IDEAS home Printed from https://ideas.repec.org/a/spr/infosf/v24y2022i5d10.1007_s10796-021-10158-0.html
   My bibliography  Save this article

Information Privacy Assimilation in IT Organizations

Author

Listed:
  • V. S. Prakash Attili

    (Indian Institute of Management Lucknow)

  • Saji K. Mathew

    (Indian Institute of Technology Madras)

  • Vijayan Sugumaran

    (Oakland University)

Abstract

Information privacy concerns have been rising over a few decades. As per the recent General Data Protection Regulation, organizations need to implement the highest-possible privacy settings by design and default. Following the neo-institutional theory, this study develops a model for understanding the mechanism of information privacy assimilation in Information Technology (IT) organizations. This study treats information privacy as a distinct dimension separate from security. After analyzing a sample survey data of 214 respondents from the IT industry, privacy capability and organizational culture emerged as influencing factors with a statistically significant influence on information privacy assimilation. The findings from this study support the mediating role of senior management participation between the external coercive forces and privacy-related business strategy. Business strategy also plays a mediating role between coercive/normative forces and privacy-related activities within an organization. Here the mimetic forces show a direct influence on privacy-related activities. A positive moderating effect of organizational culture on normative forces and privacy-related activities relationship; and a negative moderating effect of privacy capability on mimetic forces and privacy-related activities relationship are observed. These findings could enable senior managers to respond to institutional pressures by focusing on appropriate factors within an organization for developing effective privacy strategies and actions. This work is an extension of the pilot work that was published in Communications of the Association for Information Systems (CAIS), 2018. The prior work focuses on developing the propositions qualitatively. Building on that, we have formally defined the hypotheses, developed the appropriate survey instrument and collected the primary data which is large enough to do adequate analysis. Adopted a quantitative approach using an extensive sample survey of IT organizations, followed a more rigorous process for data collection, analysis, and discussion of the results. In addition, based on the lessons learned from the pilot study, we have updated the research model and hypotheses with a focus on privacy-related business strategy and activities.

Suggested Citation

  • V. S. Prakash Attili & Saji K. Mathew & Vijayan Sugumaran, 2022. "Information Privacy Assimilation in IT Organizations," Information Systems Frontiers, Springer, vol. 24(5), pages 1497-1513, October.
  • Handle: RePEc:spr:infosf:v:24:y:2022:i:5:d:10.1007_s10796-021-10158-0
    DOI: 10.1007/s10796-021-10158-0
    as

    Download full text from publisher

    File URL: http://link.springer.com/10.1007/s10796-021-10158-0
    File Function: Abstract
    Download Restriction: Access to the full text of the articles in this series is restricted.

    File URL: https://libkey.io/10.1007/s10796-021-10158-0?utm_source=ideas
    LibKey link: if access is restricted and if your library uses this service, LibKey will redirect you to where you can use your library subscription to access this item
    ---><---

    As the access to this document is restricted, you may want to search for a different version of it.

