Open Access. Powered by Scholars. Published by Universities.®

Business Commons

Open Access. Powered by Scholars. Published by Universities.®

Theses/Dissertations

Privacy

Discipline
Institution
Publication Year
Publication

Articles 1 - 30 of 30

Full-Text Articles in Business

Investigation Of Privacy Within Health Marketing, Digital Activism, And International Contexts, Alec N. Slepchuk Aug 2023

Investigation Of Privacy Within Health Marketing, Digital Activism, And International Contexts, Alec N. Slepchuk

Doctoral Dissertations

Privacy, which has a long history of academic inquiry across multiple disciplines, is critically important to modern marketing. Advances in digital information technologies have allowed marketers to provide personalized services to consumers at the cost of their privacy. However, as new technologies increase privacy tensions across all facets of life, so does the need for situational scholarship on privacy. This dissertation uses a variety of datasets, theories, and analytical methods to examine three important privacy contexts: healthcare (industry), activists (actors), and countries (nations). Essay 1 draws on justice theory to examine the role of fairness in consumers’ decision to use …


Watching The Watchmen: An Ethical Evaluation Of The Behavior Of Modern Software Applications, Joshua Graves Dec 2022

Watching The Watchmen: An Ethical Evaluation Of The Behavior Of Modern Software Applications, Joshua Graves

University Honors Program Senior Projects

Software has become a ubiquitous element of modern life around the world. An unprecedented amount of power is bestowed upon the companies that own and operate that software. The obvious question arises: “Do these companies operate in an ethical manner regarding their software?” We derive an ethical code via synthesizing the ethical codes of both the IEEE and the ACM, disregarding principles that cannot be examined by an outside observer. We utilize this ethical code to examine five leaders in the software industry, namely Facebook, Google, Microsoft, Twitter, and Amazon. For each company, we examine four incidents in which they …


Empowering Older Adults With Their Information Privacy Management, Reza Ghaiumy Anaraky Dec 2022

Empowering Older Adults With Their Information Privacy Management, Reza Ghaiumy Anaraky

All Dissertations

Literature depicts a deficit-based narrative around older adults and their technology use, suggesting that older adults are not able to keep up with their younger counterparts in adopting new technologies. In this dissertation, I argue that this view is not necessarily accurate or productive. Instead, I argue that the deficit is in the technology design, which is not inclusive and often caters to the needs of younger adults.

I study older and younger adults' privacy decision-making as a showcase. To study the privacy decision-making process with more granularity, I used a dual-route approach (decision heuristics and privacy calculus) to disentangle …


Privacy Rights Pertaining To The Developing Cyber World We Live In, Alexis Nixon Jul 2022

Privacy Rights Pertaining To The Developing Cyber World We Live In, Alexis Nixon

Graduate Scholarly Works

A large concern expressed by the general public is the right to privacy when dealing with the cyber/online sector. One major factor that influences the privacy rights of people in the cyber realm is our fourth amendment in the United States. In this paper, the focus will be on the fourth amendment, privacy rights and how these pertain to the cyber world of individuals, companies and countries. Some of the points covered in the sections below include: an explanation of the fourth amendment, influential court case pertaining to the fourth amendment, companies right to privacy/ keeping their customers data private, …


Privacy In Online Communities: How Control And Assurances Influence Intention To Disclose Personal Information, Oscar E. Lopez Arizaga Jun 2022

Privacy In Online Communities: How Control And Assurances Influence Intention To Disclose Personal Information, Oscar E. Lopez Arizaga

Doctoral Dissertations

Online Health Communities provide a rich, context-specific scenario for the study of privacy, which promises to enhance our knowledge of this complex phenomena. Online communities are only successful to the extent that individuals join and participate in the communities, and privacy concerns are a barrier to this success. In this dissertation, the privacy calculus and the agentic perspective of social cognitive theory provide the theoretical foundation for studying privacy in online communities. The first study represents a comprehensive literature review of online privacy in IS. Several research opportunities are found in the literature including limited empirical work on the roles …


Privacy Paradox: The Impact A Health Crisis Has On Individual Views Regarding Privacy And Data Collection, Jessica B. Walsh Jan 2022

Privacy Paradox: The Impact A Health Crisis Has On Individual Views Regarding Privacy And Data Collection, Jessica B. Walsh

Honors Theses and Capstones

No abstract provided.


