Privacy Concerns and Levels of Information Exchange: An Empirical Investigation of Intended e-Services Use

2006 ◽  
Vol 4 (3) ◽  
pp. 25 ◽  
Author(s):  
Dinev ◽  
Hart
2020 ◽  
Vol 55 (1) ◽  
pp. 219-246
Author(s):  
Ruwan Bandara ◽  
Mario Fernando ◽  
Shahriar Akter

Purpose The purpose of this study is to examine privacy issues in the e-commerce context from a power-responsibility equilibrium theory (PRE) perspective. Design/methodology/approach The data was collected using an online survey (n = 335) from online shopping consumers. This study used partial least squares-structural equation modeling (PLS-SEM) and fuzzy-set qualitative comparative analysis (fsQCA) techniques to empirically examine the proposed relationships. Findings A lack of corporate privacy responsibility and regulatory protection can deprive consumers of privacy empowerment and damage consumer trust to trigger privacy concerns and subsequent defensive responses. Also, the fsQCA revealed five causal configurations to explain high consumer defensive behaviours. Research limitations/implications This study identifies the importance of PRE theory in the privacy context. Consumer privacy concerns, privacy empowerment and trust are established as strong mediators between corporate/regulatory privacy protection efforts and consumer backlash. The application of fsQCA verified that consumer privacy behaviour can be better explained by different configurations of the same causal antecedents. Practical implications The findings highlight the importance of increasing trust and privacy empowerment as mechanisms to manage privacy concerns and consumer backlash through responsible organisational and regulatory privacy protections. The importance of balancing power and responsibility dynamics for maintaining a healthy information exchange environment is identified. Originality/value This study extends the PRE framework of privacy to include corporate privacy responsibility, privacy empowerment and trust. This is one of the first studies to explore both antecedents and outcomes of privacy empowerment. Also, the application of complexity theory and fsQCA to explain consumers’ defensive responses is novel to the literature.


Author(s):  
Scott Flinn ◽  
Scott Buffett

This chapter discusses privacy from the perspective of the consumer of e-services. It proposes a technique for risk management assessment designed to help consumers evaluate a situation to identify and understand potential privacy concerns. The technique centers around a series of questions based on common principles of privacy protection. The chapter discusses how a consumer can understand exposure risks and how information can be controlled and monitored to mitigate the risks. It also proposes a method for assessing the consumer’s value of personal information, and a mechanism for automated negotiation is presented to facilitate fair, private information exchange. The authors believe that these or similar techniques are essential to give consumers of e-services meaningful control over the personal information they release. This forward-looking chapter provides a foundation for developing methods to empower users with control over their private information.


2008 ◽  
Vol 23 (1) ◽  
pp. 1-17
Author(s):  
Park Jung Hun

Administrative information sharing is being promoted by the Korean government as an innovative measure to improve the quality of public service. At the same time, public concerns for privacy infringement are escalating. The core controversy is whether the policy can offer strong public goods to offset the cost of the potential infringement of privacy rights. Since it is citizens who will pay the cost of restricted privacy rights, according to the policy, administrative information-sharing should be designed and implemented throroughly from the citizens' policy-supportive attitudes toward administrative information-shring. An empirical study was carried out and the results revealed that public trust in government, public opinion, policy benefit, and privacy concerns have significant effects on citizens' support for the policy. The results are discussed in order to draw out policy implications for the successful implementation of administrative information-shring in Korea.


2021 ◽  
Vol 0 (0) ◽  
Author(s):  
Anja Stevic ◽  
Desirée Schmuck ◽  
Anna Koemets ◽  
Melanie Hirsch ◽  
Kathrin Karsay ◽  
...  

Abstract Mobile social media have become a widespread means to participate in everyday social and professional life. These platforms encourage the disclosure and exchange of personal information, which comes with privacy risks. While past scholarship has listed various predictors and consequences of online privacy concerns, there has been to date no empirical investigation of a conceivable relationship with perceived stress. Using a longitudinal panel study, we examined the reciprocal relationship between mobile social media privacy concerns and perceived stress. Results supported the hypothesis that mobile social media privacy concerns at T1 are associated with higher perceived stress at T2. However, we found no evidence for the reverse association, that is, perceived stress at T1 was not related to mobile social media privacy concerns at T2. The findings are discussed based on two models—the “Antecedents privacy concerns outcomes” model and the “Privacy calculus” model.


Author(s):  
Dmitry Epstein ◽  
Kelly Quinn

The goals of this study are two-fold. We extend established models linking attitudes related to privacy concerns and privacy protecting behavior (PPB) by (a) differentiating between horizontal (social) and vertical (institutional) orientations of PPB as capturing an aspect of privacy multidimensionality, and (b) introducing additional explanatory factors such as privacy literacy and privacy self-efficacy into the modeling of PPB. We survey a representative sample of 686 US social media users to test relationships between privacy concern, trust, privacy self-efficacy, privacy literacy, and vertical and horizontal PPB. We find privacy concerns contribute to horizontal and vertical PPB at different levels, reinforcing the dimensionality of privacy. We also find that privacy literacy and privacy self-efficacy are important factors in explaining dimensional privacy behaviors and moderate the established relationships between privacy concerns and PPB.


2020 ◽  
pp. 328-350
Author(s):  
Basmah Almoaber ◽  
Daniel Amyot

Background: Despite the potential benefits of health information exchange (HIE) and the two decades of efforts from the Canadian and the American governments to promote health exchange projects, failures far outnumber successes. Objective: To better understand the barriers influencing the adoption and implementation of inter-organization HIE systems in Canada and the USA. Method: A systematic literature review was conducted to examine English-language studies that identified barriers to HIE in Canada and the USA between 1995 and 2016. Electronic databases, backward searching and expert consultations were used. Results: 31 articles have been included. There is a dearth of publications reported on the HIE barriers in Canada. A total of 33 barriers have been identified. Conclusion: There are noticeable differences in the barriers reported in these countries. Privacy concerns and a lack of stakeholder buy-in are recurring barriers over time in the USA. Low adoption of electronic medical records is the main barrier in Canada.


2016 ◽  
Vol 28 (4) ◽  
pp. 73-90
Author(s):  
Chen Zhang ◽  
Judith C. Simon ◽  
Euntae “Ted” Lee

Given the rising IT security and privacy concerns, organizations are increasing their spending to strengthen technical protections. However, the problem of individuals wanting to find ways to gain access to IT resources improperly remains. To gain a better understanding of individuals' intentions to behave unacceptably in IT-related situations with conflicting interests, an information focus approach is adopted and the effects of information regarding possible consequences on their intentions is empirically investigated through a vignette-based survey. The findings not only confirm the deterrent role of information about possible negative consequence in these situations but also reveal that such influence is greater in situations involving software products than in situations involving data and for individuals with a higher level of fundamental concern for the welfare of others. Furthermore, this study reveals how the influence of consequence information on the intention to perform an unacceptable behavior may be dependent on individual factors and situational factors.


Sign in / Sign up

Export Citation Format

Share Document