18 research outputs found

    An information privacy taxonomy for collaborative environments

    Get PDF
    Purpose: Information Privacy is becoming an increasingly important field of research with many new definitions and terminologies. Along similar rates of increase are the use, uptake and expansion of Collaborative Environments. There is a need for a better understanding and classification of information privacy concepts and terms. The pur-pose of this paper is to provide a taxonomy of Information Privacy in Collaborative Environments. The knowledge provided from an information privacy taxonomy can be used to formulate better information privacy policies, practices, and privacy enhancing technologies (PET?s).Approach: Through the hierarchical classification and categorization of information privacy concepts and principles an organized representation of these components has been produced. Each area was well surveyed and researched and then classified into a number of sub-categories according to their nature and relevance.Findings: A taxonomy was successfully developed with the identification of three high level dimensions of information privacy. Within each dimensional view a further three sub-classifications were proposed each with their own unique nature.Originality: This paper provides an Information Privacy taxonomy for Collaborative Environments, the first of its kind to be proposed. A number of new Information Pri-vacy terms are defined that make up the categorization and classification of Informa-tion Privacy concepts and components

    Measuring Users’ Privacy Concerns in Social Networking Sites

    Get PDF
    Social networking sites (SNSs) have become increasingly popular in recent years. These websites allow millions of individuals to create online profiles and disclose information with others. The disclosure of personal information has been considered as a major issue which can lead to negative consequences; therefore, privacy is a major concern of SNSs users. It is important to understand and measure the complexity of privacy concerns in SNSs. In this study, we investigate the nature of users’ privacy concerns in SNSs and its differences with information privacy concerns which previously studied in the setting of Internet and e-commerce. We then propose a new scale for measuring users’ privacy concerns in SNSs (UPCSNS) which will be useful for future SNSs privacy studies

    a qualitative research amongst ICT professionals

    Get PDF
    Ruivo, P., Santos, V., & Oliveira, T. (2014). Data protection in services and support roles: a qualitative research amongst ICT professionals. In CENTERIS 2014 - Conference On Enterprise Information Systems / Projman 2014 - International Conference On Project Management / Hcist 2014 - International Conference On Health And Social Care Information Systems And Technologies (Vol. 16, pp. 710-717). (Procedia Technology). DOI: 10.1016/j.protcy.2014.10.020Customers expect their data to be protected and not used in a manner inconsistent. The protection of their data is paramount to customers, and they evaluate ICTs in part on how well they handle and protect it from being stolen or used improperly. In many industries customers are specifically mandated to evaluate how ICTs firms protects their data. When customers create an account with ICTs firms, or use their services, they expect that a set of specific rules around how ICTs are used to manage their information. This qualitative research studied which recommendations service and support professionals should follow in their daily tasks to ensure customer data protection. It present 12 recommendations: Data classification (three categories: low, medium and high business impact), Encryption security tools, Password protection, Services tools for data collection and storage, Who access data, How many access data, Testing customer data, Geographic rules, Data retention, Data minimization, Escalating issues, and Readiness and training. This paper is intended to help ICTs how to apply key data protection principles on their daily work. Provides important data protection recommendations that ICTs are expected to apply when handle customer data. By handling customer data safely, ICTs firms build trust and loyalty.publishersversionpublishe

    A Conceptual Model for Explaining Violations of the Information Security Policy (ISP): A Cross Cultural Perspective

    Get PDF
    This paper is an attempt to develop a model that explores the factors that affect the frequency of violations of information security policies (ISPs). Additionally, it examines the moderating effect of cultural attributes on the frequency of ISP violations. Does national culture affect the way managers and employees perceive and practice ISPs? If we understand why ISPs are violated, perhaps we can deter future violations before they occur. We look at three groups of factors and the impact they have on the frequency of violations of ISPs. The factors examined are 1) the individual characteristics and capabilities of employees, 2) the information security policy (ISP) itself and 3) management issues. Finally, the study examines the moderating effect of Hofstede’s cultural dimensions (uncertainty avoidance, individualism/collectivism, and power distance) on the proposed model

    An annotated bibliography of multidisciplinary information security resources, for the purpose of maintaining privacy and confidentiality in New Zealand government records management

    No full text
    Research Problem Maintaining privacy and confidentiality of data in an age of e-government and electronic recordkeeping is one of the key challenges for records management staff today. In New Zealand this issue has attracted negative attention through several recent public sector privacy and security breaches, raising questions about systemic issues, accountability, and a disconnect between strategy and implementation. How government responds will depend in large measure on the advice received regarding solutions to information security. A bibliographic gap on the relationship between records management and information security has been identified in the academic literature. Methodology Using targeted search strategies this annotated bibliography draws together articles from a range of journals with the aim of developing a consolidated resource for practitioners to become acquainted with the multifaceted and multidisciplinary nature of information security. The outcome is a resource directly relevant to the New Zealand context, which identifies key perspectives, relationships, technical issues, and shortcomings in research. Results Key findings relate to publishing trends, divided disciplines, and shortcomings in research pertaining to records management relationships with IT groups and engagement in e-government. Implications Includes the development of more comprehensive e-government information and security strategies, the re-examination and utilisation of existing relationships, and the strengthening of records management's position as a contributor to research and leadership in the array of possible responses to information security

