of the determinants of user acceptance, with practical value for evaluating systems and guiding managerial interventions aimed at reducing the problem of underutilized computer technology.
Chapter
This entry provides a description and analysis of Hofstede's model of culture. It presents an overview of the dimensions included in the model, describes the process by which the model was developed, and reviews the key features of the model, as well as noting its strengths and weaknesses. The entry will be of interest to students of culture who seek to better understand the origin, content, and limitations of Hofstede's model of culture and its dimensions.
Article
Given the serious issues caused by privacy leakage, Privacy by Design (PbD) is gaining the attention of professionals as a new privacy protection paradigm with enormous potential. This study proposes a UTAUT-based integrated model from the perspective of information system (IS) engineers, and explores the determinants of PbD implementation. The implementation of PbD and privacy protection measures relay heavily on IS engineers. However, there is a paucity of research exploring IS engineers’ acceptance of PbD, particularly research that considers engineers’ individualized factors and personal attitudes. Empirical data collected from 261 IS engineers in China demonstrate the rationality of proposed model and the importance of integrating conceptual constructs. The findings suggest that IS engineers’ attitude towards PbD implementation significantly impacts both their behavioral intention and their implementing behavior. IS engineers’ awareness of PbD is a predictor of their effort and performance expectancies, and intention to implement; IS engineers’ effort and performance expectancies concerning PbD usage have significantly impact on their attitude towards PbD. This study reveals the factors that motivate IS engineers to implement PbD into their workflow and proposes for the first time that IS engineers’ attitude towards PbD usage is the key factor for PbD implementation.
Article
Privacy threats in a social media-enabled application (app) can originate from either the institution or other app users. Although privacy in social media is well studied, the role of social (peer) privacy concerns is largely unknown and most privacy studies on mobile apps focus on initial adoption and ignore long-term behavioral outcomes. Drawing on the privacy calculus theory, this study examines the impact of both institutional and social privacy concerns on long-term user engagement with social media-enabled apps. Findings from the analysis of 354 survey responses reveal that both institutional and social privacy concerns decrease engagement. Regarding the antecedents, the perceived sensitivity of information increases institutional privacy concerns. However, social privacy concerns is influenced by the perception of risk and control. Moreover, while the impacts of social and enjoyment benefits are expectedly positive, the perception of efficiency benefits decreases engagement. These findings are further investigated and validated through a follow-up text analysis study, suggesting that users who enjoy the functionality of these apps are more likely to express social privacy concerns and minimize their engagement. This study contributes to the literature of privacy on mobile apps by unraveling the intricate dynamics of privacy concerns and benefits in the social mobile era.
Article
Based on the Elaboration Likelihood Model (ELM), this study identifies the differences between perceived privacy risks and privacy concern. Furthermore, the study analyses how perceived privacy risks and privacy concerns affect the disclosure intention and the actual information disclosure behavior of Internet users. In addition, the study discusses the moderating effects of platform types, from the perspective of privacy elaboration likelihood. By applying meta-analyses and SEM on 104 independent studies with 42,256 samples from existing empirical studies, we attempt to systematically reveal the relationship between privacy cognition and information disclosure. The results show that perceived privacy risks can significantly reduce personal information disclosure intention, as well as actual information disclosure behavior. However, privacy concerns only affect disclosure intention, but do not have a significant effect on actual information disclosure behavior. The study also verified that platform types have moderating effects on the privacy decision making of Internet users. The findings yield important and useful implications, both for research and for practice.
Article
The Technology Acceptance Model (TAM) and Unified Theory of Acceptance and Use of Technology (UTAUT) have been used widely in studies of health information technology (HIT) implementation. However, TAM and UTAUT have also been criticized for being overly simplistic (TAM) and for taking a narrow perspective, which focuses only on individual adopters' beliefs, perceptions and usage intention. Furthermore, with thousands of studies using these theories, their contribution to knowledge has reached a plateau. In this commentary, we discuss some of the criticism of TAM and UTAUT, and argue that biomedical informatics research would benefit from shifting attention from these theories to multi-dimensional approaches that can better capture the complexity of issues surrounding implementation and use of HIT. We propose a number of future undertakings which, in our opinion, are more likely to move the field forward.
