Unveiling Willingness to Adopt Online Privacy Control Measures in Tanzanian Higher Learning Institutions: A Gender-Based Multi-group Analysis Approach

Authors

  • Daniel Koloseni Institute of Finance Management
  • Herman Mandari Institute of Finance Management

DOI:

https://doi.org/10.62177/apemr.v3i1.1006

Keywords:

Privacy, Control Measures, Gender, Tanzania, Multi-Group Analysis

Abstract

The internet is among the primary learning resources, attracting students to use it for educational and social purposes. Observing privacy when using the internet is essential, especially for students in HLIs, given the privacy and security threats. This research examines the adoption of privacy control measures among students in HLIs. The study employed Structural Equation Modeling (SEM) to identify factors influencing willingness to adopt privacy control measures and to examine gender differences in this regard. Data were collected from 11 HLIs in Tanzania, comprising 390 males and 286 females. The findings for the full sample revealed that risk perceptions, privacy concerns, and perceived trust positively influence students' willingness to adopt privacy control measures. Furthermore, social influence and perceived security awareness positively influenced perceived trust. Additionally, the study found that convenience negatively affects users' willingness to adopt privacy control measures and that perceived risk negatively affects users' trust in the internet. However, neither social influence nor perceived security awareness affects willingness to adopt privacy control measures. The study also found a significant difference in perceived security awareness between genders regarding willingness to adopt privacy control measures. The study ultimately offers implications for researchers, practitioners, and managers seeking to promote the adoption of privacy control measures among students.

Downloads

Download data is not yet available.

References

Akter, M., Park, J. K., Headrick, C., Page, X., & Wisniewski, P. J. (2025). Calculating Connection vs. Risk: Understanding How Youth Negotiate Digital Privacy and Security with Peers Online. ArXiv Preprint ArXiv:2503.22993. DOI: https://doi.org/10.1145/3757564

Alesanco-Llorente, M., Reinares-Lara, E., Pelegrín-Borondo, J., & Olarte-Pascual, C. (2023). Mobile-assisted showrooming behavior and the (r) evolution of retail: The moderating effect of gender on the adoption of mobile augmented reality. Technological Forecasting and Social Change, 191, 122514. DOI: https://doi.org/10.1016/j.techfore.2023.122514

Allen, A. L. (1999). Gender and privacy in cyberspace. Stan. L. Rev., 52, 1175–1200. DOI: https://doi.org/10.2307/1229512

Almaiah, M. A., Al-otaibi, S., Shishakly, R., Hassan, L., Lutfi, A., Alrawad, M., Qatawneh, M., & Alghanam, O. A. (2023). Investigating the Role of Perceived Risk , Perceived Security and Perceived Trust on Smart m-Banking Application Using SEM. 1–17. DOI: https://doi.org/10.3390/su15139908

Ara, A., Zainol, Z., & Duraisamy, B. (2022). The effects of privacy awareness, security concerns and trust on information sharing in social media among public university students in Selangor. International Business Education Journal, 15(2), 93–110. DOI: https://doi.org/10.37134/ibej.Vol15.2.8.2022

Armstrong, J. S., & Overton, T. S. (1977). Estimating non-response bias in mail surveys. Journal of Marketing Research, 14(3), 396–402. DOI: https://doi.org/10.1177/002224377701400320

Ashrafi, D. M., Ahmed, S., & Shahid, T. S. (2024). Privacy or trust: understanding the privacy paradox in users' intentions towards e-pharmacy adoption through the lens of privacy-calculus model. Journal of Science and Technology Policy Management. DOI: https://doi.org/10.1108/JSTPM-09-2023-0149

Baruh, L., Secinti, E., & Cemalcilar, Z. (2017). Online Privacy Concerns and Privacy Management: A Meta-Analytical Review. Journal of Communication, 67(1), 26–53. https://doi.org/10.1111/jcom.12276 DOI: https://doi.org/10.1111/jcom.12276

Bélanger, F., & Xu, H. (2015). The role of information systems research in shaping the future of information privacy. Information Systems Journal, 25(6), 573–578. DOI: https://doi.org/10.1111/isj.12092

Benhissi, M., & Hamouda, M. (2025). Investigating consumers' slow fashion purchase decision: role of lack of information and confusion. European Business Review, 37(3), 575–595. DOI: https://doi.org/10.1108/EBR-02-2024-0079

Benoit, S., Klose, S., & Ettinger, A. (2017). Linking service convenience to satisfaction: Dimensions and key moderators. Journal of Services Marketing, 31(6), 527–538. DOI: https://doi.org/10.1108/JSM-10-2016-0353

Berkman, B. A. (1971). The Assault on Privacy: Computers, Data Banks, and Dossiers, by Arthur R. Miller. Case Western Reserve Law Review, 22(4), 808.

