IDEAS home Printed from https://ideas.repec.org/a/bla/jinfst/v71y2020i9p1129-1142.html
   My bibliography  Save this article

Cultural factors and the role of privacy concerns in acceptance of government surveillance

Author

Listed:
  • Nik Thompson
  • Tanya McGill
  • Anna Bunn
  • Rukshan Alexander

Abstract

Though there is a tension between citizens' privacy concerns and their acceptance of government surveillance, there is little systematic research in this space and less still in a cross‐cultural context. We address the research gap by modeling the factors that drive public acceptance of government surveillance, and by exploring the influence of national culture. The research involved an online survey of 242 Australian and Sri Lankan residents. Data were analyzed using partial least squares, revealing that privacy concerns around initial collection of citizens' data influenced levels of acceptance of surveillance in Australia but not Sri Lanka, whereas concerns about secondary use of data did not influence levels of acceptance in either country. These findings suggest that respondents conflate surveillance with the collection of data and may not consider subsequent secondary use. We also investigate cultural differences, finding that societal collectivism and power distance significantly affect the strength of the relationships between privacy concerns and acceptance of surveillance, on the one hand, and adoption of privacy protections, on the other. Our research also considers the role of trust in government, and perceived need for surveillance. Findings are discussed with their implications for theory and practice.

Suggested Citation

  • Nik Thompson & Tanya McGill & Anna Bunn & Rukshan Alexander, 2020. "Cultural factors and the role of privacy concerns in acceptance of government surveillance," Journal of the Association for Information Science & Technology, Association for Information Science & Technology, vol. 71(9), pages 1129-1142, September.
  • Handle: RePEc:bla:jinfst:v:71:y:2020:i:9:p:1129-1142
    DOI: 10.1002/asi.24372
    as

    Download full text from publisher

    File URL: https://doi.org/10.1002/asi.24372
    Download Restriction: no

    File URL: https://libkey.io/10.1002/asi.24372?utm_source=ideas
    LibKey link: if access is restricted and if your library uses this service, LibKey will redirect you to where you can use your library subscription to access this item
    ---><---

    References listed on IDEAS

    as
    1. Darren W. Davis & Brian D. Silver, 2004. "Civil Liberties vs. Security: Public Opinion in the Context of the Terrorist Attacks on America," American Journal of Political Science, John Wiley & Sons, vol. 48(1), pages 28-46, January.
    2. Michael Siegrist & Timothy C. Earle & Heinz Gutscher, 2003. "Test of a Trust and Confidence Model in the Applied Context of Electromagnetic Field (EMF) Risks," Risk Analysis, John Wiley & Sons, vol. 23(4), pages 705-716, August.
    3. Cecere, Grazia & Le Guel, Fabrice & Soulié, Nicolas, 2012. "Perceived Internet privacy concerns on social network in Europe," MPRA Paper 41437, University Library of Munich, Germany.
    4. Anna C. Squicciarini & Heng Xu & Xiaolong (Luke) Zhang, 2011. "CoPE: Enabling collaborative privacy management in online social networks," Journal of the American Society for Information Science and Technology, Association for Information Science & Technology, vol. 62(3), pages 521-534, March.
    5. Jinwei Cao & Andrea Everard, 2008. "User Attitude Towards Instant Messaging: The Effect of Espoused National Cultural Values on Awareness and Privacy," Journal of Global Information Technology Management, Taylor & Francis Journals, vol. 11(2), pages 30-57, April.
    6. Anna C. Squicciarini & Heng Xu & Xiaolong (Luke) Zhang, 2011. "CoPE: Enabling collaborative privacy management in online social networks," Journal of the Association for Information Science & Technology, Association for Information Science & Technology, vol. 62(3), pages 521-534, March.
    7. Paul Bernal, 2016. "Data gathering, surveillance and human rights: recasting the debate," Journal of Cyber Policy, Taylor & Francis Journals, vol. 1(2), pages 243-264, July.
    8. Naresh K. Malhotra & Sung S. Kim & James Agarwal, 2004. "Internet Users' Information Privacy Concerns (IUIPC): The Construct, the Scale, and a Causal Model," Information Systems Research, INFORMS, vol. 15(4), pages 336-355, December.
    9. Sandra J. Milberg & H. Jeff Smith & Sandra J. Burke, 2000. "Information Privacy: Corporate Management and National Regulation," Organization Science, INFORMS, vol. 11(1), pages 35-57, February.
    10. Russell Hardin, 2013. "Government without trust," Journal of Trust Research, Taylor & Francis Journals, vol. 3(1), pages 32-52, April.
    11. Suzor, Nicolas & Pappalardo, Kylie & McIntosh, Natalie, 2017. "The passage of Australia's data retention regime: national security, human rights, and media scrutiny," Internet Policy Review: Journal on Internet Regulation, Alexander von Humboldt Institute for Internet and Society (HIIG), Berlin, vol. 6(1), pages 1-16.
    Full references (including those not matched with items on IDEAS)

