2,309 research outputs found

    Anatomy of the Third-Party Web Tracking Ecosystem

    Full text link
    The presence of third-party tracking on websites has become customary. However, our understanding of the third-party ecosystem is still very rudimentary. We examine third-party trackers from a geographical perspective, observing the third-party tracking ecosystem from 29 countries across the globe. When examining the data by region (North America, South America, Europe, East Asia, Middle East, and Oceania), we observe significant geographical variation between regions and countries within regions. We find trackers that focus on specific regions and countries, and some that are hosted in countries outside their expected target tracking domain. Given the differences in regulatory regimes between jurisdictions, we believe this analysis sheds light on the geographical properties of this ecosystem and on the problems that these may pose to our ability to track and manage the different data silos that now store personal data about us all

    An Exploratory Study for Perceived Advertising Value in the Relationship Between Irritation and Advertising Avoidance on the Mobile Social Platforms

    Get PDF
    This study delves deeply into advertising avoidance research and redefines the uses and gratifications theory (U&G) as divided into (a) convenience U&G, (b) content U&G, and (c) social U&G to conduct an approach to alleviate the degree of advertising avoidance on the mobile social platforms. To carefully study the forming framework of advertising avoidance, we extract the factor irritation considered to directly impact on avoidant intention induced by perceived intrusiveness and privacy concerns. As an important previous factor in advertising research, we also test the moderating effect of perceived advertising value between irritation and advertising avoidance. Findings show that ubiquity takes a negative role on mobile social platforms and tailoring also takes different roles on perceived intrusiveness and privacy concerns; unfortunately, content U&G consist of advertising informativeness and entertainment didn’t find any significant effect; in contrast with previous study, social U&G as social interaction and social integration also show some different roles but is ambiguous. However, the positive relationship of perceived intrusiveness, privacy concerns, irritation, and advertising avoidance has been confirmed again although with a pity of insignificant moderating effect of advertising value. Management issues, theoretical contributions, limitations and future study are discussed as follow

    Understanding Benefit and Risk Framework of Fintech Adoption: Comparison of Early Adopters and Late Adopters

    Get PDF
    Financial technology (Fintech) service has recently become the focus of considerable attention. Although many researchers and practitioners believe that Fintech can reshape the future of the financial services industry, others are skeptical about the adoption of Fintech because of the considerable risks involved. Therefore, we need to better understand why users are willing or hesitant to adopt Fintech, wherein, positive and negative factors affect their adoption decision. Based on the net valence framework theoretically embedded in theory of reasoned action, we propose a benefit-risk framework which integrates positive and negative factors associated with its adoption. Based on the empirical data collected from 244 Fintech users, this study initially investigates whether perceived benefit and risk significantly impact Fintech adoption intention. We then examine whether the effect of perceived benefit and risk on Fintech adoption intention differs depending on the user types. Results show that legal risk has the biggest negative effect, whereas convenience has the strongest positive effect on Fintech adoption intention. The differences between early adopters and late adopters are driven by different factors

    An Investigation on The Intention to Adopt Mobile Banking on Security Perspective in Bangladesh

    Get PDF
    This research examines the information security of adopting mobile banking and suggests maximizing information security in mobile banking in different ways. Security issues pose a threat to mobile banking adoption and diffusion. Therefore, reliable security measures and improved trust improvement are suggested to address information security in adopting mobile banking for financial services. A questionnaire survey is conducted with users of mobile banking technology. Random sampling is adopted in the study. 650 questionnaires were sent to respondents, and 303 responses were recorded. A confirmatory factor analysis with varimax rotation was conducted following correlation and multiple regression analysis to test the hypothesis of the study. The research finds that (1) perceived security and trust affect mobile banking self-efficacy and performance (SEP) of adopting mobile banking for financial services; (2) Reliable security measure and perceive trust improvement positively influence (SEP) of adopting mobile banking for financial services. This study shows the significance of user perceptions of security by inspecting the content of the security rules of mobile banking for clients’ levels. It includes the adoption of technology in financial services. Therefore, the study links the technology acceptance model (TAM) with the literature on perceived security and trust of adopting mobile banking for financial services. The research has applied to the banking industry to develop and expand its banking market by developing reliable security measures and improving the perceived trust of customers to conduct banking transactions using mobile banking technology

