Pub Date : 2024-04-08DOI: 10.1108/itp-07-2022-0516
P. Ifinedo, Francine Vachon, Anteneh Ayanso
PurposeThis paper aims to increase understanding of pertinent exogenous and endogenous antecedents that can reduce data privacy breaches.Design/methodology/approachA cross-sectional survey was used to source participants' perceptions of relevant exogenous and endogenous antecedents developed from the Antecedents-Privacy Concerns-Outcomes (APCO) model and Social Cognitive Theory. A research model was proposed and tested with empirical data collected from 213 participants based in Canada.FindingsThe exogenous factors of external privacy training and external privacy self-assessment tool significantly and positively impact the study's endogenous factors of individual privacy awareness, organizational resources allocated to privacy concerns, and group behavior concerning privacy laws. Further, the proximal determinants of data privacy breaches (dependent construct) are negatively influenced by individual privacy awareness, group behavior related to privacy laws, and organizational resources allocated to privacy concerns. The endogenous factors fully mediated the relationships between the exogenous factors and the dependent construct.Research limitations/implicationsThis study contributes to the budding data privacy breach literature by highlighting the impacts of personal and environmental factors in the discourse.Practical implicationsThe results offer management insights on mitigating data privacy breach incidents arising from employees' actions. Roles of external privacy training and privacy self-assessment tools are signified.Originality/valueAntecedents of data privacy breaches have been underexplored. This paper is among the first to elucidate the roles of select exogenous and endogenous antecedents encompassing personal and environmental imperatives on data privacy breaches.
{"title":"Reducing data privacy breaches: an empirical study of relevant antecedents and an outcome","authors":"P. Ifinedo, Francine Vachon, Anteneh Ayanso","doi":"10.1108/itp-07-2022-0516","DOIUrl":"https://doi.org/10.1108/itp-07-2022-0516","url":null,"abstract":"PurposeThis paper aims to increase understanding of pertinent exogenous and endogenous antecedents that can reduce data privacy breaches.Design/methodology/approachA cross-sectional survey was used to source participants' perceptions of relevant exogenous and endogenous antecedents developed from the Antecedents-Privacy Concerns-Outcomes (APCO) model and Social Cognitive Theory. A research model was proposed and tested with empirical data collected from 213 participants based in Canada.FindingsThe exogenous factors of external privacy training and external privacy self-assessment tool significantly and positively impact the study's endogenous factors of individual privacy awareness, organizational resources allocated to privacy concerns, and group behavior concerning privacy laws. Further, the proximal determinants of data privacy breaches (dependent construct) are negatively influenced by individual privacy awareness, group behavior related to privacy laws, and organizational resources allocated to privacy concerns. The endogenous factors fully mediated the relationships between the exogenous factors and the dependent construct.Research limitations/implicationsThis study contributes to the budding data privacy breach literature by highlighting the impacts of personal and environmental factors in the discourse.Practical implicationsThe results offer management insights on mitigating data privacy breach incidents arising from employees' actions. Roles of external privacy training and privacy self-assessment tools are signified.Originality/valueAntecedents of data privacy breaches have been underexplored. This paper is among the first to elucidate the roles of select exogenous and endogenous antecedents encompassing personal and environmental imperatives on data privacy breaches.","PeriodicalId":168000,"journal":{"name":"Information Technology & People","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-04-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140729577","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-04-05DOI: 10.1108/itp-01-2023-0049
Ayse Ocal, Kevin Crowston
PurposeResearch on artificial intelligence (AI) and its potential effects on the workplace is increasing. How AI and the futures of work are framed in traditional media has been examined in prior studies, but current research has not gone far enough in examining how AI is framed on social media. This paper aims to fill this gap by examining how people frame the futures of work and intelligent machines when they post on social media.Design/methodology/approachWe investigate public interpretations, assumptions and expectations, referring to framing expressed in social media conversations. We also coded the emotions and attitudes expressed in the text data. A corpus consisting of 998 unique Reddit post titles and their corresponding 16,611 comments was analyzed using computer-aided textual analysis comprising a BERTopic model and two BERT text classification models, one for emotion and the other for sentiment analysis, supported by human judgment.FindingsDifferent interpretations, assumptions and expectations were found in the conversations. Three subframes were analyzed in detail under the overarching frame of the New World of Work: (1) general impacts of intelligent machines on society, (2) undertaking of tasks (augmentation and substitution) and (3) loss of jobs. The general attitude observed in conversations was slightly positive, and the most common emotion category was curiosity.Originality/valueFindings from this research can uncover public needs and expectations regarding the future of work with intelligent machines. The findings may also help shape research directions about futures of work. Furthermore, firms, organizations or industries may employ framing methods to analyze customers’ or workers’ responses or even influence the responses. Another contribution of this work is the application of framing theory to interpreting how people conceptualize the future of work with intelligent machines.
