Czasopismo
Tytuł artykułu
Warianty tytułu
Języki publikacji
Abstrakty
Advancement in internet of things (IoT) and proliferation in the use of smart devices have raised concerns about the data privacy of online users. This study predicts the consequences of perceived data privacy risks on consumer behaviours in Lagos State, Nigeria using the integrated Entropy-Technique for Order Preference by Similarity to Ideal Solution (TOPSIS). We employed Entropy to assign weights to each criterion. Subsequently, responses were systematically ranked to arrive at an inference using TOPSIS. 84.8% agree that any perceived cyber security threat or a breach in their data privacy would stop them from proceeding with the transaction or activity online, or the use of a digital product. Similarly, (86.7%), agree it is critical that online businesses only ask for customer information that is relevant to the use of the product or service. Thus, the findings indicate that the privacy paradox of enlightened online consumers tends to diminish when they are faced with perceived data privacy and cybersecurity risks. (original abstract)
Twórcy
- University of Lagos, Akoka, Nigeria
autor
- University of Lagos, Akoka, Nigeria
Bibliografia
- Abidin, M. Z., Rusli, R., and Shariff, A. M. Technique for Order Performance by Similarity to Ideal Solution (TOPSIS)-entropy Methodology for inherent Safety Design Decision Making tool. Procedia Engineering, 148, 2016, pp. 1043-1050. https://doi:10.1016/j.proeng.2016.06.58710.1016/j.proeng.2016.06.587
- Acquisti, A., Brandimarte, L., and Loewenstein, G. Privacy and Human Behavior in the age of Information. Science, 347, 2015, pp. 509-514. https://doi:10.1126/science.aaa146510.1126/science.aaa1465
- Acquisti, A., Sleeper, M., Wang, Y., Wilson, S., Adjerid, I., Balebako, R., and Schaub, F. Nudges for Privacy and Security. ACM Computing Surveys, 50(3), 2017, pp. 1-41. https://doi:10.1145/305492610.1145/3054926
- Adam J., Ulf-Dietrich R., Tom B., Carina B., and Paine S. Privacy, Trust, and Self-disclosure Online. Human-Computer Interaction, 25(1), 2010, pp. 1-24. https://doi:10.1080/0737002090356662.
- Albahri, A. S., Hamid, R. A., Albahri, O.S, Albahri, A.S. and Zaidan, A.A. Detection-based prioritisation: Framework of Multi-laboratory Characteristics for Asymptomatic COVID-19 carriers based on integrated Entropy-TOPSIS methods. Artificial Intelligence in Medicine, 101983. 2021. https://doi:10.1016/j.artmed.2020.10198310.1016/j.artmed.2020.101983
- Alhakami, A. S., and Slovic, P. A Psychological Study of the Inverse Relationship between Perceived Risk and Perceived Benefit. Risk Analysis, 14(6), 1994, pp. 1085-1096.10.1111/j.1539-6924.1994.tb00080.x
- Alshurideh, M., Nicholson, M., and Xiao, S. The Effect of Previous Experience on Mobile Subscribers' Repeat Purchase Behaviour. European Journal of Social Sciences, 30(3), 2012, pp. 366-376.
