scholarly journals Convincing consumers to share personal data: double-edged effect of offering money

2019 ◽  
Vol 37 (1) ◽  
pp. 1-9 ◽  
Author(s):  
Valentine Weydert ◽  
Pierre Desmet ◽  
Caroline Lancelot-Miltgen

Purpose The purpose of this paper is to demonstrate how offering control on data usage and offering money can increase willingness to share private information with a data broker. Design/methodology/approach Personal data are collected for internet users with a Web questionnaire. In an experimental framework, compensations control money are manipulated and consumers’ data sharing is explained by sensitivity and regulatory focus. Findings Offering control increases willingness to disclose personal data, even sensitive one, but the effect is not moderated by regulatory focus. Offering monetary compensation has a negative, but small, effect on willingness to share personal data, and the effect is moderated by regulatory focus. Originality/value Offering a large amount of money is a double-edged offer, as it creates a signal that increases potential negative effect of disclosing personal data to unknown third party.

2018 ◽  
Vol 31 (3) ◽  
pp. 770-790 ◽  
Author(s):  
Hemamali Tennakoon ◽  
George Saridakis ◽  
Anne-Marie Mohammed

PurposeToday’s world of digital and mobile media does not require actual physical contact, between the suitable target and the motivated offender, as with traditional crime. In fact, as Mesch (2009) contended that the internet is not merely an information channel but it creates a new space of activities for children, where they are exposed to motivated offenders and the actors of fourth party. Therefore, for the sake of children’s safety, the practice of parental mediation control is increasingly becoming more pertinent everyday. Thus, the purpose of this paper is to examine how parental mediation control in Sri Lanka is influenced by their internet self-efficacy, their experience as online victims and their trust in online users.Design/methodology/approachThis paper uses a unique data set of computer and internet users from Sir Lanka to examine parental intervention in their children’s online activities. Specifically, the data set contains 347 responses from computer and internet users. To analyze the data, the authors use a binary dependent (probit) model.FindingsThe results show that such factors alter the baseline probability of parental intervention. However, some differences are found between younger and older parents, with the latter group responding more to trust in online users and victimization experience while the former is mainly driven from computer self-efficacy. In particular, the older group is less likely to trust online internet users in terms of never adding unknown persons in the social media. Finally, being self-employed and an older parent has a positive effect on the likelihood of adopting parental controls, possibly because of the non-pecuniary attributes of self-employment.Originality/valueThis study adds to the emerging parental mediation control literature by looking at the likelihood of younger and older parents who were victims of cybercrimes, who have greater internet self-efficacy and lower online third-party trust to adopt parental mediation control behaviors. Also another contribution to the literature is the role of occupation type on parental monitoring behaviors.


2020 ◽  
Vol ahead-of-print (ahead-of-print) ◽  
Author(s):  
You-De Dai ◽  
Wen-Long Zhuang ◽  
Sung-Cheng Lu ◽  
Tzung-Cheng Huan

Purpose The purpose of this study is to explore the impact of psychological ownership on work engagement and job burnout within international tourist hotel employees, and simultaneously examine the moderating role of regulatory foci. Design/methodology/approach This research collected questionnaire samples from the employees of international tourist hotels in the cities of Taiwan (Taipei, Taichung and Kaohsiung) and China (Xiamen and Quanzhou). Purposive sampling was adopted. In total, 300 questionnaires were distributed to each hotel, and the total number of questionnaires finally distributed reached 1,500. Findings This research applies social identity theory and regulatory theory to develop a new research framework with the sample of the employees in the five-star international tourism hotel. This study found that psychological ownership has a significant and positive effect on work engagement and has a negative effect on job burnout. In addition, regulatory foci moderate the relationship between psychological ownership and work engagement as well as the relationship between psychological ownership and job burnout respectively. These analytic results fill the research gap within the literature in relation to the moderating effects of a regulatory focus on psychological ownership’s relationships to work engagement and job burnout. Originality/value This study explains how employees with high psychological ownership will develop higher work engagement and lower job burnout. In addition, this research also includes regulatory foci as a situational variable to examine the moderating relationship with psychological ownership, work engagement, and job burnout.


