Extended model of online privacy concern: what drives consumers’ decisions?

2019 ◽  
Vol 43 (5) ◽  
pp. 799-817 ◽  
Author(s):  
Ivan-Damir Anic ◽  
Jelena Budak ◽  
Edo Rajh ◽  
Vedran Recher ◽  
Vatroslav Skare ◽  
...  

Purpose The purpose of this paper is to investigate the relationship between individual and societal determinants of online privacy concern (OPC) and behavioral intention of internet users. The study also aims to assess the degree of reciprocity between consumers’ perceived benefits of using the internet and their OPC in the context of their decision-making process in the online environment. Design/methodology/approach The study proposes comprehensive model for analysis of antecedents and consequences of OPC. Empirical analysis is performed using the PLS–SEM approach on a representative sample of 2,060 internet users. Findings The findings show that computer anxiety and perceived quality of regulatory framework are significant antecedents of OPC, while traditional values and inclinations toward security, family and social order; and social trust are not. Furthermore, the study reveals that perceived benefits of using the internet are the predominant factor explaining the intention to share personal information and adopt new technologies, while OPC dominates in explanation of protective behavior. Research limitations/implications Although the authors tested an extended model, there might be other individual characteristics driving the level of OPC. This research covers just one country and further replications should be conducted to confirm findings in diverse socio-economic contexts. It is impossible to capture the real behavior with survey data, and experimental studies may be needed to verify the research model. Practical implications Managers should work toward maximizing perceived benefits of consumers’ online interaction with the company, while at the same time being transparent about the gathered data and their intended purpose. Considering the latter, companies should clearly communicate their compliance with the emerging new data protection regulation. Originality/value New extended model is developed and empirically tested, consolidating current different streams of research into one conceptual model.

2018 ◽  
Vol 69 (2) ◽  
pp. 106-130 ◽  
Author(s):  
Bruno Škrinjarić ◽  
Jelena Budak ◽  
Mateo Žokalj

his paper examines personality traits as antecedents of online privacy concern. The aim of the research is to analyze if and how personal characteristics of Internet users affect their concern for privacy in online environment. The theoretical framework consisting of the Big Five theory of personality traits has been used to test the variations in online privacy concern. The model includes a range of other variables that might affect online privacy concern, such as sociodemographic factors, cultural values and computer literacy. The empirical analysis is based on survey data collected in 2016 on a large sample of 2,060 Internet users in Croatia. Results of bothOLS and ordered probit estimations show that two personality traits dimensions, namely extraversion and neuroticism, signifi cantly determine the level of online privacy concern. The more extraverted, i.e., more energetic and outgoing Internet user is less concerned about his/her online privacy, whilst the more neurotic one is more concerned. Privacy awareness, computer anxiety and previous negative experience were also observed as antecedents, all positively affecting the level of privacy concern of Internet users. The results of this research fi ll the gap in the underexplored area of personality traits and onlineprivacy concern literature and contribute to developing an extended model of online privacy concern.


2021 ◽  
Vol ahead-of-print (ahead-of-print) ◽  
Author(s):  
Rhoydah Nyambane

Purpose The purpose of this paper is to establish the place of the printed book in the era of technological advancement with the assumption that the print media is facing imminent death in the face of readily available and convenient online information. Also the paper aims to assess how the development of new technologies have affected the production, circulation and readership of the printed book, especially among the young generation. Design/methodology/approach Explanatory study was used with closed-ended approach to collect data from 50 students of the Technical University of Kenya and 5 key informant interviews with selected book publishers in Nairobi. The uses and gratification theory was used to explore the knowledge-seeking behavior among the respondents. Findings Findings showed that more than 80% of the respondents preferred the internet to the printed book, which, according to them, has no future in the face of technological advancement. Book publishers, on the other hand, felt that the printed book has a bright future among specific audiences who are committed to it, and especially those in the rural areas who have no access to the internet. While they agreed that the internet has posed a major challenge to the sales and readership of the printed book significantly, it is helping in marketing the printed book as opposed to killing it. New bookshops in Nairobi and modern libraries in high schools, tertiary institutions and universities demonstrate that the printed book is not dying soon. Research limitations/implications The researcher experienced challenges in data collection as the respondents were busy preparing for final examinations and hence many of them were not willing to spare time to fill the questionnaire. To solve this, the researcher had to spend more time to collect data as opposed to if the students were free and ready to participate in the study without any pressure. Practical implications The findings can be used as a basis for further research to widen the scope that can help bring a wider perspective to the topic. The results can also inform policy guidelines on the topic and also contribute to the body of knowledge. Social implications The topic touches on social phenomena that are affecting a number of young people and their information-seeking habits in the era of digital revolution. The way the young generation seek and use information should be of interest not only to academic staff but also to policymakers. Originality/value The paper is original based on primary data that was collected by the researcher from the respondents. It is backed by secondary data to bridge the gap between theory and practice.


