Skip to main content
Top
Published in: Information Systems Frontiers 1/2018

20-06-2016

Privacy and biometrics: An empirical examination of employee concerns

Authors: Darrell Carpenter, Alexander McLeod, Chelsea Hicks, Michele Maasberg

Published in: Information Systems Frontiers | Issue 1/2018

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Advances in authentication technology have led to a proliferation of biometric-based systems in the workplace. Although biometric technologies offer organizations a cost-effective method of increasing security, employees are often hesitant to permit use. The collection and storage of employee biometric data raises concerns about proper use of these intensely personal identifiers. This work draws from organizational privacy practices, electronic monitoring, procedural fairness, self-construal, and technology adoption theories. We investigate the effects of independent and interdependent self-construal on three newly developed dimensions of employee privacy concern related to organizational use of biometric technology. These dimensions include perceived accountability, perceived vulnerability, and perceived distrust toward the organization. We test the predictive power of our model using data from an organization deploying a new biometric system designed to track employee work assignments under the auspices of improving personnel safety. Results indicate that self-construal plays a significant role in the formulation of privacy concerns and both perceived accountability concerns and perceived vulnerability concerns are significant predictors of attitude toward using biometric technology in the workplace.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Appendix
Available only for authorised users
Literature
go back to reference Agrawal, N., & Maheswaran, D. (2005). The effects of self-construal and commitment on persuasion. Journal of Consumer Research, 31(4), 841–849.CrossRef Agrawal, N., & Maheswaran, D. (2005). The effects of self-construal and commitment on persuasion. Journal of Consumer Research, 31(4), 841–849.CrossRef
go back to reference Aiello, J. R., & Kolb, K. J. (1995). Electronic performance monitoring and social context: impact on productivity and stress. Journal of Applied Psychology, 80(3), 339.CrossRef Aiello, J. R., & Kolb, K. J. (1995). Electronic performance monitoring and social context: impact on productivity and stress. Journal of Applied Psychology, 80(3), 339.CrossRef
go back to reference Ajzen, I. (1991). The theory of planned behavior. Organizational Behavior and Human Decision Processes, 50(2), 179–211.CrossRef Ajzen, I. (1991). The theory of planned behavior. Organizational Behavior and Human Decision Processes, 50(2), 179–211.CrossRef
go back to reference Ajzen, I. (2001). Nature and operation of attitudes. Annual Review of Psychology, 52(1), 27–58.CrossRef Ajzen, I. (2001). Nature and operation of attitudes. Annual Review of Psychology, 52(1), 27–58.CrossRef
go back to reference Ajzen, I. (2002). Constructing A TpB questionnaire: Conceptual and methodological considerations. Ajzen, I. (2002). Constructing A TpB questionnaire: Conceptual and methodological considerations.
go back to reference Ajzen, I., & Fishbein, M. (1972). Attitudes and normative beliefs as factors influencing behavioral intentions. Journal of Personality and Social Psychology, 21(1), 1.CrossRef Ajzen, I., & Fishbein, M. (1972). Attitudes and normative beliefs as factors influencing behavioral intentions. Journal of Personality and Social Psychology, 21(1), 1.CrossRef
go back to reference Alder, S. (2001). Employee reactions to electronic performance monitoring. Journal of High Technology Management Research, 12, 323–342.CrossRef Alder, S. (2001). Employee reactions to electronic performance monitoring. Journal of High Technology Management Research, 12, 323–342.CrossRef
go back to reference Alder, S., & Ambrose, M. (2005). Toward understanding fairness judgements associated with computer performance monitoring: an integration of the feedback, justice, and monitoring research. Human Resource Management Review, 15, 43–67.CrossRef Alder, S., & Ambrose, M. (2005). Toward understanding fairness judgements associated with computer performance monitoring: an integration of the feedback, justice, and monitoring research. Human Resource Management Review, 15, 43–67.CrossRef
go back to reference Alge, B. J. (2001). Effects of computer surveillance on perceptions of privacy and procedural justice. Journal of Applied Psychology, 86(4), 797–804.CrossRef Alge, B. J. (2001). Effects of computer surveillance on perceptions of privacy and procedural justice. Journal of Applied Psychology, 86(4), 797–804.CrossRef
go back to reference Alhussain, T., & Drew, S. (2012). Employees’ perceptions of biometric technology adoption in e-government: An exploratory study in the kingdom of Saudi Arabia. In E-adoption and technologies for empowering developing countries: Global advances (p. 129). Hershey: Information Science Reference.CrossRef Alhussain, T., & Drew, S. (2012). Employees’ perceptions of biometric technology adoption in e-government: An exploratory study in the kingdom of Saudi Arabia. In E-adoption and technologies for empowering developing countries: Global advances (p. 129). Hershey: Information Science Reference.CrossRef
go back to reference Ambrose, M., Alder, S., & Noel, T. (1998). Electronic performance monitoring: A consideration of rights. In M. Schminke (Ed.), Managerial ethics: Moral management of people and processes. Mahwah: Lawrence Erlbaum Associates. Ambrose, M., Alder, S., & Noel, T. (1998). Electronic performance monitoring: A consideration of rights. In M. Schminke (Ed.), Managerial ethics: Moral management of people and processes. Mahwah: Lawrence Erlbaum Associates.
go back to reference Anandarajan, M., D’ovidio, R., & Jenkins, A. (2013). Safeguarding consumers against identity-related fraud: examining data breach notification legislation through the lens of routine activities theory. International Data Privacy Law, 3(1), 51.CrossRef Anandarajan, M., D’ovidio, R., & Jenkins, A. (2013). Safeguarding consumers against identity-related fraud: examining data breach notification legislation through the lens of routine activities theory. International Data Privacy Law, 3(1), 51.CrossRef
go back to reference Ball, K., Daniel, E. M., & Stride, C. (2012). Dimensions of employee privacy: An empirical study. Information Technology & People, 25(4), 376–394.CrossRef Ball, K., Daniel, E. M., & Stride, C. (2012). Dimensions of employee privacy: An empirical study. Information Technology & People, 25(4), 376–394.CrossRef
go back to reference Barbanell, J. (2015). Needing a new approach to address employee data breaches in the american workplace. Journal of Law and Cyber Warfare, 4(3). Barbanell, J. (2015). Needing a new approach to address employee data breaches in the american workplace. Journal of Law and Cyber Warfare, 4(3).
