International Journal of Research and Innovation in Social Science

Submission Deadline- 11th September 2025
September Issue of 2025 : Publication Fee: 30$ USD Submit Now
Submission Deadline-03rd October 2025
Special Issue on Economics, Management, Sociology, Communication, Psychology: Publication Fee: 30$ USD Submit Now
Submission Deadline-19th September 2025
Special Issue on Education, Public Health: Publication Fee: 30$ USD Submit Now

Securing Virtual Workspaces: Examining The Mediating Role of Perceived Security Between Technology Adoption and Privacy Awareness

  • Marlina Muhamad
  • Mohd Fazil Jamaludin
  • Nurul Amira Azmi
  • Lydia Apriliani
  • Erindah Dimisyqiyani
  • 518-529
  • Sep 27, 2025
  • Management

Securing Virtual Workspaces: Examining The Mediating Role of Perceived Security Between Technology Adoption and Privacy Awareness

Marlina Muhamad¹*, Mohd Fazil Jamaludin², Nurul Amira Azmi³, Lydia Apriliani⁴, Erindah Dimisyqiyani⁵

1,2,3Faculty of Business and Management, University Teknologi MARA Kedah Campus

4,5Universitas Airlangga, Indonesia

DOI: https://dx.doi.org/10.47772/IJRISS.2025.909000044

Received: 25 August 2025; Accepted: 06 September 2025; Published: 27 September 2025

ABSTRACT

With the rapid advancement and widespread adoption of digital technologies, concerns about privacy have become increasingly prominent. Despite growing awareness, many users still struggle to understand how technology adoption impacts their privacy awareness, especially when mediated by perceived security measures. This study aims to develop a conceptual framework that examines the relationship between technology adoption and privacy awareness, focusing specifically on the mediating role of perceived security. Using narrative review methodology, relevant literature was systematically analyzed through the Scopus database. The findings reveal that security plays a critical mediating role by enhancing users’ trust and confidence, which in turn strengthens their awareness and protective behaviors related to privacy. Additionally, factors such as organizational readiness, user knowledge, and perceived risks were found to influence this relationship significantly. The study contributes to theory by integrating security as a key mediator in technology adoption models, providing a nuanced understanding of how privacy awareness is shaped. Practically, the results emphasize the importance for organizations to invest not only in advanced privacy-enhancing technologies but also in comprehensive security measures and user education programs to foster a privacy-conscious culture. However, given the conceptual nature of the study, future research should empirically test the proposed framework through longitudinal studies and cross-cultural comparisons to further validate the findings and examine other potential mediators across different cultural and technological environments. Overall, this research underscores the vital role of security in bridging technology adoption and privacy awareness, offering valuable insights for policymakers, practitioners, and researchers alike.

Keywords—Technology Adoption, Privacy Awareness, Perceived Security, Virtual Workspace, Privacy Technologies

INTRODUCTION

In the rapidly evolving digital landscape, virtual workspaces have become indispensable, transforming how individuals and organizations communicate, collaborate, and perform tasks. With the accelerated adoption of digital technologies, especially following the global shift to remote work, concerns surrounding privacy and security have become increasingly prominent [1]. As users become more privacy-aware and assertive, they actively evaluate the technologies they engage with, demanding assurances that their personal and organizational data are safeguarded [2]. Understanding the intricate relationship between technology adoption, privacy awareness, and the mediating role of security is critical in shaping the future of virtual workspaces.

The existing literature has explored various facets of technology adoption and privacy awareness, revealing that perceived invasiveness significantly impacts user behavior [2]. Studies highlight that security vulnerabilities, such as malware threats and data breaches, deter users from adopting emerging technologies [3]. In complex environments like the Metaverse, robust security measures such as blockchain for decentralized identity and AI-driven threat detection are essential to building trust [1]. However, despite awareness of privacy risks, gaps persist in the implementation of privacy-enhancing strategies, especially among technical teams and information engineers [4]; [5]. These gaps underscore the need for an integrated approach that positions security as a critical mediator between technology adoption and privacy awareness.

The core problem addressed in this study is the insufficient understanding of how security mediates the relationship between technology adoption and privacy awareness in virtual workspaces. While prior research has investigated privacy concerns and security measures independently, few studies have examined the mediating role security plays in shaping user perceptions and behavior [6]. This paper aims to bridge this gap by proposing a conceptual framework that captures the dynamic interactions among these constructs. By doing so, it offers a more comprehensive understanding of the factors driving technology adoption and privacy management in virtual environments.

