Next Article in Journal
Social Benefits Evaluation of Rural Micro-Landscapes in Southeastern Coastal Towns of China—The Case of Jinjiang, Fujian
Next Article in Special Issue
Educational Systematized Design Thinking Platform—Case of Study: Bus Stop
Previous Article in Journal
The Role of Sustainable Entrepreneurship in UN Sustainable Development Goals: The Case of TED Talks
Previous Article in Special Issue
A Proposed Strategy Based on Instructional Design Models through an LMS to Develop Online Learning in Higher Education Considering the Lockdown Period of the COVID-19 Pandemic
 
 
Article
Peer-Review Record

Impact of Personality Traits and Information Privacy Concern on E-Learning Environment Adoption during COVID-19 Pandemic: An Empirical Investigation

Sustainability 2022, 14(13), 8031; https://doi.org/10.3390/su14138031
by Mei-Hui Peng 1 and Bireswar Dutta 2,*
Reviewer 1:
Reviewer 2: Anonymous
Reviewer 3:
Sustainability 2022, 14(13), 8031; https://doi.org/10.3390/su14138031
Submission received: 27 May 2022 / Revised: 24 June 2022 / Accepted: 28 June 2022 / Published: 30 June 2022

Round 1

Reviewer 1 Report

The article is well written, organised and adequate. Some minor grammatical errors found. 

Author Response

Comments and Suggestions for Authors

The Article is well written, organised and adequate. Some minor grammatical errors found.

Ans. Thank you. We correct the grammatical mistakes, which will be found throughout the Article.

Higher education institutions in… like online teaching and learning. (Line 12-13)

The COVID-19 pandemic severely… in teaching and learning ways [1]. (Line 37-38)

Almost every country forcefully…students' learning intentions [3,4]. (Line 38-40)

As education is the backbone … during the COVID-19 pandemic [1,5]. (Line 40-43)

Previous studies found that a sustainable…the intended purposes [1,5,6]. (Line 45-47)

They also indicated that pupils and… sustainable learning environment. (Line 49-50)

But, most pupils and instructors face… teaching and learning [6,9,10]. (Line 54-56)

It also offers an interactive communication… and the students [5,10,12] (Line 61-63)

Previous studies indicated that despite… several reasons [1,5,10,12,13]. (Line 63-67)

HEIs in Taiwan decided to implement… the post-pandemic [1]. (Line 70-72)

But, students need to adopt an… learning development and outcome [1]. (Line 72-74)

Thus, the current study explores… to under-stand these differences. (Line 74-76)

Additionally, educational research has… concern among students. (Line 82-84)

Thus, the e-learning environment has… to varying degrees [17,18]. (Line 84-86)

Thus, considering that personality … environment adoption [22,23]. (Line 89-92)

The current study aims to explore… e-learning environment adoption. (Line 93-97)

We are confident that the current… to manage the associated concerns. (Line 97-99)

The rest of the paper is structured as… are presented in section 7. (Line 100-105)

Privacy refers to a person's ability to… to personal information [24]. (Line 109-110)

With the rapid advancement of educational… more convenient [25]. (Line 115-116)

Despite these attempts, many educators… due to privacy concerns. (Line 122-124)

Thus, an inclusive interception of the privacy… environment use. (Line 127-130)

Previous studies have proposed that… in previous studies [34,36]. (Line 139-141)

The personality traits are used in… results until the late 1980s. (Line 141-142)

Goldberg [36] presented the Big Five… predicted essential outcomes. (Line 142-145)

Although PMT has been primarily… is directly proportional to life. (Line 150-151)

As collecting personal information… personal privacy intrusions [40]. (Line 160-162)

Highly agreeable individuals … suspicious of their environment [32]. (Line 192-193)

Moreover, agreeable individuals may… familiarity and concord [35]. (Line 193-195)

So, an individual with this trait… personal information than others. (Line 195-196)

Junglas et al. [35] define intellect as… and receptiveness to new ideas. (Line 199-201)

Individuals use their intellect… to mitigate them as required [33]. (Line 201-203)

So, individuals generally don't… of disclosing personal information. (Line 203-205)

