Motivating information system engineers' acceptance of Privacy by Design in China: An extended UTAUT model

Abstract Given the serious issues caused by privacy leakage, Privacy by Design (PbD) is gaining the attention of professionals as a new privacy protection paradigm with enormous potential. This study proposes a UTAUT-based integrated model from the perspective of information system (IS) engineers, and explores the determinants of PbD implementation. The implementation of PbD and privacy protection measures relay heavily on IS engineers. However, there is a paucity of research exploring IS engineers’ acceptance of PbD, particularly research that considers engineers’ individualized factors and personal attitudes. Empirical data collected from 261 IS engineers in China demonstrate the rationality of proposed model and the importance of integrating conceptual constructs. The findings suggest that IS engineers’ attitude towards PbD implementation significantly impacts both their behavioral intention and their implementing behavior. IS engineers’ awareness of PbD is a predictor of their effort and performance expectancies, and intention to implement; IS engineers’ effort and performance expectancies concerning PbD usage have significantly impact on their attitude towards PbD. This study reveals the factors that motivate IS engineers to implement PbD into their workflow and proposes for the first time that IS engineers’ attitude towards PbD usage is the key factor for PbD implementation.

[1]  H. Kaur,et al.  Impact of advertising strategies on the cognitive and behavioral component of attitude of women consumers , 2017 .

[2]  Andrew Schwarz,et al.  Examining the Impact and Detection of the "Urban Legend" of Common Method Bias , 2017, DATB.

[3]  Mazuri Abd. Ghani,et al.  Investigating the role of unified theory of acceptance and use of technology (UTAUT) in internet banking adoption context , 2018 .

[4]  A. Tarhini,et al.  Factors affecting the adoption of e-learning systems in Qatar and USA: Extending the Unified Theory of Acceptance and Use of Technology 2 (UTAUT2) , 2017, Educational Technology Research and Development.

[5]  I. Ajzen,et al.  Accessibility and stability of predictors in the theory of planned behavior. , 1992 .

[6]  K. Faqih An empirical analysis of factors predicting the behavioral intention to adopt Internet shopping technology among non-shoppers in a developing country context: Does gender matter? , 2016 .

[7]  Chi-hoon Song,et al.  Acceptance of public cloud storage services in South Korea: A multi-group analysis , 2020, Int. J. Inf. Manag..

[8]  Ronny Scherer,et al.  The technology acceptance model (TAM): A meta-analytic structural equation modeling approach to explaining teachers' adoption of digital technology in education , 2019, Comput. Educ..

[9]  Nripendra P. Rana,et al.  A meta-analysis based modified unified theory of acceptance and use of technology (meta-UTAUT): a review of emerging literature. , 2020, Current opinion in psychology.

[10]  Sung-Joon Yoon,et al.  Predicting the use of online information services based on a modified UTAUT model , 2014, Behav. Inf. Technol..

[11]  I. Ajzen,et al.  Belief, Attitude, Intention, and Behavior: An Introduction to Theory and Research , 1977 .

[12]  Yogesh Kumar Dwivedi,et al.  RFID systems in libraries: An empirical examination of factors affecting system use and user satisfaction , 2013, Int. J. Inf. Manag..

[13]  Christer Carlsson,et al.  Adoption of Mobile Devices/Services — Searching for Answers with the UTAUT , 2006, Proceedings of the 39th Annual Hawaii International Conference on System Sciences (HICSS'06).

[14]  Nancy Dickie,et al.  Privacy by design prevents data headaches later , 2017 .

[15]  John Hulland,et al.  Use of partial least squares (PLS) in strategic management research: a review of four recent studies , 1999 .

[16]  S. Castro,et al.  Acceptance of Mobile Health Applications: Examining Key Determinants and Moderators , 2019, Front. Psychol..

[17]  W. Reinartz,et al.  An Empirical Comparison of the Efficacy of Covariance-Based and Variance-Based SEM , 2009 .

[18]  D. Mackinnon,et al.  Equivalence of the Mediation, Confounding and Suppression Effect , 2000, Prevention Science.

[19]  Archan Misra,et al.  Is Privacy Regulation Slowing Down Research on Pervasive Computing? , 2020, Computer.

[20]  S. Wold,et al.  PLS-regression: a basic tool of chemometrics , 2001 .

[21]  S. Haider,et al.  Effect of intervention on employees' intentions to use environmentally sustainable work practices: A field experiment. , 2019, Journal of environmental management.

[22]  R. Peterson A Meta-analysis of Cronbach's Coefficient Alpha , 1994 .