Article
Purpose Customer privacy and security are major concerns. Online firms worldwide collect customer data for various reasons. This study aims to investigate factors that motivate and hinder a customer’s willingness to disclose personal information (WTD) to online firms on e-commerce websites. Design/methodology/approach Based on an extensive literature review, three sets of factors have been identified. These sets of factors are privacy concern, perceived disclosure benefits and privacy assurances. It is hypothesized that privacy concerns negatively affect the disclosure of personal information, while the perceived benefits of disclosure have positive effects. Privacy assurances would positively affect information disclosure and attenuate the negative effect of privacy concerns on the disclosure of personal information. The authors gathered data from 253 online customers in Saudi Arabia. Findings The results indicate that perceived disclosure benefits and privacy concerns have a significant positive and negative relationship, respectively, with WTD online. Privacy assurances had neither a direct nor a moderating effect on information disclosure. Research limitations/implications The findings will inform online firms about the factors that prevent or motivate customers to disclose personal information. Originality/value The effect of privacy concerns and benefits on personal information disclosure are not fully understood in Saudi Arabia. This study reveals more insights into the specific factors that make online customers reluctant or motivated to disclose their personal information.
Article
Online information privacy has become a growing social concern that may result in people blocking their personal information during social website interactions. The purpose of this study is to analyze the impact of a disposition toward privacy, the subjective norm for disclosure, and the social presence of a website on a person's privacy concerns about the website. It also examines the moderating role of website utility. The findings indicate a positive influence from a disposition toward privacy, the subjective norm for disclosure, and the social presence of a website on website-specific privacy concerns. Furthermore, the significant moderating role of website utility indicates that website utility helps to mitigate the negative effects of website privacy concerns on behavioral intention. This study also extends the information privacy literature through the analysis of the impact of the social presence of a website and the subjective norm for disclosure on website-specific privacy concerns.
Chapter
The theory of agency seeks to understand the problems created when one party, the agent, is acting for another, the principal. Agency has two sides: The activities and problems of identifying and providing services of “acting for” (agent side), and the activities and problems of guiding and correcting agent actions (the principal side). Because all actions and corrections have costs, it often does not pay the principal (or the agent) to insist on, or provide, perfect agency. But social institutions must routinely manage such imperfect conditions. By instructing the agent to perform as perfectly as possible for the principal, the fiduciary norm helps solve the institutional dilemmas of ensuring trustworthy behavior. The article describes the basic arguments of agency theory, its origins, and the varieties of work being done. The best known application of the theory of agency applied the economic theory of agency to the theory of the firm, though agency theory, including the more general institutional theory of agency, has applications throughout social science. The institutional theory of agency is not constrained by assumptions embedded in economic theory or to the modeling of the corporation alone.
Article
The authors conceptualize direct mail as an implied social contract between marketers and consumers. Four attributes constitute the direct mail social contract: volume, targeting, compensation, and permission. Several proposals have been advanced in an effort to protect consumer privacy in the direct mail environment. These proposals would directly or indirectly result in changes in the levels of the social contract attributes. The authors use a conjoint study to measure the trade-offs consumers make among these attributes. The results suggest consumers want improved targeting efficiency and lower mail volume, and they are not willing to pay for these improvements. These findings suggest that consumers consider several attributes in their evaluation of direct mail social contracts. Proposals to alter the direct mail environment must consider all these attributes in concert.
Article
The privacy calculus established that online self-disclosures are based on a cost-benefit tradeoff. For the context of SNSs, however, the privacy calculus still needs further support as most studies consist of small student samples and analyze self-disclosure only, excluding self-withdrawal (e.g., the deletion of posts), which is essential in SNS contexts. Thus, this study used a U.S. representative sample to test the privacy calculus' generalizability and extend its theoretical framework by including both self-withdrawal behaviors and privacy self-efficacy. Results confirmed the extended privacy calculus model. Moreover, both privacy concerns and privacy self-efficacy positively predicted use of self-withdrawal. With regard to predicting self-disclosure in SNSs, benefits outweighed privacy concerns; regarding self-withdrawal, privacy concerns outweighed both privacy self-efficacy and benefits.
