167 research outputs found

    Consumer privacy: understanding the acceptance of consumer information collection

    Get PDF

    Consumers’ privacy calculus:The PRICAL index development and validation

    Get PDF
    Although collecting personal information about consumers is crucial for firms and marketers, understanding of when and why consumers accept or reject information collection remains limited. The authors conceptualize a privacy calculus that represents a consumer's trade–off of the valence and uncertainty of the consequences of the collection, storage, and use of personal information. For example, usage-based car insurance requires drivers to share data on their driving behavior in exchange for a discount (certain benefit) but at the risk of third parties intercepting location data for malicious use (uncertain disadvantage). Building on this conceptualization, the authors develop the privacy calculus (PRICAL) index. They empirically confirm the validity of the items (Study 1) and the index as a whole (Study 2). The PRICAL index is generally applicable and improves the explanation of behavioral intentions (Study 2) and actual behavior (Study 3), compared with currently used constructs (e.g., privacy concern, trust). Overall, the PRICAL index allows managers to understand consumers’ acceptance of information collection regarding financial, performance, psychological, security, social, and time-related consequences, which the authors demonstrate using the top five most valuable digital brands (Study 4)

    The privacy paradox applies to IoT devices too:a Saudi Arabian study

    Get PDF
    The “privacy paradox” is the term used to describe the disconnect between self-reported privacy value attributions and actions actually taken to protect and preserve personal privacy. This phenomenon has been investigated in a number of domains and we extend the body of research with an investigation in the IoT domain. We presented participants with evidence of a specific IoT device’s (smart plug) privacy violations and then measured changes in privacy concerns and trust, as well as uptake of a range of behavioural responses. Our Saudi Arabian participants, despite expressing high levels of privacy concerns, generally chose not to respond to this evidence with preventative action. Most preferred to retain the functionality the smart device offered, effectively choosing to tolerate likely privacy violations. Moreover, while the improved awareness increased privacy concerns and reduced trust in the device straight after the experiment, these had regressed to pre-awareness levels a month later. Our study confirms the existence of the privacy paradox in the Saudi Arabian IoT domain, and also reveals the limited influence awareness raising exerts on long-term privacy concern and trust levels

    Antecedents of Continuance Intention of RFID Technology in Western Australian Farms

    Get PDF
    In literature, adoption and continuance of an innovation have been considered as discrete events and discussed in separate models. This study argues that these are interrelated and continuous processes. The objective of this study is to investigate the adoption and continuance behaviour of a technological innovation in a single framework taking Radio Frequency Identification (RFID) as the context. Applying the quantitative research approach, this study finds that external environment, the technology itself, and the organization factors influence RFID adoption whereas the continuance of RFID technology is dependent on confirmation and satisfaction from using the technology. Moreover, confirmation is the immediate next stage of adoption where the adopters justify their adoption decision and take required actions and/or adjustments. Data were analysed using Partial Least Square (PLS)- based Structured Equation Modelling (SEM) tool. The discussion and implications on the findings are discussed in detail

    Consumer privacy: understanding the acceptance of consumer information collection

    Get PDF
    In ons huidige ‘informatietijdperk’ is de privacy van consumenten een belangrijk issue geworden. Door de acceptatie van informatieverzameling door consumenten te bestuderen helpt dit proefschrift bedrijven beter om te gaan met de privacy van consumenten. Hiervoor bediscussiëren we eerst wat ‘consumentenprivacy’ betekent. Daarna vatten we de huidige kennis over de invloed van de verzameling, opslag, en gebruik van informatie door bedrijven, en de mate van transparantie en controle over deze elementen, op consumenten samen. Op basis hiervan identificeren we onderwerpen waar meer kennis nodig is, waar we vervolgens onderzoeksproposities voor formuleren om richting te geven aan toekomstig onderzoek. Om de acceptatie van informatieverzameling van consumenten beter te begrijpen ontwikkelen en valideren we een meetinstrument (PRICAL index). Door zowel de valentie (positief én negatief) als de waarschijnlijkheid van de consequenties van informatieverzameling mee te nemen zijn we beter in staat om de acceptatie van informatieverzameling door consumenten te verklaren. Daarnaast bestuderen we consumentenprivacy vanuit het perspectief van bedrijven door te laten zien dat de invloed van het privacy-beleid van een bedrijf op een consument verschilt per industrie. Hoewel alle elementen van het privacy-beleid (verzameling, opslag, gebruik, transparantie, controle) invloed hebben op de keuze die een consument maakt, blijkt dat met name in industrieën met gevoelige informatie de verzameling en het gebruik van informatie van belang zijn. Daarnaast hangt de invloed van het privacy beleid van een bedrijf af van hoe men binnen een industrie met privacy omgaat. Samengevat genereert dit proefschrift meer kennis over de invloed van privacy op bedrijven en consumenten

    Mobil ödeme uygulamasının risklerini almaya hazır mısınız? erken benimseyen ve son benimseyen tüketicilerin karşılaştırması