[23]  Botjan umak,et al.  The acceptance and use of interactive whiteboards among teachers , 2016 .

[24]  Yang Zhao,et al.  What factors influence the mobile health service adoption? A meta-analysis and the moderating role of age , 2017, Int. J. Inf. Manag..

[25]  Scott B. MacKenzie,et al.  Common method biases in behavioral research: a critical review of the literature and recommended remedies. , 2003, The Journal of applied psychology.

[26]  Peter Schaar,et al.  Privacy by Design , 2010 .

[27]  Huigang Liang,et al.  "Privacy by Design" implementation: Information system engineers' perspective , 2020, Int. J. Inf. Manag..

[28]  Yogesh Kumar Dwivedi,et al.  Exploring consumer adoption of proximity mobile payments , 2014, Journal of Strategic Marketing.

[29]  Izak Benbasat,et al.  Information Security Policy Compliance: An Empirical Study of Rationality-Based Beliefs and Information Security Awareness , 2010, MIS Q..

[30]  David Wright,et al.  A Strategy for Operationalizing Privacy by Design , 2014, Inf. Soc..

[31]  Francisco J. García-Peñalvo,et al.  Informal tools in formal contexts: Development of a model to assess the acceptance of mobile technologies among teachers , 2016, Comput. Hum. Behav..

[32]  Charles Z. Liu,et al.  Method Effects in IS Survey Research: An Assessment and Recommendations , 2007, Commun. Assoc. Inf. Syst..

[33]  A. Safari,et al.  Multiple pathways linking environmental knowledge and awareness to employees’ green behavior , 2018 .

[34]  Juin-Ming Tsai,et al.  Acceptance and resistance of telehealth: The perspective of dual-factor concepts in technology adoption , 2019, Int. J. Inf. Manag..

[35]  I. Ajzen,et al.  Understanding Attitudes and Predicting Social Behavior , 1980 .

[36]  M. Lindell,et al.  Accounting for common method variance in cross-sectional research designs. , 2001, The Journal of applied psychology.

[37]  Tiago Oliveira,et al.  Determinants of end-user acceptance of biometrics: Integrating the "Big 3" of technology acceptance with privacy context , 2013, Decis. Support Syst..

[38]  A. Cavoukian,et al.  Privacy by Design: essential for organizational accountability and strong business practices , 2010 .

[39]  Yogesh Kumar Dwivedi,et al.  The unified theory of acceptance and use of technology (UTAUT): a literature review , 2015, J. Enterp. Inf. Manag..

[40]  Marko Sarstedt,et al.  Goodness-of-fit indices for partial least squares path modeling , 2013, Comput. Stat..

[41]  Fred D. Davis Perceived Usefulness, Perceived Ease of Use, and User Acceptance of Information Technology , 1989, MIS Q..

[42]  Blair H. Sheppard,et al.  The Theory of Reasoned Action: A Meta-Analysis of Past Research with Recommendations for Modifications and Future Research , 1988 .

[43]  Yogesh Kumar Dwivedi,et al.  Adoption of online public grievance redressal system in India: Toward developing a unified view , 2016, Comput. Hum. Behav..

[44]  Ahmet Ayaz,et al.  An analysis on the unified theory of acceptance and use of technology theory (UTAUT): Acceptance of electronic document management system (EDMS) , 2020 .

[45]  Ronald Leenes,et al.  Privacy regulation cannot be hardcoded. A critical comment on the ‘privacy by design’ provision in data-protection law , 2014 .

[46]  Johan Egebark,et al.  Liking what others “Like”: using Facebook to identify determinants of conformity , 2018 .

[47]  Marko Sarstedt,et al.  Mirror, mirror on the wall: a comparative evaluation of composite-based structural equation modeling methods , 2017, Journal of the Academy of Marketing Science.

[48]  Ann Cavoukian,et al.  Privacy by design: the definitive workshop. A foreword by Ann Cavoukian, Ph.D , 2010 .

[49]  Avelie Stuart,et al.  United in Diversity, Divided in Adversity? Support for Right-Wing Eurosceptic Parties in the Face of Threat Differs Across Nations , 2019, Front. Psychol..

[50]  Adel Yazdanmehr,et al.  Peers matter: The moderating role of social influence on information security policy compliance , 2020, Inf. Syst. J..

[51]  Detmar W. Straub,et al.  Trust and TAM in Online Shopping: An Integrated Model , 2003, MIS Q..

