Catalogue Search | MBRL
Search Results Heading
Explore the vast range of titles available.
MBRLSearchResults
-
DisciplineDiscipline
-
Is Peer ReviewedIs Peer Reviewed
-
Series TitleSeries Title
-
Reading LevelReading Level
-
YearFrom:-To:
-
More FiltersMore FiltersContent TypeItem TypeIs Full-Text AvailableSubjectCountry Of PublicationPublisherSourceTarget AudienceDonorLanguagePlace of PublicationContributorsLocation
Done
Filters
Reset
12,366
result(s) for
"online privacy"
Sort by:
Factors affecting users’ online privacy literacy among students in Israel
by
Bouhnik, Dan
,
Weinberger, Maor
,
Zhitomirsky-Geffet, Maayan
in
Anonymity
,
Attitudes
,
Computer privacy
2017
Purpose
The purpose of this paper is to investigate the attitudes and influential factors of users’ knowledge and use of the tools designated for controlling and enhancing online privacy, which are referred to as online privacy literacy (OPL). Particularly, inspired by the protection motivation theory, a motivational factor is defined as comprising several variables which reflect users’ motivation to protect their online privacy.
Design/methodology/approach
To this end, a user study was conducted based on the quantitative method with the participation of 169 students from the Israeli academia who were administered closed-ended questionnaires.
Findings
Generally low to moderate levels of OPL were obtained. Interestingly, the multivariate linear regression analysis showed that motivational factors, such as users’ concern for personal information protection on the internet and users’ privacy self-efficacy and sense of anonymity when visiting a website, were among the strongest predictive factors of users’ OPL level.
Social implications
This research has social implications that might contribute to an increase in the OPL among internet users.
Originality/value
The direct influence of the examined factors on users’ OPL was not previously discussed in the literature. As a result of the study, a comprehensive model of user online privacy behavior was constructed.
Journal Article
Scam me if you can : simple strategies to outsmart today's rip-off artists
\"Are you at risk of being scammed? Former con artist and bestselling author of Catch Me If You Can Frank Abagnale shows you how to stop scammers in their tracks. Maybe you're wondering how to make the scam phone calls stop. Perhaps someone has stolen your credit card number. Or you've been a victim of identity theft. Even if you haven't yet been the target of a crime, con artists are always out there, waiting for the right moment to steal your information, your money, and your life. As one of the world's most respected authorities on the subjects of fraud, forgery, and cyber security, Frank Abagnale knows how scammers work. In Scam Me If You Can, he reveals the latest tricks that today's scammers, hackers, and con artists use to steal your money and personal information--often online and over the phone. Using plain language and vivid examples, Abagnale reveals hundreds of tips, including: The best way to protect your phone from being hacked; The only time you should ever use a debit card; The one type of photo you should never post on social media; The only conditions under which you should use WiFi networks at the airport; The safest way to use an ATM. With his simple but counterintuitive rules, Abagnale also makes use of his insider intel to paint a picture of cybercrimes that haven't become widespread yet\"-- Amazon.com.
The United States of anonymous : how the First Amendment shaped online speech
2022
In The United States of Anonymous, Jeff Kosseff explores how the right to anonymity has shaped American values, politics, business, security, and discourse, particularly as technology has enabled people to separate their identities from their communications.
Legal and political debates surrounding online privacy often focus on the Fourth Amendment's protection against unreasonable searches and seizures, overlooking the history and future of an equally powerful privacy right: the First Amendment's protection of anonymity. The United States of Anonymous features extensive and engaging interviews with people involved in the highest profile anonymity cases, as well as with those who have benefited from, and been harmed by, anonymous communications. Through these interviews, Kosseff explores how courts have protected anonymity for decades and, likewise, how law and technology have allowed individuals to control how much, if any, identifying information is associated with their communications. From blocking laws that prevent Ku Klux Klan members from wearing masks to restraining Alabama officials from forcing the NAACP to disclose its membership lists, and to refusing companies' requests to unmask online critics, courts have recognized that anonymity is a vital part of our free speech protections.
The United States of Anonymous weighs the tradeoffs between the right to hide identity and the harms of anonymity, concluding that we must maintain a strong, if not absolute, right to anonymous speech.
Internet Privacy Concerns: An Integrated Conceptualization and Four Empirical Studies
by
Thong, James Y. L.
,
Hong, Weiyin
in
Information retrieval
,
Information science
,
Information storage
2013
Internet privacy concerns (IPC) is an area of study that is receiving increased attention due to the huge amount of personal information being gathered, stored, transmitted, and published on the Internet. While there is an emerging literature on IPC, there is limited agreement about its conceptualization in terms of its key dimensions and its factor structure. Based on the multidimensional developmental theory and a review of the prior literature, we identify alternative conceptualizations of IPC. We examine the various conceptualizations of IPC with four online surveys involving nearly 4,000 Internet users. As a baseline, study 1 compares the integrated conceptualization of IPC to two existing conceptualizations in the literature. While the results provide support for the integrated conceptualization, the second-order factor model does not outperform the correlated first-order factor model. Study 2 replicates the study on a different sample and confirms the results of study 1. We also investigate whether the prior results are affected by the different perspectives adopted in the wording of items in the original instruments. In study 3, we find that focusing on one's concern for website behavior (rather than one's expectation of website behavior) and adopting a consistent perspective in the wording of the items help to improve the validity of the factor structure. We then examine the hypothesized third-order conceptualizations of IPC through a number of alternative higher-order models. The empirical results confirm that, in general, the third-order conceptualizations of IPC outperform their lower-order alternatives. In addition, the conceptualization of IPC that has the best fit with the data contains a third-order general IPC factor, two second-order factors of interaction management and information management, and six first-order factors (i.e., collection, secondary usage, errors, improper access, control, and awareness). Study 4 cross-validates the results with another data set and examines IPC within the context of a nomological network. The results confirm that the third-order conceptualization of IPC has nomological validity, and it is a significant determinant of both trusting beliefs and risk beliefs. Our research helps to resolve inconsistencies in the key underlying dimensions of IPC, the factor structure of IPC, and the wording of the original items in prior instruments of IPC. Finally, we discuss the implications of this research.