Personal Data Privacy And Protective Federal Legislation: An Exploration Of Constituent Position On The Need For Legislation To Control Data Reliant Organizations Collecting And Monetizing Internet-Obtained Personal Data, Giovanni De Meo Aug 2021

Personal Data Privacy And Protective Federal Legislation: An Exploration Of Constituent Position On The Need For Legislation To Control Data Reliant Organizations Collecting And Monetizing Internet-Obtained Personal Data, Giovanni De Meo

Dissertations

In the past twenty years, the business of online personal data collection has grown at the same rapid pace as the internet itself, fostering a multibillion-dollar personal data collection and commercialization industry. Unlike many other large industries, there has been no major federal legislation enacted to monitor or control the activities of organizations dealing in this flourishing industry. The combination of these factors together with the lack of prior research encouraged this research designed to understand how much voters know about this topic and whether there is interest in seeing legislation enacted to protect individual personal data privacy.

To address …


Privacy Is Infringed In Plain Sight And How To Dissapear, Zachary Taylor May 2021

Privacy Is Infringed In Plain Sight And How To Dissapear, Zachary Taylor

Electronic Theses, Projects, and Dissertations

This culminating project explored how Amazon, Apple, Facebook, Google, and Microsoft infringe on their user's information privacy. Focus was on tools and techniques one can use to strengthen their information privacy. Privacy or information privacy was defined as the right to have some control over how your personal information is collected and used. This project will also introduce a verity of open-source tools and techniques that would help the unsuspected user to maintain their privacy.The questions asked were: what are some common techniques that Amazon, Apple, Facebook, Google, or Microsoft use to gain personal information?, At what cost would it …


Brave New World Reboot: Technology’S Role In Consumer Manipulation And Implications For Privacy And Transparency, Allie Mertensotto May 2021

Brave New World Reboot: Technology’S Role In Consumer Manipulation And Implications For Privacy And Transparency, Allie Mertensotto

Marketing Undergraduate Honors Theses

Most consumers are aware that our data is being obtained and collected through the use of our devices we keep in our homes or even on our person throughout the day. But, it is understated how much data is being collected. Conversations you have with your peers – in a close proximity of a device – are being used to tailor advertising. The advertisements you receive on your devices are uniquely catered to your individual person, due to the fact it consistently uses our data to produce efficient and personal ads. On the flip side, our government is also tapping …


Privacy-As-Property: A New Fundamental Approach To The Right To Privacy And The Impact This Will Have On The Law And Corporations, Sevion Dacosta Jan 2021

Privacy-As-Property: A New Fundamental Approach To The Right To Privacy And The Impact This Will Have On The Law And Corporations, Sevion Dacosta

CMC Senior Theses

The most popular conception of the right to privacy stems from Warren and Brandeis’s description of privacy as “the right to be left alone.” This theory ultimately points to a more fundamental approach to the right to privacy rooted in property rights. This fundamental approach - which I call privacy-as-property - is what I establish in this paper. I argue that the Lockean concept of property that “every man has a property in his own person” provides the foundation for the right to privacy. Privacy-as-property begins with the fundamental right to control oneself. Because of this intrinsic right, your property …


Digital Identity: A Human-Centered Risk Awareness Study, Toufic N. Chebib Nov 2020

Digital Identity: A Human-Centered Risk Awareness Study, Toufic N. Chebib

USF Tampa Graduate Theses and Dissertations

Cybersecurity threats and compromises have been at the epicenter of media attention; their risk and effect on people’s digital identity is something not to be taken lightly. Though cyber threats have affected a great number of people in all age groups, this study focuses on 55 to 75-year-olds, as this age group is close to retirement or already retired. Therefore, a notable compromise impacting their digital identity can have a major impact on their life.

To help guide this study, the following research question was formulated, “What are the risk perceptions of individuals, between the ages of 55 and 75 …


Text Messaging Between School Counselors And Students: An Exploratory Study, Nicholas R. Gilly Apr 2020

Text Messaging Between School Counselors And Students: An Exploratory Study, Nicholas R. Gilly

Graduate Theses & Dissertations

This exploratory case study examines the impact of text messaging on mentoring relationships when used as an outreach between school counselors and high school students, where established relationships are lacking. An SMS gateway was used to mediate communication between school counselors (N=2) and students (N=5) over a three-month timeframe. The SMS gateway converted email, sent from counselors, to text messages, which were received on mobile devices of students and allowed students to respond back to counselors. Findings indicate that the use of text messaging may ease scheduling of face-to-face meetings between counselors and students, but evidence does not support any …


It Security Policy Compliance: A University Perspective, Jack D. Barnes Jan 2020

It Security Policy Compliance: A University Perspective, Jack D. Barnes

Honors Theses and Capstones

No abstract provided.