[52]  Ann Cavoukian,et al.  Privacy by Design [Leading Edge] , 2012, IEEE Technol. Soc. Mag..

[53]  P. Hustinx Privacy by design: delivering the promises , 2010 .

[54]  Mun Y. Yi,et al.  Understanding information technology acceptance by individual professionals: Toward an integrative view , 2006, Inf. Manag..

[55]  David A. Hoffman,et al.  Remote home health care technologies: how to ensure privacy? Build it in: Privacy by Design , 2010 .

[56]  Nripendra P. Rana,et al.  Understanding consumer adoption of mobile payment in India: Extending Meta-UTAUT model with personal innovativeness, anxiety, trust, and grievance redressal , 2020, Int. J. Inf. Manag..

[57]  Flora Stormer,et al.  Acting at Work , 2008 .

[58]  Viswanath Venkatesh,et al.  Consumer Acceptance and Use of Information Technology: Extending the Unified Theory of Acceptance and Use of Technology , 2012, MIS Q..

[59]  Nalin Asanka Gamagedara Arachchilage,et al.  Why developers cannot embed privacy into software systems?: An empirical investigation , 2018, EASE.

[60]  Wang Hu,et al.  Factors influencing the adoption of mHealth services in a developing country: A patient-centric study , 2020, Int. J. Inf. Manag..

[61]  M. Sarstedt,et al.  A new criterion for assessing discriminant validity in variance-based structural equation modeling , 2015 .

[62]  R. Bagozzi,et al.  On the evaluation of structural equation models , 1988 .

[63]  Jaap-Henk Hoepman,et al.  A Critical Analysis of Privacy Design Strategies , 2016, 2016 IEEE Security and Privacy Workshops (SPW).

[64]  Viswanath Venkatesh,et al.  Going beyond intention: Integrating behavioral expectation into the unified theory of acceptance and use of technology , 2017, J. Assoc. Inf. Sci. Technol..

[65]  V. Otter,et al.  Alley cropping systems as Ecological Focus Areas: A PLS-analysis of German farmers’ acceptance behaviour , 2021 .

[66]  Yu-Chung Taso,et al.  The impact of problem awareness and biospheric values on the intention to use a smart meter , 2020 .

[67]  M. Majid,et al.  The Bandwagon Effect and Consumption of Fashion Goods: A Case of Young Consumers of Pakistan , 2020, Scholedge International Journal of Management & Development ISSN 2394-3378.

[68]  Mahmoud Abdelrahman,et al.  Acceptance of autonomous delivery vehicles for last-mile delivery in Germany – Extending UTAUT2 with risk perceptions , 2020, Transportation Research Part C: Emerging Technologies.

[69]  Habibur Rahman,et al.  Investigating factors influencing the physicians' adoption of electronic health record (EHR) in healthcare system of Bangladesh: An empirical study , 2019, Int. J. Inf. Manag..

[70]  Ann Cavoukian,et al.  Advances in Biometric Encryption: Taking Privacy by Design from Academic Research to Deployment , 2012 .

[71]  Eran Toch,et al.  Privacy by designers: software developers’ privacy mindset , 2018, 2018 IEEE/ACM 40th International Conference on Software Engineering (ICSE).

[72]  Marko Sarstedt,et al.  PLS-SEM: Indeed a Silver Bullet , 2011 .

[73]  S. Bamberg,et al.  Twenty years after Hines, Hungerford, and Tomera: A new meta-analysis of psycho-social determinants of pro-environmental behaviour , 2007 .

[74]  Juan Sánchez-Fernández,et al.  Generalising user behaviour in online travel sites through the Travel 2.0 website acceptance model , 2012, Online Inf. Rev..

[75]  Ann Cavoukian,et al.  Start with Privacy by Design in All Big Data Applications , 2018 .

[76]  Ali Tarhini,et al.  Impact of individualism and collectivism over the individual's technology acceptance behaviour: A multi-group analysis between Pakistan and Turkey , 2015, J. Enterp. Inf. Manag..

[77]  Jukka Ylitalo,et al.  PLS marker variable approach to diagnosing and controlling for method variance , 2011, ICIS.

[78]  Gordon B. Davis,et al.  User Acceptance of Information Technology: Toward a Unified View , 2003, MIS Q..

[79]  B. Wee,et al.  Factors influencing the acceptance and use of a bicycle sharing system: Applying an extended Unified Theory of Acceptance and Use of Technology (UTAUT) , 2020, Case Studies on Transport Policy.

[80]  Suneel Pandey,et al.  Understanding public knowledge and awareness on e-waste in an urban setting in India , 2014 .

