Privacy Preservation Instruments Influencing the Trustworthiness of e-Government Services
Abstract
:1. Introduction
2. Literature Review
2.1. Concepts and Challenges
2.2. Related Studies
2.3. Hypotheses and Conceptual Model
2.4. Measurement Instruments
3. Methodology
3.1. Validation Approach
3.2. Sample Size
3.3. Sorting
3.4. Pilot Test
4. Results
4.1. Reliability and Usefulness
4.2. Normality Testing
4.3. Construct Validity
4.4. Correlation Analysis
4.5. Hypothesis Testing
5. Discussion
5.1. Findings of the Study
5.2. Theoretical Contributions
5.3. Practical Contributions
6. Conclusions
Author Contributions
Funding
Institutional Review Board Statement
Informed Consent Statement
Data Availability Statement
Conflicts of Interest
Abbreviations
PM | Preventive monitor |
PC | Privacy control |
LP | Lifecycle protection |
IA | Impact assessment |
ST | Service trust |
RIM | Records and information management |
PbD | Privacy by design |
e-government | Electronic government |
e-services | Electronic services |
ICT | Information and communication technology |
Mathematical Symbols
n | Sample size |
z | Mean away from standard deviation |
P | Variability degree |
E | Margin error value |
N | Population size |
CR | Composite reliability |
AVE | Average variance extracted |
β | Standard beta |
t | The size of the difference relative to the variation in your sample data |
p | the probability that an observed difference could have occurred just by random chance |
R2 | Coefficient of determination |
References
- Qin, F.; Li, L.; Zeng, W.; Wang, T.; Wang, C.; Yu, L. Construction of E-government Data Sharing Framework Based on Big Data Technology. E3S Web Conf. 2021, 257, 02038. [Google Scholar] [CrossRef]
- Kim, H.Y.; Cho, J.-S. Data governance framework for big data implementation with NPS Case Analysis in Korea. J. Bus. Retail. Manag. Res. 2018, 12. [Google Scholar] [CrossRef] [Green Version]
- Mazurek, G.; Małagocka, K. Perception of privacy and data protection in the context of the development of artificial intelligence. J. Manag. Anal. 2019, 6, 344–364. [Google Scholar] [CrossRef]
- Al-Khanjari, Z.; Al-Hosni, N.; Kraiem, N.; Jamoussi, Y. Developing e-Government interoperability driven methodology. J. Emerg. Technol. Web Intell. 2014, 6. [Google Scholar] [CrossRef]
- Holden, S.H.; Millett, L.I. Authentication, Privacy, and the Federal E-Government. Inf. Soc. 2005, 21, 367–377. [Google Scholar] [CrossRef]
- Aladalah, M.; Cheung, Y.; Lee, V.C. Towards a Model for Engaging Citizens via Gov2.0 to Meet Evolving Public Value. Int. J. Public Adm. Digit. Age 2018, 5, 1–17. [Google Scholar] [CrossRef]
- Beldad, A.; Van Der Geest, T.; De Jong, M.; Steehouder, M. A cue or two and I’ll trust you: Determinants of trust in government organizations in terms of their processing and usage of citizens’ personal information disclosed online. Gov. Inf. Q. 2012, 29, 41–49. [Google Scholar] [CrossRef]
- Cavoukian, A.; Taylor, S.; Abrams, M.E. Privacy by Design: Essential for organizational accountability and strong business practices. Identit-Inf. Soc. 2010, 3, 405–413. [Google Scholar] [CrossRef] [Green Version]
- Jamil, A.R.S.A.; Aref, M.; Rehman, A. Oman e-readiness: A paradigm shift for businesses. Int. J. Econ. Res. 2016, 13, 2223–2233. [Google Scholar]
- Portulans, I. Oman–Network Readiness Index 2019; Portulans Institute: Washington, DC, USA, 2019. [Google Scholar]
- Portulans, I. Oman–Network Readiness Index; Portulans Institute: Washington, DC, USA, 2020. [Google Scholar]
- Samuel, D.W.; Louis, D.B. The Right to Privacy. Harvard Law Rev. 1890, 4, 193–220. [Google Scholar]
- Al-Fedaghi, S.S. The “right to be let alone” and private information. In Proceedings of the Seventh International Conference on Enterprise Information Systems, Miami, FL, USA, 25–28 May 2005; SCITEPRESS-Science and Technology Publications: Setúbal, Portugal, 2005; pp. 98–107. [Google Scholar]
- Gerety, T. Redefining privacy. Harv. Civ. Rights Civ. Liberties Law Rev. 1977, 12, 233–296. [Google Scholar]
- Koops, B.-J.; Galič, M. Unity in Privacy Diversity: A Kaleidoscopic View of Privacy Definitions. SSRN Electron. J. 2021, 73. [Google Scholar] [CrossRef]
- Westin, A.F. Privacy and Freedom, Atheneum. New York, 1967; p. 7. Available online: https://scholarlycommons.law.wlu.edu/wlulr/vol25/iss1/20 (accessed on 20 August 2021).
