Antecedents of Online Privacy Protection Behavior

Cyber Crime ◽  
2013 ◽  
pp. 69-82 ◽  
Author(s):  
Anil Gurung ◽  
Anurag Jain

Individuals are generally concerned about their privacy and may withhold from disclosing their personal information while interacting with online vendors. Withholding personal information can prevent online vendors from developing profiles to match needs and wants. Through a literature review of research on online privacy, we develop an integrative framework of online privacy protection.

2009 ◽  
pp. 151-164
Author(s):  
Anil Gurung ◽  
Anurag Jain

Individuals are generally concerned about their privacy and may withhold from disclosing their personal information while interacting with online vendors. Withholding personal information can prevent online vendors from developing profiles to match needs and wants. Through a literature review of research on online privacy; we develop an integrative framework of online privacy protection.


Cyber Crime ◽  
2013 ◽  
pp. 814-831
Author(s):  
J. Michael Tarn ◽  
Naoki Hamamoto

This chapter explores the current status and practices of online privacy protection in Japan. Since the concept of privacy in Japan is different from that in western countries, the background of online privacy concepts and control mechanisms are discussed. The chapter then introduces Japan’s Act on the Protection of Personal Information along with the privacy protection system in Japan. Following the discussion of the privacy law, Japan’s privacy protection mechanisms to support and implement the new act are examined. To help companies make smooth adjustments and transitions, a four-stage privacy protection solution model is presented. Further, this chapter discusses two case studies to exemplify the problems and dilemmas encountered by two Japanese enterprises. The cases are analyzed and their implications are discussed. The chapter is concluded with future trends and research directions.


Author(s):  
Maria Grazia Lo Cricchio ◽  
Benedetta E. Palladino ◽  
Androulla Eleftheriou ◽  
Annalaura Nocentini ◽  
Ersilia Menesini

Abstract. The amount of personal information shared online every day by youths without control has raised concerns about their vulnerability to privacy disclosure. Parental mediation strategies have been considered as important aspects that can contribute to the reduction of online-related risks. However, research on this field has shown puzzling results and there is not a consistent investigation of the specific role of parental mediation in youths’ online privacy management. Therefore, this systematic review was aimed at examining the evidence for associations between different parental mediation strategies and aspects of both privacy disclosure and protection. The search was conducted in December 2019 in the SCOPUS and Web of Science scientific databases and resulted in 17 studies that have been included in our review. Taken together, the results confirm that mediation practices can be considered as important variables for the reduction of information disclosure and for enhancing privacy protection. However, some specificities emerged. Restrictive forms of mediation showed clear negative associations with disclosing behaviors, whereas active strategies showed more contrasting results. Moreover, restrictive practices seemed to be less linked to attitudes and beliefs of privacy protection than active forms. More research is needed concerning the role of co-viewing strategies. Findings were discussed in terms of future research and intervention.


2009 ◽  
pp. 370-387
Author(s):  
J. Michael Tarn

This chapter explores the current status and practices of online privacy protection in Japan. Since the concept of privacy in Japan is different from that in western countries, the background of online privacy concepts and control mechanisms are discussed. The chapter then introduces Japan’s Act on the Protection of Personal Information along with the privacy protection system in Japan. Following the discussion of the privacy law, Japan’s privacy protection mechanisms to support and implement the new act are examined. To help companies make smooth adjustments and transitions, a four-stage privacy protection solution model is presented. Further, this chapter discusses two case studies to exemplify the problems and dilemmas encountered by two Japanese enterprises. The cases are analyzed and their implications are discussed. The chapter is concluded with future trends and research directions.


2019 ◽  
pp. 121-143
Author(s):  
Riccardo Resciniti ◽  
Federica De Vanna

The rise of e-commerce has brought considerable changes to the relationship between firms and consumers, especially within international business. Hence, understanding the use of such means for entering foreign markets has become critical for companies. However, the research on this issue is new and so it is important to evaluate what has been studied in the past. In this study, we conduct a systematic review of e-commerce and internationalisation studies to explicate how firms use e-commerce to enter new markets and to export. The studies are classified by theories and methods used in the literature. Moreover, we draw upon the internationalisation decision process (antecedents-modalities-consequences) to propose an integrative framework for understanding the role of e-commerce in internationalisation


2009 ◽  
Vol 9 (4) ◽  
pp. 339-348 ◽  
Author(s):  
John-ren Chen ◽  
Christian Smekal

Electronic commerce may be a great equalizer that helps to reduce, or even to eliminate, distance-related barriers to trade, but it can also exacerbate a so-called ‘digital dividend’ vis-à-vis countries with technological and infrastructural deficiencies, especially developing countries. In the following we concentrate on trade distortion caused by taxation of e-trade in intangible goods. We believe this will have a particular ramification for the developing world. General Agreement on Trade in Services (GATS) provisions may be relevant to many concerns with respect to the regulations of e-commerce, such as online privacy protection, illegal or illicit content, cyber crime and fraud, en-forcement of contracts, consumer protection, and taxation. In this paper, we will focus our debate mainly on the issues of taxation of e-trade with respect to the two basic principles of the WTO, that is. the Most Favoured Nation (MFN) and the National Treatment (NT) principles.


Author(s):  
Bailing Liu ◽  
Paul A. Pavlou ◽  
Xiufeng Cheng

Companies face a trade-off between creating stronger privacy protection policies for consumers and employing more sophisticated data collection methods. Justice-driven privacy protection outlines a method to manage this trade-off. We built on the theoretical lens of justice theory to integrate justice provision with two key privacy protection features, negotiation and active-recommendation, and proposed an information technology (IT) solution to balance the trade-off between privacy protection and consumer data collection. In the context of mobile banking applications, we prototyped a theory-driven IT solution, referred to as negotiation, active-recommendation privacy policy application, which enables customer service agents to interact with and actively recommend personalized privacy policies to consumers. We benchmarked our solution through a field experiment relative to two conventional applications: an online privacy statement and a privacy policy with only a simple negotiation feature. The results showed that the proposed IT solution improved consumers’ perceived procedural justice, interactive justice, and distributive justice and increased their psychological comfort in using our application design and in turn reduced their privacy concerns, enhanced their privacy awareness, and increased their information disclosure intentions and actual disclosure behavior in practice. Our proposed design can provide consumers better privacy protection while ensuring that consumers voluntarily disclose personal information desirable for companies.


2021 ◽  
Vol 13 (1) ◽  
pp. 20-39
Author(s):  
Ahmed Aloui ◽  
Okba Kazar

In mobile business (m-business), a client sends its exact locations to service providers. This data may involve sensitive and private personal information. As a result, misuse of location information by the third party location servers creating privacy issues for clients. This paper provides an overview of the privacy protection techniques currently applied by location-based mobile business. The authors first identify different system architectures and different protection goals. Second, this article provides an overview of the basic principles and mechanisms that exist to protect these privacy goals. In a third step, the authors provide existing privacy protection measures.


Sign in / Sign up

Export Citation Format

Share Document