32 research outputs found

    Current State of Personal Data Protection in Electronic Voting: Criteria and Indicator for Effective Implementation

    Get PDF
    The adoption of electronic voting has been done in various countries related to cost and time reduction operationally. On the other hand, recent publication has been informed several issues occurred such as technicality, reliability, security and privacy due to the compromised system were used. In small scale, there are certain group of people who want to exploit the vulnerabilities for their own benefit in the election, while in the greater scale, it can reduce public confidence to entrust the adoption of e-voting system to augment participation rate, to improve the quality of voting and to aid the political right effectively. This paper aims to investigate the characteristic of people demanding the legislative to address the criteria and indicator for effective implementation in electronic voting. By understanding the perception of voters in viewing current electoral regulation are essential to provide some ideas and opinions for better enhancement, either through recommendation and drafting related legislation to cater the needs

    Privacy and the Digital Generation Gap: Myth and Reality

    Get PDF
    Over the past decade the demise of privacy has been repeatedly pronounced by renowned technology executives such as Mark Zuckerberg declaring privacy as passĂ© and anachronistic- “so 20th century” - the concern of old people. However, there has been relatively little research into privacy perception and behaviour among different generations that may relate to how people navigate their private lives in online settings. Furthermore, recent research reveals the ways in which privacy concerns of young internet users are enacted, thus challenging overgeneralized claims of a clear-cut generation gap associated with online privacy. As information privacy problems are becoming thornier, unfounded statement voiced by stakeholders with vested interests should be put to one side. Instead, systematic research is needed to understand how privacy is perceived and managed by people of different age groups, and what measures can and should be taken to address current and future concerns of internet users across generations. We address these questions and account for the results using a representative sample from Israel

    UNCOVERING THE PRIVACY PARADOX: THE INFLUENCE OF DISTRACTION ON DATA DISCLOSURE DECISIONS

    Get PDF
    The discrepancy between individuals’ intention to disclose data and their actual disclosure behaviour is called the privacy paradox. Although a wide range of research has investigated the privacy para-dox, it remains insufficiently understood due to mental processes’ role in decision-making being most-ly neglected. This research-in-progress provides a theoretical concept that examines the cognitive processes underlying data disclosure decisions to provide a better understanding of the privacy para-dox. We apply the Elaboration Likelihood Model (ELM), which suggests that the mental shortcuts that individuals take when making their actual data disclosure decision, which differs from their self-reported data disclosure intention, cause the privacy paradox. We propose a two-step, mixed method approach comprising a survey and an online experiment to empirically explore the intended and actu-al data disclosure. The study takes theoretical and methodological issues in prior literature into ac-count and enhances our understanding of individuals’ paradoxical data disclosure behaviour from a psychological point of view

    Is the Privacy Paradox a Matter of Psychological Distance? An Exploratory Study of the Privacy Paradox from a Construal Level Theory Perspective

    Get PDF
    Institutional operators in the digital marketplace have delighted consumers with precise, highly personalized and customized products and services through the collection and mining of customers’ personally identifiable data. However, the ethical conduct of online businesses continues to be a debatable issue, due to the increasing concerns over information privacy. Despite such controversies, scrutiny of consumer behavior has shown that consumers’ concerns for privacy do not transfer into protective behaviors or abstinence during online activity. The aim of this study is to illuminate the disparity known as the -˜privacy paradox’ through the directions of the construal level theory. Based on semi-structured interviews with 21 online shopping consumers, we explain that, due to spatial, temporal, social, and hypothetical distance of privacy values, privacy is construed as an abstract phenomenon influencing the formation of distant-future attitudes and intentions rather than actual behavior

    Dependent Variables in the Privacy-Related Field: A Descriptive Literature Review