Journal Article
Sharing our lives online : risks and exposure in social media
2014
\"Most of us know someone who has inadvertently revealed something shameful or embarrassing online about themselves or someone else. With the growth of social media like Facebook and Twitter, we are heading towards a radically open society. In exploring this phenomenon, David R. Brake first provides an overview of the harms that can be posed by unwary social media use - not just for children but for all of us, young or old. He then draws on in-depth interviews, a range of related theories of human behaviour and a wealth of other studies to analyse why this happens. He explains in detail the social, technological and commercial influences and pressures that keep us posting what we should not and stop us fully appreciating the risks when we do so. This is an invaluable book for students, parents, policy-makers and any social media user. \"-- Provided by publisher.
Managing consumer privacy concerns and defensive behaviours in the digital marketplace
by
Fernando, Mario
,
Akter, Shahriar
,
Bandara, Ruwan
in
Computer privacy
,
Consumers
,
Electronic commerce
2021
Purpose
The purpose of this study is to examine privacy issues in the e-commerce context from a power-responsibility equilibrium theory (PRE) perspective.
Design/methodology/approach
The data was collected using an online survey (n = 335) from online shopping consumers. This study used partial least squares-structural equation modeling (PLS-SEM) and fuzzy-set qualitative comparative analysis (fsQCA) techniques to empirically examine the proposed relationships.
Findings
A lack of corporate privacy responsibility and regulatory protection can deprive consumers of privacy empowerment and damage consumer trust to trigger privacy concerns and subsequent defensive responses. Also, the fsQCA revealed five causal configurations to explain high consumer defensive behaviours.
Research limitations/implications
This study identifies the importance of PRE theory in the privacy context. Consumer privacy concerns, privacy empowerment and trust are established as strong mediators between corporate/regulatory privacy protection efforts and consumer backlash. The application of fsQCA verified that consumer privacy behaviour can be better explained by different configurations of the same causal antecedents.
Practical implications
The findings highlight the importance of increasing trust and privacy empowerment as mechanisms to manage privacy concerns and consumer backlash through responsible organisational and regulatory privacy protections. The importance of balancing power and responsibility dynamics for maintaining a healthy information exchange environment is identified.
Originality/value
This study extends the PRE framework of privacy to include corporate privacy responsibility, privacy empowerment and trust. This is one of the first studies to explore both antecedents and outcomes of privacy empowerment. Also, the application of complexity theory and fsQCA to explain consumers’ defensive responses is novel to the literature.
Journal Article
Raising humans in a digital world : helping kids build a healthy relationship with technology
by
Graber, Diana author
,
Borba, Michele, writer of foreword
in
Internet and children
,
Internet Social aspects
,
Internet Moral and ethical aspects
2019
\"Sexting, cyberbullying, revenge porn, online predators ... all of these potential threats can tempt parents to snatch the smartphone or tablet right out of their children's hands. While avoidance might eliminate the dangers, that approach also means your child misses out on technology's many benefits and opportunities. This book is packed with at-home discussion topics and enjoyable activities that any busy family can slip into their daily routine. Full of practical tips grounded in academic research and hands-on experience, today's parents finally have what they've been waiting for--a guide to raising digital kids who will become the positive and successful leaders our world desperately needs\"--Back cover.
The Personalization Privacy Paradox: An Empirical Evaluation of Information Transparency and the Willingness to Be Profiled Online for Personalization
by
Awad, Naveen Farag
,
Krishnan, M. S.
in
Building customization
,
Consumer advertising
,
Consumer behavior
2006
Firms today use information about customers to improve service and design personalized offerings. To do this successfully, however, firms must collect consumer information. This study enhances awareness about a central paradox for firms investing in personalization; namely, that consumers who value information transparency are also less likely to participate in personalization. We examine the relationship between information technology features, specifically information transparency features, and consumer willingness to share information for online personalization. Based on a survey of over 400 online consumers, we examine the question of whether customer perceived information transparency is associated with consumer willingness to be profiled online. Our results indicate that customers who desire greater information transparency are less willing to be profiled. This result poses a dilemma for firms, as the consumers that value information transparency features most are also the consumers who are less willing to be profiled online. In order to manage this dilemma, we suggest that firms adopt a strategy of providing features that address the needs of consumers who are more willing to partake in personalization, therefore accepting that the privacy sensitive minority of consumers are unwilling to participate in personalization, despite additional privacy features.
Journal Article