1,128 research outputs found

    What do you fear?: A study on user generated health data and privacy behavior

    Get PDF
    Health tracking wearables used outside the clinical settings to monitor an individual’s health are widely used recently despite the information privacy concerns these devices evoke. Academic research addressing the effect of fear appeals on information privacy in the context of user-generated health data is scarce. It is important to understand what is an individual’s perspective on health data privacy and the influence of fear appeals on privacy behavior. The present exploratory qualitative study captures an individual’s perspective of information privacy on health data from 27 respondents using an adapted extended parallel process model. The study reveals what individuals perceive as threats and their extent of efficacy to handle the concerns over information privacy. It is observed, fear appeals influenced the respondents to choose between danger control or fear control behavior. This study provides an insight into the importance of an individual’s privacy and their behavioral change, which could prove useful for manufacturers and regulators

    Information Security Policy Violations in the Work-From-Home Era

    Get PDF
    Remote working has become the new normal in modern organizations. This transition has brought various challenges for the organizations in terms of their security infrastructure. Insider threats in organizations have been increasing in recent years. This paper proposes various behavioral and situational aspects that can influence employees’ intentions to violate information security policies (ISP) in a remote working environment, including subjective norms, the absence of peer monitoring, and the moderating role of shame. This research also proposes the role of neutralization techniques utilized by employees to rationalize and justify their behavior in the context of policy violations. A conceptual model has been developed, and a pilot study was conducted among 30 participants. This paper contributes to the body of knowledge on ISP compliance in the era of remote working, characterized by behavioral changes of employees

    Behaviour of short-finned pilot whales Globicephala macrorhynchus (Gray, 1846) (Mammalia: Cetartiodactyla: Delphinidae) in the Southeastern Arabian Sea

    Get PDF
    Behaviour of short-finned pilot whales Globicephala macrorhynchus (Gray, 1846) (Mammalia: Cetartiodactyla: Delphinidae) in the Southeastern Arabian Se

    Association and path coefficient analysis among yield attributes and berry yield in black pepper (Piper nigrum L.)

    Get PDF
    Eighty two germplasm accessions of black pepper aggregated from pepper cultivating tracts of Karnataka, Kerala, Goa and Maharashtra were characterized for 17 quantitative traits as per the IPGRI descriptors during 2018-19 at the field gene bank of ICAR-Indian Institute of Spices Research, Experimental Farm, Kozhikode. Wide range and high coefficient of variation (CV) were recorded for dry berry weight, fresh berry weight and number of spikes vine-1 whereas, lower CV was observed for berry size. Fresh berry weight showed significant positive correlation with dry berry weight followed by number of spikes vine-1 whereas, number of immature berries spike-1 and berry size showed significant negative association with setting percentage. High positive direct effect of fresh berry weight on dry berry weight was observed during path analysis. Both fresh rachis weight and number of spike vine-1 had indirect positive effects on dry berry weight through fresh berry weight. Residual effect was meagre suggesting that the 17 quantitative traits explained 99% variability. Traits like number of spikes vine-1 and fresh berry weight are the important traits that need to be augmented during improvement of black pepper for yield

    Offshore IT Outsourcing between India and New Zealand: A Systemic Analysis

    Get PDF
    This article aims to understand the complex interactions of factors related to IT offshore outsourcing between India and New Zealand. A systems approach was used to structure this problem situation and develop a model. This study undertook group model building exercises to construct a causal loop model that captured the underlying structure of the system. The analysis of the model revealed a set of eight feedback loops operating in the system identified as responsible for the complexity of the problem situation. In general, the literature on IT offshore outsourcing is based on clients’ perspectives, while this study analyses the issue from a vendors’ perspective. The paper concludes by highlighting a few strategies based on long term structural changes to improve IT offshore outsourcing between India and New Zealand. Available at: https://aisel.aisnet.org/pajais/vol7/iss3/3
    corecore