{"title":"Framing and feelings on social media: the futures of work and intelligent machines","authors":"Ayse Ocal, Kevin Crowston","doi":"10.1108/itp-01-2023-0049","DOIUrl":"https://doi.org/10.1108/itp-01-2023-0049","url":null,"abstract":"PurposeResearch on artificial intelligence (AI) and its potential effects on the workplace is increasing. How AI and the futures of work are framed in traditional media has been examined in prior studies, but current research has not gone far enough in examining how AI is framed on social media. This paper aims to fill this gap by examining how people frame the futures of work and intelligent machines when they post on social media.Design/methodology/approachWe investigate public interpretations, assumptions and expectations, referring to framing expressed in social media conversations. We also coded the emotions and attitudes expressed in the text data. A corpus consisting of 998 unique Reddit post titles and their corresponding 16,611 comments was analyzed using computer-aided textual analysis comprising a BERTopic model and two BERT text classification models, one for emotion and the other for sentiment analysis, supported by human judgment.FindingsDifferent interpretations, assumptions and expectations were found in the conversations. Three subframes were analyzed in detail under the overarching frame of the New World of Work: (1) general impacts of intelligent machines on society, (2) undertaking of tasks (augmentation and substitution) and (3) loss of jobs. The general attitude observed in conversations was slightly positive, and the most common emotion category was curiosity.Originality/valueFindings from this research can uncover public needs and expectations regarding the future of work with intelligent machines. The findings may also help shape research directions about futures of work. Furthermore, firms, organizations or industries may employ framing methods to analyze customers’ or workers’ responses or even influence the responses. Another contribution of this work is the application of framing theory to interpreting how people conceptualize the future of work with intelligent machines.","PeriodicalId":168000,"journal":{"name":"Information Technology & People","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-04-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140736571","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-04-05DOI: 10.1108/itp-10-2022-0809
Manoj Krishnan, Satish Krishnan
PurposeThe study aims to drive conceptual clarity around resistance to information technology projects, integrating multiple facets of the phenomenon from earlier studies.Design/methodology/approachThe study conducts a meta-synthesis of qualitative studies on resistance to technology projects; it analyzes those studies at a case-specific level, compares and contrasts emergent concepts against each other, and “translates” those to the rest of the studies. The study uses the seven-step meta-ethnography method by Noblit and Hare to reciprocally translate emergent concepts to construct the conceptual model.FindingsThrough meta-synthesis, the study derives a new conceptual model for resistance to information technology projects, exemplifying how the identified antecedents create user resistance and how the phenomenon progresses within organizations.Research limitations/implicationsThis study enriches the observations and conclusions of past individual studies while explicating various facets of the mechanisms that generate and progress technology resistance within organizations. It offers fresh insights into the equivocal nature of the phenomenon and the distinctive ways it progresses from individual to group level.Practical implicationsMany ambitious and costly digital transformation efforts do not succeed due to user resistance. Understanding the mechanisms that create user resistance can help organizations manage technology projects better, thereby reducing the technology assimilation gap and protecting returns on related investments.Originality/valueThere have been extensive studies on technology acceptance (enablers) within organizations, while those relating to technology inhibitors are somewhat limited. However, the symmetry of understanding between enablers and inhibitors is vital for organizations to assimilate promising technologies and transform their business models. This model uses a new lens of sensemaking theory to explain how the antecedents trigger perceived threats and resistance behavior; it highlights the nuances around the development of resistance within individuals and its progression to groups. The resultant model offers better generalizability in organizational contexts.
