Knowledge Management International Conference (KMICe) 2014, 12 – 15 August 2014, Malaysia
http://www.kmice.cms.net.my/ 332
Investigating Culture Influences to Information Privacy
Wan Abdul Rahim Wan Mohd Isa, Anitawati Mohd Lokman, or Laila Md oor
and Emely Shazwan Abdul Wahid Universiti Teknologi MARA (UiTM) Malaysia,
ABSTRACT There is strong inclination on the importance of
knowledge management (KM) concept and role towards
ensuring components such as ethics and culture are
relevant to the applications development, implementation
and maintenance. However, less is understood on the
relationship between culture and information privacy.
The aim of this study is to investigate the cultural
influences to privacy by using Malaysia’s computer
professionals’ self-regulatory efficacy concerning
information privacy practices and Islamic culture, as the
case study. This study adapts the theoretical frameworks
of ‘Islamic Cultural Dimensions’ and ‘Information
Privacy Self-regulatory Efficacy Dimensions’. The
survey forms were sent to Muslims working in computer
or Information Technology (IT) fields in Malaysia, with
at least one year working experience. A total of 435 data
were being analysed by using Ordinal Regression
Analysis. The findings include: (i) a conceptual
framework of ‘information privacy self-regulatory
efficacy dimensions’ and ‘cultural dimensions’, and (ii)
empirical findings on the mixture of a positive and
negative empirical relationship on the culture influence
to the self-regulatory efficacy towards safeguarding
information privacy. Future work may involve
incorporating the knowledge management concepts into
information privacy and culture model to aid the
application’s development, implementation, maintenance
and usage.
Keywords: Culture, Information Privacy, Ethics
I I TRODUCTIO Computer professionals have the understanding on their consumers’ data handling and manipulation (Oz, 1992). It is important for them to understand the issues surrounding information privacy in order to protect the user’s rights (Henderson, & Snyder (1999).
In general, information privacy encompasses:-
‘The rights and responsibilities of both individuals and organizations related to the collection, use, disclosure and retention of personally identifiable information’ (Culnan, 2011).
Research issues on information privacy are mainly focused on how the data are gathered, stored, analysed and reported while ignoring the data handling process itself. However, there exists
information privacy issues related to the person responsible for managing the data (Reynolds, 2011).
There is strong inclination on the importance of knowledge management (KM) role in ensuring components such as ethics and culture are relevant to the applications development and maintenance (Samsuri, Ismail, & Ahmad, 2013). In addition, there is a need for more research to investigate on how different cultural practices of morality and computer use may shape the different development patterns of privacy self-efficacy (Kuo, Lin, & Hsu, 2007). Less is understood on the relationship between culture and information privacy.
The aim of this study is to investigate the cultural influences to privacy by using Malaysia’s computer professionals’ self-regulatory efficacy concerning information privacy practices, as the case study. The following sections discuss; (i) literature review, (ii) conceptual framework of cultural influences to information privacy self regulatory efficacy, (iii) research methods, (iv) results and analysis and (v) conclusion.
II LITERATURE REVIEW
A. Privacy, Culture and Knowledge
Management
Culture value and privacy concern had become important aspects when designing and implementing culturally-sensitive IT applications (Zakaria, Stanton, & Sarkar-Barney, 2003). IT designers can use different approaches to ensure the effective use of IT based on prevailing culture values (Zakaria, Stanton, & Sarkar-Barney, 2003).
There is strong inclination on the importance of knowledge management (KM) role in ensuring components that are relevant to the applications development and maintenance (Samsuri, Ismail, & Ahmad, 2013). Such components are (i) legislation, (ii) ethics (iii) technology and (iv) culture; which are considered important towards securing the privacy of the application (Samsuri, Ismail, & Ahmad, 2013).
Application should not depended entirely on the technology-centered development as it must also incorporate the explicit and tacit knowledge concept into ethics and culture model (Samsuri, Ismail, &
Knowledge Management International Conference (KMICe) 2014, 12 – 15 August 2014, Malaysia
http://www.kmice.cms.net.my/ 333
Ahmad, 2013) during the application's development, implementation, maintenance and usage.
