Skip to main content
Top
Published in: Asian Journal of Business Ethics 2/2018

06-09-2017

Do managerial ethics and legal education influence online privacy policies in Greater China?

Author: David C. Li

Published in: Asian Journal of Business Ethics | Issue 2/2018

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

This study evaluated the online privacy policies of business-to-consumer e-commerce firms in five industries of mainland China, Taiwan, and Hong Kong. Based on the neo-institutional theory, we also tested whether the four institutional factors, (1) top management’s legal education, (2) managerial ethics, (3) rule of law in information privacy protection and (4) peer practices, had any effects on e-information and e-communication content. Results from a content analysis of 229 websites found that the privacy policy contents that complied with generally accepted privacy standards were lesser in mainland China firms than those of Taiwan and Hong Kong firms. There were also significant differences in the amount of contents among the five industries. The results of regression analyses showed the importance of all four factors on e-information content. They also showed the importance of coercive, mimetic, and normative isomorphisms on e-information content. The validation of normative isomorphism highlighted the importance of managerial ethics and legal education. Our findings supplemented extant literature which identified economic motive as the main factor in influencing privacy practice disclosures.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
go back to reference Aljukhadar, M., Senecal, S., & Ouellette, D. (2010). Can the media richness of a privacy disclosure enhance outcome? A multifaceted view of trust in rich media environments. International Journal of Electronic Commerce, 14(4), 103–126.CrossRef Aljukhadar, M., Senecal, S., & Ouellette, D. (2010). Can the media richness of a privacy disclosure enhance outcome? A multifaceted view of trust in rich media environments. International Journal of Electronic Commerce, 14(4), 103–126.CrossRef
go back to reference Au, N., & Law, R. (2012). Presentation formats of policy statements on hotel websites and privacy concerns: a multimedia learning theory perspective. Journal of Hospitality & Tourism Research, 37(4), 470–489. Au, N., & Law, R. (2012). Presentation formats of policy statements on hotel websites and privacy concerns: a multimedia learning theory perspective. Journal of Hospitality & Tourism Research, 37(4), 470–489.
go back to reference Bansal, G., Zahedi, F. M., & Gefen, D. (2015). The role of privacy assurance mechanisms in building trust and the moderating role of privacy concern. European Journal of Information Systems, 24(6), 624–644.CrossRef Bansal, G., Zahedi, F. M., & Gefen, D. (2015). The role of privacy assurance mechanisms in building trust and the moderating role of privacy concern. European Journal of Information Systems, 24(6), 624–644.CrossRef
go back to reference Boritz, J. E., & No, W. G. (2011). E-commerce and privacy: exploring what we know and opportunities for future discovery. Journal of Information Systems, 25(2), 11–45.CrossRef Boritz, J. E., & No, W. G. (2011). E-commerce and privacy: exploring what we know and opportunities for future discovery. Journal of Information Systems, 25(2), 11–45.CrossRef
go back to reference Culnan, M. J., & Williams, C. C. (2009). How ethics can enhance organizational privacy: lessons from the choicepoint and TJX data breaches. MIS Quarterly, 33(4), 673–687.CrossRef Culnan, M. J., & Williams, C. C. (2009). How ethics can enhance organizational privacy: lessons from the choicepoint and TJX data breaches. MIS Quarterly, 33(4), 673–687.CrossRef
go back to reference Davis, L. E., & North, D. C. (1971). Institutional change and American economic growth. Cambridge: Cambridge University Press.CrossRef Davis, L. E., & North, D. C. (1971). Institutional change and American economic growth. Cambridge: Cambridge University Press.CrossRef
go back to reference DiMaggio, P. J., & Powell, W. W. (1983). The iron cage revisited: institutional isomorphism and collective rationality in organizational fields. American Sociological Review, 48(2), 147–160.CrossRef DiMaggio, P. J., & Powell, W. W. (1983). The iron cage revisited: institutional isomorphism and collective rationality in organizational fields. American Sociological Review, 48(2), 147–160.CrossRef
go back to reference Earp, J. B., Anton, A., Aiman-Smith, L., & Stufflebeam, W. H. (2005). Examining Internet privacy policies within the context of user privacy values. IEEE Transactions on Engineering Management, 52(2), 227–237.CrossRef Earp, J. B., Anton, A., Aiman-Smith, L., & Stufflebeam, W. H. (2005). Examining Internet privacy policies within the context of user privacy values. IEEE Transactions on Engineering Management, 52(2), 227–237.CrossRef
go back to reference Ermakova, T., Baumann, A., Fabian, B., & Krasnova, H. (2014). Privacy policies and users’ trust: does readability matter? In Twentieth Americas Conference on Information Systems. Savannah, 1–12. Ermakova, T., Baumann, A., Fabian, B., & Krasnova, H. (2014). Privacy policies and users’ trust: does readability matter? In Twentieth Americas Conference on Information Systems. Savannah, 1–12.
