5,408
Views
6
CrossRef citations to date
0
Altmetric
Articles

Effects of privacy concern, risk, and information control in a smart tourism destination

, ORCID Icon &
Pages 3119-3138 | Received 16 Jul 2020, Accepted 16 Dec 2020, Published online: 06 Jan 2021

Abstract

Smart tourism destinations are growing, with the use and implementation of technology to make travel more enjoyable. Still, the tourist's information privacy concerns generated by the big data available to the destination and service providers is a significant problem for smart tourism, which can affect the sustainability and economic benefit of the smart tourism destination. This study investigates privacy concern, perceived risk, control of information, service provider trust in a smart tourism destination, and the resulting behavioural intentions. The results were obtained using an online survey of 384 respondents that have visited the smart tourism destination Dubai. The results indicated that use context as an environmental factor helps mitigate the tourists' negative privacy concerns and perceived risk towards trust in a smart tourism destination. Furthermore, previous privacy violation experience as a personal factor was negatively related to trust in the smart tourism destination and the service providers. The study provides meaningful contributions on smart tourism to destination management organizations (DMO's) and service providers on what influences and mitigates the privacy concern of the tourists using mobile application location-based services available in a smart tourism destination, building on the social cognitive theory.

JEL CLASSIFICATIONS:

1. Introduction

The tourism industry affects the economic (Huete Alcocer & López Ruiz, Citation2019), environmental (Wang et al., Citation2020) and social aspects of a destination (Sedarati & Baktash, Citation2017). The use of personalized services with the implementation of technology is necessary for keeping up with current and future developments of tourism (Kontogianni & Alepis, Citation2020). The number of users using mobile technology is increasing, and developing innovative applications to meet the various tourist's needs is the focus of service providers and different stakeholders in a smart destination (Chang & Shen, Citation2018; Wang & Lin, Citation2017). Mobile technology has changed the tourism industry, tourists take pictures and share with their friends (Buhalis & Foerste, Citation2015), gather information, make better decisions (Wang et al., Citation2014), and find nearest places of interest (Neuhofer et al., Citation2015). They now use mobile phones as they had previously used their desktop and laptops (Ozturk et al., Citation2017). Data is used by the service provider in a smart tourism destination to suggest sightseeing locations, send events notifications, provide location-based advertising, use real-time personalized services based on the tourist location and preference (Femenia-Serra et al., Citation2019). Information can easily be available to the tourist using their mobile phone location-based service in a smart tourism destination (Garcia et al., Citation2019). The personal information about tourists is made available to multiple stakeholders and service providers by the technology implemented in the smart tourism destination (Femenia-Serra et al., Citation2019). A research gap that has not been explored is the privacy concerns of the tourists towards the use of their data, and this is a critical gap as the tourists could influence the growth, economic benefit and sustainability of the smart tourism destination (Pradhan et al., Citation2018). This study introduces the privacy paradox to the smart tourism domain by considering the technology mobile application location-based services, the tourists, and the context of the environment that is the smart tourism destination. The study aims to investigate the factors that influence and mitigate privacy concerns of mobile application location-based services in a smart tourism destination to develop trust and positive behavioural intentions.

2. Literature review

2.1. Social cognitive theory

Social cognitive theory (SCT) suggests that mutual, reciprocal interaction exists between behaviour, environment, and personal factors (Bandura, Citation1989). Several studies have used the SCT to explain individual factors' influence on behaviours (Boateng et al., Citation2016; Hoffmann et al., Citation2015). The theory suggests that environmental factors influence both behavioural and personal factors, the environment can affect a person's expectation and beliefs, and the environment can be physical and social (Boateng et al., Citation2016). This study employs this relationship with use-context which is ‘the very concrete environment in which technology is going to be used’ (Van de Wijngaert & Bouwman, Citation2009, p. 86) and the smart tourism destination which is a smart connected environment (Femenia-Serra et al., Citation2019). SCT has been used in the study for technology adoption and tourism sustainability (Font et al., Citation2016; Rana & Dwivedi, Citation2015). Considering the interrelationship between the three factors that makes up the SCT, this study uses this theory to build on the hypothesized relationship.