- Beckles, C. An international perspective on protecting personal information. Inf. Manag. J. 2014, 44, 33–37. [Google Scholar]
- Langenderfer, J.; Miyazaki, A.D. Privacy in the Information Economy. J. Consum. Aff. 2009, 43, 380–388. [Google Scholar] [CrossRef]
- Laudon, K.; Laudon, J. Management Information Systems: International Edition, 11/E; Pearson Higher Education: London, UK, 2009. [Google Scholar]
- LaRose, R.; Rifon, N.J. Promoting i-Safety: Effects of Privacy Warnings and Privacy Seals on Risk Assessment and Online Privacy Behavior. J. Consum. Aff. 2007, 41, 127–149. [Google Scholar] [CrossRef]
- Culnan, M.J. Protecting Privacy Online: Is Self-Regulation Working? J. Public Policy Mark. 2000, 19, 20–26. [Google Scholar] [CrossRef]
- Bekara, K.; Laurent, M. Enabling User Privacy in Identity Management Systems. In Proceedings of the 2010 IEEE International Conference on Information Theory and Information Security, Institute of Electrical and Electronics Engineers (IEEE), Beijing, China, 17–19 December 2010; pp. 514–520. [Google Scholar]
- Collier, B. The power to structure: Exploring social worlds of privacy, technology and power in the Tor Project. Inf. Commun. Soc. 2021, 24, 1728–1744. [Google Scholar] [CrossRef]
- Butt, T.A.; Iqbal, R.; Salah, K.; Aloqaily, M.; Jararweh, Y. Privacy Management in Social Internet of Vehicles: Review, Challenges and Blockchain Based Solutions. IEEE Access 2019, 7, 79694–79713. [Google Scholar] [CrossRef]
- Sabani, A.; Deng, H.; Thai, V. A Conceptual Framework for the Adoption of E-Government in Indonesia. In Proceedings of the Australasian Conference on Information Systems 2018, University of Technology, Sydney (UTS), Sydney, Australia, 3–5 December 2018. [Google Scholar]
- Al-Nidawi, W.J.A.; Al-Wassiti, S.K.J.; Maan, M.A.; Othman, M. A Review in E-Government Service Quality Measurement. Indones. J. Electr. Eng. Comput. Sci. 2018, 10, 1257–1265. [Google Scholar] [CrossRef]
- Weerakkody, V.; Irani, Z.; Lee, H.; Hindi, N.; Osman, I.H. Are U.K. Citizens Satisfied With E-Government Services? Identifying and Testing Antecedents of Satisfaction. Inf. Syst. Manag. 2016, 33, 331–343. [Google Scholar] [CrossRef]
- Agozie, D.Q.; Kaya, T. Discerning the effect privacy information transparency on privacy fatigue in e-government. Gov. Inf. Q. 2021, 101601. [Google Scholar] [CrossRef]
- Chang, Y.; Wong, S.F.; Libaque-Saenz, C.F.; Lee, H. The role of privacy policy on consumers’ perceived privacy. Gov. Inf. Q. 2018, 35, 445–459. [Google Scholar] [CrossRef]
- Zhou, T. The impact of privacy concern on user adoption of location-based services. Ind. Manag. Data Syst. 2011, 111, 212–226. [Google Scholar] [CrossRef]
- Munyoka, W.; Maharaj, M.S. Privacy, security, trust, risk and optimism bias in e-government use: The case of two Southern African Development Community countries. SA J. Inf. Manag. 2019, 21, 9. [Google Scholar] [CrossRef]
- Almarashdeh, I.; Alsmadi, M. How to make them use it? Citizens acceptance of M-government. Appl. Comput. Inform. 2017, 13, 194–199. [Google Scholar] [CrossRef]
- Mutimukwe, C.; Kolkowska, E.; Grönlund, Å. Information privacy in e-service: Effect of organizational privacy assurances on individual privacy concerns, perceptions, trust and self-disclosure behavior. Gov. Inf. Q. 2020, 37, 101413. [Google Scholar] [CrossRef]
