9 research outputs found

    An Investigation of Volitional Control in Information Ethics

    Get PDF
    The main motivation of this research is how the issue of volitional control might affect the application of the theory of planned behavior (TPB) to research decisions related to information ethics. Specifically, a TPB- based model provides the best fit to the sample collected for the present study. In this model, the contribution of both the attitude and perceived behavioral control to the intention is shown to fluctuate depending upon the degree of volitional control concerning the targeted behavior. As the behaviorís degree of volitional control lessens, the weighted influence of perceived behavioral control increases and that of the attitude decreases. Thus we confirm that degree of volitional control concerning an ethical act indeed plays a central role in applying the theory of planned behavior to information ethics research

    Factors influencing cyber café users’ ethical behavior

    Get PDF
    This paper attempts to report on a recent study in investigating the ethical use of Information and Communication Technology (ICT) services at cyber cafe in Malaysia.It aims to identify the factors that could have influenced ethical behavior of cyber cafe users based on Theory of Planned Behavior (TPB).TPB is known for three factors namely (i) attitude,(ii) subjective norms, and (iii) perceived behavioral control.Out of six hundred and fifty (650) questionnaires distributed to cyber café users, four hundred (400) responses were received which represent 61.5% returns.The result shows that all the factors; (i) attitude, (ii) subjective norms, (iii) perceived behavioral control and (iv) external factor have a strong relationships with the behavioral intention towards the usage of ICT services at cyber café

    Dynamics of Data Breaches in Online Social Networks: Understanding Threats to Organizational Information Security Reputation

    Get PDF
    The consequences of data breaches can be severe for the Information Security Reputation (ISR) of organizations. Using social media analytical techniques, this study examines Twitter postings to identify (1) ISR dimensions attributed as being responsible for data breaches and (2) social media sentiments in the aftermath of data breaches. By analyzing tweets related to the data breaches at Home Depot and JPMorgan Chase in 2014, the results suggest that five dimensions of organizational ISR are put into question: Risk and Resilience Structure; Security Ethics and Practices; Structures of Governance and Responsibility; Response Readiness; Social and Moral Benevolence. The attributions and sentiments vary for the five ISR dimensions. Moreover, tweets that attribute data breach responsibility carry more negative sentiments. This study makes an important theoretical contribution by identifying threats to ISR of organizations in social networks. The findings could benefit organizational strategies for social media reputation management and post-data breach intervention

    Information Privacy in a Globally Networked Society: Implications for IS Research

    Get PDF
    This paper presents an extended discussion of issues associated with the role of information privacy in IS research. This discussion was initiated in conjunction with a panel session at ICIS 2002. Following the conference, each of the panelists reworked and extended their position statements, and provided a commentary on the position statements of the other panelists. The paper is framed with head and tail pieces written by the panel chair. The result is a (unique and provocative) blend of opinion and commentary on a topic that is of importance to IS research in the globally networked society in which we all live. IS researchers will find research questions, research conundrums, and research advice in equal measure

    DYNAMICS OF IDENTITY THREATS IN ONLINE SOCIAL NETWORKS: MODELLING INDIVIDUAL AND ORGANIZATIONAL PERSPECTIVES

    Get PDF
    This dissertation examines the identity threats perceived by individuals and organizations in Online Social Networks (OSNs). The research constitutes two major studies. Using the concepts of Value Focused Thinking and the related methodology of Multiple Objectives Decision Analysis, the first research study develops the qualitative and quantitative value models to explain the social identity threats perceived by individuals in Online Social Networks. The qualitative value model defines value hierarchy i.e. the fundamental objectives to prevent social identity threats and taxonomy of user responses, referred to as Social Identity Protection Responses (SIPR), to avert the social identity threats. The quantitative value model describes the utility of the current social networking sites and SIPR to achieve the fundamental objectives for averting social identity threats in OSNs. The second research study examines the threats to the external identity of organizations i.e. Information Security Reputation (ISR) in the aftermath of a data breach. The threat analysis is undertaken by examining the discourses related to the data breach at Home Depot and JPMorgan Chase in the popular microblogging website, Twitter, to identify: 1) the dimensions of information security discussed in the Twitter postings; 2) the attribution of data breach responsibility and the related sentiments expressed in the Twitter postings; and 3) the subsequent diffusion of the tweets that threaten organizational reputation

    A Meta-Analytical Test of Perceived Behavioral Control Interactions in the Theory of Planned Behavior

