Cultural factors and the role of privacy concerns in acceptance of government surveillance
Author
Abstract
Suggested Citation
DOI: 10.1002/asi.24372
Download full text from publisher
References listed on IDEAS
- Darren W. Davis & Brian D. Silver, 2004. "Civil Liberties vs. Security: Public Opinion in the Context of the Terrorist Attacks on America," American Journal of Political Science, John Wiley & Sons, vol. 48(1), pages 28-46, January.
- Michael Siegrist & Timothy C. Earle & Heinz Gutscher, 2003. "Test of a Trust and Confidence Model in the Applied Context of Electromagnetic Field (EMF) Risks," Risk Analysis, John Wiley & Sons, vol. 23(4), pages 705-716, August.
- Cecere, Grazia & Le Guel, Fabrice & Soulié, Nicolas, 2012.
"Perceived Internet privacy concerns on social network in Europe,"
MPRA Paper
41437, University Library of Munich, Germany.
- Grazia Cecere & Fabrice Le Guel & Nicolas Soulié, 2015. "Perceived Internet privacy concerns on social networks in Europe," Post-Print hal-02386849, HAL.
- Grazia Cecere & Fabrice Le Guel & Nicolas Soulié, 2015. "Perceived Internet privacy concerns on social networks in Europe," Grenoble Ecole de Management (Post-Print) hal-02386849, HAL.
- Anna C. Squicciarini & Heng Xu & Xiaolong (Luke) Zhang, 2011. "CoPE: Enabling collaborative privacy management in online social networks," Journal of the American Society for Information Science and Technology, Association for Information Science & Technology, vol. 62(3), pages 521-534, March.
- Jinwei Cao & Andrea Everard, 2008. "User Attitude Towards Instant Messaging: The Effect of Espoused National Cultural Values on Awareness and Privacy," Journal of Global Information Technology Management, Taylor & Francis Journals, vol. 11(2), pages 30-57, April.
- Anna C. Squicciarini & Heng Xu & Xiaolong (Luke) Zhang, 2011. "CoPE: Enabling collaborative privacy management in online social networks," Journal of the Association for Information Science & Technology, Association for Information Science & Technology, vol. 62(3), pages 521-534, March.
- Paul Bernal, 2016. "Data gathering, surveillance and human rights: recasting the debate," Journal of Cyber Policy, Taylor & Francis Journals, vol. 1(2), pages 243-264, July.
- Naresh K. Malhotra & Sung S. Kim & James Agarwal, 2004. "Internet Users' Information Privacy Concerns (IUIPC): The Construct, the Scale, and a Causal Model," Information Systems Research, INFORMS, vol. 15(4), pages 336-355, December.
- Sandra J. Milberg & H. Jeff Smith & Sandra J. Burke, 2000. "Information Privacy: Corporate Management and National Regulation," Organization Science, INFORMS, vol. 11(1), pages 35-57, February.
- Russell Hardin, 2013. "Government without trust," Journal of Trust Research, Taylor & Francis Journals, vol. 3(1), pages 32-52, April.
- Suzor, Nicolas & Pappalardo, Kylie & McIntosh, Natalie, 2017. "The passage of Australia's data retention regime: national security, human rights, and media scrutiny," Internet Policy Review: Journal on Internet Regulation, Alexander von Humboldt Institute for Internet and Society (HIIG), Berlin, vol. 6(1), pages 1-16.
Citations
Citations are extracted by the CitEc Project, subscribe to its RSS feed for this item.
Cited by:
- Kao, Yu-Hui & Sapp, Stephen G., 2022. "The effect of cultural values and institutional trust on public perceptions of government use of network surveillance," Technology in Society, Elsevier, vol. 70(C).
- Michael Zimmer & Jessica Vitak & Philip Wu, 2020. "Editorial introduction: “Information privacy in the digital age”," Journal of the Association for Information Science & Technology, Association for Information Science & Technology, vol. 71(9), pages 997-1001, September.
- Bryce Clayton Newell, 2023. "Surveillance as information practice," Journal of the Association for Information Science & Technology, Association for Information Science & Technology, vol. 74(4), pages 444-460, April.
- Liyanaarachchi, Gajendra, 2021. "Managing privacy paradox through national culture: Reshaping online retailing strategy," Journal of Retailing and Consumer Services, Elsevier, vol. 60(C).
- Renata Walczak & Krzysztof Koszewski & Robert Olszewski & Krzysztof Ejsmont & Anikó Kálmán, 2023. "Acceptance of IoT Edge-Computing-Based Sensors in Smart Cities for Universal Design Purposes," Energies, MDPI, vol. 16(3), pages 1-22, January.
Most related items
These are the items that most often cite the same works as this one and are cited by the same works as this one.- Heng Xu & Hock-Hai Teo & Bernard C. Y. Tan & Ritu Agarwal, 2012. "Research Note ---Effects of Individual Self-Protection, Industry Self-Regulation, and Government Regulation on Privacy Concerns: A Study of Location-Based Services," Information Systems Research, INFORMS, vol. 23(4), pages 1342-1363, December.
