Innovative technology has revolutionized the future of work and will continue to play a vital role in hybrid working arrangements. Technology brings forward the introduction of new threats which increases privacy concerns amongst users. Research around privacy concerns has been explored using different lenses with variance in findings. The Privacy paradox theory has been put forward in various studies as an explanation for inconsistencies where users report having worries about their online privacy but have irresponsible online behavior. This study will examine the privacy paradox theory in the hybrid working environment. A quantitative methodology on a sample population working in hybrid mode (N=204) was followed by using an adaptation of the Concern for Information Privacy scale. The key findings of this study conclude a correlation between behavior and privacy concerns with a p-value of 0.012 but however having a weak relationship. It was also found that there is a disparity of behavior in the working generation with baby boomers showing more concerns and having positive behavior than Gen Z. Gender also influences behavior and concerns, with females exhibiting different behaviors as compared to males. There is a strong positive correlation between privacy awareness and concerns and between privacy awareness and behavior.
Keywords: Privacy Concerns, Privacy Paradox, Hybrid Teams, Concern for Information Privacy Scale, Privacy Attitude, Privacy Behaviour, Working Generation Privacy Behaviour.
Ahmadi, S. (2024). Systematic literature review on cloud computing security: Threats and mitigation strategies. Journal of Information Security, 15(2): 148–167. https://doi.org/10.4236/jis.2024.152010.
Ahmed, Y.M., & Al Kahlout, M.I. (2024). A novel model for protecting the privacy of digital images in cloud using permutated fragmentation and encryption algorithms. International Journal of Computer Network and Information Security, 16(5): 35–45. https://doi.org/10.5815/ijcnis.2024.05.04.
Ajzen, I. (1991). The theory of planned behavior. Organizational Behavior and Human Decision Processes, 50(2): 179–211. https://doi.org/10.1016/0749-5978(91)90020-t.
Bhatia, J., & Breaux, T. (2018). Semantic Incompleteness in Privacy Policy Goals. IEEE 26th International Requirements Engineering Conference (RE), Banff, AB, Canada, Pages 159–169.
Berendt, B., Günther, O., & Spiekermann, S. (2005). Privacy in e-commerce: Stated preferences vs. actual behavior. Communications of the ACM, 48(4): 101–106. https://doi.org/10.1145/1053291.1053295.
Buchanan, T., Paine, C., Joinson, A., & Reips, U. (2006). Development of measures of online privacy concern and protection for use on the Internet. Journal of the American Society for Information Science and Technology, 58(2): 157–165. https://doi.org/10.1002/asi.20459.
Cram, W.A., D’Arcy, J., & Proudfoot, J.G. (2019). Seeing the forest and the trees: A meta-analysis of the antecedents to information security policy compliance. MIS Quarterly, 43(2). https://doi.org/10.25300/misq/ 2019/1511.
Cresswell, J. (2009). Qualitative, quantitative, and mixed methods approaches (3rd Eds.). Sage.
Cronk, R.J. (2022). Strategic Privacy by Design, Second Edition. International Association of Privacy Professionals (IAPP). Available at: https://iapp.org/resources/article/strategic-privacy-by-design/.
Dimodugno, M., Hallman, S., Plaisent, M., & Bernard, P. (2021). The effect of privacy concerns, risk, control, and trust on individuals’ decisions to share personal information: A game theory-based approach. Journal of Physics: Conference Series. https://doi.org/10.1088/1742-6596/2090/1/012017.
Dinev, T., & Hart, P. (2006). An extended privacy calculus model for e-commerce transactions. Information Systems Research, 17(1). https://doi.org/10.1287/isre.1060.0080.
Dong, Z. (2024). System-justifying belief alleviates online privacy concerns: The mediating role of relatedness satisfaction and general trust. Computers in Human Behavior, 154. https://doi.org/10.1016/j.chb.2024.108140.
Durbarry, R. (2018). Research Methods for Tourism Students.
Gashami, J.P.G., Chang, Y., Rho, J.J., & Park, M.C. (2015). Privacy concerns and benefits in SaaS adoption by individual users: A trade-off approach. Information Development, 32(4): 837–852.
Gerber, N., Gerber, P., & Volkamer, M. (2018). Explaining the privacy paradox: A systematic review of the literature investigating privacy attitude and behavior. Computers & Security, 77: 226–261. https://doi.org/10. 1016/j.cose.2018.04.002.
Goldberg, L.R. (1990). An alternative "description of personality": The Big-Five factor structure. Journal of Personality and Social Psychology, 59(6): 1216–1229. https://doi.org/10.1037/0022-3514.59.6.1216.
Grey, S. (2023). The future of work: Adapting to remote and hybrid work models in a digital age. Journal of Business & Financial Affairs, 12(1): 443.