Social Media, Personality, And Leadership As Predictors Of Job Performance, Timothy Charles Lisk Jan 2020

Social Media, Personality, And Leadership As Predictors Of Job Performance, Timothy Charles Lisk

CGU Theses & Dissertations

A thorough assessment of privacy concerns, reviewer bias, and applicant computer familiarity informs this longitudinal study incorporating features derived from social media, personality, leadership, traditional selection methodology, and objective measures of employee performance to build an empirical foundation for future research. To date, limited research has embarked upon an in-depth examination of the organizational implications of using social media data to assess job applicants. This dissertation addresses the question of whether social media data matters in the practical context of talent selection. I begin with a review of pertinent online communication theories, including media richness, cues filtered out, and social …


Consumers And Augmented Reality In Shopping And Services: Drivers And Consequences, Atieh Poushneh Jul 2019

Consumers And Augmented Reality In Shopping And Services: Drivers And Consequences, Atieh Poushneh

Theses and Dissertations

This dissertation investigated the effect of augmented reality on user experience and also the mediation effect of user experience in the relationship between augmented reality and the outcome variables including user satisfaction and user’s willingness to buy/user’s willingness to use augmented reality. Three studies were conducted in three different contexts, including buying consumer products, entertainment services and vehicle service use. The results indicate that augmented reality significantly and positively influence user experience, and user experience fully mediates the impact of augmented reality on user satisfaction and user’s willingness to buy/ user’s willingness to use augmented reality. Further, the results showed …


The Personalization-Privacy Paradox Explored Through A Privacy Calculus Model And Hofstede’S Model Of Cultural Dimensions, Kellen M. Schwartz Jun 2019

The Personalization-Privacy Paradox Explored Through A Privacy Calculus Model And Hofstede’S Model Of Cultural Dimensions, Kellen M. Schwartz

Honors Projects

The Personalization-Privacy Paradox is a relevant issue for companies today, as it deals with the paradox of customers who on the one hand want to keep their personal data private, but on the other hand desire the personalization benefits that can be gained by giving up that privacy. Many studies in the past have observed the Personalization-Privacy Paradox, but not thoroughly through the lens of a privacy calculus model. This paper uses a privacy calculus model to examine the Personalization-Privacy Paradox using Hofstede’s Six Dimensions of Culture and examines the United States, Germany, and China as case studies of three …


Impact Of Conditional Job Offer On Applicant Reactions To Social Media In The Selection Process, Ashley Gomez Mar 2019

Impact Of Conditional Job Offer On Applicant Reactions To Social Media In The Selection Process, Ashley Gomez

Electronic Theses, Projects, and Dissertations

Social media (SM) permits the sharing of personal information online, which can lead to employers accessing personal, non-job-related information about applicants throughout the selection process. Limited prior research (Jeske & Shultz, in press; Stoughton et al., 2015) has found that, to varying degrees, applicants find this access of their personal information to be an invasion of their personal privacy. The aim of the present study was to replicate prior findings regarding invasion of privacy moderating the relationship between SM screening presence and procedural justice perceptions and to expand on prior research by exploring whether the stage at which this information …


A Novel Framework For Social Internet Of Things: Leveraging The Friendships And The Services Exchanged Between Smart Devices, Javad Abed Jan 2019

A Novel Framework For Social Internet Of Things: Leveraging The Friendships And The Services Exchanged Between Smart Devices, Javad Abed

Theses and Dissertations

As humans, we tackle many problems in complex societies and manage the complexities of networked social systems. Cognition and sociability are two vital human capabilities that improve social life and complex social interactions. Adding these features to smart devices makes them capable of managing complex and networked Internet of Things (IoT) settings.

Cognitive and social devices can improve their relationships and connections with other devices and people to better serve human needs. Nowadays, researchers are investigating two future generations of IoT: social IoT (SIoT) and cognitive IoT (CIoT). This study develops a new framework for IoT, called CSIoT, by using …


A Multi-Objective Framework For Information Security Public Policy: The Case Of Health Informatics, Kane Smith Jan 2018

A Multi-Objective Framework For Information Security Public Policy: The Case Of Health Informatics, Kane Smith

Theses and Dissertations

Detailed holistic patient data is critical for healthcare organizations to better serve their patient populations. This information allows healthcare organizations to create a detailed and holistic record of a patient’s health. However, this large aggregation of personally identifiable patient data raises serious privacy and security concerns amongst patients. For this reason, patient concerns around the privacy and security of information retained by healthcare organizations must be addressed through the development of effective public policy. This research, therefore argues that any decision making process aimed at developing public policy dealing with patient data privacy and security concerns should not only address …


Breadcrumbs: Privacy As A Privilege, Prachi Bhardwaj Dec 2017

Breadcrumbs: Privacy As A Privilege, Prachi Bhardwaj

Capstones

Breadcrumbs: Privacy as a Privilege Abstract

By: Prachi Bhardwaj

In 2017, the world saw more data breaches than in any year prior. The count was more than the all-time high record in 2016, which was 40 percent more than the year before that.