- Analytics Insight. Data protection vs. Cybersecurity: why you need both. 2020. [Blog post]. Retrieved from https://www.analyticsinsight.net/data-protection-vs-cyber-security-why-you-need-both/
- Awad, N. F., and Krishnan, M. S. The Personalization Privacy Paradox: An Empirical Evaluation of Information Transparency and the Willingness to be Profiled Online for Personalization. MIS Quarterly, 2006, pp. 13-28. https://doi:10.2307/2514871510.2307/25148715
- Baker Hosetler, Is Your Organization Compromise Ready? Data Security Incident. 2016. Response Report. Retrieved September 3, 2021, from https://www.bakerlaw.com/files/uploads/Documents/Privacy/2016-Data-Security-Incident-ResponseReport.pdf
- Bansal, G. and Gefen, D. The Impact of Personal Dispositions on Information Sensitivity, Privacy Concern and Trust in Disclosing Health Information Online. Decision support systems, 49(2), 2010, pp. 138-150. https://doi:10.1016/j.dss.2010.01.01010.1016/j.dss.2010.01.010
- Barari, M., Ross, M., and Surachartkumtonkun, J. Negative and Positive Customer Shopping Experience in an Online Context. Journal of Retailing and Consumer Services, 53, 2020. https://doi:10.1016/j.jretconser.2019.101
- Bélanger, F., and Crossler, R. E. Privacy in the Digital Age: A Review of Information Privacy Research in Information Systems. MIS Quarterly, 2011, pp.1017-1041. https://doi.org/10.2307/41409971
- Belanger, F. and Hiller, J. S. A Framework for E-Government: Privacy Implications. Business Process Management Journal, 12(1), 2006, pp. 48-60. https://doi:10.1108/1463715061064375110.1108/14637150610643751
- Belanger, F., Hiller, J. S., & Smith, W. J. Trustworthiness in Electronic Commerce: The Role of Privacy, Security, and Site Attributes. The Journal of Strategic Information Systems, 11(3-4), 2002, pp. 245 - 270. https://doi:10.1016/s0963-8687(02)00018-510.1016/S0963-8687(02)00018-5
- Bellman, S., Johnson, E. J., Kobrin, S. J., and Lohse, G. L. International Differences in Information Privacy Concerns: A Global Survey of Consumers. The Information Society, 20(5), 2004, pp. 313 - 324.10.1080/01972240490507956
- Bleier, A., and Eisenbeiss, M. The Importance of Trust for Personalized Online Advertising. Journal of Retailing, 91(3), 2015, pp. 390-409. https://doi:10.1016/j.jretai.2015.04.00110.1016/j.jretai.2015.04.001
- Bornschein, R., Schmidt, L., and Maier, E. The Effect of Consumers' Perceived Power and Risk in Digital Information Privacy: The Example of Cookie Notices. Journal of Public Policy & Marketing, 39(2), 2020, pp. 135-154. https://doi:10.1177/074391562090214310.1177/0743915620902143
- Bugeja, J., Jacobsson, A., and Davidsson, P. On privacy and Security Challenges in Smart Connected Homes. European Intelligence and Security Informatics Conference (EISIC). 2016. https://doi:10.1109/eisic.2016.04410.1109/EISIC.2016.044
- Conner, M. and Armitage, C. J. Extending the Theory of Planned Behavior: A Review and Avenues for Further Research. Journal of Applied Social Psychology, 28(15), 1998, pp. 1429-1464. https://doi:10.1111/j.1559-1816.1998.tb01685.x10.1111/j.1559-1816.1998.tb01685.x
- Culnan, M. J. and Armstrong, P. K. Information Privacy Concerns, Procedural Fairness, and Impersonal Trust: An Empirical Investigation. Organization Science, 10(1), 1999, pp. 104-115. https://doi:10.1287/orsc.10.1.10410.1287/orsc.10.1.104
- Culnan, M. J., and Bies, R. J. Consumer Privacy: Balancing Economic and Justice Considerations. Journal of Social Issues, 59(2), 2003, pp. 323-342. https://doi:10.1111/1540-4560.0006710.1111/1540-4560.00067
- Davis, F. D., Bagozzi, R. P., and Warshaw, P. R. User Acceptance of Computer Technology: A Comparison of Two Theoretical Models. Management Science, 35(8), 1989, pp. 982-1003. https://doi:10.1287/mnsc.35.8.98210.1287/mnsc.35.8.982
- Deloitte. Enterprise@Risk: Privacy & Data Protection Survey. 2007, Retrieved from http://www.deloitte.com/dtt/cda/doc/content/us_risk_s%26P_2007%20Privacy10Dec2007final.pdf.
- Dinev, T. and Hart, P. Internet Privacy Concerns and Social Awareness as Determinants of Intention to Transact. International Journal of Electronic Commerce, 10(2), 2005, pp. 7-29. https://doi:10.2753/jec1086-441510020110.2753/JEC1086-4415100201
- Dinev, T., and Hart, P. An Extended Privacy Calculus Model for E-commerce Transactions. Information Systems Research, 17(1), 2006, pp. 61-80. https://doi:10.1287/isre.1060.008010.1287/isre.1060.0080
- Dontov, T. Why Data Protection, and Cybersecurity can't be Separate Functions. 2020, November 25, Retrieved from https://www.forbes.com/sites/theyec/2020/11/25/why-dataprotection-andcybersecurity-cant-be-separate-functions/?sh=7fad4b2517cc
- Federal Trade Commission. Data Brokers: A call for transparency and accountability. FTC. 2014. Retrieved from https://www.ftc.gov/system/files/documents/reports/data-brokers-call-transparencyaccountability-report-federal-trade-commission-may-2014/140527databrokerreport.pdf
- Fortes, N. and Rita, P. Privacy Concerns and Online Purchasing Behaviour: Towards an Integrated Model. European Research on Management and Business Economics, 22(3), 2016, pp. 167-176. http://doi:10.1016/j.iedeen.2016.04.00210.1016/j.iedeen.2016.04.002
- Gomez, J., Pinnick, T., and Soltani, A. Know Privacy: The Current State of Web Privacy, Data Collection, and Information Sharing, 2009. School of Information, University of California Berkeley (http://www.knowprivacy.org/).