2.2. Smart tourism destination and mobile application location-based services

For a tourism destination to be considered smart, stakeholders should be automatically interconnecting, using technology and intelligent systems as a platform for tourism-related activities and instant information exchange (Buonincontri & Micera, Citation2016; Del Chiappa & Baggio, Citation2015). The technology platform used in smart tourism destinations has several interfaces that can enable different end-users to use the system to dynamically share information in real-time (Choe & Fesenmaier, Citation2017). Smart tourism uses cloud computing, Internet of things, big data and smart devices (Buhalis & Amaranggana, Buhalis & Amaranggana, Citation2015). For instance, destinations install chips in entrance and transportation tickets that allow the service provider to know tourist's consumption behaviour, location information, and in turn use this information to provide location-based and real-time advertising (Lin et al., Citation2016). In Dubai, one of their most popular service providers Etisalat provides near field communication that lets mobile phones access bus stations' locations, arrival time, and make payments (Khan et al., Citation2017). Researches on smart tourism destinations are just gaining attention, and few studies have investigated tourist behaviour as regards privacy concerns (Pradhan et al., Citation2018).

2.3. Privacy concern

Privacy concern deals with how a user is concerned about the disclosure and accessibility of their personal information (Ooi et al., Citation2018). The fear can be that they do not trust the service providers to access, use, and store their personal information correctly (Zhou & Li, Citation2014). Privacy concerns have been studied to negatively influence affective trust (Ngelambong et al., Citation2018), and service provider trust (Ozturk et al., Citation2017). Privacy concerns negatively influence people's trust in disclosing their personal information (Bansal et al., Citation2015). Therefore, we hypothesize:

H1: Privacy concern is negatively related to (a) trust in a smart tourism destination, (b) trust in location-based services (LBS) provider.

2.4. Perceived privacy risk

Perceived privacy risk is defined as the negative perceptions, which customers feel towards a service or a product making them conclude that ambiguous and unwanted outcomes would precede their transaction with their personal information (Zhou, Citation2012). Users have been known to have a high level of risk perceptions when they are exposed to completing their activities with new technology (Ozturk, Citation2016). Perceived privacy risk has been studied to hinder the adoption of LBS (Wang & Lin, Citation2017). Perceived risk is influential in predicting tourist's behaviour (Choi et al., Citation2016). Ozturk et al. (Citation2017) reports that privacy risk would negatively influence trust and privacy concerns. Therefore, we hypothesize:

H2: Perceived privacy risk is negatively related to (a) trust in a smart tourism destination, (b) trust in LBS provider.

2.5. Information control

Perceived ability to control one's information is defined as the power of users to decide what information about them they allow to be used, or not used (Taylor et al., Citation2009). When consumers believe they have control over how their personal information is shared, it helps foster trust (Mosteller & Poddar, Citation2017). Secondary control of information is positively related to trust in social media websites, and negatively related to consumer's privacy concerns (Mosteller & Poddar, Citation2017). Perceived control of information is positively associated with sharing information online (Hajli & Lin, Citation2016). Therefore, we hypothesize:

H3: Perceived ability to control information is positively related to (a) trust in a smart tourism destination, (b) trust in LBS provider.

2.6. Use context

The rationale behind the decision making of user's online technology use is extended beyond the traditional cost and benefit analysis but governed by different contexts (Gambino et al., Citation2016). In the domain of information systems, context is an important concept (Kim et al., Citation2019), especially with mobile application (Chang, Citation2015). The use of mobile technology is exposed to shifting use contexts, and use context has been described as an essential factor influencing the adoption of mobile innovations (Afolabi et al., Citation2020). Yang et al. (Citation2012) found that use context affects the formation of attitude and behaviour towards information technology. User behaviour with technology can be influenced by the situation in which technology is being used (De Reuver et al., Citation2013). The smart tourism destination is a technology-centric environment, and the use context of technology would be very high, therefore using the social cognitive theory, we hypothesize that:

H4: Use context moderates the relationship between (a) privacy concern and destination trust, (b) privacy concern and LBS provider trust.

H5: Use context moderates the relationship between (a) perceived risk and destination trust, (b) perceived risk and LBS provider trust.

H6: Use context moderates the relationship between (a) perceived ability to control information and destination trust, (b) perceived ability to control information and LBS provider trust.

2.7. Privacy violation experience

A social contract is initiated when a user provides their information to service providers or online companies. An understood social contract is that the organization will be responsible for managing the user's personal information ethically and adequately (Phelps et al., Citation2000). A user can perceive that their privacy is violated if their personal information or data is exploited or the social contract is breached (Culnan, Citation1995; Phelps et al., Citation2000). Users learn from their personal experiences, and a negative experience can lead to mistrust of websites that solicit or provide the same service and require similar information (Mosteller & Poddar, Citation2017). Users who have been a victim of personal information privacy violation have more vital privacy violation concern (Xu et al., Citation2011). Therefore, we hypothesize:

H7: Privacy violation experience moderates the relationship between (a) privacy concern and destination trust, (b) privacy concern and LBS provider trust.