B. Dimensions of Information Privacy Self-
regulatory Efficacy
The Social Cognitive Theory (SCT) study implies
on the morality domain in self-regulation. Bandura
(1991) in his research stated that personal factors
such as moral thought, affective self-reactions,
moral conduct, and environmental factors will
interact and influence each other in both directions
(as cited from Kuo et al., 2007). There are different
elements affecting the self-regulatory efficacy and
come out with the dimensions of information
privacy self-regulatory efficacy (Kuo et al. (2007).
Table 1 shows the dimensions of information
privacy self-regulatory efficacy.
Table 1. Dimensions of Information Privacy Self-Regulatory
Efficacy (Kuo et al., 2007).
Dimension (Challenge Level)
Protection on-distribution on-Acquisition
Improper use Improper transfer Improper acquisition
Improper use Internal/external
unauthorized secondary use
Improper collection
Improper
monitoring Privacy
invasion
Improper storage
Improper transfer Improper access
Improper collection Improper analysis
Protection: One’s perception of efficacy in protecting others’ privacy
information.
on-distribution: One’s perception of efficacy in sanctioning against distributing the privacy information to others.
on-acquisition: One’s perception of efficacy in sanctioning against
acquiring the privacy information to others.
Based on the relevant literature review, Kuo et al.
(2007) has divided the information privacy self-
regulatory efficacy into three dimensions; namely,
(i) Protection, (ii) 7on-distribution and (iii) 7on-
acquisition (see Table 1). The general description
is as follow (Kuo et al., 2007):-
(i) Protection refers ‘to whether an individual can
take the necessary courses of action for
guarding accidental disclosures of information
in a public environment or setting’.
(ii) Non-distribution refers ‘to whether a person
can exert his or her control not to distribute the
privacy information of others’.
(ii) Non-acquisition refers ‘to whether a person has
the self-confidence to refuse to acquire and use
privacy information before obtaining necessary
authorization’.
C. Culture and Kansei
The studies involving Kansei span across industrial
product design, service and hospitality design,
interface design, interaction design and many more.
Kansei is unique to cultural studies. Cross-cultural
investigation were performed to understand
similarities and differences of Kansei or affective
values (Yashmi, Rizi, & Sabet, 2013; Lokman,
Ishak, Razak, & Aziz, 2012; Adelabu, Yamanaka,
& Moalosi, 2012; Peranginangin, Chen, & Shieh,
2011). Other example include cross-cultural
dynamic of demand in African design culture
(Adelabu et al., 2012) adoption of Kansei approach
for improving design process of cross-culturally
sensitive products.
III CO CEPTUAL FRAMEWORK OF
CULTURAL I FLUE CES TO
I FORMATIO PRIVACY SELF
REGULATORY EFFICACY
Figure 1. Conceptual Framework of Cultural Influences to
Information Privacy Self-Regulatory Efficacy.
Figure 1 illustrates the conceptual framework of
cultural influences to information privacy self-
regulatory efficacy. The framework were adapted
from cultural dimensions (Hofstede, & Hofstede,
2005; Trompenaars, 1994; Halls, 1996), information
privacy self-regulatory efficacy dimensions (Kuo et
al., 2007) and Islamic culture (Wan Abdul Rahim,
Nor Laila, & Shafie, 2008a; Wan Abdul Rahim, Nor
Laila, & Sharifah Sakinah, 2008b).
A. High Uncertainty Avoidance (HUA)
Hofstede and Hofstede (2005) stated that ‘HUA is a
belief that often relies on the ultimate truth, and
always refers to the society that avoid taking risks
as well as uncomfortable with uncertainty’.
Hofstede and Hofstede (2005) also gives indirect
impression that the existence of Islamic religion is
based on the absolute Truth that human can possess.
Since Islam is based on the Truth belief, we can
Knowledge Management International Conference (KMICe) 2014, 12 – 15 August 2014, Malaysia
http://www.kmice.cms.net.my/ 334
relate the idea of Islam as HUA cultures (Wan
Abdul Rahim et al., 2008a).