Grobelny, J. (2023). Factors driving the workplace well-being of individuals from co-located, hybrid, and virtual teams: The role of team type as an environmental factor in the job demand–resources model. International Journal of Environmental Research and Public Health, 20: 3685. https://doi.org/10.3390/ijerph20043685.
Haines, A., Perkins, E., Evans, E., & McCabe, R. (2018). Multidisciplinary team functioning and decision making within forensic mental health. Mental Health Review Journal, 23(3): 185–196. https://doi.org/10.1108/mhrj-01- 2018-0001.
Hoffmann, C.P., Lutz, C., & Ranzini, G. (2016). Privacy cynicism: A new approach to the privacy paradox. Journal of Psychosocial Research on Cyberspace, 10(7). https://doi.org/10.2139/ssrn.3319830.
Holvast, J. (2009). The future of identity in the information society. Privacy and identity. IFIP Advances in Information and Communication Technology, 298. https://doi.org/10.1007/978-3-642-03315-5_2.
Hong, W., & Thong, J. (2013). Internet privacy concerns: An integrated conceptualization and four empirical studies. MIS Quarterly, 31(1): 275–298. https://www.jstor.org/stable/43825946.
Jamin, J., Md Arifin, N., Mokhtar, S., Rosli, N., & Mohd Shukry, A. (2019). Privacy concern of personal information in the ICT usage, internet and social media perspective. Malaysian E-Commerce Journal, 3: 15–17. https://doi.org/10.26480/mecj.02.2019.15.17.
Khweiled, R., Jazzar, M., & Eleyan, D. (2021). Cybercrimes during COVID-19 pandemic. International Journal of Information Engineering and Electronic Business, 13: 1–10. https://doi.org/10.5815/ijieeb.2021.02.01.
Kim, Y., Kim, S.H., Peterson, R.A., & Choi, J. (2023). Privacy concern and its consequences: A meta-analysis. Technological Forecasting and Social Change, 196: 122789. https://doi.org/10.1016/j.techfore.2023.122789.
Kitkowska, M. (2018). User-centric privacy: A study of awareness and attitudes. Presented at the Networked Privacy Workshop, 2018. Available at: https://networkedprivacy2018.wordpress.com/wp-content/uploads/201 8/04/kitkowska.pdf.
Kleindienst, D., Nüske, N., Rau, D., & Schmied, F. (2017). Beyond mere compliance, Delighting customers by implementing data privacy measures. In Leimeister & Brenner (Eds.), Proceedings of the 13th International Conference on Wirtschaftsinformatik (WI 2017), Pages 807–821, St. Gallen, Switzerland.
Kokolakis, S. (2017). Privacy attitudes and privacy behavior: A review of current research on the privacy paradox phenomenon. Computers & Security, 64: 122–134. https://doi.org/10.1016/j.cose.2015.07.002.
Kwon, J., & Johnson, M.E. (2015). Protecting patient data – The economic perspective of healthcare security. IEEE Security & Privacy, 13(5): 90–95. https://doi.org/10.1109/msp.2015.113.
Langheinrich, M. (2001). Privacy by design – Principles of privacy-aware ubiquitous systems. In Abowd, Brumitt, & Shafer (Eds.), Proceedings of the Third International Conference on Ubiquitous Computing (UbiComp 2001), Pages 273–291, Springer. https://doi.org/10.1007/3-540-45427-6_23.
Lowry, P.B., Cao, J., & Everard, A. (2011). Privacy Concerns Versus Desire for Interpersonal Awareness in Driving the Use of Self-Disclosure Technologies: The Case of Instant Messaging in Two Cultures. Journal of Management Information Systems, 27(4): 163–200. https://doi.org/10.2753/mis0742-1222270406.
Malhotra, N., Kim, S., & Agarwal, J. (2004). Internet users’ information privacy concerns (IUIPC): The construct, the scale, and a causal model. Information Systems Research, 15(4): 336–355.
Marshall, C., & Rossman. (2021). Designing qualitative research. Sage.
Nissenbaum, H. (2004). Privacy as contextual integrity. Washington Law Review, 79(1): 119–158.
Nower, N. (2023). Supporting audio privacy-aware services in emerging IoT environments. International Journal of Wireless and Microwave Technologies, 11(3): 22–29. https://doi.org/10.5815/ijwmt.2021.03.04.
Ponemon Institute (2014). A year of mega breaches. Ponemon Institute.
Plangger, K., & Montecchi, M. (2022). Thinking beyond Privacy Calculus: Investigating Reactions to Customer Surveillance. Journal of Interactive Marketing, 50(1): 32-44. https://doi.org/10.1016/j.intmar.2019.10.004.