Chen, H.-T., & Chen, W. (2015). Couldn't or wouldn't? The influence of privacy concerns and self-efficacy in privacy management on privacy protection. Cyberpsychology, Behavior, and Social Networking, 18(1), 13–19. DOI: https://doi.org/10.1089/cyber.2014.0456

Chen, S., Doerr, S., Frost, J., Gambacorta, L., & Shin, H. S. (2023). The fintech gender gap. Journal of Financial Intermediation, 54, 101026. DOI: https://doi.org/10.1016/j.jfi.2023.101026

Cheng, X., Qiao, L., Yang, B., & Zhang, X. (2024). Investigation on users' resistance intention to facial recognition payment : a perspective of privacy. Electronic Commerce Research, 24, 275–301. DOI: https://doi.org/10.1007/s10660-022-09588-y

Choi, H., Park, J., & Jung, Y. (2018). The role of privacy fatigue in online privacy behavior. Computers in Human Behavior, 81, 42–51. DOI: https://doi.org/10.1016/j.chb.2017.12.001

Dinev, T., Bellotto, M., Hart, P., Russo, V., Serra, I., & Colautti, C. (2006). Privacy calculus model in e-commerce–a study of Italy and the United States. European Journal of Information Systems, 15(4), 389–402. DOI: https://doi.org/10.1057/palgrave.ejis.3000590

Dinev, T., & Hu, Q. (2007). The centrality of awareness in the formation of user behavioral intention toward protective information technologies. Journal of the Association for Information Systems, 8(7), 23. DOI: https://doi.org/10.17705/1jais.00133

Elbitar, Y., Schilling, M., Nguyen, T. T., Backes, M., & Bugiel, S. (2021). Explanation beats context: The effect of timing & rationales on users' runtime permission decisions. 30th USENIX Security Symposium (USENIX Security 21), 785–802.

ElShahed, H. (2023). Privacy Paradox Amid E-Commerce Epoch: Examining Egyptian Youth's Practices of Digital Literacy Online. In Marketing and Advertising in the Online-to-Offline (O2O) World (pp. 45–64). IGI Global. DOI: https://doi.org/10.4018/978-1-6684-5844-0.ch003

Esmaeilzadeh, P. (2020). The impacts of the privacy policy on individual trust in health information exchanges (HIEs). Internet Research, 30(3), 811–843. https://doi.org/10.1108/INTR-01-2019-0003 DOI: https://doi.org/10.1108/INTR-01-2019-0003

Feng, Y., Yao, Y., & Sadeh, N. (2021). A design space for privacy choices: Towards meaningful privacy control in the internet of things. Proceedings of the 2021 CHI Conference on Human Factors in Computing Systems, 1–16. DOI: https://doi.org/10.1145/3411764.3445148

Fernandes, T., & Costa, M. (2023). Privacy concerns with COVID-19 tracking apps: A privacy calculus approach. Journal of Consumer Marketing, 40(2), 181–192. DOI: https://doi.org/10.1108/JCM-03-2021-4510

Ferrante, T., & Ajani, T. (2024). Risk-Taking Propensity and Information Security Compliance Behavior in Government Workers: A Quantitative Correlational Study. Issues in Information Systems, 25(3), 1–12.

Fortino, G., Fotia, L., Messina, F., Rosaci, D., & Sarné, G. M. L. (2020). Trust and Reputation in the Internet of Things: State-of-the-Art and Research Challenges. IEEE Access, 8, 60117–60125. https://doi.org/10.1109/ACCESS.2020.2982318 DOI: https://doi.org/10.1109/ACCESS.2020.2982318

Gong, J., Said, F., Ting, H., Firdaus, A., Ali, I., & Jinghong, A. (2023). Do Privacy Stress and Brand Trust still Matter ? Implications on Continuous Online Purchasing Intention in China. Current Psychology, 42(18), 15515–15527. https://doi.org/10.1007/s12144-022-02857-x DOI: https://doi.org/10.1007/s12144-022-02857-x

Haeussinger, F., & Kranz, J. (2013). Information security awareness: Its antecedents and mediating effects on security compliant behavior. Thirty Fourth International Conference on Information Systems.