- Ahmad, K.; Singh, D.; Ayyash, M. Investigating the Effect of Information Systems Factors on Trust in E-Government Initiative Adoption in Palestinian Public Sector. Res. J. Appl. Sci. Eng. Technol. 2013, 5, 3865–3875. [Google Scholar] [CrossRef]
- Khan, S.; Umer, R.; Umer, S.; Naqvi, S. Antecedents of trust in using social media for E-government services: An empirical study in Pakistan. Technol. Soc. 2021, 64, 101400. [Google Scholar] [CrossRef]
- Khan, G.F.; Swar, B.; Lee, S.K. Social Media Risks and Benefits. Soc. Sci. Comput. Rev. 2014, 32, 606–627. [Google Scholar] [CrossRef] [Green Version]
- Mutimukwe, C.; Kolkowska, E.; Grönlund, Å. Information privacy practices in e-government in an African least developing country, Rwanda. Electron. J. Inf. Syst. Dev. Ctries. 2019, 85, e12074. [Google Scholar] [CrossRef]
- Anand, A. Exploring Net Benefits in the Context of an E-Government Project. In Proceedings of the Collaboration in a Hyperconnected World; Springer Science and Business Media LLC: Cham, Switzerland, 2020; pp. 415–421. [Google Scholar]
- Gerunov, A.A. Attitudes towards privacy by design in e-government: Views from the trenches. J. Soc. Ad-Min. Sci. 2020, 7, 1–17. [Google Scholar] [CrossRef]
- Singh, P.; Dwivedi, Y.K.; Kahlon, K.S.; Sawhney, R.S.; Alalwan, A.; Rana, N.P. Smart Monitoring and Controlling of Government Policies Using Social Media and Cloud Computing. Inf. Syst. Front. 2019, 22, 1–23. [Google Scholar] [CrossRef] [Green Version]
- Kurtz, C.; Semmann, M. Privacy by Design to Comply with GDPR: A Review on Third-Party Data Processors; Americas Conference on Information Systems: New Orleans, LA, USA, 2018. [Google Scholar]
- Hertzman, C.P.; Meagher, N.; McGrail, K.M. Privacy by Design at Population Data BC: A case study describing the technical, administrative, and physical controls for privacy-sensitive secondary use of personal information for research in the public interest. J. Am. Med. Inform. Assoc. 2013, 20, 25–28. [Google Scholar] [CrossRef] [PubMed] [Green Version]
- Salo, J.; Karjaluoto, H. A conceptual model of trust in the online environment. Online Inf. Rev. 2007, 31, 604–621. [Google Scholar] [CrossRef]
- Al-Naimat, A.M.; Fraihat, A. E-Government’s Service Quality; User perception Significance and Measurement. IJCSNS 2020, 20, 101. [Google Scholar] [CrossRef]
- Larson, M.; Oostdijk, N.; Borgesius, F.Z. Not Directly Stated, Not Explicitly Stored. In Proceedings of the Adjunct Proceedings of the 29th ACM Conference on User Modeling, Adaptation and Personalization; Association for Computing Machinery (ACM), Utrecht, The Netherlands, 21–25 June 2021; pp. 388–391. [Google Scholar]
- Smith, H.J.; Dinev, T.; Xu, H. Information Privacy Research: An Interdisciplinary Review. MIS Q. 2011, 35, 989. [Google Scholar] [CrossRef] [Green Version]
- Warkentin, M.; Sharma, S.; Gefen, D.; Rose, G.M.; Pavlou, P. Social identity and trust in internet-based voting adoption. Gov. Inf. Q. 2018, 35, 195–209. [Google Scholar] [CrossRef]
- Liu, D.; Carter, L. Impact of citizens’ privacy concerns on e-government adoption. In Annual International Conference on Mobile Computing & Networking-MobiCom ’13; ACM: New York, NY, USA, 2018; p. 27. [Google Scholar]
- MacKenzie, S.B.; Podsakoff, P.M.; Podsakoff, N.P. Construct Measurement and Validation Procedures in MIS and Behavioral Research: Integrating New and Existing Techniques. MIS Q. 2011, 35, 293. [Google Scholar] [CrossRef]