B. Short Term Orientation (STO)
STO is generally ‘nurturing of virtues that are
related to the past as well as the present; respecting
the tradition and satisfying the social obligation’
(Hofstede, & Hofstede, 2005). The two similarities
of Islam and STO are; (i) Islam are concern with the
Truth and (ii) it has universal guideline on the
definition of good and evil (Wan Abdul Rahim et
al., 2008). Islam virtues came from the absolute
Truth and the focus is on the good judgement of the
past, in which the decisions are based on the Holy
Book and this can be considered related to STO
(Hofstede, & Hofstede, 2005).
C. Individualism (I D) and Collectivism (COL)
Collectivism refers to the ‘culture where people
integrated as one cohesive group’, whereas
individualism refers to ‘cultures that have loose ties
among the people’ (Hofstede, & Hofstede, 2005).
Since Islamic culture is based on the concept that
humans are as one equal and united community,
thus, we can relate the role of Muslims lies between
‘Individualism’ and ‘Collectivism’ (Wan Abdul
Rahim et al., 2008).
D. High Power Distance (HPD)
High Power Distance (HPD) concerns on the
‘inequality of power distribution in a society’
(Hofstede, & Hofstede, 2005). Islamic culture is
basically high in power distance, as the Islamic
society is expected to follow the rules and
regulations as stated by the God’s revelation and
authoritative resources. The Muslim resources are
solely dependent on their Holy Book, Prophets and
authoritative sources and this can be considered
related to ‘High Power Distance’ (Wan Abdul
Rahim et al., 2008).
E. Polychronics (POL)
Polychronic cultures are ‘able to adapt any changes
on the initial plan and prone to multitasking’ (Halls,
1966). Islamic culture is considered as Polychronics
culture due to the multiple roles and responsibilities
as an individual as well as a member of the society
(Wan Abdul Rahim et al., 2008).
F. High Context (HC)
High Context dimension requires ‘only high level
details of information exchange’ (Halls, 1966).
Islamic culture falls in High Context dimension
because of the nature of information dissemination
and communication. A good example of this can be
seen on the constant practice of common phrases
among Muslims, for instance, “Bismillah’, at the
beginning of any tasks, which reflects the attributes
and characteristics of ‘High Context’ community
(Shafie, Wan Abdul Rahim, Nor Laila, & Mohd
Shukri, 2010).
The second segment of the conceptual framework is
the Information Privacy Self-regulatory Efficacy
Dimensions, which are enclosed within the Islamic
Cultural Dimensions, consisting of three major
components: Protection, 7on-distribution and 7on-
acquisition, which are the main areas of this
research. Each of these components has their own
elements as shown in Figure 1. Furthermore, Kuo et
al. (2007) uses the Self-efficacy Theory introduced
by Bandura (1977) as the theoretical background.
Table 2. Dimensions of Information Privacy Self-Regulatory
Efficacy (Adapted from Kuo et al., 2007).
Information Privacy Self-
regulatory Efficacy Dimensions
Dimension of Culture
Influence
1) Protection
Copy Information (CI) HC – Unethical copying of
information
Protect Information (PI) STO - Improper monitoring
STO - Privacy invasion HC - Improper storage
2) on-Distribution
Not to Share Customer
Information (SCI)
HC - Improper transfer
Not to Purchase Customer
Information (PCI)
HUA - Internal/external
unauthorized secondary use
3) on-Acquisition
Not Analysed Customer Information Beyond Original
Purpose (ACI)
STO - Improper analysis HC - Improper acquisition
Not Collaborate To analyse
Customer Information Beyond Original Purpose (CACI)
HPD - Improper access
IC - Improper collection
Not Keeping Customer
Information (KCI)
HC - Improper storage
Not Gathering Customer
Information (GCI)
HC - Improper collection
Not Accessing Customer Private
Information (API)
HUA - Improper access
Not Accessing Customer
Multiple Private Information Via
Internet (AMI)
POL - Improper multiple
access
Protection: ‘One’s perception of efficacy in protecting others’ privacy information’.
on-distribution: ‘One’s perception of efficacy in sanctioning against
distributing the privacy information to others’.
on-acquisition: ‘One’s perception of efficacy in sanctioning against
acquiring the privacy information to others’.