    combining traditional interviews with delphi method

    Get PDF
    Ruivo, P., Santos, V., & Oliveira, T. (2019). Success factors for data protection in services and support roles: combining traditional interviews with delphi method. In Censorship, Surveillance, and Privacy: Concepts, Methodologies, Tools, and Applications (Vol. 2, pp. 814-829). IGI Global. DOI: 10.4018/978-1-5225-7113-1.ch042The transformation of today’s information and communications technology (ICT) firms requires the services and support organizations to think differently about customers data protection. Data protection represents one of the security and privacy areas considered to be the next “blue ocean” in leveraging the creation of business opportunities. Based in contemporary literature, the authors conducted a two phases’ qualitative methodology - the expert’s interviews and Delphi method to identify and rank 12 factors on which service and support professionals should follow in their daily tasks to ensure customer data protection: 1) Data classification, 2) Encryption, 3) Password protection, 4) Approved tools, 5) Access controls, 6) How many access data, 7) Testing data, 8) Geographic rules, 9) Data retention, 10) Data minimization, 11) Escalating issues, and 12) Readiness and training. This paper contribute to the growing body of knowledge of data protection filed. The authors provide directions for future work for practitioners and researchers.authorsversionpublishe

    Exploring User Acceptance of a Text-message Base Health Intervention among Young African Americans

    Get PDF
    Information technology has been used in diverse ways. It has been used in both the public and private sectors to reduce costs and increase satisfaction. Technology may also be instrumental in improving individuals’ healthy behaviors. For instance, statistics suggest that technology-based interventions may promote healthy sexual behaviors; however, few studies have explored willingness to participate in technology-mediated interventions. In this study, we use the diffusion of innovation theory to identify factors that influence one’s intention to use a text-message service to receive sexual health information. The results indicate that technology diffusion factors rather than risk beliefs and privacy concerns impacted participant\u27s intention to use a text-message intervention. The findings of this study have significant implications for innovative uses of technology to promote health. Mobile-health interventions that are easy to use and that provide more benefits than other interventions are most likely to be adopted. However, these interventions should seek to maximize privacy protections and communicate clearly about these protections

    Estimating the Monetary Value of Information Privacy in the Context of SNS

    Get PDF
    The dramatic growth of SNS has created a myriad of information privacy. To achieve our objective, first, this study estimates the monetary value of information privacy by using the CVM. Second, it is estimated how the monetary value of information privacy would change according to demographic information, SNS usage cycle information, the Characteristics of SNS users, and the SNS features. As a result, sensitive SNS users for information privacy have following characteristics: 30s, higher education, less Monthly Expenditure or far more monthly expenditure, lower SNS use ability, more number of followers, little event experiences, shorter SNS experience, higher account open limit level and privacy invasion experiences. Also, the total WTA mean is $28/number. The monetary value of information privacy according to SNS features have the following characteristics. Those who use private SNS, the value of Profile, Location information, and the purpose of Sharing and Friendship are more important

    Applying a model of technology trust to the implementation of a student administration system at a university

    Get PDF
    Includes bibliographical references (leaves 63-69).This study tested the generalisability of a model of technology trust in human resource information systems (Lippert & Swiercz, 2005) to non-HRIS system implementations. The strength and direction of the relationship of four of the tenconstructs identified by Lippert and Swiercz were examined in a South African environment. The implementation of the PeopleSoft student administration system at the University of Cape Town was researched. Regression analysis showed that a very high percentage (57.6% ) of the dependent variable (technology trust) could beexplained by the variable technology usability. The construct, predisposition to trust, had an insignificant contribution, while organisational trust (10.7%) and organisational culture (19.1%) were the other two constructs that were researched. The relationship between technology trust and implementation success was significant with r = +0.75

    The Role of Cognitive Disposition in Re-examining the Privacy Paradox: A Neuroscience Study

    Get PDF
    The privacy paradox is a phenomenon whereby individuals continue to disclose their personal information, contrary to their claim of concerns for the privacy of their personal information. This study investigated the privacy paradox to better understand individuals\u27 decisions to disclose or withhold their personal information. The study argued that individuals’ decisions are based on a cognitive disposition, which involves both rational and emotional mental processes. While the extended privacy calculus model was used as the theoretical basis for the study, the findings of cognitive neuroscience was applied to it to address its limitation in assuming individuals are purely rational decision-makers. Three within-subjects experiments were conducted whereby each subject participated in all three experiments as if it were one. Experiment 1 captured the neural correlates of mental processes involved in privacy-related decisions, while experiment 2 and 3 were factorial-design experiments used for testing the relationship of neural correlates in predicting privacy concerns and personal information disclosure. The findings of this study indicated that at least one neural correlate of every mental process involved in privacy-related decisions significantly influenced personal information disclosure, except for uncertainty. However, there were no significant relationships between mental processes and privacy concerns, except Brodmann’s Area 13, a neural correlate of distrust. This relationship, however, had a positive relationship with privacy concerns, opposite to what was hypothesized. Furthermore, interaction effects indicated that individuals put more emphasis on negative perceptions in privacy-related situations. This study contributed to the information privacy field by supporting the argument that individuals’ privacy-related decisions are both rational and emotional. Specifically, the privacy paradox cannot be explained through solely rational cost-benefit analysis or through an examination of individuals’ emotions alone
    corecore