44,185 research outputs found

    The Importance of Transparency and Willingness to Share Personal Information

    Get PDF
    This study investigates the extent to which individuals are willing to share their sensitive personal information with companies. The study examines whether skepticism can influence willingness to share information. Additionally, it seeks to determine whether transparency can moderate the relationship between skepticism and willingness to share and whether 1) companies perceived motives, 2) individual’s prior privacy violations, 3) individuals’ propensity to take risks, and 4) individuals self-efficacy act as antecedents of skepticism. Partial Least Squares (PLS) regression is used to examine the relationships between all the factors. The findings indicate that skepticism does have a negative impact on willingness to share personal information and that transparency can reduce skepticis

    Privacy Invasion Experiences and Perceptions: a Comparison Between Germany and the Arab World

    Get PDF
    Similar to research in behavioral psychology, research in privacy and usable security has focused mainly on Western, Educated, Industrialized, Rich, and Democratic (WEIRD) societies. This excludes a large portion of the population affected by privacy implications of technology. In this work, we report on a survey (N=117) in which we studied technology-related privacy concerns of users from different countries, including developing countries such as Egypt, and Saudi Arabia, and developed countries such as Germany. By comparing results from those countries, and relating our findings to previous work, we brought forth multiple novel insights that are specific to privacy of users from under-investigated countries. We discuss the implications of our findings on the design of privacy protection mechanisms

    Why do People Adopt, or Reject, Smartphone Security Tools?

    Get PDF
    A large variety of security tools exist for Smartphones, to help their owners to secure the phones and prevent unauthorised others from accessing their data and services. These range from screen locks to antivirus software to password managers. Yet many Smartphone owners do not use these tools despite their being free and easy to use. We were interested in exploring this apparent anomaly. A number of researchers have applied existing models of behaviour from other disciplines to try to understand these kinds of behaviours in a security context, and a great deal of research has examined adoption of screen locking mechanisms. We review the proposed models and consider how they might fail to describe adoption behaviours. We then present the Integrated Model of Behaviour Prediction (IMBP), a richer model than the ones tested thus far. We consider the kinds of factors that could be incorporated into this model in order to understand Smartphone owner adoption, or rejection, of security tools. The model seems promising, based on existing literature, and we plan to test its efficacy in future studies

    E-Safety: the experience of English educational establishments

    Get PDF

    Culture and disaster risk management - synthesis of stakeholder attitudes during 3 Stakeholder Assemblies in Romania, Italy and Portugal

    Get PDF
    This report provides a synthesis of the results of three CARISMAND Stakeholder Assemblies held in A) Bucharest,Romania on April 14-15, 2016; B) Rome,Italy on February 27-28, 2017; and C) Lisbon,Portugal on February 27-28, 2018. These Stakeholder Assemblies, together with six Citizen Summits (see Deliverables D5.3 – D5.9) were part of the CARISMAND cycle of events (see Figure 1 below). This cycle of events was the key concept at the core of the CARISMAND project which aimed to ensure a comprehensive feedback loop betweendisaster practitioners and citizens. It also allowed for the progression of ideas co-created by disaster practitioners and citizens. The locations of the three Stakeholder Assemblies were chosen due to their rather different “backgrounds”. The three countries had been struck at the time of the respective event by different types of disasters. In addition, the three countries have very different “cultures”, or cultural impacts, at a societal level. Romania has a comparatively strong authoritative systems due to its political history; Italy has experienced a strong direct in-flow of migrants in the last years due to its geological location; and Portugal has long been a traditional “melting pot” where, over more than a millennium, people from different cultural backgrounds and ethnic origins (in particular North Africa, South America, and Europe) have lived together. Accordingly, these differences were expected to allow a wide range of practitioners’ attitudes and perceptions related to cultural factors in disaster management to emerge. In order to not only gather a variety of attitudes and perceptions but also promote cross-sectional knowledge transfer, the audience in all three events consisted of a wide range of practitioners who are typically involved in disaster management, e.g., civil protection agencies , the emergency services, paramedics, nurses, environmental protection agencies, the Red Cross, firefighters, the military, and the police. Further, these practitioners were from several regions in the respective country; in Portugal, the Stakeholder Assembly also included practitioners from the island of Madeira. The 40-60 participants per event were recruited via invitations sent to various organisations and institutions that play a role in disaster management, and via direct contacts of local partners in the CARISMAND consortium. Each assembly consisted of a mix of presentations and discussion groups to combine dissemination with information gathering (for detailed schedules see Appendices A1-A3). In an initial general assembly, the event started with presentations of the CARISMAND project and its main goals and concepts. Then, participants were split into small working groups in separate breakout rooms, where they discussed and provided feedback on a specific topic. After each working group session, panel discussions allowed the participants to present the results of their working group to the rest of the audience. After each panel discussion, keynote speakers gave presentations related to the topic that had been discussed during the working groups. This schedule was designed to ensure that participants are provided with detailed information about recent developments in disaster management, but without influencing the attitudes and perceptions expressed in the working groups. In the third Stakeholder Assembly, different sets of recommendations for practitioners (related to the use of cultural factors in disaster management) were presented to the general audience, followed by small discussion group sessions as described above.The project was co-funded by the European Commission within the Horizon2020 Programme (2014–2020).peer-reviewe