H8: Privacy violation experience moderates the relationship between (a) perceived risk and destination trust, (b) perceived risk and LBS provider trust.

H9: Privacy violation experience moderates the relationship between (a) perceived ability to control information and destination trust, (b) perceived ability to control information and LBS provider trust.

2.8. Trust and behavioural intention

Trust, in general, can be perceived as a positive perception, belief, and attitude towards another party (Taylor et al., Citation2009). Trust is defined as the ability to depend and have confidence in an exchange partner (Moorman et al., Citation1993). Trust is related to belief in an exchange partner's credibility, integrity, and reliability (Doney & Cannon, Citation1997). In the service organization, there is a need for the consumers to have trust in the service provider (Wang & Lin, Citation2017) and the destination (Choi et al., Citation2016). Artigas et al. (Citation2017) investigated destination trust. They concluded that if a destination does not have trust from the tourists, even if the touristic experience is beautiful without trust, it is useless. Destination trust is defined as the ability of the destination to provide its advertised functions (Abubakar & Ilkan, Citation2016). Technology users, who do not have trust in the service provider, have very high privacy concerns (Kokolakis, Citation2017). The behavioural intention which is the ability of a person to accomplish or perform a specific behaviour (Davis, Citation1989), in this study the behaviour would be for the tourist to recommend the destination to family and friends, and to revisit the destination. Therefore, we hypothesize:

H10: LBS trust is positively related to (a) destination trust, (b) behavioural intention.

H11: Destination trust is positively related to behavioural intention.

A research model has been constructed to reflect the proposed hypotheses that are shown in .

Figure 1. Research model. Source: Authors.

Figure 1. Research model. Source: Authors.

2.9. Dubai

Data was collected from tourists that have visited Dubai, a city located in the United Arab Emirates (UAE). Dubai is one of the significant and fastest developing cities in North Africa, and the Middle East, concerning economic development and growth in the tourism regions (Kaur & Maheshwari, Citation2016). The Government acknowledges the strategic importance of the tourism industry and how it has contributed to the economy. The smart city initiative and vision by Dubai has been the foundation for the building of a ‘city of the future’ using smart technologies (Efthymiopoulos, Citation2016). Smart tourism which is a subset of a smart city is a medium in which Dubai has used, and continues to use technology to accomplish their tourism development goals which align with the smart city initiative.

3. Methodology

3.1. Study setting

The study was conducted using an online survey. Using an online survey for the questionnaire have been popularly used in the domain of current tourism research (Morgan-Thomas & Veloutsou, Citation2013). The questionnaire targeted respondents that have visited Dubai smart tourism destination in the past two years, using Instagram, and Facebook holiday pictures location tags, and also Dubai travel and tourism pages on social media. The survey starts with a question asking the respondent if they have visited Dubai and a yes or no option was provided. If the respondent chooses no, then the survey ends without any further questions, and the response is discarded. If the respondent selects yes, then a new page is opened containing the questionnaire items.

3.2. Measurements

Privacy concern was measured using four items (Son & Kim, Citation2008), Previous privacy experience was measured using two items (Smith et al., Citation1996), perceived ability to control personal information was measured using four items (Liu et al., Citation2005). Destination trust was measured using eight items (Abubakar & Ilkan, Citation2016). LBS provider trust was measured using three items (Pavlou & Gefen, Citation2004). The behavioural intention was measured using three items (Liu et al., Citation2005), perceived risk was measured using three items (Pavlou & Gefen, Citation2004), use context was measured using five items (Mallat et al., Citation2009). The items were worded to suit this study context. All the variables were measured using a 1–7 Likert scale, except destination trust was measured using a 1–5 Likert scale.

3.3. Data collection

The survey was available online using google forms from February to May. A sample of 384 tourists that have visited the smart tourism destination was reached. A statistical calculation was used to choose the sample size with the Creative Research Systems (Citation2019, http://www.surveysystem.com/sscalc.htm) using confidence level 95% and a significance interval of 5%, with the number of tourists visiting the smart tourism destination Dubai is millions (Tabachnick & Fidell, Citation2014). The sufficient number of respondents was calculated as 384. 427 respondents clicked the survey, but 43 choose no they have not been to Dubai, making their response discarded. Finally, after reaching 384 respondents that have been in Dubai and the data was extracted and used for data analysis.