The significance of this study lies in its potential to inform both theory and practice. Theoretically, it contributes to the discourse on technology adoption by integrating security as a mediator, an area often overlooked in existing models. Practically, it provides valuable insights for technology developers, policymakers, and organizational leaders striving to design secure and privacy-respecting virtual workspaces that meet the evolving expectations of users [7]; [8]. By addressing the ethical implications and regulatory challenges associated with privacy and security [9], the study aims to support the development of responsible and sustainable digital ecosystems.

This research is guided by the Privacy by Design (PbD) framework, which emphasizes embedding privacy and security measures into the development lifecycle of technologies [4]. The paper is structured as follows: The next section provides a detailed review of the relevant literature, followed by the development of the proposed conceptual framework. Subsequently, the research methodology is outlined, including data collection and analysis techniques. The paper concludes with a discussion of key findings, theoretical and practical implications, limitations, and recommendations for future research.

LITERATURE REVIEW

The proliferation of virtual workspaces has accelerated the need to understand the factors driving technology adoption and its consequences for privacy awareness. Research rooted in the Technology Acceptance Model (TAM) and Unified Theory of Acceptance and Use of Technology (UTAUT) consistently highlights that technological readiness, perceived usefulness, and organizational support are primary factors shaping the adoption of new tools [10]; [11]. [7] emphasized that both technological and organizational readiness significantly drive the adoption of Privacy Enhancing Technologies (PETs) in small and medium-sized enterprises (SMEs), with environmental factors exerting a stronger influence than managerial readiness. Similarly, [8] found that security awareness training tools are more likely to be accepted in organizations with proactive managerial commitment and robust digital infrastructures. These foundational studies underline that the willingness to adopt technologies is shaped by a complex interplay of readiness, utility perception, and supportive environments, all of which set the stage for later concerns about privacy and security.

Beyond mere adoption, security emerges as a critical mediator that shapes how users’ trust and attitudes translate into privacy awareness. [12] demonstrated that perceived privacy and perceived security positively influence e-government service adoption, particularly through mediating effects on user trust and attitudes. [13] further showed that individuals’ knowledge about security technologies enhances their self-efficacy, influencing both their adoption behavior and their perception of technology usefulness. Importantly, [14] observed that user behavior, especially regarding awareness-raising activities, plays a decisive role in how security measures are internalized in SMEs. This mediating role of security suggests that without adequate security frameworks, even the most advanced technologies can fail to cultivate meaningful privacy awareness among users, making security not just an add-on but an essential bridge between technology adoption and privacy consciousness.

In addressing the gap in existing literature, this study proposes a conceptual framework that integrates virtual workspace dynamics, technology adoption, security, and privacy awareness, positioning security as a mediating factor. Prior research has established that privacy awareness is deeply tied to users’ perceptions of threat and avoidability and that ethical and regulatory considerations further complicate the landscape [9]; [15]. [16] highlighted how security and trust shape behavioral intentions toward adopting data-intensive digital technologies, while [2] found that privacy concerns are among the top reasons for user resistance. [17] added that the assimilation of security policies depends not only on strategy but also on organizational knowledge, emphasizing that both individual and institutional factors are at play. Therefore, this study seeks to contribute a nuanced framework that not only links these elements but also informs future empirical research and practical strategies for building secure, privacy-aware virtual workspaces.

METHODOLOGY

Research Design: Narrative Review Methodology

This study employs a narrative review methodology, a qualitative research approach designed to synthesize, interpret, and integrate findings from prior scholarly works related to the research topic. Unlike systematic reviews, which follow rigid protocols for quantitative synthesis, narrative reviews are more flexible, allowing researchers to explore, interpret, and conceptually link diverse findings across disciplines.

Given the study’s focus on “Securing Virtual Workspaces: Exploring the Influence of Technology Adoption on Privacy Awareness Through Security as a Mediator,” the narrative review approach is particularly appropriate. This topic spans multiple fields-technology adoption models, privacy and security theories, user behavior, and organizational practices-requiring a synthesis that integrates insights from various domains rather than a narrow, quantitative aggregation.

