首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 93 毫秒
1.
In light of mounting privacy concerns over the increasing collection and use of biometric and behavioral information for travel facilitation, this study examines travelers’ online privacy concerns (TOPC) and its impact on willingness to share data with travel providers. A proposed theoretical model explaining antecedents and outcomes of TOPC related to biometric and behavioral data sharing was tested using structural equation modeling with data collected from 685 travelers. The results extend the Antecedents – Privacy Concerns – Outcomes (APCO) framework by identifying a set of salient individual factors that shape TOPC. The findings provide empirical evidence confirming the context dependence of privacy preferences, showing that although travelers are concerned over their information privacy they are still willing to share their behavioral data; while in the case of biometric information, the disclosure decision is dependent upon expected benefits rather than privacy concerns. This study offers insights into privacy behavior of online consumers in the travel context and constitutes one of the few focusing on the social aspects of biometric authentication.  相似文献   

2.
[目的/意义]社交网络已广泛渗入到人们的日常生活中,用户对所提供个人数据的隐私关注一直存在,但却依然持续使用社交网络,需要解析产生这种现象的原因。[方法/过程]运用社会影响理论,通过解析用户使用社交网络的隐私成本(即隐私关注)和隐私收益(即行为诱导:人际关系管理,自我展示,主观规范),建立隐私权衡模型,分析用户的隐私权衡行为,寻找隐私关注困扰下用户持续使用社交网络的动机。[结果/结论]用户提供个人数据并持续使用社交网络的动机并非是忽略了隐私关注,而是行为诱导(包括人际关系管理和自我展示)的正面影响超过隐私关注的负面影响。  相似文献   

3.
[目的/意义]信息隐私关注和信任是影响智能手机用户的个人信息安全行为的重要因素,对智能手机用户的信息隐私关注和信任与其个人信息安全行为意向关系的探讨有助于更好地理解智能手机用户的信息安全行为。[方法/过程]本文引入以往经验变量,构建了智能手机用户信息隐私关注、信任与其信息安全行为意向之间的作用模型,通过调查问卷收集数据,并利用SmartPLS2.0进行验证。[结果/结论]研究发现:智能手机用户的信息隐私关注对其信息安全行为意向具有正向作用;用户对智能手机生产商和服务商的信任在信息隐私关注和信息安全行为意向之间起到中介作用;智能手机用户信息安全方面的以往经验对其信息隐私关注、信任和信息安全行为意向起正向作用。  相似文献   

4.
【目的/意义】受新冠疫情的影响,在线求职面试已经成为高校毕业生就业的重要形式。然而,随着一系列 简历信息泄露事件的曝光,如何降低毕业生在线求职的隐私关注已经成为学界、媒体以及公众共同关注的话题。 【方法/过程】借鉴 APCO 框架和 IUIPC 量表等成熟的研究成果,以六个重要的前因变量构建了隐私关注影响因素 理论模型,运用 NCA以及 QCA模糊集分析方法,探讨了前因变量之间的多重并发因素和复杂因果机制对于求职 毕业生隐私关注的影响。【结果/结论】毕业生在线求职低隐私关注的驱动机制分为七条路径;制度影响对于降低求 职毕业生隐私关注有着至关重要的作用;作为一种主观可控条件,提高毕业生的网络素养是快速降低求职毕业生 隐私关注的可行性选择。【创新/局限】本文引入fsQCA的方法,选取六个变量,从组态的视角,探究在线求职毕业生 低隐私关注的驱动机制及变量间的关系。将来可继续加入时间维度进行更深层次的分析。  相似文献   

5.
[目的/意义]用户的微信使用行为,涉及使用动机、隐私关注和隐私行为三个问题,研究目的在于探讨三者之间的关系。[方法/过程]以隐私关注为中介变量,使用动机为前因变量,隐私行为为结果变量,构建用户使用微信的APCO模型,设计量表,测度微信用户对这三个变量的认知,进行相关性分析与回归分析,探讨三者之间的联系。[结果/结论]结果表明,使用动机与隐私关注整体上相关性较弱,但其中的关系保持和信息搜寻动机对隐私关注存在正向影响;隐私关注对隐私行为中的隐私保护存在正向影响,但在使用动机与自我披露之间的中介作用并不显著;使用动机中的关系建立对隐私行为中的自我披露具有显著正向作用。  相似文献   

