Leibniz Universität Hannover. Masterarbeit

Similar documents
Development of an Acceptance Theory for Digital Financial Services. Masterarbeit

Opportunities and threats and acceptance of electronic identification cards in Germany and New Zealand. Masterarbeit

Towards Autonomous Driving: Developing a Framework for a Successful Transition

Smart Home Status Quo, Trends and Innovations

Smart Cities: Potential Analysis of Intelligent Lampposts

Towards a Reference Model for the Use of Information Technology in Cyber-Physical Production Systems. Masterarbeit

3D-PRINTING: SWOT-ANALYSIS AND TRENDS

Cooperation and Technological Endowment in International Joint Ventures: German Industrial Firms in China

TECHNISCHE UNIVERSITÄT ILMENAU FAKULTÄT FÜR WIRTSCHAFTSWISSENSCHAFTEN UND MEDIEN FACHGEBIET ALLGEMEINE BETRIEBSWIRTSCHAFTSLEHRE,

Web 2.0 in social science research

Digitisation A Quantitative and Qualitative Market Research Elicitation

Boundary Work for Collaborative Water Resources Management Conceptual and Empirical Insights from a South African Case Study

Determinants of E-commerce Adoption. among Malaysian SMEs

Communication and dissemination strategy

CHAPTER 8 RESEARCH METHODOLOGY AND DESIGN

Jacek Stanisław Jóźwiak. Improving the System of Quality Management in the development of the competitive potential of Polish armament companies

INNOVATION NETWORKS IN THE GERMAN LASER INDUSTRY

Belgian Position Paper

The 26 th APEC Economic Leaders Meeting

5th-discipline Digital IQ assessment

Programme Curriculum for Master Programme in Economic History

THE ATTITUDES OF ENTREPRENEURS AND MANAGERS REGARDING THE INFORMATION TECHNOLOGY IN ALBANIAN TOURISM ENTERPRISES ABSTRACT

European Charter for Access to Research Infrastructures - DRAFT

Empirical Study of the Formation Processes of Energy Scenarios

The University of Sheffield Research Ethics Policy Note no. 14 RESEARCH INVOLVING SOCIAL MEDIA DATA 1. BACKGROUND

Dr hab. Michał Polasik. Poznań 2016

Higher School of Economics, Vienna

Metrology in the Digital Transformation

Enabling ICT for. development

RFP No. 794/18/10/2017. Research Design and Implementation Requirements: Centres of Competence Research Project

This document is a preview generated by EVS

Increased Visibility in the Social Sciences and the Humanities (SSH)

A STUDY OF UNDERGRADUATE USE OF CLOUD COMPUTING APPLICATIONS: SPECIAL REFERENCE TO GOOGLE DOCS.

Digital transformation in the Catalan public administrations

Online Social Networks As Supporting Evidence: A Digital Forensic Investigation Model and Its Application Design

Adoption and diffusion of cloud computing in the public sector A case study of Zambia. Shuller Habeenzu ITMC/RIA Focal Point-Lusaka

OECD-INADEM Workshop on

PROGRAMME SYLLABUS Sustainable Building Information Management (master),

Question 1: Do you have any comments on our approach to this review?:

Social Innovation and new pathways to social changefirst insights from the global mapping

Exploring the New Trends of Chinese Tourists in Switzerland

Factors influencing the adoption of building information modeling in the AEC Industry

TECHNOLOGY, INNOVATION, and POLICY 3. Series of the Fraunhofer Institute for Systems and Innovation Research (lsi)

» Facing the Smart Future «

Ethics Guideline for the Intelligent Information Society

NCRIS Capability 5.7: Population Health and Clinical Data Linkage

HELPING BIOECONOMY RESEARCH PROJECTS RAISE THEIR GAME

Work Session on the Communication of Statistics (Geneva, Switzerland, June 2012)

2017/18 Mini-Project Building Impulse: A novel digital toolkit for productive, healthy and resourceefficient. Final Report

COUNTRY: Questionnaire. Contact person: Name: Position: Address:

