IDEAS home Printed from https://ideas.repec.org/a/spr/infosf/v26y2024i6d10.1007_s10796-024-10549-z.html
   My bibliography  Save this article

The impact of information privacy concerns on information systems use behaviors in non-volitional surveillance contexts: A moderated mediation approach

Author

Listed:
  • Jeewon Cho

    (Oregon State University)

  • Insu Park

    (Dakota State University)

Abstract

Electronic surveillance/monitoring has become ubiquitous in modern organizations as advanced information technology (IT) expands organizational capacity to track system users’ daily information systems (IS) activities. Although this environmental shift surrounding IS raises an important (though largely unexplored) issue of IS users’ information privacy and subsequent IS behaviors, little is known about cognitive/psychological processes and boundary conditions underlying IS users’ information privacy concerns and behaviors under the context of non-volitional workplace surveillance. Grounded on psychological reactance theory, this paper articulates how and when information privacy concerns under workplace surveillance relate to IS use behaviors (i.e., effective IS use and shadow IT use) via psychological reactance. In addition, it investigates IS procedural fairness, a contextual boundary condition. We tested a research model using two surveys (via online platforms) data collected from a sample of 301 and 302 IS users working under electronic surveillance/monitoring systems in various organizations and industries. Using moderated mediation analyses, the results of the study show that (1) psychological reactance mediates the relationship between IS users’ information privacy concerns and effective IS use and shadow IT use, respectively; and (2) IS procedural fairness acts as a boundary condition for the given mediated relationships such that the negative impacts of information privacy concerns on psychological reactance and IS behaviors are mitigated. Implications for theory and practice are discussed.

Suggested Citation

  • Jeewon Cho & Insu Park, 2024. "The impact of information privacy concerns on information systems use behaviors in non-volitional surveillance contexts: A moderated mediation approach," Information Systems Frontiers, Springer, vol. 26(6), pages 2347-2371, December.
  • Handle: RePEc:spr:infosf:v:26:y:2024:i:6:d:10.1007_s10796-024-10549-z
    DOI: 10.1007/s10796-024-10549-z
    as

    Download full text from publisher

    File URL: http://link.springer.com/10.1007/s10796-024-10549-z
    File Function: Abstract
    Download Restriction: Access to the full text of the articles in this series is restricted.

    File URL: https://libkey.io/10.1007/s10796-024-10549-z?utm_source=ideas
    LibKey link: if access is restricted and if your library uses this service, LibKey will redirect you to where you can use your library subscription to access this item
    ---><---

    As the access to this document is restricted, you may want to search for a different version of it.

    References listed on IDEAS

    as
    1. Ayomikun Idowu & Amany Elbanna, 2022. "Digital Platforms of Work and the Crafting of Career Path: The Crowdworkers’ Perspective," Information Systems Frontiers, Springer, vol. 24(2), pages 441-457, April.
    2. Weiyin Hong & Frank K. Y. Chan & James Y. L. Thong & Lewis C. Chasalow & Gurpreet Dhillon, 2014. "A Framework and Guidelines for Context-Specific Theorizing in Information Systems Research," Information Systems Research, INFORMS, vol. 25(1), pages 111-136, March.
    3. Peter B. Seddon, 1997. "A Respecification and Extension of the DeLone and McLean Model of IS Success," Information Systems Research, INFORMS, vol. 8(3), pages 240-253, September.
    4. Paul Benjamin Lowry & Tamara Dinev & Robert Willison, 2017. "Why security and privacy research lies at the centre of the information systems (IS) artefact: proposing a bold research agenda," European Journal of Information Systems, Taylor & Francis Journals, vol. 26(6), pages 546-563, November.
    5. Dwivedi, Yogesh K. & Kapoor, Kawaljeet Kaur & Williams, Michael D. & Williams, Janet, 2013. "RFID systems in libraries: An empirical examination of factors affecting system use and user satisfaction," International Journal of Information Management, Elsevier, vol. 33(2), pages 367-377.
    6. Gefen, David, 2000. "E-commerce: the role of familiarity and trust," Omega, Elsevier, vol. 28(6), pages 725-737, December.
    7. Arun Rai & Sandra S. Lang & Robert B. Welker, 2002. "Assessing the Validity of IS Success Models: An Empirical Test and Theoretical Analysis," Information Systems Research, INFORMS, vol. 13(1), pages 50-69, March.
    8. Andrew Burton-Jones & Olga Volkoff, 2017. "How Can We Develop Contextualized Theories of Effective Use? A Demonstration in the Context of Community-Care Electronic Health Records," Information Systems Research, INFORMS, vol. 28(3), pages 468-489, September.
    9. Mary J. Culnan & Pamela K. Armstrong, 1999. "Information Privacy Concerns, Procedural Fairness, and Impersonal Trust: An Empirical Investigation," Organization Science, INFORMS, vol. 10(1), pages 104-115, February.
    10. Wanda J. Orlikowski, 2000. "Using Technology and Constituting Structures: A Practice Lens for Studying Technology in Organizations," Organization Science, INFORMS, vol. 11(4), pages 404-428, August.
    11. Merrill Warkentin & Robert Willison, 2009. "Behavioral and policy issues in information systems security: the insider threat," European Journal of Information Systems, Taylor & Francis Journals, vol. 18(2), pages 101-105, April.
    12. Tamara Dinev & Paul Hart, 2006. "An Extended Privacy Calculus Model for E-Commerce Transactions," Information Systems Research, INFORMS, vol. 17(1), pages 61-80, March.
    Full references (including those not matched with items on IDEAS)