3.4. Data validity and reliability

Results of Confirmatory factor analysis performed in AMOS 20.0 showed that all items converged on their underlying construct except for one item from destination trust and one item from behavioural intention construct which was discarded. The model fit statistics (χ2 = 891.933., df = 375, χ2/df = 2.38; CFI = 0.96; PNFI = 0.80; RMSEA = 0.060) indicated a good fit and all standardized loadings exceeded the minimum requirement of 0.5, the t-statistics of all loaded factors is greater than 1.96, thus, confirming convergent validity. Composite reliability (CR) score and average variance extracted (AVE) for each construct were above the 0.7, and 0.5 minimum required values, respectively. shows the details. Further, we performed a bivariate Pearson correlation with a 2-tailed significant test. The result, as shown in , indicates that all constructs are moderately correlated. The diagonal figures represent the square root of AVE, which is greater than the inter-construct correlation, thus confirming the discriminant validity of the data (Chih & Lin, Citation2019). Preliminary checks of the data provided an initial understanding of the significance of the study variables.

Table 1. Scale items and measurement properties.

Table 2. Descriptive statistics and correlation of observed variables.

4. Results

4.1. Respondents profile

shows the demographic profile of the respondents. Majority of the respondents, 42% are 30 years or older. In terms of gender, the distribution is almost equal with the females slightly more than the males at fifty-two per cent. The respondents are quite educated as the majority of them (73.3%) are graduated from either university or hold a graduate certificate. (55.2%) are first-time visitors to the smart destination. The full demographic profile of the respondents is shown in .

Table 3. Respondents’ profile (n = 384).

4.2. Hypothesis testing

To test hypotheses H1 to H3, linear regression analysis (LRA) was performed using SPSS. In the first linear regression equation (LRE), privacy concern negatively and significantly predicted destination trust, R2 = .103, R2 adj = .101, F (1, 382) = 43.81, p < .001. In the second equation, privacy concern negatively and significantly predicted LBS provider trust, R2 = .155, R2 adj = .153, F (1, 382) = 70.09, p < .001. Thus, H1a and H1b were supported.

To test hypotheses 2. In the first LRE, perceived privacy risk negatively and significantly predicted destination trust, R2 = .064, R2 adj = .061, F (1, 382) = 25.95, p < .001. In the second equation, perceived privacy risk negatively and significantly predicted LBS provider trust, R2 = .106, R2 adj = .104, F (1, 382) = 45.49, p < .001. Thus, H2a and H2b were supported.

To test the positive effect of information control, in the first linear regression equation, PCTRL positively and significantly predicted destination trust, R2 = .134, R2 adj = .132, F (1, 382) = 59.01, p < .001. In the second equation, PCTRL positively and significantly predicted LBS provider trust, R2 = .243, R2 adj = .241, F (1, 382) = 122.50, p < .001. Thus, H3a and H3b were supported.

4.3. Moderation

For the investigation of hypotheses H4 to H9, we performed a number of moderated hierarchical regression analyses (HRA). To minimize the potential of multicollinearity issue, all predicting variables were mean-centred before the cross-products of the predictors were computed for the examination of all interaction effects (Aiken et al., Citation1991).

The first HRA where privacy concern × context interaction predicted destination trust showed 27.2% (R2adj) of the change in the regression equation, F(3, 380) = 48.81, p< .001. The initial step (concern) showed 10.1% of the change, F(1, 382) = 43.81, p< .001), although in the second step, context showed 17.1% of the change, F(1, 381) = 90.00, p< .001. The privacy concern × context interaction in the third step showed an added .04%, F(1, 380) = 2.02, p = .16, of the total change. The results showed that there exists main influence of privacy concern (β =- .25, p < .001) and context (β = .43, p < .001), and the partially significant interaction influence of privacy concern × context (β = −.06, p < .16). Thus, the partial significant interaction indicates that high use context reduces the negative effect of privacy concern on destination trust. Therefore, H4a was supported.