{"title":"Investigating resistance to IT projects: a conceptual model from a meta-synthesis approach","authors":"Manoj Krishnan, Satish Krishnan","doi":"10.1108/itp-10-2022-0809","DOIUrl":"https://doi.org/10.1108/itp-10-2022-0809","url":null,"abstract":"PurposeThe study aims to drive conceptual clarity around resistance to information technology projects, integrating multiple facets of the phenomenon from earlier studies.Design/methodology/approachThe study conducts a meta-synthesis of qualitative studies on resistance to technology projects; it analyzes those studies at a case-specific level, compares and contrasts emergent concepts against each other, and “translates” those to the rest of the studies. The study uses the seven-step meta-ethnography method by Noblit and Hare to reciprocally translate emergent concepts to construct the conceptual model.FindingsThrough meta-synthesis, the study derives a new conceptual model for resistance to information technology projects, exemplifying how the identified antecedents create user resistance and how the phenomenon progresses within organizations.Research limitations/implicationsThis study enriches the observations and conclusions of past individual studies while explicating various facets of the mechanisms that generate and progress technology resistance within organizations. It offers fresh insights into the equivocal nature of the phenomenon and the distinctive ways it progresses from individual to group level.Practical implicationsMany ambitious and costly digital transformation efforts do not succeed due to user resistance. Understanding the mechanisms that create user resistance can help organizations manage technology projects better, thereby reducing the technology assimilation gap and protecting returns on related investments.Originality/valueThere have been extensive studies on technology acceptance (enablers) within organizations, while those relating to technology inhibitors are somewhat limited. However, the symmetry of understanding between enablers and inhibitors is vital for organizations to assimilate promising technologies and transform their business models. This model uses a new lens of sensemaking theory to explain how the antecedents trigger perceived threats and resistance behavior; it highlights the nuances around the development of resistance within individuals and its progression to groups. The resultant model offers better generalizability in organizational contexts.","PeriodicalId":168000,"journal":{"name":"Information Technology & People","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-04-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140737322","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-04-02DOI: 10.1108/itp-01-2023-0001
R. Bawack, Emilie Bonhoure, Sabrine Mallek
PurposeThis study aims to identify and explore different risk typologies associated with consumer acceptance of purchase recommendations from voice assistants (VAs).Design/methodology/approachDrawing on components of perceived risk, consumer trust theory, and consumption value theory, a research model was proposed and tested using structural equation modeling (SEM) with data from 482 voice shoppers.FindingsThe results reveal that, unlike risks associated with physical harm, privacy breaches, and security threats, a variety of other concerns—including financial, psychological, social, performance-related risks, time loss, and the overall perceived risks—significantly influence consumers' willingness to accept VAs purchase recommendations. The effect is mediated by trust in VA purchase recommendations and their perceived value. Different types of risk affect various consumption values, with functional value being the most influential. The model explains 58.6% of the variance in purchase recommendation acceptance and significantly elucidates the variance in all consumption values.Originality/valueThis study contributes crucial knowledge to understanding consumer decision-making processes as they increasingly leverage AI-powered voice-based dialogue platforms for online purchasing. It emphasizes recognizing diverse risk typologies associated with VA purchase recommendations and their impact on consumer purchase behavior. The findings offer insights for marketing managers seeking to navigate the challenges posed by consumers' perceived risks while leveraging VAs as an integral component of modern shopping environments.
{"title":"Why would consumers risk taking purchase recommendations from voice assistants?","authors":"R. Bawack, Emilie Bonhoure, Sabrine Mallek","doi":"10.1108/itp-01-2023-0001","DOIUrl":"https://doi.org/10.1108/itp-01-2023-0001","url":null,"abstract":"PurposeThis study aims to identify and explore different risk typologies associated with consumer acceptance of purchase recommendations from voice assistants (VAs).Design/methodology/approachDrawing on components of perceived risk, consumer trust theory, and consumption value theory, a research model was proposed and tested using structural equation modeling (SEM) with data from 482 voice shoppers.FindingsThe results reveal that, unlike risks associated with physical harm, privacy breaches, and security threats, a variety of other concerns—including financial, psychological, social, performance-related risks, time loss, and the overall perceived risks—significantly influence consumers' willingness to accept VAs purchase recommendations. The effect is mediated by trust in VA purchase recommendations and their perceived value. Different types of risk affect various consumption values, with functional value being the most influential. The model explains 58.6% of the variance in purchase recommendation acceptance and significantly elucidates the variance in all consumption values.Originality/valueThis study contributes crucial knowledge to understanding consumer decision-making processes as they increasingly leverage AI-powered voice-based dialogue platforms for online purchasing. It emphasizes recognizing diverse risk typologies associated with VA purchase recommendations and their impact on consumer purchase behavior. The findings offer insights for marketing managers seeking to navigate the challenges posed by consumers' perceived risks while leveraging VAs as an integral component of modern shopping environments.","PeriodicalId":168000,"journal":{"name":"Information Technology & People","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-04-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140754224","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-04-02DOI: 10.1108/itp-01-2023-0084
Farjam Eshraghian, Najmeh Hafezieh, F. Farivar, Sergio de Cesare
PurposeThe applications of Artificial Intelligence (AI) in various areas of professional and knowledge work are growing. Emotions play an important role in how users incorporate a technology into their work practices. The current study draws on work in the areas of AI-powered technologies adaptation, emotions, and the future of work, to investigate how knowledge workers feel about adopting AI in their work.Design/methodology/approachWe gathered 107,111 tweets about the new AI programmer, GitHub Copilot, launched by GitHub and analysed the data in three stages. First, after cleaning and filtering the data, we applied the topic modelling method to analyse 16,130 tweets posted by 10,301 software programmers to identify the emotions they expressed. Then, we analysed the outcome topics qualitatively to understand the stimulus characteristics driving those emotions. Finally, we analysed a sample of tweets to explore how emotional responses changed over time.FindingsWe found six categories of emotions among software programmers: challenge, achievement, loss, deterrence, scepticism, and apathy. In addition, we found these emotions were driven by four stimulus characteristics: AI development, AI functionality, identity work, and AI engagement. We also examined the change in emotions over time. The results indicate that negative emotions changed to more positive emotions once software programmers redirected their attention to the AI programmer's capabilities and functionalities, and related that to their identity work.Practical implicationsOverall, as organisations start adopting AI-powered technologies in their software development practices, our research offers practical guidance to managers by identifying factors that can change negative emotions to positive emotions.Originality/valueOur study makes a timely contribution to the discussions on AI and the future of work through the lens of emotions. In contrast to nascent discussions on the role of AI in high-skilled jobs that show knowledge workers' general ambivalence towards AI, we find knowledge workers show more positive emotions over time and as they engage more with AI. In addition, this study unveils the role of professional identity in leading to more positive emotions towards AI, as knowledge workers view such technology as a means of expanding their identity rather than as a threat to it.
