Acceptance of Smart Electronic Monitoring at Work as a Result of a Privacy Calculus Decision

Smart technology in the area of the Internet of Things (IoT) that extensively gathers user data in order to provide full functioning has become ubiquitous in our everyday life. At the workplace, individual’s privacy is especially threatened by the deployment of smart monitoring technology due to unbalanced power relations. In this work we argue that employees’ acceptance of smart monitoring systems can be predicted based on privacy calculus considerations and trust. Therefore, in an online experiment (N = 661) we examined employees’ acceptance of a smart emergency detection system, depending on the rescue value of the system and whether the system’s tracking is privacy-invading or privacy-preserving. We hypothesized that trust in the employer, perceived benefits and risks serve as predictors of system acceptance. Moreover, the moderating effect of privacy concerns is analyzed.

[1]  Elgar Fleisch,et al.  Blissfully ignorant: the effects of general privacy concerns, general institutional trust, and affect in the privacy calculus , 2015, Inf. Syst. J..

[2]  Robert J. Vandenberg,et al.  Introduction: Statistical and Methodological Myths and Urban Legends , 2006 .

[3]  Yongqiang Sun,et al.  Location information disclosure in location-based social network services: Privacy calculus, benefit structure, and gender differences , 2015, Comput. Hum. Behav..

[4]  Choong-C. Lee,et al.  Understanding the Use of Location-Based Service Applications: Do Privacy Concerns Matter? , 2013 .

[5]  Joy L. Hart,et al.  Workplace Surveillance and Managing Privacy Boundaries , 2007 .

[6]  Albert Y. Zomaya,et al.  Big Data Privacy in the Internet of Things Era , 2014, IT Professional.

[7]  A. W. Roscoe,et al.  User interactive Internet of things privacy preserved access control , 2012, 2012 International Conference for Internet Technology and Secured Transactions.

[8]  Sandra Petronio,et al.  Communication Privacy Management Theory , 2015, Engaging Theories in Interpersonal Communication.

[9]  Benedict Bender,et al.  Web Tracking - A Literature Review on the State of Research , 2018, HICSS.

[10]  Fred D. Davis Perceived Usefulness, Perceived Ease of Use, and User Acceptance of Information Technology , 1989, MIS Q..

[11]  Oliver Günther,et al.  Investigating the Value of Privacy in Online Social Networks: Conjoint Analysis , 2009, ICIS.

[12]  M. Browne,et al.  Alternative Ways of Assessing Model Fit , 1992 .

[13]  Heng Xu,et al.  Individuals’ Attitudes Towards Electronic Health Records: A Privacy Calculus Perspective , 2016 .

[14]  Chelsea Hicks,et al.  Privacy and biometrics: An empirical examination of employee concerns , 2016, Information Systems Frontiers.

[15]  Naresh K. Malhotra,et al.  Internet Users' Information Privacy Concerns (IUIPC): The Construct, the Scale, and a Causal Model , 2004, Inf. Syst. Res..

[16]  Almudena Alcaide,et al.  Anonymous authentication for privacy-preserving IoT target-driven applications , 2013, Comput. Secur..

[17]  I. Altman Privacy Regulation: Culturally Universal or Culturally Specific? , 1977 .

[18]  Kian-Lee Tan,et al.  CASTLE: Continuously Anonymizing Data Streams , 2011, IEEE Transactions on Dependable and Secure Computing.

[19]  Miriam A. Cherry,et al.  The Law and Policy of People Analytics , 2016 .

[20]  Tamara Dinev,et al.  An Extended Privacy Calculus Model for E-Commerce Transactions , 2006, Inf. Syst. Res..

[21]  Li Qin,et al.  Impact of Privacy Concern in Social Networking Websites , 2012, Internet Res..

[22]  Heng Xu,et al.  Information Privacy Concerns: Linking Individual Perceptions with Institutional Privacy Assurances , 2011, J. Assoc. Inf. Syst..

[23]  Yingshu Li,et al.  Data Linkage in Smart Internet of Things Systems: A Consideration from a Privacy Perspective , 2018, IEEE Communications Magazine.

[24]  Hüseyin Yildirim,et al.  A model for predicting user intention to use wearable IoT devices at the workplace , 2019, J. King Saud Univ. Comput. Inf. Sci..

[25]  Anna Romanou,et al.  The necessity of the implementation of Privacy by Design in sectors where data protection concerns arise , 2017, Comput. Law Secur. Rev..

[26]  M. Culnan,et al.  Information Privacy Concerns, Procedural Fairness, and Impersonal Trust: An Empirical Investigation , 1999 .

[27]  Melanie Swan,et al.  Sensor Mania! The Internet of Things, Wearable Computing, Objective Metrics, and the Quantified Self 2.0 , 2012, J. Sens. Actuator Networks.