- Guhr, N., Werth, O., Blacha, P. P. H., and Breitner, M. H. Privacy Concerns in the Smart Home Context. SN Applied Sciences, 2(2), 2020, pp. 1-12. https://doi.org/10.1007/s42452-020-2025-8
- Hill, R. J., Fishbein, M. and Ajzen, I. Belief, Attitude, Intention and Behavior: An Introduction to Theory and Research. Contemporary Sociology, 6(2), 1977, pp. 244. http://doi:10.2307/206585310.2307/2065853
- Hoffmann, C. P., Lutz, C., and Meckel, M. (2014). Digital Natives or Digital Immigrants? The Impact of User Characteristics on Online Trust. Journal of Management Information Systems, 31(3), pp. 138-171. https://doi.org/10.1080/07421222.2014.995538
- Hwang, C. L. and Yoon, K. Multiple Attribute Decision Making: A State of the Art Survey. Lecture Notes in Economics and Mathematical Systems, 186(1), 1981.10.1007/978-3-642-48318-9_1
- Jeff Smith, H., Dinev, T. and Xu, H. Information Privacy Research: An Interdisciplinary Review. MIS Quarterly: Management Information Systems, 35(4), 2011, pp. 989-1015.
- Jensen, C., Potts, C., and Jensen, C. Privacy Practices of Internet Users: Self-reports Versus Observed Behavior. International Journal of Human-Computer Studies, 63(1-2), 2005, pp. 203-227.10.1016/j.ijhcs.2005.04.019
- Kehr, F., Kowatsch, T., Wentzel, D. and Fleisch, E. Blissfully Ignorant: The Effects of General Privacy Concerns, General Institutional Trust, and Affect in the Privacy Calculus. Information Systems Journal, 25(6), 2015, pp. 607-635. http://doi:10.1111/isj.1206210.1111/isj.12062
- Kim, D. J., Ferrin, D. L. and Rao, H. R. A Trust-Based Consumer Decision-Making Model in Electronic Commerce: The Role of Trust, Perceived Risk, and Their Antecedents. Decision Support Systems, 44(2), 2008, pp. 544-564. http://doi:10.1016/j.dss.2007.07.00110.1016/j.dss.2007.07.001
- Kim, K. [Blog post]. Retrieved from https://www.usatoday.com/story/tech/columnist/2019/12/19/your-smartphone-mobile-device-may-recording-everything-you-say/4403829002/ 2019, December, 19
- Kothari, C.R. Research methodology: Methods and techniques (2nd ed.). New Age International Publishers. 2004.