Knowledge Management International Conference (KMICe) 2014, 12 – 15 August 2014, Malaysia
http://www.kmice.cms.net.my/ 335
By using the six ‘Islamic Cultural Dimensions’ and
‘Information Privacy Self-regulatory Efficacy
Dimensions’, further analysis are done to determine
on the influence of Islamic culture on the computer
professionals’ self-regulatory efficacy concerning
the information privacy. The relationships between
the elements of ‘Information Privacy Self-
regulatory Efficacy Dimensions’ and ‘Islamic
Cultural Dimensions’ are shown in Table 2.
IV RESEARCH METHOD
There are two research objectives, (i) to propose a
conceptual framework of ‘Cultural Influences to
Information Privacy Self-regulatory Efficacy’, and
(ii) to investigate Islamic cultural influences to
privacy by using case study of Malaysia’s computer
professionals’ self-regulatory efficacy with
information privacy practice. Thus, in order to fulfil
these two main objectives, the following research
questions (RQ) are formulated and proposed:
RQ1: Does Islamic culture influence the self-efficacy of
Malaysia’s computer professionals in safeguarding the
information privacy?
RQ2: How does Islamic culture in Malaysia influencing
the self-regulatory efficacy of the computer professionals
concerning the information privacy?
Pertaining to the research objectives, questions and
model, a set of hypotheses are formulated. The list of the
hypotheses is presented as follow: H10: There is no relationship between ‘Copy Information’ (CI) and
‘High Context’ (HC).
H11: There is a relationship between Copy Information’ (CI) and ‘High Context’ (HC).
H20: There is no relationship between ‘Protect Information’ (PI) and ‘Short Term Orientation’ (STO).
H21: There is a relationship between ‘Protect Information’ (PI) and
‘Short Term Orientation’ (STO).
H30: There is no relationship between ‘Protect Information’ (PI) and
‘High Context’ (HC). H31: There is a relationship between ‘Protect Information’ (PI) and
‘High Context’ (HC).
H40: There is no relationship between ‘Not to Share Customer
Information’ (SCI) and ‘High Context’ (HC).
H41: There is a relationship between ‘Not to Share Customer Information’ (SCI) and ‘High Context’ (HC).
H50: There is no relationship between ‘Not to Purchase Customer Information’ (PCI) and ‘High Uncertainty Avoidance’ (HUA).
H51: There is a relationship between ‘Not to Purchase Customer
Information’ (PCI) and ‘High Uncertainty Avoidance’ (HUA).
H60: There is no relationship between ‘Not to analyse Customer
Information’ (ACI) and ‘Short Term Orientation’ (STO). H61: There is a relationship between ‘Not to analyse Customer
Information’ (ACI) and ‘Short Term Orientation’ (STO).
H70: There is no relationship between ‘Not to analyse Customer
Information’ (ACI) and ‘High Context’ (HC).
H71: There is a relationship between ‘Not to analyse Customer Information’ (ACI) and ‘High Context’ (HC).
H80: There is no relationship between ‘Not to Collaborate to analyse Customer Information’ (CACI) and ‘High Power Distance’
(HPD). H81: There is a relationship between ‘Not to Collaborate to analyse
Customer Information’ (CACI) and ‘High Power Distance’
(HPD).
H90: There is no relationship between ‘Not to Collaborate to analyse
Customer Information’ (CACI) and ‘Individualism & Collectivism’ (IC).
H91: There is a relationship between ‘Not to Collaborate to analyse
Customer Information’ (CACI) and ‘Individualism & Collectivism’ (IC).
H100: There is no relationship between ‘Not Keeping Customer Information’ (KCI) and ‘High Context’ (HC).
H101: There is a relationship between ‘Not Keeping Customer
Information’ (KCI) and ‘High Context’ (HC).
