Impact of Personality Traits and Information Privacy Concern on E-Learning Environment Adoption during COVID-19 Pandemic: An Empirical Investigation
Abstract
:1. Introduction
2. Theoretical Foundation and Research Model
2.1. Privacy Concern and Educational Technology
2.2. Big Five Personality Traits
2.3. Concern for Information Privacy
2.4. Belief in Conspiracy Theories
3. Hypothesis Development
4. Materials and Methods
4.1. Questionnaire Design and Data Collection
4.2. Research Setting
5. Results
5.1. Demographic Data
5.2. Tests of the Measurement Model
5.3. Tests of the Structural Model
6. Discussion
6.1. Key Findings
6.2. Limitations and Future Research
7. Conclusions
8. Contributions
8.1. Academic Implications
8.2. Practical Implications
Author Contributions
Funding
Institutional Review Board Statement
Informed Consent Statement
Data Availability Statement
Conflicts of Interest
Appendix A
Construct | Item No. | Item | References |
---|---|---|---|
Agreeable-ness | AGR1 | I feel little concern for others | [37] |
AGR2 | I am interested in people | ||
AGR3 | I take time out for others | ||
Openness to experience | INT1 | I have a creative imagination | [19,37] |
INT2 | I am quick to understand things | ||
INT3 | I have excellent ideas | ||
INT4 | I delight in thinking about things | ||
INT5 | I delight in looking for a profound implication in things | ||
Neuroticism | NEUR1 | I get stressed out easily | [37] |
NEUR2 | I am worried about the things | ||
NEUR3 | I am easily disturbed | ||
Conscientiousness | CNS1 | I pay attention to details | [19,37] |
CNS2 | I am always prepared | ||
CNS3 | I follow a schedule | ||
CNS4 | I make policies and stick to them | ||
Extraversion | EXT1 | I am the life of party | [19,37] |
EXT2 | I feel comfortable around people | ||
EXT3 | Generally, I start the conversation | ||
EXT4 | I don’t mind being the heart of consideration | ||
Belief in Conspiracy theory | BCT1 | I believe the e-learning service providers keeps many important secrets about the e-learning environment from individuals. | |
BCT2 | I believe progress toward e-learning environment is deliberately being hindered. | ||
BCT3 | I believe e-learning service providers suppress information about to deceive the individuals. | ||
BCT4 | I believe a lot of important information regarding e-learning environment is deliberately concealed from the individuals out of self-interest. | ||
Behavioral Intention | BINT1 | I intend to use e-learning environment in the near future to manage my learning process. | [19] |
BINT2 | I plan to use e-learning environment in the near future to manage my learning process. | ||
BINT3 | My willingness to use e-learning environment is high. | ||
BINT4 | Whatsoever the environments, I do not intend to use e-learning environment. | ||
Collection | COL1 | It usually bothers me when e-learning providers ask me for personal Information. | [19,34] |
COL2 | I sometimes think for a while e-learning service providers ask me to provide personal information | ||
COL3 | It bothers me to give personal information to so many e-learning service providers. | ||
COL4 | It bothers me that e-learning service providers collect too much personal information | ||
Error | ERR1 | E-learning service providers should repeatedly check the accuracy of individuals’ personal information without considering cost. | [19,34] |
ERR2 | E-learning service providers should use more measures to ensure the accuracy of individuals’ personal information. | ||
ERR3 | E-learning service providers should have a more comprehensive method to correct for errors in individuals’ personal information. | ||
ERR4 | E-learning service providers should devote more time and manpower to verify the accuracy of individuals’ personal information. | ||
