Unveiling Willingness to Adopt Online Privacy Control Measures in Tanzanian Higher Learning Institutions: A Gender-Based Multi-group Analysis Approach
DOI:
https://doi.org/10.62177/apemr.v3i1.1006Keywords:
Privacy, Control Measures, Gender, Tanzania, Multi-Group AnalysisAbstract
The internet is among the primary learning resources, attracting students to use it for educational and social purposes. Observing privacy when using the internet is essential, especially for students in HLIs, given the privacy and security threats. This research examines the adoption of privacy control measures among students in HLIs. The study employed Structural Equation Modeling (SEM) to identify factors influencing willingness to adopt privacy control measures and to examine gender differences in this regard. Data were collected from 11 HLIs in Tanzania, comprising 390 males and 286 females. The findings for the full sample revealed that risk perceptions, privacy concerns, and perceived trust positively influence students' willingness to adopt privacy control measures. Furthermore, social influence and perceived security awareness positively influenced perceived trust. Additionally, the study found that convenience negatively affects users' willingness to adopt privacy control measures and that perceived risk negatively affects users' trust in the internet. However, neither social influence nor perceived security awareness affects willingness to adopt privacy control measures. The study also found a significant difference in perceived security awareness between genders regarding willingness to adopt privacy control measures. The study ultimately offers implications for researchers, practitioners, and managers seeking to promote the adoption of privacy control measures among students.
Downloads
References
Akter, M., Park, J. K., Headrick, C., Page, X., & Wisniewski, P. J. (2025). Calculating Connection vs. Risk: Understanding How Youth Negotiate Digital Privacy and Security with Peers Online. ArXiv Preprint ArXiv:2503.22993. DOI: https://doi.org/10.1145/3757564
Alesanco-Llorente, M., Reinares-Lara, E., Pelegrín-Borondo, J., & Olarte-Pascual, C. (2023). Mobile-assisted showrooming behavior and the (r) evolution of retail: The moderating effect of gender on the adoption of mobile augmented reality. Technological Forecasting and Social Change, 191, 122514. DOI: https://doi.org/10.1016/j.techfore.2023.122514
Allen, A. L. (1999). Gender and privacy in cyberspace. Stan. L. Rev., 52, 1175–1200. DOI: https://doi.org/10.2307/1229512
Almaiah, M. A., Al-otaibi, S., Shishakly, R., Hassan, L., Lutfi, A., Alrawad, M., Qatawneh, M., & Alghanam, O. A. (2023). Investigating the Role of Perceived Risk , Perceived Security and Perceived Trust on Smart m-Banking Application Using SEM. 1–17. DOI: https://doi.org/10.3390/su15139908
Ara, A., Zainol, Z., & Duraisamy, B. (2022). The effects of privacy awareness, security concerns and trust on information sharing in social media among public university students in Selangor. International Business Education Journal, 15(2), 93–110. DOI: https://doi.org/10.37134/ibej.Vol15.2.8.2022
Armstrong, J. S., & Overton, T. S. (1977). Estimating non-response bias in mail surveys. Journal of Marketing Research, 14(3), 396–402. DOI: https://doi.org/10.1177/002224377701400320
Ashrafi, D. M., Ahmed, S., & Shahid, T. S. (2024). Privacy or trust: understanding the privacy paradox in users' intentions towards e-pharmacy adoption through the lens of privacy-calculus model. Journal of Science and Technology Policy Management. DOI: https://doi.org/10.1108/JSTPM-09-2023-0149
Baruh, L., Secinti, E., & Cemalcilar, Z. (2017). Online Privacy Concerns and Privacy Management: A Meta-Analytical Review. Journal of Communication, 67(1), 26–53. https://doi.org/10.1111/jcom.12276 DOI: https://doi.org/10.1111/jcom.12276
Bélanger, F., & Xu, H. (2015). The role of information systems research in shaping the future of information privacy. Information Systems Journal, 25(6), 573–578. DOI: https://doi.org/10.1111/isj.12092
Benhissi, M., & Hamouda, M. (2025). Investigating consumers' slow fashion purchase decision: role of lack of information and confusion. European Business Review, 37(3), 575–595. DOI: https://doi.org/10.1108/EBR-02-2024-0079
Benoit, S., Klose, S., & Ettinger, A. (2017). Linking service convenience to satisfaction: Dimensions and key moderators. Journal of Services Marketing, 31(6), 527–538. DOI: https://doi.org/10.1108/JSM-10-2016-0353
Berkman, B. A. (1971). The Assault on Privacy: Computers, Data Banks, and Dossiers, by Arthur R. Miller. Case Western Reserve Law Review, 22(4), 808.