go back to reference Beeler, J. D., & Hunton, J. E. (1997). The influence of compensation method and disclosure level on information search strategy and escalation of commitment. Journal of Behavioral Decision Making, 10(2), 77–91.CrossRef Beeler, J. D., & Hunton, J. E. (1997). The influence of compensation method and disclosure level on information search strategy and escalation of commitment. Journal of Behavioral Decision Making, 10(2), 77–91.CrossRef
go back to reference Bélanger, F., & Crossler, R. E. (2011). Privacy in the digital age: A review of information privacy research in information systems. MIS Quarterly, 35(4), 1017–1042.CrossRef Bélanger, F., & Crossler, R. E. (2011). Privacy in the digital age: A review of information privacy research in information systems. MIS Quarterly, 35(4), 1017–1042.CrossRef
go back to reference Bollen, K., & Lennox, R. (1991). Conventional wisdom on measurement: A structural equation model perspective. Psychological Bulletin, 110, 305–314.CrossRef Bollen, K., & Lennox, R. (1991). Conventional wisdom on measurement: A structural equation model perspective. Psychological Bulletin, 110, 305–314.CrossRef
go back to reference Bond, R., & Smith, P. B. (1996). Culture and conformity: A meta-analysis of studies using Asch’s (1952b, 1956) line judgment task. Psychological Bulletin, 119(1), 111.CrossRef Bond, R., & Smith, P. B. (1996). Culture and conformity: A meta-analysis of studies using Asch’s (1952b, 1956) line judgment task. Psychological Bulletin, 119(1), 111.CrossRef
go back to reference Bonett, D. G., & Wright, T. A. (2015). Cronbach’s alpha reliability: Interval estimation, hypothesis testing, and sample size planning. Journal of Organizational Behavior, 36(1), 3–15.CrossRef Bonett, D. G., & Wright, T. A. (2015). Cronbach’s alpha reliability: Interval estimation, hypothesis testing, and sample size planning. Journal of Organizational Behavior, 36(1), 3–15.CrossRef
go back to reference Brandimarte, L., Acquisti, A., & Loewenstein, G. (2010). Misplaced Confidences: Privacy and the Control Paradox. Paper Presented at the Ninth Workshop on the Economics of Information Security (Weis 2010), Harvard University. Brandimarte, L., Acquisti, A., & Loewenstein, G. (2010). Misplaced Confidences: Privacy and the Control Paradox. Paper Presented at the Ninth Workshop on the Economics of Information Security (Weis 2010), Harvard University.
go back to reference Brockner, J., De Cremer, D., Van Den Bos, K., & Chen, Y.-R. (2005). The influence of interdependent self-construal on procedural fairness effects. Organizational Behavior and Human Decision Processes, 96(2), 155–167.CrossRef Brockner, J., De Cremer, D., Van Den Bos, K., & Chen, Y.-R. (2005). The influence of interdependent self-construal on procedural fairness effects. Organizational Behavior and Human Decision Processes, 96(2), 155–167.CrossRef
go back to reference Bulgurcu, B., Cavusoglu, H., & Benbasat, I. (2010a). Information security policy compliance: an empirical study of rationality-based beliefs and information security awareness. MIS Quarterly, 34(3), 523–548.CrossRef Bulgurcu, B., Cavusoglu, H., & Benbasat, I. (2010a). Information security policy compliance: an empirical study of rationality-based beliefs and information security awareness. MIS Quarterly, 34(3), 523–548.CrossRef
go back to reference Bulgurcu, B., Cavusoglu, H., & Benbasat, I. (2010b). Understanding Emergence and Outcomes of Information Privacy Concerns: A Case of Facebook. Paper Presented at the ICIS. Bulgurcu, B., Cavusoglu, H., & Benbasat, I. (2010b). Understanding Emergence and Outcomes of Information Privacy Concerns: A Case of Facebook. Paper Presented at the ICIS.
go back to reference Carpenter, D. (2011). The impact of user privacy concerns and ethnic cultural values on attitudes toward the use of biometric technology. Proquest. Carpenter, D. (2011). The impact of user privacy concerns and ethnic cultural values on attitudes toward the use of biometric technology. Proquest.
go back to reference Chau, P. Y. K. (1996). An empirical assessment of a modified technology acceptance model. Journal of Management Information Systems, 13(2), 185–204.CrossRef Chau, P. Y. K. (1996). An empirical assessment of a modified technology acceptance model. Journal of Management Information Systems, 13(2), 185–204.CrossRef
go back to reference Chen, R., & Sharma, S. K. (2013). Self-disclosure at social networking sites: An exploration through relational capitals. Information Systems Frontiers, 15(2), 269–278.CrossRef Chen, R., & Sharma, S. K. (2013). Self-disclosure at social networking sites: An exploration through relational capitals. Information Systems Frontiers, 15(2), 269–278.CrossRef
go back to reference Chen, J. V., Yen, D. C., Pornpriphet, W., & Widjaja, A. E. (2015). E-commerce web site loyalty: A cross cultural comparison. Information Systems Frontiers, 17(6), 1283–1299.CrossRef Chen, J. V., Yen, D. C., Pornpriphet, W., & Widjaja, A. E. (2015). E-commerce web site loyalty: A cross cultural comparison. Information Systems Frontiers, 17(6), 1283–1299.CrossRef
go back to reference Chin, W. W. (1998). Issues and opinion on structural equation modeling. Management Information Systems Quarterly, 22(1), 7–16. Chin, W. W. (1998). Issues and opinion on structural equation modeling. Management Information Systems Quarterly, 22(1), 7–16.