Protection of Privacy Policy

Part I. General issues in cultural economics

The Information Commissioner s response to the Draft AI Ethics Guidelines of the High-Level Expert Group on Artificial Intelligence

Tokyo Protocol. On the Role of Science Centres and Science Museums Worldwide In Support of the United Nations Sustainable Development Goals

Helsinki University of Technology Systems Analysis Laboratory. Ahti Salo. P.O. Box 1100, FIN TKK Finland

Fiscal 2007 Environmental Technology Verification Pilot Program Implementation Guidelines

1. Recognizing that some of the barriers that impede the diffusion of green technologies include:

Industrie 4.0 in a Global Context

RECOMMENDATIONS. COMMISSION RECOMMENDATION (EU) 2018/790 of 25 April 2018 on access to and preservation of scientific information

Smart Management for Smart Cities. How to induce strategy building and implementation

REPORT ON THE INTERNATIONAL CONFERENCE MEMORY OF THE WORLD IN THE DIGITAL AGE: DIGITIZATION AND PRESERVATION OUTLINE

Our position. ICDPPC declaration on ethics and data protection in artificial intelligence

ASSEMBLY - 35TH SESSION

SHTG primary submission process

Theoretical loss and gambling intensity: a simulation study

INTERNET AND SOCIETY: A PRELIMINARY REPORT

Chapter 4. Research Objectives and Hypothesis Formulation

First MyOcean User Workshop 7-8 April 2011, Stockholm Main outcomes

Data users and data producers interaction: the Web-COSI project experience

ICT USAGE AND BENEFITS IN SWEDISH MANUFACTURING AND PROCESS COMPANIES.

EMITS: Improving Communication between ESA and Industry

Running head: ETHICS, TECHNOLOGY, SUSTAINABILITY AND SOCIAL ISSUES 1. Ethics, Technology, Sustainability and Social Issues in Business.

Special Eurobarometer 460. Summary. Attitudes towards the impact of digitisation and automation on daily life

Assessing the Impact of Concern for Privacy and Innovation Characteristics in the Adoption of Biometric Technologies

Climate Asia Research Overview

CAN LOCAL KNOWLEDGE WORKERS SIGNIFICANTLY CONTRIBUTE TO THE GROWTH OF THE NATIONAL LEVEL OF INNOVATION?

REPORT OF THE UNITED STATES OF AMERICA ON THE 2010 WORLD PROGRAM ON POPULATION AND HOUSING CENSUSES

Latin-American non-state actor dialogue on Article 6 of the Paris Agreement

Fostering Innovative Ideas and Accelerating them into the Market

Committee on Development and Intellectual Property (CDIP)

Brief presentation of the results Ioana ISPAS ERA NET COFUND Expert Group

Privacy Protection against Ubiquitous RFID Spying: Challenges, Countermeasures and Business Models

Investigating the Determinants and Perceived Consequences of Corporate Auditory

ECU Research Commercialisation

The RESPECT Project. 3rd Panel discussion on FP7 Cooperation themes Interdisciplinary Projects in the field of security.

Innovation in Australian Manufacturing SMEs:

16502/14 GT/nj 1 DG G 3 C

Country Paper : Macao SAR, China

Empirical Research Regarding the Importance of Digital Transformation for Romanian SMEs. Livia TOANCA 1

Extract of Advance copy of the Report of the International Conference on Chemicals Management on the work of its second session

Statistical basis and overviews FSO register strategy. Purpose, strategic objectives and implementation steps.

Roswitha Poll Münster, Germany

FEASIBILITY STUDY OF NATIONAL INTEGRATED TRANSPORT PROGRAM

CO-ORDINATION MECHANISMS FOR DIGITISATION POLICIES AND PROGRAMMES:

CHAPTER 1 PURPOSES OF POST-SECONDARY EDUCATION

Artificial Intelligence (AI) and Patents in the European Union

Vision. The Hague Declaration on Knowledge Discovery in the Digital Age

Committee on Development and Intellectual Property (CDIP)

Facing the Future: Additive Manufacturing SECOND ROUND. Call for Partners: Consortium Study. Our partners:

