Search Results Heading

MBRLSearchResults

mbrl.module.common.modules.added.book.to.shelf
Title added to your shelf!
View what I already have on My Shelf.
Oops! Something went wrong.
Oops! Something went wrong.
While trying to add the title to your shelf something went wrong :( Kindly try again later!
Are you sure you want to remove the book from the shelf?
Oops! Something went wrong.
Oops! Something went wrong.
While trying to remove the title from your shelf something went wrong :( Kindly try again later!
    Done
    Filters
    Reset
  • Discipline
      Discipline
      Clear All
      Discipline
  • Is Peer Reviewed
      Is Peer Reviewed
      Clear All
      Is Peer Reviewed
  • Item Type
      Item Type
      Clear All
      Item Type
  • Subject
      Subject
      Clear All
      Subject
  • Year
      Year
      Clear All
      From:
      -
      To:
  • More Filters
      More Filters
      Clear All
      More Filters
      Source
    • Language
564 result(s) for "privacy concerns"
Sort by:
Internet Privacy Concerns: An Integrated Conceptualization and Four Empirical Studies
Internet privacy concerns (IPC) is an area of study that is receiving increased attention due to the huge amount of personal information being gathered, stored, transmitted, and published on the Internet. While there is an emerging literature on IPC, there is limited agreement about its conceptualization in terms of its key dimensions and its factor structure. Based on the multidimensional developmental theory and a review of the prior literature, we identify alternative conceptualizations of IPC. We examine the various conceptualizations of IPC with four online surveys involving nearly 4,000 Internet users. As a baseline, study 1 compares the integrated conceptualization of IPC to two existing conceptualizations in the literature. While the results provide support for the integrated conceptualization, the second-order factor model does not outperform the correlated first-order factor model. Study 2 replicates the study on a different sample and confirms the results of study 1. We also investigate whether the prior results are affected by the different perspectives adopted in the wording of items in the original instruments. In study 3, we find that focusing on one's concern for website behavior (rather than one's expectation of website behavior) and adopting a consistent perspective in the wording of the items help to improve the validity of the factor structure. We then examine the hypothesized third-order conceptualizations of IPC through a number of alternative higher-order models. The empirical results confirm that, in general, the third-order conceptualizations of IPC outperform their lower-order alternatives. In addition, the conceptualization of IPC that has the best fit with the data contains a third-order general IPC factor, two second-order factors of interaction management and information management, and six first-order factors (i.e., collection, secondary usage, errors, improper access, control, and awareness). Study 4 cross-validates the results with another data set and examines IPC within the context of a nomological network. The results confirm that the third-order conceptualization of IPC has nomological validity, and it is a significant determinant of both trusting beliefs and risk beliefs. Our research helps to resolve inconsistencies in the key underlying dimensions of IPC, the factor structure of IPC, and the wording of the original items in prior instruments of IPC. Finally, we discuss the implications of this research.
Privacy in online proctoring systems in higher education: stakeholders’ perceptions, awareness and responsibility
While student privacy is frequently a topic of concern in studies about data-powered technologies in higher education, we still know little about handling student privacy in online proctoring systems (OPS). To better understand the challenges associated with student privacy in higher educational practice, we conducted an interview study examining various stakeholders’ understandings of privacy in OPS. We interviewed ten stakeholders–including teachers, students, and administration staff, such as the head of the department, the head of the IT department, and examination administrators–directly involved in the procurement and use of an online examination platform with proctoring features, in one of the largest universities in Scandinavia, to investigate stakeholders’ privacy perceptions, privacy concerns, privacy awareness, and perceived responsibility regarding the privacy practices of OPS. The findings show the participants perceive privacy in OPS as a seclusive and anonymous state of being, a way to control information, and an individual right. The results also point to stakeholders’ concerns regarding collecting sensitive information about the students, the possibility of information misuse, and improper access to students’ personal information. Furthermore, the study’s results identify trade-offs between the stakeholders’ concerns for privacy and the benefits of using OPS for examinations in higher education. This study underscores the need for higher education institutions to involve students and educators in procuring and deploying OPS and develop strategies for cultivating privacy awareness and responsible privacy practices. Finally, implications for developing responsible digital practices in higher education are discussed.
