33,179 research outputs found

    The Importance of Transparency and Willingness to Share Personal Information

    Get PDF
    This study investigates the extent to which individuals are willing to share their sensitive personal information with companies. The study examines whether skepticism can influence willingness to share information. Additionally, it seeks to determine whether transparency can moderate the relationship between skepticism and willingness to share and whether 1) companies perceived motives, 2) individual’s prior privacy violations, 3) individuals’ propensity to take risks, and 4) individuals self-efficacy act as antecedents of skepticism. Partial Least Squares (PLS) regression is used to examine the relationships between all the factors. The findings indicate that skepticism does have a negative impact on willingness to share personal information and that transparency can reduce skepticis

    Subject: Groups and Organizations

    Get PDF
    Compiled by Susan LaCette.GroupsandOrganizations.pdf: 992 downloads, before Oct. 1, 2020

    Bringing light into the dark side of digitalization : consequences, antecedents, and mitigation mechanisms

    Get PDF
    As digital technologies permeate all aspects of our professional and private lives, digitalization causes profound changes for individuals, organizations, and societies. The use of digital technologies makes many activities easier, safer, faster, or more comfortable. In addition to many positive changes, digital technologies are also associated with numerous risks and side effects. The use of digital technologies might come along with severe negative consequences for individuals, organizations, and societies. The negative consequences can be triggered by various antecedents. In addition to identifying the negative consequences of digitalization and their antecedents, it is particularly important to develop appropriate mitigation mechanisms. This dissertation provides novel insights for IS researchers to better understand the negative consequences of using digital technologies. It contains a broad overview of the risks and side effects of digitalization and investigates related antecedents and mitigation mechanisms. To reach this goal, regarding research methods, this dissertation relies on the structured analysis of (scientific) literature and (expert) interviews as well as the analysis and interpretation of empirical data. Chapter 2 contributes to the research on the negative consequences of digitalization. Section 2.1 provides a comprehensive multi-level taxonomy of the risks and side effects of digitalization (RSEDs). Section 2.2 builds on Section 2.1 and is a substantial expansion and improvement of Section 2.1. The iterative taxonomy development process was complemented by four additional cycles. The final taxonomy comprises 11 RSEDs and their 39 subtypes. Both articles show that there is a wide range of risks and side effects of digitalization that need to be explored in more detail in the future. Chapter 3 focuses on the antecedents of digitalizations negative consequences. Section 3.1 sheds light on individuals concerns towards automated decision-making. The concerns are derived from academic literature and semi-structured interviews with potential users of algorithm-based technologies. Section 3.2 focuses on the evaluation of specific mHealth app features by potential users in Germany and Denmark. The study draws on survey data from both countries analyzed using the Kano method. Further, it comprises a quartile-based sample split approach to identify the underlying relationships between users characteristics and their perceptions of the mHealth app features. The results show significant differences between Germans and Danes in the evaluation of the app features and demonstrate which of the user characteristics best explain these differences. Both articles shed light on possible antecedents of negative consequences (i.e., user dissatisfaction, non-use) and thus contribute to a better understanding of the occurrence of negative consequences. Chapter 4 shows exemplary mitigation mechanisms to cope with the negative consequences of digitalization. Section 4.1 takes an organizational perspective and identifies data privacy measures that can be implemented by organizations to protect the personal data of their customers and address their privacy concerns. These measures were evaluated by analyzing data from two independent online surveys with the help of the Kano method. Section 4.2 focuses on an individual perspective by presenting the concept of a privacy bot that contributes to strengthening the digital sovereignty of internet users. With the help of the privacy bot, page-long privacy statements can be checked against previously stored individual data protection preferences. Both articles provide appropriate mitigation mechanisms to cope with users privacy concerns. These two examples show that there are a variety of ways to counter the risks and side effects of digitalization. The research articles included in this dissertation identify various risks and side effects of digitalization that need to be