2021 ◽  
Vol ahead-of-print (ahead-of-print) ◽  
Author(s):  
Dedong Wang ◽  
Yuxue Wang

PurposeProject conflicts are inevitable. Megaproject conflicts need to be managed across different levels. The purpose of this study is to investigate the role of individual-level regulatory focus and organization-level team mindfulness in managing megaproject conflicts.Design/methodology/approachBy combining the individual motivation basis and organizational background of conflict resolution, this study constructed a multi-level structural equation model. The hypothesis is tested based on data collected from 182 respondents.FindingsThe findings of this study show that project manager's promotion focus has a direct positive effect on task conflict and a negative effect on relationship conflict. Prevention focus has a positive effect on relationship conflict and a negative effect on task conflict and process conflict. Team mindfulness has a negative effect on relationship conflict and process conflict and a positive effect on task conflict. Task conflict was negatively affected by the interaction between team mindfulness and promotion focus. The interaction between team mindfulness and prevention focus had a positive effect on relationship conflict.Originality/valueThis study verifies the positive role of project manager's promotion focus and prevention focus in conflict management and clarifies the strengthening role of team mindfulness in constructive conflict and the prevention role in destructive conflict. This study also confirms that team mindfulness can act as a reinforcement and complementary factor of regulatory focus in megaproject conflict, contributing to the current understanding of the project manager's role in megaproject mindfulness contexts.


2018 ◽  
Vol 7 (3) ◽  
pp. 269-278
Author(s):  
M. Garrett Roth

Purpose The purpose of this paper is to view political candidates as products in a market competing over quality via advertising. Consequently, the Austrian argument against restrictions on product advertising can be applied to political markets as well. The foremost conclusion is a disproportionately negative effect of campaign finance restrictions on lesser-known incumbents and third-party candidates. A counterargument is also presented that campaign finance restrictions may solve a prisoner’s dilemma. Design/methodology/approach The author provides an initial test of these hypotheses with data from US Senate races occurring before and after the passage of the McCain-Feingold Act of 2002. Findings Empirical results show a strong incumbency advantage, but no disproportionate harm to lesser-known candidates or third parties from the passage of the act. Originality/value The paper provides a new perspective on the role of the political candidate and purpose of campaign advertising. The first pass empirics suggest, however, that only a major revision in campaign advertising rules could significantly alter the predictors of challenger vote shares.


Kybernetes ◽  
2016 ◽  
Vol 45 (7) ◽  
pp. 1084-1108 ◽  
Author(s):  
Kaiying Cao ◽  
Ping He

Purpose By studying the competition between a B2C platform and a third-party seller, the purpose of this paper is to analyze and compare their optimal decisions and profits between cases with and without sales effort of the platform or third-party seller. Design/methodology/approach This paper studies the competition between a B2C platform and a third-party seller. The platform sells a product directly, and allows the third-party seller to sell a competing product on the platform. Based on whether the platform or the third-party seller makes sales effort, there are four scenarios. The paper analyzes the optimal decisions and profits of platform and third-party seller under each scenario, respectively. Findings The transaction fee has a negative effect on third-party seller’s sales effort level. What is more, the platform can take a free riding from the third-party seller’s sales effort, but the platform’s sales effort has a negative effect on the profit of third-party seller. Practical implications These results provide managerial insights for the platform and the third-party seller to make decisions. Originality/value This paper is among the first papers to study the competition between B2C platform and third-party seller.


2019 ◽  
Vol 32 (6) ◽  
pp. 1446-1471
Author(s):  
Serkan Celik

Purpose The purpose of this paper is to explore internet users’ experiences of cyberhate in the aspects of ethnicity, religion, sexual preference and political perspective. Design/methodology/approach Researchers employed an exploratory survey method to examine internet users’ experiences of cyberhate. The participants of the study were determined by purposive sampling methods to attain maximum variety among internet users with high-level digital literacy skills. The data were collected from 355 internet users affiliated with two universities in Turkey and the USA using a personal data form and a survey (Cyberhate Experience Survey) of which reliability and validity indexes were ensured. Findings The results indicated that participants have observed and experienced cyberhate at different levels targeting their ethnic, religious, gender-based and political identities. The findings also pointed out that gender, income and socio-political identities are significant variables on exposure to cyberhate regardless of cultural and educational boundaries. The majority of survey respondents reported that they had encountered cyberhate mostly on social media platforms. Social implications The findings of the study imply that to address the hate speech problem comprehensively, the author must enlighten people, change their way of thinking and broaden their perspectives by using measures such as intercultural dialogue, critical thinking, media literacy, education on tolerance and diversity. Originality/value This research was intended to contribute into the need to elaborate on various aspects of cyberhate, which is shared by academics, thinkers, journalists and educators. It may also serve to clarify how frequently internet users encounter hateful content and harassment online, which can have social consequences and influence young people’s trust to other people.


