14 research outputs found

    The mediating role of perceived risks and benefits when self-disclosing:a study of social media trust and FoMO

    Get PDF
    Self-disclosure as influenced by perceived risks and benefits plays an important role within the context of social media use and the associated privacy risk. Some social media platforms, like Facebook (now part of Meta Platforms Inc.), provide users with elaborate means to control privacy risk. Conversely, Instagram (also part of Meta) provides users with fewer such mechanisms as a function of self-disclosure. Therefore, self-disclosure as a product of risk and benefit assessment may differ considerably as a function of the technological affordances that control such disclosure. This is particularly the case considering that such a benefit and risk assessment is further influenced by a user's trust in that provider, not to mention their proclivity for disclosing without any rational risk and benefit assessments, as is the case when disclosing as a function of fear of missing out (FoMO). Given the influence that provider trust and FoMO might have when assessing risks and benefits, this study evaluated the extent to which perceived risks and benefits mediate self-disclosure on Facebook and Instagram, in particular within the context of provider trust and FoMO. Based on an adapted version of privacy calculus, we evaluated our research model by analyzing 720 survey responses using partial least squares path modeling. Our results indicate that perceived benefits mediate the relationship between FoMO and intention to self-disclose when using Instagram, but not when using Facebook. Additionally, we found perceived benefits and perceived risks to mediate the relationship between trust in provider and intention to self-disclose for Facebook and Instagram. Surprisingly, we found no evidence to suggest that the relationship between FoMO and intention to self-disclose is mediated by perceived risks when using Facebook, with the converse being true when using Instagram. We conclude that the transitory (ephemeral) nature of some methods of self-disclosure on Instagram are used as a means to mitigate privacy risks.</p

    Higher education cloud computing in South Africa:towards understanding trust and adoption issues

    Get PDF
    This paper sets out to study the views of key stakeholders on the issue of cloud information security within institutions of Higher Education. A specific focus is on understanding trust and the adoption of cloud computing in context of the unique operational requirements of South African universities. Contributions are made on both a methodological and theoretical level. Methodologically the study contributes by employing an Interpretivist approach and using Thematic Analysis in a topic area often studied quantitatively, thus affording researchers the opportunity to gain the necessary in-depth insight into how key stakeholders view cloud security and trust. A theoretical contribution is made in the form of a trust-centric conceptual framework that illustrates how the qualitative data relates to concepts innate to cloud computing trust and adoption. Both these contributions lend credence to the fact that there is a need to address cloud information security with a specific focus on the contextual elements that surround South African universities. The paper concludes with some considerations for implementing and investigating cloud computing services in Higher Education contexts in South Africa

    Would US citizens accept cybersecurity deresponsibilization? <i>Perhaps not</i>

    Get PDF
    Responsibilizing governments provide advice about how to manage a variety of risks. If citizens do not heed the advice and things go wrong, they are expected to accept the adverse consequences without complaint. However, in some cases, citizens are unable or unwilling to embrace these government-assigned responsibilities and to act on the advice, for a variety of valid reasons. It may be appropriate for governments to provide more direct support: in essence, deresponsibilizing citizens who struggle to embrace the responsibility. In this paper, we explore whether US citizens would be willing to accept more help from their government in the cyber realm. Using two studies, we find that perceptions related to the government's competence and benevolence are necessary pre-requisites for a willingness to be deresponsibilized, and also that many respondents did not have confidence that either of these were sufficient. This deficiency might well render governments’ well-intended deresponsibilization endeavours futile. We conclude by proposing deresponsibilization strategies that acknowledge and accommodate this

    Socially desirable responding within the context of privacy-related research:a personality perspective

    Get PDF
    Background: Socially desirable responding within the context of self-reported surveys is a well-known and persistent problem that plagues quantitative studies. Such forms of responding are particularly problematic within the context of personality-based studies that investigate privacy-related decision-making. In such instances, certain respondents may feel pressured to provide socially desirable responses, which reduces the overall quality of the collected data.Objectives: The objective of this study was to evaluate the extent to which the Big Five personality traits (openness, conscientiousness, extraversion, agreeableness and neuroticism) elicit socially desirable responses within the context of privacy-related decision-making.Method: To evaluate their hypotheses, the authors empirically situate their study within the context of respondents’ intended use of Facebook privacy settings. To this end, 576 survey responses were analysed using partial least squares structural equation modelling (PLS-SEM).Results: It was found that some personality traits were indeed significantly related to socially desirable responding – albeit not always as expected. For example, highly agreeable individuals were unlikely to provide socially desirable responses: choosing honest responses. Neuroticism, on the other hand, had the opposite effect.Conclusion: Based on the results, the authors conclude that neurotic individuals seem predisposed towards responding in a socially desirable manner within the context of privacy-related surveys. The authors, therefore, advise researchers within the field of privacy-based personality studies to take care when analysing their results

    A personality-based surveillance model for Facebook apps

    Get PDF
    The surveillance of data through the use of Facebook Apps is an ongoing and persistent problem that impacts millions of users. Nonetheless, limited research has been conducted investigating to what extent a Facebook user’s personality influences their awareness of such surveillance practices. Thus, to understand this situation better, the current study inductively developed four propositions from secondary data sources as part of a detailed content analysis. Spanning three search and analysis phases the content analysis led to the development of the research model. Guided by the propositions and research questions, a questionnaire was developed based on the relevant constructs prescribed by the Theory of Planned Behaviour. This questionnaire was used, and a total of 651 responses were collected from Facebook users over the age of 18 years old and residing in the United States of America. Primary data took place at both a univariate and multivariate level with a specific focus on the development of a structural model. Interpretation of the structural model revealed that out of all the Big Five personality traits, Conscientiousness exhibited the strongest relationship with information security awareness followed by Openness to Experience and Neuroticism, respectively. The results further indicated that the model constructs based on attitude, social norms and awareness significantly influenced the intended use of Facebook Apps. The study also contributes by indicating which personality traits are most vulnerable to Facebook App surveillance. For example, it was found that individuals high in Conscientiousness are the least vulnerable with individuals high in Extraversion being the most vulnerable. Since the results indicate that not all the personality traits are significantly related to the model constructs, additional factors may contribute to App surveillance in this context. Concerning this, factors such as user apathy, information privacy, privacy concerns, control and Facebook dependency are discussed as a means to argue why this might be the case

