94 research outputs found

    Influence of the Web Vendor\u27s Interventions on Privacy-related Behaviors in E-commerce

    Get PDF
    Concern about information privacy is considered one of the most important issues in e-commerce. To deal with this concern in the context of self-regulation, e-commerce web sites have implemented measures such as posting privacy policies and displaying third party seals. The purpose of this study is to examine the impact of the level at which a web site addresses privacy has on the users\u27 perceptions and behavioral intentions during the initial interaction with the web site. A research model is presented and empirically tested by means of an experiment. The study showed that web vendors\u27 interventions had an overall effect on the user perceptions of information privacy in the site. However, having more privacy elements in the web site did not increase the favorable perceptions of the web site. The research model also incorporated other privacy related constructs such as general concern about online privacy and type of information

    Comparative Analysis of Privacy Concerns in Website Register Process between China and Korea

    Get PDF
    Abstract: Personal information privacy is fast becoming one of the most important ethical issues of our information society. Most of Internet users and non-Internet users are concerned about the protection of their privacy information in Internet. This empirical research developed a model based on the Theory of Reasoned Action and Theory of Planning Behavior, which try to address the relationships among protect regulations and differences in concerns for information privacy between China and Korea. This study used structural equation modeling to validate the proposed research model. The result illustrate that the level of concerns for information privacy in Korea is higher than what in China. For Korea, the influence of concern for information privacy is mediated by trust beliefs and administrative regulations. For China, The concern for information privacy of Internet users impacts their risk beliefs and regulation positively, but not affects their trust beliefs. Key words: Privacy information; Website register; SEM modelRésumé: La confidentialité des informations personnels est en entrain de devenir l'une des plus importantes questions éthiques de notre société de l'information. La plupart des utilisateurs d'Internet et non-utilisateurs d'Internet sont préoccupés par la protection de leurs confidentialité des renseignement sur Internet. Cette recherche empirique a développé un modèle basé sur la théorie de l'action raisonnée et la théorie de la planification du comportement, qui tentent d'aborder les relations entre les règlements de protection et leur différences dans la préoccupation sur les informations privées entre la Chine et la Corée. Cette étude a utilisé la modélisation par équation structurelle pour valider le modèle de recherche proposé. Le résultat montre que le niveau de préoccupations pour la protection des renseignements en Corée est plus élevé qu’en Chine. Pour la Corée, l'influence de préoccupation pour la protection des informations personnelles est médiée par les croyances de fiducie et les règlements administratifs. Pour la Chine, le souci de protection des renseignements personnels des utilisateurs d'Internet a un impact de leurs croyances de risques et la réglementation de manière positive, mais ne touche pas leur confiance de croyances. Mots clés: Information sur la confidentialité; S’inscrire au site; Le modèle SE

    Critical Success Factors of Location-Based Services

    Get PDF
    Location-based services evolved with the advancement in mobile technology and wireless technology. Researchers have studied location-based services in terms of privacy, trust, and user acceptance. Statistics suggest the percentage of location-based services users is still relatively low. Therefore, the main objective of this study was to gain a comprehensive and holistic understanding of the critical success factors of location-based services. The electronic brainstorming approach was used to gather the opinions of an expert group of practitioners, researchers, and users on the critical success factors of location-based services. Through grouping similar factors together based on past literature, 15 categories of critical success factors were developed. These 15 categories were ranked and rated according to importance. The results showed that speed, real-time or up-to-date information, cost, usefulness or benefits, and simple or ease of use are the five most important critical success factors. The results of this research highlight potential areas of research, and research and development. The results of this study also provide guidelines for practitioners to create a competitive location-based services strategy to increase consumer adoption. Advisor: Keng L. Sia

    Understanding Perceived Privacy: A Privacy Boundary Management Model

    Get PDF
    Consumer data is asset to organizations. Analysis of consumers’ transactional data helps organizations to understand customer behaviors and preferences. Before organizations could capitalize on these data, they ought to have effective plans to address consumers’ privacy concerns because violation of consumer privacy brings long-term reputational damage to organizations. This paper proposes and tests a Privacy Boundary Management Model that explains how consumers formulate and manage their privacy boundary. Survey data was collected from 98 users of online banking websites who have used the system for a minimum of six months. The PLS results showed that the model accounts for high variance in perceived privacy. Three elements of the FIPs (notice, access, and enforcement) have significant impact on perceived effectiveness of privacy policy. Perceived effectiveness in turns significantly influences privacy control and privacy risks. Privacy control affects perceived privacy and trust while privacy risk influences privacy concern and perceived privacy. Privacy concern has a negative relationship with perceived privacy and trust has a positive relationship with perceived privacy. The findings have novel implications for organizations and policy makers

    Toward a Unified View of IS Certification: A Structured Literature Review on Theoretical Lenses

    Get PDF
    IS certifications are frequently used measures to alleviate consumers’ concerns or increase trust-worthiness toward service providers. Yet, scholarly work trying to understand the effects of IS certi-fication produces contradictory results. In particular, the diversity of theoretical lenses used renders it hard for researchers to stand on common ground. Utilizing a structured review of IS literature, we analyze more than 3100 articles to (1) identify commonly used theories for IS certification, (2) com-pare these theories using the certification ecosystem as conceptual basis, and (3) outline strengths and shortcomings of identified theoretical approaches. We contribute to the existent body of knowledge by presenting theoretical lenses in a structured way as well as evaluating their suitability in the context of IS certification. Our results suggest that some theories are well suited (e.g., Signal-ing Theory), yet researchers need to control for missing antecedents and avoid fragmentary use of theories. Further, we encourage researchers to draw on the Elaboration Likelihood Model and Cue Utilization/Consistency Theory as valuable, though underutilized theoretical lenses. Eventually, we suggest that future research should develop an integrated theoretical model since, according to our results, a blended theoretical lens may be most valuable to understand and predict the effectiveness of IS certification

