The Effects of Information Privacy Concerns and Perceived Severity of Private Information Damage on Use of Easy Payment Service - Focusing on Mediation Effect of Information Privacy Protection Behavior

2019 ◽  
Vol 30 (6) ◽  
pp. 251-270
Author(s):  
Seong Lim Lee ◽  
Xiaoxi Song
Author(s):  
Eko Wahyu Tyas Darmaningrat ◽  
Hanim Maria Astuti ◽  
Fadhila Alfi

Background: Teenagers in Indonesia have an open nature and satisfy their desire to exist by uploading photos or videos and writing posts on Instagram. The habit of uploading photos, videos, or writings containing their personal information can be dangerous and potentially cause user privacy problems. Several criminal cases caused by information misuse have occurred in Indonesia.Objective: This paper investigates information privacy concerns among Instagram users in Indonesia, more specifically amongst college students, the largest user group of Instagram in Indonesia.Methods: This study referred to the Internet Users' Information Privacy Concerns (IUIPC) method by collecting data through the distribution of online questionnaires and analyzed the data by using Structural Equation Modelling (SEM).Results: The research finding showed that even though students are mindful of the potential danger of information misuse in Instagram, it does not affect their intention to use Instagram. Other factors that influence Indonesian college students' trust are Instagram's reputation, the number of users who use Instagram, the ease of using Instagram, the skills and knowledge of Indonesian students about Instagram, and the privacy settings that Instagram has.Conclusion: The awareness and concern of Indonesian college students for information privacy will significantly influence the increased risk awareness of information privacy. However, the increase in risk awareness does not directly affect Indonesian college students' behavior to post their private information on Instagram.


Author(s):  
Mohammed A. Alarefi

Online information privacy has become a developing social worry that may hinder individuals' social site associations. The motivation behind this investigation is to dissect the effect of an err toward privacy and the social presence of a website on a person's privacy concerns about the website. Data were collected from 650 respondents in Saudi Arabia. The findings indicate a significance influence of informativness, social presence, utility of website, perceived severity, and self-efficacy on website-specific privacy concerns. Furthermore, privacy concerns have a significant influence on behavioural intentions. This study also extends the information privacy literature through the analysis of the drivers and outcomes of online privacy concerns in the social network context.


Author(s):  
Joseph Kwame Adjei

Monetization of personal identity information has become a major component of modern business models, contributing to dramatic innovations in the collection, aggregation, and use of personal information. This phenomenon is commonplace given that parties to business transactions and social interactions usually rely on the issue of claims and disclosure of unique attributes and credentials for proof and verification of identity. However, the heightened societal information privacy concerns and the diminishing level of trust between transacting parties make such attempts to monetize personal information a very risky endeavor. This chapter examines the major technological and regulatory imperatives in the monetization of personal identity information. The resulting monetization model provides an important source of reference for effective monetization of personal information.


Biometrics ◽  
2017 ◽  
pp. 1522-1542
Author(s):  
Regina Connolly ◽  
Grace Kenny

Information privacy research historically focuses on exploring individuals' concerns in the transaction environment. However, the recent growth of technology-enabled workplace surveillance is raising many concerns over employees' privacy. Employee surveillance practices are becoming increasingly prevalent, ranging from monitoring internet and email activities to capturing employees' interactions with customers and employees' personal health and fitness data using wearable health devices. Individuals may understand that employers can monitor their activities, but may not the potential uses or the repercussions of such monitoring. Moreover, employees may not feel they have the ability to opt-out of this monitoring. This chapter explores the privacy and ethical issues surrounding emerging means of workplace surveillance. The chapter considers both employee and employer perspectives and poses many questions to consider when deciding when does legitimate monitoring become an invasion of employee privacy?


Author(s):  
Joseph Kwame Adjei

Monetization of personal identity information has become a major component of modern business models, contributing to dramatic innovations in the collection, aggregation, and use of personal information. This phenomenon is commonplace given that parties to business transactions and social interactions usually rely on the issue of claims and disclosure of unique attributes and credentials for proof and verification of identity. However, the heightened societal information privacy concerns and the diminishing level of trust between transacting parties make such attempts to monetize personal information a very risky endeavor. This chapter examines the major technological and regulatory imperatives in the monetization of personal identity information. The resulting monetization model provides an important source of reference for effective monetization of personal information.


Author(s):  
Scott Flinn ◽  
Scott Buffett

This chapter discusses privacy from the perspective of the consumer of e-services. It proposes a technique for risk management assessment designed to help consumers evaluate a situation to identify and understand potential privacy concerns. The technique centers around a series of questions based on common principles of privacy protection. The chapter discusses how a consumer can understand exposure risks and how information can be controlled and monitored to mitigate the risks. It also proposes a method for assessing the consumer’s value of personal information, and a mechanism for automated negotiation is presented to facilitate fair, private information exchange. The authors believe that these or similar techniques are essential to give consumers of e-services meaningful control over the personal information they release. This forward-looking chapter provides a foundation for developing methods to empower users with control over their private information.


2013 ◽  
Vol 10 (3) ◽  
pp. 348-356
Author(s):  
Yolanda Jordaan

Within the current privacy sensitive environment, an understanding of consumers’ information privacy concerns is critical. The objective of the study is to establish whether there is a difference between victims and non-victims of information privacy invasion, and whether this has an influence on their privacy concerns and protective behaviour. A probability (systematic) sampling design was used to draw a representative sample of 800 households where-after 800 telephone interviews were conducted with adults from these households. The findings show that victims had increased concern about information misuse by, and solicitation practices of, organisations, and they exhibit more protective behaviour than non-victims. This suggests that organisations should recognise that consumers believe that they have ownership of their personal information. Furthermore, organisations should share information of consumers in a way that is respectful, relevant and beneficial.


Sign in / Sign up

Export Citation Format

Share Document