Through this approach, the research aims to:

Map the key ideas and conceptual relationships between technology adoption, security mechanisms, and privacy awareness;

Identify trends, agreements, and gaps in existing literature; and

Provide an interpretive synthesis that informs future research and practical applications in virtual workspace environments.

The narrative review methodology thus enables a thematic exploration of complex interactions between human, technological, and organizational factors, offering a rich understanding of how security mediates the relationship between technology adoption and privacy awareness.

Key Steps in Conducting a Narrative Review: Data Collection through Scopus Database

The narrative review was conducted following a structured set of steps to ensure thoroughness and academic rigor. The primary data collection was carried out through the Scopus database, one of the most comprehensive indexing platforms for peer-reviewed literature across fields such as computer science, social sciences, and information systems.

The key steps included:

Defining the Research Focus

The review was centered on the research question: How does technology adoption influence privacy awareness in virtual workspaces, and how does security function as a mediating factor?

Selecting the Data Source

The Scopus database was chosen for its broad coverage of high-quality academic articles, ensuring access to authoritative and relevant publications spanning the core themes of technology, security, and privacy.

Developing a Search Strategy

A targeted search was conducted using carefully selected keywords and Boolean operators, including terms such as “technology adoption,” “privacy awareness,” “security mediation,” “virtual workspaces,” “privacy by design,” and “perceived security.” These terms were combined to retrieve a comprehensive set of relevant publications.

Applying Inclusion and Exclusion Criteria

The inclusion criteria specified that articles must (a) directly address one or more of the constructs of interest; (b) be published in peer-reviewed journals or reputable conference proceedings; (c) be written in English; and (d) be published within approximately the past two decades to ensure technological relevance. Articles lacking empirical or theoretical contributions, or those outside the defined scope, were excluded.

Data Extraction

From the selected articles, key details were systematically extracted, including study objectives, theoretical frameworks, methodologies, findings, and insights relevant to the mediation role of security between technology adoption and privacy awareness.

Thematic Synthesis

The extracted data were organized thematically, identifying recurring patterns, points of convergence or divergence, and conceptual relationships across studies. This allowed for the development of a synthesized understanding that bridges different perspectives and disciplines.

Narrative Construction

Finally, an interpretive narrative was developed, weaving together the key insights into a coherent storyline that addresses the central research question. This narrative highlights how technological choices, security considerations, and user privacy awareness interact in the context of virtual workspaces, offering a conceptual model that can inform future research and practical interventions.

Fig. 1 Steps in Conducting Narrative Review

Fig. 1 Steps in Conducting Narrative Review

By conducting a structured narrative review using the Scopus database, this study synthesizes and integrates a broad body of academic literature to explore the mediating role of security in the relationship between technology adoption and privacy awareness. This method provides a nuanced, qualitative understanding of how virtual workspaces are reshaping organizational and user experiences, setting the stage for theoretical advancement and practical recommendations.

Data Collection and Review Strategy

The data collection and review strategy for this narrative review was carefully designed to ensure comprehensive coverage of the literature relevant to the study’s focus on the interplay between technology adoption, security measures, and privacy awareness within virtual workspaces.

Search Strategy and String

The primary data collection was conducted using the Scopus database, which offers extensive coverage of peer-reviewed journal articles, conference proceedings, and high-impact research outputs across disciplines. A carefully structured search string was developed to capture the multifaceted nature of the research topic. The search string employed was as follows:

(“technology adoption” OR “tech adoption” OR “digital adoption” OR “innovation uptake”) AND (“privacy awareness” OR “data privacy” OR “information privacy” OR “confidentiality”) AND (“virtual workspace” OR “remote work” OR “telecommuting” OR “digital workplace”) AND (“user behavior” OR “user perception” OR “employee attitude” OR “workplace culture”) AND (“security measures” OR “data protection” OR “risk management” OR “compliance”)

This search string was designed using:

Synonymous terms to capture variations in terminology used across the literature (e.g., “technology adoption” and “digital adoption”; “privacy awareness” and “information privacy”).

Boolean operators (OR, AND) to link related concepts and ensure a broad yet precise retrieval of relevant articles.

Thematic coverage across five major conceptual domains: (1) technology adoption, (2) privacy concerns, (3) virtual work settings, (4) user behavior, and (5) security mechanisms.

