Impact of privacy policy content on perceived effectiveness of privacy policy: the role of vulnerability, benevolence and privacy concern

2021 ◽  
Vol ahead-of-print (ahead-of-print) ◽  
Author(s):  
Yuanyuan Guo ◽  
Xin Wang ◽  
Chaoyou Wang

PurposeThis study examines how the different dimensions of a privacy policy separately influence perceived effectiveness of privacy policy, as well as the mediating mechanisms behind these effects (i.e. vulnerability, benevolence). In addition, this study considers privacy concern as a significant moderator in the research model, to examine if the relative influences of privacy policy content are contingent upon levels of users' privacy concern.Design/methodology/approachThe survey experiment was conducted to empirically validate the model. Specifically, three survey experiments and six scenarios were designed to manipulate high and low levels of the three privacy policy dimensions (i.e. transparency, control and protection). The authors totally distributed 450 copies of the questionnaire, of which 407 were valid.FindingsThis paper found that (1) all the three privacy policy dimensions directly influence perceived effectiveness of privacy policy; (2) all the three privacy policy dimensions indirectly influence perceived effectiveness of privacy policy by enhancing perceived corporate benevolence, whereas control also affects perceived effectiveness of privacy policy by reducing perceived vulnerability; and (3) individuals with high-privacy concern are much more impacted by privacy policy contents than individuals with low-privacy concern.Practical implicationsThe findings could provide website managers with guidelines on how to design privacy policy contents by reducing user perceptions of vulnerability and enhancing user perceptions of corporate benevolence. The managers need to focus on customers' perceived vulnerability and corporate benevolence when launching or updating privacy policies. Furthermore, the managers also need to attend to users' privacy concerns, especially for multinational companies or companies with specific consumer groups.Originality/valueThis study extends the current privacy policy literature by articulating the separate influences of the three privacy policy dimensions and their impact mechanisms on perceived effectiveness of privacy policy. It also uncovers privacy concerns as a boundary condition that influence the effects of privacy policy contents on users' privacy perceptions.

2019 ◽  
Vol 17 (4) ◽  
pp. 375-394
Author(s):  
Mark Warner ◽  
Victoria Wang

Purpose This paper aims to investigate behavioural changes related to self-censorship (SC) in social networking sites (SNSs) as new methods of online surveillance are introduced. In particular, it examines the relationships between SC and four related factors: privacy concerns (PC), privacy awareness (PA), perceived vulnerability (PV) and information management (IM). Design/methodology/approach A national wide survey was conducted in the UK (N = 519). The data were analysed to present both descriptive and inferential statistical findings. Findings The level of online SC increases as the level of privacy concern increases. The level of privacy concern increases as the levels of PA and PV increase and the level of effective IM decreases. Originality/value This study extends the literature on online SC, showing that PCs increase the level of SC in SNSs. It provides support for three antecedent factors to PC which impact upon levels of SC when communicating in SNSs.


2021 ◽  
Vol ahead-of-print (ahead-of-print) ◽  
Author(s):  
Cristian Morosan ◽  
Agnes DeFranco

Purpose As social distancing procedures can be facilitated by various hotel technologies, the purpose of this paper is to investigate the extent to which consumers develop perceptions of value regarding the use of certain hotel technologies for social distancing in hotels. Design/methodology/approach Drawing from the social exchange theory, this study conceptualized the benefits of using technologies for social distancing, health risks, social rewards and privacy concerns as antecedents of value of using technologies for social distancing in hotels. The structural model was validated by using data from more than 1,000 nationwide US consumers. Findings Benefits and consumers’ privacy concerns of using technologies for social distancing in hotels were the strongest predictors of value. Social rewards also had a significant but relatively lower effect on value. Health risks was found to have no influence on value. Originality/value The study is the first to examine the role of technologies in mitigating the effects of coronavirus. Thus, it extends the information technology and hospitality literature by examining the role of these technologies in safeguarding individual and public health.