go back to reference Chin, W. W., Marcolin, B. L., & Newsted, P. R. (2003). A partial least squares latent variable modeling approach for measuring interaction effects: Results from a Monte Carlo simulation study and an electronic-mail emotion/adoption study. Information Systems Research, 14(2), 189–217.CrossRef Chin, W. W., Marcolin, B. L., & Newsted, P. R. (2003). A partial least squares latent variable modeling approach for measuring interaction effects: Results from a Monte Carlo simulation study and an electronic-mail emotion/adoption study. Information Systems Research, 14(2), 189–217.CrossRef
go back to reference Cortina, J. M. (1993). What is coefficient alpha? An examination of theory and applications. Journal of Applied Psychology, 78(1), 98–104.CrossRef Cortina, J. M. (1993). What is coefficient alpha? An examination of theory and applications. Journal of Applied Psychology, 78(1), 98–104.CrossRef
go back to reference Cronbach, L. J. (1951). Coefficient alpha and the internal structure of tests. Psychometrika, 16(3), 297–334.CrossRef Cronbach, L. J. (1951). Coefficient alpha and the internal structure of tests. Psychometrika, 16(3), 297–334.CrossRef
go back to reference Culnan, M. J., & Armstrong, P. K. (1999). Information privacy concerns, procedural fairness, and impersonal trust: An empirical investigation. Organization Science, 10(1), 104–115.CrossRef Culnan, M. J., & Armstrong, P. K. (1999). Information privacy concerns, procedural fairness, and impersonal trust: An empirical investigation. Organization Science, 10(1), 104–115.CrossRef
go back to reference Davis, F. D. (1986). A technology acceptance model for empirically testing new end-user information systems: Theory and results. (Doctoral), Massachusetts Institute of Technology, Boston. Davis, F. D. (1986). A technology acceptance model for empirically testing new end-user information systems: Theory and results. (Doctoral), Massachusetts Institute of Technology, Boston.
go back to reference Davis, F. D. (1989). Perceived usefulness, perceived ease of use, and user acceptance of information technology. MIS Quarterly, 13(3), 319–340.CrossRef Davis, F. D. (1989). Perceived usefulness, perceived ease of use, and user acceptance of information technology. MIS Quarterly, 13(3), 319–340.CrossRef
go back to reference Dinev, T., & Hart, P. (2006). An extended privacy calculus model for e-commerce transactions. Information Systems Research, 17(1), 61–80.CrossRef Dinev, T., & Hart, P. (2006). An extended privacy calculus model for e-commerce transactions. Information Systems Research, 17(1), 61–80.CrossRef
go back to reference Dinnel, D. L., Kleinknecht, R. A., & Tanaka-Matsumi, J. (2002). A cross-cultural comparison of social phobia symptoms. Journal of Psychopathology and Behavioral Assessment, 24(2), 75–84.CrossRef Dinnel, D. L., Kleinknecht, R. A., & Tanaka-Matsumi, J. (2002). A cross-cultural comparison of social phobia symptoms. Journal of Psychopathology and Behavioral Assessment, 24(2), 75–84.CrossRef
go back to reference Dwyer, C. (2007). Digital Relationships in the “Myspace” Generation: Results from a Qualitative Study. Paper Presented at the Proceedings of the 40th Annual Hawaii International Conference on System Sciences. Dwyer, C. (2007). Digital Relationships in the “Myspace” Generation: Results from a Qualitative Study. Paper Presented at the Proceedings of the 40th Annual Hawaii International Conference on System Sciences.
go back to reference Dwyer, C., Hiltz, S., & Passerini, K. (2007). Trust and Privacy Concern Within Social Networking Sites: A Comparison of Facebook and Myspace. Paper Presented at the Proceedings of the Thirteenth Americas Conference on Information Systems, Keystone, Colorado. Dwyer, C., Hiltz, S., & Passerini, K. (2007). Trust and Privacy Concern Within Social Networking Sites: A Comparison of Facebook and Myspace. Paper Presented at the Proceedings of the Thirteenth Americas Conference on Information Systems, Keystone, Colorado.
go back to reference Eddy, E. R., Stone, D. L., & Stone-Romero, E. F. (1999). The effects of information management policies on reactions to human resource information systems: An integration of privacy and procedural justice perspectives. Personnel Psychology, 52, 335–358.CrossRef Eddy, E. R., Stone, D. L., & Stone-Romero, E. F. (1999). The effects of information management policies on reactions to human resource information systems: An integration of privacy and procedural justice perspectives. Personnel Psychology, 52, 335–358.CrossRef
go back to reference Elgarah, W., & Falaleeva, N. (2005). Adoption of Biometric Technology: Information Privacy in TAM. AMCIS 2005 Proceedings, 222. Elgarah, W., & Falaleeva, N. (2005). Adoption of Biometric Technology: Information Privacy in TAM. AMCIS 2005 Proceedings, 222.
go back to reference Fishbien, M., & Azjen, I. (1975). Belief, attitude, intention and behavior: An introduction to theory and research. Reading: Addison-Wesley. Fishbien, M., & Azjen, I. (1975). Belief, attitude, intention and behavior: An introduction to theory and research. Reading: Addison-Wesley.
go back to reference Friedman, B. A., & Reed, L. J. (2007). Workplace privacy: Employee relations and legal implications of monitoring employee e-mail use. Employee Responsibilities and Rights Journal, 19(2), 75–83.CrossRef Friedman, B. A., & Reed, L. J. (2007). Workplace privacy: Employee relations and legal implications of monitoring employee e-mail use. Employee Responsibilities and Rights Journal, 19(2), 75–83.CrossRef
go back to reference Fusilier, M. R., & Hoyer, W. D. (1980). Variables affecting perceptions of invasion of privacy in a personnel selection situation. Journal of Applied Psychology, 65(5), 623.CrossRef Fusilier, M. R., & Hoyer, W. D. (1980). Variables affecting perceptions of invasion of privacy in a personnel selection situation. Journal of Applied Psychology, 65(5), 623.CrossRef
go back to reference Gefen, D., & Straub, D. (2005). A practical guide to factorial validity using PLS-graph: Tutorial and annotated example. Communications of the Association for Information Systems, 16, 91–109. Gefen, D., & Straub, D. (2005). A practical guide to factorial validity using PLS-graph: Tutorial and annotated example. Communications of the Association for Information Systems, 16, 91–109.
go back to reference Gefen, D., Straub, D., & Boudreau, M.-C. (2000). Structural equation modeling and regression: Guidelines for research practice. Communications of the Association for Information Systems, 4(1), 7. Gefen, D., Straub, D., & Boudreau, M.-C. (2000). Structural equation modeling and regression: Guidelines for research practice. Communications of the Association for Information Systems, 4(1), 7.
