107 research outputs found

    Are 21st-century citizens grieving for their loss of privacy?

    Get PDF
    Although much research exists that examines cognitive events leading up to information disclosure, such as risk-benefit analysis and state-based and trait-based attributes, minimal research exists that examines user responses after a direct or indirect breach of privacy. The present study examines 1,004 consumer responses to two different high-profile privacy breaches using sentiment analysis. Our findings indicate that individuals who experience an actual or surrogate privacy breach exhibit similar emotional responses, and that the pattern of responses resembles well-known reactions to other losses. Specifically, we present evidence that users contemplating evidence of a privacy invasion experience and communicate very similar responses as individuals who have lost loved ones, gone through a divorce or who face impending death because of a terminal illness. These responses parallel behavior associated with the Kübler-Ross’s five stages of grief

    A Privacy Calculus Model for Personal Mobile Devices

    Get PDF
    Personal mobile devices (PMDs) initiated a multi-dimensional paradigmatic shift in personal computing and personal information collection fueled by the indispensability of the Internet and the increasing functionality of the devices. From 2005 to 2016, the perceived necessity of conducting transactions on the Internet moved from optional to indispensable. The context of these transactions changes from traditional desktop and laptop computers, to the inclusion of smartphones and tablets (PMDs). However, the traditional privacy calculus published by (Dinev and Hart 2006) was conceived before this technological and contextual change, and several core assumptions of that model must be re-examined and possibly adapted or changed to account for this shift. This paradigm shift impacts the decision process individuals use to disclose personal information using PMDs. By nature of their size, portability, and constant proximity to the user, PMDs collect, contain, and distribute unprecedented amounts of personal information. Even though the context within which people are sharing information has changed significantly, privacy calculus research applied to PMDs has not moved far from the seminal work by Dinev and Hart (2006). The traditional privacy calculus risk-benefit model is limited in the PMD context because users are unaware of how much personal information is being shared, how often it is shared, or to whom it is shared. Furthermore, the traditional model explains and predicts intent to disclose rather than actual disclosure. However, disclosure intentions are a poor predictor of actual information disclosure. Because of perceived indispensability of the information and the inability to assess potential risk, the deliberate comparison of risks to benefits prior to disclosure—a core assumption of the traditional privacy calculus—may not be the most effective basis of a model to predict and explain disclosure. The present research develops a Personal Mobile Device Privacy Calculus model designed to predict and explain disclosure behavior within the specific context of actual disclosure of personal information using PMDs

    The critical incident technique reappraised: using critical incidents to illuminate organizational practices and build theory

    Get PDF
    Purpose: The purpose of this paper is to offer a reconceptualization of the critical incident technique (CIT) and affirm its utility in management and organization studies. Design/methodology/approach: Utilizing a case study from a leadership context, the paper applies the CIT to explore various leadership behaviours in the context of nonprofit boards in Canada. Semi-structured critical incident interviews were used to collect behavioural data from 53 participants – board chairs, board directors, and executive directors – from 18 diverse nonprofit organizations in Alberta, Canada. Findings: While exploiting the benefits of a typicality of events, in some instances the authors were able to validate aspects of transformational leadership theory, in other instances the authors found that theory falls short in explaining the relationships between organizational actors. The authors argue that the CIT potentially offers the kind of “thick description” that is particularly useful in theory building in the field. Research limitations/implications: Drawing on interview material, the authors suggest that incidents can be classified based on frequency of occurrence and their salience to organizational actors, and explore the utility of this distinction for broader theory building purposes. Practical implications: Principally, the paper proposes that this method of investigation is under-utilized by organization and management researchers. Given the need for thick description in the field, the authors suggest that the approach outlined generates exceptionally rich data that can illuminate multiple organizational phenomena. Social implications: The role of nonprofit boards is of major importance for those organizations and the clients that they serve. This paper shed new light on the leadership dynamics at the top of these organizations and therefore can help to guide improved practice by those in board and senior management positions. Originality/value: The CIT is a well-established technique. However, it is timely to revisit it as a core technique in qualitative research and promote its greater use by researchers. In addition, the authors offer a novel view of incidents as typical, atypical, prototypical or archetypal of organizational phenomena that extends the analytical value of the approach in new directions

    IP Bouncer: An End-User Network Privacy Enhancing Tool

    Get PDF
    IP Bouncer is a novel IT artifact that exposes unexpected and unwanted network communication initiated by trusted “insider” applications. It closely follows design science guidelines illustrated in the five design principles of the artifact. One of the novel aspects of the design is the key-pair approach used for assessing appropriate or inappropriate network communications. By coupling the context-awareness of the user with online aggregators of blacklists, IP Bouncer offers greater individual and organizational security protection and earlier detection of network anomalies

    Data Quality Procedures in Survey Research: An Analysis and Framework for Doctoral Program Curricula

    Get PDF
    To ensure validity in survey research, it is imperative that we properly educate doctoral students on best practices in data quality procedures. A 14-year analysis of 679 studies in the AIS “Basket of 8” journals noted undercommunication in the most pertinent procedures, consistent across journals and time. Given recent calls for improvements in data transparency, scholars must be educated on the importance and methods for ensuring data quality. Thus, to guide the education of doctoral students, we present a “5-C Framework\u27\u27 of data quality procedures derived from a wide-ranging literature review. Additionally, we describe a set of guidelines regarding enacting and communicating data quality procedures in survey research

    A simple method for testing and controlling inhibition in soil and sediment samples for qPCR

    Get PDF
    The presence of polymerase-chain-reaction (PCR) inhibitors in many environmental samples can make reliable and repeatable quantitative-polymerase-chain-reaction (qPCR) analysis difficult without sample dilution. To estimate an optimal sample dilution for qPCR and reduce effects of inhibition, a simple test based on multiple dilution series of samples is presented that avoids the use of internal controls and standards reducing complexity and cost

    Sensemaking and Success in the Transition from Community Colleges to University IS/CS/CE Programs

    Get PDF
    Increasing the enrollment of women, minority, and other underrepresented populations in undergraduate information systems and computing programs is an important social issue. We explore ways of attracting and retaining community college transfer students—an important source of underrepresented students —by examining their sensemaking efforts as they transition to four-year universities. We conducted a qualitative study to test sensemaking theory and develop recommendations for retaining community college transfer students in undergraduate information systems, computer science, and computer engineering programs
    • …
    corecore