Acta Informatica Pragensia 2020, 9(2), 184-199 | DOI: 10.18267/j.aip.1414456
Perception of Information Sensitivity for Internet Users in Saudi Arabia
- 1 Department of Computer Engineering, Umm Al-Qura University, Makkah, Saudi Arabia
- 2 Department of Computer Science, Umm Al-Qura University, Makkah, Saudi Arabia
The rapid evolution of Internet use has led to the collection of big data about users, which has raised users’ privacy concerns about their personal information. This study adopts the hypothesis to evaluate the perception of the information sensitivity of Internet users in Saudi Arabia as research subjects. This study analyzes the sensitivity of 35 types of information through a questionnaire with answers from 508 participants from Saudi Arabia and estimates the cultural influence by comparing Saudi results with users from the USA, Brazil and Germany. Demographic information, such as age, gender, marital status and education, and attitude characteristics, such as disposition to privacy, propensity to take risks, privacy violation experience and trust in institutions, influence Saudi individuals’ perception of sensitivity towards various types of information. The survey results show slight differences in the sensitivity levels between Internet users in Saudi Arabia and their counterparts in other nations. Ultimately, this study contributes to improving the international model of information sensitivity perception between different nations.
Keywords: Cultural privacy, Information privacy, Perception of sensitivity, Sensitive information
Received: August 10, 2020; Revised: November 19, 2020; Accepted: November 20, 2020; Prepublished online: November 23, 2020; Published: December 31, 2020 Show citation
References
- Acquisti, A., John, L. K., & Loewenstein, G. (2013). What is privacy worth? The Journal of Legal Studies, 42(2), 249-274. https://doi.org/10.1086/671754
Go to original source...
- Alashoor, T., Sehee, H., & Rhoda, J. C. (2017). Familiarity with big data, privacy concerns, and self-disclosure accuracy in social networking websites: An APCO model. Communications of the Association for Information Systems, 41. https://doi.org/10.17705/1CAIS.04104
Go to original source...
- Alshahrani, H. A. (2016). A brief history of the Internet in Saudi Arabia. TechTrends, 60(1), 19-20. https://doi.org/10.1007/s11528-015-0012-5
Go to original source...
- Assembly, U. N. G. (1949). Universal declaration of human rights (Vol. 3381). Department of State, United States of America.
- Barth, S., & de Jong, M. D. T. (2017). The privacy paradox - Investigating discrepancies between expressed privacy concerns and actual online behavior - A systematic literature review. Telematics and Informatics, 34(7), 1038-1058. https://doi.org/10.1016/j.tele.2017.04.013
Go to original source...
- Bauer, C., & Schiffinger, M. (2016). Perceived risks and benefits of online self-disclosure: Affected by culture? A meta-analysis of cultural differences as moderators of privacy calculus in person-to-crowd settings. In Proceedings of the 24th European Conference on Information Systems (Article 68). AIS.
- Bergström, A. (2015). Online privacy concerns: A broad approach to understanding the concerns of different groups for different uses. Computers in Human Behavior, 53, 419-426. https://doi.org/10.1016/j.chb.2015.07.025
Go to original source...
- Chang, C.-W., & Heo, J. (2014). Visiting theories that predict college students' self-disclosure on Facebook. Computers in Human Behavior, 30, 79-86. https://doi.org/10.1016/j.chb.2013.07.059
Go to original source...
- Chen, J. Q., Zhang, R., & Lee, J. (2013). A Cross-Culture Empirical Study of M-commerce Privacy Concerns. Journal of Internet Commerce, 12(4), 348-364. https://doi.org/10.1080/15332861.2013.865388
Go to original source...
- Fianu, E., Ofori, K. S., Boateng, R., & Ampong, G. O. A. (2019). The Interplay Between Privacy, Trust and Self-disclosure on Social Networking Sites. In Proceedings of the International Working Conference on Transfer and Diffusion of IT (pp. 382-401). Springer. https://doi.org/10.1007/978-3-030-20671-0_26
Go to original source...
- Gilbert, M. A. (2019). Strengthening Your Social Media Marketing with Live Streaming Video. In Al-Masri A., Curran K. (eds.) Smart Technologies and Innovation for a Sustainable Future (pp. 357-365). Springer. https://doi.org/10.1007/978-3-030-01659-3_42
Go to original source...