H110: There is no relationship between ‘Not Gathering Customer
Information’ (GCI) and ‘High Context’ (HC). H111: There is a relationship between ‘Not Gathering Customer
Information’ (GCI) and ‘High Context’ (HC).
H120: There is no relationship between ‘Not Accessing Customer
Private Information’ (API) and ‘High Uncertainty Avoidance’
(HUA). H121: There is a relationship between ‘Not Accessing Customer Private
Information’ (API) and ‘High Uncertainty Avoidance’ (HUA).
H130: There is no relationship between ‘Not Accessing Customer
Multiple Private Information via Internet’ (AMI) and
‘Polychronics’ (POL). H131: There is a relationship between ‘Not Accessing Customer
Multiple Private Information via Internet’ (AMI) and
‘Polychronics’ (POL).
The survey forms were sent to Muslims working in
the computer or Information Technology (IT) fields
in Malaysia, with at least one year working
experience. A total of 435 data were being analysed
by using ordinal regression analysis in order to
analyse the influence of cultural factors on the self-
regulatory efficacy of Malaysia’s computer
professionals. SPSS Ordinal Regression procedure
or ‘PLUM’ (Polytomous Universal Model) in SPSS
was used to perform the statistical analysis.
Knowledge Management International Conference (KMICe) 2014, 12 – 15 August 2014, Malaysia
http://www.kmice.cms.net.my/ 336
V RESULTS A D A ALYSIS
A. Descriptive Statistics
Table 3. Descriptive Statistics (Respondent Profile)
Measure Items Frequencies Percentage
Gender Male Female
261 174
60.0 40.0
Age Below 26
26 – 35 36 – 45
Above 45
68
188 115
64
15.6
43.2 26.4
14.7
Highest
Academic
Qualification
SPM Diploma
Degree
Masters PhD
Others
17 154
247
6 0
11
3.9 35.4
56.8
1.4 0.0
2.5
Current
Occupation
Programmer
System Analyst System Engineer
IT Manager
IT Executive Others
81
54 74
39
67 120
18.6
12.4 17.0
9.0
15.4 27.6
Working
Experience
1 to 2 Years Working
3 to 4 Years Working 5 to 6 Years Working
7 to 8 Years Working
9 to 10 Years Working 11 Years and Above
3
56 110
114
87 65
0.7
12.9 25.3
26.2
20.0 14.9
Table 3 shows the descriptive statistics of the
respondents.
B. Inferential Statistics
In general, the ordinal regression analysis was used
in this research to perform two main tasks: (1) to
determine significant culture variable that influence
the information privacy self-regulatory efficacy
ordinal outcome and (2) to depict the direction of
the relationship between the information privacy
self-regulatory efficacy outcome (dependent
variable) and the explanatory culture variable
(independent variable). Based on the result obtained
from the analysis, it shows that there are partial
empirical supports in which culture does influence
self-regulatory efficacy concerning the information
privacy. Table 4 shows the analysis result, where
out of 13 hypotheses tested, only three hypotheses
were supported, H2, H5 and H6. Other hypotheses,
namely, H1, H3, H4, H7, H8, H9, H10, H11 and
H12 were rejected.
Table 4. Summarized Parameter Extimates (By Location).