Chen, H.-T., & Chen, W. (2015). Couldn't or wouldn't? The influence of privacy concerns and self-efficacy in privacy management on privacy protection. Cyberpsychology, Behavior, and Social Networking, 18(1), 13–19. DOI: https://doi.org/10.1089/cyber.2014.0456
Chen, S., Doerr, S., Frost, J., Gambacorta, L., & Shin, H. S. (2023). The fintech gender gap. Journal of Financial Intermediation, 54, 101026. DOI: https://doi.org/10.1016/j.jfi.2023.101026
Cheng, X., Qiao, L., Yang, B., & Zhang, X. (2024). Investigation on users' resistance intention to facial recognition payment : a perspective of privacy. Electronic Commerce Research, 24, 275–301. DOI: https://doi.org/10.1007/s10660-022-09588-y
Choi, H., Park, J., & Jung, Y. (2018). The role of privacy fatigue in online privacy behavior. Computers in Human Behavior, 81, 42–51. DOI: https://doi.org/10.1016/j.chb.2017.12.001
Dinev, T., Bellotto, M., Hart, P., Russo, V., Serra, I., & Colautti, C. (2006). Privacy calculus model in e-commerce–a study of Italy and the United States. European Journal of Information Systems, 15(4), 389–402. DOI: https://doi.org/10.1057/palgrave.ejis.3000590
Dinev, T., & Hu, Q. (2007). The centrality of awareness in the formation of user behavioral intention toward protective information technologies. Journal of the Association for Information Systems, 8(7), 23. DOI: https://doi.org/10.17705/1jais.00133
Elbitar, Y., Schilling, M., Nguyen, T. T., Backes, M., & Bugiel, S. (2021). Explanation beats context: The effect of timing & rationales on users' runtime permission decisions. 30th USENIX Security Symposium (USENIX Security 21), 785–802.
ElShahed, H. (2023). Privacy Paradox Amid E-Commerce Epoch: Examining Egyptian Youth's Practices of Digital Literacy Online. In Marketing and Advertising in the Online-to-Offline (O2O) World (pp. 45–64). IGI Global. DOI: https://doi.org/10.4018/978-1-6684-5844-0.ch003
Esmaeilzadeh, P. (2020). The impacts of the privacy policy on individual trust in health information exchanges (HIEs). Internet Research, 30(3), 811–843. https://doi.org/10.1108/INTR-01-2019-0003 DOI: https://doi.org/10.1108/INTR-01-2019-0003
Feng, Y., Yao, Y., & Sadeh, N. (2021). A design space for privacy choices: Towards meaningful privacy control in the internet of things. Proceedings of the 2021 CHI Conference on Human Factors in Computing Systems, 1–16. DOI: https://doi.org/10.1145/3411764.3445148
Fernandes, T., & Costa, M. (2023). Privacy concerns with COVID-19 tracking apps: A privacy calculus approach. Journal of Consumer Marketing, 40(2), 181–192. DOI: https://doi.org/10.1108/JCM-03-2021-4510
Ferrante, T., & Ajani, T. (2024). Risk-Taking Propensity and Information Security Compliance Behavior in Government Workers: A Quantitative Correlational Study. Issues in Information Systems, 25(3), 1–12.
Fortino, G., Fotia, L., Messina, F., Rosaci, D., & Sarné, G. M. L. (2020). Trust and Reputation in the Internet of Things: State-of-the-Art and Research Challenges. IEEE Access, 8, 60117–60125. https://doi.org/10.1109/ACCESS.2020.2982318 DOI: https://doi.org/10.1109/ACCESS.2020.2982318
Gong, J., Said, F., Ting, H., Firdaus, A., Ali, I., & Jinghong, A. (2023). Do Privacy Stress and Brand Trust still Matter ? Implications on Continuous Online Purchasing Intention in China. Current Psychology, 42(18), 15515–15527. https://doi.org/10.1007/s12144-022-02857-x DOI: https://doi.org/10.1007/s12144-022-02857-x
Haeussinger, F., & Kranz, J. (2013). Information security awareness: Its antecedents and mediating effects on security compliant behavior. Thirty Fourth International Conference on Information Systems.