Data Ecosystems: a new challenge for official statistics

Transcription:

Leibniz Universität Hannover Wirtschaftswissenschaftliche Fakultät Institut für Wirtschaftsinformatik Influence of Privacy Concerns on Enterprise Social Network Usage Masterarbeit zur Erlangung des akademischen Grades Master of Science (M. Sc.) im Studiengang Wirtschaftswissenschaft der Wirtschaftswissenschaftlichen Fakultät der Leibniz Universität Hannover vorgelegt von: Name: Jannes Fröse Geb. am: 02.01.1992 in: Hannover Matr.-Nr.: 2973000 E-Mail: jannes.froese@htp-tel.de Prüfer: Prof. Dr. Michael H. Breitner Hannover, den 02.10.2017

Contents List of Figures List of Tables List of Abbreviations List of Symbols v v vi viii 1 Introduction 1 1.1 Relevance and Motivation............................. 1 1.2 Research Gap and Questions............................ 3 2 Theoretical Background 5 2.1 Literature Review.................................. 5 2.2 Information Privacy and Information Privacy Concerns............ 11 2.2.1 (Information) Privacy............................ 11 2.2.2 Information Privacy Concerns and Models............... 12 2.3 Enterprise Social Networks............................ 18 2.3.1 Definition, Development and Status Quo................ 18 2.3.1.1 From Web 1.0 to Web 2.0..................... 18 2.3.1.2 Social Software.......................... 21 2.3.1.3 Enterprise 2.0........................... 23 2.3.1.4 Social Networks in Enterprises................. 25 2.3.2 Data Privacy and Information Security.................. 33 2.3.2.1 Data Security and Privacy Aspects............... 33 2.3.2.2 Information Privacy Concerns (in the context of ESNs)... 35 2.3.3 Technical Security Instruments and Standards............. 41 2.4 The Five-Factor Model of Personality (The Big Five).............. 45 3 Hypotheses Formulation and Research Model 51 4 Research Design and Methodology 62 4.1 Qualitative Research (Expert Interviews)..................... 62 4.1.1 Interview Proceedings and Expert Selection............... 62 4.1.2 Data Collection and Evaluation...................... 66 4.1.3 Conclusion and Modified Research Model................ 76 4.2 Quantitative Research (Employee Survey).................... 82 4.2.1 Sample and Survey Procedure....................... 82 4.2.2 Development and Instrumentation.................... 85 4.2.3 Implementation and Data Preparation.................. 86 iii

5 Data Analysis and Evaluation Results 90 5.1 Measurement Model Assessment......................... 91 5.2 Structural Model Assessment........................... 94 5.3 Hypotheses Testing................................. 97 6 Discussion, Recommendation and Future Research 102 7 Conclusion and Limitation 109 References A Appendix I XIV B Declaration of Authorship CVII iv

1 Introduction 1.1 Relevance and Motivation The rapid distribution of Web 2.0 technologies allows users to play a decisive role in the creation of content on Internet platforms. A basic feature of these technologies is the possibility to generate information and to exchange them via internet-based platforms. These Web 2.0 technologies are also designated as Social Media and form the basis for profound debates about chances and risks in both research and practice. Social Media comprises a variety of technologies and functions, such as Blogs, Wikis, Podcasts and Social Networks [1]. In this regard, the demand for efficient communication and collaboration tools is also steadily growing in a business context. Not least, because of the increasing relevance of the internationalisation of businesses, extensive project work and expert knowledge [2]. The associated changes offer a series of advantages that are relevant for both, final users and companies. Organisations across all business areas implement Web 2.0 tools for the internal application. Hence, this enables employees to share information and to support collaboration with costumers and business partners. One group of these tools receives particular attention in the corporate context and is designated as Enterprise Social Networks (ESNs) [3][4]. ESNs refer to a further evolutionary stage for the usage of digital technologies for communication and collaboration in companies. The way it is communicated and cooperated in a company is subject to constant changes. Therefore, the usage of modern information technologies has seriously impacted working life in organisations in recent years. Nowadays, there is almost no process that is applied without IT support. Therefore, the provision of virtual working spaces and the simplification of communication is what differentiates ESNs from classical Intranet solutions [5]. In this regard, ESNs can be defined as a set of technologies that create added value by connecting members of an organisation through the provision of profile information, updates and notifications [6]. Communication beyond meetings and email traffic enables knowledge sharing throughout the entire company. Hidden knowledge can thus be uncovered and employees across different locations and countries can participate in collaboration. Research and practice provide various reasons for the ESN usage and discuss potential chances and challenges extensively. For these reasons, ESNs are increasingly applied in all business areas. Large companies, in particular, make use of ESNs for internal communication [4]. This development was also predicted by a recent study of the McKinsey Global Institute. In 2006, only 10% of businesses had implemented an ESN. However, this amount had doubled by 2008 and doubled again by 2011. At the end of 2012, almost 50% of the surveyed companies had adopted an ESN, while this share is predicted to be around 70% by the end of 2017 1