Henseler, J., Ringle, C. M., & Sarstedt, M. (2015). A new criterion for assessing discriminant validity in variance-based structural equation modeling. Journal of the Academy of Marketing Science, 43(1), 115–135. DOI: https://doi.org/10.1007/s11747-014-0403-8

Henseler, J., Ringle, C. M., & Sinkovics, R. R. (2009). The Use of Partial Least Squares Path Modeling in International Marketing. In R. . Sinkovics & P. . Ghauri (Eds.), New challenges to international marketing (pp. 277–319). Emerald Group Publishing Limited. https://doi.org/https://doi.org/10.1108/S1474-7979(2009)0000020014 DOI: https://doi.org/10.1108/S1474-7979(2009)0000020014

Ho, S., Lwin, M., Yee, A., & Lee, E. (2015). Understanding Factors Associated with Singaporean Adolescents' Intention to Adopt Privacy Protection Behavior Using an Extended Theory of Planned Behavior. Cyberpsychology, Behavior, and Social Networking, 1–24.

Jabbar, A., Geebren, A., Hussain, Z., Dani, S., & Ul-Durar, S. (2023a). Investigating individual privacy within CBDC: A privacy calculus perspective. Research in International Business and Finance, 64, 101826.

Jabbar, A., Geebren, A., Hussain, Z., Dani, S., & Ul-Durar, S. (2023b). Investigating individual privacy within CBDC: A privacy calculus perspective. Research in International Business and Finance, 64(May 2022), 101826. https://doi.org/10.1016/j.ribaf.2022.101826 DOI: https://doi.org/10.1016/j.ribaf.2022.101826

Jang, C. (2024). Coping with vulnerability: the effect of trust in AI and privacy-protective behaviour on the use of AI-based services. Behaviour & Information Technology, 43(11), 2388–2400. DOI: https://doi.org/10.1080/0144929X.2023.2246590

Jaspers, E. D. T., & Pearson, E. (2022). Consumers' acceptance of domestic Internet-of-Things : The role of trust and privacy concerns. Journal of Business Research, 142(January 2021), 255–265. https://doi.org/10.1016/j.jbusres.2021.12.043 DOI: https://doi.org/10.1016/j.jbusres.2021.12.043

Kang, H. (2023). Communication privacy management for smart speaker use : Integrating the role of privacy self-efficacy and the multidimensional view. New Media & Society, 25(5), 1153–1175. https://doi.org/10.1177/14614448211026611 DOI: https://doi.org/10.1177/14614448211026611

Koloseni, D., & Sedoyeka, E. M. (2019). The Adoption of Security Control Apps among Smartphone Users in Tanzania. International Journal of Technology Diffusion (IJTD), 10(4), 1–18. DOI: https://doi.org/10.4018/IJTD.2019100101

Koohang, A., Floyd, K., Yerby, J., & Paliszkiewicz, J. (2021). Social media privacy concerns, security concerns, trust, and awareness: Empirical validation of an instrument. Issues in Information Systems, 22(2), 133–145. https://doi.org/10.48009/2_iis_2021_136-149 DOI: https://doi.org/10.48009/2_iis_2021_136-149

Liang, H., & Xue, Y. L. (2010). Understanding security behaviors in personal computer usage: A threat avoidance perspective. Journal of the Association for Information Systems, 11(7), 1. DOI: https://doi.org/10.17705/1jais.00232

Lim, W. (2024). A typology of validity: content, face, convergent, discriminant, nomological and predictive validity. Journal of Trade Science, 12(3), 155–179. https://doi.org/10.1108/jts-03-2024-0016 DOI: https://doi.org/10.1108/JTS-03-2024-0016

Liu, Y., Bagaïni, A., Son, G., Kapoor, M., & Mata, R. (2023). Life-Course Trajectories of Risk-Taking Propensity: A Coordinated Analysis of Longitudinal Studies. The Journals of Gerontology: Series B, 78(3), 445–455. https://doi.org/10.1093/geronb/gbac175 DOI: https://doi.org/10.1093/geronb/gbac175