Data Screening and Selection

The search yielded a large pool of studies. Titles and abstracts were first screened to assess relevance, followed by full-text reviews of articles meeting the inclusion criteria. Studies were selected if they:

Focused on the adoption or implementation of digital technologies in work settings;

Addressed issues related to user or employee privacy awareness;

Examined or theorized about security measures or compliance practices;

Explored user behaviors, perceptions, or cultural factors within virtual or digital workplaces.

Studies solely focused on technical aspects without user or organizational perspectives were excluded to maintain alignment with the study’s human-centered focus.

Integrative Thematic Analysis Approach

To synthesize the collected data, the study employed an integrative thematic analysis approach, which is well-suited for narrative reviews aiming to merge insights across diverse theoretical and empirical sources.

The key steps included:

Data Extraction

For each selected article, relevant details were systematically extracted, including theoretical frameworks, research questions, key findings, methodological approaches, and implications related to the interplay between technology adoption, security, and privacy.

Initial Coding

Using a qualitative coding process, key ideas, concepts, and theoretical propositions were identified across the articles. This involved reading and re-reading the materials to capture nuanced insights.

Theme Development

Codes were grouped into broader thematic categories, such as:

Factors influencing technology adoption in virtual work environments;

Perceptions and behaviors related to privacy and confidentiality;

The mediating or moderating role of security measures;

Organizational and cultural dynamics shaping user experiences.

Thematic Synthesis

The themes were synthesized into an integrated narrative that connects technological, behavioral, and organizational dimensions. This process allowed the study to go beyond a mere aggregation of findings, offering a conceptual map that highlights relationships, tensions, and emergent patterns across the reviewed literature.

Through carefully designed search strategy and a rigorous integrative thematic analysis, this study systematically identifies and synthesizes key themes, concepts, and theoretical perspectives related to technology adoption, privacy awareness, and security in virtual workspaces. This review approach not only provides a comprehensive understanding of existing knowledge but also highlights areas for future research and practical intervention. Here are the key steps in review strategy in Figure 2.

Fig. 2 Key Steps in Review Strategy

Fig. 2 Key Steps in Review Strategy

Key Findings from the Narrative Review

TABLE I Demographic Profile Of Participants

Author(s) Year Key Finding Description
[2] 2005 Privacy Assertiveness Shapes Adoption Users are increasingly sensitive to privacy invasions, leading them to avoid adopting technologies or platforms they perceive as privacy-invasive, as measured by tools like the Privacy Invasiveness Perception Scale (PIPS).
[18] 2022 Security Concerns Are Central to Adoption Security vulnerabilities (e.g., malware risks, data leaks) are major deterrents to adopting virtual workspaces. Robust, adaptive security measures such as blockchain identity protection and AI-based threat response increase trust.
[18] 2022 Security as a Mediator for Privacy Awareness Security concerns influence how users perceive and act on privacy issues. For example, information engineers’ negative views on Privacy by Design (PbD) stem from work risk perceptions, which then lower their intent to implement PbD.
[19] 2025 Awareness Gaps in Development Teams Even when development teams acknowledge security and privacy threats (like in VR applications), they often lack sufficient defense strategies, indicating a need for better integration of security to raise privacy awareness.
[20] 2021 Mediators in Organizational Contexts Technology adoption is not a linear process; it involves continuous sensemaking within organizations, where the interaction between security, privacy, and user behavior is shaped by organizational norms and context.
[21] 2024 Trust as a Foundation for Adoption Users’ perceptions of security build the necessary trust to adopt virtual workspace technologies. Transparent, strong security measures directly boost users’ willingness to engage, reducing resistance driven by privacy concerns.
[22] 2025 Ethical and Regulatory Complexity Ethical challenges and ambiguous regulatory frameworks complicate adoption decisions. Ethical assessments (beyond just privacy checks) are necessary to ensure responsible deployment and user acceptance of new technologies.
[23] 2021 Knowledge and Self-Efficacy Drive Adoption Users with higher security knowledge feel more capable and perceive technology as more useful, increasing adoption. Conversely, lack of knowledge lowers confidence, increasing resistance despite available security features.