- Hofstede, G. (2011). Dimensionalizing Cultures: the Hofstede Model in Context. Online Readings in Psychology and Culture, 2(1). https://doi.org/10.9707/2307-0919.1014
Go to original source...
- Hoftede, G., Hofstede, G. J., & Minkov, M. (2010). Cultures and organizations: software of the mind: intercultural cooperation and its importance for survival. McGraw-Hill.
- Hong, W., & Thong, J. Y. L. (2013). Internet Privacy Concerns: An Integrated Conceptualization and Four Empirical Studies. MIS Quarterly, 37(1), 275-298. https://doi.org/10.25300/misq/2013/37.1.12
Go to original source...
- Hung, P. C. K., & Cheng, V. S. Y. (2009). Privacy. In Encyclopedia of Database Systems (pp. 2136-2137). Springer. https://doi.org/10.1007/978-0-387-39940-9_274
Go to original source...
- Huo, J., Desai, R., Hong, Y.-R., Turner, K., Mainous, A. G., & Bian, J. (2019). Use of Social Media in Health Communication: Findings from the Health Information National Trends Survey 2013, 2014, and 2017. Cancer Control, 26(1), 107327481984144. https://doi.org/10.1177/1073274819841442
Go to original source...
- Jiacheng, W., Lu, L., & Francesco, C. A. (2010). A cognitive model of intra-organizational knowledge-sharing motivations in the view of cross-culture. International Journal of Information Management, 30(3), 220-230. https://doi.org/10.1016/j.ijinfomgt.2009.08.007
Go to original source...
- Kapoor, K. K., Tamilmani, K., Rana, N. P., Patil, P., Dwivedi, Y. K., & Nerur, S. (2017). Advances in Social Media Research: Past, Present and Future. Information Systems Frontiers, 20(3), 531-558. https://doi.org/10.1007/s10796-017-9810-y
Go to original source...
- Kokolakis, S. (2017). Privacy attitudes and privacy behaviour: A review of current research on the privacy paradox phenomenon. Computers & Security, 64, 122-134. https://doi.org/10.1016/j.cose.2015.07.002
Go to original source...
- Krasnova, H., & Veltri, N. F. (2010). Privacy calculus on social networking sites: Explorative evidence from Germany and USA. In Proceedings of the 43rd Hawaii International Conference on System Sciences. ACM. https://doi.org/10.1109/HICSS.2010.307
Go to original source...
- Krasnova, H., Veltri, N. F., & Günther, O. (2012). Self-disclosure and Privacy Calculus on Social Networking Sites: The Role of Culture. Business & Information Systems Engineering, 4(3), 127-135. https://doi.org/10.1007/s12599-012-0216-6
Go to original source...
- Li, Y., Wang, X., Lin, X., & Hajli, M. (2018). Seeking and sharing health information on social media: A net valence model and cross-cultural comparison. Technological Forecasting and Social Change, 126, 28-40. https://doi.org/10.1016/j.techfore.2016.07.021
Go to original source...
- Liu, Z., & Wang, X. (2018). How to regulate individuals' privacy boundaries on social network sites: A cross-cultural comparison. Information & Management, 55(8), 1005-1023. https://doi.org/10.1016/j.im.2018.05.006
Go to original source...
- Lozano, L. M., García-Cueto, E., & Muñiz, J. (2008). Effect of the Number of Response Categories on the Reliability and Validity of Rating Scales. Methodology, 4(2), 73-79. https://doi.org/10.1027/1614-2241.4.2.73
Go to original source...
- Markos, E., Milne, G. R., & Peltier, J. W. (2017). Information Sensitivity and Willingness to Provide Continua: A Comparative Privacy Study of the United States and Brazil. Journal of Public Policy & Marketing, 36(1), 79-96. https://doi.org/10.1509/jppm.15.159
Go to original source...
- Milne, G. R., Pettinico, G., Hajjat, F. M., & Markos, E. (2016). Information Sensitivity Typology: Mapping the Degree and Type of Risk Consumers Perceive in Personal Data Sharing. Journal of Consumer Affairs, 51(1), 133-161. https://doi.org/10.1111/joca.12111
Go to original source...
- Mollah, M. B., Zeadally, S., & Azad, M. A. K. (2019). Emerging Wireless Technologies for Internet of Things Applications: Opportunities and Challenges. In Encyclopedia of Wireless Networks (pp. 1-16). Springer. https://doi.org/10.1007/978-3-319-32903-1_328-1
Go to original source...
