Search Results Heading

MBRLSearchResults

mbrl.module.common.modules.added.book.to.shelf
Title added to your shelf!
View what I already have on My Shelf.
Oops! Something went wrong.
Oops! Something went wrong.
While trying to add the title to your shelf something went wrong :( Kindly try again later!
Are you sure you want to remove the book from the shelf?
Oops! Something went wrong.
Oops! Something went wrong.
While trying to remove the title from your shelf something went wrong :( Kindly try again later!
    Done
    Filters
    Reset
  • Discipline
      Discipline
      Clear All
      Discipline
  • Is Peer Reviewed
      Is Peer Reviewed
      Clear All
      Is Peer Reviewed
  • Item Type
      Item Type
      Clear All
      Item Type
  • Subject
      Subject
      Clear All
      Subject
  • Year
      Year
      Clear All
      From:
      -
      To:
  • More Filters
      More Filters
      Clear All
      More Filters
      Source
    • Language
13,605 result(s) for "privacy behavior"
Sort by:
Experiential Transformation in Privacy Behavior: A New Framework for Privacy Behavior Enhancement
Multiple studies have demonstrated that the conventional method of learning is suboptimal when our goal is to enhance individuals’ genuine privacy behavior. This study introduces a framework for transforming privacy behavior, with the objective of enhancing individuals’ privacy practices to a higher level of confidentiality. We performed an experiment on a limited number of people to validate the efficacy of our suggested transformation framework. This framework combined determining aspects of privacy behavior with experiential behavior modification methodologies such as neutral stimuli (e.g., cognitive behavioral transformation—CBTx), practical assessments and motivational interviews from other disciplines. While these methods have proven effective in fields like psychology and sociology, they have not yet been applied to the realm of Information Computer and Technology (ICT). In this study, we have effectively demonstrated the efficacy of the proposed framework through a five-phase experiment. The suggested framework has the potential to be advantageous for educational institutions, including both public and private schools as well as universities, to construct new frameworks or develop new methodologies regarding individuals’ privacy behavior transformation to a more protective one. Furthermore, our framework offers a conducive environment for further investigation into privacy behavior transformation methodologies.
How to Influence Privacy Behavior Using Cognitive Theory and Respective Determinant Factors
Several studies have shown that the traditional way of learning is not optimal when we aim to improve ICT users’ actual privacy behaviors. In this research, we present a literature review of the theories that are followed in other fields to modify human behavior. Our findings show that cognitive theory and the health belief model present optimistic results. Further, we examined various learning methods, and we concluded that experiential learning is advantageous compared to other methods. In this paper, we aggregate the privacy behavior determinant factors found in the literature and use cognitive theory to synthesize a theoretical framework. The proposed framework can be beneficial to educational policymakers and practitioners in institutions such as public and private schools and universities. Also, our framework provides a fertile ground for more research on experiential privacy learning and privacy behavior enhancement.
A comprehensive study to the protection of digital library readers' privacy under an untrusted network environment
PurposeFirst, the authors analyze the key problems faced by the protection of digital library readers' data privacy and behavior privacy. Second, the authors introduce the characteristics of all kinds of existing approaches to privacy protection and their application limitations in the protection of readers' data privacy and behavior privacy. Lastly, the authors compare the advantages and disadvantages of each kind of existing approaches in terms of security, efficiency, accuracy and practicality and analyze the challenges faced by the protection of digital library reader privacy.Design/methodology/approachIn this paper, the authors review a number of research achievements relevant to privacy protection and analyze and evaluate the application limitations of them in the reader privacy protection of a digital library, consequently, establishing the constraints that an ideal approach to library reader privacy protection should meet, so as to provide references for the follow-up research of the problem.FindingsAs a result, the authors conclude that an ideal approach to reader privacy protection should be able to comprehensively improve the security of all kinds of readers' privacy information on the untrusted server-side as a whole, under the premise of not changing the architecture, efficiency, accuracy and practicality of a digital library system.Originality/valueAlong with the rapid development of new network technologies, such as cloud computing, the server-side of a digital library is becoming more and more untrustworthy, thereby, posing a serious threat to the privacy of library readers. In fact, the problem of reader privacy has become one of the important obstacles to the further development and application of digital libraries.