{"title":"AI in software programming: understanding emotional responses to GitHub Copilot","authors":"Farjam Eshraghian, Najmeh Hafezieh, F. Farivar, Sergio de Cesare","doi":"10.1108/itp-01-2023-0084","DOIUrl":"https://doi.org/10.1108/itp-01-2023-0084","url":null,"abstract":"PurposeThe applications of Artificial Intelligence (AI) in various areas of professional and knowledge work are growing. Emotions play an important role in how users incorporate a technology into their work practices. The current study draws on work in the areas of AI-powered technologies adaptation, emotions, and the future of work, to investigate how knowledge workers feel about adopting AI in their work.Design/methodology/approachWe gathered 107,111 tweets about the new AI programmer, GitHub Copilot, launched by GitHub and analysed the data in three stages. First, after cleaning and filtering the data, we applied the topic modelling method to analyse 16,130 tweets posted by 10,301 software programmers to identify the emotions they expressed. Then, we analysed the outcome topics qualitatively to understand the stimulus characteristics driving those emotions. Finally, we analysed a sample of tweets to explore how emotional responses changed over time.FindingsWe found six categories of emotions among software programmers: challenge, achievement, loss, deterrence, scepticism, and apathy. In addition, we found these emotions were driven by four stimulus characteristics: AI development, AI functionality, identity work, and AI engagement. We also examined the change in emotions over time. The results indicate that negative emotions changed to more positive emotions once software programmers redirected their attention to the AI programmer's capabilities and functionalities, and related that to their identity work.Practical implicationsOverall, as organisations start adopting AI-powered technologies in their software development practices, our research offers practical guidance to managers by identifying factors that can change negative emotions to positive emotions.Originality/valueOur study makes a timely contribution to the discussions on AI and the future of work through the lens of emotions. In contrast to nascent discussions on the role of AI in high-skilled jobs that show knowledge workers' general ambivalence towards AI, we find knowledge workers show more positive emotions over time and as they engage more with AI. In addition, this study unveils the role of professional identity in leading to more positive emotions towards AI, as knowledge workers view such technology as a means of expanding their identity rather than as a threat to it.","PeriodicalId":168000,"journal":{"name":"Information Technology & People","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-04-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140752144","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-01-16DOI: 10.1108/itp-04-2021-0297
Annette Mills, Nelly Todorova, Jing Zhang
PurposeDisasters and other emergencies are increasing, with millions of people affected by events like earthquakes, fires and flooding. The use of mobile emergency alert systems (MEAS) can improve people’s responses by providing targeted alerts based on location and other personal details. This study aims to understand the factors that influence people’s willingness to share the personal information that is needed to provide context-specific messaging about a threat and protective actions.Design/methodology/approachDrawing on protection motivation theory (PMT), this study proposes and tests a model of willingness to use personalised MEAS that incorporates key factors related to an individual’s appraisal of a potential threat (i.e. perceived vulnerability and severity) and coping capacity (i.e. response efficacy and self-efficacy), with deterrents like response cost and privacy concern. This study uses survey data from 226 respondents in New Zealand and SmartPLS to assess the model.FindingsThe results show how willingness to use MEAS is influenced by people’s appraisal of an emergency threat and their perception of how using MEAS would help them to cope effectively. Fear and perceived severity are significant motivators of MEAS use, along with coping appraisal. However, when the negative influences of privacy concern and response cost are strong enough, they can dissuade use, despite knowing the risks.Originality/valueThe study addresses a gap in research on the use of alert systems like MEAS, which require sharing of personal information and continuous engagement such as the real-time disclosure of one’s location. It confirms the significance of factors not studied in prior research, such as privacy concerns, that can dissuade use. This study also extends the application of the PMT in the context of emergency management.