Including Individuals' Sense of Self in Digital Information Privacy
The nature of contemporary digital ecosystems causes concerns that affect the person, the individual-self, an integral part of an individual's information privacy calculus and hence a component of individuals' Information Privacy Concerns (IPC). Yet, prior IPC models overlook self-focused concerns. This study articulates two constructs, termed “loss of autonomy” (i.e., autonomy) and “control over profiling” (i.e., profiling), that reflect individuals' self-focused privacy concerns. Combining these new constructs with conventional IPC constructs that capture data-focused and device-focused concerns yields an IPC model made up of three dimensions: self-focused concerns, data-focused concerns, and device-focused concerns. The authors first develop instrument items for the proposed new constructs by way of theory-driven review of literature, expert feedback, pilot testing, and statistical validation then assess the items alongside established IPC constructs in an empirical study, the result of which is the proposed unified three-dimension IPC model.
SNS use reduction: a two-facet privacy concern perspective
PurposeWhile social networking sites (SNS) have many positive aspects, they can have several adverse outcomes, among which privacy violations are a vital concern. The authors first posit that concerns regarding privacy violations can drive attempts to reduce SNS use. Next, the authors note that these violations can have two sources: peers and the social media provider. Thus, there is a need to understand how this complex system of privacy concerns affects use reduction decisions. To do so, this paper aims to examine the separate and joint roles of institutional and peer privacy concerns in driving SNS use reduction.Design/methodology/approachBased on privacy calculus theory, the authors propose a theoretical model to explain SNS use reduction, with institutional and peer privacy concerns as independent variables. The authors empirically examine the research model using a sample of 258 SNS users.FindingsThis study reveals that institutional and peer privacy concerns independently increase one's intention to reduce SNS use and that institutional privacy concern strengthen the relation between peer privacy concern and the intention to reduce SNS use.Originality/valueResearch thus far has not examined how the two facets of privacy work in tandem to affect 'users' decisions to change their behaviors on SNS platforms. Considering the unique and joint effect of these facets can thus provide a more precise and realistic perspective. This paper informs theories and models of privacy and online user behavior change.
Internet Users' Information Privacy Concerns (IUIPC): The Construct, the Scale, and a Causal Model
The lack of consumer confidence in information privacy has been identified as a major problem hampering the growth of e-commerce. Despite the importance of understanding the nature of online consumers' concerns for information privacy, this topic has received little attention in the information systems community. To fill the gap in the literature, this article focuses on three distinct, yet closely related, issues. First, drawing on social contract theory, we offer a theoretical framework on the dimensionality of Internet users' information privacy concerns (IUIPC). Second, we attempt to operationalize the multidimensional notion of IUIPC using a second-order construct, and we develop a scale for it. Third, we propose and test a causal model on the relationship between IUIPC and behavioral intention toward releasing personal information at the request of a marketer. We conducted two separate field surveys and collected data from 742 household respondents in one-on-one, face-to-face interviews. The results of this study indicate that the second-order IUIPC factor, which consists of three first-order dimensions—namely, collection, control, and awareness—exhibited desirable psychometric properties in the context of online privacy. In addition, we found that the causal model centering on IUIPC fits the data satisfactorily and explains a large amount of variance in behavioral intention, suggesting that the proposed model will serve as a useful tool for analyzing online consumers' reactions to various privacy threats on the Internet.
Situational Privacy Concerns and Antecedent Factors
This study examines the factors that contribute to context-based, or situational, privacy concerns drawing upon the theoretic lens of attribution theory. We posit that situational privacy concerns develop through individuals' causal explanations of prior privacy incidents in addition to their trait-like, or dispositional, privacy concerns. Analysis of data from 156 participants confirms the significance of the relationships between a number of antecedent constructs and situational privacy concerns. The hypotheses developed to test these relationships were all supported through partial least squares, as were the psychometric properties of the scales used. The results further our understanding of context-based privacy concerns, particularly the mechanics of attribution in blaming, and holding online service providers responsible for privacy transgressions. Insights into situational privacy concerns help online service providers handle and ameliorate these concerns.
