132 research outputs found

    Dependent Variables in the Privacy-Related Field: A Descriptive Literature Review

    Get PDF
    As privacy is an ongoing issue of both society and research, there is a tremendous amount of research on privacy in the domain of information systems. A plethora of these studies has been conducted on privacy-related dependent variables. This descriptive literature review summarizes used dependent variables and gives a detailed analysis of the variables including the research setting, used theories, used methodologies, and used research designs. Results show among others that 1) some dependent variables are under-researched, 2) the majority is using intention to disclose as their dependent variable, 3) many articles are not grounded in a basic underlying theory and 4) the majority is using cross-sectional surveys as their research design. Based on the results several recommendations for future research are given, including to use certain dependent variables, to focus on actual disclosure behaviour and to conduct longitudinal studies

    Drivers and Consequences of Frustration When Using Social Networking Services: A Quantitative Analysis of Facebook Users

    Get PDF
    In this study drivers and consequences of frustration, a negative emotion when using information technology (IT), are theorized and empirically evaluated in a social networking services (SNS) usage context. For example, when users are frustrated by using SNS they might stop using these services. As the number of users mainly determines the value of SNS this paper focuses on frustration while using SNS. It is assumed that both technology and social aspects of SNS usage determine whether users feel frustrated. Empirical evidence can be provided that perceived enjoyment, envy, information overload, and social overload are antecedents of the sentiment frustration. It is also argued that frustration while using SNS will lead to dissatisfaction and discontinued usage. Based on the empirical evidence for this cohesion the paper discusses its theoretical contribution in terms of that discontinuous usage behavior is a coping strategy applied by users to minimize the frustration sentiment

    Patterned Irradiation of YBa_2Cu_3O_(7-x) Thin Films

    Full text link
    We present a new experiment on YBa_2Cu_3O_{7-x} (YBCO) thin films using spatially resolved heavy ion irradiation. Structures consisting of a periodic array of strong and weak pinning channels were created with the help of metal masks. The channels formed an angle of +/-45 Deg with respect to the symmetry axis of the photolithographically patterned structures. Investigations of the anisotropic transport properties of these structures were performed. We found striking resemblance to guided vortex motion as it was observed in YBCO single crystals containing an array of unidirected twin boundaries. The use of two additional test bridges allowed to determine in parallel the resistivities of the irradiated and unirradiated parts as well as the respective current-voltage characteristics. These measurements provided the input parameters for a numerical simulation of the potential distribution of the Hall patterning. In contrast to the unidirected twin boundaries in our experiment both strong and weak pinning regions are spatially extended. The interfaces between unirradiated and irradiated regions therefore form a Bose-glass contact. The experimentally observed magnetic field dependence of the transverse voltage vanishes faster than expected from the numerical simulation and we interpret this as a hydrodynamical interaction between a Bose-glass phase and a vortex liquid.Comment: 7 pages, 8 Eps figures included. Submitted to PR

    Why individuals switch to using mobile payment: A migration-theoretic, empirical study

    Get PDF
    With mobile payment, individuals can buy goods and services through the use of a mobile device and wireless technology. Still, although the usage of mobile payment provides several advantages, such as a more convenient and faster paying-process, it is hardly used. Individuals rather stick with their current payment method, such as cash, EC card or credit card. In this study, we therefore try to find out, what factors would bring individuals to switch from their current payment method to mobile payment. We rely on the pull-push-mooring framework to depict the migration process from the current payment method to mobile payment. The results prove that dissatisfaction with the current payment method has a rather low influence on the intention to switch to mobile payment in comparison with other factors such as perceived usefulness or alternative attractiveness. Furthermore, switching costs have a negative influence on the intention to switch to mobile payment

    THE INFLUENCE OF RESIGNATION ON THE PRIVACY CALCULUS IN THE CONTEXT OF SOCIAL NETWORKING SITES: AN EMPIRICAL ANALYSIS

    Get PDF
    Individuals conduct a privacy calculus before they disclose information by weighing benefits with privacy risks of disclosure. In line with the privacy calculus, if benefits outweigh privacy risks individuals disclose information, otherwise they do not. However, research has also challenged the privacy calculus because individuals also disclose information even in light of low benefits and high privacy risks. Given explanations refer to 1) altering the perceptions of benefits and privacy risks or 2) altering the effect of benefits and privacy risks on disclosure. Whereas studies focusing on the first part have provided explanations for why the privacy calculus is sometimes not confirmed, studies on the second part do not do so. This study is therefore considering the second part and is integrating an individual’s level of resignation to protect one’s privacy in the context of social networking sites. We consider resignation as a reaction of individuals to given privacy threats. Results show that when including resignation the effect of benefits becomes stronger and the effect of privacy risks becomes weaker. Implications for theory include that resignation helps in explaining why individuals disclose information even when only small benefits and high privacy risks are present