Author(s):  
Juliana Yamaguchi Neves da Rocha ◽  
Valéria Farinazzo Martins

In spite of the great potential for the development of mobile banking in Brazil, since the banking index reaches more than half of the population and the number of internet users is even higher, this potential is not evenly distributed among the age groups in the country. Taking into account the tendency to resist new technologies as one ages, this chapter aimed to identify the factors that lead the Brazilian population aged 45 years or over to use the internet and, within this spectrum, identify the barriers to the adoption of mobile banking technology. A questionnaire was applied and 113 responses were analyzed and categorized between functional and psychological aspects in these barriers. This chapter presents the results of this research.


2018 ◽  
Vol 12 (4) ◽  
pp. 452-471 ◽  
Author(s):  
Maryna Chepurna ◽  
Josep Rialp Criado

Purpose Value co-creation is an important topic of interest in marketing domain for the past decade. Co-creation via the internet has received a particular attention in the literature (O’Hern and Rindfleisch, 2010). Although there have been substantive number of studies of what motivates customers to participate in value co-creation in the internet-based platforms, there is a lack of research of what the deterrents are that may prevent customers from contributing their ideas online. This research was undertaken to define the deterrents from the customers and companies’ point of view. Furthermore, the difference, if exists, between the users’ and marketing professionals’ ranking of the inhibitors to co-creation online is also studied. Design/methodology/approach This exploratory qualitative research is based on 20 in-depth semi-structured interviews with customers and 20 in-depth semi-structured interviews with marketing specialists from different companies. Spearman’s rank correlation is applied to explore the relationship between the internet users’ and marketers’ responses. Findings There are nine constraining factors. The results show that although there is a repetition of the mentioned constraining factors indicated by the both groups of the interviewees, the ranking of the barriers is distinctive. Research Implications New conceptual information is received on what restrains customers from co-creation from both customers’ and companies’ point of view. Practical Implications This paper explains the potential problems to be confronted when launching a co-creation project in the internet-based platforms and offers managers a preliminary guide to comprehension of the users’ deterrents rating. Originality The paper that defines deterrents to co-creation online.


2020 ◽  
Vol ahead-of-print (ahead-of-print) ◽  
Author(s):  
Rajeesh Kumar N.V. ◽  
Arun M. ◽  
Baraneetharan E. ◽  
Stanly Jaya Prakash J. ◽  
Kanchana A. ◽  
...  

Purpose Many investigations are going on in monitoring, contact tracing, predicting and diagnosing the COVID-19 disease and many virologists are urgently seeking to create a vaccine as early as possible. Even though there is no specific treatment for the pandemic disease, the world is now struggling to control the spread by implementing the lockdown worldwide and giving awareness to the people to wear masks and use sanitizers. The new technologies, including the Internet of things (IoT), are gaining global attention towards the increasing technical support in health-care systems, particularly in predicting, detecting, preventing and monitoring of most of the infectious diseases. Similarly, it also helps in fighting against COVID-19 by monitoring, contract tracing and detecting the COVID-19 pandemic by connection with the IoT-based smart solutions. IoT is the interconnected Web of smart devices, sensors, actuators and data, which are collected in the raw form and transmitted through the internet. The purpose of this paper is to propose the concept to detect and monitor the asymptotic patients using IoT-based sensors. Design/methodology/approach In recent days, the surge of the COVID-19 contagion has infected all over the world and it has ruined our day-to-day life. The extraordinary eruption of this pandemic virus placed the World Health Organization (WHO) in a hazardous position. The impact of this contagious virus and scarcity among the people has forced the world to get into complete lockdown, as the number of laboratory-confirmed cases is increasing in millions all over the world as per the records of the government. Findings COVID-19 patients are either symptomatic or asymptotic. Symptomatic patients have symptoms such as fever, cough and difficulty in breathing. But patients are also asymptotic, which is very difficult to detect and monitor by isolating them. Originality/value Asymptotic patients are very hazardous because without knowing that they are infected, they might spread the infection to others, also asymptotic patients might be having very serious lung damage. So, earlier prediction and monitoring of asymptotic patients are mandatory to save their life and prevent them from spreading.


2017 ◽  
Vol 9 (3-2) ◽  
Author(s):  
Wan Ying Lee ◽  
Chee-Seng Tan ◽  
Poh Chua Siah

Online risks may result in unnecessary harm but these risks can be minimized by being online privacy concerned and by taking privacy protective actions. Few studies examined the impact of privacy concern and internet self-efficacy on the online technical protection privacy behavior. Therefore, this research aims to investigate the effect of privacy concern and internet self-efficacy on technical protection. Quantitative and purposive sampling methods were used in this study. Data were gathered via questionnaire surveys from 235 undergraduates from six universities in Malaysia. The questionnaire includes participants’ demographic data, internet addiction test, web user self-efficacy scale, privacy concern, and technical protection scale. Hierarchical multiple regression analyses were conducted to examine the effect of internet self-efficacy and privacy concern on technical protection, while controlling for gender, course type, and internet addiction. Results showed that both privacy concern and internet self-efficacy were significant predictors of technical protection. Moreover, mediation analysis showed that there was an indirect effect of internet self-efficacy on technical protection through privacy concern. The results contribute to literature by revealing how internet self-efficacy and privacy concern increase technical protection. The government and policy makers can design intervention and prevention programs that aim to boost privacy concern and internet self-efficacy, so that internet users are more capable of safeguarding their online privacy.  