2018 ◽  
Vol 31 (3) ◽  
pp. 845-868 ◽  
Author(s):  
Serkan Celik

PurposeThe purpose of this paper is to elaborate the opinions and perceptions of internet users regarding online hate speech, and bring cyberhate to the attention of internet users and policy stakeholders.Design/methodology/approachA sectional research design and survey method was adopted throughout the study to examine the opinions and perceptions of internet users regarding cyberhate by descriptively exploring the existing situation from various perspectives. The participants of the study were determined by purposive sampling methods to attain maximum variety among internet users who are considered as highly literate in technology use. The data were collected through a personal data form and a survey (Cyberhate Perception Scale) from 372 internet users living in Turkey and the USA.FindingsThe findings of the study revealed that the majority of participants do not perceive cyberhate as a part of freedom of speech and they believe that online hate behaviors, which they also consider to be a violation of human rights, should be deemed illegal and be punished accordingly. The findings, which were discussed in line with the existing research, indicated some significant predictors of internet users’ perceptions on cyberhate.Originality/valueAs cyberhate is an understudied area that raises concerns in terms of internet user exposure, the objective of this research is to understand tendencies about the opinions and perceptions of internet users regarding online hate speech, and bring cyberhate to the attention of internet users and policy stakeholders.


2020 ◽  
Author(s):  
Imdad Ullah ◽  
Roksana Boreli ◽  
Salil S. Kanhere

Targeted advertising has transformed the marketing trend for any business by creating new opportunities for advertisers to reach prospective customers by delivering them personalised ads using an infrastructure of a variety of intermediary entities and technologies. The advertising and analytics companies collect, aggregate, process and trade a rich amount of user's personal data, which has prompted serious privacy concerns among individuals and organisations. This article presents a detailed survey of privacy risks including the information flow between advertising platform and ad/analytics networks, the profiling process, the advertising sources and criteria, the measurement analysis of targeted advertising based on user's interests and profiling context and ads delivery process in both in-app and in-browser targeted ads. We provide detailed discussion of challenges in preserving user privacy that includes privacy threats posed by the advertising and analytics companies, how private information is extracted and exchanged among various advertising entities, privacy threats from third-party tracking, re-identification of private information and associated privacy risks, in addition to, overview data and tracking sharing technologies. Following, we present various techniques for preserving user privacy and a comprehensive analysis of various proposals founded on those techniques and compare them based on the underlying architectures, the privacy mechanisms and the deployment scenarios. Finally we discuss some potential research challenges and open research issues.<br>


2020 ◽  
Author(s):  
Imdad Ullah ◽  
Roksana Boreli ◽  
Salil S. Kanhere

Targeted advertising has transformed the marketing trend for any business by creating new opportunities for advertisers to reach prospective customers by delivering them personalised ads using an infrastructure of a variety of intermediary entities and technologies. The advertising and analytics companies collect, aggregate, process and trade a rich amount of user's personal data, which has prompted serious privacy concerns among individuals and organisations. This article presents a detailed survey of privacy risks including the information flow between advertising platform and ad/analytics networks, the profiling process, the advertising sources and criteria, the measurement analysis of targeted advertising based on user's interests and profiling context and ads delivery process in both in-app and in-browser targeted ads. We provide detailed discussion of challenges in preserving user privacy that includes privacy threats posed by the advertising and analytics companies, how private information is extracted and exchanged among various advertising entities, privacy threats from third-party tracking, re-identification of private information and associated privacy risks, in addition to, overview data and tracking sharing technologies. Following, we present various techniques for preserving user privacy and a comprehensive analysis of various proposals founded on those techniques and compare them based on the underlying architectures, the privacy mechanisms and the deployment scenarios. Finally we discuss some potential research challenges and open research issues.<br>


2020 ◽  
Vol ahead-of-print (ahead-of-print) ◽  
Author(s):  
Ash Watson ◽  
Deborah Lupton

PurposeThe purpose of this paper is to report on the findings from the Digital Privacy Story Completion Project, which investigated Australian participants' understandings of and responses to digital privacy scenarios using a novel method and theoretical approach.Design/methodology/approachThe story completion method was brought together with De Certeau's concept of tactics and more-than-human theoretical perspectives. Participants were presented with four story stems on an online platform. Each story stem introduced a fictional character confronted with a digital privacy dilemma. Participants were asked to complete the stories by typing in open text boxes, responding to the prompts “How does the character feel? What does she/he do? What happens next?”. A total of 29 participants completed the stories, resulting in a corpus of 116 narratives for a theory-driven thematic analysis.FindingsThe stories vividly demonstrate the ways in which tactics are entangled with relational connections and affective intensities. They highlight the micropolitical dimensions of human–nonhuman affordances when people are responding to third-party use of their personal information. The stories identified the tactics used and boundaries that are drawn in people's sense-making concerning how they define appropriate and inappropriate use of their data.Originality/valueThis paper demonstrates the value and insights of creatively attending to personal data privacy issues in ways that decentre the autonomous tactical and agential individual and instead consider the more-than-human relationality of privacy.Peer reviewThe peer review history for this article is available at: https://publons.com/publon/10.1108/OIR-05-2020-0174


Sign in / Sign up

Export Citation Format

Share Document