[7]. Additionally, the analysts are forecasting the worldwide revenue of ESNs to strongly increase in recent years. For instance, the ESN revenue for the EMEA region is predicted to rise from US$ 346.4 in 2014 to US$ 1,829.4 in 2019, as shown in Figure 1. Figure 1 Worldwide Enterprise Social Networks Revenue by Region, 2014 and 2019 [8] Nevertheless, the expected improvements do not imply the general acceptance and endorsement for the implementation of such networks in the corporate context. Although ESNs are already well applied in large companies and are awarded a high potential to change the corporate work practice, it can be ascertained that the application of ESNs oftentimes does not bring the desired success, yet [9]. In some instances, the degree of utilisation of ESNs in practice falls short of expectations and employee participation is comparatively low. Thus, networks cannot reach their full potential. Expected beneficial network effects cannot appear and the expectations cannot be met from the system. In this matter, the absence of participation particularly weighs heavy, as most companies provide ESNs on a voluntarily basis and develop their full potential the more employees get involved [4]. Besides cultural aspects and a lack of motivation, especially users concerns regarding information security and data privacy seem to have some influence on the users intention to use ESNs. Similar to Social Networks beyond the corporate context, ESNs also face risks and threats regarding the collected corporate and personal information. These issues are not only perceived by the respective companies, but also by their employees and potential ESN users [9][10]. As a result, users who perceive privacy concerns using ESNs could avoid the usage and lead to the low participation shares. Consequently, the investigation of influences of users privacy concerns on the ESN usage should be investigated and is thus, an objective of this study. Therefore, this study aims to identify the relevant information privacy concerns of ESN users, as well as to analyse whether or not these concerns influence ESN usage behaviour. Regarding this, the first section of this study carves out the research gap and formulates 2

respective research questions, which are answered in the course of this work. The second section represents theoretical backgrounds. Regarding this, a systematic literature review is performed to extract and identify the most important information privacy concerns to get a good overview over the current literature, as well as to answer the research questions in an appropriate manner. Based on these results, an introduction to information privacy concerns, Social Networks in enterprises and the five factor model of personality can be given, emphasising the identification of users privacy concerns in the context of ESNs. Thereafter, section 3 covers the creation of a research model and the associated formulation of proposed hypotheses, working out the relationships of users privacy concerns on the behavioural intention of ESN usage. Section 4 represents the research design and methodologies of both qualitative and quantitative research conducted in this study. Therefore, the results of expert interviews and the resulting modified research model will be presented. Furthermore, the implementation of the employee questionnaire and model testing will be specified. On this basis, section 5 presents the data analysis and evaluation results of the underlying research model, expanding upon the measurement and structural model assessment, as well as on hypothesis confirmation. Finally, the findings of the model testing are discussed, as well as recommendations for future research and practice are provided. 1.2 Research Gap and Questions The utilisation of software and networks for collaboration and knowledge exchange in companies is enjoying ever growing popularity. Such technologies support employees and teams to handle internal communication efficiently and make sure that every employee receives the right information at the right time [5]. However, upon closer scrutiny of the progress of implementation in practice, inter alia the absence of employee participation prevents companies from extensively realising their objectives. The central research topic constitutes the degree to which the employees are willing to adopt and use the system in their daily work [11]. Especially during the launch phase of ESNs, it is important to stimulate the comprehensive adoption of new technologies. This suggests that companies, as well as researchers should evaluate different reasons for employees avoiding the ESN usage, since the technology acceptance constitutes the fundamental basis for implementing new information systems (IS) [1][4]. One possible reason could be the existence of users privacy concerns with regards to ESN usage. Due to the fact that in such ESNs, sensitive and personal information is also collected and transferred, the topic areas of information security and data privacy play a decisive role. Similar to public Social Networks, ESNs work with user profiles implying the disclosure of personal information. Moreover, forum and blog entries are visible for every network member, which could lead to a comprehensive perception of transparency of employees activities [5]. 3