Secondary Use | SU1 | E-learning service providers should never use individuals’ personal information for any other purposes unless it has been authorized by the individual. | [19,34] |
SU2 | When people give personal information to a e-learning service provider for some reason, the e-learning provider should never use the information for any other purpose. | ||
SU3 | E-learning service providers should never sell individuals’ personal information to another provider. | ||
SU4 | E-learning service providers should not share individuals’ personal information with other providers unless it has been authorized by the individuals. | ||
Unauthorized Access | UA1 | E-learning service providers should devote more time and efforts to preventing the unauthorized access of individuals’ personal information. | [19,34] |
UA2 | E-learning service providers should prevent unauthorized people from accessing individuals’ personal information without considering the cost. | ||
UA3 | E-learning service providers should take more measures to ensure that unauthorized people cannot use their computer to access individuals’ personal information. |
Appendix B
Constructs | Item | Loadings | Standardized Cronbach’s α |
---|---|---|---|
Agreeableness | AGR1 | 0.816 | 0.856 |
AGR2 | 0.776 | ||
AGR3 | 0.865 | ||
Openness to experience | INT1 | 0.829 | 0.925 |
INT2 | 0.843 | ||
INT3 | 0.831 | ||
INT4 | 0.810 | ||
INT5 | 0.819 | ||
Neuroticism | NEUR1 | 0.827 | 0.946 |
NEUR2 | 0.854 | ||
NEUR3 | 0.892 | ||
Conscientiousness | CNS1 | 0.828 | 0.878 |
CNS2 | 0.814 | ||
CNS3 | 0.879 | ||
CNS4 | 0.841 | ||
Extraversion | EXT1 | 0.816 | 0.919 |
EXT2 | 0.825 | ||
EXT3 | 0.828 | ||
EXT4 | 0.717 | ||
Belief in Conspiracy theory | BCT1 | 0.847 | 0.927 |
BCT2 | 0.851 | ||
BCT3 | 0.890 | ||
BCT4 | 0.852 | ||
Behavioral Intention | BINT1 | 0.881 | 0.838 |
BINT2 | 0.875 | ||
BINT3 | 0.845 | ||
BINT4 | 0.792 | ||
Collection | COL1 | 0.828 | 0.826 |
COL2 | 0.796 | ||
COL3 | 0.865 | ||
COL4 | 0.872 | ||
Errors | ERR1 | 0.819 | 0.821 |
ERR2 | 0.848 | ||
ERR3 | 0.881 | ||
ERR4 | 0.825 | ||
Secondary Use | SU1 | 0.869 | 0.841 |
SU2 | 0.848 | ||
SU3 | 0.854 | ||
SU4 | 0.851 | ||
Unauthorized Access | UA1 | 0.830 | 0.832 |
UA2 | 0.867 | ||
UA3 | 0.881 |
References
- Dutta, B.; Peng, M.-H.; Chen, C.-C.; Sun, S.-L. Interpreting Usability Factors Predicting Sustainable Adoption of Cloud-Based E-Learning Environment during COVID-19 Pandemic. Sustainability 2021, 13, 9329. [Google Scholar] [CrossRef]
- Sahu, P. Closure of Universities Due to Coronavirus Disease 2019 (COVID-19): Impact on Education and Mental Health of Students and Academic Staff. Cureus 2020, 12, e7541. [Google Scholar] [CrossRef] [Green Version]
- Yang, J.; Peng, M.Y.-P.; Wong, S.; Chong, W. How E-Learning Environmental Stimuli Influence Determinates of Learning Engagement in the Context of COVID-19? SOR Model Perspective. Front. Psychol. 2021, 12, 584976. [Google Scholar] [CrossRef] [PubMed]
- Fernández-Batanero, J.-M.; Román-Graván, P.; Reyes-Rebollo, M.-M.; Montenegro-Rueda, M. Impact of Educational Technology on Teacher Stress and Anxiety: A Literature Review. Int. J. Environ. Res. Public Health 2021, 18, 548. [Google Scholar] [CrossRef] [PubMed]
- Al-Rahmi, W.M.; Yahaya, N.; Aldraiweesh, A.A.; Alamri, M.M.; Aljarboa, N.A.; Alturki, U.; Aljeraiwi, A.A. Integrating Technology Acceptance Model With Innovation Diffusion Theory: An Empirical Investigation on Students’ Intention to Use E-Learning Systems. IEEE Access 2019, 7, 26797–26809. [Google Scholar] [CrossRef]
- Bojuwoye, O.; Moletsane, M.; Stofile, S.; Moolla, N.; Sylvester, F. Learners’ experiences of learning support in selected Western Cape schools. S. Afr. J. Educ. 2014, 34, 1–15. [Google Scholar] [CrossRef]
- New: Philanthropy and Education. Education Giving in the Midst of COVID-19. Available online: https://www.oecd.org/dev/NetFWD_Covid-EDU_Study.pdf (accessed on 15 March 2022).