6.
Social commerce (s-commerce) has become increasingly impactful to e-commerce and has generated potential economic benefits. With the rise of online privacy concerns, we have seen the need to explain how concerns about privacy affect consumers’ social interaction behavior and purchase decision-making on s-commerce sites. Synthesizing the privacy-trust-behavioral intention (PTB) and consumer decision-making models, this study proposes a comprehensive model by specifically refining its privacy and trust from an institutional perspective and investigating the influences of social interaction on purchase intention and actual purchase behaviors. Our results found that institutional privacy assurance positively influences institutional-based trust, which, in turn, affects online social interactions, and consequently increases the likelihood of product purchases on s-commerce sites. Theoretical development of this research contributes to both marketing and information systems disciplines in the social media era.  相似文献   

7.
网络隐私顾虑被认为是阻碍用户披露个人信息的重要影响因素并越来越受到学术界的重视。鉴于隐私是与情境相联系的多维、动态的概念,情境的变化会影响用户对隐私的理解,本文结合现实背景提出了电子商务环境下网络隐私顾虑的理论概念,在以往研究的基础上确定了网络隐私顾虑的构成维度,开发出初始的测量指标,然后通过3套独立的样本数据进行探索式因子分析、验证式因子分析和关联效度分析。结果表明量表具有良好的信度和效度,网络隐私顾虑由控制、收集、二次使用、错误、不当访问与补救5个维度和19个题项构成。  相似文献   

8.
Recent privacy-related incidents of mobile services have shown that app stores and providers face the challenge of mobile users’ information privacy concerns, which can prevent users from installing mobile apps or induce them to uninstall an app. In this paper, we investigate the role of app permission requests and compare the impact on privacy concerns with other antecedents of information privacy concerns, i.e., prior privacy experience, computer anxiety, and perceived control. To test these effects empirically, we conducted an online survey with 775 participants. Results of our structural equation modeling show that prior privacy experience, computer anxiety, and perceived control have significant effects on privacy concerns. However, concerns for app permission requests have approximately twice as much predictive value than the other factors put together to explain mobile users’ overall information privacy concerns. We expect that our findings can provide a theoretical contribution for future mobile privacy research as well as practical implications for app stores and providers.  相似文献   

9.
Over the past decade, social media technologies have become effective tools not only for entertainment, but also for online health communications. In virtual health communities (VHCs), the members often share their personal health information (PHI) with other members. These information exchanges provide benefits to both the information providers as well as the recipients. The PHI disclosure, however, may entail privacy concerns. Our study used the privacy calculus model to examine the trade-off between individuals’ expected benefits and privacy concerns when disclosing PHI in social media environments. Our results showed that age, health status, and affective commitment influence the balance between the information disclosure drivers and barriers in the privacy calculus model. More specifically, we found that among members of VHCs, healthier people expect to receive fewer personal benefits of communicating PHI in social media environments. Moreover, individuals who are emotionally attached to online communities expect to both receive and provide more benefits while communicating PHI in those communities. We also observed that individuals who are familiar with but not members of VHCs, especially those who are young and healthy, are more concerned about their PHI privacy in online communities.  相似文献   

10.
With the ever-increasing collection of user data, online privacy becomes an urgent matter for users and research across borders. The perception of information sensitivity is central to privacy attitudes and behaviors in different usage contexts. In an online questionnaire, n = 592 German internet users evaluated how sensitive they perceive 40 different data types. The German sensitivity evaluations revealed in this study are compared to results from the US and Brazil (Markos et al., 2017), in order to understand the cultural impact on evaluations. Additionally, we analyze how attitudes and demographic characteristics of the German sample influence the perception of sensitivity on an individual level. Some distinct differences in sensitivity perception between Germany, Brazil, and the US can be observed, but the rank orders of sensitivity of data types is very similar between the countries, indicating that there is a consensus on what constitutes sensitivity across nations. On an individual level, disposition to value privacy, risk propensity, and education level influence the perception of sensitivity. The findings contribute to an understanding of how to design information and communication strategies to inform internet users how to manage their data carefully.  相似文献   