Therefore, chances and challenges including risks and threats for both employees and companies are already comprehensively examined and discussed in the current literature. Additionally, the influence of privacy concerns on technology acceptance and behavioural intentions has been the topic of various previous research activities and in the course of different technologies and IS. However, users privacy concerns that arise while using ESNs were not identified, yet. Also, the influence of such privacy concerns on the employees intention to use ESNs was not a part of previous research. Consequently, the objective of this study is to investigate Social Networks in enterprises. The paper will focus on users privacy concerns arising from the application of ESNs and their influences on the usage behaviour, examining risk factors and privacy aspects. For that reason, this study will analyse the literature and the state of knowledge on ESNs and the respective risk factors and privacy concerns, as well as already validated research models in this area. In this matter, based on the extensive literature review, the study will identify already validated privacy concern models and evaluate them in the context of ESNs. As a result, it can be examined whether or not the identified privacy concerns can also be applied for ESN usage. Consequently, the following research question can be derived, which will be answered in the course of this study: RQ (1): What are users information privacy concerns that occur while using Enterprise Social Networks? To underpin the discussion, this study will set up a research model representing the influences of privacy concerns on the intention to use ESNs, adding inter alia, the influence of personality traits on the perceived privacy concerns to get further model validation. Further model confirmation will be achieved through expert interviews gaining insights into practical implementations of companies, which have already implemented ESNs. Therefore, the identified concerns are checked and a modified research model can be established, based on the current literature and verified by practical insights. Eventually, an extensive employee survey will be conducted measuring the actual influence of privacy concerns on the intention to use ESNs. In this regard, privacy can be seen as inversely proportional to the technology s functionalities. Thus, it can be expected that the more personalised a technology is, the more it is dependent on individuals information to be personalised. Therefore, the rising request for personal information is hence, linked to an increase of individuals perception of threat and concerns and is associated with the urge to be preserved from corresponding harm. As a result, users may avoid the usage of such requesting technologies [12]. Arising from the stated objectives, this paper also attempts to answer the following research question: RQ (2): To what extent do the users concerns for information privacy influence the intention to use Enterprise Social Networks? 4

7 Conclusion and Limitation While the underlying research provides insights of understanding the influences of users privacy concerns on the ESN use intentions, the limitations of the study should be duly noted. The first limitation is regarding the selected sample. Even though, the general user sample employed in this study increases the external validity and generalisability of the results, it may not be entirely representative of the user community in all aspects. The employee survey was mainly completed by participants who use ESNs regularly, or at least are already registered in such network. However, this may not include those employees avoiding the ESN usage, for instance, because of perceived privacy concerns. Another limitation is the adoption of already validated scales and constructs. Therefore, the study could only fall back on respective existing models and constructs and adjust them in the context of ESNs. The formulation and development of own constructs was thus, not a part of the research, which may have yielded to privacy constructs even more appropriate in the ESN context. Furthermore, the study was limited to the most relevant identified antecedents to privacy concerns. In order to expand the existing model additional factors such as computer anxiety may increase the variance explained in the dependent variable. The underlying study was limited also due to timely-restrictions in the conduct of the employee survey. To not overtax the participants, the underlying study used a comparatively short scale to measure personality traits, so that as many as possible participants could be generated. In this regard, larger scales such as NEO-FFI and IPIP could enable an in-depth assessment of relationships between personality traits and perceived privacy concerns. The considerations and approaches of this study are based on the conducted literature review and expert interviews and thus, are basis for the setting up of the research model. Due to the fact that the review evaluates the deployed factors largely based on the quantity of appearances, fairly new research fields may be neglected as they do not occur that often in the relevant literature yet. Additionally, it must be noted that further information about the technical security measures and practices of ESN companies could not be generated. Expert interviewees did not give any detailed figures, as they referenced to the existing privacy guidelines and regulations. Additionally, it must be noted that statements of the interviews should be critically examined, as it is improbable that ESN authorities make sensitive information voluntarily available. Especially, statements about comprehensive security measures may be discerningly considered, as respective interviewees would not rather admit lacks in implemented security measures. In conclusion, ESNs have been represented as one of the most transformative and innovative technologies for organisations and in particular for their impact on communication and collaboration. Companies are increasingly adopting the use of ESNs in their busi- 109