    Most related items

    These are the items that most often cite the same works as this one and are cited by the same works as this one.
    1. Jeewon Cho & Insu Park, 2022. "Does Information Systems Support for Creativity Enhance Effective Information Systems Use and Job Satisfaction in Virtual Work?," Information Systems Frontiers, Springer, vol. 24(6), pages 1865-1886, December.
    2. Nils Koester & Patrick Cichy & David Antons & Torsten Oliver Salge, 2022. "Perceived privacy risk in the Internet of Things: determinants, consequences, and contingencies in the case of connected cars," Electronic Markets, Springer;IIM University of St. Gallen, vol. 32(4), pages 2333-2355, December.
    3. Michael Breward & Khaled Hassanein & Milena Head, 2017. "Understanding Consumers’ Attitudes Toward Controversial Information Technologies: A Contextualization Approach," Information Systems Research, INFORMS, vol. 28(4), pages 760-774, December.
    4. Lu, Baozhou & Yi, Xiaoyang, 2023. "Institutional trust and repurchase intention in the sharing economy: The moderating roles of information privacy concerns and security concerns," Journal of Retailing and Consumer Services, Elsevier, vol. 73(C).
    5. Chin, Amita Goyal & Harris, Mark A. & Brookshire, Robert, 2018. "A bidirectional perspective of trust and risk in determining factors that influence mobile app installation," International Journal of Information Management, Elsevier, vol. 39(C), pages 49-59.
    6. Weiyin Hong & Frank K. Y. Chan & James Y. L. Thong, 2021. "Drivers and Inhibitors of Internet Privacy Concern: A Multidimensional Development Theory Perspective," Journal of Business Ethics, Springer, vol. 168(3), pages 539-564, January.
    7. Hung-Pin Shih & Wuqiang Liu, 2023. "Beyond the trade-offs on Facebook: the underlying mechanisms of privacy choices," Information Systems and e-Business Management, Springer, vol. 21(2), pages 353-387, June.
    8. Bonsón Ponte, Enrique & Carvajal-Trujillo, Elena & Escobar-Rodríguez, Tomás, 2015. "Influence of trust and perceived value on the intention to purchase travel online: Integrating the effects of assurance on trust antecedents," Tourism Management, Elsevier, vol. 47(C), pages 286-302.
    9. repec:dau:papers:123456789/8263 is not listed on IDEAS
    10. Caroline Lancelot Miltgen & H. Jeff Smith, 2019. "Falsifying and withholding: exploring individuals’ contextual privacy-related decision-making," Post-Print hal-02156671, HAL.
    11. Bailing Liu & Paul A. Pavlou & Xiufeng Cheng, 2022. "Achieving a Balance Between Privacy Protection and Data Collection: A Field Experimental Examination of a Theory-Driven Information Technology Solution," Information Systems Research, INFORMS, vol. 33(1), pages 203-223, March.
    12. Amita Goyal Chin & Mark A. Harris & Robert Brookshire, 2022. "An Empirical Investigation of Intent to Adopt Mobile Payment Systems Using a Trust-based Extended Valence Framework," Information Systems Frontiers, Springer, vol. 24(1), pages 329-347, February.
    13. J. J. Po-An Hsieh & Arun Rai & Sean Xin Xu, 2011. "Extracting Business Value from IT: A Sensemaking Perspective of Post-Adoptive Use," Management Science, INFORMS, vol. 57(11), pages 2018-2039, November.
    14. Corey Angst, 2009. "Protect My Privacy or Support the Common-Good? Ethical Questions About Electronic Health Information Exchanges," Journal of Business Ethics, Springer, vol. 90(2), pages 169-178, November.
    15. Huarng, Kun-Huang & Yu, Tiffany Hui-Kuang & Lee, Cheng fang, 2022. "Adoption model of healthcare wearable devices," Technological Forecasting and Social Change, Elsevier, vol. 174(C).
    16. Sembada, Agung Y. & Koay, Kian Yeik, 2021. "How perceived behavioral control affects trust to purchase in social media stores," Journal of Business Research, Elsevier, vol. 130(C), pages 574-582.
    17. Liu, Yu-li & Wu, Yanfei & Li, Changyan & Song, Chuling & Hsu, Wen-yi, 2024. "Does displaying one's IP location influence users' privacy behavior on social media? Evidence from China's Weibo," Telecommunications Policy, Elsevier, vol. 48(5).
    18. Yuan Sun & Shuyue Fang & Yujong Hwang, 2019. "Investigating Privacy and Information Disclosure Behavior in Social Electronic Commerce," Sustainability, MDPI, vol. 11(12), pages 1-27, June.
    19. Jabbar, Abdul & Geebren, Ahmed & Hussain, Zahid & Dani, Samir & Ul-Durar, Shajara, 2023. "Investigating individual privacy within CBDC: A privacy calculus perspective," Research in International Business and Finance, Elsevier, vol. 64(C).
    20. Jung-Yu Lai & Juite Wang, 2018. "Exploring the impacts of perceived e-collaboration service convenience on new product development in Taiwanese IC design companies," Information Technology and Management, Springer, vol. 19(2), pages 107-120, June.
    21. Grace Fox & Lisa van der Werff & Pierangelo Rosati & Patricia Takako Endo & Theo Lynn, 2022. "Examining the determinants of acceptance and use of mobile contact tracing applications in Brazil: An extended privacy calculus perspective," Journal of the Association for Information Science & Technology, Association for Information Science & Technology, vol. 73(7), pages 944-967, July.

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:spr:infosf:v:26:y:2024:i:6:d:10.1007_s10796-024-10549-z. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Sonal Shukla or Springer Nature Abstracting and Indexing (email available below). General contact details of provider: http://www.springer.com .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.