    Get PDF
    This study used meta-analytic procedures to test for interaction effects among the components of the theory of planned behavior (TPB). The central hypothesis examined was that attitudes and subjective norms should perform less well in explaining intentions when perceptions of behavioral control are low. A traditional meta-analysis of nine studies that directly examined perceived behavioral control (PBC) interactions was conducted. A second meta-analysis--the main focus of this dissertation--was conducted that tested for two- and three-way interactions in which the presence of PBC interactions was investigated in 121 studies, which provided 154 data sets with 44,424 participants. In addition to testing for two-way PBC interactions, this meta-analysis also examined whether the presence of PBC interactions depended on other variables. Specifically, three-way interactions with type of behavior classification (i.e., public versus private, familiar versus unfamiliar) and type of PBC operationalization (e.g., self-efficacy, perceived difficulty, perceived control, or some combination of the three) were explored. Results indicated that attitude by PBC interactions exist but that the effects vary depending on the type of PBC operationalization and behavior context. In addition, meta-analytic structural equation modeling was used to examine whether the association between PBC and intention is mediated by attitude and subjective norms; however, no evidence for this relationship was found. Finally, results from an auxiliary analysis revealed that the attitude by PBC interaction on intention had statistically significant nonlinear effects in addition to a linear effect. In contrast, the norm by PBC interaction did not have statistically significant linear or nonlinear effects. The discussion highlights the effects of different meta-analytic techniques, the need for future investigation using experimental designs, the implications of these findings for further theory development, and practical implications for health communication researchers. In sum, through the use of a multi-faceted approach to quantitatively review attitude by perceived control and norm by perceived control interactions in the TPB, this study helped to address inconclusive results with regard to the existence and type of PBC interactions

    Towards the generalisation of a case-based aiding system to facilitate the understanding of ethical and professional issues in computing

    Get PDF
    Modern computers endow users of Information and Computer Technology (ICT) with immense power. The speed of the computing revolution has enabled the novel implementation of ICT before consideration of consequent ethical issues can be made. There is now a demand by society that students, ICT novices, and professionals should be aware of the social, legal, and professional issues associated with ubiquitous use of computers. This thesis describes the development of an Internet-based tool that may be used to raise students' awareness of the ethical implications of ICT. It investigates the application, meaning, and scope of computer ethics. Theoretical foundations are developed for the construction of the tool that will classify, store, and retrieve a suitable analogous case from a collection of realworld, ethically analysed ICT case studies. These are used for comparison with ethically dubious events that may be experienced by students. The model draws upon the theoretical aspects of mechanisms for the modification of users' ethical perception. This research is novel in linking these theories to ethical understanding and case retrieval. Little information is available upon the retrieval of documents addressing ethical issues. The classification and retrieval of material using an ethical framework has some commonality with legal retrieval. Similarities are investigated, and concepts are adapted for the retrieval of ethical documents. The differences that arise present challenges for new research. The use of artificial intelligence (AI) retrieval techniques is not acceptable to meet the pedagogic aims of the retrieval tool. A model is developed, avoiding the use of AI in the reasoning process, requiring the student to consider and evaluate the ethical issues raised. The model is tested and evaluated. The research suggests that non-AI paradigms may be used for retrieval of ethical cases, and that areas for future investigation and development exist

    An investigation of volitional control in information ethics

    No full text
    [[abstract]]The main motivation of our research is how the issue of volitional control might affect the application of the Theory of Planned Behaviour (TPB) to research decisions related to information ethics. Specifically, a TPB-based model provides the best fit to the sample collected for the present study. In this model, the contribution of both the attitude and perceived behavioural control to the intention is shown to fluctuate depending upon the degree of volitional control concerning the targeted behaviour. As the behaviour's degree of volitional control lessens, the weighted influence of perceived behavioural control increases and that of the attitude decreases. Thus, it is confirmed that degree of volitional control concerning an ethical act indeed plays a central role in applying the Theory of Planned Behaviour to information ethics research

    An Investigation of Volitional Control in Information Ethics

    No full text
    [[abstract]]The main motivation of this research is how the issue of volitional control might affect the application of the theory of planned behavior (TPB) to research decisions related to information ethics. Specifically, a TPBbased model provides the best fit to the sample collected for the present study. In this model, the contribution of both the attitude and perceived behavioral control to the intention is shown to fluctuate depending upon the degree of volitional control concerning the targeted behavior. As the behavior?s degree of volitional control lessens, the weighted influence of perceived behavioral control increases and that of the attitude decreases. Thus we confirm that degree of volitional control concerning an ethical act indeed plays a central role in applying the theory of planned behavior to information ethics research
    corecore