    References listed on IDEAS

    as
    1. Robert G. Fichman & Chris F. Kemerer, 1997. "The Assimilation of Software Process Innovations: An Organizational Learning Perspective," Management Science, INFORMS, vol. 43(10), pages 1345-1363, October.
    2. Curtis P. Armstrong & V. Sambamurthy, 1999. "Information Technology Assimilation in Firms: The Influence of Senior Leadership and IT Infrastructures," Information Systems Research, INFORMS, vol. 10(4), pages 304-327, December.
    3. Daniel Robey & Marie-Claude Boudreau, 1999. "Accounting for the Contradictory Organizational Consequences of Information Technology: Theoretical Directions and Methodological Implications," Information Systems Research, INFORMS, vol. 10(2), pages 167-185, June.
    4. Detmar W. Straub, 1990. "Effective IS Security: An Empirical Study," Information Systems Research, INFORMS, vol. 1(3), pages 255-276, September.
    5. Carol Hsu & Jae-Nam Lee & Detmar W. Straub, 2012. "Institutional Influences on Information Systems Security Innovations," Information Systems Research, INFORMS, vol. 23(3-part-2), pages 918-939, September.
    6. Tamara Dinev & Allen R. McConnell & H. Jeff Smith, 2015. "Research Commentary—Informing Privacy Research Through Information Systems, Psychology, and Behavioral Economics: Thinking Outside the “APCO” Box," Information Systems Research, INFORMS, vol. 26(4), pages 639-655, December.
    7. France Bélanger & Tabitha L. James, 2020. "A Theory of Multilevel Information Privacy Management for the Digital Era," Information Systems Research, INFORMS, vol. 31(2), pages 510-536, June.
    8. Jae Kyu Lee & Younghoon Chang & Hun Yeong Kwon & Beopyeon Kim, 2020. "Reconciliation of Privacy with Preventive Cybersecurity: The Bright Internet Approach," Information Systems Frontiers, Springer, vol. 22(1), pages 45-57, February.
    9. Mark Keil & Mary Culnan & Tamara Dinev & Heng Xu, 2019. "Data Governance, Consumer Privacy, and Project Status Reporting: Remembering H. Jeff Smith," Information Systems Frontiers, Springer, vol. 21(6), pages 1207-1212, December.
    10. Alice M. Johnson, 2009. "Business and Security Executives Views of Information Security Investment Drivers: Results from a Delphi Study," Journal of Information Privacy and Security, Taylor & Francis Journals, vol. 5(1), pages 3-27, January.
    11. Tamara Dinev & Paul Hart, 2006. "An Extended Privacy Calculus Model for E-Commerce Transactions," Information Systems Research, INFORMS, vol. 17(1), pages 61-80, March.
    12. Randolph B. Cooper & Robert W. Zmud, 1990. "Information Technology Implementation Research: A Technological Diffusion Approach," Management Science, INFORMS, vol. 36(2), pages 123-139, February.
    13. I. Reay & P. Beatty & S. Dick & J. Miller, 2013. "Privacy policies and national culture on the internet," Information Systems Frontiers, Springer, vol. 15(2), pages 279-292, April.
    14. Jongwoo Kim & Richard L. Baskerville & Yi Ding, 2020. "Breaking the Privacy Kill Chain: Protecting Individual and Group Privacy Online," Information Systems Frontiers, Springer, vol. 22(1), pages 171-185, February.
    15. Russell L. Purvis & V. Sambamurthy & Robert W. Zmud, 2001. "The Assimilation of Knowledge Platforms in Organizations: An Empirical Investigation," Organization Science, INFORMS, vol. 12(2), pages 117-135, April.
    16. John D'Arcy & Anat Hovav & Dennis Galletta, 2009. "User Awareness of Security Countermeasures and Its Impact on Information Systems Misuse: A Deterrence Approach," Information Systems Research, INFORMS, vol. 20(1), pages 79-98, March.
    Full references (including those not matched with items on IDEAS)

