Search results
1 – 5 of 5Janice C. Sipior and Burke T. Ward
The purpose of this paper is to provide a research model and hypotheses that explores software users' perceptions of privacy, trust, and US legal protection in using application…
Abstract
Purpose
The purpose of this paper is to provide a research model and hypotheses that explores software users' perceptions of privacy, trust, and US legal protection in using application software with embedded spyware.
Design/methodology/approach
An experimental study was undertaken requiring subjects to use an online analytical processing software product. After use, the experimental group was told spyware was embedded in the software. Questionnaire responses for the experimental and control group were compared using independent samples t‐test. Multiple regression was used to determine significant predictors of overall trust in the software vendor.
Findings
Users of software with spyware, versus users of software without spyware, have lower trust perceptions of a software vendor. Further examination of trustworthiness as a multi‐dimensional construct, reveals trustworthiness‐ability and trustworthiness‐integrity are important influences of overall trust of a vendor.
Research limitations/implications
The main limitation of the findings is the use of a convenience sample, limiting the generalizability of the results.
Practical implications
The results may provide guidance to software vendors and government regulatory agencies in addressing the concerns associated with spyware.
Originality/value
Software vendors should rethink the practice of embedding spyware in software applications, unless user trust can be maintained.
Details
Keywords
Janice C. Sipior, Burke T. Ward and Regina Connolly
The purpose of this paper is to revisit the internet users’ information privacy concerns (IUIPC) construct, a research model, and hypotheses based on Malhotra et al. (2004) to…
Abstract
Purpose
The purpose of this paper is to revisit the internet users’ information privacy concerns (IUIPC) construct, a research model, and hypotheses based on Malhotra et al. (2004) to assess the continued applicability of this construct. The relationship among privacy concerns, trusting beliefs, and risk beliefs continues to be unclear. Empirical evidence about the impact of privacy concerns on behavior is mixed.
Design/methodology/approach
A paper-based questionnaire was distributed and collected from 63 part-time graduate students of a private university in the mid-Atlantic USA. These respondents have an average of six years of full-time professional work experience and the vast majority (88.9 percent) has over seven years of experience on the internet. Questionnaire items measured the constructs of the IUIPC instrument. All measurement scales were validated using factor analysis, Cronbach's α, and reliability analysis. For hypothesis testing, multiple regression analysis was used.
Findings
The results partially support those of Malhotra et al. (2004). Consistent are the findings that the higher the trust a consumer holds for an online company, the less likely that consumer is to view providing personal information as risky. Also consistent is that the higher the trust a consumer holds for an online company, the more likely is that consumer to intend to provide personal information online. Finally, the greater risk a consumer has for providing personal information, the less willing that consumer is to reveal such information online. However, the results did not support a negative relationship between the IUIPC construct and consumer trust in an online company or a positive relationship between IUIPC and consumer risk in providing personal information to an online company. The paper concludes that the IUIPC is not the valid scale to employ in measuring information privacy concerns.
Research limitations/implications
The main limitation of the findings is the use of a small convenience sample, limiting the insights into interrelationships between various dimensions of privacy concerns and the generalizability of the results.
Practical implications
The results may provide guidance to online retailers in addressing the dimensions of privacy concerns related to trusting beliefs and risk beliefs.
Originality/value
IUIPC were measured using the IUIPC instrument. This responds to Malhotra et al.'s (2004) call to use the IUIPC scale and the associated research framework to further investigate consumer privacy concerns and the suggestion by Belanger and Crossler (2011) that more studies should explore this scale. Further, both Westin (1967), and Smith et al. (1996) recognize that privacy attitudes and concerns may change over time, providing motivation to revisit IUIPC.
Details
Keywords
Burke T. Ward, Janice C. Sipior, Linda Volonino and Carolyn Purwin
The purpose of this paper is to explore the challenges confronting organizations in responding to the recent electronic discovery (e‐discovery) amendments to the US federal rules…
Abstract
Purpose
The purpose of this paper is to explore the challenges confronting organizations in responding to the recent electronic discovery (e‐discovery) amendments to the US federal rules of civil procedure. Failure to comply with these rules, even unintentionally, can have significant adverse legal consequences for parties of the lawsuit. The vast majority of information and data is electronic and stored in numerous files and on a variety of media. Thus, there is a critical need to better manage electronic content and implement a strategic approach to accommodate new rules, legislation, and ever‐changing technology. In response, the authors provide recommendations for enterprise‐wide e‐discovery readiness.
Design/methodology/approach
To investigate the legal theory for e‐discovery, the authors examine precedent‐setting legal cases for the purpose of providing managerial recommendations for developing and implementing a comprehensive policy for compliance and litigation purposes.
Findings
According to the authors' evaluation of the amendments and applicable case law, the new rules make clear that electronic information and data are discoverable, and that failure to protect and store in a retrievable format may lead to adverse legal consequences.
Practical implications
To better prepare for the duties imposed by the e‐discovery amendments, the authors recommend the formation of an enterprise‐wide multi‐functional electronically stored information Discovery Team to develop, implement, and periodically review a comprehensive electronic records management policy and procedures for compliance and litigation purposes.
Originality/value
The authors take into consideration the dearth of information systems literature addressing the critical need to better manage electronic content and to implement an enterprise‐wide strategic approach to accommodate the requirements of e‐discovery, or face costly consequences.
Details