{"title":"The role of threat and coping appraisals in motivating the use of personalised mobile emergency alert systems","authors":"Annette Mills, Nelly Todorova, Jing Zhang","doi":"10.1108/itp-04-2021-0297","DOIUrl":"https://doi.org/10.1108/itp-04-2021-0297","url":null,"abstract":"PurposeDisasters and other emergencies are increasing, with millions of people affected by events like earthquakes, fires and flooding. The use of mobile emergency alert systems (MEAS) can improve people’s responses by providing targeted alerts based on location and other personal details. This study aims to understand the factors that influence people’s willingness to share the personal information that is needed to provide context-specific messaging about a threat and protective actions.Design/methodology/approachDrawing on protection motivation theory (PMT), this study proposes and tests a model of willingness to use personalised MEAS that incorporates key factors related to an individual’s appraisal of a potential threat (i.e. perceived vulnerability and severity) and coping capacity (i.e. response efficacy and self-efficacy), with deterrents like response cost and privacy concern. This study uses survey data from 226 respondents in New Zealand and SmartPLS to assess the model.FindingsThe results show how willingness to use MEAS is influenced by people’s appraisal of an emergency threat and their perception of how using MEAS would help them to cope effectively. Fear and perceived severity are significant motivators of MEAS use, along with coping appraisal. However, when the negative influences of privacy concern and response cost are strong enough, they can dissuade use, despite knowing the risks.Originality/valueThe study addresses a gap in research on the use of alert systems like MEAS, which require sharing of personal information and continuous engagement such as the real-time disclosure of one’s location. It confirms the significance of factors not studied in prior research, such as privacy concerns, that can dissuade use. This study also extends the application of the PMT in the context of emergency management.","PeriodicalId":168000,"journal":{"name":"Information Technology & People","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-01-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139527989","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-01-15DOI: 10.1108/itp-05-2023-0467
Christine Prince, Nessrine Omrani, Francesco Schiavone
PurposeResearch on online user privacy shows that empirical evidence on how privacy literacy relates to users' information privacy empowerment is missing. To fill this gap, this paper investigated the respective influence of two primary dimensions of online privacy literacy – namely declarative and procedural knowledge – on online users' information privacy empowerment.Design/methodology/approachAn empirical analysis is conducted using a dataset collected in Europe. This survey was conducted in 2019 among 27,524 representative respondents of the European population.FindingsThe main results show that users' procedural knowledge is positively linked to users' privacy empowerment. The relationship between users' declarative knowledge and users' privacy empowerment is partially supported. While greater awareness about firms and organizations practices in terms of data collections and further uses conditions was found to be significantly associated with increased users' privacy empowerment, unpredictably, results revealed that the awareness about the GDPR and user’s privacy empowerment are negatively associated. The empirical findings reveal also that greater online privacy literacy is associated with heightened users' information privacy empowerment.Originality/valueWhile few advanced studies made systematic efforts to measure changes occurred on websites since the GDPR enforcement, it remains unclear, however, how individuals perceive, understand and apply the GDPR rights/guarantees and their likelihood to strengthen users' information privacy control. Therefore, this paper contributes empirically to understanding how online users' privacy literacy shaped by both users' declarative and procedural knowledge is likely to affect users' information privacy empowerment. The study empirically investigates the effectiveness of the GDPR in raising users' information privacy empowerment from user-based perspective. Results stress the importance of greater transparency of data tracking and processing decisions made by online businesses and services to strengthen users' control over information privacy. Study findings also put emphasis on the crucial need for more educational efforts to raise users' awareness about the GDPR rights/guarantees related to data protection. Empirical findings also show that users who are more likely to adopt self-protective approaches to reinforce personal data privacy are more likely to perceive greater control over personal data. A broad implication of this finding for practitioners and E-businesses stresses the need for empowering users with adequate privacy protection tools to ensure more confidential transactions.
