6 research outputs found

    Antecedents and Outcomes of Information Privacy Concerns: A Replication Study in Rural India

    Get PDF
    With the increasing use of social media, individuals are now exposed to risks stemming from the improper use of their data by their peers. This study replicates Ozdemir, Smith and Benamati\u27s article, exploring the relationships among the constructs of privacy experiences, privacy awareness, trust, risk, and benefits and individuals’ behaviors are impacted by these relationships. We collected 248 valid responses through in-person surveys conducted within a rural area in India. Similar to the original study, the hypotheses were tested using SmartPLS. Our preliminary results enrich existing knowledge by revealing distinct privacy concerns in rural India compared with Western settings. Our findings not only reaffirm but also extend the original study’s implications, making it relevant to various contexts

    The role of organizational competence on information security job performance

    Get PDF
    Organizations invest manpower and resources to ensure that sensitive corporate data is secure in the hands of its employees. Information security policies of these organizations explicitly state responsibilities for employees. But there is a massive gap between employee security performance and understanding of their information security requirements. In this study, we explore the factors that can enhance information security job performance of employees within organizations. We argue that employee information security performance can be enhanced by developing organizational security competencies. We conduct the argument through a case study of a public sector bank in India. The in-depth case study allows us to develop a theoretical understanding of how different aspects of organizational competence allow organizations to come together to enhance information security performance

    Understanding Generation Z’s Information Security Behaviors Regarding Penalties, Pressures and Perceived Effectiveness

    Get PDF
    Effective management of information security remains of paramount importance. While end users are often the focus in terms of compliance with policies, how Generation Z behaves with respect to information security has not received much interest. Monitoring and influencing Generation Z behaviors pose substantial challenges in the domain of information security. In this paper, we construct and empirically validate a theoretical model that delves into the influence of penalties, external pressures, and the perceived effectiveness of Generation Z action on their adherence to information security policies. Our research draws from a survey response collected from 202 Generation Z individuals. Notably our findings underscore the security behaviors can be swayed by a combination of intrinsic and extrinsic motivators. However, we found that amongst extrinsic motivation factors the role penalties were insignificant. But we found that the role of social pressure was highly significant among Generation Z. In contrast the role of intrinsic motivation was insignificant, hence suggesting that while intrinsic and extrinsic motivation are important, they seem to have a differing role depending on the context and the generations

    Privacy calculus and intension to share confidential information

    No full text
    Sharing confidential information related to location, finances, health, etc. on various social media platforms can have severe consequences for the users. However, users sometimes share their information voluntarily and at times receive an incentive from the provider to do the same. Confidential information provided by users is a valuable resource that some providers leverage. Hence, users could make better decisions by weighing the benefits and risks of sharing confidential information. This study proposes to investigate the intention of users to share confidential information using privacy calculus and prospect theory

    Examining information systems security behavior of employees

    Get PDF
    corecore