- Moore, G.C.; Benbasat, I. Development of an Instrument to Measure the Perceptions of Adopting an Information Technology Innovation. Inf. Syst. Res. 1991, 2, 192–222. [Google Scholar] [CrossRef] [Green Version]
- Lewis, B.R.; Templeton, G.F.; Byrd, T.A. A methodology for construct development in MIS research. Eur. J. Inf. Syst. 2005, 14, 388–400. [Google Scholar] [CrossRef]
- Dillman, D.A.; Smyth, J.D.; Christian, L.M. Internet, Phone, Mail, and Mixed-Mode Surveys: The Tailored Design Method; John Wiley & Sons: Hoboken, NJ, USA, 2014. [Google Scholar]
- Information N.C.f.S. Available online: https://www.ncsi.gov.om/Pages/NCSI.aspx (accessed on 21 June 2021).
- NCSI. Community Statistics; NCSI: Muscat, Oman, 2021; pp. 3–4. [Google Scholar]
- Brown, S.R. Q Methodology and Qualitative Research. Qual. Heal. Res. 1996, 6, 561–567. [Google Scholar] [CrossRef]
- Cohen, J. A Coefficient of Agreement for Nominal Scales. Educ. Psychol. Meas. 1960, 20, 37–46. [Google Scholar] [CrossRef]
- Landis, J.R.; Koch, G.G. The Measurement of Observer Agreement for Categorical Data. Biometrics 1977, 33, 159–174. [Google Scholar] [CrossRef] [Green Version]
- Likert, R. A technique for the measurement of attitudes. Arch. Psychol. 1932, 140, 1–55. [Google Scholar]
- Le, H.T.H.; Tuyet, V.T.B.; Hanh, C.T.B.; Do, Q.H. Factors Affecting Tax Compliance among Small- and Medium-sized Enterprises: Evidence from Vietnam. J. Asian Financ. Econ. Bus. 2020, 7, 209–217. [Google Scholar] [CrossRef]
- Islam, T.U. Ranking of Normality Tests: An Appraisal through Skewed Alternative Space. Symmetry 2019, 11, 872. [Google Scholar] [CrossRef] [Green Version]
- Murtagh, F.; Heck, A. Multivariate Data Analysis; Springer Science & Business Media: Berlin, Germany, 2012; Volume 131. [Google Scholar]
- Brown, J.D. What is Construct Validity. In Encyclopedia of Evaluation; Sage Publications, Inc.: Thousand Oaks, CA, USA, 2005; Volume 4, pp. 8–12. [Google Scholar]
- Alnaser, F.M.; Ghani, M.A.; Rahi, S. Service quality in Islamic banks: The role of PAKSERV model, customer satisfaction and customer loyalty. Accounting 2018, 63–72. [Google Scholar] [CrossRef]
- Thorndike, R.M. Book Review: Psychometric Theory (3rd ed.) by Jum Nunnally and Ira Bernstein New York: McGraw-Hill, 1994, xxiv + 752 pp. Appl. Psychol. Meas. 1995, 19, 303–305. [Google Scholar] [CrossRef]
- Hair, J.F., Jr.; Sarstedt, M.; Hopkins, L.; Kuppelwieser, V.G. Partial least squares structural equation modeling (PLS-SEM). Eur. Bus. Rev. 2014, 26, 106–121. [Google Scholar] [CrossRef]
- Core Team, R. R: A Language and Environment for Statistical Computing; R Foundation for Statistical Computing: Vienna, Austria, 2013. [Google Scholar]
- Oulasvirta, A.; Suomalainen, T.; Hamari, J.; Lampinen, A.; Karvonen, K. Transparency of Intentions Decreases Privacy Concerns in Ubiquitous Surveillance. Cyberpsychology Behav. Soc. Netw. 2014, 17, 633–638. [Google Scholar] [CrossRef] [PubMed]
Ref. | Context | Independent Variables | Dependent Variables | Mediating Variables |
---|---|---|---|---|
[28] | e-government | * Data collection information, * data processing information, * data use information | Cynicism, emotional exhaustion | * Privacy information * Transparency |