2016 ◽  
Vol 14 (1) ◽  
pp. 4-15 ◽  
Author(s):  
Mirjam Jessica Curno

Purpose – The aim of this paper is to lay out some of the more complex issues arising in the area of publication ethics. The impact of electronic publishing and electronic information is a main focus of the paper. Design/methodology/approach – The paper draws in particular upon the work of the Committee on Publication Ethics including illustrative cases discussed at the forum, guidelines and discussion documents. Findings – Three areas are highlighted to stimulate discussion around challenges of publication ethics in the digital era. These are the role of the internet in facilitating misconduct, the issue of confidentiality in publishing and how incentives in research assessments drive author behavior. Originality/value – The paper brings together a variety of issues discussed under the broader umbrella of electronic information and new technologies in publishing.


2021 ◽  
Vol 1 (3) ◽  
pp. 20-28
Author(s):  
Asaad Khaleel Ibrahim

The internet has become a vital component of the twenty-first century as technology has advanced. The number of new technologies emerging in tandem with the qualities supplied by the Internet is rapidly increasing. The World Wide Web (WWW), which is commonly referred to as the world's largest information environment, is a vital virtual environment in which internet users may trade, read, and publish information using a Web browser. Web 1.0, Web 2.0, and Web 3.0 technologies have all been seen and are still being observed in this review paper. However, there is no clear definition for Web 4.0, which is a 4th generation web technology, in the literature. Web 4.0 has multiple dimensions, as seen by the first examples that have appeared. Big data, augmented reality, machine-to-machine communication (M2M), cloud computing, and artificial intelligence (AI) technologies, as well as smart agents, will be able to integrate in the future years. Web 4.0 is a web technology revolution that includes a new internet of things (IoT) that interacts with a variety of models. The goal of this study is to clarify the notion of Web 4.0, which is viewed as an intelligent and symbiotic (human-machine interaction) network with massive interfaces and linkages, as well as to contribute to the literature by studying its many dimensions and investigating its links with new generation technologies.


2021 ◽  
Author(s):  
◽  
Dale Stephens

<p>The Internet has rapidly become the world’s most prevalent form of communication. It can be accessed twenty-four hours a day from virtually any location in the world from a myriad of technologically savvy devices. Internet users can keep up to date with world events, watch movies, listen to music, interact with government agencies, analyse business trends, undertake research and maintain contact with people anywhere. The Internet also provides the ability for users to shop ‘online’ with virtually any product or service supplier anywhere in the world. This has created concerns regarding the use of personal information obtained through the medium of the Internet. An individual’s right to privacy is a right enshrined in legislation and through tort law. With the uptake of technology and the burgeoning use of the Internet the subject of online privacy has become a complex issue for law and policy makers both in New Zealand and internationally. The aim of this paper is to look at the online shopper or consumer and how their information could be protected. This paper looks at the key areas of privacy legislation, the storage of data and the rise of new technologies including ‘cloud’ computing and suggests that the complexity of online privacy is such that a different approach to access and use of personal information of online shoppers may be required. The rate of technology change, the enormity of the data capture situation and the international accessibility of the Internet are all factors that create an almost impossible situation for ensuring consumer privacy so this paper proposes that the onus moves away from the law and policy makers and put into the hands of the users of the Internet.</p>


2017 ◽  
Vol 7 (4) ◽  
pp. 611-636
Author(s):  
Turgay Alakurt

The purpose of this study was to adapt "Online Privacy Concern Scale" developed by Buchanan, Paine, Joinson and Reips (2007) to Turkish culture. The original version of the scale was composed of 16 items gathered under a one-factor structure. During the translation process, expert opinions were taken for the language validity. The scale was pre-administered to 40 participants to pursue linguistic equality. To determine the validity and reliability evidence of the scale, it was administered to two separate groups consisting of adult Internet users. In order to examine and confirm the scale structure, exploratory and confirmatory factor analyses (EFA and CFA) were conducted. After eliminating two items, EFA showed that the scale had a three-factor structure (email usage, online trust and online payment) in Turkish culture. The Cronbach's Alpha internal consistency of the whole scale was .89. In addition, CFA verified the three-factor solution. The results of the current study confirmed that the Turkish version of the scale is a valid and reliable measurement tool for the assessment of online privacy concern of adult Internet users.


Sign in / Sign up

Export Citation Format

Share Document