Thus, it is expected that the… of personal information concern. (Line 205-207)

Individuals who are emotionally… to emotionally stable individuals. (Line 210-213)

As a result, due to their problematic… and concerned about privacy. (Line 213-215)

They evaluate the risks rather… of disclosing personal information. (Line 215-216)

Conscientious individuals are… logical, and foresighted [35]. (Line 222-223)

They are also less risk-taker and… to get involved in risky situations [33]. (Line 223)

As a result, highly conscientious… personal information [34,36]. (Line 224-227)

Furthermore, individuals with this… invasion as risky behavior. (Line 227-228)

Extraverted individuals are inclined… in social situations [35]. (Line 234-235)

They also tend to display riskier… their introverted counterpart [33]. (Line 235-237)

As a result, it is anticipated that… their personal information [34]. (Line 237-239)

According to the study by… their higher need for social interaction. (Line 239-241)

Therefore, we anticipate that… disclosing their personal information. (Line 241-242)

Belief in conspiracy negatively contributes… technology uptake [43]. (Line 247-248)

A conspiracy belief is the unnecessary… behavioral intention [45]. (Line 248-251)

Fears about the CFIP contributed to a… affect behavior [42,44,45]. (Line 251-253)

Smith et al. [34] hypothesized … concern and behavioral intentions. (Line 257-258)

This finding was confirmed, while… in a nomological network [36]. (Line 258-259)

Thus, the present study posits, in… information technology use. (Line 259-262)

Individuals anxious about using… to their personal information. (Line 263-264)

This is, to some ex-tent, because… protection to their users [19]. (Line 264-266)

However, previous studies indicated… how to remove them [35,36]. (Line 266-268)

Thus, individuals worried about using… with service providers. (Line 268-270)

They are potentially less concerned about… better service [19]. (Line 270-272)

Pre-testing is not well-organized despite… intuitive and informal [47]. (Line 309-310)

Lack of guidance also applies… [50] or as many as you can [47]. (Line 310-312)

However, little rationale… is usually done but do not take a stand. (Line 312-314)

Thus, seven experts were incorporated… information science field. (Line 314-316)

AVE constructs' values range… condition for convergent validity. (Line 364-365)

Students who started with a higher… the e-learning environment. (Line 389-391)

Similarly, conscientious students… during the COVID-19 pandemic. (Line 403-405)

Additionally, extroverts are more… than in the online environment. (Line 416-418)

Due to the insufficient research that… out reasonable explanations. (Line 447-450)

Additionally, speculation about… students' readiness to accept. (Line 460-463)

These undesirable opinions… the system's overall achievement. (Line 463-464)

Despite its substantial outcomes… study suffers a few limitations. (Line 466-467)

SEM analysis also demonstrated that… the COVID-19 pandemic. (Line 482-484)

A highly conscientious student… adoption decision-making. (Line 488-489)

Extrovert students are risk-takers… information in a public meeting. (Line 490-491)

But findings indicated they are less… or offline due to social stigma. (Line 491-492)

Intelligent students are ready to share… to receive better service. (Line 492-493)

Third, believing in conspiracy theory… related to adaptive behavior. (Line 502)

But better self-control in the conspiracy… cognitive responses. (Line 502-504)

Fifth, past conspiracy theories… current COVID-19 pandemic. (Line 509-511)

Sixth, a previous study developed… based on their CFIP [25]. (Line 516-518)

Second, the current study findings… during the COVID-19 pandemic. (Line 530-533)

Educational IT service providers… for their learning behavior. (Line 533-535)

 

 

 

Reviewer 2 Report

The article was dedicated to a very interesting issue, which is "Impact of Personality Traits and Information Privacy Concern on E-learning Environment Adoption During COVID-19 Pandemic: An Empirical Investigation".

In the era of the COIVID pandemic and the post-pandemic period, it is very important to carry out various types of analyzes, which perfectly fit in with the analyzes proposed by the authors regarding e-learning, which was the basis of education during lockdowns.