Significance With the advent of President Joe Biden's administration, the country's experience with COVID-19 is becoming part of a new debate over whether healthcare should be a public good and about the role of the company in society. Impacts Efforts to require vaccination as a condition of employment or of returning to workplaces will face legal challenges. The emergence of devices and apps for workers to report their emotional state to management will raise privacy concerns. Tech solutions, such as 'virtual commutes' for remote workers, will do little unless accompanied by effective support for employees. As remote working encourages employee relocation to cheaper locations, it will raise new issues around local pay inequalities. The Biden administration needs support from business to achieve its social justice, climate change and sustainability ambitions.


2018 ◽  
Vol 48 (3) ◽  
pp. 427-447 ◽  
Author(s):  
Shrawan Kumar Trivedi ◽  
Mohit Yadav

Purpose Shopping online is a fast-growing phenomenon. A look into the rapid exponential growth of the primary players in this sector shows huge market potential for e-commerce. Given the convenience of internet shopping, e-commerce is seen as an emerging trend among consumers, specifically the younger generation (Gen Y). The popularity of e-commerce and online shopping has captured the attention of e-retailers, encouraging researchers to focus on this area. This paper aims to examine the relationship between online repurchase intention and other variables such as security, privacy concerns, trust and ease of use (EOU), mediated by e-satisfaction. Design/methodology/approach A self-administered survey method is used, and students aged between 20 and 35 years at universities in northern India are selected as subjects. To test the hypotheses of this study, an online questionnaire is distributed to participants, with 309 legitimate responses received. The data are analyzed using SPSS version 20.0 and AMOS version 20.0. Structural equation modeling is used to examine the model and to test the hypotheses. Findings The results of this study show that security, privacy concerns, trust and EOU have a positive significant relationship with repurchase intention. The findings also reveal that e-satisfaction has a full mediation effect between security and repurchase intention and also between trust and repurchase intention. In addition, a partial mediation effect of e-satisfaction is noted between EOU and repurchase intention and between privacy concerns and repurchase intention. Practical implications The results show that security, trust, EOU and privacy concerns are the factors that have most impact on consumer purchasing behavior. In terms of the repurchase intention of Gen Y consumers, what is needed are strong security features, an easy-to-use interface, a trusted privacy policy and the creation of trust. Furthermore, it may be beneficial to observe e-satisfaction as a mediator when identifying potential problems; online satisfaction is important for the group in this study, and the results show that it impacts on the relation between repurchase intention and other factors. Social implications In terms of the repurchase intention of Gen Y consumers, what is needed are strong security features, an easy-to-use interface, a trusted privacy policy and the creation of trust. Furthermore, it may be beneficial to observe e-satisfaction as a mediator when identifying potential problems; online satisfaction is important for the group in this study, and the results show that it impacts on the relation between repurchase intention and other factors. Originality/value This research determines the impact of security, privacy concerns, EOU and trust on the online repurchasing behavior of Gen Y in India. The mediation effect of e-satisfaction is also determined.


2019 ◽  
Vol ahead-of-print (ahead-of-print) ◽  
Author(s):  
Matteo La Torre ◽  
Vida Lucia Botes ◽  
John Dumay ◽  
Elza Odendaal