The main research findings from the narrative review appear in Table 1. The narrative review reveals that the influence of technology adoption on privacy awareness in virtual workspaces is deeply shaped by the mediating role of security. Users are becoming more privacy assertive, avoiding technologies they perceive as intrusive, and these perceptions are often formed based on the strength of security measures in place. Studies highlight that security vulnerabilities, such as data leaks or malware risks, significantly deter adoption; conversely, robust solutions like blockchain-based identity protection or adaptive AI security systems enhance trust, which is essential for adoption.

Security does not operate in isolation-it acts as a critical mediator, shaping how privacy awareness emerges and evolves. For example, the reluctance of information engineers to adopt Privacy by Design (PbD) principles is linked to their perceptions of work-related risks, which are tied to security challenges. Similarly, while development teams working on virtual reality systems acknowledge security and privacy threats, they often lack sufficient defense strategies, creating gaps in both organizational awareness and implementation.

A key insight is that technology-use mediation within organizations is an ongoing, dynamic process involving sensemaking, where security and privacy concerns are interpreted and acted upon in context. Users’ trust in the security of virtual workspaces is foundational—without it, even the most innovative technologies face resistance due to privacy concerns.

Importantly, the ethical and regulatory dimensions introduce additional complexity, underscoring the need for ethical impact assessments that go beyond compliance checks to proactively address user concerns. Finally, user knowledge and self-efficacy play pivotal roles; when users understand security measures and feel confident in using the technology, adoption rates improve.

Development of Theoretical Framework

The theoretical framework for this study is grounded in technology acceptance models, particularly the Unified Theory of Acceptance and Use of Technology (UTAUT) and Privacy Calculus Theory, both of which explain how individuals assess the benefits and risks of adopting new technologies [11]. The introduction to the theoretical framework focuses on understanding the complex interplay between technology adoption, security perceptions, and privacy awareness in virtual workspaces. Specifically, this study applies Privacy Calculus Theory, which posits that users weigh perceived benefits (e.g., productivity, convenience) against perceived risks (e.g., privacy loss) when adopting technologies, and UTAUT, which identifies factors such as performance expectancy, effort expectancy, social influence, and facilitating conditions as critical to adoption decisions [11].

In the application of the theory in the context of the study, the framework conceptualizes security as a key mediating variable that influences how technology adoption affects privacy awareness. While users may be willing to adopt virtual workspaces for their utility, their ultimate sense of privacy awareness is shaped by how secure they perceive the environment to be [1]; [4]. The conceptualization of the framework thus positions security not merely as a technical safeguard but as a perceptual and behavioral mediator that links adoption intentions to privacy-related outcomes. This is further reinforced by integrating theoretical insights from literature, such as the observation that organizational readiness, technological readiness, and environmental pressures affect not just adoption rates but also how privacy-enhancing technologies are implemented and perceived [7]; [8]. The framework integrates these multi-level influences—individual, organizational, and environmental—into a cohesive model. A model reflecting the research framework appears in Figure 3 following assessment of the previous components.

Fig. 3 Proposed Theoretical Framework

Fig. 3 Proposed Theoretical Framework

The practical implications and application of this framework lie in its ability to guide virtual workspace designers and managers in addressing both the technical and perceptual dimensions of security to enhance privacy awareness and drive technology adoption. For instance, ensuring transparent communication about security measures and involving users in co-design processes can foster trust and acceptance [16]. Moreover, the framework emphasizes the need to address ethical and regulatory challenges, ensuring that privacy and security are not afterthoughts but integral to the system design [9].

Proposition Development

Technology Adoption Affects Privacy Awareness

Technology adoption plays a crucial role in shaping individuals’ privacy awareness, especially within virtual workspaces where security concerns are paramount. The adoption of Privacy Enhancing Technologies (PETs) and related security tools is often influenced by users’ perceptions of privacy and security, which together foster greater trust and a positive attitude towards technology use [7]; [12]. Security acts as a key mediating factor in this relationship by not only influencing how users perceive risks but also by enhancing their confidence and self-efficacy in adopting new technologies, thus elevating privacy awareness [13]; [12]. Factors such as technological readiness, organizational support, and individual knowledge about security mechanisms are critical for facilitating this mediation, ensuring that privacy concerns are addressed proactively [14]; [8]. Moreover, the ethical implications of technology adoption underscore the importance of integrating Privacy by Design principles and regulatory compliance to balance technological benefits with privacy protection [4]; [9]. Consequently, organizations must strategically manage security perceptions during technology adoption to enhance users’ privacy awareness effectively, ensuring that both security and privacy concerns are simultaneously addressed to build trust and increase adoption rates [24]. Therefore, this study proposes the following proposition:

Proposition 1: Security mediates the relationship between technology adoption and privacy awareness, such that higher perceived security strengthens the positive effect of technology adoption on privacy awareness.