go back to reference Gefen, D., Karahanna, E., & Straub, D. (2003). Trust and tam in online shopping: An integrated model. MIS Quarterly, 27(1), 51–90.CrossRef Gefen, D., Karahanna, E., & Straub, D. (2003). Trust and tam in online shopping: An integrated model. MIS Quarterly, 27(1), 51–90.CrossRef
go back to reference Grant, R. A., Higgins, C. A., & Irving, R. H. (1988). Computerized performance monitors: Are they costing you customers? MIT Sloan Management Review, 29(3), 39. Grant, R. A., Higgins, C. A., & Irving, R. H. (1988). Computerized performance monitors: Are they costing you customers? MIT Sloan Management Review, 29(3), 39.
go back to reference Greenaway, K. E., & Chan, Y. E. (2005). Theoretical explanations for firms’ information privacy behaviors. Journal of the Association for Information Systems, 6(6), 171–198.CrossRef Greenaway, K. E., & Chan, Y. E. (2005). Theoretical explanations for firms’ information privacy behaviors. Journal of the Association for Information Systems, 6(6), 171–198.CrossRef
go back to reference Gudykunst, W. B., Matsumoto, Y., Ting‐Toomey, S., Nishida, T., Kim, K., & Heyman, S. (1996). The influence of cultural individualism-collectivism, self construals, and individual values on communication styles across cultures. Human Communication Research, 22(4), 510–543.CrossRef Gudykunst, W. B., Matsumoto, Y., Ting‐Toomey, S., Nishida, T., Kim, K., & Heyman, S. (1996). The influence of cultural individualism-collectivism, self construals, and individual values on communication styles across cultures. Human Communication Research, 22(4), 510–543.CrossRef
go back to reference Haenlein, M., & Kaplan, A. (2004). A beginner’s guide to partial least squares analysis. Understanding Statistics, 3(4), 283–297.CrossRef Haenlein, M., & Kaplan, A. (2004). A beginner’s guide to partial least squares analysis. Understanding Statistics, 3(4), 283–297.CrossRef
go back to reference Hann, I., Hui, K. L., Lee, T., & Png, I. (2002). Online information privacy: Measuring the cost-benefit trade-off. Paper presented at the twenty-third international conference on information systems, Barcelona. Hann, I., Hui, K. L., Lee, T., & Png, I. (2002). Online information privacy: Measuring the cost-benefit trade-off. Paper presented at the twenty-third international conference on information systems, Barcelona.
go back to reference Hann, I., Hui, K., Lee, S.-Y. T., & Png, I. (2007). Overcoming online information privacy concerns: An information-processing approach. Journal of Management Information Systems, 24(2), 13–42.CrossRef Hann, I., Hui, K., Lee, S.-Y. T., & Png, I. (2007). Overcoming online information privacy concerns: An information-processing approach. Journal of Management Information Systems, 24(2), 13–42.CrossRef
go back to reference Hoffman, D., Novak, T., & Peralta, M. (1999). Information privacy in the marketspace: Implications for the commercial uses of anonymity on the web. The Information Society, 15(2), 129–139.CrossRef Hoffman, D., Novak, T., & Peralta, M. (1999). Information privacy in the marketspace: Implications for the commercial uses of anonymity on the web. The Information Society, 15(2), 129–139.CrossRef
go back to reference Hofstede, G. (1984). Culture’s consequences: International differences in work-related values (Vol. 5). Newbury Park: Sage. Hofstede, G. (1984). Culture’s consequences: International differences in work-related values (Vol. 5). Newbury Park: Sage.
go back to reference Hofstede, G. (2001). Culture’ consequences: Comparing values, behaviors, institutions, and organizations across nations (2nd ed.). Thousand Oaks: Sage Publications. Hofstede, G. (2001). Culture’ consequences: Comparing values, behaviors, institutions, and organizations across nations (2nd ed.). Thousand Oaks: Sage Publications.
go back to reference Hovorka-Mead, A. D., Ross, W. H., Jr., Whipple, T., & Brenchin, M. B. (2002). Watching the detectives: Seasonal student employee reactions to electronic monitoring with and without advance notification. Personnel Psychology, 55(2), 329.CrossRef Hovorka-Mead, A. D., Ross, W. H., Jr., Whipple, T., & Brenchin, M. B. (2002). Watching the detectives: Seasonal student employee reactions to electronic monitoring with and without advance notification. Personnel Psychology, 55(2), 329.CrossRef
go back to reference Hui, K., Teo, H., & Lee, S.-Y. T. (2007). The value of privacy assurance: An exploratory field experiment. MIS Quarterly, 31(1), 19–33.CrossRef Hui, K., Teo, H., & Lee, S.-Y. T. (2007). The value of privacy assurance: An exploratory field experiment. MIS Quarterly, 31(1), 19–33.CrossRef
go back to reference Jain, A. K., & Kumar, A. (2010). Biometrics of next generation: An overview. Second Generation Biometrics, 12(1), 2–3. Jain, A. K., & Kumar, A. (2010). Biometrics of next generation: An overview. Second Generation Biometrics, 12(1), 2–3.
go back to reference Jain, A. K., Ross, A., & Pankanti, S. (2006). Biometrics: A tool for information security. IEEE Transactions on Information Forensics and Security, 1(2), 125–143.CrossRef Jain, A. K., Ross, A., & Pankanti, S. (2006). Biometrics: A tool for information security. IEEE Transactions on Information Forensics and Security, 1(2), 125–143.CrossRef
go back to reference Jarvenpaa, S. L., Tractinsky, N., & Vitale, M. (2000). Consumer trust in an internet store. Information Technology and Management, 1, 45–71.CrossRef Jarvenpaa, S. L., Tractinsky, N., & Vitale, M. (2000). Consumer trust in an internet store. Information Technology and Management, 1, 45–71.CrossRef
go back to reference Jennings, M. M. (2006). Why do smart businesspeople do ethically dumb things? Corporate Finance Review, 11(3), 38. Jennings, M. M. (2006). Why do smart businesspeople do ethically dumb things? Corporate Finance Review, 11(3), 38.