    Cloud information security : a higher education perspective

    Get PDF
    In recent years higher education institutions have come under increasing financial pressure. This has not only prompted universities to investigate more cost effective means of delivering course content and maintaining research output, but also to investigate the administrative functions that accompany them. As such, many South African universities have either adopted or are in the process of adopting some form of cloud computing given the recent drop in bandwidth costs. However, this adoption process has raised concerns about the security of cloud-based information and this has, in some cases, had a negative impact on the adoption process. In an effort to study these concerns many researchers have employed a positivist approach with little, if any, focus on the operational context of these universities. Moreover, there has been very little research, specifically within the South African context. This study addresses some of these concerns by investigating the threats and security incident response life cycle within a higher education cloud. This was done by initially conducting a small scale survey and a detailed thematic analysis of twelve interviews from three South African universities. The identified themes and their corresponding analyses and interpretation contribute on both a practical and theoretical level with the practical contributions relating to a set of security driven criteria for selecting cloud providers as well as recommendations for universities who have or are in the process of adopting cloud computing. Theoretically several conceptual frameworks are offered allowing the researcher to convey his understanding of how the aforementioned practical concepts relate to each other as well as the concepts that constitute the research questions of this study

    VISTA:an inclusive insider threat taxonomy, with mitigation strategies

    Get PDF
    Insiders have the potential to do a great deal of damage, given their legitimate access to organisational assets and the trust they enjoy. Organisations can only mitigate insider threats if they understand what the different kinds of insider threats are, and what tailored measures can be used to mitigate the threat posed by each of them. Here, we derive VISTA (inclusiVe InSider Threat tAxonomy) based on an extensive literature review and a survey with C-suite executives to ensure that the VISTA taxonomy is not only scientifically grounded, but also meets the needs of organisations and their executives. To this end, we map each VISTA category of insider threat to tailored mitigations that can be deployed to reduce the threat

    Online privacy fatigue:a scoping review and research agenda

    Get PDF
    Online users are responsible for protecting their online privacy themselves: the mantra is custodiat te (protect yourself). Even so, there is a great deal of evidence pointing to the fact that online users generally do not act to preserve the privacy of their personal information, consequently disclosing more than they ought to and unwisely divulging sensitive information. Such self-disclosure has many negative consequences, including the invasion of privacy and identity theft. This often points to a need for more knowledge and awareness but does not explain why even knowledgeable users fail to preserve their privacy. One explanation for this phenomenon may be attributed to online privacy fatigue. Given the importance of online privacy and the lack of integrative online privacy fatigue research, this scoping review aims to provide researchers with an understanding of online privacy fatigue, its antecedents and outcomes, as well as a critical analysis of the methodological approaches used. A scoping review based on the PRISMA-ScR checklist was conducted. Only empirical studies focusing on online privacy were included, with nontechnological studies being excluded. All studies had to be written in English. A search strategy encompassing six electronic databases resulted in eighteen eligible studies, and a backward search of the references resulted in an additional five publications. Of the 23 studies, the majority were quantitative (74%), with fewer than half being theory driven (48%). Privacy fatigue was mainly conceptualized as a loss of control (74% of studies). Five categories of privacy fatigue antecedents were identified: privacy risk, privacy control and management, knowledge and information, individual differences, and privacy policy characteristics. This study highlights the need for greater attention to be paid to the methodological design and theoretical underpinning of future research. Quantitative studies should carefully consider the use of CB-SEM or PLS-SEM, should aim to increase the sample size, and should improve on analytical rigor. In addition, to ensure that the field matures, future studies should be underpinned by established theoretical frameworks. This review reveals a notable absence of privacy fatigue research when modeling the influence of privacy threats and invasions and their relationship with privacy burnout, privacy resignation, and increased self-disclosure. In addition, this review provides insight into theoretical and practical research recommendations that future privacy fatigue researchers should consider going forward

    Investigating the mediating effects of phubbing on self-presentation and FoMO within the context of excessive Instagram use

    Get PDF
    Social media platforms can deliver benefits for their users. They help people to stay in touch with each other and to have control over how they present themselves to their contacts on these platforms. In some cases, these benefits lead to excessive usage, which can diminish individual wellbeing, and compromise relationships with significant others. We surveyed 275 respondents to investigate the influence of and interactions between (1) self-presentation (specifically false self-presentation), (2) FoMO (fear of missing out), and (3) phubbing (ignoring someone by diverting attention to a mobile phone) in the context of excessive Instagram use. We found that phubbing mediates the relationship between false self-presentation and excessive Instagram use but did not find evidence that phubbing mediates the relationship between FoMO and excessive Instagram use. We also found a positive relationship between excessive Instagram use and educational level. We conclude with a discussion on the theoretical and practical implications of the results

    Uncertainty in cyber de-responsibilisation

    No full text
    The sociologist Norbert Elias argued that the ability to take responsibility is part of a 'civilizing process'. Neoliberal governments appear to agree with this, because they have 'responsibilised' their citizens in many domains. Pellandini-Simányi and Conte explain that the concept of responsibilisation refers to the assigning of responsibility to citizens and the social-cultural factors that persuade citizens to embrace those responsibilities
    corecore