12,933
Views
40
CrossRef citations to date
0
Altmetric
Empirical Research

Examining the intended and unintended consequences of organisational privacy safeguards

, , &
Pages 37-65 | Received 25 Apr 2014, Accepted 04 May 2016, Published online: 19 Dec 2017

Keep up to date with the latest research on this topic with citation updates for this article.

Read on this site (7)

Rachida F Parks, Rolf T Wigand & Paul Benjamin Lowry. (2023) Balancing information privacy and operational utility in healthcare: proposing a privacy impact assessment (PIA) framework. European Journal of Information Systems 32:6, pages 1052-1069.
Read now
Tobias Röding, Frederic Nimmermann, Sascha Steinmann & Hanna Schramm-Klein. (2019) The influence of technology infusion on customers’ information disclosure behaviour within the frontline service encounter. The International Review of Retail, Distribution and Consumer Research 29:5, pages 482-503.
Read now
Paul Benjamin Lowry, Tamara Dinev & Robert Willison. (2017) Why security and privacy research lies at the centre of the information systems (IS) artefact: proposing a bold research agenda. European Journal of Information Systems 26:6, pages 546-563.
Read now
Clay Posey, Uzma Raja, Robert E. Crossler & A. J. Burns. (2017) Taking stock of organisations’ protection of privacy: categorising and assessing threats to personally identifiable information in the USA. European Journal of Information Systems 26:6, pages 585-604.
Read now
Sabrina Karwatzki, Manuel Trenz, Virpi Kristiina Tuunainen & Daniel Veit. (2017) Adverse consequences of access to individuals’ information: an analysis of perceptions and the scope of organisational influence. European Journal of Information Systems 26:6, pages 688-715.
Read now
Abdullah Algarni, Yue Xu & Taizan Chan. (2017) An empirical study on the susceptibility to social engineering in social networking sites: the case of Facebook. European Journal of Information Systems 26:6, pages 661-687.
Read now

Articles from other publishers (33)