go back to reference Jones, L., Anton, A., & Earp, J. (2007). Toward Understanding User Perceptions of Authentication Technologies. Paper Presented at the Proceedings of the 2007 ACM Workshop on Privacy in Electronic Society, Alexandria, VA. Jones, L., Anton, A., & Earp, J. (2007). Toward Understanding User Perceptions of Authentication Technologies. Paper Presented at the Proceedings of the 2007 ACM Workshop on Privacy in Electronic Society, Alexandria, VA.
go back to reference Josang, A., Ismail, R., & Boyd, C. (2007). A survey of trust and reputation systems for online service provision. Decision Support Systems, 43, 618–644.CrossRef Josang, A., Ismail, R., & Boyd, C. (2007). A survey of trust and reputation systems for online service provision. Decision Support Systems, 43, 618–644.CrossRef
go back to reference Kaplowitz, M., Hadlock, T., & Levine, R. (2004). A comparison of web and mail survey response rates. Public Opinion Quarterly, 68(1), 94–101.CrossRef Kaplowitz, M., Hadlock, T., & Levine, R. (2004). A comparison of web and mail survey response rates. Public Opinion Quarterly, 68(1), 94–101.CrossRef
go back to reference Lapointe, L., & Rivard, S. (2005). A multilevel model of resistance to information technology implementation. MIS Quarterly, 29(3), 461–491.CrossRef Lapointe, L., & Rivard, S. (2005). A multilevel model of resistance to information technology implementation. MIS Quarterly, 29(3), 461–491.CrossRef
go back to reference Lee, M., & Turban, E. (2001). A trust model for consumer internet shopping. International Journal of Electronic Commerce, 6(1), 75–91.CrossRef Lee, M., & Turban, E. (2001). A trust model for consumer internet shopping. International Journal of Electronic Commerce, 6(1), 75–91.CrossRef
go back to reference Lee, J., Lee, J.-N., & Tan, B. C. (2015). Antecedents of cognitive trust and affective distrust and their mediating roles in building customer loyalty. Information Systems Frontiers, 17(1), 159–175.CrossRef Lee, J., Lee, J.-N., & Tan, B. C. (2015). Antecedents of cognitive trust and affective distrust and their mediating roles in building customer loyalty. Information Systems Frontiers, 17(1), 159–175.CrossRef
go back to reference Liu, C., & Arnett, K. P. (2000). Exploring the factors associated with web site success in the context of electronic commerce. Information & Management, 38(1), 23–33.CrossRef Liu, C., & Arnett, K. P. (2000). Exploring the factors associated with web site success in the context of electronic commerce. Information & Management, 38(1), 23–33.CrossRef
go back to reference Liu, C., Marchewka, J., & Ku, C. (2004). American and Taiwanese perceptions concerning privacy, trust, and behavioral intentions in electronic commerce. Journal of Global Information Management, 12(1), 18–40.CrossRef Liu, C., Marchewka, J., & Ku, C. (2004). American and Taiwanese perceptions concerning privacy, trust, and behavioral intentions in electronic commerce. Journal of Global Information Management, 12(1), 18–40.CrossRef
go back to reference Liu, C., Marchewka, J., Lu, J., & Yu, C. S. (2005). Beyond concern—a privacy-trust-behavioral intention model of electronic commerce. Information & Management, 42, 289–304.CrossRef Liu, C., Marchewka, J., Lu, J., & Yu, C. S. (2005). Beyond concern—a privacy-trust-behavioral intention model of electronic commerce. Information & Management, 42, 289–304.CrossRef
go back to reference Malhotra, N., Kim, S., & Agarwal, J. (2004). Internet users’ information privacy concerns IUIPC: The contruct, the scale, and a causal model. Information Systems Research, 15(4), 336–355.CrossRef Malhotra, N., Kim, S., & Agarwal, J. (2004). Internet users’ information privacy concerns IUIPC: The contruct, the scale, and a causal model. Information Systems Research, 15(4), 336–355.CrossRef
go back to reference Mandel, N. (2003). Shifting selves and decision making: The effects of self-construal priming on consumer risk-taking. Journal of Consumer Research, 30(1), 30–40.CrossRef Mandel, N. (2003). Shifting selves and decision making: The effects of self-construal priming on consumer risk-taking. Journal of Consumer Research, 30(1), 30–40.CrossRef
go back to reference Marakas, G., Johnson, R., & Clay, P. F. (2007). The evolving nature of the computer self-efficacy construct: An empirical investigation of measurement construction, validity, reliability and stability over time. Journal of the Association for Information Systems, 8(1), 15.CrossRef Marakas, G., Johnson, R., & Clay, P. F. (2007). The evolving nature of the computer self-efficacy construct: An empirical investigation of measurement construction, validity, reliability and stability over time. Journal of the Association for Information Systems, 8(1), 15.CrossRef
go back to reference Marcoulides, G. A., & Saunders, C. (2006). PLS: A silver bullet? MIS Quarterly, 30(2), 3–9.CrossRef Marcoulides, G. A., & Saunders, C. (2006). PLS: A silver bullet? MIS Quarterly, 30(2), 3–9.CrossRef
go back to reference Markus, H. R., & Kitayama, S. (1991). Culture and the self: Implications for cognition, emotion, and motivation. Psychological Review, 98(2), 224.CrossRef Markus, H. R., & Kitayama, S. (1991). Culture and the self: Implications for cognition, emotion, and motivation. Psychological Review, 98(2), 224.CrossRef
go back to reference Mcknight, D., Choudhury, V., & Kacmar, C. (2002). Developing and validating trust measures for e-commerce: An integrative typology. Information Systems Research, 13(3), 334–359.CrossRef Mcknight, D., Choudhury, V., & Kacmar, C. (2002). Developing and validating trust measures for e-commerce: An integrative typology. Information Systems Research, 13(3), 334–359.CrossRef
go back to reference Milberg, S. J., Smith, H. J., & Burke, S. J. (2000). Information privacy: Corporate management and national regulation. Organization Science, 11(1), 35–57.CrossRef Milberg, S. J., Smith, H. J., & Burke, S. J. (2000). Information privacy: Corporate management and national regulation. Organization Science, 11(1), 35–57.CrossRef
go back to reference Nov, O., & Wattal, S. (2009). Social computing privacy concerns: antecedents and effects. Proceedings of the SIGCHI conference on human factors in computing systems, ACM, 333–336. Nov, O., & Wattal, S. (2009). Social computing privacy concerns: antecedents and effects. Proceedings of the SIGCHI conference on human factors in computing systems, ACM, 333–336.