- Kuanchin Chen and Alan I. Rea Jr. Protecting Personal Information Online: A Survey of User Privacy Concerns and Control Techniques, Journal of Computer Information Systems, 44(4), 2004, pp. 85-92. http://dx.doi.org/10.1080/08874417.2004.11647599
- LaRose, R., and Rifon, N. Your Privacy is Assured of Being Disturbed: Websites with and without Privacy Seals. New Media & Society, 8(6), 2006, pp. 1009-1029.10.1177/1461444806069652
- Leidner, D. E., and Kayworth, T. A Review of Culture in Information Systems Research: Toward a Theory of Information Technology Culture Conflict. MIS Quarterly, 2006, pp. 357-399. http://doi:10.2307/2514873510.2307/25148735
- Malhotra, N. K., Kim, S. S., and Agarwal, J. Internet Users' Information Privacy Concerns (IUIPC): The Construct, the Scale, and a Causal Model. Information Systems Research, 15(4), 2004, pp. 336 - 355. http://doi:10.1287/isre.1040.003210.1287/isre.1040.0032
- Martin, K. The Penalty for Privacy Violations: How Privacy Violations Impact Trust Online. Journal of Business Research, 82, 2018, pp. 103-116. http://doi:10.1016/j.jbusres.2017.08.03410.1016/j.jbusres.2017.08.034
- Martin, K. D., Borah, A., and Palmatier, R. W. Data privacy: Effects on Customer and Firm Performance. Journal of Marketing, 81(1), 2017, pp. 36-58. http://doi:10.1509/jm.15.049710.1509/jm.15.0497
- Martin, K., and Shilton, K. Why Experience Matters to Privacy: How Context-based Experience Moderate's Consumer Privacy Expectations for Mobile Applications. Journal of the Association for Information Science and Technology, 67(8), 2015, pp. 1871-1882. http://doi:10.1002/asi.2350010.1002/asi.23500
- Mathieson, K. Predicting User Intentions: Comparing the Technology Acceptance Model with the Theory of Planned Behavior. Information Systems Research, 2(3), 1991, pp. 173-191. http://doi:10.1287/isre.2.3.17310.1287/isre.2.3.173
- Meinert, D. B., Peterson, D. K., Criswell, J. R., and Crossland, M. D. Privacy Policy Statements and Consumer Willingness to Provide Personal Information. Journal of Electronic Commerce in Organizations, 4(1), 2006, pp. 1-17. http://doi:10.4018/jeco.200601010110.4018/jeco.2006010101
- Metzger, M. J. Privacy, Trust, and Disclosure: Exploring Barriers to Electronic Commerce. Journal of computer-mediated communication, 9(4), 2004, JCMC942.10.1111/j.1083-6101.2004.tb00292.x
- Miltgen, C. L., Henseler, J., Gelhard, C. and Popovič, A. Introducing New Products that affect Consumer Privacy: A Mediation Model. Journal of Business Research, 69(10), 2016, pp. 4659-4666. http://doi:10.1016/j.jbusres.2016.04.01510.1016/j.jbusres.2016.04.015
- Miyazaki, A. D., and Fernandez, A. Consumer Perceptions of Privacy and Security Risks for Online Shopping. Journal of Consumer Affairs, 35(1), 2001, pp. 27-44.10.1111/j.1745-6606.2001.tb00101.x
- Moradian, M., Modanloo, V., & Aghaiee, S. Comparative Analysis of Multi-Criteria Decision-Making Techniques for Material Selection of Brake Booster Valve Body. Journal of Traffic and Transportation Engineering (English Edition), 6(5), 2019, pp. 526-534. http://doi:10.1016/j.jtte.2018.02.00110.1016/j.jtte.2018.02.001
- Nigeria Data Protection Regulation. Retrieved from https://ndpr.nitda.gov.ng/Content/Doc/NigeriaDataProtectionRegulation.pdf 2019.
- Norberg, P. A., and Horne, D. R. Privacy Attitudes and Privacy-related Behavior. Psychology and Marketing, 24(10), 2019, pp. 829-847. http://doi:10.1002/mar.2018610.1002/mar.20186
- Nowak, G. J., & Phelps, J. Direct Marketing and the Use of Individual-level Consumer Information: Determining How and When "Privacy" Matters. Journal of Direct Marketing, 9(3), 1995, pp. 46-60. http://doi:10.1002/dir.400009030710.1002/dir.4000090307
- Pavlou, P. A., and Gefen, D. Building Effective Online Marketplaces with Institution-based Trust. Information Systems Research, 15(1), 2004, pp. 37-59. http://doi:10.1287/isre.1040.001510.1287/isre.1040.0015
- Peter, J. P., and Tarpey Sr, L. X. A Comparative Analysis of Three Consumer Decision Strategies. Journal of consumer research, 2(1), 1975, pp. 29-37. http://doi:10.1086/20861310.1086/208613
- Phelps, J., Nowak, G., and Ferrell, E. Privacy Concerns and Consumer Willingness to Provide Personal Information. Journal of Public Policy & Marketing, 19(1), 2000, pp. 27-41. http://doi:10.1509/jppm.19.1.27.16941.10.1509/jppm.19.1.27.16941
- Privacy and Data Security Update. Federal Trade Commission. Retrieved October 3, 2021, from https://www.ftc.gov/reports/privacy-data-security-update-2014 2014.
- Protection of Personal Information Act. Retrieved November 23, 2021, from https://www.gov.za/sites/default/files/gcis_document/201409/3706726-11act4of2013protectionofpersonalinforcorrect.pdf 2021
- Roszkowska, E. Multi-Criteria Decision-Making Models by applying the TOPSIS Method to Crisp and Interval Data, Multiple Criteria Decision Making (6), 2011, pp. 200-230.