Why Would I Use Location-Protective Settings on My Smartphone? Motivating Protective Behaviors and the Existence of the Privacy Knowledge–Belief Gap
Smartphones have become essential for functioning in society, but as more personal information is accessed, transferred, or stored on smartphones, users struggle to control the release of their information via privacy settings. To enhance their privacy, individuals must be knowledgeable about their smartphone and motivated to use the device’s settings. Therefore, we explore the roles of knowledge and motivation in affecting smartphone owners’ use of settings to limit sharing of location-based information. The authors find that personal motivation is the strongest factor affecting such use, and the opinions of others do not matter. This is likely because of the personal nature of smartphones. Furthermore, privacy knowledge and individuals’ perceptions of their abilities to use privacy settings also affect this usage. However, a privacy knowledge–belief gap exists by which people with high levels of privacy knowledge utilize less restrictive privacy settings when their confidence in protecting themselves is low. The combined lack of effect from social motivation and the importance of perceived and actual privacy knowledge suggest that asking parents, teachers, or “important” others to tell individuals how to better protect themselves is unlikely to give the intended results. Instead, we need to appeal to individuals’ personal motivation and offer them training via experiential learning, such as games or educational apps. The omnipresence of smartphones means that more and more personal information is accessed, transferred, or stored on these devices. Smartphone users struggle to control the release of their information when smartphones are always connected, close at hand, and the privacy settings for individual apps are difficult to access. To have meaningful privacy in this context, individuals must be knowledgeable about their devices and truly motivated to make use of the device’s privacy settings. We draw from extant privacy literature, the self-efficacy theory, and the information–motivation–behavioral skills model to understand usage of privacy settings on smartphones through data from 334 iPhone users. Our findings indicate that personal motivation is one of the strongest determinants of utilizing privacy-protective settings, and social motivation is not significant. Furthermore, privacy knowledge and self-efficacy constructs (i.e., knowledge specific to the device’s privacy settings) determine one’s use of privacy-protective settings, but knowledge and self-efficacy about smartphone technology do not. An interaction effect also exists between privacy knowledge and privacy self-efficacy such that people with high levels of privacy knowledge utilize less restrictive privacy settings when their confidence in protecting themselves is low, but as their self-efficacy increases, they are more likely to use more privacy-protective settings. We label this the privacy knowledge–belief gap.
PRIVACY PARADOX: INTEGRATIVE LITERATURE REVIEW
ABSTRACT The so-called privacy paradox refers to individuals’ desire for privacy, which is subordinated to their willingness to trade it for the benefits of consuming a product or service, leading to a paradoxical situation. Although multiple theories attempt to explain this phenomenon, there is a lack of studies that integrate, at the construct level, the different theoretical approaches used to understand the privacy paradox. This study proposes a comprehensive view based on a literature review of 34 studies involving 14 theories that support the investigation of the privacy paradox. The review integrates studies addressing (1) the theoretical foundations of the privacy paradox, (2) the factors influencing the privacy paradox, and (3) the behavioral consequences that lead to the privacy paradox. We present an integrated theoretical framework at the construct level, allowing researchers in this field to propose new models derived from combinations of different theoretical approaches. RESUMEN La llamada paradoja de la privacidad se refiere a la situación en la que el deseo de privacidad de los individuos se subordina a su disposición a intercambiarla por los beneficios generados por el consumo de un producto o servicio, lo que lleva a una situación paradójica. Aunque múltiples teorías intentan explicar este fenómeno, faltan estudios que integren, a nivel de constructos, los diferentes enfoques teóricos utilizados para comprender la paradoja de la privacidad. Este estudio tiene como objetivo proponer una visión integral basada en una revisión de la literatura de 34 estudios que involucran 14 teorías que respaldan la investigación de la paradoja de la privacidad. La revisión integra estudios que abordan (1) los fundamentos teóricos de la paradoja de la privacidad, (2) los factores que influyen en la paradoja de la privacidad y (3) las consecuencias conductuales que llevan a la paradoja de la privacidad. Como resultado, se presenta un marco teórico integrado a nivel de constructos, que permitirá que los investigadores de este campo propongan nuevos modelos derivados de la combinación de diferentes enfoques teóricos. RESUMO O chamado paradoxo da privacidade está relacionado com o desejo de privacidade dos indivíduos subordinado a uma disposição de perdê-la por um ganho gerado pelo consumo de um produto ou serviço, levando à situação paradoxal. Apesar de haver múltiplas teorias que se propõem a explicar esse fenômeno, faltam estudos que integrem, ao nível dos construtos, as diferentes abordagens teóricas usadas para entendimento do paradoxo da privacidade. Este trabalho tem como objetivo propor uma visão abrangente, baseada na revisão da literatura de 34 estudos envolvendo 14 teorias usadas como suporte no estudo do paradoxo da privacidade. São integrados estudos que tratam (1) dos fundamentos teóricos do paradoxo da privacidade, (2) dos fatores que o influenciam e (3) das consequências comportamentais que levam ao paradoxo da privacidade. Como resultado, apresenta-se um quadro teórico integrado, ao nível dos construtos, que permitirá que os pesquisadores do tema proponham novos modelos derivados das combinações de diferentes abordagens teóricas.