Technology Adoption Affects Security

Technology adoption plays a critical role in shaping privacy awareness, with security serving as a pivotal mediator in this relationship. As organizations and individuals increasingly embrace new technologies, especially Privacy Enhancing Technologies (PETs), the perception of security becomes essential in influencing users’ awareness and concerns about privacy. The successful adoption of technology is often contingent upon users’ trust that adequate security measures are in place, which in turn enhances their sensitivity to privacy issues [12]. Security acts as a bridge that not only mitigates risks associated with technology use but also bolsters users’ confidence, facilitating higher engagement and more informed privacy awareness [24]. Moreover, knowledge and understanding of information security significantly affect users’ self-efficacy and adoption decisions, reducing anxiety and fostering proactive privacy behaviors [13]. This dynamic suggests that technology adoption alone does not directly elevate privacy awareness; rather, it is through enhanced security perceptions and trust that users become more conscious of privacy concerns. Organizations aiming to improve privacy awareness must therefore focus on reinforcing security frameworks alongside adopting innovative technologies, ensuring ethical compliance and regulatory adherence to foster a balanced environment where privacy is protected and valued [7]; [9]. Consequently, this interplay implies that security mediates the effect of technology adoption on privacy awareness, underscoring the importance of integrated security measures in technology deployment strategies.

Proposition 2: Security positively mediates the relationship between technology adoption and privacy awareness, such that increased adoption of technology leads to heightened privacy awareness primarily when security perceptions are strong.

Security Affects Privacy Awareness

Security significantly influences privacy awareness by acting as a crucial mediator between technology adoption and users’ understanding and concern for privacy issues. As organizations adopt new technologies, especially Privacy Enhancing Technologies (PETs), the perception of robust security measures fosters trust and confidence among users, which directly enhances their privacy awareness [12]. Empirical evidence suggests that perceived security not only facilitates technology adoption but also shapes users’ attitudes and behaviors towards privacy protection, as users are more likely to engage with and become aware of privacy risks when they believe their data is secure [24]. Moreover, knowledge of security practices empowers users, increasing their self-efficacy and reducing anxiety related to technology use, which further reinforces privacy consciousness [13]. Without effective security, technology adoption alone may fail to increase privacy awareness, as concerns over potential vulnerabilities can inhibit trust and engagement with privacy safeguards [7]. Therefore, organizations must prioritize strengthening security frameworks to promote a deeper awareness of privacy issues while complying with ethical and legal standards [9]. This highlights that security perceptions are a vital determinant that bridges technology adoption and the resulting increase in privacy awareness, emphasizing the need for integrated security strategies in technological implementations. Therefore, this study proposes:

Proposition 3: Security positively influences privacy awareness such that higher perceived security strengthens the effect of technology adoption on users’ privacy awareness.

The Relationship between Technology Adoption and Privacy Awareness through Security

Technology adoption influences privacy awareness significantly, with security playing a crucial mediating role in this relationship. As organizations and individuals adopt new technologies, especially Privacy Enhancing Technologies (PETs), users’ perception of security enhances their trust and positive attitude toward technology use, which in turn heightens their awareness and concern for privacy issues [12]. Security perceptions mediate this relationship by improving users’ confidence and self-efficacy in managing personal data, thereby reducing technology anxiety and fostering more informed privacy-related decisions [13]; [24]. Without adequate security measures, technology adoption may fail to translate into increased privacy awareness because users may withhold engagement due to fears of data breaches or misuse [7]. Moreover, ethical and regulatory considerations require organizations to embed robust security frameworks that align with privacy by design principles to support sustainable technology adoption and privacy protection [9]; [4]. Therefore, security not only facilitates the adoption process but also bridges technology use and heightened privacy awareness, underscoring the importance of integrating security strategies to promote privacy-conscious behaviors effectively.