[29] | e-banking | Access | * Perceived privacy | Perceived effectiveness of privacy policy, * privacy control, * privacy risk, privacy concern, * trust |
[30] | Consumer behavior, m-communication | * Usage intention | Privacy concern | * Trust, * perceived risk |
[31] | e-government | Optimism bias, * perceived privacy, * perceived trust, perceived security | E-government use behavior | * Perceived risk |
[32] | m-government, Perceived trust, Social influence | Social influence, cost of service, * perceived trust, perceived usefulness, perceived ease of use | * Usage behavior | Behavioral intention |
[33] | e-government, e-services, e-commerce | Perceptions of privacy policy taken, perceptions of organizational privacy self-regulations | Privacy concerns, * trust beliefs, non-self-disclosure behavior | * Privacy risk, * control perceptions |
[34] | e-government | Intention to use | Preserved information quality, preserved system quality, preserved service quality, preserved usefulness, preserved ease of use, * preserved privacy | * Trust in e-government |
Instruments | Items | Measures | References |
---|---|---|---|
Preventive Monitor | PM1 | Send notification if anyone attempts to access their personal information. | [39,44] |
PM2 | Aware of which personal information has been used in e-government services. | [39] | |
PM3 | The information should be tracked when it has been shared. | ||
PM4 | Determine who should be involved in the monitoring. | [35] | |
PM5 | Appropriateness of sharing the information. | [44] | |
Privacy Control | PC1 | Segregation of permissions. | [36,39] |
PC2 | The purpose of request. | [37,39] | |
PC3 | The ability to share basic information. | [39] | |
PC3 | Use government regulations to permit sharing information. | [38] | |
PC4 | Control the request when personal information is requested. | [35,39] | |
Lifecycle Protection | LP1 | Authentication methods are used in e-government services. | [39] |
LP2 | Use the information implicitly rather than explicitly. | [45] | |
LP3 | Destroy the requested information at the end of the integration. | [41,42] | |
LP4 | Govern policies and rules to protect privacy. | [37,41] | |
LP5 | Protect personal information at all stages from start to end. | [38,39,41] | |
Impact Assessment | IA1 | Whenever there is a need to share data between government entities, the impact must be evaluated. | [33,36,38] |
IA2 | Assist individuals in making decisions when personal information is requested. | [33,37] | |
IA3 | Impact assessment helps determine who should be permitted to use the required information. | [33,38] | |
IA4 | It is essential to assess the impact at all stages of the services, from the beginning to the end. | [38] | |
IA5 | For an accurate impact assessment, it is necessary to use the sensitivity scale. | [8] | |
Service Trust | ST1 | Trustworthy e-governance increases the use of e-government services. | [33,43,46] |
ST2 | Trustworthy e-governance increases the participation of individuals to provide their correct information. | [33,46] | |
ST3 | The clarity in all stages when sharing personal information will increase the trustworthiness of the e-services. | [47] | |
ST4 | Citizen participation in privacy protection will increase the trustworthiness of the e-government service. | [35,37,47,48] | |