In general, the article is prepared correctly in terms of the content. However, I have a few comments to make it even more valuable. In the introduction part, it is worth indicating to which examples of educational content the e-learning was directed. For example, the authors Turoń et al. pointed to the possibility of using e-learning in education about electric cars - "When, What and How to Teach about Electric Mobility? An Innovative Teaching Concept for All Stages of Education: Lessons from Poland". It is worth referring to this and other examples in the references.

Next, in the methodological part, I have a question about the pre-test. Why were only 7 people used for it? Was it a sufficient research sample and is it statistically correct? Please include this in the text.

In the summary, please indicate the research limitations and the authors' future plans.

 

In terms of editing, please pre-edit the work so that, for example, there are no subsections that actually contain only a drawing. Are these subsections necessary? In addition, according to the mdpi format, there is no information about the authors' contribution, etc.

In general, the article reads well and is interesting, so after making corrections I will be in favor of publishing it. Good luck!

Author Response

Comments and Suggestions for Authors

  1. The article was dedicated to a very interesting issue, which is "Impact of Personality Traits and Information Privacy Concern on E-learning Environment Adoption During COVID-19 Pandemic: An Empirical Investigation".

Ans. Thank you.

 

  1. In the era of the COIVID pandemic and the post-pandemic period, it is very important to carry out various types of analyzes, which perfectly fit in with the analyzes proposed by the authors regarding e-learning, which was the basis of education during lockdowns. In general, the article is prepared correctly in terms of the content. However, I have a few comments to make it even more valuable.

Ans. Thank you.

  1. In the introduction part, it is worth indicating to which examples of educational content the e-learning was directed. For example, the authors Turoń et al. pointed to the possibility of using e-learning in education about electric cars - "When, What and How to Teach about Electric Mobility? An Innovative Teaching Concept for All Stages of Education: Lessons from Poland". It is worth referring to this and other examples in the references.

Ans. Thank you. We modified the Introduction and included the paper Turon et al. [2021] according to your instruction, which will be found on 82-86.

Additionally, educational research has… concern among students. (Line 82-84)

Thus, the e-learning environment has… to varying degrees [17,18]. (Line 84-86)

  1. Next, in the methodological part, I have a question about the pre-test. Why were only 7 people used for it? Was it a sufficient research sample and is it statistically correct? Please include this in the text.

Ans. Thank you. We explain why we chose seven experts per test, which will be found on lines 309-316

Pre-testing is not well-organized despite… intuitive and informal [47]. (Line 309-310)

Lack of guidance also applies… [50] or as many as you can [47]. (Line 310-312)

However, little rationale… is usually done but do not take a stand. (Line 312-314)

Thus, seven experts were incorporated… information science field. (Line 314-316)

  1. In the summary, please indicate the research limitations and the authors' future plans.

Ans. Thank you. We indicate research limitations and future plans, which will be found on line 466-474

Despite its substantial outcomes… study suffers a few limitations. (Line 466-467)

First, the implications are from a… teaching and learning settings. (Line 467-469)

The future study must conduct… antecedents to adoption intention. (Line 469-470)

Second, the comparatively reasonable… 33.6% unexplained. (Line 470-472)

Therefore, future studies should incorporate… variance more clearly. (Line 472-474)

  1. In terms of editing, please pre-edit the work so that, for example, there are no subsections that actually contain only a drawing. Are these subsections necessary? In addition, according to the mdpi format, there is no information about the authors' contribution, etc.

Ans. Thank you. We edited the paper according to the journal instructions and included author contribution, funding, Institutional Review Board Statement, Informed Consent Statement, and conflicts of interest, which will be found on lines 548-554.

Author Contributions: M.-H.P. contributed… no conflict of interest. (Line 548-554)

  1. In general, the article reads well and is interesting, so after making corrections I will be in favor of publishing it. Good luck!

Ans. Thank you.

 

 

 

Reviewer 3 Report

Greetings,

The paper is very well written. The literature review is well written, methodology. Small corrections are needed on paper as follows. In the introduction, emphasize the goal of the research and the contribution of the paper. Then it is necessary to say in the introduction about the structure of the paper. The literature review is good. After the hypotheses, explain why some are positively associated and some hypotheses are negatively associated. Then it is necessary to state the claims in this research. Because you used claim codes in factor analysis. Then, after Figure 2, make a table with hypotheses, results and whether they are accepted or not, in order to make it clearer for the reader. This is how one should ask the figure whether a hypothesis is accepted or not. Decide whether to leave both Figure 2 and that new table in the paper.