go back to reference Oyserman, D., Coon, H. M., & Kemmelmeier, M. (2002a). Rethinking individualism and collectivism: Evaluation of theoretical assumptions and meta-analyses. Psychological Bulletin, 128(1), 3.CrossRef Oyserman, D., Coon, H. M., & Kemmelmeier, M. (2002a). Rethinking individualism and collectivism: Evaluation of theoretical assumptions and meta-analyses. Psychological Bulletin, 128(1), 3.CrossRef
go back to reference Oyserman, D., Coon, H. M., & Kemmelmeier, M. (2002b). Rethinking inividualism and collectivism: Evaluation of theoretical assumptions and meta-analyses. Psychological Bulletin, 128(1), 3–72.CrossRef Oyserman, D., Coon, H. M., & Kemmelmeier, M. (2002b). Rethinking inividualism and collectivism: Evaluation of theoretical assumptions and meta-analyses. Psychological Bulletin, 128(1), 3–72.CrossRef
go back to reference Oz, E., Glass, R., & Behling, R. (1999). Electronic workplace monitoring: What employees think. Omega, 27(2), 167–177.CrossRef Oz, E., Glass, R., & Behling, R. (1999). Electronic workplace monitoring: What employees think. Omega, 27(2), 167–177.CrossRef
go back to reference Pato, J. N., Millett, L. I., & Whither Biometrics Committee. (2010). Biometric recognition: Challenges and opportunities. Washington DC: National Academies Press. Pato, J. N., Millett, L. I., & Whither Biometrics Committee. (2010). Biometric recognition: Challenges and opportunities. Washington DC: National Academies Press.
go back to reference Polyorat, K., Alden, D. L., & Alden, D. L. (2005). Self-construal and need-for-cognition effects on brand attitudes and purchase intentions in response to comparative advertising in Thailand and the United States. Journal of Advertising, 34(1), 37–48.CrossRef Polyorat, K., Alden, D. L., & Alden, D. L. (2005). Self-construal and need-for-cognition effects on brand attitudes and purchase intentions in response to comparative advertising in Thailand and the United States. Journal of Advertising, 34(1), 37–48.CrossRef
go back to reference Prabhakar, S., Pankanti, S., & Jain, A. K. (2003). Biometric recognition: Security and privacy concerns. IEEE Security and Privacy, 1(2), 33–42.CrossRef Prabhakar, S., Pankanti, S., & Jain, A. K. (2003). Biometric recognition: Security and privacy concerns. IEEE Security and Privacy, 1(2), 33–42.CrossRef
go back to reference Reay, I., Beatty, P., Dick, S., & Miller, J. (2013). Privacy policies and national culture on the internet. Information Systems Frontiers, 15(2), 279–292.CrossRef Reay, I., Beatty, P., Dick, S., & Miller, J. (2013). Privacy policies and national culture on the internet. Information Systems Frontiers, 15(2), 279–292.CrossRef
go back to reference Roca, J., García, J., & De La Vega, J. (2009). The importance of perceived trust, security and privacy in online trading systems. Information Management & Computer Security, 17(2), 96–113. Roca, J., García, J., & De La Vega, J. (2009). The importance of perceived trust, security and privacy in online trading systems. Information Management & Computer Security, 17(2), 96–113.
go back to reference Salvagnini, P., Bazzani, L., Cristani, M., & Murino, V. (2013). Person re-identification with a ptz camera: an introductory study. 20th IEEE International Conference on Image Processing (ICIP), 2013. Salvagnini, P., Bazzani, L., Cristani, M., & Murino, V. (2013). Person re-identification with a ptz camera: an introductory study. 20th IEEE International Conference on Image Processing (ICIP), 2013.
go back to reference Schumann, A., & Monari, E. (2014). A soft-biometrics dataset for person tracking and re-identification. 11th IEEE International Conference on Advanced Video and Signal Based Surveillance (AVSS), 2014. Schumann, A., & Monari, E. (2014). A soft-biometrics dataset for person tracking and re-identification. 11th IEEE International Conference on Advanced Video and Signal Based Surveillance (AVSS), 2014.