ST5 | Determining the impact will increase the trustworthiness of the e-government service. | [43] | |
ST6 | Protecting personal information will increase the trust between the data owner and e-government services. | [43,46] |
Phase | Description |
---|---|
Definition’s formalization | Construct definitions were derived from various sources, including preexisting definitions and reviews of relevant literature conducted in this study. |
Measurement instruments | The scales were derived as accurately as possible from the relevant literature. |
Sample Size | Determine who will be targeted in this study and how many people will be involved. |
Feedback | To perform the survey validation, academics and experts in this field were provided with the draft survey. A total of two academics, as well as three experts, were involved. Therefore, five changes were made to the survey questions to make the survey more consistent. |
Sorting | The method used for sorting is Q-sorting. The participants were instructed to pick and drop random items within boxes, and it was performed in two stages to improve the reliability of the sorting. |
Testing | Two academics completed the sorted survey to enhance validity and reliability. As a result, there has been a slight change in the survey’s terms, structure, and length. |
Pilot test | Prior to sending the survey publicly, ten people completed the survey, including academics, experts, and others. Based on the feedback they provided, a minor change has been made to the design. |
Sorted | |||||||||
---|---|---|---|---|---|---|---|---|---|
Predicted Sort | Instruments | PM | PC | LP | IA | ST | N/A | Total | Hits |
PM | 11 | 1 | 1 | 1 | 14 | 76% | |||
PC | 2 | 10 | 1 | 1 | 14 | 71% | |||
LP | 1 | 1 | 10 | 2 | 14 | 71% | |||
IA | 1 | 14 | 3 | 16 | 88% | ||||
ST | 1 | 1 | 2 | 10 | 2 | 16 | 63% | ||
Questions: | 74 | Hits: | 55 | Total Ratio: | 74% |
Sorted | |||||||||
---|---|---|---|---|---|---|---|---|---|
Predicted Sort | Instruments | PM | PC | LP | IA | ST | N/A | Total | Hits |
PM | 12 | 12 | 100% | ||||||
PC | 11 | 1 | 12 | 92% | |||||
LP | 12 | 12 | 100% | ||||||
IA | 1 | 12 | 1 | 14 | 86% | ||||
ST | 12 | 2 | 14 | 86% | |||||
Questions: | 64 | Hits: | 59 | Total Ratio: | 93% |
Instruments | Cronbach’s Alpha | Questions |
---|---|---|
Preventive monitor (PM) | 0.962 | 6 |
Privacy control (PC) | 0.961 | 6 |
Lifecycle protection (LP) | 0.905 | 6 |
Impact assessment (IA) | 0.932 | 6 |
Service trust (ST) | 0.973 | 6 |
Total | 0.946 | 30 |
Instruments | Item | Skewness | Kurtosis |
---|---|---|---|
Preventive monitor (PM) | PM1 | −1.136 | 0.564 |
PM2 | −1.178 | 0.673 | |
PM3 | −1.063 | 0.498 | |
PM4 | −1.249 | 1.004 | |
PM5 | −1.148 | 0.706 | |
PM6 | −1.068 | 0.495 | |
Privacy control (PC) | PC1 | −0.999 | 0.052 |
PC2 | −0.978 | −0.174 | |
PC3 | −0.878 | −0.425 | |
PC4 | −0.988 | 0.015 | |
PC5 | −1.023 | 0.088 | |
PC6 | −0.937 | −0.393 | |
Lifecycle protection (LP) | IA1 | −1.037 | −0.238 |
IA2 | −1.416 | 1.172 | |
IA3 | −1.234 | 0.104 | |
IA4 | −1.676 | 2.117 | |
IA5 | −1.357 | 0.553 | |
IA6 | −1.609 | 1.794 | |
Impact assessment (IA) | LP1 | −1.655 | 1.445 |
LP2 | −1.719 | 2.333 | |
LP3 | −1.526 | 1.126 | |
LP4 | −1.673 | 2.108 | |
LP5 | −1.717 | 1.751 | |
LP6 | −1.433 | 1.186 | |
Service trust (ST) | ST1 | −0.631 | −0.806 |
ST2 | −0.711 | −0.761 | |
ST3 | −0.799 | −0.618 | |