- UNESCO Education: From Disruption to Recovery. Available online: https://en.unesco.org/covid19/educationresponse (accessed on 15 March 2022).
- Scarborough, S. Higher Ed and COVID-19—National Student Survey. Available online: https://cdn2.hubspot.net/hubfs/4254080/SimpsonScarborough%20National%20Student%20Survey%20.pdf (accessed on 15 March 2022).
- Shahzad, M.; Qu, Y.; Zafar, A.U.; Rehman, S.U.; Islam, T. Exploring the influence of knowledge management process on corporate sustainable performance through green innovation. J. Knowl. Manag. 2020, 24, 2079–2106. [Google Scholar] [CrossRef]
- Putra, R.B.; Ridwan, M.; Mulyani, S.R.; Ekajaya, D.S.; Putra, R.A. Impact of learning motivation, cognitive and self-efficacy in improving learning quality e-learning in industrial era 4.0. J. Phys. Conf. Ser. 2019, 1339, 012081. [Google Scholar] [CrossRef]
- Gewin, V. Five tips for moving teaching online as COVID-19 takes hold. Nature 2020, 580, 295–296. [Google Scholar] [CrossRef] [Green Version]
- Zhan, Y.; Li, P.; Qu, Z.; Zeng, D.; Guo, S. A Learning-Based Incentive Mechanism for Federated Learning. IEEE Internet Things J. 2020, 7, 6360–6368. [Google Scholar] [CrossRef]
- Bizerril, M.; Rosa, M.J.; Carvalho, T.; Pedrosa, J. Sustainability in higher education: A review of contributions from Portuguese Speaking Countries. J. Clean. Prod. 2018, 171, 600–612. [Google Scholar] [CrossRef]
- Alanazi, A.; Anazi, Y. The Challenges in Personal Health Record Adoption. J. Healthc. Manag. 2019, 64, 104–109. [Google Scholar] [CrossRef]
- Quach, S.; Thaichon, P.; Martin, K.D.; Weaven, S.; Palmatier, R.W. Digital technologies: Tensions in privacy and data. J. Acad. Mark. Sci. 2022, 1–25. [Google Scholar] [CrossRef] [PubMed]
- Schomakers, E.; Lidynia, C.; Ziefle, M. A typology of online privacy personalities: Exploring and segmenting users’ diverse privacy attitudes and behaviors. J. Grid Comput. 2019, 17, 727–747. [Google Scholar] [CrossRef]
- Turoń, K.; Kubik, A.; Chen, F. When, What and How to Teach about Electric Mobility? An Innovative Teaching Concept for All Stages of Education: Lessons from Poland. Energies 2021, 14, 6440. [Google Scholar] [CrossRef]
- Dutta, B.; Hwang, H.G. Personality Traits and Health Information Privacy Concern: An Empirical Study in the Context of Electronic Medical Records (EMRs) in Taiwan. In Proceedings of the 23rd TANET (Taiwan Academic Network Conference), Taichung, Taiwan, 25–27 October 2017. [Google Scholar] [CrossRef]
- Roberts, R.; Flin, R.; Millar, D.; Corradi, L. Psychological factors influencing technology adoption: A case study from the oil and gas industry. Technovation 2021, 102, 102219. [Google Scholar] [CrossRef]
- Nguyen, V.T. The perceptions of social media users of digital detox apps considering personality traits. Educ. Inf. Technol. 2022, 1–24. [Google Scholar] [CrossRef]