{"title":"Online privacy literacy and users' information privacy empowerment: the case of GDPR in Europe","authors":"Christine Prince, Nessrine Omrani, Francesco Schiavone","doi":"10.1108/itp-05-2023-0467","DOIUrl":"https://doi.org/10.1108/itp-05-2023-0467","url":null,"abstract":"PurposeResearch on online user privacy shows that empirical evidence on how privacy literacy relates to users' information privacy empowerment is missing. To fill this gap, this paper investigated the respective influence of two primary dimensions of online privacy literacy – namely declarative and procedural knowledge – on online users' information privacy empowerment.Design/methodology/approachAn empirical analysis is conducted using a dataset collected in Europe. This survey was conducted in 2019 among 27,524 representative respondents of the European population.FindingsThe main results show that users' procedural knowledge is positively linked to users' privacy empowerment. The relationship between users' declarative knowledge and users' privacy empowerment is partially supported. While greater awareness about firms and organizations practices in terms of data collections and further uses conditions was found to be significantly associated with increased users' privacy empowerment, unpredictably, results revealed that the awareness about the GDPR and user’s privacy empowerment are negatively associated. The empirical findings reveal also that greater online privacy literacy is associated with heightened users' information privacy empowerment.Originality/valueWhile few advanced studies made systematic efforts to measure changes occurred on websites since the GDPR enforcement, it remains unclear, however, how individuals perceive, understand and apply the GDPR rights/guarantees and their likelihood to strengthen users' information privacy control. Therefore, this paper contributes empirically to understanding how online users' privacy literacy shaped by both users' declarative and procedural knowledge is likely to affect users' information privacy empowerment. The study empirically investigates the effectiveness of the GDPR in raising users' information privacy empowerment from user-based perspective. Results stress the importance of greater transparency of data tracking and processing decisions made by online businesses and services to strengthen users' control over information privacy. Study findings also put emphasis on the crucial need for more educational efforts to raise users' awareness about the GDPR rights/guarantees related to data protection. Empirical findings also show that users who are more likely to adopt self-protective approaches to reinforce personal data privacy are more likely to perceive greater control over personal data. A broad implication of this finding for practitioners and E-businesses stresses the need for empowering users with adequate privacy protection tools to ensure more confidential transactions.","PeriodicalId":168000,"journal":{"name":"Information Technology & People","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-01-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139530008","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-01-10DOI: 10.1108/itp-05-2023-0524
Gaurav Bansal, Zhuoli Axelton
PurposeIT security compliance is critical to the organization’s success, and such compliance depends largely on IT leadership. Considering the prevalence of unconscious gender biases and stereotyping at the workplace and growing female leadership in IT, the authors examine how the internalization of stereotype beliefs, in the form of the employee’s gender, impacts the relationships between leadership characteristics and IT security compliance intentions.Design/methodology/approachA controlled experiment using eight different vignettes manipulating Chief Information Officer (CIO) gender (male/female), Information Technology (IT) expertise (low/high) and leadership style (transactional/transformational) was designed in Qualtrics. Data were gathered from MTurk workers from all over the US.FindingsThe findings suggest that both CIOs' and employees' gender play an important role in how IT leadership characteristics – perceived expertise and leadership style – influence the employees' intentions and reactance to comply with CIO security recommendations.Research limitations/implicationsThis study's findings enrich the security literature by examining the role of leadership styles on reactance and compliance intentions. They also provide important theoretical implications based on gender stereotype theory alone: First, the glass ceiling effects can be witnessed in how men and women employees demonstrate prejudice against women CIO leaders through their reliance on perceived quadratic CIO IT expertise in forming compliance intentions. Secondly, this study's findings related to gender role internalization show men and women have a prejudice against gender-incongruent roles wherein women employees are least resistive to transactional male CIOs, and men employees are less inclined to comply with transactional female CIOs confirm the findings related to gender internationalization from Hentschel et al. (2019).Practical implicationsThis study highlights the significance of organizations and individuals actively promoting gender equality and fostering environments that recognize women's achievements. It also underscores the importance of educating men and women about the societal implications of stereotyping gender roles that go beyond the organizational setting. This research demonstrates that a continued effort is required to eradicate biases stemming from gender stereotypes and foster social inclusion. Such efforts can positively influence how upcoming IT leaders and employees internalize gender-related factors when shaping their identities.Social implicationsThis study shows that more work needs to be done to eliminate gender stereotype biases and promote social inclusion to positively impact how future IT leaders and employees shape their identities through internalization.Originality/valueThis study redefines the concept of “sticky floors” to explain how subordinates can hinder and undermine female leaders, thereby contributing to the glass ceiling effect