    Citations

    Citations are extracted by the CitEc Project, subscribe to its RSS feed for this item.
    as


    Cited by:

    1. Kao, Yu-Hui & Sapp, Stephen G., 2022. "The effect of cultural values and institutional trust on public perceptions of government use of network surveillance," Technology in Society, Elsevier, vol. 70(C).
    2. Michael Zimmer & Jessica Vitak & Philip Wu, 2020. "Editorial introduction: “Information privacy in the digital age”," Journal of the Association for Information Science & Technology, Association for Information Science & Technology, vol. 71(9), pages 997-1001, September.
    3. Bryce Clayton Newell, 2023. "Surveillance as information practice," Journal of the Association for Information Science & Technology, Association for Information Science & Technology, vol. 74(4), pages 444-460, April.
    4. Liyanaarachchi, Gajendra, 2021. "Managing privacy paradox through national culture: Reshaping online retailing strategy," Journal of Retailing and Consumer Services, Elsevier, vol. 60(C).
    5. Renata Walczak & Krzysztof Koszewski & Robert Olszewski & Krzysztof Ejsmont & Anikó Kálmán, 2023. "Acceptance of IoT Edge-Computing-Based Sensors in Smart Cities for Universal Design Purposes," Energies, MDPI, vol. 16(3), pages 1-22, January.