    Get PDF
    Mobile payment apps are rather a new, but a quickly developing technology which newly takes attention of the academicians and practitioners. In order for them to be accepted by the masses, first of all, risks that are related to the use of technology should be understood. This study is an attempt to understand the related risks with the mobile payment apps while differentiating between early adopters and laggards. To do this, a research model that reflects the three risk factors, namely financial, privacy and security risk, are developed on the technology acceptance model (TAM). The model is empirically tested by structural equation modeling with a dataset of 133 early adopters and 105 laggards. The results imply that there are different perceptions of risks of early adopters and laggards in m-payment app use. Additionally, their attitude toward the app use and their intention to use the mobile payment apps are dependent on different factors for early adopters and laggards.Mobil ödeme uygulamaları oldukça yeni, ancak hızla gelişen bir teknoloji olarak akademisyenlerin ve uygulayıcıların yeni yeni dikkatini çekmektedir. Kitleler tarafından kabul edilebilmesi için öncelikle mobil ödeme uygulama teknolojisinin kullanımı ile ilgili risklerin anlaşılması gerekmektedir. Bu çalışma, mobil ödeme uygulamalarıyla ilgili tüketicilerin algıladığı riskleri anlamaya çalışırken, aynı zamanda yeniliklerin adaptasyonu eğrisindeki erken benimseyenler ve son benimseyenler arasındaki farkları da araştırmaya yönelik bir girişimdir. Bu amaçlara ulaşmak için, teknoloji kabul modeli (TAM) üzerinde üç risk faktörünü, yani finansal risk, gizlilik riski ve güvenlik riski, yansıtan bir araştırma modeli geliştirilmiştir. Oluşturulan model yapısal eşitlik modellemesi kullanılarak, 133 erken benimseyen ve 105 geç benimseyen tüketicilerden oluşan bir veri kümesiyle ampirik olarak test edilmiştir. Sonuçlar, mobil ödeme uygulamalarını kullanmak konusunda erken benimseyen tüketicilerin ve geç benimseyen tüketicilerin farklı risk algılamaları olduğunu ortaya koymaktadır. Bu sonuca ek olarak, mobil ödeme uygulamalarını kullanımına yönelik tutumları ve kullanma niyetleri, erken benimseyen tüketiciler ve geç benimseyen tüketiciler için farklı faktörlerden etkilenmektedir.Publisher's Versio

    Familiarity with Big Data, Privacy Concerns, and Self-disclosure Accuracy in Social Networking Websites: An APCO Model

    Get PDF
    Social networking websites have not only become the most prevalent communication tools in today’s digital age but also one of the top big data sources. Big data advocates promote the promising benefits of big data applications to both users and practitioners. However, public polls show evidence of heightened privacy concerns among Internet and social media users. We review the privacy literature based on protection motivation theory and the theory of planned behavior to develop an APCO model that incorporates novel factors that reflect users’ familiarity with big data. Our results, which we obtained from using a cross-sectional survey design and structural equation modeling (SEM) techniques, support most of our proposed hypotheses. Specifically, we found that that awareness of big data had a negative impact on and awareness of big data implications had a positive impact on privacy concerns. In turn, privacy concerns impacted self-disclosure concerns positively and self-disclosure accuracy negatively. We also considered other antecedents of privacy concerns and tested other alternative models to examine the mediating role of privacy concerns, to control for demographic variables, and to investigate different roles of the trust construct. Finally, we discuss the results of our findings and the theoretical and practical implications

    An Empirical Analysis to Control Product Counterfeiting in the Automotive Industry\u27s Supply Chains in Pakistan

    Get PDF
    The counterfeits pose significant health and safety threat to consumers. The quality image of firms is vulnerable to the damage caused by the expanding flow of counterfeit products in today’s global supply chains. The counterfeiting markets are swelling due to globalization and customers’ willingness to buy counterfeits, fueling illicit activities to explode further. Buyers look for the original parts are deceived by the false (deceptive) signals’ communication. The counterfeiting market has become a multi-billion industry but lacks detailed insights into the supply side of counterfeiting (deceptive side). The study aims to investigate and assess the relationship between the anti-counterfeiting strategies and improvement in the firm’s supply performance within the internal and external supply chain quality management context in the auto-parts industry’s supply chains in Pakistan

    Examining citizens' perceived value of internet of things technologies in facilitating public sector services engagement

    Get PDF
    YesWith the advancement of disruptive new technologies, there has been a considerable focus on personalisation as an important component in nurturing users' engagement. In the context of smart cities, Internet of Things (IoT) offer a unique opportunity to help empower citizens and improve societies' engagement with their governments at both micro and macro levels. This study aims to examine the role of perceived value of IoT in improving citizens' engagement with public services. A survey of 313 citizens in the UK, engaging in various public services, enabled through IoT, found that the perceived value of IoT is strongly influenced by empowerment, perceived usefulness and privacy related issues resulting in significantly affecting their continuous use intentions. The study offers valuable insights into the importance of perceived value of IoT-enabled services, while at the same time, providing an intersectional perspective of UK citizens towards the use of disruptive new technologies in the public sector
    corecore