Henseler, J., Ringle, C. M., & Sarstedt, M. (2015). A new criterion for assessing discriminant validity in variance-based structural equation modeling. Journal of the Academy of Marketing Science, 43(1), 115–135. DOI: https://doi.org/10.1007/s11747-014-0403-8
Henseler, J., Ringle, C. M., & Sinkovics, R. R. (2009). The Use of Partial Least Squares Path Modeling in International Marketing. In R. . Sinkovics & P. . Ghauri (Eds.), New challenges to international marketing (pp. 277–319). Emerald Group Publishing Limited. https://doi.org/https://doi.org/10.1108/S1474-7979(2009)0000020014 DOI: https://doi.org/10.1108/S1474-7979(2009)0000020014
Ho, S., Lwin, M., Yee, A., & Lee, E. (2015). Understanding Factors Associated with Singaporean Adolescents' Intention to Adopt Privacy Protection Behavior Using an Extended Theory of Planned Behavior. Cyberpsychology, Behavior, and Social Networking, 1–24.
Jabbar, A., Geebren, A., Hussain, Z., Dani, S., & Ul-Durar, S. (2023a). Investigating individual privacy within CBDC: A privacy calculus perspective. Research in International Business and Finance, 64, 101826.
Jabbar, A., Geebren, A., Hussain, Z., Dani, S., & Ul-Durar, S. (2023b). Investigating individual privacy within CBDC: A privacy calculus perspective. Research in International Business and Finance, 64(May 2022), 101826. https://doi.org/10.1016/j.ribaf.2022.101826 DOI: https://doi.org/10.1016/j.ribaf.2022.101826
Jang, C. (2024). Coping with vulnerability: the effect of trust in AI and privacy-protective behaviour on the use of AI-based services. Behaviour & Information Technology, 43(11), 2388–2400. DOI: https://doi.org/10.1080/0144929X.2023.2246590
Jaspers, E. D. T., & Pearson, E. (2022). Consumers' acceptance of domestic Internet-of-Things : The role of trust and privacy concerns. Journal of Business Research, 142(January 2021), 255–265. https://doi.org/10.1016/j.jbusres.2021.12.043 DOI: https://doi.org/10.1016/j.jbusres.2021.12.043
Kang, H. (2023). Communication privacy management for smart speaker use : Integrating the role of privacy self-efficacy and the multidimensional view. New Media & Society, 25(5), 1153–1175. https://doi.org/10.1177/14614448211026611 DOI: https://doi.org/10.1177/14614448211026611
Koloseni, D., & Sedoyeka, E. M. (2019). The Adoption of Security Control Apps among Smartphone Users in Tanzania. International Journal of Technology Diffusion (IJTD), 10(4), 1–18. DOI: https://doi.org/10.4018/IJTD.2019100101
Koohang, A., Floyd, K., Yerby, J., & Paliszkiewicz, J. (2021). Social media privacy concerns, security concerns, trust, and awareness: Empirical validation of an instrument. Issues in Information Systems, 22(2), 133–145. https://doi.org/10.48009/2_iis_2021_136-149 DOI: https://doi.org/10.48009/2_iis_2021_136-149
Liang, H., & Xue, Y. L. (2010). Understanding security behaviors in personal computer usage: A threat avoidance perspective. Journal of the Association for Information Systems, 11(7), 1. DOI: https://doi.org/10.17705/1jais.00232
Lim, W. (2024). A typology of validity: content, face, convergent, discriminant, nomological and predictive validity. Journal of Trade Science, 12(3), 155–179. https://doi.org/10.1108/jts-03-2024-0016 DOI: https://doi.org/10.1108/JTS-03-2024-0016
Liu, Y., Bagaïni, A., Son, G., Kapoor, M., & Mata, R. (2023). Life-Course Trajectories of Risk-Taking Propensity: A Coordinated Analysis of Longitudinal Studies. The Journals of Gerontology: Series B, 78(3), 445–455. https://doi.org/10.1093/geronb/gbac175 DOI: https://doi.org/10.1093/geronb/gbac175
Lu, C.-H. (2024). The moderating role of e-lifestyle on disclosure intention in mobile banking: A privacy calculus perspective. Electronic Commerce Research and Applications, 64, 101374. DOI: https://doi.org/10.1016/j.elerap.2024.101374