Yazhu Maggie Wang, Sabine Matook & Alan R. Dennis. (2024) Unintended consequences of humanoid service robots: A case study of public service organizations. Journal of Business Research 174, pages 114509.
Crossref
Qian Chen, Yeming Gong & Yaobin Lu. (2023) User Experience of Digital Voice Assistant: Conceptualization and Measurement. ACM Transactions on Computer-Human Interaction 31:1, pages 1-35.
Crossref
Javad Pool, Saeed Akhlaghpour, Farhad Fatehi & Andrew Burton-Jones. (2024) A systematic analysis of failures in protecting personal health data: A scoping review. International Journal of Information Management 74, pages 102719.
Crossref
Frederik Ahlemann, Peder Bergan, Erik Karger, Malte Greulich & Stefan Reining. (2024) Making Sense of Projects—Developing Project Portfolio Management Capabilities. Schmalenbach Journal of Business Research.
Crossref
Miranda Kajtazi & Erdelina Kurti. (2023) Conceptualizing the Impact of Digital Business Models on Privacy Concerns. Conceptualizing the Impact of Digital Business Models on Privacy Concerns.
Junfeng Liao & Rundong Li. (2023) Establishing a two-way transaction pricing model of “platform-individual” co-creation data property rights. Journal of Innovation & Knowledge 8:4, pages 100427.
Crossref
Xitong Guo & Yan Li. (2023) Intelligent Health in the IS Area: A Literature Review and Research Agenda. Fundamental Research.
Crossref
Chad Anderson, Richard Baskerville & Mala Kaul. (2023) Managing compliance with privacy regulations through translation guardrails: A health information exchange case study. Information and Organization 33:1, pages 100455.
Crossref
Allen C. Johnston. (2022) A closer look at organizational cybersecurity research trending topics and limitations. Organizational Cybersecurity Journal: Practice, Process and People 2:2, pages 124-133.
Crossref
Paméla Baillette, Yves Barlette & Jean-François Berthevas. (2022) Benefits and Risks of Shadow IT in Health Care: A Narrative Review of the Literature. Systèmes d'information & management Volume 27:2, pages 59-96.
Crossref
Sultan AlGhamdi, Khin Than Win & Elena Vlahu-Gjorgievska. (2022) Employees' intentions toward complying with information security controls in Saudi Arabia's public organisations. Government Information Quarterly 39:4, pages 101721.
Crossref
Carol Xiaojuan Ou, Xiaowei Zhang, Spyros Angelopoulos, Robert M. Davison & Noury Janse. (2022) Security breaches and organization response strategy: Exploring consumers’ threat and coping appraisals. International Journal of Information Management 65, pages 102498.
Crossref
K. Ambika & M. Balasingh Moses. (2022) TAR-AFT: A Framework to Secure Shared Cloud Data with Group Management. Intelligent Automation & Soft Computing 31:3, pages 1809-1823.
Crossref
Jongwoo Kim, Eun Hee Park, Young Soon Park, Kyung Hee Chun & Lynn L. Wiles. (2021) Prosocial rule breaking on health information security at healthcare organisations in South Korea. Information Systems Journal 32:1, pages 164-191.
Crossref
Leo Y. L. Kwong, Susan Foster & Victoria Peel. 2022. Case Based Research in Tourism, Travel, Hospitality and Events. Case Based Research in Tourism, Travel, Hospitality and Events 237 254 .
Marimuthu Trishan, Merwe Van der Alta & Gerber Aurona. 2022. Proceedings of Sixth International Congress on Information and Communication Technology. Proceedings of Sixth International Congress on Information and Communication Technology 381 391 .
Sebastian Firk, André Hanelt, Jana Oehmichen & Michael Wolff. (2021) Chief Digital Officers: An Analysis of the Presence of a Centralized Digital Transformation Role. Journal of Management Studies 58:7, pages 1800-1831.
Crossref
Sinung Suakanto, Edi Triono Nuryatno, Rokhman Fauzi, Rachmadita Andreswari & Vina Sari Yosephine. (2021) Conceptual Asset Management framework: A Grounded Theory Perspective. Conceptual Asset Management framework: A Grounded Theory Perspective.
Sam Zaza, Iris Junglas & Deborah J. Armstrong. (2021) Who needs the help desk? Tackling one's own technological problem via self IT service. Information and Organization 31:3, pages 100367.
Crossref
Mario Silic & Paul Benjamin Lowry. (2019) Breaking Bad in Cyberspace: Understanding why and how Black Hat Hackers Manage their Nerves to Commit their Virtual Crimes. Information Systems Frontiers 23:2, pages 329-341.
Crossref
Dezhi Wu, Paul Benjamin Lowry, Dongsong Zhang & Rachida F. Parks. (2021) Patients’ compliance behavior in a personalized mobile patient education system (PMPES) setting: Rational, social, or personal choices?. International Journal of Medical Informatics 145, pages 104295.
Crossref
Morten Hertzum. 2021. Organizational Implementation. Organizational Implementation.
Aurona Gerber, Pierre le Roux, Carike Kearney & Alta van der Merwe. 2020. Responsible Design, Implementation and Use of Information and Communication Technology. Responsible Design, Implementation and Use of Information and Communication Technology 383 396 .
Saad Altamimi, Karen Renaud & Timothy Storer. 2020. Risks and Security of Internet and Systems. Risks and Security of Internet and Systems 227 243 .
Haejung Yun, Gwanhoo Lee & Dan J Kim. (2019) A chronological review of empirical research on personal information privacy concerns: An analysis of contexts and research constructs. Information & Management 56:4, pages 570-601.
Crossref
Jin P. Gerlach, Nicole Eling, Nora Wessels & Peter Buxmann. (2018) Flamingos on a slackline: Companies' challenges of balancing the competing demands of handling customer information and privacy. Information Systems Journal 29:2, pages 548-575.
Crossref
Jason X. S. Wu & Shan Liu. 2019. Data Science and Digital Business. Data Science and Digital Business 81 119 .
Aline de Vargas Pinto, Antônio Carlos Gastaud Maçada & Gabriela Labres Mallmann. (2018) Workaround behaviour in information systems research. Revista de Gestão 25:4, pages 430-446.
Crossref
Rachida F. Parks, Paul Benjamin Lowry, Rolf T. Wigand, Nitin Agarwal & Therese L. Williams. (2018) Why students engage in cyber-cheating through a collective movement: A case of deviance and collusion. Computers & Education 125, pages 308-326.
Crossref
Xing Zhang, Shan Liu, Xing Chen, Lin Wang, Baojun Gao & Qing Zhu. (2018) Health information privacy concerns, antecedents, and information disclosure intention in online health communities. Information & Management 55:4, pages 482-493.
Crossref
Muneeb Ahmed Sahi, Haider Abbas, Kashif Saleem, Xiaodong Yang, Abdelouahid Derhab, Mehmet A. Orgun, Waseem Iqbal, Imran Rashid & Asif Yaseen. (2018) Privacy Preservation in e-Healthcare Environments: State of the Art and Future Directions. IEEE Access 6, pages 464-478.
Crossref
Paul Benjamin Lowry, John D’Arcy, Bryan Hammer & Gregory D. Moody. (2016) “Cargo Cult” science in traditional organization and information systems survey research: A case for using nontraditional methods of data collection, including Mechanical Turk and online panels. The Journal of Strategic Information Systems 25:3, pages 232-240.
Crossref
Dezhi Wu, Paul Benjamin Lowry, Dongsong Zhang & Rachida Parks. (2020) Patients’ Compliance Behavior in a Personalized Mobile Patient Education System (PMPES) Setting: Rational, Social, or Personal Choices?. SSRN Electronic Journal.
Crossref

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.