go back to reference Sharma, P., Chrisman, J. J., & Chua, J. H. (2003). Succession planning as planned behavior: Some empirical results. Family Business Review, 16(1), 1–15.CrossRef Sharma, P., Chrisman, J. J., & Chua, J. H. (2003). Succession planning as planned behavior: Some empirical results. Family Business Review, 16(1), 1–15.CrossRef
go back to reference Sheehan, K. B. (1999). An investigation of gender differences in on-line privacy concerns and resultant behaviors. Journal of Interactive Marketing, 13(4), 24–38.CrossRef Sheehan, K. B. (1999). An investigation of gender differences in on-line privacy concerns and resultant behaviors. Journal of Interactive Marketing, 13(4), 24–38.CrossRef
go back to reference Singelis, T. M. (1994). The measurement of independent and interdependent self-construals. Personality and Social Psychology Bulletin, 20(5), 580–591.CrossRef Singelis, T. M. (1994). The measurement of independent and interdependent self-construals. Personality and Social Psychology Bulletin, 20(5), 580–591.CrossRef
go back to reference Singelis, T. M., Triandis, H. C., Bhawuk, D. P. S., & Gelfand, M. J. (1995). Horizontal and vertical dimensions of individualism and collectivism: A theoretical and measurement refinement. Cross-Cultural Research, 29(3), 240–275.CrossRef Singelis, T. M., Triandis, H. C., Bhawuk, D. P. S., & Gelfand, M. J. (1995). Horizontal and vertical dimensions of individualism and collectivism: A theoretical and measurement refinement. Cross-Cultural Research, 29(3), 240–275.CrossRef
go back to reference Singelis, T. M., Bond, M. H., Sharkey, W. F., & Lai, C. S. Y. (1999). Unpackaging culture’s influence on self-esteem and embarrassability the role of self-construals. Journal of Cross-Cultural Psychology, 30(3), 315–341.CrossRef Singelis, T. M., Bond, M. H., Sharkey, W. F., & Lai, C. S. Y. (1999). Unpackaging culture’s influence on self-esteem and embarrassability the role of self-construals. Journal of Cross-Cultural Psychology, 30(3), 315–341.CrossRef
go back to reference Smith, H., Milberg, S., & Burke, S. (1996). Information privacy: Measuring individual’s concerns about organizational practices. MIS Quarterly, 20(2), 167–196.CrossRef Smith, H., Milberg, S., & Burke, S. (1996). Information privacy: Measuring individual’s concerns about organizational practices. MIS Quarterly, 20(2), 167–196.CrossRef
go back to reference Smith, H. J., Dinev, T., & Xu, H. (2011). Information privacy research: An interdisciplinary review. MIS Quarterly, 35(4), 989–1016.CrossRef Smith, H. J., Dinev, T., & Xu, H. (2011). Information privacy research: An interdisciplinary review. MIS Quarterly, 35(4), 989–1016.CrossRef
go back to reference Spitzmüller, C., & Stanton, J. M. (2006). Examining employee compliance with organizational surveillance and monitoring. Journal of Occupational and Organizational Psychology, 79(2), 245–272.CrossRef Spitzmüller, C., & Stanton, J. M. (2006). Examining employee compliance with organizational surveillance and monitoring. Journal of Occupational and Organizational Psychology, 79(2), 245–272.CrossRef
go back to reference Stanton, J. M., & Weiss, E. (2000). Electronic monitoring in their own words: An exploratory study of employees’ experiences with new types of surveillance. Computers in Human Behavior, 16(4), 423–440.CrossRef Stanton, J. M., & Weiss, E. (2000). Electronic monitoring in their own words: An exploratory study of employees’ experiences with new types of surveillance. Computers in Human Behavior, 16(4), 423–440.CrossRef
go back to reference Stewart, K. A., & Segars, A. H. (2002). An empirical examination of the concern for information privacy instrument. Information Systems Research, 13(1), 36–49.CrossRef Stewart, K. A., & Segars, A. H. (2002). An empirical examination of the concern for information privacy instrument. Information Systems Research, 13(1), 36–49.CrossRef
go back to reference Stone, E. F., & Stone, D. L. (1990). Privacy in organizations: Theoretical issues, research findings, and protection mechanisms. Research in Personnel and Human Resources Management, 8, 349–411. Stone, E. F., & Stone, D. L. (1990). Privacy in organizations: Theoretical issues, research findings, and protection mechanisms. Research in Personnel and Human Resources Management, 8, 349–411.
go back to reference Stone, D. L., & Stone-Romero, E. F. (1998). A multiple stakeholder model of privacy in organizations. In M. Schminke (Ed.), Managerial ethics: Moral management of people and processes (pp. 35–59). Mahwah: Lawrence Erlbaum. Stone, D. L., & Stone-Romero, E. F. (1998). A multiple stakeholder model of privacy in organizations. In M. Schminke (Ed.), Managerial ethics: Moral management of people and processes (pp. 35–59). Mahwah: Lawrence Erlbaum.
go back to reference Stone-Romero, E. F., Gueutal, H. G., Gardner, D. G., & Mcclure, S. (1983). A field experiment comparing information-privacy values, beliefs, and attitudes across several types of organizations. Journal of Applied Psychology, 68(3), 459–468.CrossRef Stone-Romero, E. F., Gueutal, H. G., Gardner, D. G., & Mcclure, S. (1983). A field experiment comparing information-privacy values, beliefs, and attitudes across several types of organizations. Journal of Applied Psychology, 68(3), 459–468.CrossRef
go back to reference Sun, Y., & Upadhyaya, S. (2015). Secure and privacy preserving data processing support for active authentication. Information Systems Frontiers, 17(5), 1007–1015.CrossRef Sun, Y., & Upadhyaya, S. (2015). Secure and privacy preserving data processing support for active authentication. Information Systems Frontiers, 17(5), 1007–1015.CrossRef
go back to reference Swaminathan, V., Page, K. L., & Gürhan-Canli, Z. (2007). “My” brand or “our” brand: The effects of brand relationship dimensions and self-construal on brand evaluations. Journal of Consumer Research, 34(2), 248–259.CrossRef Swaminathan, V., Page, K. L., & Gürhan-Canli, Z. (2007). “My” brand or “our” brand: The effects of brand relationship dimensions and self-construal on brand evaluations. Journal of Consumer Research, 34(2), 248–259.CrossRef
go back to reference Taylor, S., & Todd, P. (1995). Decomposition and crossover effects in the theory of planned behavior: A study of consumer adoption intentions. International Journal of Research in Marketing, 12(2), 137–155.CrossRef Taylor, S., & Todd, P. (1995). Decomposition and crossover effects in the theory of planned behavior: A study of consumer adoption intentions. International Journal of Research in Marketing, 12(2), 137–155.CrossRef
go back to reference Tolchinsky, P. D., Mccuddy, M. K., Adams, J., Ganster, D. C., Woodman, R. W., & Fromkin, H. L. (1981). Employee perceptions of invasion of privacy: A field simulation experiment. Journal of Applied Psychology, 66(3), 308.CrossRef Tolchinsky, P. D., Mccuddy, M. K., Adams, J., Ganster, D. C., Woodman, R. W., & Fromkin, H. L. (1981). Employee perceptions of invasion of privacy: A field simulation experiment. Journal of Applied Psychology, 66(3), 308.CrossRef
go back to reference Triandis, H. C. (1995). Individualism and collectivism. Boulder: Westview Press. Triandis, H. C. (1995). Individualism and collectivism. Boulder: Westview Press.