- Pamela Wisniewski & Heng Xu & Heather Lipford & Emmanuel Bello-Ogunu, 2015. "Facebook apps and tagging: The trade-off between personal privacy and engaging with friends," Journal of the Association for Information Science & Technology, Association for Information Science & Technology, vol. 66(9), pages 1883-1896, September.
- Chen, Xiaogang & Ma, Jing & Jin, Jiafei & Fosh, Patricia, 2013. "Information privacy, gender differences, and intrinsic motivation in the workplace," International Journal of Information Management, Elsevier, vol. 33(6), pages 917-926.
- Ying, Shiyi & Huang, Youlin & Qian, Lixian & Song, Jinzhu, 2023. "Privacy paradox for location tracking in mobile social networking apps: The perspectives of behavioral reasoning and regulatory focus," Technological Forecasting and Social Change, Elsevier, vol. 190(C).
- Sophie Cockcroft & Saphira Rekker, 2016. "The relationship between culture and information privacy policy," Electronic Markets, Springer;IIM University of St. Gallen, vol. 26(1), pages 55-72, February.
- Tamara Dinev & Paul Hart, 2006. "An Extended Privacy Calculus Model for E-Commerce Transactions," Information Systems Research, INFORMS, vol. 17(1), pages 61-80, March.
- Liu, Yu-li & Yan, Wenjia & Hu, Bo, 2021. "Resistance to facial recognition payment in China: The influence of privacy-related factors," Telecommunications Policy, Elsevier, vol. 45(5).
- Bleier, Alexander & Goldfarb, Avi & Tucker, Catherine, 2020. "Consumer privacy and the future of data-based innovation and marketing," International Journal of Research in Marketing, Elsevier, vol. 37(3), pages 466-480.
- Kirsten Martin, 2012. "Diminished or Just Different? A Factorial Vignette Study of Privacy as a Social Contract," Journal of Business Ethics, Springer, vol. 111(4), pages 519-539, December.
- Weiyin Hong & Frank K. Y. Chan & James Y. L. Thong, 2021. "Drivers and Inhibitors of Internet Privacy Concern: A Multidimensional Development Theory Perspective," Journal of Business Ethics, Springer, vol. 168(3), pages 539-564, January.
- Sylvester Ng, 2012. "Following Your Virtual Trail: A Multistakeholder’s Approach to Privacy Protection," Jindal Journal of Business Research, , vol. 1(1), pages 53-63, June.
- Morlok, Tina & Matt, Christian & Hess, Thomas, 2017. "Privatheitsforschung in den Wirtschaftswissenschaften: Entwicklung, Stand und Perspektiven," Working Papers 1/2017, University of Munich, Munich School of Management, Institute for Information Systems and New Media.
- Omrani, Nessrine & Soulié, Nicolas, 2017. "Culture, Privacy Conception and Privacy Concern: Evidence from Europe before PRISM," 14th ITS Asia-Pacific Regional Conference, Kyoto 2017: Mapping ICT into Transformation for the Next Information Society 168531, International Telecommunications Society (ITS).
- Gohar Feroz Khan, 2013. "Social media-based systems: an emerging area of information systems research and practice," Scientometrics, Springer;Akadémiai Kiadó, vol. 95(1), pages 159-180, April.
- Darrell Carpenter & Alexander McLeod & Chelsea Hicks & Michele Maasberg, 0. "Privacy and biometrics: An empirical examination of employee concerns," Information Systems Frontiers, Springer, vol. 0, pages 1-20.
- Hanna Krasnova & Natasha Veltri & Oliver Günther, 2012. "Self-disclosure and Privacy Calculus on Social Networking Sites: The Role of Culture," Business & Information Systems Engineering: The International Journal of WIRTSCHAFTSINFORMATIK, Springer;Gesellschaft für Informatik e.V. (GI), vol. 4(3), pages 127-135, June.
- Tomu Tominaga & Yoshinori Hijikata & Joseph A. Konstan, 2018. "How self-disclosure in Twitter profiles relate to anonymity consciousness and usage objectives: a cross-cultural study," Journal of Computational Social Science, Springer, vol. 1(2), pages 391-435, September.
- Liyanaarachchi, Gajendra, 2021. "Managing privacy paradox through national culture: Reshaping online retailing strategy," Journal of Retailing and Consumer Services, Elsevier, vol. 60(C).
- Wonyoung Jang & Sun-Young Lee, 2020. "Partial image encryption using format-preserving encryption in image processing systems for Internet of things environment," International Journal of Distributed Sensor Networks, , vol. 16(3), pages 15501477209, March.
- Kao, Yu-Hui & Sapp, Stephen G., 2022. "The effect of cultural values and institutional trust on public perceptions of government use of network surveillance," Technology in Society, Elsevier, vol. 70(C).
Corrections
All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:bla:jinfst:v:71:y:2020:i:9:p:1129-1142. See general information about how to correct material in RePEc.
If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.
If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .
If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.
For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Wiley Content Delivery (email available below). General contact details of provider: http://www.asis.org .
Please note that corrections may take a couple of weeks to filter through the various RePEc services.