Purpose Privacy concerns and data security are changing the risks for businesses and organisations. This indicates that the accountability of all governance participants changes. This paper aims to investigate the role of external auditors within data protection practices and how their role is evolving due to the current digital ecosystem. Design/methodology/approach By surveying the literature, the authors embrace a practice-oriented perspective to explain how data protection practices emerge, exist and occur and examine the auditors’ position within data protection. Findings Auditors need to align their tasks to the purpose of data protection practices. Accordingly, in accessing and using data, auditors are required to engage moral judgements and follow ethical principles that go beyond their legal responsibility. Simultaneously, their accountability extends to data protection ends for instilling confidence that security risks are properly managed. Due to the changing technological conditions under, which auditors operate, the traditional auditors’ task of hearing and verifying extend to new phenomena that create risks for businesses. Thus, within data protection practices, auditors have the accountability to keep interested parties informed about data security and privacy risks, continue to transmit signals to users and instill confidence in businesses. Research limitations/implications The normative level of the study is a research limitation, which calls for future empirical research on how Big Data and data protection is reshaping accounting and auditing practices. Practical implications This paper provides auditing standard setters and practitioners with insights into the redefinitions of auditing practices in the era of Big Data. Social implications Recent privacy concerns at Facebook have sent warning signals across the world about the risks posed by in Big Data systems in terms of privacy, to those charged with governance of organisations. Auditors need to understand these privacy issues to better serve their clients. Originality/value This paper contributes to triggering discussions and future research on data protection and privacy in accounting and auditing research, which is an emerging, yet unresearched topic.


2019 ◽  
Vol 32 (6) ◽  
pp. 1679-1703 ◽  
Author(s):  
Le Wang ◽  
Zao Sun ◽  
Xiaoyong Dai ◽  
Yixin Zhang ◽  
Hai-hua Hu

Purpose The purpose of this paper is to facilitate understanding of how to mitigate the privacy concerns of users who have experienced privacy invasions. Design/methodology/approach Drawing on the communication privacy management theory, the authors developed a model suggesting that privacy concerns form through a cognitive process involving threat-coping appraisals, institutional privacy assurances and privacy experiences. The model was tested using data from an empirical survey with 913 randomly selected social media users. Findings Privacy concerns are jointly determined by perceived privacy risks and privacy self-efficacy. The perceived effectiveness of institutional privacy assurances in terms of established privacy policies and privacy protection technology influences the perceptions of privacy risks and privacy self-efficacy. More specifically, privacy invasion experiences are negatively associated with the perceived effectiveness of institutional privacy assurances. Research limitations/implications Privacy concerns are conceptualized as general concerns that reflect an individual’s worry about the possible loss of private information. The specific types of private information were not differentiated. Originality/value This paper is among the first to clarify the specific mechanisms through which privacy invasion experiences influence privacy concerns. Privacy concerns have long been viewed as resulting from individual actions. The study contributes to literature by linking privacy concerns with institutional privacy practice.


2021 ◽  
Vol ahead-of-print (ahead-of-print) ◽  
Author(s):  
Thanos Papaioannou ◽  
Aggeliki Tsohou ◽  
Maria Karyda

Purpose This paper aims to identify the data elements that social network sites (SNS) users consider important for shaping their digital identity and explore how users’ privacy concerns, self-esteem and the chosen SNS shape this process. Design/methodology/approach This study conducted an online survey with the participation of 759 individuals, to examine the influence of privacy concerns, self-esteem and the chosen SNS platform, on the shaping of the digital identity, through a classification of identity elements that users disclose when using a SNS, the Rosenberg self-esteem scale and relevant constructs from the literature. Findings Findings reveal that users consider the name, gender, picture, interests and job as most important elements for shaping their digital identity. They also demonstrate that privacy concerns do not seem to affect the amount of information users choose to publish when shaping their digital identity. Specific characteristics of SNS platforms are found to affect the way that users shape their digital identity and their privacy behavior. Finally, self-esteem was found to affect privacy concerns and digital identity formation. Research limitations/implications To avoid a lengthy questionnaire and the risk of low participation, the respondents answered the questions for one SNS of their choice instead of answering the full questionnaire for each SNS that they use. The survey included the most popular SNSs at the time of the survey in terms of popularity. Practical implications The results contribute to the theory by furthering our knowledge on the elements that shape digital identity and by providing evidence with regard to the role of privacy and self-esteem within social networking. In practice, they can be useful for SNS providers, as well as for entities that design security and privacy awareness campaigns. Originality/value This paper identifies novel factors that influence digital identity formation, including the specific SNS used with its particular characteristics in combination with privacy concerns and self-esteem of the user.