    Understanding Shoulder Surfing in the Wild: Stories from Users and Observers

    Get PDF
    Research has brought forth a variety of authentication systems to mitigate observation attacks. However, there is little work about shoulder surfing situations in the real world. We present the results of a user survey (N=174) in which we investigate actual stories about shoulder surfing on mobile devices from both users and observers. Our analysis indicates that shoulder surfing mainly occurs in an opportunistic, non-malicious way. It usually does not have serious consequences, but evokes negative feelings for both parties, resulting in a variety of coping strategies. Observed data was personal in most cases and ranged from information about interests and hobbies to login data and intimate details about third persons and relationships. Thus, our work contributes evidence for shoulder surfing in the real world and informs implications for the design of privacy protection mechanisms

    A Comparison of Information Technology Mediated Customer Services Between the U.S. and China

    Get PDF
    Information technology mediated customer service is a reality of the 21st century. More and more companies have moved their customer services from in store and in person to online through computer or mobile devices. Using 442 responses collected from one USA university (234 responses) and two Chinese universities (208 responses), the study investigates customer preferences over two service delivery models (either in store or online) on five types of purchasing (retail, eating-out, banking, travel and entertainment) and their perception difference in customer service quality between those two delivery models in the U.S. and China. The results show that the majority of the U.S. and Chinese students prefer in-store and in person for eating out and prefer computer/mobile devices for ordering tickets for travel and entertainment. In addition, more than half of the U.S. students prefer in person services for retail and banking, and this number reduces to 40% for Chinese students. In most customer service quality measurements, the results also show that Chinese students give higher ratings for ordering through a computer/mobile device than ordering in store, indicating ordering through computer/mobile devices has become more acceptable in China and has been perceived as having better customer services quality than in-store ordering

    A Study of E-Cheating Habit of Students in Three Selected Universities in Nigeria.

    Get PDF
    Several studies have emerged on examination misconduct in Nigeria, but „e-cheating‟ habit of students, a new form of examination fraud is yet to be given adequate attention in the literature. This study is provoked to address this problem not only in the country but also in academic scholarship. Using three selected Universities samples, the study examines methods which students are using in engaging ICTs to perpetuate examination misconduct. Relying on raw data of one hundred and ninetynine (199) students retrieved, the study attempted to uncover if a significant difference exists in echeating habit between ICT-compliant students and other students in rubrics not science-oriented. It equally tried to discover if there is a significant difference in e-cheatng habit between male and female students. Drawing on the recorded data in each institution, the study reported five ICT tools associated with examination misconduct. Using chi-square (X2) to test the hypotheses, the study reported a significant difference between ICT-complinat students and other students in rubrics not scienceoriented. Finally, it revealed a significant difference in e-cheating habit between male and female students
    • …
    corecore