explored in more detail in future research. The two articles on antecedents help to better understand the occurrence of negative consequences of digitalization. The development of appropriate countermeasures, two of which are exemplified in this dissertation, should result in the benefits of digital technologies outweighing their risks.Da digitale Technologien alle Bereiche unseres beruflichen und privaten Lebens durchdringen, bewirkt die Digitalisierung tiefgreifende Veränderungen für Individuen, Organisationen und Gesellschaften. Viele Aktivitäten werden durch den Einsatz digitaler Technologien einfacher, sicherer, schneller oder bequemer. Neben vielen positiven Veränderungen sind digitale Technologien aber auch mit zahlreichen Risiken und Nebenwirkungen verbunden. Der Einsatz digitaler Technologien kann mit schwerwiegenden negativen Folgen für Individuen, Organisationen und Gesellschaften einhergehen. Diese negativen Folgen können durch verschiedene Einflussfaktoren ausgelöst werden. Zusätzlich zur Identifizierung der negativen Folgen der Digitalisierung und ihrer Ursachen ist es besonders wichtig, geeignete Schutzmaßnahmen zu entwickeln. Diese Dissertation liefert neue Erkenntnisse für IS-Forscher:innen, um die negativen Folgen der Nutzung digitaler Technologien besser zu verstehen. Sie enthält einen breiten Überblick über die Risiken und Nebenwirkungen der Digitalisierung und untersucht die damit verbundenen Ursachen und Schutzmaßnahmen. Um dieses Ziel zu erreichen, stützt sich die Dissertation forschungsmethodisch auf die strukturierte Analyse von (wissenschaftlicher) Literatur und (Expert:innen-)Interviews sowie auf die Auswertung und Interpretation empirischer Daten. Kapitel 2 leistet einen Beitrag zur Forschung über die negativen Folgen der Digitalisierung. Abschnitt 2.1 liefert eine umfassende mehrstufige Taxonomie der Risiken und Nebenwirkungen der Digitalisierung (RSEDs). Abschnitt 2.2 baut auf Abschnitt 2.1 auf und ist eine wesentliche Erweiterung und Verbesserung von Abschnitt 2.1. Der iterative Taxonomieentwicklungsprozess wurde durch vier weitere Zyklen ergänzt. Die endgültige Taxonomie umfasst 11 RSED und 39 Untertypen. Beide Artikel zeigen, dass es ein breites Spektrum an Risiken und Nebenwirkungen der Digitalisierung gibt, das in Zukunft noch genauer erforscht werden muss. Kapitel 3 befasst sich mit den Ursachen der negativen Folgen der Digitalisierung. Abschnitt 3.1 beleuchtet die Bedenken von Individuen gegenüber automatisierten Entscheidungen. Die Bedenken wurden aus wissenschaftlicher Literatur und halbstrukturierten Interviews mit potenziellen Nutzer:innen algorithmusbasierter Technologien abgeleitet. Abschnitt 3.2 konzentriert sich auf die Bewertung spezifischer Funktionen von mHealth-Apps durch potenzielle Nutzer in Deutschland und Dänemark. Die Studie basiert auf Umfragedaten aus beiden Ländern, die mit der Kano-Methode analysiert wurden. Darüber hinaus umfasst sie einen quartil-basierten Stichproben-Split-Ansatz, um die zugrundeliegenden Beziehungen zwischen den Merkmalen der Nutzer (z.B. Bedenken hinsichtlich des Datenschutzes) und ihrer Wahrnehmung der Funktionen von mHealth-Apps zu ermitteln. Die Ergebnisse zeigen signifikante Unterschiede zwischen Deutschen und Dänen bei der Bewertung der App-Funktionen und zeigen, welche der Nutzermerkmale diese Unterschiede am besten erklären. Beide Artikel beleuchten mögliche Ursachen negativer Folgen (z.B. Unzufriedenheit der Nutzer, Nichtnutzung) und tragen so zu einem besseren Verständnis des Auftretens negativer Folgen bei. Kapitel 4 zeigt beispielhafte Schutzmaßnahmen zur Bewältigung der negativen Folgen der Digitalisierung. Abschnitt 4.1 nimmt eine organisationale Perspektive ein und identifiziert Datenschutzmaßnahmen, die von Unternehmen umgesetzt werden können, um die personenbezogenen Daten ihrer Kund:innen zu schützen und deren Datenschutzbedenken zu berücksichtigen. Diese Maßnahmen wurden durch die Analyse von Daten aus zwei unabhängigen Online-Umfragen mit Hilfe der Kano-Methode evaluiert. In Abschnitt 4.2 wird eine individuelle Perspektive eingenommen, indem das Konzept eines Privacy Bots vorgestellt wird, der zur Stärkung der digitalen Souveränität von Internetnutzer:innen beiträgt. Mithilfe des Privacy Bots können seitenlange Datenschutzerklärungen mit zuvor gespeicherten individuellen Datenschutzpräferenzen abgeglichen werden. Beide Artikel beschreiben geeignete Schutzmaßnahmen, um den Datenschutzbedenken der Nutzer:innen gerecht zu werden. Diese beiden Beispiele zeigen, dass es eine Vielzahl von Möglichkeiten gibt, den Risiken und Nebenwirkungen der Digitalisierung zu begegnen. Die in dieser Dissertation enthaltenen Forschungsartikel zeigen verschiedene Risiken und Nebenwirkungen der Digitalisierung auf, die in der zukünftigen Forschung noch genauer untersucht werden müssen. Die beiden Artikel zu den Ursachen helfen, das Auftreten von negativen Konsequenzen der Digitalisierung besser zu verstehen. Die Entwicklung geeigneter Schutzmaßnahmen, von denen zwei in dieser Dissertation beispielhaft vorgestellt werden, sollte dazu führen, dass die Vorteile der digitalen Technologien ihre Risiken überwiegen

