Abstract
Concerns with improper collection and usage of personal information by businesses or governments have been seen as critical to the success of the emerging electronic commerce. In this regard, computer professionals have the oversight responsibility for information privacy because they have the most extensive knowledge of their organization’s systems and programs, as well as an intimate understanding of the data. Thus, the competence of these professionals in ensuring sound practice of information privacy is of great importance to both researchers and practitioners. This research addresses the question of whether male computer professionals differ from their female counterparts in their self-regulatory efficacy to protect personal information privacy. A total of 103 male and 65 female subjects surveyed in Taiwan responded to a 10-item questionnaire that includes three measures: protection (protecting privacy information), non-distribution (not distributing privacy information to others), and non-acquisition (not acquiring privacy information). The findings show (1) significant gender differences exist in the subjects’ overall self-regulatory efficacy for information privacy, and, in particular, (2) that female subjects in this study exhibited a higher level of self-regulatory efficacy than males for the protection and non-acquisition of personal privacy information. The identification of the factorial structure of the self-regulatory efficacy concerning information privacy may contribute to future research directed to examining the links between privacy efficacy and psychological variables, such as ethical attitude, ethical intention, and self-esteem. Studies can also be extended to investigate how different cultural practices of morality and computer use in men and women may shape the different development patterns of privacy self-efficacy. Understanding the different cultural practices may then shed light on the social sources of privacy competence and the appropriate remedies that can be provided to improve the situation.
Article PDF
Similar content being viewed by others
Explore related subjects
Discover the latest articles, news and stories from top researchers in related subjects.Avoid common mistakes on your manuscript.
References
Adam, A.: 2000, ‘Gender and Computer Ethics’, Computers and Society December, 17–24
Adam A., Howcroft D., Richardson H. (2004) A decade of neglect: reflecting on gender and IS. New Technology, Work and Employment 19(3):222–240
Bandura A. (1977) Self-efficacy: Toward a Unifying Theory of Behavioral Change. Psychological Review 84(1):191–215
Bandura A. (1986) Social Foundations of Thought and Action. Prentice Hall, Englewood Cliffs, NJ
Bandura A. (1989) Regulation of Cognitive Processes through Perceived Self-Efficacy. Development Psychology 25(5):729–735
Bandura A. (1991a) Social Cognitive Theory of Moral Thought and Action. In: Kurtines W. M., Gewirtz J. L. (eds) Handbook of Moral Behavior and Development 1. Erlbaum, Hillsdale, NJ, pp. 45–103
Bandura A. (1991b) Social Cognitive Theory of Self-Regulation. Organizational Behavior and Human Decision Processes 50:248–287
Bandura A. (1997) Self-Efficacy: The Exercise of Control. W.H. Freeman, New York
Barki H., Harwick J. (1994) Measuring User Participation, User Involvement, and User Attitude. MIS Quarterly 18(1):53–63
Beltramini R. F., Peterson R. F., Kozetsky G. (1984) Concerns of College Students Regarding Business Ethics. Journal of Business Ethics 3:195–200
Bissett, A. and G. Shipton: 1999 ‘An Investigation into Gender Differences in the Ethical Attitudes of IT Professionals’, ETHICOMP99, Rome, October
Boatright J. (1992) Conflict of Interest: An Agency Analysis. In: Bowie N., Freedman R. (eds) Ethics and Agency Theory: Introduction. Oxford University Press, New York, pp. 187–203
Chonko L. B., Hunt S. (1985) Ethics and Marketing Management: An Empirical Investigation. Journal of Business Research 13:339–359
Compeau D. R., Higgins C. A. (1995) Computer Self–Efficacy: Development of a Measure and Initial Test. MIS Quarterly 19(2):189–211
Crowne D. P., Marlowe D. (1960) A New Scale of Social Desirability Independent of Psychopathology. Journal of Consulting Psychology 24:349–354
Culnan M. (1993) How Did You Get My Name? An Exploratory Investigation of Consumer Attitudes toward Secondary Information Use. MIS Quarterly 17(3):341–361
Culnan M. J. (2000) Protecting Privacy Online: Is Self-Regulation Working? Journal of Public Policy and Marketing 19(1):20–26
Dawson L. M. (1997) Will Feminization Change the Ethics of the Sales Profession? Journal of Personal Selling and Sales Management 12:21–32