Location Estimate Sig Hypothesis Test
1) Protection
CI HUA .050 .767 No relationship
HC .165 .263 H1 not supported
STO -.306 .119 No relationship
IC 0a 0a No relationship
HPD 0a 0a No relationship
POL 0a 0a No relationship
PI HUA .115 .476 No relationship
HC .108 .434 H3 not supported
STO -.310 .047 * H2 supported
IC 0a 0a No relationship
HPD 0a 0a No relationship
POL 0a 0a No relationship
2) on-Distribution
SCI HUA -.073 .651 No relationship
HC .191 .168 H4 not supported
STO -.360 .048 Negative relationship
IC 0a 0a No relationship
HPD 0a 0a No relationship
POL 0a 0a No relationship
PCI HUA .435 .028 * H5 supported
HC .034 .803 No relationship
STO -.305 .020 * Negative
relationship
IC 0a 0a No relationship
HPD 0a 0a No relationship
POL 0a 0a No relationship
3) on-Acquisition
ACI HUA .260 .121 No relationship
HC -.137 .343 H7 not supported
STO -.009 .013 * H6 supported
IC 0a 0a No relationship
HPD 0a 0a No relationship
POL 0a 0a No relationship
CACI HUA -.071 .657 No relationship
HC .151 .274 No relationship
STO -.052 .771 No relationship
IC 0a 0a H9 not supported
HPD 0a 0a H8 not supported
POL 0a 0a No relationship
KCI HUA .023 .038 * Positive
relationship
HC .165 .231 H10 not supported
STO -.159 .377 No relationship
IC 0a 0a No relationship
HPD 0a 0a No relationship
POL 0a 0a No relationship
GCI HUA .179 .263 No relationship
HC .035 .801 H11 not supported
STO -.013 .944 No relationship
IC 0a 0a No relationship
HPD 0a 0a No relationship
POL 0a 0a No relationship
API HUA .080 .612 H12 not supported
HC .055 .686 No relationship
STO -.300 .094 No relationship
IC 0a 0a No relationship
HPD 0a 0a No relationship
POL 0a 0a No relationship
AMI HUA .140 .386 No relationship
HC -0.90 .515 No relationship
STO -0.20 .914 No relationship
IC 0a 0a No relationship
HPD 0a 0a No relationship
POL 0a 0a H13 not supported
ote: * Statistically significant relationship (p<0.05)
Knowledge Management International Conference (KMICe) 2014, 12 – 15 August 2014, Malaysia
http://www.kmice.cms.net.my/ 337
Hypothesis H2 was supported (as shown in Table
4), by the regression coefficient to show a
significant negative relationship between ‘Short-
Term Orientation’ (STO) and ‘Protect Information’
(PI) (regression coefficient = -.310, p<0.05).
Hypothesis H5, on the other hand, shows a positive
relationship between ‘High Uncertainty Avoidance’
(HUA) and ‘Not to Purchase Customer
Information’ (PCI) (regression coefficient = .435,
p<0.05). Whereas, hypothesis H6 shows a negative
relationship between ‘Short Term Orientation’
(STO) and ‘Not to analyse Customer Information
beyond Original Purpose’ (ACI) (regression
coefficient = -.009, p<0.05).
VI CO CLUSIO
The aim of this study is to investigate the cultural
influences to privacy by using Malaysia’s computer
professionals’ self-regulatory efficacy concerning
information privacy practices and Islamic culture as
the case study. This study adapted the theoretical
frameworks of ‘Islamic Cultural Dimensions’ and
‘Information Privacy Self-regulatory Efficacy
Dimensions’. Survey method was used for the data
collection. The data were analysed by using Ordinal
Regression Analysis.
The findings included: (i) a conceptual framework
of ‘information privacy self-regulatory efficacy
dimensions’ and ‘cultural dimensions’, and (ii)
empirical findings on the mixture of a positive and
negative empirical relationship on the culture
influence to the self-regulatory efficacy towards
safeguarding information privacy. Although only
three out of thirteen hypotheses received significant
supports from the data, the additional exploratory
analysis conducted provided promising results for
future research and exploration. Future work may
involve incorporating the knowledge management
concepts into information privacy and culture
model to aid the application’s development,
implementation, maintenance and usage.
ACK OWLEDGME T
This research is funded by the Dana RMI Principal Investigator Support Initiative (PSI), Research Management Institute (RMI), Universiti Teknologi MARA (UiTM) Malaysia (Project Code: 600-RMI/DANA 5/3/PSI (258/2013)).
REFERE CES
Adelabu, O. S. , Yamanaka, T., & Moalosi, R. (2012). Towards kansei evaluation of african product design. International Journal of Affective Engineering, 12(2), 135-144. doi:http://dx.doi.org/10.5057/ijae.12.135
Bandura, A. (1977). Self-efficacy: toward a unifying theory of behavioural change. Psychological Review 84(2), 191–215. Doi: 10.1037/0033-295X.84.2.191
Bandura, A. (1991). Social cognitive theory of moral thought and action. In W. M. Kurtines, & J. L. Gewirtz (Eds.), Handbook of Moral Behavior and Development (pp. 45–103). Hillsdale, NJ: Lawrence Erlbaum.