    Get PDF
    As privacy is an ongoing issue of both society and research, there is a tremendous amount of research on privacy in the domain of information systems. A plethora of these studies has been conducted on privacy-related dependent variables. This descriptive literature review summarizes used dependent variables and gives a detailed analysis of the variables including the research setting, used theories, used methodologies, and used research designs. Results show among others that 1) some dependent variables are under-researched, 2) the majority is using intention to disclose as their dependent variable, 3) many articles are not grounded in a basic underlying theory and 4) the majority is using cross-sectional surveys as their research design. Based on the results several recommendations for future research are given, including to use certain dependent variables, to focus on actual disclosure behaviour and to conduct longitudinal studies

    The Compromise of One’s Personal Information: Trait Affect as an Antecedent in Explaining the Behavior of Individuals

    Get PDF
    This research examined the role trait affect, a lifelong and generally stable type of affect, has on the information security behavior of individuals. We examined this in the context of how one responds to the threat of one’s personal information becoming compromised. This was done by extending Protection Motivation Theory (PMT) by incorporating the two higher order dimensions of affect, positive affect and negative affect, as antecedents to self-efficacy, perceived threat severity, and perceived threat vulnerability. A survey was used to explore this further. Seven of the 11 hypotheses were supported, including three of the six related to affect. This research makes two primary contributions. First, trait affect may play an indirect role in understanding how individuals evaluate, respond to, and cope with a threat. Second, this research extended the application of PMT, which has been the primary theory used to understand the information security behavior of individuals

    Risk, trust, and the interaction of perceived ease of use and behavioral control in predicting consumers’ use of social media for transactions

    Get PDF
    There has been continued debate regarding competing models with respect to predicting use of social networking services. In this research the authors conceptualize and empirically test a model that combines constructs from the Technology Acceptance Model (TAM) and the Theory of Planned Behavior (TPB) together along with (1) a moderator between the two models, (2) perceived risk, and (3) trust. The empirical results support the hypothesis that perceived ease of use (from TAM theory) significantly amplifies (positively moderates) the effect of perceived behavioral control (from TPB theory) on intention to use the social networks for transactions. In short, there are benefits to integrating concepts from the two models instead of choosing one model over the other in research and practice. The results also indicate that perceived risk and trust play significant roles as antecedents in consumer decision making, and that risk-taking propensity has a direct effect on behavioral intention

    THE INFLUENCE OF RESIGNATION ON THE PRIVACY CALCULUS IN THE CONTEXT OF SOCIAL NETWORKING SITES: AN EMPIRICAL ANALYSIS

    Get PDF
    Individuals conduct a privacy calculus before they disclose information by weighing benefits with privacy risks of disclosure. In line with the privacy calculus, if benefits outweigh privacy risks individuals disclose information, otherwise they do not. However, research has also challenged the privacy calculus because individuals also disclose information even in light of low benefits and high privacy risks. Given explanations refer to 1) altering the perceptions of benefits and privacy risks or 2) altering the effect of benefits and privacy risks on disclosure. Whereas studies focusing on the first part have provided explanations for why the privacy calculus is sometimes not confirmed, studies on the second part do not do so. This study is therefore considering the second part and is integrating an individual’s level of resignation to protect one’s privacy in the context of social networking sites. We consider resignation as a reaction of individuals to given privacy threats. Results show that when including resignation the effect of benefits becomes stronger and the effect of privacy risks becomes weaker. Implications for theory include that resignation helps in explaining why individuals disclose information even when only small benefits and high privacy risks are present

    Digital data usage in a business environment

    Get PDF

    Privacy in the Sharing Economy

    Get PDF
    Contemporary C2C platforms, such as Airbnb, have exhibited considerable growth in recent years and are projected to continue doing so in the future. These novel consumer-to-consumer marketplaces have started to obliterate the boundaries between private and economic spheres. Marketing personal resources online is inherently associated with the disclosure of personal and sometimes intimate information. This raises unprecedented questions of privacy. Yet, there is so far little research on the role of privacy considerations in the sharing economy literature. Leveraging the theoretical perspective of privacy calculus, we address this gap by investigating how privacy concerns and economic prospects shape a potential provider’s intentions to share via different communication channels. We relate privacy concerns back to the provider’s perceptions of the audience. We evaluate our research model by means of a scenario-based online survey, providing broad support for our reasoning
    corecore