In the second HRA, the interaction between privacy concern × context predicted LBS provider trust. The total model showed 25.7% (R2adj) of the change in the regression comparison, F(3, 383) = 45.10, p < .001. Privacy concern in the initial step showed 15.3% of the change, F(1, 382) = 70.09, p < .001, although in the second step use context showed 10.70% of the change, F(1, 381) = 55.45, p = .001, finally the interaction privacy concern × context showed an added 0.1% of the total change, F(1, 380) = 8.63, p < .75. The results demonstrated a main effect of the privacy concern (β = −.34, p < .01) and use context (β = .33, p < .01) variables. However, the interaction effect of privacy concern × context was not statistically significant. Therefore, H4b was not supported

For testing hypothesis 5, the first HRA, the interaction between perceived privacy risk × context predicted destination trust, showed 27.2% (R2adj) of the change in the regression comparison, F(3, 380) = 25.95, p < .001. The first step (risk) showed 6.1% of the change, F(1, 382) = 43.81, p < .001), although in the second step, context showed 17.7% of the change, F(1, 381) = 88.68, p < .001. The perceived privacy risk × context interaction in the third step showed an additional 3.7%, F(1, 380) = 19.53, p = .001, of the total change. The results indicate that there were main effects of perceived privacy risk (β =- .71, p < .001) and context (β = .44, p < .001), and a significant interaction effect of perceived privacy risk × context (β = −.91, p < .001) The significant interaction indicated that the negative relation between privacy risk and destination trust was weaker when the use context levels were high; therefore, H5a was supported.

In the second HRA, the perceived privacy risk × context interaction was used to predict LBS provider trust. The total model showed 21.5% (R2adj) of the change in the regression comparison, F(3, 383) = 67.27, p < .001. Perceived privacy risk in the first step showed 10.6% of the change, F(1, 382) = 45.49, p < .001, whereas in the second step context showed 11.0% of the change, F(1, 381) = 53.62, p = .001. Finally the interaction perceived privacy risk × context showed an added 0.4% of the total change, F(1, 380) = 2.08, p < .15. The results established a main effect of the perceived privacy risk (β = −.32, p < .01) and context (β =- .27, p < .01) variables; the effect of privacy risk × context interaction was significant statistically (β = −.30, p < .15). The significant interaction indicated that high use context weakens the negative privacy risk–LBS provider trust relation. Therefore, H5b was supported.

The first HRA where perceived ability to control × context interaction predicted destination trust showed 24.9% (R2adj) of the change in the regression comparison, F(3, 380) = 43.43, p < .001. The initial step (control) showed 13.2% of the change, F(1, 382) = 59.01, p < .001), although in the second step, context showed 11.8% of the change, F(1, 381) = 59.94, p < .001; the interaction perceived ability to control information × context in the third step showed an added .4%, F(1, 380) = 1.94, p = .16, of the total change. The results indicate there were direct effects of PCTRL (β = .37, p < .001) and context (β = .22, p < .001), and a non-significant interaction effect of PCTRL × context. The result shows that PCTRL and use context individually exert a significant effect on destination trust. The non-significant interaction effect indicated that the effect of the ability to control information – destination trust was unaffected by changes in levels of use context.

In the second HRA, the perceived ability to control information × context interaction was used to predict LBS provider trust. The total model showed 28.2% (R2adj) of the change in the regression comparison, F(3, 383) = 51.22, p < .001. PCTRL in the first step showed 24.3% of the change, F(1, 382) = 122.50, p < .001, although in the second step context showed 4.3% of the change, F(1, 381) = 23.44, p = .001, and finally the interaction PCTRL × context showed an added 0.1% of the total change, F(1, 380) = .68, p < .42. The results established a main effect of the PCTRL (β = .26, p < .01) and context (β =- .24, p < .01) variables; the effect of PCTRL × context interaction was not statistically significant. The non-significant interaction effect, indicated that changes in levels of use context did not alter the control–LBS provider trust relation. Thus, hypothesis 6a and 6 b were rejected. See for the moderated regression results.

Table 4. Moderated hierarchical regression analyses of context predicting destination trust and location base trust.

Hypotheses H7, to H9 constructed to investigate the moderating effect of previous privacy experience on the mean-centred predictors and dependent variables.