Raghad, K., et al. (2021). Cybercrimes during COVID-19 Pandemic. International Journal of Information Engineering and Electronic Business, 13(2). https://doi.org/10.5815/ijieeb.2021.02.01.
Rajkumar, P.V., et al. (2023). Cyber security and hybrid work environments. SAM Advanced Management Journal, 88(3).
Rath, D.K., & Kumar, A. (2021). Information privacy concern at individual, group, organization and societal level – A literature review. XIMB Journal of Management, 18(2): 171–186. https://doi.org/10.1108/xjm-08-2020-0096.
Rogers, R.W. (1975). A Protection Motivation Theory of Fear Appeals and Attitude Change. J Psychol., 91(1): 93–114. https://doi.org/10.1080/00223980.1975.9915803.
Russel, S. (1986). Privacy: History, legal, social, and ethical aspects and privacy: Its role in federal government information policy. Institute of Education Science, 35(1): 7–42.
Schulza, J., & Krumm, S. (2016). The “virtual team player”: A review and initial model of knowledge, skills, abilities, and other characteristics for virtual collaboration. Organizational Psychology Review, 7(1). https://doi. org/10.1177/2041386616675522.
Shank, J. (1986). Technology as a Threat to Privacy.
Smith, H.J., Milberg, S.J., & Burke, S.J. (n.d.). Information privacy: Measuring individuals’ concerns about organizational practices. MIS Quarterly, 20(2): 167–196. https://doi.org/10.2307/249477.
Solove, D. (2015). Social dimensions of privacy. Cambridge University Press.
Sorum, P., Stein, C., Wales, D., & Pratt, D. (2022). A Proposal to Increase Value and Equity in the Development and Distribution of New Pharmaceuticals. International Journal of Health Services, 52(3): 363–371. https://doi.org/ 10.1177/00207314221100647.
Sostero, M., Milasi, S., Hurley, J., & Mathias, E. (2023). Teleworkability and the COVID-19 crisis: Potential and actual prevalence of remote work across Europe. IZA Journal of Labor Policy. https://doi.org/10.2478/izajolp- 2023-0006.
Soumelidou, A., & Tsohou, A. (2021). Towards the creation of a profile of the information privacy-aware user through a systematic literature review of information privacy awareness. Telematics and Informatics, 61: 101592. https://doi.org/10.1016/j.tele.2021.101592.
Taddicken, M. (2014). The ‘privacy paradox’ in the social web: The impact of privacy concerns, individual characteristics, and the perceived social relevance on different forms of self-disclosure. Journal of Computer- Mediated Communication, 19(2): 248–273. https://doi.org/10.1111/jcc4.12052.
Van, S., et al. (2006). Concern for Information Privacy and Online Consumer Purchasing. J. AIS. https://doi.org/ 10.17705/1jais.00092.
Vidhyaa, B., & Ravichandran, M. (2022). A literature review on hybrid work model. International Journal of Research Publication and Reviews.
Westin, A.F. (2003). Social and political dimensions of privacy. Journal of Social Issues, 59(2): 431–453.
Wirth, J. (2017). Strength of ties as an antecedent of privacy concerns: A qualitative research study. In Proceedings of the Twenty-Third Americas Conference on Information Systems (AMCIS), Boston, MA. AIS Electronic Library (AISeL). https://aisel.aisnet.org/amcis2017/informationsystems/presentations/13.
Wisniewski, P.J., & Page, X. (2022). Privacy theories and frameworks. Springer. https://doi.org/10.1007/978-3-0 30-82786-1.
Xu, H., Teo, H.H., Tan, B.C.Y., & Agarwal, R. (2010). The role of push-pull technology in privacy calculus: The case of location-based services. Management Information Systems Quarterly, 34(1): 135–174.
Zhou, T. (2011). Understanding online community user participation: A social influence perspective. Internet Research, 21(1): 67–81. https://doi.org/10.1108/10662241111104884.
Source of Funding:
This study received no specific grant from any funding agency in the public, commercial, or not-for-profit sectors.
Competing Interests Statement:
The authors declare that they have no competing interests related to this work.
Consent for publication:
The authors declare that they consented to the publication of this study.
Authors' contributions:
All the authors made an equal contribution in the Conception and design of the work, Data collection, Drafting the article, and Critical revision of the article. All the authors have read and approved the final copy of the manuscript.
Availability of data and materials:
Authors are willing to share data and material on request.
Ethical Approval:
This study was approved by the ethics committee of the Open University of Mauritius.
Institutional Review Board Statement:
Not applicable for this study.
Informed Consent:
All participants in this study voluntarily gave their informed consent prior to their involvement in the research.
A New Issue was published – Volume 8, Issue 3, 2025
11-07-2025 13-04-2025