    The Balance Between Privacy and Safety in Police UAV Use: The Power of Threat and Its Effect on People’s Receptivity

    Full text link
    Unmanned aerial vehicles (UAVs), also known as drones, are an innovative technology that has received significant interest from the law enforcement community. The size and ability, technological capability, and cost effectiveness of UAVs make them an attractive tool for law enforcement agencies to utilize in the course of operations, including domestic surveillance. Despite the potential benefits to the society, public perception of police UAV use is mixed, and “Not Over My Backyard (NOMBY)” attitudes relevant to Fourth Amendment privacy concerns are consistently demonstrated across studies related to public perceptions on this emerging technology. The present study focuses on the relative impact of privacy threats and other situational factors on individuals’ perceptions of police and their use of UAV technology. Using Stephan and Renfro’s revised reintegrated threat theory (2002), the present research used a scenario- based experimental design to examine: (1) the impact perceived threat from police UAV use on people’s attitudes toward police and their use of UAVs? (2) the attitudinal differences of the degree of participants’ connection to the target of surveillance, and (3) the effect of the people’s pre-existing perceptions of police on participants’ attitudinal differences, and (4) the structural relationships, followed by the theory, between perceived threats, antecedents (i.e., relations between groups, individual difference variables, cultural dimensions, situational factors) to intergroup threat, and the people’s perceptions, as well as demographic or other socio-economic factors. The findings provide some significant socio-psychological implications concerning police-community intergroup relations. First, the quality of the interpersonal treatment or relations (i.e., individual differences) they had previously received from police officers was the strongest indicator in predicting their attitudes toward police UAV use. Second, the outcome of UAV activity also influenced their evaluations of police. Lastly, people’s attitudes were more extreme when the level of connection to the target of surveillance was farther away from them and it was interacted with policing strategies (i.e., reactive v proactive policing)

    Third Person Effect and Internet Privacy Risks

    Get PDF
    The current study tests the third-person effect (TPE) in the context of Internet privacy. TPE refers to the phenomenon that people tend to perceive greater media effects on others than on themselves. The behavioral component of TPE holds that the self-others perceptual gap is positively associated with support for restricting harmful media messages. Using a sample (N=613) from Amazon Mturk, the current research documented firm support for the perceptual and behavioral components of TPE in the context of Internet privacy. Moreover, social distance, perceived Internet privacy knowledge, negative online privacy experiences, and Internet use were found to be significant predictors of the TPE perceptions of Internet privacy risks. There are four novel contributions of the current study. First, this study systematically tests TPE in a new context―Internet privacy. Second, this study examines five antecedents of TPE perceptions, of which perceived Internet privacy knowledge, negative online privacy experiences, and Internet use are novel to TPE studies. Unlike prior studies which assume social distance and desirability of media content, the current study provides direct empirical tests of these two antecedents. Third, prior research primarily examines support for censorship of harmful media messages, a context in which individuals do not have control over policy enforcement. In the case of Internet privacy, people can decide whether to adopt privacy protective measures or not. The current study addresses two types of behavioral intentions to reduce privacy risks: (1) the willingness to adopt online privacy protection measures; and (2) recommend such measures to others. Fourth, unlike prior studies using fear based theories to investigate Internet privacy issues, the current tests Internet privacy from a novel perspective—TPE theory