Privacy in the Digital Age: A Review of Information Privacy Research in Information Systems
Information privacy refers to the desire of individuals to control or have some influence over data about themselves. Advances in information technology have raised concerns about information privacy and its impacts, and have motivated Information Systems researchers to explore information privacy issues, including technical solutions to address these concerns. In this paper, we inform researchers about the current state of information privacy research in IS through a critical analysis of the IS literature that considers information privacy as a key construct. The review of the literature reveals that information privacy is a multilevel concept, but rarely studied as such. We also find that information privacy research has been heavily reliant on studentbased and USA-centric samples, which results in findings of limited generalizability. Information privacy research focuses on explaining and predicting theoretical contributions, with few studies in journal articles focusing on design and action contributions. We recommend that future research should consider different levels of analysis as well as multilevel effects of information privacy. We illustrate this with a multilevel framework for information privacy concerns. We call for research on information privacy to use a broader diversity of sampling populations, and for more design and action information privacy research to be published in journal articles that can result in IT artifacts for protection or control of information privacy.
Mobile Commerce and Consumer Privacy Concerns
M-commerce (mobile commerce) has been gaining popularity as the smartphones proliferated and the high speed mobile data networks become increasingly ubiquitous in the recent years. This study attempts to identify the unique marketing context and features of m-commerce as compared to e-commerce, and to explore how consumers' demographic differences may affect their concerns for information privacy (CFIP) in the context of m-commerce. The APCO model (Antecedents → Privacy Concerns → Outcomes) is used as a framework to help derive our research model. Two perspectives about m-commerce are explored. The m-commerce consumers' demographic differences and their concerns over privacy are analyzed, based on a survey of 278 mobile phone users in U.S. It has been found that the consumers' demographic differences have varying degrees of impact on their concerns for information privacy in the context of m-commerce. These varying degrees of privacy concerns need to be addressed to ensure the healthy growth in m-commerce.
ChatGPT: ethical concerns and challenges in academics and research
Introduction: The emergence of artificial intelligence (AI) has presented several opportunities to ease human work. AI applications are available for almost every domain of life. A new technology, Chat Generative Pre-Trained Transformer (ChatGPT), was introduced by OpenAI in November 2022, and has become a topic of discussion across the world. ChatGPT-3 has brought many opportunities, as well as ethical and privacy considerations. ChatGPT is a large language model (LLM) which has been trained on the events that happened until 2021. The use of AI and its assisted technologies in scientific writing is against research and publication ethics. Therefore, policies and guidelines need to be developed over the use of such tools in scientific writing. The main objective of the present study was to highlight the use of AI and AI assisted technologies such as the ChatGPT and other chatbots in the scientific writing and in the research domain resulting in bias, spread of inaccurate information and plagiarism. Methodology: Experiments were designed to test the accuracy of ChatGPT when used in research and academic writing. Results: The information provided by ChatGPT was inaccurate and may have far-reaching implications in the field of medical science and engineering. Critical thinking should be encouraged among researchers to raise awareness about the associated privacy and ethical risks.  Conclusions: Regulations for ethical and privacy concerns related to the use of ChatGPT in academics and research need to be developed.
Shopper-Facing Retail Technology: A Retailer Adoption Decision Framework Incorporating Shopper Attitudes and Privacy Concerns
Continual innovation and new technology are critical in helping retailers’ create a sustainable competitive advantage. In particular, shopper-facing technology plays an important role in increasing revenues and decreasing costs. In this article, we briefly discuss some of the salient retail technologies over the recent past as well as technologies that are only beginning to gain traction. Additionally, we present a shopper-centric decision calculus that retailers can use when considering a new shopper-facing technology. We argue that new technologies provide value by either increasing revenue through (a) attracting new shoppers, (b) increasing share of volume from existing shoppers, or (c) extracting greater consumer surplus, or decreasing costs through offloading labor to shoppers. Importantly, our framework incorporates shoppers by considering their perceptions of the new technology and their resulting behavioral reactions. Specifically, we argue that shoppers update their perceptions of fairness, value, satisfaction, trust, commitment, and attitudinal loyalty and evaluate the potential intrusiveness of the technology on their personal privacy. These perceptions then mediate the effect of the technology on shopper behavioral reactions such as retail patronage intentions and WOM communication. We present preliminary support for our framework by examining consumers’ perceptions of several new retail technologies, as well as their behavioral intentions. The findings support our thesis that shopper perceptions of the retailer are affected by new shopper-facing technologies and that these reactions mediate behavioral intentions, which in turn drives the ROI of the new technology.