Abstract
This study examines factors that influence an employee’s attitude and decisions about the information privacy practices of corporations. Using a survey of 319 employees from different corporations, this study explores individual factors, organizational factors and environmental factors affecting attitude towards personal information privacy. The results show that prior privacy experience, trust in IT on functionality, trust in IT on predictability, trust in IT on helpfulness, policy enforcement, top management support and government regulation are key factors affecting employees’ attitude towards personal information privacy. The results also show that employees’ concern about personal information privacy is related to actual punishments for the invasion of privacy rather than oral warnings.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Bélanger, F., Crossler, R.E.: Privacy in the digital age: a review of information privacy research in information systems. MIS Q. 35(4), 1017–A36 (2011)
Belanger, F., Hiller, J.S., Smith, W.J.: Trustworthiness in electronic commerce: the role of privacy, security, and site attributes. J. Strateg. Inf. Syst. 11(3–4), 245–270 (2002). https://doi.org/10.1016/s0963-8687(02)00018-5
Bulgurcu, B., Cavusoglu, H., Benbasat, I.: Information security policy compliance: an empirical study of rationality-based beliefs and information security awareness. MIS Q. 34(3), 523–A7 (2010)
Chang, I.-C., Hwang, H.-G., Yen, D.C., Huang, H.-Y.: An empirical study of the factors affecting Internet security for the financial industry in Taiwan. Telematics Inform. 23(4), 343–364 (2006). https://doi.org/10.1016/j.tele.2005.11.001
Kemp, M., Kemp, M.: Beyond trust: security policies and defence-in-depth. Netw. Secur. 2005(8), 14–16 (2005). https://doi.org/10.1016/s1353-4858(05)70271-3
Knapp, K.J., Marshall, T.E., Kelly Rainer, R., Nelson Ford, F.: Information security: management’s effect on culture and policy. Inf. Manage. Comput. Secur. 14(1), 24–36 (2006). https://doi.org/10.1108/09685220610648355
Korir, D.K., Kipkemboi, F.: The impact of school environment and peer influences on students’ academic performance in Vihiga County, Kenya. J. Educ. Pract. 5(11), 1–11 (2014)
Lau, V.C.S., Wing Tung, A., Ho, J.M.C.: A qualitative and quantitative review of antecedents of counterproductive behavior in organizations. J. Bus. Psychol. 18(1), 73–99 (2003)
Lee, D.-J., Ahn, J.-H., Bang, Y.: Managing consumer privacy concerns in personalization: a strategic analysis of privacy protection. MIS Q. 35(2), 423–A8 (2011)
Li, H., Sarathy, R., Zhang, J., Luo, X.: Exploring the effects of organizational justice, personal ethics and sanction on internet use policy compliance. Inf. Syst. J. 24(6), 479–502 (2014). https://doi.org/10.1111/isj.12037
Rosenblatt, S.: The biggest cyberthreat to companies could come from the inside. In: CNET, 8 January (2015). https://www.cnet.com/news/the-biggest-cyber-threat-to-companies-could-come-from-the-inside/. Accessed 5 Feb 2017
Skinner, G., Han, S., Chang, E.: Defining and protecting meta privacy: a new conceptual framework within information privacy. In: 22nd International Conference on Data Engineering Workshops (ICDEW 2006), Presented at the 22nd International Conference on Data Engineering Workshops (ICDEW 2006), pp. 101–101 (2006). https://doi.org/10.1109/icdew.2006.46
Smith, H.J., Milberg, S.J., Burke, S.J.: Information privacy: measuring individuals’ concerns about organizational practices. MIS Q. 20(2), 167–196 (1996)
Taylor, S., Todd, P.A.: Understanding information technology usage: a test of competing models. Inf. Syst. Res. 6(2), 144–176 (1995)
Thatcher, J.B., McKnight, D.H., Baker, E.W., Arsal, R.E., Roberts, N.H.: The role of trust in postadoption IT exploration: an empirical examination of knowledge management systems. IEEE Trans. Eng. Manage. 58(1), 56–70 (2011). https://doi.org/10.1109/tem.2009.2028320
Xu, H., Gupta, S., Rosson, M.B., Carroll, J.M.: Measuring mobile users’ concerns for information privacy. In: ResearchGate, Presented at the 33th ICIS, Orlando, January, pp. 1–16 (2012). https://www.researchgate.net/publication/290022632_Measuring_mobile_users’_concerns_for_information_privacy
Van Zadelhoff, M.: The biggest cybersecurity threats are inside your company. In: Harvard Business Review, 19 September 2016. https://hbr.org/2016/09/the-biggest-cybersecurity-threats-are-inside-your-company. Accessed 5 February 2017)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer Nature Switzerland AG
About this paper
Cite this paper
Hung, SY., Shen, KJ., Kang, TC. (2018). Factors Influencing Employees’ Attitude Towards Personal Information Privacy. In: Cho, W., Fan, M., Shaw, M., Yoo, B., Zhang, H. (eds) Digital Transformation: Challenges and Opportunities. WEB 2017. Lecture Notes in Business Information Processing, vol 328. Springer, Cham. https://doi.org/10.1007/978-3-319-99936-4_4
Download citation
DOI: https://doi.org/10.1007/978-3-319-99936-4_4
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-99935-7
Online ISBN: 978-3-319-99936-4
eBook Packages: Computer ScienceComputer Science (R0)