11.
Abuse of information entrusted to organizations can result in a variety of privacy violations and trust concerns for consumers. In the event of violations, a social media brand or organization renders an apology – a form of social account – to alleviate users’ concerns and maintain user membership and engagement with the platform. To explore the link between apology offered by a social media brand or organization and the users’ trust dynamics in the brand’s services, we study how organizational integrity can contribute to reducing individuals’ privacy concerns whiles increasing or repairing their trust. Drawing on organizational behavioral integrity literature, our proposed research model suggests that the persuasiveness of an apology following a data breach affects users’ trust or spillover trust through their perceptions of the degree of alignment between the words in the apology and the actions of the violating entity. Based on a survey of Facebook users, our findings show that persuasiveness of an apology has a significant impact on users’ perceptions of the alignment between the social media brand’s (i.e. Facebook) words and subsequent actions. These perceptions impact social media brand trust (i.e. users’ trust in Facebook and allied services such as Instagram). We also find that, post data breach incidence, while integrity of the social media organization partially mediates the relationship between persuasive apology and users’ trust, it fully mediates the relationship between the persuasive apology and the privacy concerns expressed by the users. However, users’ privacy concerns do not contribute much to the repair of trust needed to maintain their membership.  相似文献   

12.
Check-in services (CISs) are a highly relevant part of location-based services that provide customer value greater than other mobile services due to their technical possibilities; conversely, CISs also create various risks to privacy, as they enable the continuous live tracking of users. We investigate these risks and develop a third-order privacy risk construct based on communication privacy management (CPM) theory to explain how a set of concerns violates privacy boundary mechanisms and generates perceived privacy risk. A developmental mixed-method design is used to qualitatively derive the construct qualitatively through 20 interviews and evaluate it quantitatively using a privacy calculus model with structural equation modelling (N = 431). The results confirm the third-order privacy risk construct and reveal new underlying concerns that create this risk. The results of this study are useful for both practitioners and academics, as they provide insights into how context-specific privacy concerns emerge in advanced mobile services, such as CISs.  相似文献   

13.
Within a given conversation or information exchange, do privacy expectations change based on the technology used? Firms regularly require users, customers, and employees to shift existing relationships onto new information technology, yet little is known as about how technology impacts established privacy expectations and norms. Coworkers are asked to use new information technology, users of gmail are asked to use GoogleBuzz, patients and doctors are asked to record health records online, etc. Understanding how privacy expectations change, if at all, and the mechanisms by which such a variance is produced will help organizations make such transitions. This paper examines whether and how privacy expectations change based on the technological platform of an information exchange. The results suggest that privacy expectations are significantly distinct when the information exchange is located on a novel technology as compared to a more established technology. Furthermore, this difference is best explained when modeled by a shift in privacy expectations rather than fully technology-specific privacy norms. These results suggest that privacy expectations online are connected to privacy offline with a different base privacy expectation. Surprisingly, out of the five locations tested, respondents consistently assign information on email the greatest privacy protection. In addition, while undergraduate students differ from non-undergraduates when assessing a social networking site, no difference is found when judging an exchange on email. In sum, the findings suggest that novel technology may introduce temporary conceptual muddles rather than permanent privacy vacuums. The results reported here challenge conventional views about how privacy expectations differ online versus offline. Traditionally, management scholarship examines privacy online or with a specific new technology platform in isolation and without reference to the same information exchange offline. However, in the present study, individuals appear to have a shift in their privacy expectations but retain similar factors and their relative importance??the privacy equation by which they form judgments??across technologies. These findings suggest that privacy scholarship should make use of existing privacy norms within contexts when analyzing and studying privacy in a new technological platform.  相似文献   

14.
Requesting personal information in frontline service encounters raises privacy concerns among customers. The proximity contact tracing that occurred during the COVID-19 pandemic provides an intriguing context of information requests. Hospitality venues required contact tracing details from customers, and customer cooperation varied with concerns about privacy. Drawing on gossip theory, we investigate the roles of businesses’ data privacy practices and government support in driving customers’ responses to contact tracing. Our findings show that perceived transparency of a business’s privacy practices has a positive effect on customers’ commitment to the business, while perceived control exerts a negative effect on commitment. These effects are mediated by customers’ information falsification rather than disclosure, because the former is a sensitive behavioral indicator of privacy concerns. The results also reveal the moderating roles of government support. This research contributes to the customer data privacy literature by demonstrating the distinct effects of perceived transparency and control on commitment and revealing the underlying mechanism. Moreover, the research extends the conceptual understanding of privacy practices from online contexts to face-to-face contexts of frontline service. The findings offer implications for the management of customer data privacy.  相似文献   