Chapter
Behavior theory models of the relationships between the beliefs about an object and the attitude toward the object.
Article
Purpose – This paper aims to cross-culturally compare how consumers in China and Australia adopt cloud computing services. Cloud computing is one of the major innovation advances in information technology. In order for more consumers to adopt cloud computing as a technological innovation, there needs to be a better understanding of the issues involved in consumer adoption processes for online retailers. While there is an increasing amount of interest in cloud computing as a technological innovation, there is an important need to examine the reasons why consumers purchase cloud computing services for online retailers. Design/methodology/approach – In this paper, the technology acceptance model and social cognitive theory are identified as the theoretical frameworks to understand the consumer purchase intention of cloud computing services. A set of research hypotheses are stated from both theoretical frameworks to test their relationship with a consumer’s intention to adopt cloud computing as a technological innovation. These hypotheses focus on perceived usefulness, perceived ease of use, online behavioural advertising knowledge, social networks and online privacy concerns, which will help online retailers understand how cloud computing can be utilized by consumers to store and access online retail information. Findings – The findings of the study outline the different areas of technological innovation research that are needed to advance the information technology industry in the future. The findings suggest that perceived ease of use, perceived usefulness and online privacy concerns can determine a consumer’s intention to adopt cloud computing, but online behavioural advertising knowledge and social networks differ among consumers in different countries. Originality/value – The key issues influencing consumer adoption of cloud computing are outlined, which due to the emerging nature of this technological innovation will influence the regulation and marketing of cloud computing services by firms and governments in the technology sector.
Article
To study the formation of online consumers' information privacy concern and its effect, scholars from different perspectives applied multiple theories in research. To date, there has yet to be a systematic review and integration of the theories in literature. To fill the gap, this study reviews fifteen established theories in online information privacy research and recognizes the primary contributions and connections of the theories. Based on the review, an integrated framework is developed for further research. The framework highlights two interrelated trade-offs that influence an individual's information disclosure behavior: the privacy calculus (i.e., the trade-off between expected benefits and privacy risks) and the risk calculus (i.e., the trade-off between privacy risks and efficacy of coping mechanisms). These two trade-offs are together called the dual-calculus model. A decision table based on the dual-calculus model is provided to predict an individual's intention to disclose personal information online. Implications of the study for further research and practice are discussed.
Article
Proposes a protection motivation theory that postulates the 3 crucial components of a fear appeal to be (a) the magnitude of noxiousness of a depicted event, (b) the probability of that event's occurrence, and (c) the efficacy of a protective response. Each of these communication variables initiates corresponding cognitive appraisal processes that mediate attitude change. The proposed conceptualization is a special case of a more comprehensive theoretical schema: expectancy-value theories. Several suggestions are offered for reinterpreting existing data, designing new types of empirical research, and making future studies more comparable. The principal advantages of protection motivation theory over the rival formulations of I. L. Janis and of H. Leventhal are discussed. (81 ref) (PsycINFO Database Record (c) 2012 APA, all rights reserved)
Article
This manuscript reviews the background of Radio Frequency Identification (RFID) as well as the ethical foundations of individual privacy. This includes a historical perspective on personal privacy, a review of the United States Constitutional privacy interpretations, the United Nations Declaration of Human Rights, European Union Regulations, as well as the positions of industry and advocacy groups. A brief review of the information technology ethics literature is also included. The RFID privacy concerns are three-fold: pre-sales activities, sales transaction activities, and post-sales uses. A proposal to address these privacy concerns is detailed, generally based on past philosophical frameworks and specifically on the Fair Information Practices that the Federal Trade Commission has outlined for the electronic marketplace (e-commerce). It is proposed that by application of these Fair Information Practices, the major privacy issues of RFID can be addressed.