Lu, C.-H. (2024). The moderating role of e-lifestyle on disclosure intention in mobile banking: A privacy calculus perspective. Electronic Commerce Research and Applications, 64, 101374. DOI: https://doi.org/10.1016/j.elerap.2024.101374

Lubua, E. W., Semlambo, A. A., & Mkude, C. G. (2023). Factors Affecting the Security of Information Systems in Africa: A Literature Review. University of Dar Es Salaam Library Journal, 17(2), 94–114. https://doi.org/10.4314/udslj.v17i2.7 DOI: https://doi.org/10.4314/udslj.v17i2.7

Malero, A. (2015). Measuring security awareness on mobile money users in Tanzania. International Journal of Engineering Trends and Technology, 20(1), 44–47. DOI: https://doi.org/10.14445/22315381/IJETT-V20P210

McCormac, A., Zwaans, T., Parsons, K., Calic, D., Butavicius, M., & Pattinson, M. (2017). Individual Differences and Information Security Awareness. Computers in Human Behavior, 69, 151–156. DOI: https://doi.org/10.1016/j.chb.2016.11.065

McGill, T., & Thompson, N. (2021). Exploring potential gender differences in information security and privacy. Information and Computer Security, 29(5), 850–865. https://doi.org/10.1108/ICS-07-2020-0125 DOI: https://doi.org/10.1108/ICS-07-2020-0125

Meier, Y., & Krämer, N. C. (2024). The privacy calculus revisited: an empirical investigation of online privacy decisions on between-and within-person levels. Communication Research, 51(2), 178–202. DOI: https://doi.org/10.1177/00936502221102101

Mutimukwe, C., Viberg, O., Oberg, M., & Pargman, T. C.-. (2022). Students' privacy concerns in learning analytics : Model development. British Journal of Educational Technology, 53, 932–951. https://doi.org/10.1111/bjet.13234 DOI: https://doi.org/10.1111/bjet.13234

Ngoqo, B., & Flowerday, S. V. (2015). Exploring the relationship between student mobile information security awareness and behavioural intent. Information & Computer Security, 23(4), 406–420. DOI: https://doi.org/10.1108/ICS-10-2014-0072

Nguyen, Q. N., & Kim, D. J. (2017). Enforcing Information Security Protection : Risk Propensity and Self-Efficacy Perspectives. Proceedings of the 50th Hawaii International Conference on System Sciences, 4947–4956. DOI: https://doi.org/10.24251/HICSS.2017.601

Park, C., Kim, D., Cho, S., & Han, H.-J. (2019). Adoption of multimedia technology for learning and gender difference. Computers in Human Behavior, 92, 288–296. DOI: https://doi.org/10.1016/j.chb.2018.11.029

Rahi, S., & Abd. Ghani, M. (2018). The role of UTAUT, DOI, perceived technology security and game elements in internet banking adoption. World Journal of Science, Technology and Sustainable Development, 15(4), 338–356. DOI: https://doi.org/10.1108/WJSTSD-05-2018-0040

Reeves, A., Delfabbro, P., & Calic, D. (2021). Encouraging Employee Engagement With Cybersecurity : How to Tackle Cyber Fatigue. Sage Open, 1–18. https://doi.org/10.1177/21582440211000049 DOI: https://doi.org/10.1177/21582440211000049

Rogers, R. W. (1975). A protection motivation theory of fear appeals and attitude change1. The Journal of Psychology, 91(1), 93–114. DOI: https://doi.org/10.1080/00223980.1975.9915803

Schomakers, E.-M., Lidynia, C., & Ziefle, M. (2022). The role of privacy in the acceptance of smart technologies: Applying the privacy calculus to technology acceptance. International Journal of Human–Computer Interaction, 38(13), 1276–1289. DOI: https://doi.org/10.1080/10447318.2021.1994211

Senarath, A. R., & Arachchilage, N. A. G. (2018). Understanding user privacy expectations: A software developer's perspective. Telematics and Informatics, 35(7), 1845–1862. DOI: https://doi.org/10.1016/j.tele.2018.05.012

Senior, V., Smith, J. A., Michie, S., & Marteau, T. M. (2002). Making sense of risk: An interpretative phenomenological analysis of vulnerability to heart disease. Journal of Health Psychology, 7(2), 157–168. DOI: https://doi.org/10.1177/1359105302007002455