[28]  Scott C. D'Urso,et al.  Who’s Watching Us at Work? Toward a Structural–Perceptual Model of Electronic Monitoring and Surveillance in Organizations , 2006 .

[29]  S. Petronio Boundaries of Privacy: Dialectics of Disclosure , 2002 .

[30]  S. Petronio,et al.  Communication Privacy Management Theory and Health and Risk Messaging , 2017 .

[31]  Nadine Bol,et al.  Understanding the Effects of Personalization as a Privacy Calculus: Analyzing Self-Disclosure Across Health, News, and Commerce Contexts† , 2018, J. Comput. Mediat. Commun..

[32]  Shuchih Ernest Chang,et al.  Exploring trust and information monitoring for information security management , 2017, 2017 10th International Congress on Image and Signal Processing, BioMedical Engineering and Informatics (CISP-BMEI).

[33]  K. Ball Workplace surveillance: an overview , 2010 .

[34]  H. Jeff Smith,et al.  Information Privacy: Measuring Individuals' Concerns About Organizational Practices , 1996, MIS Q..

[35]  Sarah Spiekermann,et al.  SOCIAL NETWORKS : WHY WE DISCLOSE , 2012 .

[36]  Chuan-Hoo Tan,et al.  Addressing the Personalization-Privacy Paradox: An Empirical Assessment from a Field Experiment on Smartphone Users , 2013, MIS Q..

[37]  Sabine Trepte,et al.  Is the privacy paradox a relic of the past? An in‐depth analysis of privacy attitudes and privacy behaviors , 2015 .

[38]  Richard Fletcher,et al.  The Impact of Trust in the News Media on Online News Consumption and Participation , 2017 .

[39]  Marek Korczynski,et al.  The Political Economy of Trust , 2002 .

[40]  Gordon B. Davis,et al.  User Acceptance of Information Technology: Toward a Unified View , 2003, MIS Q..

[41]  Martin Upchurch,et al.  Humans and Machines at Work: Monitoring, Surveillance and Automation in Contemporary Capitalism , 2017 .

[42]  A. Hayes Introduction to Mediation, Moderation, and Conditional Process Analysis: A Regression-Based Approach , 2013 .

[43]  Miriam J. Metzger,et al.  An Extended Privacy Calculus Model for SNSs: Analyzing Self-Disclosure and Self-Withdrawal in a Representative U.S. Sample , 2016, J. Comput. Mediat. Commun..

[44]  E. Ramsey,et al.  Trust considerations on attitudes towards online purchasing: The moderating effect of privacy and security concerns , 2010 .

[45]  R. Zolin,et al.  The Central Role of Communication in Developing Trust and Its Effect On Employee Involvement , 2009 .

[46]  Paul E. Ketelaar,et al.  The smartphone as your follower: The role of smartphone literacy in the relation between privacy concerns, attitude and behaviour towards phone-embedded tracking , 2018, Comput. Hum. Behav..

[47]  H. Marsh,et al.  Application of confirmatory factor analysis to the study of self-concept: First- and higher order factor models and their invariance across groups. , 1985 .

[48]  E. Rogers,et al.  Diffusion of innovations , 1964, Encyclopedia of Sport Management.

[49]  Mark Rowan,et al.  A Privacy Policy Comparison of Health and Fitness Related Mobile Applications , 2014, EUSPN/ICTH.

[50]  Audun Jøsang,et al.  A survey of trust and reputation systems for online service provision , 2007, Decis. Support Syst..

[51]  P. Bentler,et al.  Cutoff criteria for fit indexes in covariance structure analysis : Conventional criteria versus new alternatives , 1999 .

[52]  N. J. Marshall DIMENSIONS OF PRIVACY PREFERENCES. , 1974, Multivariate behavioral research.

[53]  J. Atkinson Workplace Monitoring and the Right to Private Life at Work , 2018, The Modern Law Review.

[54]  Athanasios V. Vasilakos,et al.  The Quest for Privacy in the Internet of Things , 2016, IEEE Cloud Computing.

[55]  Peter Buxmann,et al.  Der „Preis des Kostenlosen“ , 2012, Wirtschaftsinformatik Manag..

[56]  L. Cranor,et al.  Are They Worth Reading? An In-Depth Analysis of Online Advertising Companies’ Privacy Policies , 2014 .

[57]  Norman L. Chervany,et al.  What Trust Means in E-Commerce Customer Relationships: An Interdisciplinary Conceptual Typology , 2001, Int. J. Electron. Commer..

[58]  Sven Laumer,et al.  THE INFLUENCE OF RESIGNATION ON THE PRIVACY CALCULUS IN THE CONTEXT OF SOCIAL NETWORKING SITES: AN EMPIRICAL ANALYSIS , 2018 .

[59]  Hock-Hai Teo,et al.  AIS Electronic , 2013 .

[60]  D. Mahr,et al.  Unraveling the personalization paradox: The effect of information collection and trust-building strategies on online advertisement effectiveness , 2015 .