Culnan, M. J. (2011). Social perspectives on information privacy. In H. C. A. van Tilborg, S. Jajodia (Eds), Encyclopedia of Cryptography and Security. Springer. doi: 10.1007/978-1-4419-5906-5
Halls, E. T. (1996). The hidden dimensions: Doubleday & Company Inc.
Henderson, S. C., & Snyder, C. A. (1999). Personal information privacy: implications for MIS managers, Information & Management, 36(4), 213 - 220. doi: 10.1016/S0378-7206(99)00019-1
Hofstede G., & Hofstede G. J. (2005). Cultures and organization: McGraw-Hill.
Kuo, F.-Y., Lin, C. S., & Hsu, M.-H. (2007). Assessing Gender Differences in Computer Professionals’ Self-regulatory Efficacy Concerning Information Privacy Practices. Journal of Business Ethics, 73(2), 145-160. doi:10.1007/s10551-006-9179-1
Lokman, A. M., Ishak, K. K., Razak, F. H., & Aziz, A. A. (2012). The Feasibility Of PrEmo In Cross-cultural Kansei Measurement. 2012 IEEE Symposium on Humanities, Science and Engineering Research (SHUSER), 1033 - 1038, IEEE. doi:10.1109/SHUSER.2012.6268780
Oz, E. (1992). Ethical standards for information system professionals: a case for a unified code. MIS Quarterly, 16(4), 423–433. doi:10.2307/249729
Peranginangin, E., Chen, K., & Shieh, M. (2011). Cross-cultural consumers’ kansei research: the study of product needs on male and female. International Refereed Research Journal, II(1), 11-16.
Reynolds, G. W. (2011). Ethics in information technology. Cengage Learning. USA.
Samsuri, S., Ismail, Z., & Ahmad, R. (2013). Adopting a Knowledge Management Concept in Securing the Privacy of Electronic Medical Records Systems. In L. Uden, F. Herrera, J. B. Perez, & J. M. C. Rodriguez (Eds.), 7th International Conference on Knowledge Management in Organizations: Service and Cloud Computing (547-558). Springer-Verlag Berlin. doi:10.1007/978-3-642-30867-3_49.
Shafie, M., Wan Abdul Rahim, W. M. I., Nor Laila, M. N., & Mohd Shukri, H. (2010). Muslim user interface evaluation framework (Muslim-UI) for Islamic genre website: A quantitative approach. 2010 International Conference on Information and Communication Technology for the Muslim World (ICT4M), IEEE. doi:10.1109/ICT4M.2010.5971933
Trompenaars, F. (1994). Riding the Waves of Culture: Understanding Diversity in Global Business. Irwin, New York.
Wan Abdul Rahim, W. M. I., Nor Laila, M. N., & Shafie, M. (2008a). Inducting the cultural dimensions of islamic culture: a theoretical building approach and website IA design application. In C. W. Khong, C. Y. Wong, & B. V. Niman (Eds.), 21st International Symposium Human Factors in Telecommunication: User Experience of ICTs (pp. 89-96). Prentice Hall.
Wan Abdul Rahim, W. M. I., Nor Laila, M. N., & Sharifah Sakinah S. H. A. (2008b). Culture influences to website information architecture: an empirical investigation. International Symposium on Information Technology, 2008, IEEE. doi:10.1109/ITSIM.2008.4631629
Yashmi, N., Rizi, M. S., & Sabet, M. B. (2013). Translation of customer feelings by Kansei in iranian culture, case study: Pot holder & oven glove. IASDR 2013.
Zakaria, N, Stanton, J. M., & Sarkar-Barney, S. T. M. (2003). Designing and implementing culturally-sensitive IT applications: The interaction of culture values and privacy issues in the Middle East, Information Technology & People, 16(1), 49 – 75. doi: 10.1108/09593840310463023