go back to reference Gerlach, J., Widjaja, T., & Buxmann, P. (2015). Handle with care: how online social network providers’ privacy policies impact users’ information sharing behavior. The Journal of Strategic Information Systems, 24(1), 33–43.CrossRef Gerlach, J., Widjaja, T., & Buxmann, P. (2015). Handle with care: how online social network providers’ privacy policies impact users’ information sharing behavior. The Journal of Strategic Information Systems, 24(1), 33–43.CrossRef
go back to reference Hair, J. F., Black, W. C., Babin, B. J., & Anderson, R. E. (2010). Multivariate data analysis. Upper Saddle River: Pearson Prentice Hall. Hair, J. F., Black, W. C., Babin, B. J., & Anderson, R. E. (2010). Multivariate data analysis. Upper Saddle River: Pearson Prentice Hall.
go back to reference Hsu, C., Lee, J. N., & Straub, D. W. (2012). Institutional influences on information systems security innovations. Information Systems Research, 23(3), part 2), 918–939.CrossRef Hsu, C., Lee, J. N., & Straub, D. W. (2012). Institutional influences on information systems security innovations. Information Systems Research, 23(3), part 2), 918–939.CrossRef
go back to reference Hu, Q., Hart, P., & Cooke, D. (2007). The role of external and internal influences on information systems security—a neo-institutional perspective. Journal of Strategic Information Systems, 16(2), 153–172.CrossRef Hu, Q., Hart, P., & Cooke, D. (2007). The role of external and internal influences on information systems security—a neo-institutional perspective. Journal of Strategic Information Systems, 16(2), 153–172.CrossRef
go back to reference Hui, K. L., Teo, H. H., & Lee, S. Y. T. (2007). The value of privacy assurance: an exploratory field experiment. MIS Quarterly, 31(1), 9–33.CrossRef Hui, K. L., Teo, H. H., & Lee, S. Y. T. (2007). The value of privacy assurance: an exploratory field experiment. MIS Quarterly, 31(1), 9–33.CrossRef
go back to reference Huizingh, E. K. (2000). The content and design of web sites: an empirical study. Information Management, 37(3), 123–134.CrossRef Huizingh, E. K. (2000). The content and design of web sites: an empirical study. Information Management, 37(3), 123–134.CrossRef
go back to reference Judge, W., Li, S., & Pinsker, R. (2010). National adoption of international accounting standards: an institutional perspective. Corporate Governance: An International Review, 18(3), 161–174.CrossRef Judge, W., Li, S., & Pinsker, R. (2010). National adoption of international accounting standards: an institutional perspective. Corporate Governance: An International Review, 18(3), 161–174.CrossRef
go back to reference Kauffman, R. J., Lee, Y. J., Prosch, M., & Steinbart, P. J. (2011). A survey of consumer information privacy from the accounting information systems perspective. Journal of Information Systems, 25(2), 47–79.CrossRef Kauffman, R. J., Lee, Y. J., Prosch, M., & Steinbart, P. J. (2011). A survey of consumer information privacy from the accounting information systems perspective. Journal of Information Systems, 25(2), 47–79.CrossRef
go back to reference Landwehr, C. (2016). Privacy research directions. Communications of the ACM, 59(2), 29–31.CrossRef Landwehr, C. (2016). Privacy research directions. Communications of the ACM, 59(2), 29–31.CrossRef
go back to reference Liu, C., & Arnett, K. P. (2002). Raising a red flag on global www privacy policies. Journal of Computer Information Systems, 43(1), 117–127. Liu, C., & Arnett, K. P. (2002). Raising a red flag on global www privacy policies. Journal of Computer Information Systems, 43(1), 117–127.