[81]  A. Burton-Jones Minimizing Method Bias Through Programmatic Research , 2009 .

[82]  Tao Zhou,et al.  Integrating TTF and UTAUT to explain mobile banking user adoption , 2010, Comput. Hum. Behav..

[83]  Sejin Ha,et al.  Understanding Consumer Recycling Behavior: Combining the Theory of Planned Behavior and the Norm Activation Model , 2014 .

[84]  Elfindah Princes,et al.  Taking Advantage of Social Conformity in Entrepreneurship , 2020, GATR Journal of Management and Marketing Review.

[85]  Yogesh Kumar Dwivedi,et al.  An empirical validation of a unified model of electronic government adoption (UMEGA) , 2017, Gov. Inf. Q..

[86]  Marc Langheinrich,et al.  Engineering Privacy by Design: Are engineers ready to live up to the challenge? , 2018, Inf. Soc..

[87]  Yogesh Kumar Dwivedi,et al.  Re-examining the Unified Theory of Acceptance and Use of Technology (UTAUT): Towards a Revised Theoretical Model , 2017, Information Systems Frontiers.

[88]  Jalayer Khalilzadeh,et al.  Security-related factors in extended UTAUT model for NFC based mobile payment in the restaurant industry , 2017, Comput. Hum. Behav..

[89]  Michel Tenenhaus,et al.  PLS path modeling , 2005, Comput. Stat. Data Anal..

[90]  Emma L. Slade,et al.  Examining antecedents of consumers’ pro-environmental behaviours: TPB extended with materialism and innovativeness , 2021 .

[91]  I. Ajzen,et al.  Attitude-behavior relations: A theoretical analysis and review of empirical research. , 1977 .

[92]  Viswanath Venkatesh,et al.  Unified Theory of Acceptance and Use of Technology: A Synthesis and the Road Ahead , 2016, J. Assoc. Inf. Syst..

[93]  Iryna Pentina,et al.  Mobile payments adoption by US consumers: an extended TAM , 2017 .

[94]  Eleni Dermentzi,et al.  UK public’s intention to engage with academia via online technologies , 2017, Behav. Inf. Technol..

[95]  Nizar Souiden,et al.  The interplay of counter-conformity motivation, social influence, and trust in customers' intention to adopt Internet banking services: The case of an emerging country , 2016 .

[96]  R. Peterson Constructing Effective Questionnaires , 1999 .

[97]  Sanjay Misra,et al.  Acceptance and Use of E-Learning Based on Cloud Computing: The Role of Consumer Innovativeness , 2014, ICCSA.

[98]  Vitaliy Mezhuyev,et al.  Towards a conceptual model for examining the impact of knowledge management factors on mobile learning acceptance , 2020 .

[99]  Cengiz Acarturk,et al.  The use and acceptance of ICT by senior citizens: a comparison of technology acceptance model (TAM) for elderly and young adults , 2018, Universal Access in the Information Society.

[100]  Marc Langheinrich,et al.  Inside the Organization: Why Privacy and Security Engineering Is a Challenge for Engineers , 2018, Proceedings of the IEEE.

[101]  Sarah Spiekermann,et al.  The challenges of privacy by design , 2012, Commun. ACM.

[102]  C. Fornell,et al.  Evaluating structural equation models with unobservable variables and measurement error. , 1981 .

[103]  Tiago Oliveira,et al.  International Journal of Information Management , 2014 .

[104]  Yogesh Kumar Dwivedi,et al.  A generalised adoption model for services: A cross-country comparison of mobile health (m-health) , 2016, Gov. Inf. Q..

[105]  Anna Romanou,et al.  The necessity of the implementation of Privacy by Design in sectors where data protection concerns arise , 2017, Comput. Law Secur. Rev..

[106]  I. Ajzen The theory of planned behavior , 1991 .

[107]  Yogesh Kumar Dwivedi,et al.  Citizens’ adoption of an electronic government system: towards a unified view , 2015, Information Systems Frontiers.

[108]  Shirley Taylor,et al.  Decomposition and crossover effects in the theory of planned behavior: A study of consumer adoption intentions , 1995 .

[109]  M. Ronaghi,et al.  A contextualized study of the usage of the Internet of things (IoTs) in smart farming in a typical Middle Eastern country within the context of Unified Theory of Acceptance and Use of Technology model (UTAUT) , 2020 .

[110]  Sevda Helpap,et al.  Employees’ emotions in change: advancing the sensemaking approach , 2016 .