Sun, Y., Wang, N., Shen, X.-L., & Zhang, J. X. (2015). Location information disclosure in location-based social network services: Privacy calculus, benefit structure, and gender differences. Computers in Human Behavior, 52, 278–292. DOI: https://doi.org/10.1016/j.chb.2015.06.006

Tahaei, M., Abu-Salma, R., & Rashid, A. (2023). Stuck in the Permissions With You: Developer & End-User Perspectives on App Permissions & Their Privacy Ramifications. In Conference on Human Factors in Computing Systems - Proceedings (Vol. 1, Issue 1). Association for Computing Machinery. https://doi.org/10.1145/3544548.3581060 DOI: https://doi.org/10.1145/3544548.3581060

Tahaei, M., & Vaniea, K. (2021). "developers are responsible": What ad networks tell developers about privacy. Extended Abstracts of the 2021 CHI Conference on Human Factors in Computing Systems, 1–11. DOI: https://doi.org/10.1145/3411763.3451805

Tan, K., Leong, C., Richter, N. F., & Tan, K. (2025). Navigating Trust in Mobile Payments : Using Necessary Condition Analysis to Identify Must- Have Factors for User Acceptance Navigating Trust in Mobile Payments : Using Necessary Condition Analysis to Identify Must-Have Factors for User Acceptance. International Journal of Human–Computer Interaction, 41(5), 3325–3339. https://doi.org/10.1080/10447318.2024.2338319 DOI: https://doi.org/10.1080/10447318.2024.2338319

Ti, S. (2019). Gender differences in privacy tendencies on social network sites : A meta- analysis. Computers in Human Behavior, 93(June 2018), 1–12. https://doi.org/10.1016/j.chb.2018.11.046

Tian, X. (2025). Unraveling the dynamics of password manager adoption : a deeper dive into critical factors. Information & Computer Security, 33(1), 117–139. https://doi.org/10.1108/ICS-09-2023-0156 DOI: https://doi.org/10.1108/ICS-09-2023-0156

Tian, Y., Chan, T. J., Suki, N. M., & Kasim, M. A. (2023). Moderating role of perceived trust and perceived service quality on consumers' use behavior of Alipay e-wallet system: the perspectives of technology acceptance model and theory of planned behavior. Human Behavior and Emerging Technologies, 2023. DOI: https://doi.org/10.1155/2023/5276406

Tifferet, S. (2019). Gender differences in privacy tendencies on social network sites: A meta-analysis. Computers in Human Behavior, 93, 1–12. DOI: https://doi.org/10.1016/j.chb.2018.11.046

van der Schyff, K., & Flowerday, S. (2021). Mediating effects of information security awareness. Computers & Security, 106, 102313. DOI: https://doi.org/10.1016/j.cose.2021.102313

Venkatesh, V., Morris, M. G., & Ackerman, P. L. (2000). A longitudinal field investigation of gender differences in individual technology adoption decision-making processes. Organisational Behavior and Human Decision Processes, 83(1), 33–60. DOI: https://doi.org/10.1006/obhd.2000.2896

Wijesekera, P., Reardon, J., Reyes, I., Tsai, L., Chen, J. W., Good, N., Wagner, D., Beznosov, K., & Egelman, S. (2018). Contextualising privacy decisions for better prediction (and protection). Conference on Human Factors in Computing Systems - Proceedings, 2018-April, 1–12. https://doi.org/10.1145/3173574.3173842 DOI: https://doi.org/10.1145/3173574.3173842

Xu, F., Michael, K., & Chen, X. (2013). Factors affecting privacy disclosure on social network sites: An integrated model. Electronic Commerce Research, 13(2), 151–168. https://doi.org/10.1007/s10660-013-9111-6 DOI: https://doi.org/10.1007/s10660-013-9111-6

Downloads

How to Cite

Koloseni, D., & Mandari, H. (2026). Unveiling Willingness to Adopt Online Privacy Control Measures in Tanzanian Higher Learning Institutions: A Gender-Based Multi-group Analysis Approach. Asia Pacific Economic and Management Review, 3(1). https://doi.org/10.62177/apemr.v3i1.1006

Issue

Section

Articles

DATE

Received: 2026-01-01
Accepted: 2026-01-05
Published: 2026-01-21