Escribano, J. J., R. Pena and J. Extremera: 1999, ‘Differences between Men and Women in Terms of Usage and Assessment of Information Technologies’, ETHICOMP99, Rome, October
Ferrell O. C., Skinner S. J. (1988) Ethical Behavior and Bureaucratic Structure in Marketing Research Organizations. Journal of Marketing Research 25(1):103–109
Fornell O. C., Larcker D. F. (1981) Evaluating Structural Equation Models with Unobservable and Measurement Error. Journal of Marketing Research 18:39–50
Gattiker U. E., Kelly H. (1999) Morality and Computers: Attitudes and Differences in Moral Judgments. Information Systems Research 10(3):233–254
George J. F. (1996) Computer-Based Monitoring: Common Perceptions and Empirical Results. MIS Quarterly 20(4):459–480
Georgia Tech Research Corporation, WWW User Survey, 7th Survey in (1997), 10th Survey in 1998, available at http://www.cc.gatech.edu/gvu/user_surveys/
Gist M. E., Mitchell T. R. (1992) Self-Efficacy: A Theoretical Analysis of Its Determinants and Malleability. Academy of Management Review 17(2):183–211
Harrington, S. J.: 1995, ‘Computer Crime and Abuse by IS Employees’, Journal of Systems Management March/April, 6–11
Headden, S.: 1996, Danger at the Drugstore. U.S. News and World Report (26 August 1996), pp. 46–53
Henderson S. C., Snyder C. A. (1999) Personal Information Privacy: Implications for MIS Managers. Information and Management 36:213–220
Henry J. W., Stone R. W. (1999) The Impacts of End-User Gender, Education, Performance, and System Use on Computer Self-Efficacy and Outcome Expectancy. Southern Business Review 25(1):10–16
Hill T., Smith N. D., Mann M. F. (1987) Role of Efficacy Expectations in Predicting the Decision to Use Advanced Technologies: The Case of Computers. Journal of Applied Psychology 72(2):307–313
Jones T. M., Gautschi F. H. (1988) Will the Ethics of Business Change? A Survey of Future Executive. Journal of Business Ethics 7:231–248
Kerie J., Cronan T. P. (1998) How Men and Women View Ethics. Communication of the ACM 41(9):70–76
Khazanchi D. (1995) Unethical Behavior in Information Systems: The Gender Factor. Journal of Business Ethics 14:741–749
Kidwell J. M., Stevens R. E., Bethke A. L. (1987) Differences in Ethical Perceptions between Male and Female Managers: Myth or Reality. Journal of Business Ethics 6:489–493
Kuo F. Y., Hsu M. H. (2001) Development and Validation of Ethical Computer Self-Efficacy Measure: The Case of Softlifting. Journal of Business Ethics 32:299–315
Latham G. P., Frayne C. A. (1989) Self-Management Training for Increasing Job Attendance: A Follow-up and a Replication. Journal of Applied Psychology 74:411–416
Lau T., Oren Etzioni O., Weld D. S. (1999) Privacy Interfaces for Information Management. Communication of the ACM 42(10):89–94
Loch K. D., Conger S. (1996) Evaluating Ethical Decision Making and Computer Use. Communications of the ACM 39(7):74–83
Marakas G. M., Yi M. Y., Johnson R. D. (1998) The Multilevel and Multifaceted Character of Computer Self-Efficacy: Toward Clarification of the Construct and an Integrative Framework for Research. Information Systems Research 9(2):126–163
Mason E. S., Mudrack P. E. (1996) Gender and Ethical Orientation: A Test of Gender and Occupational Socialization Theories. Journal of Business Ethics 15:599–604
Mason R. O. (1986) Four Ethical Issues of the Information Age. MIS Quarterly 10(1):5–12
Milberg S. J., Burke S. J., Smith J., Kallman E. A. (1995) Values, Personal Information Privacy, and Regulatory Approaches. Communications of the ACM 38(12):65–74
Oz, E.: 1992, ‘Ethical Standards for Information System Professionals: A Case for a Unified Code’, MIS Quarterly 423–433
Panteli A., Stack J., Atkinson M., Ramsay H. (1999a) The Status of Women in the UK IT Industry: An Empirical Study. European Journal of Information Systems 8:170–182
Panteli A., Stack J., Ramsay H. (1999b) Gender and Professional Ethics in the IT Industry. Journal of Business Ethics 22(1):51–61
Panteli N., Stack J., Ramsay H. (2001) Gendered Patterns in Computing Work in the Late 1990s. New Technology, Work and Employment 16(1):3–17
Paulhus D. L. (1991) Measurement and Control of Response Bias. In: Robinson J. P., Shaver P., Wrightsman L. S. (eds) Measures of Personality and Social Psychological Attitudes. Academic Press, San Diego, pp. 17–59
PPSC (Privacy Protection Study Commission). (1977) Personal Privacy in an Information Society: Report of the Privacy Protection Study Commission. U.S. Government Printing Office, Washington, DC
