21 research outputs found

    Privacy policy violations: A corporate nexus of healthcare providers and social media platforms

    Get PDF
    When healthcare information is shared on social media, who’s to blame? It can be difficult for users to determine whether it was the social media platform or the healthcare provider that caused the privacy violation. A model of behavioral intentions following a privacy breach on a social media platform is developed in which perceptions of psychological contract violations for both entities determine multiple response intentions

    Analyzing Privacy Policies of Zero Knowledge Cloud Storage Applications on Mobile Devices

    Get PDF
    With the rapid growth of mobile applications and the increase number of mobile users, many cloud storage services started to design stand-alone mobile applications that can be used to access files remotely from mobile and share them. In this paper, an in-depth analysis has been performed on the privacy policies of zero knowledge cloud storage applications on mobile. The analysis includes the type of information collected, collection mechanisms, purpose for collection, sharing of information, user controls and information retention period. The results showed that most privacy policies addressed important areas of information collection, purposes of collection, information sharing and users' controls. On the other hand, many policies lacked detailed information of the data retention period

    Privacy and Generation Y: Applying Library Values to Social Networking Sites

    Get PDF
    Librarians face many challenges when dealing with issues of privacy within the mediated space of social networking sites. Conceptually, social networking sites differ from libraries on privacy as a value. Research about Generation Y students, the primary clientele of undergraduate libraries, can inform librarians’ relationship to this important emerging technology. Five recommendations assist librarians in expanding their traditional commitment to privacy into the realm of social networking sites

    Optimizing Privacy Policy Videos to Mitigate the Privacy Policy Paradox

    Get PDF
    This research takes a design science approach to improving privacy policies through the design and use of mediated content, such as video. Research has emerged to indicate that privacy policies communicated through video (separate from-”and in addition to-”traditional textual privacy policy documents) are more effective at engendering trust, decreasing perceived risk, and encouraging information disclosure than textual privacy policies, which are seldom read or understood. We extend this research by examining design factors such as narrator gender, animation style, music tone, and color scheme. We implemented a field experiment and survey to determine how variations in these design elements affect consumers’ perceived risk, perceived benefits, and disclosure decisions. The results indicate that the most effective privacy policy videos use female narrators with vibrant color palettes and light musical tones. The animation style (animated imagery versus animated text) has no effect on consumers’ perceived risk/benefits or disclosure decisions

    Users\u27 Perceptions of Benefits and Costs of Personalization

    Get PDF

    When the bureaucrat promises to safeguard your online privacy: Dissecting the contents of privacy statements on Dutch municipal websites

    Get PDF
    Various studies show that the display of a privacy statement on an organization's website can be a potent, but simple way of acquiring clients' and users' trust, which results in the completion of transactions with the organization through its website. Empirical studies that analyze the contents of privacy statements on commercial websites are profuse, while privacy statements posted on the websites of non-commercial organizations have been largely ignored by researchers. In this study, the contents of privacy statements on Dutch municipal websites are analyzed. Using the important provisions of the Wet Bescherming Persoonsgegevens (WBP) or the Dutch Personal Data Protection Act, the study also looked into the conformity of the contents of privacy statements with the existing law on privacy protection in the Netherlands. We also looked into the availability and findability of privacy statements on Dutch municipal websites. Three important findings resulted from this study: first, not all municipal websites bother to post privacy statements on their websites; second, most municipalities do not ensure that their online privacy statements are findable; and third, privacy statements on Dutch municipal websites emphasize diverging assurances and promises—with some privacy policies containing all the important provisions of the WBP, and others offering only general, and sometimes rather vague, guarantees

    Sensing the City : Designing for Privacy and Trust in the Internet of Things

    Get PDF
    Acknowledgments: The work described here was funded by the award made by the RCUK Digital Economy programme to the University of Aberdeen (EP/N028074/1).Peer reviewedPostprin

    The role of security notices and online consumer behaviour: An empirical study of social networking users

    Get PDF
    This paper uses a survey of social networking users to empirically explore their perceptions of security notices – independently verified artefacts informing internet site users that security measures are taken by the site owner. We investigate such factors as purchase experience, purchase intention, risk propensity, usage of various social network categories and user victimisation. The results suggest a strong positive link between purchase intention and paying attention to security notices/features on social networks. We find that higher use of narrow-purpose social networking services has a negative association with paying attention to security notices. We also show that users with higher risk propensity pay less attention to security notices/features. Finally, we find no association between purchase experience, user victimisation and perception of security notices/features. Our results provide new, and possibly more refined, evidence of the factors that influence the attention paid to security notices/features by social media users. The results have important implications for theory development, policy and practice

    Policy Notice Readership on the Web

    Get PDF
    Both privacy policies and end-user licensing agreements (EULAs) are ubiquitous in today's computing environment. Users are frequently prompted to agree to privacy policies and EULAs, and often do so without even looking at them. This is in seemingly direct contradiction to the documented concern consumers feel regarding the capture, storage and handling of their personal information by websites and mobile applications. This study explores why users may choose to disregard the single document that describes the level of privacy they can expect from websites and software companies. In particular, the interface, by which these policies are communicated to the user, is addressed, as previous research has noted its many deficiencies. The survey results indicate that users have a desire for increased control over their own personal information and that barriers, such as long blocks of legal text, should be addressed in order to increase policy notice readership on the web.Master of Science in Information Scienc
    corecore