- Rivers, D.J. The role of personality traits and online academic self-efficacy in acceptance, actual use and achievement in Moodle. Educ. Inf. Technol. 2021, 26, 4353–4378. [Google Scholar] [CrossRef]
- Puska, E.; Ejubovic, A.; Dalic, N.; Puska, A. Examination of influence of e-learning on academic success on the example of Bosnia and Herzegovina. Educ. Inf. Technol. 2020, 26, 1977–1994. [Google Scholar] [CrossRef]
- Kamal, A.; Radhakrishnan, S. Individual learning preferences based on personality traits in an E-learning scenario. Educ. Inf. Technol. 2019, 24, 407–435. [Google Scholar] [CrossRef]
- Warren, S.; Brandeis, L. The right to privacy. Harv. Law Rev. 1890, 4, 193. [Google Scholar] [CrossRef]
- Philipp, K.M.; Sabine, T. Transformative or Not? How Privacy Violation Experiences Influence Online Privacy Concerns and Online Information Disclosure. Hum. Commun. Res. 2021, 47, 49–74. [Google Scholar] [CrossRef]
- Chen, H.; Atkin, D. Understanding third-person perception about Internet privacy risks. New Media Soc. 2020, 23, 419–437. [Google Scholar] [CrossRef]
- Van der Sloot, B.; de Groot, A. The Handbook of Privacy Studies: An Interdisciplinary Introduction; Amsterdam University Press: Amsterdam, The Netherlands, 2018. [Google Scholar]
- Hoffmann, C.P.; Lutz, C.; Ranzini, G. Privacy cynicism: A new approach to the privacy paradox. Cyberpsychol. J. Psychosoc. Res. Cyberspace 2016, 10, 7. [Google Scholar] [CrossRef] [Green Version]
- Trepte, S. The social media privacy model: Privacy and communication in the light of social media affordances. Commun. Theory 2020, 31, 549–570. [Google Scholar] [CrossRef]
- European Commission. Special Eurobarometer 431: Data Protection. Brussels, B.E. 2015. Available online: http://ec.europa.eu/public_opinion/archives/ebs/ebs_431_en.pdf (accessed on 15 March 2022).
- Dienlin, T.; Mauser, P.K.; Trepte, S. A longitudinal analysis of the privacy paradox. New Media Soc. 2021, 1–22. [Google Scholar] [CrossRef]
- Rogers, R.W. A protection motivation theory of fear appeals and attitude change. J. Psychol. 1975, 91, 93–114. [Google Scholar] [CrossRef] [PubMed]
- Smith, H.J.; Milburg, S.J.; Burke, S.J. Information privacy: Measuring individuals’ concerns about organizational practices. MIS Quart 1996, 20, 167–196. [Google Scholar] [CrossRef]
- Junglas, I.A.; Johnson, N.A.; Spitzmuller, C. Personality traits and concern for privacy: An empirical study in the context of location-based services. Eur. J. Inf. Syst. 2008, 17, 387–402. [Google Scholar] [CrossRef]
- Stewart, K.A.; Segars, A.H. An empirical examination of the concern for information privacy instrument. Inf. Syst. Res. 2002, 13, 36–49. [Google Scholar] [CrossRef]
- Goldberg, L.R. An alternative ‘description of personality’: The big five factor structure. J. Personal. Soc. Psychol. 1990, 59, 1216–1229. [Google Scholar] [CrossRef]