    Design and Validation of the Bright Internet

    Get PDF
    Bright Internet research was launched as a core project of the AIS Bright ICT Initiative, which aims to build an ICT-enabled Bright Society. To facilitate research on the Bright Internet, we explicitly define the goals and principles of the Bright Internet, and review the evolution of its principles. The three goals of the Bright Internet are: the realization of preventive security, the provision of the freedom of anonymous expression for innocent netizens, and protection from the risk of privacy infringement that may be caused by preventive security schemes. We respecify design principles to fulfill these seemingly conflicting goals: origin responsibility, deliverer responsibility, identifiable anonymity, global collaboration, and privacy protection. Research for the Bright Internet is characterized by two perspectives: first, the Bright Internet adopts a preventive security paradigm in contrast to the current self-centric defensive protective security paradigm. Second, the target of research is the development and deployment of the Bright Internet on a global scale, which requires the design of technologies and protocols, policies and legislation, and international collaboration and global governance. This research contrasts with behavioral research on individuals and organizations in terms of the protective security paradigm. This paper proposes validation research concerning the principles of the Bright Internet using prevention motivation theory and analogical social norm theory, and demonstrates the need for a holistic and prescriptive design for a global scale information infrastructure, encompassing the constructs of technologies, policies and global collaborations. An important design issue concerns the business model design, which is capable of promoting the propagation of the Bright Internet platform through applications such as Bright Cloud Extended Networks and Bright E-mail platforms. Our research creates opportunities for prescriptive experimental research, and the various design and behavioral studies of the Bright Internet open new horizons toward our common goal of a bright future

    Information Security Challenges in the Absence of ICT in Protecting Personal and Organisational Data in Nairobi County, Kenya

    Get PDF
    There have been several cases of lost documents and misplaced or inaccurate information belonging to individuals or organisations reported in recent times at global, national and regional levels. Nairobi county is one of the regions on the spot as many people travelling or working in the city have reported lost identification documents such as certificates and licenses, whether through criminality or negligence. Furthermore, most businesses and organisations dealing with huge volumes of data need help to protect and provide accurate information. Many still need help with the pre-digital data management systems, thus risking the loss of both personal and organisational data. This paper, therefore, sought to examine the information security challenges due to the inadequate application of ICT in managing personal and corporate data and their implications on individuals and organisations in Nairobi County. The target population included employees from Kenya Revenue Authority and Kenya Data Networks in Nairobi headquarters offices, police officers deployed at NPS offices headquarters and members of the public. The selected target groups were known to deal with enormous data for both personnel and businesses, and the police officers were part of this study because of their mandate to help in tracking lost personal and business documents. Lastly, the researcher engaged members of the public to share their experiences of losing business and personal records. The study employed purposive and simple random sampling techniques to select the required sample of 110 participants drawn from the four groups. A structured questionnaire was administered to the sampled police officers, employees of Kenya Data Network and Kenya Revenue Authority and members of the public. The researchers interviewed key informants from the three organisations, NPS, KRA and KDA, to complement the data collected using the questionnaires. The findings established that challenges were associated with the need for more ICT in managing personal information and organisational data.The paper revealed that the need for an integrated system is a challenge to tracking missing identities or verifying the validity of provided information, thus compromising the productivity and security of businesses and institutions. Results from this study provide a solution to tracking any missing documents and correcting inaccurate personal data by adopting an integrated ICT system

    Anatomy of the Third-Party Web Tracking Ecosystem

    Get PDF
    The presence of third-party tracking on websites has become customary. However, our understanding of the third-party ecosystem is still very rudimentary. We examine third-party trackers from a geographical perspective, observing the third-party tracking ecosystem from 29 countries across the globe. When examining the data by region (North America, South America, Europe, East Asia, Middle East, and Oceania), we observe significant geographical variation between regions and countries within regions. We find trackers that focus on specific regions and countries, and some that are hosted in countries outside their expected target tracking domain. Given the differences in regulatory regimes between jurisdictions, we believe this analysis sheds light on the geographical properties of this ecosystem and on the problems that these may pose to our ability to track and manage the different data silos that now store personal data about us all
    corecore