go back to reference Matwyshyn, A. M. (2009). CSR and the corporate cyborg: ethical corporate information security practices. Journal of Business Ethics, 88(4), 579–594.CrossRef Matwyshyn, A. M. (2009). CSR and the corporate cyborg: ethical corporate information security practices. Journal of Business Ethics, 88(4), 579–594.CrossRef
go back to reference Meyer, J. W., & Rowan, B. (1977). Institutionalized organizations: formal structure as myth and ceremony. American Journal of Sociology, 83(2), 340–363.CrossRef Meyer, J. W., & Rowan, B. (1977). Institutionalized organizations: formal structure as myth and ceremony. American Journal of Sociology, 83(2), 340–363.CrossRef
go back to reference Neuendorf, K. A. (2002). The content analysis guidebook. Thousand Oaks: Sage Publications. Neuendorf, K. A. (2002). The content analysis guidebook. Thousand Oaks: Sage Publications.
go back to reference Oxley, J. E., & Yeung, B. (2001). E-commerce readiness: institutional environment and international competitiveness. Journal of International Business Studies, 32(4), 705–723.CrossRef Oxley, J. E., & Yeung, B. (2001). E-commerce readiness: institutional environment and international competitiveness. Journal of International Business Studies, 32(4), 705–723.CrossRef
go back to reference Pan, Y., & Zinkhan, G. M. (2006). Exploring the impact of online privacy disclosures on consumer trust. Journal of Retailing, 82(4), 331–338.CrossRef Pan, Y., & Zinkhan, G. M. (2006). Exploring the impact of online privacy disclosures on consumer trust. Journal of Retailing, 82(4), 331–338.CrossRef
go back to reference Peslak, A. R. (2006). Internet privacy policies of the largest international companies. Journal of Electronic Commerce in Organizations, 4(3), 46–62.CrossRef Peslak, A. R. (2006). Internet privacy policies of the largest international companies. Journal of Electronic Commerce in Organizations, 4(3), 46–62.CrossRef
go back to reference Pollach, I. (2007). What’s wrong with online privacy policies? Communications of the ACM, 50(9), 103–108.CrossRef Pollach, I. (2007). What’s wrong with online privacy policies? Communications of the ACM, 50(9), 103–108.CrossRef
go back to reference Proctor, R. W., Ali, M. A., & Vu, K. P. L. (2008). Examining usability of web privacy policies. Intl. Journal of Human–Computer Interaction, 24(3), 307–328.CrossRef Proctor, R. W., Ali, M. A., & Vu, K. P. L. (2008). Examining usability of web privacy policies. Intl. Journal of Human–Computer Interaction, 24(3), 307–328.CrossRef
go back to reference Robbins, S. S., & Stylianou, A. C. (2003). Global corporate web sites: an empirical investigation of content and design. Information Management, 40(3), 205–212.CrossRef Robbins, S. S., & Stylianou, A. C. (2003). Global corporate web sites: an empirical investigation of content and design. Information Management, 40(3), 205–212.CrossRef
go back to reference Sarathy, R., & Robertson, C. J. (2003). Strategic and ethical considerations in managing digital privacy. Journal of Business Ethics, 46(2), 111–126.CrossRef Sarathy, R., & Robertson, C. J. (2003). Strategic and ethical considerations in managing digital privacy. Journal of Business Ethics, 46(2), 111–126.CrossRef
go back to reference Schwaig, K. S., Kane, G. C., & Storey, V. C. (2006). Compliance to the fair information practices: how are the Fortune 500 handling online privacy disclosures? Information Management, 43(7), 805–820.CrossRef Schwaig, K. S., Kane, G. C., & Storey, V. C. (2006). Compliance to the fair information practices: how are the Fortune 500 handling online privacy disclosures? Information Management, 43(7), 805–820.CrossRef
go back to reference Shuai, J. J., & Wu, W. W. (2011). Evaluating the influence of E-marketing on hotel performance by DEA and grey entropy. Expert Systems with Applications, 38(7), 8763–8769.CrossRef Shuai, J. J., & Wu, W. W. (2011). Evaluating the influence of E-marketing on hotel performance by DEA and grey entropy. Expert Systems with Applications, 38(7), 8763–8769.CrossRef
go back to reference Srivastava, S. C., Teo, T. S., & Subramanian, A. M. (2009). Rational versus institutional perspectives in organizational web sites. Communications of the Association for Information Systems, 24(36), 615–638. Srivastava, S. C., Teo, T. S., & Subramanian, A. M. (2009). Rational versus institutional perspectives in organizational web sites. Communications of the Association for Information Systems, 24(36), 615–638.
