336 research outputs found

    Too legit to quit? How realistic job previews affect early turnover decisions

    Get PDF
    Includes bibliographical references.2015 Summer.Using an organizational sample of call center employees, the current study improved upon conceptual and methodological limitations of prior realistic job preview (RJP) and turnover research to conduct a more rigorous test of RJP effectiveness. Specifically, using both quantitative organizational human resources archival records and qualitative third-party exit interview data, it was expected that an RJP intervention would be related to (1) a decreased voluntary turnover rate, (2) an organizationally unavoidable voluntary exit reason or involuntary exit reason (versus an organizationally avoidable voluntary exit reason), and (3) an increase in organizational tenure among exited employees. Results failed to support a hypothesized relationship between the RJP intervention, lower voluntary turnover rate, and increased organizational tenure among former employees, as effects were in the hypothesized direction but not large enough to establish statistical significance. Results also did not support the hypothesized relationship between the RJP intervention and exit reason. Findings and literature synthesis are pertinent for the design of future RJP research and the implementation of realistic recruitment interventions. Further implications of the results, contributions of the study, limitations, and recommendations for future research are also addressed

    On the Privacy Practices of Just Plain Sites

    Full text link
    In addition to visiting high profile sites such as Facebook and Google, web users often visit more modest sites, such as those operated by bloggers, or by local organizations such as schools. Such sites, which we call "Just Plain Sites" (JPSs) are likely to inadvertently represent greater privacy risks than high profile sites by virtue of being unable to afford privacy expertise. To assess the prevalence of the privacy risks to which JPSs may inadvertently be exposing their visitors, we analyzed a number of easily observed privacy practices of such sites. We found that many JPSs collect a great deal of information from their visitors, share a great deal of information about their visitors with third parties, permit a great deal of tracking of their visitors, and use deprecated or unsafe security practices. Our goal in this work is not to scold JPS operators, but to raise awareness of these facts among both JPS operators and visitors, possibly encouraging the operators of such sites to take greater care in their implementations, and visitors to take greater care in how, when, and what they share.Comment: 10 pages, 7 figures, 6 tables, 5 authors, and a partridge in a pear tre

    Privacy in crowdsourcing:a systematic review

    Get PDF
    The advent of crowdsourcing has brought with it multiple privacy challenges. For example, essential monitoring activities, while necessary and unavoidable, also potentially compromise contributor privacy. We conducted an extensive literature review of the research related to the privacy aspects of crowdsourcing. Our investigation revealed interesting gender differences and also differences in terms of individual perceptions. We conclude by suggesting a number of future research directions.</p

    Distilling Privacy Requirements for Mobile Applications

    Get PDF
    As mobile computing applications have become commonplace, it is increasingly important for them to address end-users’ privacy requirements. Privacy requirements depend on a number of contextual socio-cultural factors to which mobility adds another level of contextual variation. However, traditional requirements elicitation methods do not sufficiently account for contextual factors and therefore cannot be used effectively to represent and analyse the privacy requirements of mobile end users. On the other hand, methods that do investigate contextual factors tend to produce data that does not lend itself to the process of requirements extraction. To address this problem we have developed a Privacy Requirements Distillation approach that employs a problem analysis framework to extract and refine privacy requirements for mobile applications from raw data gathered through empirical studies involving end users. Our approach introduces privacy facets that capture patterns of privacy concerns which are matched against the raw data. We demonstrate and evaluate our approach using qualitative data from an empirical study of a mobile social networking application

    Competing jurisdictions: data privacy across the borders

    Get PDF
    Borderless cloud computing technologies are exacerbating tensions between European and other existing approaches to data privacy. On the one hand, in the European Union (EU), a series of data localisation initiatives are emerging with the objective of preserving Europe’s digital sovereignty, guaranteeing the respect of EU fundamental rights and preventing foreign law enforcement and intelligence agencies from accessing personal data. On the other hand, foreign countries are unilaterally adopting legislation requiring national corporations to disclose data stored in Europe, in this way bypassing jurisdictional boundaries grounded on physical data location. The chapter investigates this twofold dynamics by focusing particularly on the current friction between the EU data protection approach and the data privacy model of the United States (US) in the field of cloud computing

    Surveillance in ubiquitous network societies: Normative conflicts related to the consumer in-store supermarket experience in the context of the Internet of Things

    Get PDF
    Peer-reviewed journal articleThe Internet of Things (IoT) is an emerging global infrastructure that employs wireless sensors to collect, store, and exchange data. Increasingly, applications for marketing and advertising have been articulated as a means to enhance the consumer shopping experience, in addition to improving efficiency. However, privacy advocates have challenged the mass aggregation of personally identifiable information in databases and geotracking, the use of location-based services to identify one’s precise location over time. This paper employs the framework of contextual integrity related to privacy developed by Nissenbaum (Privacy in context: technology, policy, and the integrity of social life. Stanford University Press, Stanford, 2010) as a tool to understand citizen response to implementation IoT-related technology in the supermarket. The purpose of the study was to identify and understand specific changes in information practices brought about by the IoT that may be perceived as privacy violations. Citizens were interviewed, read a scenario of near-term IoT implementation, and were asked to reflect on changes in the key actors involved, information attributes, and principles of transmission. Areas where new practices may occur with the IoT were then highlighted as potential problems (privacy violations). Issues identified included the mining of medical data, invasive targeted advertising, and loss of autonomy through marketing profiles or personal affect monitoring. While there were numerous aspects deemed desirable by the participants, some developments appeared to tip the balance between consumer benefit and corporate gain. This surveillance power creates an imbalance between the consumer and the corporation that may also impact individual autonomy. The ethical dimensions of this problem are discussed

    Media, Capabilities, and Justification

    No full text
    In this paper, I evaluate the ‘capability approach’ developed by Amartya Sen and Martha Nussbaum as a normative perspective for critical media research. The concept of capabilities provides a valuable way of assessing media and captures important aspects of the relationship between media and equality. However, following Rainer Forst’s critique of outcome- oriented approaches to justice, I argue the capability approach needs to pay more attention to questions of power and process. In particular, when it comes to deciding which capabilities media should promote and what media structure and practices should promote them, the capability approach must accept the priority of deliberative and democratic processes of justification. Once we do this, we are urged to situate the concept of capabilities within a more process-oriented view of justice, focused not on capabilities as such, but on outlining the conditions required for justificatory equality. After discussing the capability approach, I will outline the process-oriented theory of justice Forst has developed around the idea of the ‘right to justification’. While Forst does not discuss media in depth, I argue his theory of justice can provide a valuable alternative normative standpoint for the critical media research

    Legal and Ethical Implications of Mobile Live-Streaming Video Apps

    Get PDF
    The introduction of mobile apps such as Meerkat, Periscope, and Facebook Live has sparked enthusiasm for live-streaming video. This study explores the legal and ethical implications of mobile live-streaming video apps through a review of public-policy considerations and the computing literature as well as analyses of a mix of quantitative and qualitative user data. We identify lines of research inquiry for five policy challenges and two areas of the literature in which the impact of these apps is so far unaddressed. The detailed data gathered from these inquiries will significantly contribute to the design and development of tools, signals or affordances to address the concerns that our study identifies. We hope our work will help shape the fields of ubiquitous computing and collaborative and social computing, jurisprudence, public policy and applied ethics in the future
    corecore