目的 IT 安全合规性对组织的成功至关重要,而这种合规性在很大程度上取决于 IT 领导力。考虑到工作场所普遍存在无意识的性别偏见和刻板印象,以及 IT 领域女性领导力的增长,作者研究了员工性别形式的刻板印象信念的内化如何影响领导力特征与 IT 安全合规意愿之间的关系。研究结果研究结果表明,首席信息官和员工的性别在信息技术领导特征--感知到的专业知识和领导风格--如何影响员工遵守首席信息官安全建议的意愿和反应方面起着重要作用。这些研究结果还提供了仅基于性别刻板印象理论的重要理论意义:首先,男性和女性员工在形成遵从意向时如何通过依赖感知到的四维首席信息官信息技术专业知识来表现出对女性首席信息官领导的偏见,这可以见证玻璃天花板效应。其次,本研究与性别角色内化相关的发现表明,男性和女性对性别不一致的角色存在偏见,其中女性员工对交易型男性首席信息官的抵触情绪最小,而男性员工则不太愿意服从交易型女性首席信息官,这也印证了 Hentschel 等人(2019)与性别国际化相关的发现。它还强调了教育男性和女性了解性别角色定型观念的社会影响的重要性,这种影响超出了组织环境的范围。这项研究表明,需要继续努力消除由性别定型观念产生的偏见,促进社会包容。社会影响本研究表明,需要做更多的工作来消除性别刻板印象偏见和促进社会包容,从而对未来的 IT 领导者和员工如何通过内化来塑造自己的身份产生积极影响。此外,本研究还阐明了性别角色如何通过性别刻板印象和内化作用塑造员工对不同领导风格的反应。
{"title":"She’s worth IT: challenges for female CIOs in ensuring IT security compliance","authors":"Gaurav Bansal, Zhuoli Axelton","doi":"10.1108/itp-05-2023-0524","DOIUrl":"https://doi.org/10.1108/itp-05-2023-0524","url":null,"abstract":"PurposeIT security compliance is critical to the organization’s success, and such compliance depends largely on IT leadership. Considering the prevalence of unconscious gender biases and stereotyping at the workplace and growing female leadership in IT, the authors examine how the internalization of stereotype beliefs, in the form of the employee’s gender, impacts the relationships between leadership characteristics and IT security compliance intentions.Design/methodology/approachA controlled experiment using eight different vignettes manipulating Chief Information Officer (CIO) gender (male/female), Information Technology (IT) expertise (low/high) and leadership style (transactional/transformational) was designed in Qualtrics. Data were gathered from MTurk workers from all over the US.FindingsThe findings suggest that both CIOs' and employees' gender play an important role in how IT leadership characteristics – perceived expertise and leadership style – influence the employees' intentions and reactance to comply with CIO security recommendations.Research limitations/implicationsThis study's findings enrich the security literature by examining the role of leadership styles on reactance and compliance intentions. They also provide important theoretical implications based on gender stereotype theory alone: First, the glass ceiling effects can be witnessed in how men and women employees demonstrate prejudice against women CIO leaders through their reliance on perceived quadratic CIO IT expertise in forming compliance intentions. Secondly, this study's findings related to gender role internalization show men and women have a prejudice against gender-incongruent roles wherein women employees are least resistive to transactional male CIOs, and men employees are less inclined to comply with transactional female CIOs confirm the findings related to gender internationalization from Hentschel et al. (2019).Practical implicationsThis study highlights the significance of organizations and individuals actively promoting gender equality and fostering environments that recognize women's achievements. It also underscores the importance of educating men and women about the societal implications of stereotyping gender roles that go beyond the organizational setting. This research demonstrates that a continued effort is required to eradicate biases stemming from gender stereotypes and foster social inclusion. Such efforts can positively influence how upcoming IT leaders and employees internalize gender-related factors when shaping their identities.Social implicationsThis study shows that more work needs to be done to eliminate gender stereotype biases and promote social inclusion to positively impact how future IT leaders and employees shape their identities through internalization.Originality/valueThis study redefines the concept of “sticky floors” to explain how subordinates can hinder and undermine female leaders, thereby contributing to the glass ceiling effect","PeriodicalId":168000,"journal":{"name":"Information Technology & People","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-01-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139441438","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-01-09DOI: 10.1108/itp-12-2022-0972
J. Yadav, Kuldeep Singh, Nirpendra P. Rana, Denis Dennehy
Purpose Social media has played a pivotal role in polarizing views on Russia–Ukraine conflict. The effects of polarization in online interactions have been extensively studied in many contexts. This research aims to examine how multiple social media sources may act as an integrator of information and act as a platform for depolarizing behaviors.Design/methodology/approach This study analyzes the communications of 6,662 tweets related to the sanctions imposed on Russia by using textual analytics and predictive modeling.Findings The research findings reveal that the tweeting behavior of netizens was depolarized because of information from multiple social media sources. However, the influx of information from non-organizational sources such as trending topics and discussions has a depolarizing impact on the user’s pre-established attitude.Research limitations/implications For policymakers, conflict mediators and observers, and members of society in general, there is a need for (1) continuous and consistent communication throughout the crisis, (2) transparency in the information being communicated and (3) public awareness of the polarized and conflicting information being provided from multiple actors that may be biased in the claims being made about the conflict crisis.Originality/value While previous research has examined Russia–Ukraine conflict from a variety of perspectives, this is the first study to examine how social media might be used to reduce attitude polarization during times of conflict.