- Mutimukwe, C., Kolkowska, E., & Grönlund, Å. (2019). Information privacy in e-service: Effect of organizational privacy assurances on individual privacy concerns, perceptions, trust and self-disclosure behavior. Government Information Quarterly, 37(1), 101413. https://doi.org/10.1016/j.giq.2019.101413
Go to original source...
- Öğütçü, G., Testik, Ö. M., & Chouseinoglou, O. (2016). Analysis of personal information security behavior and awareness. Computers & Security, 56, 83-93. https://doi.org/10.1016/j.cose.2015.10.002
Go to original source...
- Pentina, I., Zhang, L., Bata, H., & Chen, Y. (2016). Exploring privacy paradox in information-sensitive mobile app adoption: A cross-cultural comparison. Computers in Human Behavior, 65, 409-419. https://doi.org/10.1016/j.chb.2016.09.005
Go to original source...
- Pires, I., Garcia, N., Pombo, N., & Flórez-Revuelta, F. (2016). From Data Acquisition to Data Fusion: A Comprehensive Review and a Roadmap for the Identification of Activities of Daily Living Using Mobile Devices. Sensors, 16(2), 184. https://doi.org/10.3390/s16020184
Go to original source...
- Posey, C., Lowry, P. B., Roberts, T. L., & Ellis, T. S. (2010). Proposing the online community self-disclosure model: the case of working professionals in France and the U.K. who use online communities. European Journal of Information Systems, 19(2), 181-195. https://doi.org/10.1057/ejis.2010.15
Go to original source...
- Robbins, S. S., & Stylianou, A. C. (2002). A study of cultural differences in global corporate web sites. Journal of Computer Information Systems, 42(2), 3-9. https://doi.org/10.1080/08874417.2002.11647480
Go to original source...
- Roberts, T. H. (2012). A Cross-Disciplined Approach to Exploring the Privacy Paradox: Explaining Disclosure Behaviour Using the Theory of Planned Behaviour. In UK Academy for Information Systems Conference Proceedings 2012. AIS.
- Schomakers, E.-M., Lidynia, C., Müllmann, D., & Ziefle, M. (2019). Internet users' perceptions of information sensitivity - insights from Germany. International Journal of Information Management, 46, 142-150. https://doi.org/10.1016/j.ijinfomgt.2018.11.018
Go to original source...
- Stutzman, F., Gross, R., & Acquisti, A. (2013). Silent Listeners: The Evolution of Privacy and Disclosure on Facebook. Journal of Privacy and Confidentiality, 4(2). https://doi.org/10.29012/jpc.v4i2.620
Go to original source...
- Trepte, S., Reinecke, L., Ellison, N. B., Quiring, O., Yao, M. Z., & Ziegele, M. (2017). A Cross-Cultural Perspective on the Privacy Calculus. Social Media + Society, 3(1), 205630511668803. https://doi.org/10.1177/2056305116688035
Go to original source...
- Veltri, N. F., Krasnova, H., & Elgarah, W. (2011). Online Disclosure and Privacy Concerns: a Study of Moroccan and American Facebook Users. In Proceedings of 17th Americas Conference on Information Systems. AIS.
- Westin, A. F. (1967). Privacy and freedom. Athenum.
- Wirth, J., Maier, C., Laumer, S., & Weitzel, T. (2019). Perceived information sensitivity and interdependent privacy protection: a quantitative study. Electronic Markets, 29(3), 359-378. https://doi.org/10.1007/s12525-019-00335-0
Go to original source...
- Xu, H., Dinev, T., Smith, J., & Hart, P. (2011). Information Privacy Concerns: Linking Individual Perceptions with Institutional Privacy Assurances. Journal of the Association for Information Systems, 12(12), 798-824. https://doi.org/10.17705/1jais.00281
Go to original source...
- van Zoonen, L. (2016). Privacy concerns in smart cities. Government Information Quarterly, 33(3), 472-480. https://doi.org/10.1016/j.giq.2016.06.004
Go to original source...
This is an open access article distributed under the terms of the Creative Commons Attribution 4.0 International License (CC BY 4.0), which permits use, distribution, and reproduction in any medium, provided the original publication is properly cited. No use, distribution or reproduction is permitted which does not comply with these terms.