    Most related items

    These are the items that most often cite the same works as this one and are cited by the same works as this one.
    1. Heng Xu & Hock-Hai Teo & Bernard C. Y. Tan & Ritu Agarwal, 2012. "Research Note ---Effects of Individual Self-Protection, Industry Self-Regulation, and Government Regulation on Privacy Concerns: A Study of Location-Based Services," Information Systems Research, INFORMS, vol. 23(4), pages 1342-1363, December.
    2. Pamela Wisniewski & Heng Xu & Heather Lipford & Emmanuel Bello-Ogunu, 2015. "Facebook apps and tagging: The trade-off between personal privacy and engaging with friends," Journal of the Association for Information Science & Technology, Association for Information Science & Technology, vol. 66(9), pages 1883-1896, September.
    3. Chen, Xiaogang & Ma, Jing & Jin, Jiafei & Fosh, Patricia, 2013. "Information privacy, gender differences, and intrinsic motivation in the workplace," International Journal of Information Management, Elsevier, vol. 33(6), pages 917-926.
    4. Ying, Shiyi & Huang, Youlin & Qian, Lixian & Song, Jinzhu, 2023. "Privacy paradox for location tracking in mobile social networking apps: The perspectives of behavioral reasoning and regulatory focus," Technological Forecasting and Social Change, Elsevier, vol. 190(C).
    5. Sophie Cockcroft & Saphira Rekker, 2016. "The relationship between culture and information privacy policy," Electronic Markets, Springer;IIM University of St. Gallen, vol. 26(1), pages 55-72, February.
    6. Tamara Dinev & Paul Hart, 2006. "An Extended Privacy Calculus Model for E-Commerce Transactions," Information Systems Research, INFORMS, vol. 17(1), pages 61-80, March.
    7. Liu, Yu-li & Yan, Wenjia & Hu, Bo, 2021. "Resistance to facial recognition payment in China: The influence of privacy-related factors," Telecommunications Policy, Elsevier, vol. 45(5).
    8. Bleier, Alexander & Goldfarb, Avi & Tucker, Catherine, 2020. "Consumer privacy and the future of data-based innovation and marketing," International Journal of Research in Marketing, Elsevier, vol. 37(3), pages 466-480.
    9. Kirsten Martin, 2012. "Diminished or Just Different? A Factorial Vignette Study of Privacy as a Social Contract," Journal of Business Ethics, Springer, vol. 111(4), pages 519-539, December.
    10. Weiyin Hong & Frank K. Y. Chan & James Y. L. Thong, 2021. "Drivers and Inhibitors of Internet Privacy Concern: A Multidimensional Development Theory Perspective," Journal of Business Ethics, Springer, vol. 168(3), pages 539-564, January.
    11. Sylvester Ng, 2012. "Following Your Virtual Trail: A Multistakeholder’s Approach to Privacy Protection," Jindal Journal of Business Research, , vol. 1(1), pages 53-63, June.
    12. Morlok, Tina & Matt, Christian & Hess, Thomas, 2017. "Privatheitsforschung in den Wirtschaftswissenschaften: Entwicklung, Stand und Perspektiven," Working Papers 1/2017, University of Munich, Munich School of Management, Institute for Information Systems and New Media.
    13. Omrani, Nessrine & Soulié, Nicolas, 2017. "Culture, Privacy Conception and Privacy Concern: Evidence from Europe before PRISM," 14th ITS Asia-Pacific Regional Conference, Kyoto 2017: Mapping ICT into Transformation for the Next Information Society 168531, International Telecommunications Society (ITS).
    14. Gohar Feroz Khan, 2013. "Social media-based systems: an emerging area of information systems research and practice," Scientometrics, Springer;Akadémiai Kiadó, vol. 95(1), pages 159-180, April.
    15. Darrell Carpenter & Alexander McLeod & Chelsea Hicks & Michele Maasberg, 0. "Privacy and biometrics: An empirical examination of employee concerns," Information Systems Frontiers, Springer, vol. 0, pages 1-20.
    16. Hanna Krasnova & Natasha Veltri & Oliver Günther, 2012. "Self-disclosure and Privacy Calculus on Social Networking Sites: The Role of Culture," Business & Information Systems Engineering: The International Journal of WIRTSCHAFTSINFORMATIK, Springer;Gesellschaft für Informatik e.V. (GI), vol. 4(3), pages 127-135, June.
    17. Tomu Tominaga & Yoshinori Hijikata & Joseph A. Konstan, 2018. "How self-disclosure in Twitter profiles relate to anonymity consciousness and usage objectives: a cross-cultural study," Journal of Computational Social Science, Springer, vol. 1(2), pages 391-435, September.
    18. Liyanaarachchi, Gajendra, 2021. "Managing privacy paradox through national culture: Reshaping online retailing strategy," Journal of Retailing and Consumer Services, Elsevier, vol. 60(C).
    19. Wonyoung Jang & Sun-Young Lee, 2020. "Partial image encryption using format-preserving encryption in image processing systems for Internet of things environment," International Journal of Distributed Sensor Networks, , vol. 16(3), pages 15501477209, March.
    20. Kao, Yu-Hui & Sapp, Stephen G., 2022. "The effect of cultural values and institutional trust on public perceptions of government use of network surveillance," Technology in Society, Elsevier, vol. 70(C).

    More about this item

    Statistics

    Access and download statistics

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:bla:jinfst:v:71:y:2020:i:9:p:1129-1142. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Wiley Content Delivery (email available below). General contact details of provider: http://www.asis.org .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.