- Salehi, V., Zarei, H., Shirali, G. A., and Hajizadeh, K. An Entropy-based TOPSIS Approach for Analyzing and Assessing Crisis Management Systems in Petrochemical Industries. Journal of Loss Prevention in the Process Industries, 104241. 2020. http://doi:10.1016/j.jlp.2020.10424110.1016/j.jlp.2020.104241
- Schoenbachler, D. D. and Gordon, G. L. Trust and Customer Willingness to Provide Information in Database-Driven Relationship Marketing. Journal of Interactive Marketing, 16(3), 2002, pp. 2-16. http://doi:10.1002/dir.1003310.1002/dir.10033
- Sekaran, U. and Bougie, R. Research Methods for Business: A Skill Building Approach. John Wiley & Sons. 2013.
- Sheehan, K. B. and Hoy, M. G. Dimensions of Privacy Concern Among Online Consumers. Journal of Public Policy & Marketing, 19(1), 2000, pp.62-73. http://doi:10.1509/jppm.19.1.62.1694910.1509/jppm.19.1.62.16949
- Smith, H. J. Information Privacy and Marketing: What the U.S. Should (and Shouldn't) Learn from Europe. California Management Review, 43(2), 2001, 8-33.10.2307/41166073
- Smith, H. J., Milberg, S. J. and Burke, S. J. Information Privacy: Measuring Individuals' Concerns About Organizational Practices. MIS Quarterly, 20(2), 1996, pp. 167.10.2307/249477
- Taber, K. S. The Use of Cronbach's Alpha When Developing and Reporting Research Instruments in Science Education. Research in Science Education. 2017.10.1007/s11165-016-9602-2
- Tang, Z., Hu, Y. U. and Smith, M. D. Gaining Trust Through Online Privacy Protection: Self-Regulation, Mandatory Standards, or Caveat Emptor. Journal of Management Information Systems, 24(4), 2008, pp. 153-173.10.2753/MIS0742-1222240406
- Tatum, H. Your Data and Privacy. Ask Help Desk: No, Your Phone Isn't Listening to Your Conversations. (2021, November 12). Seriously [Blog post]. Retrieved from https://www.washingtonpost.com/technology/2021/11/12/phone-audio-targeting-privacy/
- Tavakol, M. and Dennick, R. Making Sense of Cronbach's Alpha. International Journal of Medical Education, 2, 2011, pp. 53-55. http://doi:10.5116/ijme.4dfb.8dfd10.5116/ijme.4dfb.8dfd
- Tsai, J. Y., Egelman, S., Cranor, L., and Acquisti, A. The Effect of Online Privacy information on purchasing behavior: An experimental study. Information Systems Research, 22(2), 2011, 254-268. http://doi:10.1287/isre.1090.026010.1287/isre.1090.0260
- Wakefield, R. The Influence of User Affects in Online Information Disclosure. The Journal of Strategic Information Systems, 22(2), 2013, pp.157-174. http://doi:10.1016/j.jsis.2013.01.00310.1016/j.jsis.2013.01.003
- World Economic Forum. The Global Information Technology Report Retrieved from http://www3.weforum.org/docs/GITR2016/WEF_GITR_Full_Report.pdf 2016.
- Xu, H., Dinev, T., Smith, H. J., and Hart, P. Examining the Formation of Individual's Information Privacy Concerns: Toward an Integrative View, in Proceedings of 29th International Conference on Information Systems, Paris, France, 14-17, 2008. Retrieved from https://faculty.ist.psu.edu/xu/papers/conference/icis08a.pdf
- Xu, H., Teo, H.-H., Tan, B. C. Y., and Agarwal, R. The Role of Push-Pull Technology in Privacy Calculus: The Case of Location-based Services. Journal of Management Information Systems, 26(3), 2009, pp. 135-174. http://doi:10.2753/mis0742-122226030510.2753/MIS0742-1222260305
- Zou, Z., Yun, Y., and Sun, J. Entropy Method for Determination of Weight of Evaluating Indicators in Fuzzy Synthetic Evaluation for Water Quality Assessment. Journal of Environmental Sciences, 18(5), 2006, pp. 1020-1023. http://doi:10.1016/s1001-0742(06)60032-610.1016/S1001-0742(06)60032-6
Typ dokumentu
Bibliografia
Identyfikatory
Identyfikator YADDA
bwmeta1.element.ekon-element-000171650036