    Justification of Mass Surveillance: A Quantitative Study

    Get PDF
    Online mass surveillance by governmental organizations is omnipresent. Even though this results in a loss of privacy and further negative outcomes for individuals, a majority is justifying mass surveillance. Understanding, why this is the case is among others important for individuals, who want to decrease justification of mass surveillance. Therefore, this study aims to uncover the factors that drive this justification. Drawing on system justification theory we consider mass surveillance to be a political arrangement. Five factors were identified that potentially drive individuals’ justification of mass surveillance which are among others, perceived privacy control or perceived security. A quantitative study was carried out and the results support most of our hypotheses. With our results, we contribute to the privacy-related area in the domain of IS, by indicating that individuals consider mass surveillance not necessarily to be bad and by giving advice on how to alter the level of justification

    Influence of Laziness on Data Disclosure: An Empirical Investigation

    Get PDF
    “Smart devices think you\u27re \u27too lazy\u27 to opt out of privacy defaults”. This was the headline of a recent news article indicating that individuals might be too lazy to stop disclosing their private information and therefore to care about their information privacy (IP). IP is an ongoing topic and has become even more important since the famous whistleblower Edward Snowden has shown that government agencies examine all digital communication worldwide. Nevertheless, research has found out that individuals still disclose their private information although they are concerned about their IP which is commonly referred to the IP paradox. In this research in progress we will research on the question whether individuals might just be too lazy to take care about their IP by not disclosing their private information as it was indicated by recent news articles. Results will have implications for the IP research stream by better explaining data disclosure behavior and hence also by contributing to the research stream about the IP paradox

    Using a Work System Theory Perspective to Review 25 years of Technology Acceptance Research: Proposing a Research Agenda

    Get PDF
    IT projects still often fail and do not generate the expected value due to the lack of user acceptance. From the point of view of the work system theory (WST) this might be grounded in the fact that in current technology acceptance research IT is treated as a technical artifact and not as part of a work system. Therefore, we set up a literature review to reflect 25 years of research since the introduction of its most prominent model to discuss in how far a work system theory perspective on technology acceptance research might help to explore possible research gaps. Our results reveal that the technology acceptance model (TAM) is still the predominant model in technology acceptance research and therefore the classic components of a work system namely participants, information and technology and the relation between these components have been researched very well. However, we found out that work practices and also the relation between work practices, participants, information and IT in relation to technology acceptance, which can have an influence on technology acceptance as well, have rather been neglected in current research. We also identified products/services and customers as potential drivers of user acceptance. We derive six propositions that can be further theorized and evaluated by technology acceptance research. Consequently, we conclude that a WST perspective on technology acceptance research is appropriate to discuss the acceptance of IT, which is part of a work system in which participants produce products or services for customers

    A Work System Theory Perspective on User Satisfaction: Using Multiple Case Studies to Propose a Work System Success Model

    Get PDF
    In this paper we use multiple case studies and apply work system theory to them to better understand user satisfaction in each case. Based on the IS success model and the three case studies we conclude that beside the classic investigated objects information and technology as proposed by the IS success model also additional component of a work system influence user satisfaction. In particular we identified that work practices and also the relation between work practices, information and technologies have an influence on user satisfaction. We also revealed products/services and customers as potential drivers of user satisfaction and analyzed individual, environmental, strategical, and infrastructure characteristics as important contextual factors. Therefore, we suggest a work system success model for an extended understanding of user satisfaction that should better guide organizations when designing and implementing information systems

    Electrochemical bromofunctionalization of alkenes in a flow reactor

    Get PDF
    The bromination of organic molecules has been extensively studied to date, yet there is still a demand for safe and sustainable methodologies. Hazardous reagents, selectivity, low atom economy and waste production are the most persisting problems of brominating reagents. The electrochemical oxidation of bromide to bromine is a viable strategy to reduce waste by avoiding chemical oxidants. Furthermore, the in situ generation of reactive intermediates minimizes the risk of hazardous reagents. In this work, we investigate the electrochemical generation of bromine from hydrobromic acid in a flow electrochemical reactor. Various alkenes could be converted to their corresponding dibromides, bromohydrines, bromohydrin ethers and cyclized products in good to excellent yields
    • 

    corecore