    THE INFLUENCE OF SOCIAL MEDIA ON CONSUMERS PURCHASE DECISION: THE CASE OF QATAR

    Get PDF
    The consumer journey is highly influenced by social media as more people spent a significant portion of their time online. The increased understanding of how consumers make decisions has been widely studied and codified into models. Using the Unified Theory of Acceptance and Use of Technology 2 (UTAUT2) this study examines the extent of influence of social media marketing on consumer purchase decisions in Qatar and the challenges that could prevent the full utilization of social media marketing in Qatar. The study collected survey data from online users in Qatar based on a link shared on social media platforms. The results reveal the significant impact exerted by social media in molding consumer buying behaviors in Qatar. Although the nation has a high rate of social media participation, it lags behind worldwide trends in terms of online sales, indicating a notable discrepancy. Trust has a crucial role in influencing behavioral intentions, but perceived value also has a big influence on consumer choices. This research emphasizes the need for firms to customize marketing tactics to the distinctive social media environment in Qatar, recognizing the difficulties and possibilities inherent therein. The research provides detailed and valuable data that might be advantageous for companies, marketing professionals, and legislators that want to understand and improve Qatar's digital consumer ecosystem. It highlights the need of tailored marketing strategies that connect the online portrayal of a product or service with the actual number of sales. This involves resolving any differences that have been detected and making the most of the opportunities provided by social media to influence customer behavior

    Big Data’s Role in Expanding Access to Financial Services in China

    Get PDF
    General consumer and business finance companies have had limited success in serving the needs of economically active low-income families and micro-enterprises cost-effectively and sustainably in emerging economies such as China. Recent advances in computing and telecommunications technology are dramatically transforming this landscape by changing the way the financial industry operates. A key mechanism underlying this transformation concerns the use of big data in assessing, evaluating and refining the creditworthiness of potential borrowers and reducing the transaction costs. While China’s internet-only banking industry is currently small and some activities of players in this industry are akin to those in the shadow banking, this industry has potential to cause a major disruption in the Chinese financial market. A main objective of this paper is to examine the role of big data in facilitating the access to financial products for economically active low-income families and micro-enterprises in China. A second objective is to investigate how formal and informal institutions facilitate and constrain the use of big data in the Chinese financial industry and market. The paper also investigates how various inherent characteristics of big data – volume, velocity, variety, variability and complexity – are related to the assessment of the creditworthiness of low-income families and micro-enterprises. Case studies of big data deployment in the Chinese financial industry and market are discussed. The paper also looks at various categories of personal financial and non-financial information that are being used as proxy measures for a potential borrower’s identity, ability to repay and willingness to repay. Various business models involving the sources of data (internal vs. external to the big data organization) and providers of credits (big data organization vs. external partners or clients of the big data organization) are investigated. The analysis of the paper indicates that the main reason why low-income families and micro-enterprises in China and other emerging economies lack access to financial services is not because they lack creditworthiness but merely because banks and financial institutions lack data, information and capabilities to access the creditworthiness of and effectively provide financial services to this financial disadvantaged group

    Home quarantined: Privacy at risk in technologically-oriented learning amidst COVID-19 pandemic

    Get PDF
    The COVID-19 triggers technologically-oriented learning and is critical in ensuring that education continues after schools close physically. The internet has a plethora of learning opportunities but may invite privacy risks to users. Using descriptive-comparative research design, the study determined the contents and artifacts exchanged in online portals, the extent of use of social media sites, teaching-learning platforms, and educational websites. The sample was 341 college students of a family-owned private higher education institution. Finally, the difference in online privacy risk management practices was determined when grouped by selected demographic variables. Using means, t-test, and ANOVA, findings from an online survey showed that personal information is shared the most in online portals. For online learning, students heavily relied on Facebook, Microsoft Teams, and Google. To protect their privacy, respondents from all classes follow online management practices. Generally, the respondents' good affordances and decorum in the online media imply that they have good behavior and value creation. Still, a comprehensive strategy to safeguard data among learners in the utilization of online productivity platforms is a must

    The First 25 Years of the Bled eConference: Themes and Impacts

    Get PDF
    The Bled eConference is the longest-running themed conference associated with the Information Systems discipline. The focus throughout its first quarter-century has been the application of electronic tools, migrating progressively from Electronic Data Interchange (EDI) via Inter-Organisational Systems (IOS) and eCommerce to encompass all aspects of the use of networking facilities in industry and government, and more recently by individuals, groups and society as a whole. This paper reports on an examination of the conference titles and of the titles and abstracts of the 773 refereed papers published in the Proceedings since 1995. This identified a long and strong focus on categories of electronic business and corporate perspectives, which has broadened in recent years to encompass the democratic, the social and the personal. The conference\u27s extend well beyond the papers and their thousands of citations and tens of thousands of downloads. Other impacts have included innovative forms of support for the development of large numbers of graduate students, and the many international research collaborations that have been conceived and developed in a beautiful lake-side setting in Slovenia
    • …
    corecore