84 research outputs found

    Doxing and Doxees: A Qualitative Analysis of Victim Experiences and Responses

    Get PDF
    Doxing, a form of adversarial online behavior, is the intentional release of an individual’s personal information with malicious intent. It is increasingly used to threaten, punish, or silence individuals who participate in online communities. Such Doxees often experience extreme and intertwined cyberharassment and physical threats, transforming how they participate in both cyber and physical communities. While prior research has examined the underlying motives of the Doxer, the Doxee’s perspective has remained largely unexplored. Drawing on data about 14 individuals who have experienced Doxing, we examine the consequences of Doxing from the Doxee’s point of view. Employing the lens of approach and avoidance coping, we describe how Doxees respond to a Doxing threat and change their behavior. Our research contributes novel insight and themes related to Doxing. Based on our analysis, we offer an agenda for research and practice to pave the way for exploring Doxing and its remedies

    Bounded Rationality, Formal Implementation Processes, and Conflicting Subcultures: A Theoretical Framwork

    Get PDF
    This paper develops a theoretical framework for studying how the interaction of individual perceptions, an organizations’ subcultures, and formal information systems (IS) design processes influence the fit of an IS to its respective organization. Building on models of individual decision making, such as bounded rationality, it extends several propositions for how informal and formal structures influence the fit of an IS

    Understanding the Relationship between Goal-Directed Intentions and Post-Adoptive IT Behaviors: The Moderating Influence of Image Compatibility

    Get PDF
    Technology adoption and diffusion research has advanced from examining pre-adoption to uncovering salient predictors of individual post-adoptive IT behaviors. Within this new research stream, there is a need to extend understanding of how and why individuals innovate with IT and infuse it in their work life. To that end, this paper suggests that understanding individuals’ motivations for continuing, extending, or adapting their use behaviors is important in order to develop understanding of how technologies become embedded in organizational work processes. Hence, we propose a research model that examines how compatibility between goals and perceptions of likely progress toward those goals influences an individual’s post-adoptive IT use behavior. Assuming the proposed hypotheses are supported, this study will contribute to the literature by shedding light on factors that trigger variations in post-adoptive IT use

    Slacking and the Internet in the Classroom: A Preliminary Investigation

    Get PDF
    This paper investigates “slacking with Internet technologies” in a classroom environment. Rooted in the literature on social loafing, we develop a model linking attributes of the context, the individual, and technology to “intention to cyber-slack” and its influence on the effective use of Internet technology. Using data collected from 128 student respondents, we empirically test our model using the Partial Least Squares approach to structural equation modeling. Our analysis found support for many of the relationships in the theoretical model. Specifically, we found that personal innovativeness with IT and multi-tasking with internet applications contribute to cognitive absorption, while cognitive absorption and subjective norms contributed to the intention to cyber-slack. Further, we found that intention to cyber-slack accounted for a large amount of the variance in effective use of Internet technologies. The paper concludes with a discussion of implications for research and practice

    Creating Consumer Value through Physical and Digital Product Bundles: One Firm's Approach

    Get PDF
    In recent years, firms have bundled digital products and physical products to create value and gain a competitive edge in the marketplace. In this commentary, we discuss one such approach to value creation. We present the case of Ganz, who developed and marketed the Webkinz brand of plush toy collectibles. These Webkinz toys create unique value through bundling a physical collectible toy with digital services accessed through the Internet. In this article, we analyze the elements of the Ganz business model that contribute to creating consumer value. We conclude with implications for managers and suggestions for future research

    The Impact of Embeddedness on IT Worker Behavior

    Get PDF
    Embeddedness theory provides significant insight into understanding the dynamics that constrain and drive the behaviors of IT professionals. Embeddedness provides a frame for understanding the behavior of IT professionals in a variety of different settings, including their job, their place in the IT function, their place in their employing organization, and their relationship with their profession. Furthermore, embeddedness can explain how factors germane to the IT profession, such as learning demands, IT skills development and training can influence individual level outcomes, such as organizational citizenship behaviors, performance, absenteeism and turnover. We intend to gather data from a sample of IT professionals and will conduct data analysis via structural equation modeling