    Most related items

    These are the items that most often cite the same works as this one and are cited by the same works as this one.
    1. Abhay Nath Mishra & Ritu Agarwal, 2010. "Technological Frames, Organizational Capabilities, and IT Use: An Empirical Investigation of Electronic Procurement," Information Systems Research, INFORMS, vol. 21(2), pages 249-270, June.
    2. Dong, Shutao, 2012. "Decision execution mechanisms of IT governance: The CRM case," International Journal of Information Management, Elsevier, vol. 32(2), pages 147-157.
    3. Jae Kyu Lee & Younghoon Chang & Hun Yeong Kwon & Beopyeon Kim, 2020. "Reconciliation of Privacy with Preventive Cybersecurity: The Bright Internet Approach," Information Systems Frontiers, Springer, vol. 22(1), pages 45-57, February.
    4. Silva, Leiser & Hsu, Carol & Backhouse, James & McDonnell, Aidan, 2016. "Resistance and power in a security certification scheme: the case of c:cure," LSE Research Online Documents on Economics 68348, London School of Economics and Political Science, LSE Library.
    5. Carol Hsu & Jae-Nam Lee & Detmar W. Straub, 2012. "Institutional Influences on Information Systems Security Innovations," Information Systems Research, INFORMS, vol. 23(3-part-2), pages 918-939, September.
    6. Abhay Nath Mishra & Prabhudev Konana & Anitesh Barua, 2007. "Antecedents and Consequences of Internet Use in Procurement: An Empirical Investigation of U.S. Manufacturing Firms," Information Systems Research, INFORMS, vol. 18(1), pages 103-120, March.
    7. Abul Khayer & Mohammad Tariqul Islam & Yukun Bao, 2023. "Understanding the Effects of Alignments between the Depth and Breadth of Cloud Computing Assimilation on Firm Performance: The Role of Organizational Agility," Sustainability, MDPI, vol. 15(3), pages 1-23, January.
    8. Jane Fedorowicz & Janis L. Gogan, 2010. "Reinvention of interorganizational systems: A case analysis of the diffusion of a bio-terror surveillance system," Information Systems Frontiers, Springer, vol. 12(1), pages 81-95, March.
    9. Peng, Zeyu & Sun, Yongqiang & Guo, Xitong, 2018. "Antecedents of employees’ extended use of enterprise systems: An integrative view of person, environment, and technology," International Journal of Information Management, Elsevier, vol. 39(C), pages 104-120.
    10. Haijing Hao & Rema Padman & Baohong Sun & Rahul Telang, 2018. "Quantifying the Impact of Social Influence on the Information Technology Implementation Process by Physicians: A Hierarchical Bayesian Learning Approach," Information Systems Research, INFORMS, vol. 29(1), pages 25-41, March.
    11. Xudong Lin & Shuilin Liu & Xiaoli Huang & Hanyang Luo & Sumin Yu, 2021. "Platform Revenue Strategy Selection Considering Consumer Group Data Privacy Regulation," Mathematics, MDPI, vol. 9(22), pages 1-24, November.
    12. Zhang, Cheng & Dhaliwal, Jasbir, 2009. "An investigation of resource-based and institutional theoretic factors in technology adoption for operations and supply chain management," International Journal of Production Economics, Elsevier, vol. 120(1), pages 252-269, July.
    13. Kevin Zhu & Kenneth L. Kraemer & Sean Xu, 2006. "The Process of Innovation Assimilation by Firms in Different Countries: A Technology Diffusion Perspective on E-Business," Management Science, INFORMS, vol. 52(10), pages 1557-1576, October.
    14. Marina Van Geenhuizen & Sander Faber, 2015. "ICT adoption factors in medical hospitals: a European perspective and focus on The Netherlands," ERSA conference papers ersa15p590, European Regional Science Association.
    15. Amit Saini & Rajdeep Grewal & Jean Johnson, 2010. "Putting market-facing technology to work: Organizational drivers of CRM performance," Marketing Letters, Springer, vol. 21(4), pages 365-383, December.
    16. Robert G. Fichman, 2004. "Real Options and IT Platform Adoption: Implications for Theory and Practice," Information Systems Research, INFORMS, vol. 15(2), pages 132-154, June.
    17. Elbanna, Amany & Newman, Mike, 2022. "The bright side and the dark side of top management support in Digital Transformaion –A hermeneutical reading," Technological Forecasting and Social Change, Elsevier, vol. 175(C).
    18. David Harborth & Sebastian Pape, 2020. "Empirically Investigating Extraneous Influences on the “APCO” Model—Childhood Brand Nostalgia and the Positivity Bias," Future Internet, MDPI, vol. 12(12), pages 1-16, December.
    19. Sanghyun Kim & Bora Kim & Minsoo Seo, 2020. "Impacts of Sustainable Information Technology Capabilities on Information Security Assimilation: The Moderating Effects of Policy—Technology Balance," Sustainability, MDPI, vol. 12(15), pages 1-24, July.
    20. Denis Dennehy & Kieran Conboy & Jaganath Babu, 2023. "Adopting Learning Analytics to Inform Postgraduate Curriculum Design: Recommendations and Research Agenda," Information Systems Frontiers, Springer, vol. 25(4), pages 1315-1331, August.

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:spr:infosf:v:24:y:2022:i:5:d:10.1007_s10796-021-10158-0. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Sonal Shukla or Springer Nature Abstracting and Indexing (email available below). General contact details of provider: http://www.springer.com .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.