Proposition 4: Security positively mediates the relationship between technology adoption and privacy awareness, such that higher perceived security strengthens the impact of technology adoption on users’ privacy awareness.

CONCLUSIONS

This study highlights that technology adoption significantly enhances privacy awareness, with security functioning as a vital mediator that strengthens users’ trust and confidence in managing their personal information. Theoretically, these findings contribute to a deeper understanding of how perceived security bridges the gap between technology use and privacy consciousness, enriching adoption models by integrating security as a core component. Practically, the study underscores the need for organizations to implement robust security measures and foster user education to promote privacy-aware behaviors effectively, thereby improving technology acceptance and compliance with privacy standards. However, the research is limited by its focus on specific technologies and contexts, which may restrict the generalizability of the findings across diverse settings and populations. Future research should explore this relationship across various industries and cultures, incorporate longitudinal designs to capture evolving perceptions over time, and investigate additional mediators or moderators, such as regulatory frameworks or individual privacy values, to provide a more comprehensive understanding of technology adoption and privacy awareness dynamics.

ACKNOWLEDGMENT

The authors would like to express their sincere gratitude to Universiti Teknologi MARA (UiTM) Kedah Campus for the continuous support and the anonymous reviewers for their valuable feedback, which greatly enhanced the clarity and quality of this article.