- Epel, E.S.; Crosswell, A.D.; Mayer, S.E.; Prather, A.A.; Slavich, G.M.; Puterman, E.; Mendes, W.B. More than a feeling: A unified view of stress measurement for population science. Front. Neuroendocrinol. 2018, 49, 146–169. [Google Scholar] [CrossRef]
- Pedrosa, A.L.; Bitencourt, L.; Fróes, A.C.F.; Cazumbá, M.L.B.; Campos, R.G.B.; de Brito, S.B.C.S.; Simões e Silva, A.C. Emotional, Behavioral, and Psychological Impact of the COVID-19 Pandemic. Front. Psychol. 2020, 11, 566212. [Google Scholar] [CrossRef]
- Deslandes, S.F.; Coutinho, T. The intensive use of the internet by children and adolescents in the context of COVID-19 and the risks for self-inflicted violence. Cienc. Saude Coletiva 2020, 25 (Suppl. S1), 2479–2486. [Google Scholar] [CrossRef]
- Furlong, Y.; Finnie, T. Culture counts: The diverse effects of culture and society on mental health amidst COVID-19 outbreak in Australia. Ir. J. Psychol. Med. 2020, 37, 1–6. [Google Scholar] [CrossRef] [PubMed]
- Atkinson, M.D.; DeWitt, D. The politics of disruption: Social choice theory and conspiracy theory politics. In Conspiracy Theories and the People Who Believe Them; Uscinski, J.E., Ed.; Oxford University Press: New York, NY, USA, 2018; pp. 298–318. [Google Scholar]
- Berinsky, A.J. Telling the truth about believing the lies? Evidence for the limited prevalence of expressive survey responding. J. Politics 2018, 80, 211–224. [Google Scholar] [CrossRef]
- Butter, M.; Knight, P. The history of conspiracy theory research: A review and commentary. In Conspiracy Theories and the People Who Believe Them; Uscinski, J.E., Ed.; Oxford University Press: New York, NY, USA, 2018; pp. 33–52. [Google Scholar]
- Cullen, J.T. Communication with the public about the Fukushima Dai-ichi disaster. In Conspiracy Theories and the People Who Believe Them; Uscinski, J.E., Ed.; Oxford University Press: New York, NY, USA, 2018. [Google Scholar]
- Perneger, T.V.; Courvoisier, D.S.; Hudelson, P.M.; Gayet-Ageron, A.G. Sample size for pre-tests of questionnaires. Qual. Life Res. 2014, 24, 147–151. [Google Scholar] [CrossRef] [PubMed] [Green Version]
- Converse, J.M.; Presser, S. Survey Questions Handcrafting the Standardized Questionnaire; Sage Publications Inc.: Newbury Park, CA, USA, 1986. [Google Scholar]
- DeVellis, R.F. Scale development. In Theory and Applications, 3rd ed.; Sage Publications Inc.: Los Angeles, CA, USA; Newbury Park, CA, USA, 2012. [Google Scholar]
- Groves, R.M.; Fowler, F.J.; Couper, M.P.; Lepkowski, J.M.; Singer, E.; Tourangeau, R. Survey Methodology; Wiley: Hoboken, NJ, USA, 2004. [Google Scholar]
- Wild, D.; Grove, A.; Martin, M.; Eremenco, S.; McElroy, S.; Verjee-Lorenz, A.; Erikson, P. Principles of good pratice for the translation and cultural adaptation process for patient-reported outcomes (PRO) measures: Report of the ISPOR task force for translation and cultural adaptation. Value Health 2005, 8, 94–104. [Google Scholar] [CrossRef] [Green Version]