In hypotheses H7, in the initially moderated regression, privacy concern × experience interaction predicted destination trust showed 12.5% (R2adj) of the change in the regression comparison, F(3, 380) = 19.19, p < .001. The initial step (concern) showed 10.1% of the change, F(1, 382) = 43.81, p < .001), although in the second step, previous experience showed 2.2% of the change, F(1, 381) = 9.52, p < .002; the interaction privacy concern × previous experience in the third step showed an added 0.7%, F(1, 380) = 2.99, p = .08, of the total change. The results establish that there were main effects of privacy concern (β =- .15, p < .001) and previous experience (β = −24, p < .001), and a partially significant effect of privacy concern × previous experience interaction (β = −10, p < .08).

In the subsequent HRA, privacy concern × previous experience interaction were used to predict LBS provider trust. The total model showed 16.0% (R2adj) of the change in the regression equation, F(3, 383) = 25.27, p < .001. Privacy concern in the first step showed 15.3% of the change, F(1, 382) = 70.08, p < .001, although in the second step previous experience showed 0.8% of the change, F(1, 381) = 3.61, p = .05. Finally the interaction privacy concern × experience showed an added 0.3% of the total change, F(1, 380) = 1.53, p < .22. The results established a main effect of the privacy concern (β = −.42, p < .01) and experience (β = .11, p < .05) variables; the effect of privacy concern × experience interaction was however partially statistically significant (β = −.07, p < .22). The partially significant interaction shows that the negative privacy concern-LBS provider trust relation was slightly strengthened by previous privacy experience. Thus, H7a and H7b were supported.

For hypothesis H8 in the initially moderated regression, perceived privacy risk × experience interaction predicted destination trust showed 14.7% (R2adj) of the change in the regression comparison, F(3, 380) = 22.94, p < .001. The initial step (risk) showed 6.1% of the change, F(1, 382) = 25.95, p < .001), In the second step, previous experience showed 4.4% of the change, F(1, 381) = 18.65, p < .001; the interaction perceived privacy risk × previous experience in the third step showed an added 4.6%, F(1, 380) = 20.64, p = .001, of the total change. The results established there were main effects of perceived privacy risk (β =- .25, p < .001) and experience (β = −31, p < .001), and a significant effect of perceived privacy risk × previous experience interaction (β = .23, p < .001). The significant interaction effect indicated that the negative risk–destination trust relation was strengthened in situations with previous experiences.

In the subsequent HRA, perceived privacy risk, experience, and the interaction perceived privacy risk × experience was used to predict LBS provider trust. The total model showed 15.4% (R2adj) of the change in the regression comparison, F(3, 383) = 24.18, p < .001. Perceived privacy risk in the initial step showed 10.4% of the change, F(1, 382) = 45.49, p < .001, although in the second step previous experience showed 0.2% of the change, F(1, 381) = 0.029, p = .87. Finally, the interaction perceived privacy risk × previous experience showed an added 5.2% of the total change, F(1, 380) = 24.36, p < .001. The results established a main effect of the perceived privacy risk (β = −.23, p < .01) and previous experience (β = −.06, p < .04) variables; the effect of privacy risk × previous experience interaction was statistically significant (β = .25, p < .001). The significant interaction indicated that the negative privacy risk-LBS provider trust relation was strengthened by previous experience of an information violation. Thus, H8a and H8b were supported.

In hypothesis H9, the PCTRL × experience interaction predicted destination trust showed 23.2% (R2adj) of the change in the regression comparison, F(3, 380) = 39.56, p < .001. The initial step (control) showed 13.2% of the change, F (1, 382) = 59.01, p < .001), although in the second step, previous experience showed 9.3% of the change, F (1, 381) = 45.85, p < .001; the interaction PCTRL × experience in the third step showed an added 1.1%, F (1, 380) = 5.54, p = .01, of the total change. The results show there were main effects of PCTRL (β =.35, p < .001) and experience (β = −.32, p < .001), and a significant interaction effect of PCTRL × experience (β = .11, p < .01). The significant interaction effect indicated that the positive control–destination trust relation was weakened in situations with previous privacy experiences.

In the subsequent hierarchical regression analysis, the PCTRL × experience interaction was used to predict LBS provider trust. The total model showed 27.0% (R2adj) of the change in the regression comparison, F(3, 383) = 83.92, p < .001. PCTRL in the initial step shows 24.1% of the change, F(1, 382) = 122.5, p < .001, although in the second step previous experience showed 2.5% of the change, F(1, 381) = 12.79, p = .001. Finally, the interaction PCTRL × previous experience showed an added 0.8% of the total change, F(1, 380) = 4.29, p < .04. The results established a main effect of the perceived control (β = −.48, p < .01) and previous experience (β = −.17, p < .001) variables; the interaction effect of PCTRL × experience was statistically significant (β = .09, p < .001). The significant interaction indicated that the positively perceived ability to control-LBS provider trust relation was weakened by previous violation experience. Thus, H9a and H9b were supported. Overall, hypotheses H7, H8, and H9 were supported. See for the moderated regression results.