go back to reference Suchman, M. C. (1995). Managing legitimacy: strategic and institutional approaches. Academy of Management Review, 20(3), 571–610.CrossRef Suchman, M. C. (1995). Managing legitimacy: strategic and institutional approaches. Academy of Management Review, 20(3), 571–610.CrossRef
go back to reference Teodoro, M. P. (2014). When professionals lead: executive management, normative isomorphism, and policy implementation. Journal of Public Administration Research and Theory, 24(4), 983–1004.CrossRef Teodoro, M. P. (2014). When professionals lead: executive management, normative isomorphism, and policy implementation. Journal of Public Administration Research and Theory, 24(4), 983–1004.CrossRef
go back to reference Tsai, J. Y., Egelman, S., Cranor, L., & Acquisti, A. (2011). The effect of online privacy information on purchasing behavior: an experimental study. Information Systems Research, 22(2), 254–268.CrossRef Tsai, J. Y., Egelman, S., Cranor, L., & Acquisti, A. (2011). The effect of online privacy information on purchasing behavior: an experimental study. Information Systems Research, 22(2), 254–268.CrossRef
go back to reference Verrecchia, R. E. (1983). Discretionary disclosure. Journal of Accounting and Economics, 5, 179–194.CrossRef Verrecchia, R. E. (1983). Discretionary disclosure. Journal of Accounting and Economics, 5, 179–194.CrossRef
go back to reference Xu, H., Dinev, T., Smith, J., & Hart, P. (2011). Information privacy concerns: linking individual perceptions with institutional privacy assurances. Journal of the Association for Information Systems, 12(12), 798–824.CrossRef Xu, H., Dinev, T., Smith, J., & Hart, P. (2011). Information privacy concerns: linking individual perceptions with institutional privacy assurances. Journal of the Association for Information Systems, 12(12), 798–824.CrossRef
go back to reference Yang, H. L., & Chiu, H. K. (2002). Privacy disclosures of web sites in Taiwan. Journal of Information Technology Theory and Application, 4(3), 16–42. Yang, H. L., & Chiu, H. K. (2002). Privacy disclosures of web sites in Taiwan. Journal of Information Technology Theory and Application, 4(3), 16–42.
go back to reference Yang, M. H., Chandlrees, N., Lin, B., & Chao, H. Y. (2009). The effect of perceived ethical performance of shopping websites on consumer trust. Journal of Computer Information Systems, 50(1), 15–24. Yang, M. H., Chandlrees, N., Lin, B., & Chao, H. Y. (2009). The effect of perceived ethical performance of shopping websites on consumer trust. Journal of Computer Information Systems, 50(1), 15–24.
go back to reference Zeng, S. X., Xu, X. D., Yin, H. T., & Tam, C. M. (2012). Factors that drive Chinese listed companies in voluntary disclosure of environmental information. Journal of Business Ethics, 109(3), 309–321.CrossRef Zeng, S. X., Xu, X. D., Yin, H. T., & Tam, C. M. (2012). Factors that drive Chinese listed companies in voluntary disclosure of environmental information. Journal of Business Ethics, 109(3), 309–321.CrossRef
Metadata
Title
Do managerial ethics and legal education influence online privacy policies in Greater China?
Author
David C. Li
Publication date
06-09-2017
Publisher
Springer Netherlands
Published in
Asian Journal of Business Ethics / Issue 2/2018
Print ISSN: 2210-6723
Electronic ISSN: 2210-6731
DOI
https://doi.org/10.1007/s13520-017-0080-z