    ILR Research in Progress 2006-07

    Get PDF
    The production of scholarly research continues to be one of the primary missions of the ILR School. During a typical academic year, ILR faculty members published or had accepted for publication over 25 books, edited volumes, and monographs, 170 articles and chapters in edited volumes, numerous book reviews. In addition, a large number of manuscripts were submitted for publication, presented at professional association meetings, or circulated in working paper form. Our faculty's research continues to find its way into the very best industrial relations, social science and statistics journals.Research_in_Progress_2006_07.pdf: 18 downloads, before Oct. 1, 2020

    Alter ego, state of the art on user profiling: an overview of the most relevant organisational and behavioural aspects regarding User Profiling.

    Get PDF
    This report gives an overview of the most relevant organisational and\ud behavioural aspects regarding user profiling. It discusses not only the\ud most important aims of user profiling from both an organisation’s as\ud well as a user’s perspective, it will also discuss organisational motives\ud and barriers for user profiling and the most important conditions for\ud the success of user profiling. Finally recommendations are made and\ud suggestions for further research are given

    Theoretical Concepts of Consumer Resilience to Online Privacy Violation

    Get PDF
    Resilience is a multifaceted concept used to explain both system and individual behavior across disciplines. Although definitions and research concepts of resilience vary significantly, resilience has become a boundary object in diverse academic fields calling for a holistic approach. This work aims to elaborate the theoretical concepts that might be applied in the research of consumer resilience to online privacy violation, a new and unexplored aspect of consumer behavior in the digital environment. The purpose of the research is to develop the future research frontiers in investigating consumer resilience to online privacy violation. It contributes to the privacy resilience debate and lays the groundwork for developing a conceptual model of online consumer resilience that would explore how individual behavior is affected after online privacy violation occurrence. Developing a conceptual model of consumer resilience to online privacy violation that would include a set of individual and environmental variables, will contribute to the existing understanding of resilience at the intersection of psychology, economics, and privacy studies. Furthermore, it will also contribute to the understanding of adaptive responses of resilient individuals to privacy breaches in an online environment, as well as to the understanding of processes by which resilience affects adaptive responses of consumers in the specific context of online privacy breaches

    The Impact Of Technology Trust On The Acceptance Of Mobile Banking Technology Within Nigeria

    Get PDF
    With advancement in the use of information technology seen as a key factor in economic development, developed countries are increasingly reviewing traditional systems, in various sectors such as education, health, transport and finance, and identifying how they may be improved or replaced with automated systems. In this study, the authors examine the role of technology trust in the acceptance of mobile banking in Nigeria as the country attempts to transition into a cashless economy. For Nigeria, like many other countries, its economic growth is linked, at least in part, to its improvement in information technology infrastructure, as well as establishing secure, convenient and reliable payments systems. Utilising the Technology Acceptance Model, this study investigates causal relationships between technology trust and other factors influencing user’s intention to adopt technology; focusing on the impact of seven factors contributing to technology trust. Data from 1725 respondents was analysed using confirmatory factor analysis and the results showed that confidentiality, integrity, authentication, access control, best business practices and non-repudiation significantly influenced technology trust. Technology trust showed a direct significant influence on perceived ease of use and usefulness, a direct influence on intention to use as well as an indirect influence on intention to use through its impact on perceived usefulness and perceived ease of use. Furthermore, perceived ease of use and perceived usefulness showed significant influence on consumer’s intention to adopt the technology. With mobile banking being a key driver of Nigeria’s cashless economy goals, this study provides quantitative knowledge regarding technology trust and adoption behaviour in Nigeria as well as significant insight on areas where policy makers and mobile banking vendors can focus strategies engineered to improve trust in mobile banking and increase user adoption of their technology
    • …
    corecore