REFERENCES

  1. Salloum, S., Tahat, K., Tahat, D., Mansoori, A., & Alfaisal, R. (2023). Delving into the security & privacy of the Metaverse matrix. In Proceedings of the 2023 10th International Conference on Social Networks Analysis, Management and Security (SNAMS 2023) (pp. 1–6). IEEE. https://doi.org/10.1109/SNAMS60348.2023.10375463
  2. Bakke, S. (2005). Development and validation of a scale measuring the impact of information technologies on the privacy perceptions of users. Association for Information Systems – 11th Americas Conference on Information Systems, AMCIS 2005: A Conference on a Human Scale, 2, 557. https://www.scopus.com/inward/record.uri?eid=2-s2.0-84869831038&partnerID=40&md5=865cb2f3d1a54f4ac216f69577a7fc84
  3. Oleshko, R. S. (2023). Ensuring the security of using virtualization to protect data on the example of a peer-to-peer decentralized network TheOoL.net. AIP Conference Proceedings, 2700, Article 070002. https://doi.org/10.1063/5.0127179
  4. Bu, F., Wang, N., Jiang, Q., & Tian, X. (2024). Research on privacy-by-design behavioural decision-making of information engineers considering perceived work risk. Systems, 12(7), Article 250. https://doi.org/10.3390/systems12070250
  5. Sivelle, C., Palma, D., & De Moor, K. (2025). Security and privacy for VR in non-entertainment sectors: A practice-based study of the challenges, strategies and gaps. Proceedings – 2025 IEEE Conference on Virtual Reality and 3D User Interfaces Abstracts and Workshops, VRW 2025, 295–298. https://doi.org/10.1109/VRW66409.2025.00069
  6. Bansler, J. P., & Havn, E. (2003). Technology-use mediation: Making sense of electronic communication in an organizational context. Computer Supported Cooperative Work (CSCW), 12(1), 35–60. https://doi.org/10.1023/A:1022452508260
  7. Hasani, T., Rezania, D., Levallet, N., O’Reilly, N., & Mohammadi, M. (2023). Privacy enhancing technology adoption and its impact on SMEs’ performance. International Journal of Engineering Business Management, 15. https://doi.org/10.1177/18479790231172874
  8. Dahabiyeh, L. (2021). Factors affecting organizational adoption and acceptance of computer-based security awareness training tools. Information and Computer Security, 29(5), 836–849. https://doi.org/10.1108/ICS-12-2020-0200
  9. Joshi, R. (2024). Ethical conundrums and privacy concerns in new innovations: A systematic review. In Aspects of quality management in value creating in the Industry 5.0 way (pp. 202–223). https://doi.org/10.1201/9781032677040-12
  10. Davis, F. D. (1989). Perceived usefulness, perceived ease of use, and user acceptance of information technology. MIS Quarterly, 13(3), 319–340. https://doi.org/10.2307/249008
  11. Venkatesh, V., Morris, M. G., Davis, G. B., & Davis, F. D. (2003). User acceptance of information technology: Toward a unified view. MIS Quarterly, 27(3), 425–478. https://doi.org/10.2307/30036540
  12. Muneer, F., Azam, A., Yang, H., & Saeed, M. (2024). Examining perceived privacy, perceived security and technology anxiety into UMEGA in improving adoption behavior of e-government services: An evidence from Pakistan. International Journal of Human-Computer Interaction. https://doi.org/10.1080/10447318.2024.2430429
  13. Lui, S. M., & Hui, W. (2011). The effects of knowledge on security technology adoption: Results from a quasi-experiment. Proceedings – 5th International Conference on New Trends in Information Science and Service Science, NISS 2011, 2, 328–333. https://www.scopus.com/inward/record.uri?eid=2-s2.0-83755229140&partnerID=40&md5=c4932e7e4061508931367b074cf5798f
  14. Bergström, E., Kävrestad, J., Gustafsson, J. H., & Jonsson, H. (2024). Factors influencing the adoption of awareness-raising activities in SMEs. CEUR Workshop Proceedings, 3857, 118–131. https://www.scopus.com/inward/record.uri?eid=2-s2.0-85212672833&partnerID=40&md5=9238eab70658f757f64ccb467e5ff2a2
  15. Wright, D., & Mordini, E. (2012). Privacy and ethical impact assessment. In D. Wright & P. De Hert (Eds.), Privacy impact assessment (pp. 397–418). Springer.
  16. Nwaiwu, F., Kwarteng, M. A., Jibril, A. B., Buřita, L., & Pilík, M. (2020). Impact of security and trust as factors that influence the adoption and use of digital technologies that generate, collect and transmit user data. In Proceedings of the 15th International Conference on Cyber Warfare and Security (ICCWS 2020) (pp. 363–372). https://doi.org/10.34190/ICCWS.20.016
  17. Gallagher, K., Zhang, X., & Coleman Gallagher, V. (2012). Assimilation of security-related policies in U.S. firms: An empirical study of web assimilation and related knowledge as antecedents. In Proceedings of the 45th Hawaii International Conference on System Sciences (pp. 5053–5062). IEEE. https://doi.org/10.1109/HICSS.2012.124
  18. Shukurov, J. (2022). Advances in cybersecurity: AI-driven threat detection and blockchain for security. In Proceedings of Cyber Security Tashkent 2022.
  19. Rahartomo, A., Merino, L., Ghafari, M., & Ohshima, Y. (2025). The dilemma of privacy protection for developers in the metaverse. arXiv preprint arXiv:2501.12006. https://arxiv.org/abs/2501.12006
  20. Saghafian, M., Laumann, K., & Skogstad, M. R. (2021). Stagewise overview of issues influencing organizational technology adoption and use. Frontiers in Psychology, 12, 630145. https://doi.org/10.3389/fpsyg.2021.630145
  21. Leschanowsky, A., Rech, S., Popp, B., & Bäckström, T. (2024). Evaluating privacy, security, and trust perceptions in conversational AI: A systematic review. arXiv preprint arXiv:2406.09037. https://arxiv.org/abs/2406.09037
  22. Bashiir, A. A. (2025). Ethical considerations in emerging technologies: Balancing innovation and morality. RI Journal of Engineering and Physical Sciences, 2(1), 45–60. https://doi.org/10.59298/RIJEP/2025/415055
  23. Hameed, M. A., & Arachchilage, N. A. G. (2021). The role of self-efficacy on the adoption of information systems security innovations: A meta-analysis assessment. Personal and Ubiquitous Computing, 25(5), 911–925. https://doi.org/10.1007/s00779-021-01560-1arxiv.org+4
  24. Trang, S. T.-N., Ruch, T. J., & Kolbe, L. M. (2014). Collaborative technologies in an inter-organizational context: Examining the role of perceived information security and trust on post-adoption. Proceedings of the Annual Hawaii International Conference on System Sciences, Article 6758624, 160–169. https://doi.org/10.1109/HICSS.2014.29

Article Statistics

Track views and downloads to measure the impact and reach of your article.

0

PDF Downloads

0 views

Metrics

PlumX

Altmetrics

Paper Submission Deadline

Track Your Paper

Enter the following details to get the information about your paper

GET OUR MONTHLY NEWSLETTER