10 research outputs found

    Smart charging of EVs: Would you share your data for money?

    Get PDF

    Healthcare Information Privacy Research: Iusses, Gaps and What Next?

    Get PDF
    The proliferation of e-health holds great promises in sharing medical data, improving healthcare quality, saving patient lives and reducing costs. However, these potential benefits also bring much attention to the issues of information privacy. Given that medical data disclosure is the second highest reported breaches, it is imperative to understand both information privacy and its context in healthcare. Just as lack of appropriate privacy measures might cause economic harm or denied service from insurance or employers, tight privacy can prevent care providers from accessing patient information in time to save lives. This paper takes an integrated look into the area of healthcare information privacy from both MIS and health informatics perspectives. Based on the literature review and our personal communication with health informatics experts, we identified and presented four major themes: 1) scope and definition of privacy and electronic health records, 2) the information privacy issues and threats, 3) the countermeasures used to address and manage information privacy and 4) why privacy responses matter. This paper provides a unique perspective to privacy in the context of healthcare by focusing on the issues, the matching countermeasures and the drivers behind organizational behaviors into how they manage these threats

    Consumers’ Views on Privacy in E-Commerce

    Get PDF
    Information privacy protection and invasion of privacy in e-commerce have become important topics in both everyday activities and scientific discussions. The aim of this study is to understand how consumers regard privacy in business-to-consumer e-commerce. As this study focuses on consumers’ own interpretations of privacy, the research approach is empirical, rather than theoretical. Based on a phenomenographical analysis of consumer interviews, we identify different layers of understanding by focusing on the referential objects and the structural components of information privacy. The result includes 25 different privacy conceptions, showing that consumers’ view of privacy is situated and constantly under construction as the consumer gets new information or experiences

    Maximizing Smart Charging of EVs: The Impact of Privacy and Money on Data Sharing

    Get PDF
    Smart charging has the potential to shift peak load to times of lower demand, which better exploits renewable generation and enhances grid resilience. For increased effectiveness, smart charging requires access to data that consumers might be hesitant to share. To explore which data consumers would share and which factors influence this decision, we adopt the Barth and de Jong’s risk-benefit calculation framework to smart charging and conduct an online-survey (n = 479). We find that most respondents who would share charging details with a smart charging application, are ambivalent about location data and would never share calendar details. When presented with concrete monetary rewards, participants lose their initial reservations and would share all data for an amount dependent on the data’s sensitivity. Thus, our study contributes to research on the privacy paradox by highlighting the importance of calculations between perceived risks and benefits for the decision to share data

    The Case of Digital Ethics in IS Research – A Literature Review

    Get PDF
    Due to the rapid development in technology and the increasing digitization of organizations and society as a whole, digital ethics is becoming an increasingly important topic for researchers and practitioners of information systems (IS). This literature review shows the state of the art of ethical views present in IS research, at first establishing the relevance of the topic and then showing recent developments. Using a holistic view on ethics, this article provides (1) an overview of the number of publications considering ethics in IS research and on the different ethical constructs and theories. Additionally, it provides an overview (2) on the different fields of application. The aforementioned concepts (3) are contrasted to identify research streams and derive research gaps. Additionally (4), we provide a categorization scheme to classify ethics research in IS into 4 different types and from there (5) derive research propositions for future projects

    Factors Influencing Consumers' Acceptance of Mobile Marketing Services

    Get PDF
    The research of mobile marketing services is still at the early stage and the reason to explain the acceptance as well as the understanding of the actual usage level of mobile marketing services still remains unclear. To investigate this issue, this study has examined the acceptance of mobile marketing services by measuring the consumer's intention and actual usage of mobile marketing services. Grounded by the Decomposed Theory of Planned Behaviour (DTPB), this study proposes a framework by decomposing attitude, subjective norm, perceived behavioural control and perceived risk. A total of 334 full-time university students from four public universities in the Northern Region, Malaysia have participated in this study. Data for all the study variables have been collected through self-administered survey questionnaires. Structural Equation Modeling (SEM) is the main statistical technique used in this study. The study has shown that the level of the actual usage is at the lower level. The study also reveals that all the main beliefs (attitude, subjective norm, perceived behavioural control and perceived risk) are found to have significant effect on consumer‟s intention to use mobile marketing services. With regard to antecedents‟ effect on the main beliefs, there are only four factors which are found insignificant namely perceived ease of use, personal innovativeness, media and technology facilitating condition. Whereas, another ten antecedent factors significantly influence the main beliefs. Overall, the results indicate that the model provides a good understanding of the factors that influence intention to use and the actual usage of mobile marketing services. As predicted, decomposition of the main beliefs provides more specific factors that influence the behaviour. Based on the findings, the theoretical and practical implications of the study as well as limitations and suggestions for future studies are also discussed