All best.

Author Response

Comments and Suggestions for Authors

Greetings,

 

  1. The paper is very well written. The literature review is well written, methodology.

Ans. Thank you for your comment.

  1. Small corrections are needed on paper as follows. In the introduction, emphasize the goal of the research and the contribution of the paper. Then it is necessary to say in the introduction about the structure of the paper.

Ans. Thank you. We modify the Introduction and include the goal and contribution of the paper according to your instruction, which will be found on line no. 93-105.

The current study aims to explore… e-learning environment adoption. (Line 93-97)

We are confident that the current… to manage the associated concerns. (Line 97-99)

The rest of the paper is structured as… are presented in section 7. (Line 100-105)

  1. The literature review is good.

Ans. Thank you for your comment.

  1. After the hypotheses, explain why some are positively associated and some hypotheses are negatively associated. Then it is necessary to state the claims in this research. Because you used claim codes in factor analysis.

Ans. Thank you. We include a section “Hypothesis development” and explain why some hypotheses are positive or negative, which will be found on line 192-275.

Highly agreeable individuals … suspicious of their environment [32]. (Line 192-193)

Moreover, agreeable individuals may… familiarity and concord [35]. (Line 193-195)

So, an individual with this trait… personal information than others. (Line 195-196)

Junglas et al. [35] define intellect as… and receptiveness to new ideas. (Line 199-201)

Individuals use their intellect… to mitigate them as required [33]. (Line 201-203)

So, individuals generally don't… of disclosing personal information. (Line 203-205)

Thus, it is expected that the… of personal information concern. (Line 205-207)

Individuals who are emotionally… to emotionally stable individuals. (Line 210-213)

As a result, due to their problematic… and concerned about privacy. (Line 213-215)

They evaluate the risks rather… of disclosing personal information. (Line 215-216)

Conscientious individuals are… logical, and foresighted [35]. (Line 222-223)

They are also less risk-taker and… to get involved in risky situations [33]. (Line 223)

As a result, highly conscientious… personal information [34,36]. (Line 224-227)

Furthermore, individuals with this… invasion as risky behavior. (Line 227-228)

Extraverted individuals are inclined… in social situations [35]. (Line 234-235)

They also tend to display riskier… their introverted counterpart [33]. (Line 235-237)

As a result, it is anticipated that… their personal information [34]. (Line 237-239)

According to the study by… their higher need for social interaction. (Line 239-241)

Therefore, we anticipate that… disclosing their personal information. (Line 241-242)

Belief in conspiracy negatively contributes… technology uptake [43]. (Line 247-248)

A conspiracy belief is the unnecessary… behavioral intention [45]. (Line 248-251)

Fears about the CFIP contributed to a… affect behavior [42,44,45]. (Line 251-253)

Smith et al. [34] hypothesized … concern and behavioral intentions. (Line 257-258)

This finding was confirmed, while… in a nomological network [36]. (Line 258-259)

Thus, the present study posits, in… information technology use. (Line 259-262)

Individuals anxious about using… to their personal information. (Line 263-264)

This is, to some ex-tent, because… protection to their users [19]. (Line 264-266)

However, previous studies indicated… how to remove them [35,36]. (Line 266-268)

Thus, individuals worried about using… with service providers. (Line 268-270)

They are potentially less concerned about… better service [19]. (Line 270-272)

  1. Then, after Figure 2, make a table with hypotheses, results and whether they are accepted or not, in order to make it clearer for the reader. This is how one should ask the figure whether a hypothesis is accepted or not. Decide whether to leave both Figure 2 and that new table in the paper.

Ans. Thank you. We include a Table after Figure 2 to mention the hypotheses results, which will be found on line 374, 375.

 

 

Round 2

Reviewer 2 Report

The article has been significantly improved and in my opinion is suitable for publication in its current form.

Thank you!

Back to TopTop