ness practices. However, an impeding factor in the adoption and full integration and implementation of ESNs is due to users concerns for information privacy. An insight of these concerns foster the development of preventative measures to inhibit them. The underlying study sought to explain how users concerns for information privacy in ESNs influence their behavioural intentions, as well as to identify influential factors such as perceived trust, risk and usefulness regarding the respective network. In addition, the influences of different facets of an individuals personality on the expression of privacy concerns were considered. Conclusively, this study carved out the most important users concerns for information privacy having regard to theoretical and practical applicability of the ESN usage. Therefore, aspects such as the secondary use of personal information, perceived surveillance and intrusion, awareness of privacy practices and the prior privacy experiences could be identified and adopted into the context of ESN usage. Additionally, the perceived trust, risk and usefulness as antecedents and the Big Five personality traits were examined and assessed. On the basis of this, a research model was established, which was verified in the course of an employee survey. Resulting from this, recommendations and solution approaches for future research and practice could be made. By evaluating and discussing the findings of the empirical analysis and comparing those with the preceding statements of expert interviewees, possible explanations for the observed influences could be identified. Regarding this, the underlying study provides evidence that users concerns for information privacy affect their intention to use ESNs. However, rather than directly influencing the ESN use intention, the influence of privacy concerns is mediated by users perception of trust, risk and usefulness. These antecedents show great influence in supporting the ESN use intention and are in turn, also affected by occurring privacy concerns. Furthermore, the study demonstrates that the influence of the Big Five personality traits on the perceived privacy concerns is only moderately existent. Only two of the five examined traits show statistically influences. In this regard, it can conclusively be noted that extensive security and privacy measures are already implemented by providers, in order to protect private and corporate information used in ESNs. Companies, as well as providers take great care of the comprehensive evaluation of risks and threats and are aware of data privacy regulations and take respective precautions. However, the direct reference to the demand of the employees may be left out. Concerning this, companies concentrate largely on the direct reduction of users privacy concerns to support employee participation. Respective measures and precautions are actively implemented to mitigate such concerns. Such arrangements are important and mandatory, but may not lead to the necessary employee participation, as indicated by the findings of this study. Therefore, it can be recommended that companies, as well as providers should implement measures and raise awareness to foster trust and 110

mitigate perceived risks. Additionally, companies should demonstrate the advantages that walk along with the ESN usage, as users who perceive usefulness are more likely to use such network. This study, showed that these factors have more direct influence on the ESN use intention, than the actual perception of privacy concerns. Either way, the digitalisation will keep on advancing the possibilities and implementations of ESNs and therewith, the importance of extensive employee participation to get hands on respective network effects and to foster the internal communication and collaboration. Thus, users privacy concerns, as well as other influencing factors and their effects on behavioural intentions will become more and more important in all business areas. In summary, this study should be considered as an initial empirical approach into the area of privacy concerns influencing behavioural intentions in the context of ESNs. Therefore, some progress has been made in this regard, specifying important insights and leaving some interesting opportunities to pursue for future research. 111