    Data protection laws and privacy on Facebook

    Get PDF
    Background: Social networks have changed the way people communicate. Business processes and social interactions revolve more in the cyber space. However, as these cyber technologies advance, users become more exposed to privacy threats. Regulatory frameworks and legal instruments currently lacking a strong cyber presence are required, for the protection of users. Objectives: There is need to explore and evaluate the extent to which users are exposed to vulnerabilities and threats in the context of the existing protection laws and policies. Furthermore, to investigate how the existing legal instruments can be enhanced to better protect users. Method: This article evaluates and analyses these privacy challenges from a legalistic point of view. The study is focused on the South African Facebook users. Poll information gathered from the profile pages of users at North-West University was analysed. A short survey was also conducted to validate the poll results. Descriptive statistics, including measures of central tendency and measures of spread, have been used to present the data. In addition, a combination of tabulated and graphical description data was also summarised in a meaningful way. Results: The results clearly show that the legal frameworks and laws are still evolving and that they are not adequately drafted to deal with specific cyber violation of privacy. Conclusion: This highlights the need to review legal instruments on a regular basis with wider consultation with users in an endeavour to develop a robust and an enforceable legal framework. A proactive legal framework would be the ideal approach unfortunately; law is reactive to cyber-crimes

    Revalidação da escala mobile users' information privacy concerns para o contexto brasileiro

    Get PDF
    The objective of this paper was to revalidate the Mobile Users' Information Privacy Concerns scale (MUIPC) to the Brazilian context, by comparing the results obtained to those of the North American context. The quantitative study was composed of a sample of 309 Brazilian respondents, who answered via web the retro-transcribed questions of the MUIPC scale. Data were analysed to the exploratory factorial analysis and the results obtained resembled one of the previous surveys, with North American respondents. The main contribution of the study was the adaptation of a measurement scale of the concern with the privacy of mobile devices users’ information in the Portuguese language, which could help Brazilian researchers in investigations in the national context.O objetivo desta pesquisa foi revalidar a escala Mobile Users' Information Privacy Concerns (MUIPC) ao contexto brasileiro, comparando os resultados obtidos aos do contexto norte-americano. Tratou-se de um estudo quantitativo composto por uma amostra de 309 respondentes brasileiros, que responderam via web as questões retrotraduzidas da escala MUIPC. Os dados coletados foram submetidos à análise fatorial exploratória e os resultados obtidos assemelharam-se a uma das pesquisas anteriores realizadas com respondentes norte-americanos. A principal contribuição do estudo foi a adaptação de uma escala de medição da preocupação com a privacidade das informações para usuários de apps de equipamentos mobile para a língua portuguesa, que poderá auxiliar pesquisadores brasileiros em investigações no contexto nacional

    The Initial Stages of Consumer Trust Building in e-Commerce: a Study on Finnish Consumers

    Get PDF
    fi=vertaisarvioitu|en=peerReviewed

    Information Privacy and its Management

    No full text
    Public opinion data suggest that consumers care about information privacy. Executives might reasonably ask, So what does this mean to me? What should I do differently? This article explores the different assumptions about privacy in different countries and considers how these assumptions are reflected in different approaches to regulating privacy. Against that backdrop, six managerial action areas associated with information privacy are explored: 1.Collection and storage 2.Secondary use 3.Data accuracy 4.Authorized access 5.Automated judgment 6.Profiling In some countries, these areas are tightly regulated; in others, their management is left to executives¡¯ discretion. For each area, this article considers possible negative outcomes from mismanaging that area, and it calls out the types of mismanagement observed frequently. Finally, it provides recommendations for management of each area
    corecore