{"title":"Social media as a behavior depolarizer: evidence from Russia–Ukraine conflict","authors":"J. Yadav, Kuldeep Singh, Nirpendra P. Rana, Denis Dennehy","doi":"10.1108/itp-12-2022-0972","DOIUrl":"https://doi.org/10.1108/itp-12-2022-0972","url":null,"abstract":"Purpose Social media has played a pivotal role in polarizing views on Russia–Ukraine conflict. The effects of polarization in online interactions have been extensively studied in many contexts. This research aims to examine how multiple social media sources may act as an integrator of information and act as a platform for depolarizing behaviors.Design/methodology/approach This study analyzes the communications of 6,662 tweets related to the sanctions imposed on Russia by using textual analytics and predictive modeling.Findings The research findings reveal that the tweeting behavior of netizens was depolarized because of information from multiple social media sources. However, the influx of information from non-organizational sources such as trending topics and discussions has a depolarizing impact on the user’s pre-established attitude.Research limitations/implications For policymakers, conflict mediators and observers, and members of society in general, there is a need for (1) continuous and consistent communication throughout the crisis, (2) transparency in the information being communicated and (3) public awareness of the polarized and conflicting information being provided from multiple actors that may be biased in the claims being made about the conflict crisis.Originality/value While previous research has examined Russia–Ukraine conflict from a variety of perspectives, this is the first study to examine how social media might be used to reduce attitude polarization during times of conflict.","PeriodicalId":168000,"journal":{"name":"Information Technology & People","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-01-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139441775","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-01-04DOI: 10.1108/itp-10-2022-0791
Abdul Hameed Pitafi
PurposeAccording to extensive analysis, employee agility is influenced by teamwork, coordination and the organizational environment. However, less consideration has been given to the role of work stressors (challenge, hindrance) in influencing employee agility. To address this research gap, this study sheds light on how the use of enterprise social media (ESM) for social and work purposes influences employee agility through work stressors.Design/methodology/approachThis research also explores how ESM visibility enhances the interaction between work stressors and employee agility by using primary data obtained from Chinese workers. A total of 377 entries were analyzed using AMOS 24.10 tools. All the hypotheses were tested using structural equation modeling (SEM).FindingsThe findings revealed that ESM use (social and work) negatively impacts challenge and hindrance work stressors. The results also reflect that challenge stressors have a significant impact on employee agility, whereas hindrance stressors are negatively related to it. Furthermore, the outcome also indicated that increased ESM visibility reinforces the connection between challenge stressors and employee agility. However, ESM visibility did not indicate a significant moderating impact on the link between hindrance stressors and employee agility.Originality/valueThis study describes how ESM usage effects agility of stressed employees. This research also explores how ESM visibility improves the interaction between work stressors and employee agility. The study results contribute to growing research on social media and employee agility and suggest several points of guidance for managers.
{"title":"Enterprise social media as enablers of employees' agility: the impact of work stress and enterprise social media visibility","authors":"Abdul Hameed Pitafi","doi":"10.1108/itp-10-2022-0791","DOIUrl":"https://doi.org/10.1108/itp-10-2022-0791","url":null,"abstract":"PurposeAccording to extensive analysis, employee agility is influenced by teamwork, coordination and the organizational environment. However, less consideration has been given to the role of work stressors (challenge, hindrance) in influencing employee agility. To address this research gap, this study sheds light on how the use of enterprise social media (ESM) for social and work purposes influences employee agility through work stressors.Design/methodology/approachThis research also explores how ESM visibility enhances the interaction between work stressors and employee agility by using primary data obtained from Chinese workers. A total of 377 entries were analyzed using AMOS 24.10 tools. All the hypotheses were tested using structural equation modeling (SEM).FindingsThe findings revealed that ESM use (social and work) negatively impacts challenge and hindrance work stressors. The results also reflect that challenge stressors have a significant impact on employee agility, whereas hindrance stressors are negatively related to it. Furthermore, the outcome also indicated that increased ESM visibility reinforces the connection between challenge stressors and employee agility. However, ESM visibility did not indicate a significant moderating impact on the link between hindrance stressors and employee agility.Originality/valueThis study describes how ESM usage effects agility of stressed employees. This research also explores how ESM visibility improves the interaction between work stressors and employee agility. The study results contribute to growing research on social media and employee agility and suggest several points of guidance for managers.","PeriodicalId":168000,"journal":{"name":"Information Technology & People","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-01-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139386140","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}