- Davis, J.; Wetherell, G.; Henry, P.J. Social devaluation of African Americans and race-related conspiracy theories. Eur. J. Soc. Psychol. 2018, 48, 999–1010. [Google Scholar] [CrossRef]
- Sun, S.-L.; Hwnag, H.-G.; Dutta, B.; Peng, M.-H. Exploring critical factors influencing nurses’ intention to use tablet P.C. in Patients’ care using an integrated theoretical model. Libyan J. Med. 2019, 14, 512–526. [Google Scholar] [CrossRef] [Green Version]
- Hair, J.F.; Anderson, R.E.; Tatham, R.L.; Black, W. Multivariate Data Analysis; Prentice-Hall, Inc.: Upper Saddle River, NJ, USA, 1998. [Google Scholar]
- Bagozzi, R.P.; Yi, Y. On the evaluation of structural equation models. J. Acad. Marking Sci. 1988, 16, 74–94. [Google Scholar] [CrossRef]
- Fornell, C.; Larcker, D.F. Evaluating structural equation models with unobservable variables and measurement error. J. Mark. Res. 1981, 18, 39–50. [Google Scholar] [CrossRef]
- Falahat, M.; Lee, Y.-Y.; Foo, Y.-C.; Chia, C.-E. A model for consumer trust in e-commerce. Asian Acad. Manag. J. 2019, 24 (Suppl. 2), 93–109. [Google Scholar] [CrossRef]
Item | Option | Count | Percentage % |
---|---|---|---|
Gender | Male | 145 | 50.88 |
Female | 140 | 49.12 | |
Age | 18-24 | 186 | 65.26 |
25-30 | 81 | 28.42 | |
>30 | 18 | 6.32 | |
Education Level | Bachelor | 172 | 60.35 |
Associate Degree | 82 | 28.77 | |
Master | 31 | 10.88 |
Dimension | Items | Loadings | No. of Items | Cronbach’s Alpha | Composite Reliability | AVE |
---|---|---|---|---|---|---|
CFHIP (2nd-Order Construct) | Collection | 0.867 | 15 | 0.946 | 0.962 | 0.842 |
Unauthorized Access | 0.921 | |||||
Secondary Use | 0.916 | |||||
Errors | 0.862 | |||||
Collection (1st-order construct) | COl1 | 0.924 | 4 | 0.986 | 0.974 | 0.856 |
COl2 | 0.901 | |||||
COl3 | 0.930 | |||||
COl4 | 0.812 | |||||
Unauthorized Access (1st-order construct) | UA1 | 0.898 | 3 | 0.971 | 0.982 | 0.917 |
UA2 | 0.924 | |||||
UA3 | 0.952 | |||||
Secondary Use (1st-order construct) | SU1 | 0.926 | 4 | 0.951 | 0.964 | 0.908 |
SU2 | 0.918 | |||||
SU3 | 0.936 | |||||
SU4 | 0.916 | |||||
Errors (1st-order construct) | ERR1 | 0.947 | 4 | 0.954 | 0.968 | 0.917 |
ERR2 | 0.911 | |||||
ERR3 | 0.937 | |||||
ERR4 | 0.957 | |||||
Extroversion | EXT1 | 0.954 | 4 | 0.976 | 0.981 | 0.891 |
EXT2 | 0.928 | |||||
EXT3 | 0.915 | |||||
EXT4 | 0.850 | |||||
Agreeableness | AGR1 | 0.991 | 3 | 0.936 | 0.962 | 0.926 |
AGR2 | 0.982 | |||||
AGR3 | 0.949 | |||||
Neuroticism | NEUR1 | 0.978 | 3 | 0.957 | 0.971 | 0.892 |
NEUR2 | 0.953 | |||||
NEUR3 | 0.956 | |||||
Conscientiousness | CNS1 | 0.954 | 4 | 0.981 | 0.916 | 0.891 |
CNS2 | 0.916 | |||||
CNS3 | 0.973 | |||||
CNS4 | 0.972 | |||||
Open to experiences | INT1 | 0.947 | 5 | 0.958 | 0.937 | 0.916 |
INT2 | 0.916 | |||||
INT3 | 0.959 | |||||
INT4 | 0.944 | |||||