Lubua, E. W., Semlambo, A. A., & Mkude, C. G. (2023). Factors Affecting the Security of Information Systems in Africa: A Literature Review. University of Dar Es Salaam Library Journal, 17(2), 94–114. https://doi.org/10.4314/udslj.v17i2.7 DOI: https://doi.org/10.4314/udslj.v17i2.7
Malero, A. (2015). Measuring security awareness on mobile money users in Tanzania. International Journal of Engineering Trends and Technology, 20(1), 44–47. DOI: https://doi.org/10.14445/22315381/IJETT-V20P210
McCormac, A., Zwaans, T., Parsons, K., Calic, D., Butavicius, M., & Pattinson, M. (2017). Individual Differences and Information Security Awareness. Computers in Human Behavior, 69, 151–156. DOI: https://doi.org/10.1016/j.chb.2016.11.065
McGill, T., & Thompson, N. (2021). Exploring potential gender differences in information security and privacy. Information and Computer Security, 29(5), 850–865. https://doi.org/10.1108/ICS-07-2020-0125 DOI: https://doi.org/10.1108/ICS-07-2020-0125
Meier, Y., & Krämer, N. C. (2024). The privacy calculus revisited: an empirical investigation of online privacy decisions on between-and within-person levels. Communication Research, 51(2), 178–202. DOI: https://doi.org/10.1177/00936502221102101
Mutimukwe, C., Viberg, O., Oberg, M., & Pargman, T. C.-. (2022). Students' privacy concerns in learning analytics : Model development. British Journal of Educational Technology, 53, 932–951. https://doi.org/10.1111/bjet.13234 DOI: https://doi.org/10.1111/bjet.13234
Ngoqo, B., & Flowerday, S. V. (2015). Exploring the relationship between student mobile information security awareness and behavioural intent. Information & Computer Security, 23(4), 406–420. DOI: https://doi.org/10.1108/ICS-10-2014-0072
Nguyen, Q. N., & Kim, D. J. (2017). Enforcing Information Security Protection : Risk Propensity and Self-Efficacy Perspectives. Proceedings of the 50th Hawaii International Conference on System Sciences, 4947–4956. DOI: https://doi.org/10.24251/HICSS.2017.601
Park, C., Kim, D., Cho, S., & Han, H.-J. (2019). Adoption of multimedia technology for learning and gender difference. Computers in Human Behavior, 92, 288–296. DOI: https://doi.org/10.1016/j.chb.2018.11.029
Rahi, S., & Abd. Ghani, M. (2018). The role of UTAUT, DOI, perceived technology security and game elements in internet banking adoption. World Journal of Science, Technology and Sustainable Development, 15(4), 338–356. DOI: https://doi.org/10.1108/WJSTSD-05-2018-0040
Reeves, A., Delfabbro, P., & Calic, D. (2021). Encouraging Employee Engagement With Cybersecurity : How to Tackle Cyber Fatigue. Sage Open, 1–18. https://doi.org/10.1177/21582440211000049 DOI: https://doi.org/10.1177/21582440211000049
Rogers, R. W. (1975). A protection motivation theory of fear appeals and attitude change1. The Journal of Psychology, 91(1), 93–114. DOI: https://doi.org/10.1080/00223980.1975.9915803
Schomakers, E.-M., Lidynia, C., & Ziefle, M. (2022). The role of privacy in the acceptance of smart technologies: Applying the privacy calculus to technology acceptance. International Journal of Human–Computer Interaction, 38(13), 1276–1289. DOI: https://doi.org/10.1080/10447318.2021.1994211
Senarath, A. R., & Arachchilage, N. A. G. (2018). Understanding user privacy expectations: A software developer's perspective. Telematics and Informatics, 35(7), 1845–1862. DOI: https://doi.org/10.1016/j.tele.2018.05.012
Senior, V., Smith, J. A., Michie, S., & Marteau, T. M. (2002). Making sense of risk: An interpretative phenomenological analysis of vulnerability to heart disease. Journal of Health Psychology, 7(2), 157–168. DOI: https://doi.org/10.1177/1359105302007002455