Table 5. Moderated hierarchical regression analyses of previous privacy experience (PPE) predicting destination trust and location base trust.

For Hypotheses H10 a simple LRA was conducted. In the first linear regression equation, LBS provider trust positively and significantly predicted destination trust, R2 = .349, R2 adj = .347, F (1, 382) = 204.83, p < .001. In the second equation, LBS provider trust positively and significantly predict tourists' behavioural intention, R2 = .285, R2 adj = .283, F (1, 382) = 151.99, p < .001. Thus, H10a and H10b were supported.

Hypothesis H11 proposed a direct effect of destination trust on behavioural intention. The result indicated that destination trust positively and significantly predicted tourist's behavioural intention to a smart destination, R2 = .523, R2 adj = .522, F (1, 382) = 418.43, p < .001.Therefore, hypothesis H11 was supported.

5. Discussions and conclusions

The destination management organization (DMO), the service provider, and the tourist are three major stakeholders that are involved in smart tourism destinations (Femenia-Serra, Citation2018). This study provides implications for smart tourism DMO's, technology service providers, and for smart tourism destination stakeholders. Building trust with service providers is essential for the development and sustainability of a smart tourism destination. As the results of this study have shown that trust in the service provider would influence trust in the destination and influence tourists to revisit and recommend the destination.

Information privacy risk and privacy concern of mobile application LBS are negatively related to destination and service provider trust. This result is consistent with previous studies on privacy concern and perceived risk relationship to trust, in the context of mobile advertising (Okazaki et al., Citation2012), in the context of mobile hotel booking (Ozturk et al.,Citation2017) and the context LBS adoption (Zhou, Citation2012). The service providers and DMO's in smart tourism destinations should take effective measures to mitigate this concern when implementing and developing mobile LBS in the tourism destination. This can be done by providing better security and privacy settings for the tourist; they should always emphasize and guarantee confidentiality, and creating more user-friendly applications with manuals and user guides with different language options.

Alternatively, information control has been seen to be positively related to trust. This result is consistent with previous studies on control and trust as providing an equitable relationship (Mosteller & Poddar, Citation2017). The destination managers, service providers, and other stakeholders in the smart tourism destination should work together with software developers towards developing software applications used in the destination with the control where the users can accept or decline for their information to be used, and understand how and why their information is used.

Additionally, the results of this study have shown that privacy concern and privacy risk can be mitigated with the use context. DMO's should emphasize the importance, purpose, and use of personal information and technology in smart tourism destinations. For instance, if the service provider informs the tourist how their location information is used to help them find their way if they get lost, they would reduce the privacy concern of the tourist towards their location data collection. future studies should further investigate use-context mitigation of user's privacy concern as to how to mitigate the effect of privacy concern seems to be a black box (Zhou, Citation2016)

Furthermore, this study provides implications for service providers as regards use context for technology adoption. Service providers need to keep track of tourists' behaviour and usage when it comes to using LBS. They should consider the time, the availability, the place, the convenience, the social and environmental factors that influence the usage of LBS by the tourists. This can help them provide advertisements, alerts, and personalization that would not be intrusive to the tourists. They can also be able to understand the challenges that the tourist faces when using mobile application location based services under different contexts (Kim et al., Citation2019).

Finally, the results showed that location-based service provider trust is positively related to destination trust and behavioural intention. When there is trust in the service provider, there would be trust in the destination, and it would lead to positive behaviour intentions, which makes service provider trust in a smart tourism destination important.

5.1. Limitations and future research

One of the limitations of this study is its focus on the privacy concern of mobile application LBS. However, there are different technologies used in smart tourism destinations. Future studies can research the privacy concern of tourists towards the other mobile technologies different from location-based services used in the smart tourism destination and the effects on service providers. The results of this study have shown that previous violation experience negatively influences user beliefs towards trust in a smart tourism destination and location-based service provider. Future studies can consider a longitudinal study comparing if a violation in one smart tourism destination influences privacy concern in another smart tourism destination. Finally, the influence of use context can also be studied concerning the privacy paradox.

Disclosure statement

No potential conflict of interest was reported by the authors.

References