5 research outputs found

    The customers’ perception of privacy in the retail industry when adopting digital transformation

    Get PDF
    In the current 4.0 context, digital transformation is a particularly necessary thing for retail businesses in particular or most businesses in general. That’s why a sense of privacy is so important to retailers. This paper focuses on the factors affecting the privacy perception of customers in the digital transformation period in Ho Chi Minh City. 452 Ho Chi Minh City people who have experience with the digital revolution participated in quantitative research to evaluate and examine this correlation. The results of the study show that privacy impression is influenced by privacy worries, retailer vs. consumer advantage, privacy-intrusive experience, and retailer credibility. The association between customer benefit and privacy perception and between technology hedonism and privacy perception is unaffected by the role of store trustworthiness moderators

    Too Much of a Good Thing: Campaign Speech after Citizens United

    Get PDF
    In January 2010, the Supreme Court in Citizens United v. Federal Election Commission overturned Austin v. Michigan Chamber of Commerce and the portion of McConnell v. Federal Election Commission that restricted independent corporate expenditures, as codified in section 203 of the Bipartisan Campaign Reform Act. Specifically, Citizens United invalidated laws forbidding corporations and unions from using general treasury funds for “electioneering communication,” political advocacy transmitted by broadcast, cable, or satellite communication in the period leading up to a federal election. The effect of Citizens United was to protect the right of corporations, no less than individual American citizens, to fund and distribute political advocacy. The Citizens United holding is controversial for many reasons, not the least of which is that it takes a hard-line approach that unapologetically privileges speech, even while tacitly acknowledging the potential for negative effects. This Article challenges the Citizens United decision on several grounds. First, I dispute the majority’s claim that corporate spending does not result in “corruption.” Second, I assert that the potential for corruption poses a real and serious threat to democratic elections and that preventing this corruption is therefore a vital governmental interest justifying restraints on “speech.” Finally, I adopt the majority’s free speech priority and propose that even if the First Amendment is the only legitimate consideration, corporate spending is harmful because it chills speech in a manner not contemplated by the Court

    Perceived patient control over personal health information in the presence of context-specific concerns

    Get PDF
    Information privacy issues have plagued the world of electronic media since its inception. This research focused mainly on factors that increase or decrease perceived patient control over personal health information (CTL) in the presence of context-specific concerns. Control agency theory was used for the paper\u27s theoretical contributions. Personal and proxy control agencies acted as the independent variables, and context-specific concerns for information privacy (CFIP) were used as the moderator between proxy control agency, healthcare provider, and CTL. Demographic data and three control variables— the desire for information control, privacy experience, and trust propensity—were also included in the model to gauge the contribution to CTL from external factors. Only personal control agency and desire for information control were found to impact CT

    Behavioral Decision Theory and Implications for the Supreme Court’s Campaign Finance Jurisprudence

    Get PDF
    America stands at a moment in history when advances in the understanding of human decision-making are increasing the strategic efficacy of political strategy. As campaign spending for the presidential race reaches hundreds of millions of dollars, the potential for harnessing the power of psychological tactics becomes considerable. Meanwhile, the Supreme Court has characterized campaign money as “speech” and has required evidence of corruption or the appearance of corruption in order to uphold restrictions on campaign expenditures. Ultimately, the Court has rejected virtually all restrictions on campaign spending on the ground that expenditures, unlike contributions, do not contribute to corruption or the appearance of corruption. However, behavioral decision research and theory provide strong support for the notion that expenditures do corrupt the political process, because there is a nexus between campaign spending, strategic manipulation, and sub-optimal voting decisions. This Article applies behavioral research and theory to advance a new definition of “corruption,” arguing that there is a vital governmental interest in regulating campaign expenditures in order to limit manipulative campaign tactics and to reduce the existing inequities in access to channels of communication and persuasion

    PRIVACY LITERACY 2.0: A THREE-LAYERED APPROACH COMPREHENSIVE LITERATURE REVIEW

    Get PDF
    With technological advancement, privacy has become a concept that is difficult to define, understand, and research. Social networking sites, as an example of technological advancements, have blurred the lines between physical and virtual spaces. Sharing and self-disclosure with our networks of people, or with strangers at times, is becoming a socially acceptable norm. However, the vast sharing of personal data with others on social networking sites engenders concern over data loss, concern for unintended audience, and an opportunity for mass surveillance. Through a dialectical pluralism lens and following the comprehensive literature methodological framework, the purpose of this study was to map and define what it means to be a privacy literate citizen. The goal was to inform privacy research and educational practices. The findings of this study revealed that placing the sole responsibility on the individual user to manage their privacy is an inefficient model. Users are guided by unmasked and hidden software practices, which they do not fully comprehend. Another finding was the noticeable increase of citizen targeting and liquified surveillance, which are accepted practices in society. Liquified surveillance takes any shape; is both concreate and discrete; and it happens through complete profile data collection as well as raw data aggregation. Privacy management, as a research model or management approach, does not prevent data from leaking nor does it stop surveillance. For privacy to be successful, privacy engineering should include citizens’ opinions and require high levels of data transparency prior to any data collection software design. The implications of this study showed that privacy literacy 2.0 is a combination of several inter-connected skills, such as knowledge about the law, software, platform architecture, and the psychology of self-disclosure
    corecore