2021 ◽  
Vol ahead-of-print (ahead-of-print) ◽  
Author(s):  
Mengjun Li ◽  
Ayoung Suh

PurposeThe purpose of this study is to develop and test a theoretical model that accounts for an individual's we-intention to continue playing a mobile multiplayer game.Design/methodology/approachDrawing on habit-intention and habit formation theories, this study conceptualizes social play habit as a determinant of the we-intention to continue playing and identifies its antecedents. The proposed model was tested through a survey of 277 players of Honor of Kings, a popular mobile multiplayer game.FindingsThe results indicate that developing social play habit is critical to the formation of a we-intention to continue playing in the context of mobile multiplayer games. The results also suggest that technological (social features embedded in the game) and individual (desire for co-play and privacy concerns) factors jointly influence social play habit.Research limitations/implicationsThis study contributes to the literature on we-intention by conceptualizing social play habit and verifying its role in facilitating a shared intention to continue playing mobile multiplayer games. Our work responds to the call for understanding the mechanism by which multiple people form a shared intention to continue using an information technology at a collective level. Our findings provide significant insights into the design of information technologies for collaboration.Originality/valueThis study is among the first to extend the literature on gaming habits by considering other players' involvement. Specifically, our study shifts researchers' attention from gaming habits characterized by individual properties to social gaming habits characterized by communal properties.


2015 ◽  
Vol 53 (5) ◽  
pp. 1045-1060 ◽  
Author(s):  
Panagiotis Gkorezis

Purpose – The purpose of this paper is to elucidate the mediating mechanisms of the relationship between supervisor support and pro-environmental behavior. To this end, the quality of the dyadic exchanges between supervisor and subordinates was used. Design/methodology/approach – Data were collected from two different samples. In order to test the present hypotheses hierarchical regression and bootstrapping analysis were conducted. Findings – In congruence with the hypotheses, the results showed that leader-member exchange (LMX) served as a mediator in the relationship between supervisor support and pro-environmental behavior. Research limitations/implications – Data were drawn using a cross-sectional design. As a result, it is precarious to assess causality among the constructs. Furthermore, both studies collected data from a single source, namely employees, and this may inflate the present relationships due to common method bias. Originality/value – To the best of author’s knowledge, no prior empirical study has examined the pivotal role of LMX in affecting employees’ pro-environmental behavior.


2015 ◽  
Vol 49 (3) ◽  
pp. 305-324 ◽  
Author(s):  
Kuang-Ming Kuo ◽  
Paul C. Talley ◽  
Chen-Chung Ma

Purpose – The purpose of this paper is to propose and empirically test a theoretical model that considers the predictors of an individual’s perceptions of information privacy, and also how it relates to his/her behavioral intention toward approaching hospital web sites. Design/methodology/approach – This paper collects data using survey methodology. A total of 331 usable participants are gathered and analyzed via structural equation modeling. Findings – Significant predictors of information privacy concerns include a stated online privacy policy and a hospital’s reputation. Further, online privacy policy predicts a hospital’s reputation. Finally, hospital reputation and information privacy concerns significantly predict an individual’s behavioral intention toward approaching hospital web sites. Research limitations/implications – The study confirmed that an online privacy policy and reputation can effectively alleviate specific information privacy concerns; therefore, this may indicate that these two factors should be considered whenever investigating individuals’ information privacy concerns. Practical implications – To acquire a good reputation and to diminish individuals’ information privacy concerns toward hospital web sites, hospitals should pay attention to the posting of an online privacy policy and communicating such policies to given individuals. Originality/value – This paper fulfils the gap of exploring the relationship among online privacy policy, organization reputation, and information privacy concerns. Further, the hypothesized model and its findings could also provide useful information for managers who are intent on boosting hospital web site usage frequency patterns.


Sign in / Sign up

Export Citation Format

Share Document