    Does Within-Culture Variation Matter? An Empirical Study of Computer Usage

    Get PDF
    This article examines within-culture variance in the influence of values on perceptions and use of information technology (IT). Based on cross-cultural research, we suggest that cultural values influence technology acceptance and use. Specifically, we argue that masculinity/femininity and individualism/collectivism directly influence personal innovativeness with IT, computer anxiety, and computer self-efficacy, and have a mediated effect on perceived usefulness, perceived ease of use, and use of IT. Overall, analysis provides support for the research model. Our results suggest that masculinity/femininity influences computer selfefficacy, computer anxiety, and personal innovativeness with IT. We also offer implications for research and practice

    Mindfulness in the Domain of Information Systems

    Get PDF
    Although there are numerous explanations of why users behave in specific ways toward information technologies, recent work in social psychology suggests that holistic traits such as awareness and openness are potentially important explanatory variables in technology behavior theories. In this paper, we examine the multi-dimensional construct of mindfulness and its applicability to the domain of IS research. We discuss the theory of mindfulness as developed in the social psychology literature. Specifically, we adapt the notion of mindfulness and its dimensions – alertness to distinction, openness to novelty, orientation in the present, and awareness of multiple perspectives – to the domain of information systems. In doing so, we place mindfulness within the broader nomological net related to individual level decisions about information technology. Also, we present preliminary explanations for how mindfulness converges with and discriminates from existing constructs in the innovation diffusion literature. Finally, we present an initial domain-specific measure of mindfulness and outline a study designed to assess the psychometric properties of the proposed measure. Using data collected from 238 subjects with Internet Applications as the target technology, preliminary analysis indicates that the operational measures have acceptable psychometric properties and confirmatory factor analysis supports the proposed multi-dimensional structure. Implications for practice and research are offered

    Self-disclosure and SNS Platforms: The Impact of SNS Transparency and Culture

    Get PDF
    Self-disclosure on social networking platforms has attracted attention in Information Systems (IS) research. While studies have connected individual beliefs such as perceived privacy, perceived benefits, and cost to SNS use, less research has examined how characteristics of the social media platform itself shape SNS use. This study extends the literature by examining how the interplay between SNS transparency and individual culture affect user\u27s self-disclosure of personal information as well as factors that shape users’ perceptions on SNS transparency. Drawing on Accountability Theory, Communication Privacy Management Theory, and Culture Theory, we build a comprehensive, integrative model that offers a more holistic view of self-disclosure and the impact of the contextual factors on self-disclosure behaviors. The proposed study will use factorial survey (Vance et al. 2013) to collect data. This study will conceptually develop and operationalize a new construct—SNS transparency—that could help the researchers to gain better understanding of SNS-based self-disclosure and offers insights into how to integrate transparency into social media platforms

    A Taxonomy of Phishing: Attack Types Spanning Economic, Temporal, Breadth, and Target Boundaries

    Get PDF
    Phishing remains a pernicious problem for organizations. Phishing attacks are increasing in sophistication, which hinders the ability of cybersecurity functions to effectively defend against them. These attacks are becoming increasingly complex, dynamic, and multifaceted to evade the organizational, individual, and technical countermeasures employed in a cybersecurity ecosystem. Information security (ISec) phishing research and practice have provided an understanding of generalized phishing attacks and their subsequent defense. Yet by applying generalized phishing rules to these studies, it may not be sufficient to understand and defend escalated forms of phishing. This study seeks to develop a taxonomy of phishing to provide a more nuanced understanding of this phenomena. This taxonomy may assist ISec research in providing theoretical guidance for the understanding and defense of the various forms of phishing
    • …
    corecore