ST4 | −0.676 | −0.787 | |
ST5 | −0.814 | −0.602 | |
ST6 | −0.739 | −0.737 |
Instruments | Item | Mean | Std. Dev. | Loading | AVE | AVE Square Root | CR |
---|---|---|---|---|---|---|---|
Preventive monitor (PM) | PM1 | 4.39 | 0.788 | 0.709 | 0.615 | 0.784 | 0.905 |
PM2 | 4.41 | 0.775 | 0.838 | ||||
PM3 | 4.41 | 0.740 | 0.781 | ||||
PM4 | 4.40 | 0.789 | 0.840 | ||||
PM5 | 4.37 | 0.791 | 0.695 | ||||
PM6 | 4.37 | 0.773 | 0.830 | ||||
Privacy control (PC) | PC1 | 4.46 | 0.695 | 0.713 | 0.544 | 0.738 | 0.877 |
PC2 | 4.44 | 0.727 | 0.749 | ||||
PC3 | 4.46 | 0.681 | 0.778 | ||||
PC4 | 4.46 | 0.698 | 0.754 | ||||
PC5 | 4.47 | 0.695 | 0.648 | ||||
PC6 | 4.47 | 0.695 | 0.775 | ||||
Lifecycle protection (LP) | IA1 | 4.50 | 0.696 | 0.807 | 0.567 | 0.753 | 0.886 |
IA2 | 4.50 | 0.765 | 0.705 | ||||
IA3 | 4.55 | 0.701 | 0.836 | ||||
IA4 | 4.55 | 0.753 | 0.697 | ||||
IA5 | 4.59 | 0.658 | 0.821 | ||||
IA6 | 4.51 | 0.798 | 0.629 | ||||
Impact assessment (IA) | LP1 | 4.66 | 0.630 | 0.528 | 0.597 | 0.773 | 0.897 |
LP2 | 4.55 | 0.753 | 0.717 | ||||
LP3 | 4.64 | 0.623 | 0.873 | ||||
LP4 | 4.54 | 0.770 | 0.853 | ||||
LP5 | 4.68 | 0.605 | 0.737 | ||||
LP6 | 4.50 | 0.777 | 0.870 | ||||
Service trust (ST) | ST1 | 4.35 | 0.708 | 0.825 | 0.584 | 0.764 | 0.892 |
ST2 | 4.38 | 0.716 | 0.824 | ||||
ST3 | 4.42 | 0.705 | 0.631 | ||||
ST4 | 4.37 | 0.714 | 0.818 | ||||
ST5 | 4.42 | 0.706 | 0.627 | ||||
ST6 | 4.39 | 0.718 | 0.827 |
Constructs | Cross Correlations | ||||
---|---|---|---|---|---|
ST | PM | PC | LP | IA | |
ST | 1.000 | ||||
PM | 0.703 ** | 1.000 | |||
PC | 0.729 ** | 0.725 ** | 1.000 | ||
LP | 0.618 ** | 0.505 ** | 0.572 ** | 1.000 | |
IA | 0.658 ** | 0.583 ** | 0.585 ** | 0.523 ** | 1.000 |
Hypothesis | Relations | Std. Error | Std. Beta (β) | t | p | F | Finding |
---|---|---|---|---|---|---|---|
H1 | PC → ST | 0.063 | 0.281 | 5.024 | 0.000 | 474.251 | Supported |
H2a | IA → PC | 0.032 | 0.160 | 3.882 | 0.000 | 217.313 | Supported |
H2b | IA → ST | 0.041 | 0.138 | 2.953 | 0.003 | 318.831 | Supported |
H2c | IA → LP | 0.035 | 0.481 | 9.106 | 0.000 | 157.564 | Supported |
H3a | PM → ST | 0.058 | 0.160 | 4.755 | 0.000 | 408.678 | Supported |
H3b | PM → PC | 0.043 | 0.665 | 13.951 | 0.000 | 463.757 | Supported |
H4 | LP → ST | 0.057 | 0.245 | 5.721 | 0.000 | 258.656 | Supported |
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations. |
© 2021 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
AlAbdali, H.; AlBadawi, M.; Sarrab, M.; AlHamadani, A. Privacy Preservation Instruments Influencing the Trustworthiness of e-Government Services. Computers 2021, 10, 114. https://doi.org/10.3390/computers10090114
AlAbdali H, AlBadawi M, Sarrab M, AlHamadani A. Privacy Preservation Instruments Influencing the Trustworthiness of e-Government Services. Computers. 2021; 10(9):114. https://doi.org/10.3390/computers10090114
Chicago/Turabian StyleAlAbdali, Hilal, Mohammed AlBadawi, Mohamed Sarrab, and Abdullah AlHamadani. 2021. "Privacy Preservation Instruments Influencing the Trustworthiness of e-Government Services" Computers 10, no. 9: 114. https://doi.org/10.3390/computers10090114
APA StyleAlAbdali, H., AlBadawi, M., Sarrab, M., & AlHamadani, A. (2021). Privacy Preservation Instruments Influencing the Trustworthiness of e-Government Services. Computers, 10(9), 114. https://doi.org/10.3390/computers10090114