Is the Privacy Paradox a Domain-Specific Phenomenon
The digital era introduces significant challenges for privacy protection, which grow constantly as technology advances. Privacy is a personal trait, and individuals may desire a different level of privacy, which is known as their “privacy concern”. To achieve privacy, the individual has to act in the digital world, taking steps that define their “privacy behavior”. It has been found that there is a gap between people’s privacy concern and their privacy behavior, a phenomenon that is called the “privacy paradox”. In this research, we investigated if the privacy paradox is domain-specific; in other words, does it vary for an individual when that person moves between different domains, for example, when using e-Health services vs. online social networks? A unique metric was developed to estimate the paradox in a way that enables comparisons, and an empirical study in which (n=437) validated participants acted in eight domains. It was found that the domain does indeed affect the magnitude of the privacy paradox. This finding has a profound significance both for understanding the privacy paradox phenomenon and for the process of developing effective means to protect privacy.
Paradoxo da privacidade: Revisão integrativa da literatura
The so-called privacy paradox refers to individuals’ desire for privacy, which is subordinated to their willingness to trade it for the benefits of consuming a product or service, leading to a paradoxical situation. Although multiple theories attempt to explain this phenomenon, there is a lack of studies that integrate, at the construct level, the different theoretical approaches used to understand the privacy paradox. This study proposes a comprehensive view based on a literature review of 34 studies involving 14 theories that support the investigation of the privacy paradox. The review integrates studies addressing (1) the theoretical foundations of the privacy paradox, (2) the factors influencing the privacy paradox, and (3) the behavioral consequences that lead to the privacy paradox. We present an integrated theoretical framework at the construct level, allowing researchers in this field to propose new models derived from combinations of different theoretical approaches.  O chamado paradoxo da privacidade está relacionado com o desejo de privacidade dos indivíduos subordinado a uma disposição de perdê-la por um ganho gerado pelo consumo de um produto ou serviço, levando à situação paradoxal. Apesar de haver múltiplas teorias que se propõem a explicar esse fenômeno, faltam estudos que integrem, ao nível dos construtos, as diferentes abordagens teóricas usadas para entendimento do paradoxo da privacidade. Este trabalho tem como objetivo propor uma visão abrangente, baseada na revisão da literatura de 34 estudos envolvendo 14 teorias usadas como suporte no estudo do paradoxo da privacidade. São integrados estudos que tratam (1) dos fundamentos teóricos do paradoxo da privacidade, (2) dos fatores que influenciam o paradoxo da privacidade e (3) das consequências comportamentais que levam ao paradoxo da privacidade. Como resultado, apresenta-se um quadro teórico integrado ao nível dos construtos, que permitirá que os pesquisadores do tema proponham novos modelos derivados das combinações de diferentes abordagens teóricas. La llamada paradoja de la privacidad se refiere a la situación en la que el deseo de privacidad de los individuos se subordina a su disposición a intercambiarla por los beneficios generados por el consumo de un producto o servicio, lo que lleva a una situación paradójica. Aunque múltiples teorías intentan explicar este fenómeno, faltan estudios que integren, a nivel de constructos, los diferentes enfoques teóricos utilizados para comprender la paradoja de la privacidad. Este estudio tiene como objetivo proponer una visión integral basada en una revisión de la literatura de 34 estudios que involucran 14 teorías que respaldan la investigación de la paradoja de la privacidad. La revisión integra estudios que abordan (1) los fundamentos teóricos de la paradoja de la privacidad, (2) los factores que influyen en la paradoja de la privacidad y (3) las consecuencias conductuales que llevan a la paradoja de la privacidad. Como resultado, se presenta un marco teórico integrado a nivel de constructos, que permitirá que los investigadores de este campo propongan nuevos modelos derivados de la combinación de diferentes enfoques teóricos.