go back to reference Triandis, H. C., & Gelfand, M. J. (1998). Converging measurement of horizontal and vertical individualism and collectivism. Journal of Personality and Social Psychology, 74(1), 118–128.CrossRef Triandis, H. C., & Gelfand, M. J. (1998). Converging measurement of horizontal and vertical individualism and collectivism. Journal of Personality and Social Psychology, 74(1), 118–128.CrossRef
go back to reference Urbaczewski, A., & Jessup, L. M. (2002). Does electronic monitoring of employee internet usage work? Communications of the ACM, 45(1), 80–83.CrossRef Urbaczewski, A., & Jessup, L. M. (2002). Does electronic monitoring of employee internet usage work? Communications of the ACM, 45(1), 80–83.CrossRef
go back to reference Venkatesh, V., & Bala, H. (2008). Technology acceptance model 3 and a research agenda on interventions. Decision Sciences, 39(2), 273–315.CrossRef Venkatesh, V., & Bala, H. (2008). Technology acceptance model 3 and a research agenda on interventions. Decision Sciences, 39(2), 273–315.CrossRef
go back to reference Venkatesh, V., & Davis, F. D. (2000). A theoretical extension of the technology acceptance model: Four longitudinal field studies. Management Science, 46(2), 186–204.CrossRef Venkatesh, V., & Davis, F. D. (2000). A theoretical extension of the technology acceptance model: Four longitudinal field studies. Management Science, 46(2), 186–204.CrossRef
go back to reference Venkatesh, V., Morris, M. G., Davis, G. B., & Davis, F. D. (2003). User acceptance of information technology: Toward a unified view. MIS Quarterly, 27(3), 425–478.CrossRef Venkatesh, V., Morris, M. G., Davis, G. B., & Davis, F. D. (2003). User acceptance of information technology: Toward a unified view. MIS Quarterly, 27(3), 425–478.CrossRef
go back to reference Wakunuma, K. J., & Stahl, B. C. (2014). tomorrow’s ethics and today’s response: an investigation into the ways information systems professionals perceive and address emerging ethical issues. Information Systems Frontiers, 16(3), 383–397.CrossRef Wakunuma, K. J., & Stahl, B. C. (2014). tomorrow’s ethics and today’s response: an investigation into the ways information systems professionals perceive and address emerging ethical issues. Information Systems Frontiers, 16(3), 383–397.CrossRef
go back to reference Walczuch, R., & Lundgren, H. (2004). Psychological antecedents of institution-based consumer trust in e-retailing. Information & Management, 42(1), 159–177.CrossRef Walczuch, R., & Lundgren, H. (2004). Psychological antecedents of institution-based consumer trust in e-retailing. Information & Management, 42(1), 159–177.CrossRef
go back to reference Westin, A. F. (2003). Social and political dimensions of privacy. Journal of Social Issues, 59(2), 431–453.CrossRef Westin, A. F. (2003). Social and political dimensions of privacy. Journal of Social Issues, 59(2), 431–453.CrossRef
go back to reference Woodward, J. D. (1997). Biometrics: Privacy’s foe or privacy’s friend? Proceedings of the IEEE, 85(9), 1480–1492.CrossRef Woodward, J. D. (1997). Biometrics: Privacy’s foe or privacy’s friend? Proceedings of the IEEE, 85(9), 1480–1492.CrossRef
go back to reference Xu, H. (2007). The effects of self-construal and perceived control on privacy concerns. ICIS 2007 Proceedings, 125. Xu, H. (2007). The effects of self-construal and perceived control on privacy concerns. ICIS 2007 Proceedings, 125.
go back to reference Xu, H., Dinev, T., Smith, J., & Hart, P. (2008). Examining the Formulation of Individual’s Privacy Concerns: Toward an Integrative View. Paper Presented at the Twenty Ninth International Conference on Information Systems, Paris. Xu, H., Dinev, T., Smith, J., & Hart, P. (2008). Examining the Formulation of Individual’s Privacy Concerns: Toward an Integrative View. Paper Presented at the Twenty Ninth International Conference on Information Systems, Paris.
go back to reference Xu, H., Dinev, T., Smith, J., & Hart, P. (2011). Information privacy concerns: Linking individual perceptions with institutional privacy assurances. Journal of the Association for Information Systems, 12(12), 798. Xu, H., Dinev, T., Smith, J., & Hart, P. (2011). Information privacy concerns: Linking individual perceptions with institutional privacy assurances. Journal of the Association for Information Systems, 12(12), 798.
go back to reference Zhou, T. (2015). Understanding user adoption of location-based services from a dual perspective of enablers and inhibitors. Information Systems Frontiers, 17(2), 413–422.CrossRef Zhou, T. (2015). Understanding user adoption of location-based services from a dual perspective of enablers and inhibitors. Information Systems Frontiers, 17(2), 413–422.CrossRef
go back to reference Zorkadis, V., & Donos, P. (2004). On biometrics-based authentication and identification from a privacy-protection perspective: Deriving privacy-enhancing requirements. Information Management & Computer Security, 12(1), 125–137.CrossRef Zorkadis, V., & Donos, P. (2004). On biometrics-based authentication and identification from a privacy-protection perspective: Deriving privacy-enhancing requirements. Information Management & Computer Security, 12(1), 125–137.CrossRef
go back to reference Zweig, D., & Scott, K. (2007). When unfairness matters most: Supervisory violations of electronic monitoring practices. Human Resource Management Journal, 17(3), 227–247.CrossRef Zweig, D., & Scott, K. (2007). When unfairness matters most: Supervisory violations of electronic monitoring practices. Human Resource Management Journal, 17(3), 227–247.CrossRef
go back to reference Zweig, D., & Webster, J. (2002). Where is the line between benign and invasive? An examination of psychological barriers to the acceptance of awareness monitoring systems. Journal of Organizational Behavior, 23(5), 605–633.CrossRef Zweig, D., & Webster, J. (2002). Where is the line between benign and invasive? An examination of psychological barriers to the acceptance of awareness monitoring systems. Journal of Organizational Behavior, 23(5), 605–633.CrossRef
Metadata
Title
Privacy and biometrics: An empirical examination of employee concerns
Authors
Darrell Carpenter
Alexander McLeod
Chelsea Hicks
Michele Maasberg
Publication date
20-06-2016
Publisher
Springer US
Published in
Information Systems Frontiers / Issue 1/2018
Print ISSN: 1387-3326
Electronic ISSN: 1572-9419
DOI
https://doi.org/10.1007/s10796-016-9667-5

Other articles of this Issue 1/2018

Information Systems Frontiers 1/2018 Go to the issue

Premium Partner