Privacy and American Business, Commerce, Communication and Privacy Online: A National Survey of Computer Users (1997) (Hackensack, NJ: Privacy and American Business)
Radtke R. R. (2000) The Effects of Gender and Setting on Accountants’ Ethically Sensitive Decisions. Journal of Business Ethics 24:299–312
Reiss M. C., Mitra K. (1998) The Effects of Individual Difference Factors on the Acceptability of Ethical and Unethical Workplace Behaviors. Journal of Business Ethics 17(14):1581–1593
Resnik D. B., Ranelli P. L., Resnik S. P. (2000) The Conflict Between Ethics and Business in Community Pharmacy: What About Patient Counseling? Journal of Business Ethics 28:179–186
Robertson M., Newell S., Swan J., Mathiassen L., Bjerknes G. (2001) The Issue of Gender within Computing: Reflections from the UK and Scandinavia. Information Systems Journal 11:111–126
Ruegger D., King E. W. (1992) A Study of the Effect of Age and Gender upon Student Business Ethics. Journal of Business Ethics 11:179–186
Sheehan K. B. (1999) An Investigation of Gender Differences in On-Line Privacy Concerns and Resultant Behaviors. Journal of Interactive Marketing 13:24–38
Smith H. J., Milberg S.J., Burke S. J. (1996) Information Privacy: Measuring Individuals’ Concerns about Organizational Practices. MIS Quarterly 20(2):167–196
Smith H. J. (1994) Managing Privacy: Information Technology and Corporate America. University of North Carolina Press, Chapel Hill
Stone C. D. (1975) Where the Law Ends: The Social Control of Corporate Behavior. Harper & Row, New York
Truman, G. E. and J. J. Baroudi: 1994, ‘Gender Differences in the Information Systems Managerial Ranks: An Assessment of Potential Discriminatory Practices’, MIS Quarterly June, 129–142
Tull D. S., Hawkins D. I. (1993) Marketing Research: Measurement and Method. Macmillan, New York
Turkle S. (1988) Computational Reticence: Why Women Fear the Intimate Machine. In: Kramarae (ed) Technology and Women’s Voices: Keeping in Touch. Pergamon Press, Oxford, UK
Wang H., Lee M., Wang C. (1998) Consumer Privacy Concerns about Internet Marketing. Communication of the ACM 41(3):63–70
Westin A. F. (1997) Commerce, Communication, and Privacy Online. Center for Social and Legal Research, Hackensack, NJ
Whipple T. W., Swords D. F. (1992) Business Ethics Judgment: A Cross Cultural Comparison. Journal of Business Ethics 11:671–678
Acknowledgements
This research is sponsored by the NSC of Taiwan, grant no. NSC 92-2416-H-110-016 and NSC 92-2416-H-390-007.
Author information
Authors and Affiliations
Corresponding author
Additional information
Feng-Yang Kuo holds a B.S. degree in Management Science from Chiao-Tung University, Taiwan and a Ph.D.degree in Information Systems from University of Arizona. He was a faculty of Information Systems at University of Colorado at Denver from 1985 to 1997 and is currently an associate professor of Information Management in Sun Yat-Sen University, Taiwan. He has published articles in Communications of ACM, MIS Quarterly, Communications of AIS, Journal of Business Ethics, Information & Management, Journal of Systems and Software, Decision Support Systems, and Sun Yat-Sen Management Review. Among his current interests are information ethics, managerial cognition, and human-computer interfaces.
Cathy S.Lin Professor Cathy S.Lin is an assistant professor of Information Management at National University of Kaohsiung, Taiwan. Her Ph.D.is in Management Information Systems from National Sun Yat-Sen University. She has published articles in the Information & Management, Journal of Information Management, and Sun Yat-Sen Management Review. Among her current interests are information ethics, ethical decision making, electronic commerce, and information management.
Meng-Hsiang Hsu Professor Meng-Hsiang Hsu is a professor of information management at National Kaohsiung of First University of Science and Technology. His Ph.D. is in Management Information Systems from National Sun Yat-Sen University. He has published articles in the J. of Business Ethics, Behavior & information Technology, Decision Support System, and Industrial Management and Data Systems. Among his current interests are knowledge management, information ethics, strategic information systems, and electronic commerce.
Rights and permissions
About this article
Cite this article
Kuo, FY., Lin, C.S. & Hsu, MH. Assessing Gender Differences in Computer Professionals’ Self-Regulatory Efficacy Concerning Information Privacy Practices. J Bus Ethics 73, 145–160 (2007). https://doi.org/10.1007/s10551-006-9179-1
Published:
Issue Date:
DOI: https://doi.org/10.1007/s10551-006-9179-1