Privacy concerns and privacy-protective behavior in synchronous online social interactions
Privacy is of prime importance to many individuals when they attempt to develop online social relationships. Nonetheless, it has been observed that individuals' behavior is at times inconsistent with their privacy concerns, e.g., they disclose substantial private information in synchronous online social interactions, even though they are aware of the risks involved. Drawing on the hyperpersonal framework and the privacy calculus perspective, this paper elucidates the interesting roles of privacy concerns and social rewards in synchronous online social interactions by examining the causes and the behavioral strategies that individuals utilize to protect their privacy. An empirical study involving 251 respondents was conducted in online chat rooms. Our results indicate that individuals utilize both self-disclosure and misrepresentation to protect their privacy and that social rewards help explain why individuals may not behave in accordance with their privacy concerns. In addition, we find that perceived anonymity of others and perceived intrusiveness affect both privacy concerns and social rewards. Our findings also suggest that higher perceived anonymity of self decreases individuals' privacy concerns, and higher perceived media richness increases social rewards. Generally, this study contributes to the information systems literature by integrating the hyperpersonal framework and the privacy calculus perspective to identify antecedents of privacy trade-off and predict individuals' behavior in synchronous online social interactions. [PUBLICATION ABSTRACT]
Twitter Users’ Privacy Behavior: A Reasoned Action Approach
Social networking sites have become a predominant means of communication across the globe. Activities on these sites generate massive amounts of personal information and raise concerns about its potential abuse. Means designed to protect the user’s privacy and prevent exploitation of confidential data often go unused. In this study, we draw on the theory of planned behavior, a reasoned action approach, to explain intentions to adopt privacy behaviors on social networking sites, with a focus on Twitter users. Consistent with the theory, an online survey of Twitter users (n = 1,060) found that instrumental and experiential attitudes and descriptive and injunctive subjective norms regarding these behaviors were direct predictors of intentions. Perceived behavioral control had a moderating effect, such that subjective norm was a better predictor of intentions for participants high as opposed to low in perceived control. We briefly discuss the implications of these results for developing theory-driven and evidence-based interventions to promote privacy behavior.
How Is Privacy Behavior Formulated? A Review of Current Research and Synthesis of Information Privacy Behavioral Factors
What influences Information Communications and Technology (ICT) users’ privacy behavior? Several studies have shown that users state to care about their personal data. Contrary to that though, they perform unsafe privacy actions, such as ignoring to configure privacy settings. In this research, we present the results of an in-depth literature review on the factors affecting privacy behavior. We seek to investigate the underlying factors that influence individuals’ privacy-conscious behavior in the digital domain, as well as effective interventions to promote such behavior. Privacy decisions regarding the disclosure of personal information may have negative consequences on individuals’ lives, such as becoming a victim of identity theft, impersonation, etc. Moreover, third parties may exploit this information for their own benefit, such as targeted advertising practices. By identifying the factors that may affect SNS users’ privacy awareness, we can assist in creating methods for effective privacy protection and/or user-centered design. Examining the results of several research studies, we found evidence that privacy behavior is affected by a variety of factors, including individual ones (e.g., demographics) and contextual ones (e.g., financial exchanges). We synthesize a framework that aggregates the scattered factors that have been found in the literature to affect privacy behavior. Our framework can be beneficial to academics and practitioners in the private and public sectors. For example, academics can utilize our findings to create specialized information privacy courses and theoretical or laboratory modules.