Sun, Y., Wang, N., Shen, X.-L., & Zhang, J. X. (2015). Location information disclosure in location-based social network services: Privacy calculus, benefit structure, and gender differences. Computers in Human Behavior, 52, 278–292. DOI: https://doi.org/10.1016/j.chb.2015.06.006
Tahaei, M., Abu-Salma, R., & Rashid, A. (2023). Stuck in the Permissions With You: Developer & End-User Perspectives on App Permissions & Their Privacy Ramifications. In Conference on Human Factors in Computing Systems - Proceedings (Vol. 1, Issue 1). Association for Computing Machinery. https://doi.org/10.1145/3544548.3581060 DOI: https://doi.org/10.1145/3544548.3581060
Tahaei, M., & Vaniea, K. (2021). "developers are responsible": What ad networks tell developers about privacy. Extended Abstracts of the 2021 CHI Conference on Human Factors in Computing Systems, 1–11. DOI: https://doi.org/10.1145/3411763.3451805
Tan, K., Leong, C., Richter, N. F., & Tan, K. (2025). Navigating Trust in Mobile Payments : Using Necessary Condition Analysis to Identify Must- Have Factors for User Acceptance Navigating Trust in Mobile Payments : Using Necessary Condition Analysis to Identify Must-Have Factors for User Acceptance. International Journal of Human–Computer Interaction, 41(5), 3325–3339. https://doi.org/10.1080/10447318.2024.2338319 DOI: https://doi.org/10.1080/10447318.2024.2338319
Ti, S. (2019). Gender differences in privacy tendencies on social network sites : A meta- analysis. Computers in Human Behavior, 93(June 2018), 1–12. https://doi.org/10.1016/j.chb.2018.11.046
Tian, X. (2025). Unraveling the dynamics of password manager adoption : a deeper dive into critical factors. Information & Computer Security, 33(1), 117–139. https://doi.org/10.1108/ICS-09-2023-0156 DOI: https://doi.org/10.1108/ICS-09-2023-0156
Tian, Y., Chan, T. J., Suki, N. M., & Kasim, M. A. (2023). Moderating role of perceived trust and perceived service quality on consumers' use behavior of Alipay e-wallet system: the perspectives of technology acceptance model and theory of planned behavior. Human Behavior and Emerging Technologies, 2023. DOI: https://doi.org/10.1155/2023/5276406
Tifferet, S. (2019). Gender differences in privacy tendencies on social network sites: A meta-analysis. Computers in Human Behavior, 93, 1–12. DOI: https://doi.org/10.1016/j.chb.2018.11.046
van der Schyff, K., & Flowerday, S. (2021). Mediating effects of information security awareness. Computers & Security, 106, 102313. DOI: https://doi.org/10.1016/j.cose.2021.102313
Venkatesh, V., Morris, M. G., & Ackerman, P. L. (2000). A longitudinal field investigation of gender differences in individual technology adoption decision-making processes. Organisational Behavior and Human Decision Processes, 83(1), 33–60. DOI: https://doi.org/10.1006/obhd.2000.2896
Wijesekera, P., Reardon, J., Reyes, I., Tsai, L., Chen, J. W., Good, N., Wagner, D., Beznosov, K., & Egelman, S. (2018). Contextualising privacy decisions for better prediction (and protection). Conference on Human Factors in Computing Systems - Proceedings, 2018-April, 1–12. https://doi.org/10.1145/3173574.3173842 DOI: https://doi.org/10.1145/3173574.3173842
Xu, F., Michael, K., & Chen, X. (2013). Factors affecting privacy disclosure on social network sites: An integrated model. Electronic Commerce Research, 13(2), 151–168. https://doi.org/10.1007/s10660-013-9111-6 DOI: https://doi.org/10.1007/s10660-013-9111-6
Downloads
How to Cite
Issue
Section
License
Copyright (c) 2026 Daniel Koloseni, Herman Mandari

This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.
DATE
Accepted: 2026-01-05
Published: 2026-01-21