15.
Based on the Elaboration Likelihood Model (ELM), this study identifies the differences between perceived privacy risks and privacy concern. Furthermore, the study analyses how perceived privacy risks and privacy concerns affect the disclosure intention and the actual information disclosure behavior of Internet users. In addition, the study discusses the moderating effects of platform types, from the perspective of privacy elaboration likelihood. By applying meta-analyses and SEM on 104 independent studies with 42,256 samples from existing empirical studies, we attempt to systematically reveal the relationship between privacy cognition and information disclosure. The results show that perceived privacy risks can significantly reduce personal information disclosure intention, as well as actual information disclosure behavior. However, privacy concerns only affect disclosure intention, but do not have a significant effect on actual information disclosure behavior. The study also verified that platform types have moderating effects on the privacy decision making of Internet users. The findings yield important and useful implications, both for research and for practice.  相似文献   

16.
Informational privacy, data mining, and the Internet   总被引:3,自引:2,他引:1  
Privacy concerns involving data mining are examined in terms of four questions: (1) What exactly is data mining? (2) How does data mining raise concerns for personal privacy? (3) How do privacy concerns raised by data mining differ from those concerns introduced by ‘traditional’ information-retrieval techniques in computer databases? (4) How do privacy concerns raised by mining personal data from the Internet differ from those concerns introduced by mining such data from ‘data warehouses?’ It is argued that the practice of using data-mining techniques, whether on the Internet or in data warehouses, to gain information about persons raises privacy concerns that (a) go beyond concerns introduced in traditional information-retrieval techniques in computer databases and (b) are not covered by present data-protection guidelines and privacy laws.  相似文献   

17.
Privacy is a serious concern to radio frequency identification (RFID) technology. Worldwide, several companies scrapped RFID projects because of high resistance from consumers and their advocacy groups – which actually demand RFID-specific privacy policies. This concern is even more acute when RFID is used in public applications; because, in general case, citizens cannot refuse to provide data, and the data collected by a government agency would offer serious threats if are shared among third parties. Limited research has been performed in this specific issue; they all agree that perceived privacy increased RFID acceptance. But, what drives privacy perceptions are yet to be researched – this study closes this research gap. In order to conduct the current research, mixed method of research approach has been adopted. In the qualitative research stage, the authors conducted two focused-group discussion sessions and eight in-depth interviews in two different countries: Australia and Bangladesh; arguing that the status, and the perceptions and tolerance of the citizens on privacy are different in these two regions. The explored factors have been examined with empirical data obtained from these two countries. It is found that, there are distinct differences in perceptions in developed and developing countries. The detail findings offer practical suggestions to the agency managers so that they can ensure better privacy of the citizens. As a significant theoretical contribution, this study enhances existing literature identifying the antecedents of privacy, which play even different roles in different cultural backgrounds.  相似文献   

18.
[目的/意义]旨在探讨影响农村居民图书产品网络购买意愿因素,为相关管理提供参考。[方法/过程]以S-O-R模型为基础,引入受教育水平作为调节变量构建三阶段模型,基于我国七个省份480位农村居民的一手调研数据,采用结构方程法探究感知风险的不同维度与农村消费者图书产品网络购买意愿的关系。[结果/结论]感知风险中的财务风险、隐私风险、产品风险、时间风险对农村消费者网络购买意愿有显著的负向影响,社会风险影响不显著。信任是财务、隐私、产品、时间风险与农村消费者网络购买意愿关系的中介变量。受教育水平在部分影响关系中起显著的调节效应。  相似文献   

19.
Abstract

Analyses of attitudes and concerns about privacy from a national survey sample of 1,532 adult Americans in 1988 revealed several separate dimensions. A modification of Tryon's method of clustering variables (third‐order correlations) yielded groups of variables whose meanings were much more interpretable than they had been when factor analysis was initially used. We tested the validity of the clustering by a highly comprehensive system of item analyses. The main findings were that (1) respondent concerns over telephone privacy were not related to other aspects of privacy, (2) interest in devices like Caller ID that enable recipients to know the number of the caller were not related to other aspects of telephone privacy, and (3) general privacy concerns under conditions where the respondent and the other party know each other were independent of those conditions where they do not know each other. Implications for telecommunications policy and new services are discussed.  相似文献   

20.
杨宏玲  缪小明 《软科学》2009,23(7):21-25
通过对中国银行产品消费者调查收集的数据来验证影响消费者对银行信息行为信任的因素。结果发现,消费者的信任信念和隐私声明信任会显著地影响其对银行信息行为的信任;而消费者的整体隐私关注越强,其对银行信息行为的信任越弱,但是消费者的整体隐私关注对其隐私声明信任的影响不显著,表明消费者的整体隐私关注直接影响消费者对银行信息行为的信任。  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号