INT5 | 0.957 | |||||
Belief in conspiracy theory | BCT1 | 0.965 | 4 | 0.917 | 0.954 | 0.914 |
BCT2 | 0.944 | |||||
BCT3 | 0.937 | |||||
BCT4 | 0.955 | |||||
Behavioral intention | BINT1 | 0.965 | 4 | 0.962 | 0.972 | 0.906 |
BINT2 | 0.972 | |||||
BINT3 | 0.817 | |||||
BINT4 | 0.821 |
CFHIP | EXT | AGR | NEUR | CNS | INT | BCT | BINT | |
---|---|---|---|---|---|---|---|---|
CFHIP | 0.91 | |||||||
EXT | 0.34 | 0.94 | ||||||
AGR | 0.26 | 0.14 | 0.96 | |||||
NEUR | 0.27 | 0.17 | 0.15 | 0.94 | ||||
CNS | 0.38 | 0.18 | 0.21 | 0.17 | 0.94 | |||
INT | 0.18 | 0.21 | 0.08 | 0.12 | 0.21 | 0.957 | ||
BCT | 0.16 | 0.17 | 0.27 | 0.16 | 0.17 | 0.29 | 0.95 | |
BINT | 0.31 | 0.26 | 0.18 | 0.28 | 0.19 | 0.26 | 0.34 | 0.95 |
Correlations within second-order construct | Collection | Unauthorized Access | Secondary Use | Errors | ||||
Collection | 0.92 | |||||||
Unauthorized Access | 0.49 | 0.95 | ||||||
Secondary Use | 0.64 | 0.67 | 0.95 | |||||
Errors | 0.68 | 0.71 | 0.42 | 0.957 |
Hypothesis | Proposed Hypothesis Relationship | Path Coefficients | t-Statistics | Hypothesis Test Results |
---|---|---|---|---|
H1 | AGR → CFIP | 0.33 | 2.41 | Supported |
H2 | INT → CFIP | −0.52 | 2.18 | Supported |
H3a | NEUR → CFIP | 0.54 | 3.71 | Supported |
H3b | NEUR → BCT | −0.19 | 2.24 | Supported |
H3c | NEUR → BINT | 0.23 | 2.58 | Supported |
H4a | CNS → CFIP | 0.51 | 4.75 | Supported |
H4b | CNS → BCT | 0.32 | 3.37 | Supported |
H4c | CNS → BINT | 0.26 | 2.79 | Supported |
H5a | EXT → CFIP | 0.14 | 1.18 | Rejected |
H5b | EXT → BCT | 0.31 | 2.79 | Supported |
H5c | EXT → BINT | −0.15 | 2.17 | Supported |
H6 | BCT → CFIP | −0.24 | 2.21 | Supported |
H7 | BCT → BINT | −0.39 | 2.69 | Supported |
H8 | CFIP → BINT | −0.26 | 3.57 | Supported |
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations. |
© 2022 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Peng, M.-H.; Dutta, B. Impact of Personality Traits and Information Privacy Concern on E-Learning Environment Adoption during COVID-19 Pandemic: An Empirical Investigation. Sustainability 2022, 14, 8031. https://doi.org/10.3390/su14138031
Peng M-H, Dutta B. Impact of Personality Traits and Information Privacy Concern on E-Learning Environment Adoption during COVID-19 Pandemic: An Empirical Investigation. Sustainability. 2022; 14(13):8031. https://doi.org/10.3390/su14138031
Chicago/Turabian StylePeng, Mei-Hui, and Bireswar Dutta. 2022. "Impact of Personality Traits and Information Privacy Concern on E-Learning Environment Adoption during COVID-19 Pandemic: An Empirical Investigation" Sustainability 14, no. 13: 8031. https://doi.org/10.3390/su14138031
APA StylePeng, M. -H., & Dutta, B. (2022). Impact of Personality Traits and Information Privacy Concern on E-Learning Environment Adoption during COVID-19 Pandemic: An Empirical Investigation. Sustainability, 14(13), 8031. https://doi.org/10.3390/su14138031