That’s because consumer data is incredibly valuable today. In the last three decades, data storage has gone from being stored physically to being stored almost entirely digitally, which means consumer data is more accessible and applicable to business strategies. As a result, companies are gathering data in ways previously unknown to the average consumer, and hackers are …


Personal Privacy And Data Security In The Age Of The Internet, Alexandra Langone Dec 2017

Personal Privacy And Data Security In The Age Of The Internet, Alexandra Langone

Capstones

This project highlights the vulnerability of personal privacy in the age of the internet and the lack of control consumers have over their own data online. As sharing sensitive personal information with entities like social networks and major corporations becomes more and more commonplace for ordinary people, consumers are slowly waking up to the fact that they are often inadvertently giving up control over their personal information. The articles in this portfolio tackle different aspects of the dangers of online privacy, touching on the lack of regulation in the U.S. to protect consumers from companies that do not do enough …


What Is Privacy? The Threat Of Surveillance And Blackmail In The 21st Century, Harrison S. Ruprecht Jan 2017

What Is Privacy? The Threat Of Surveillance And Blackmail In The 21st Century, Harrison S. Ruprecht

Senior Independent Study Theses

In an interview published in Wired magazine on November 12, 2013, Steven Levy asked Bill Gates, in virtue of recent NSA revelations, “What is the proper balance of surveillance and security, and where do we go from here?”[1] Gates responded, “Historically, privacy was almost implicit, because it was hard to find and gather information. But in the digital world, whether it's digital cameras or satellites or just what you click on, we need to have more explicit rules - not just for governments but for private companies.”[2] In many ways Gates’ thought anticipates my project. In the pages …


Data Privacy Preservation In Collaborative Filtering Based Recommender Systems, Xiwei Wang Jan 2015

Data Privacy Preservation In Collaborative Filtering Based Recommender Systems, Xiwei Wang

Theses and Dissertations--Computer Science

This dissertation studies data privacy preservation in collaborative filtering based recommender systems and proposes several collaborative filtering models that aim at preserving user privacy from different perspectives.

The empirical study on multiple classical recommendation algorithms presents the basic idea of the models and explores their performance on real world datasets. The algorithms that are investigated in this study include a popularity based model, an item similarity based model, a singular value decomposition based model, and a bipartite graph model. Top-N recommendations are evaluated to examine the prediction accuracy.

It is apparent that with more customers' preference data, recommender systems …


Psychological Contracts In Information Exchanges, Stanislav Mamonov Feb 2014

Psychological Contracts In Information Exchanges, Stanislav Mamonov

Dissertations, Theses, and Capstone Projects

Information assets continue to grow in importance of contribution to economic activity. Many emergent businesses, including Google, Amazon and Facebook, leverage crowd-sourced information assets as essential pillars supporting their business models. The appropriation of rights to information assets is commonly done through legal contracts. In practice this approach often fails to prevent conflicts between the information contributors and the companies claiming information rights. In research presented here I attempt to understand when and why the conflicts arise. I draw on psychological contract theory and I develop the framework of psychological contracts in information exchanges. I propose that intellectual property and …


The Mechanisms Of Interpersonal Privacy In Social Networking Websites: A Study Of Subconscious Processes, Social Network Analysis, And Fear Of Social Exclusion, Bryan I. Hammer Dec 2013

The Mechanisms Of Interpersonal Privacy In Social Networking Websites: A Study Of Subconscious Processes, Social Network Analysis, And Fear Of Social Exclusion, Bryan I. Hammer

Graduate Theses and Dissertations

With increasing usage of Social networking sites like Facebook there is a need to study privacy. Previous research has placed more emphasis on outcome-oriented contexts, such as e-commerce sites. In process-oriented contexts, like Facebook, privacy has become a source of conflict for users. The majority of architectural privacy (e.g. privacy policies, website mechanisms) enables the relationship between a user and business, focusing on the institutional privacy concern and trust; however, architectural privacy mechanisms that enables relationships between and among users is lacking. This leaves users the responsibility to manage privacy for their interpersonal relationships. This research focuses on the following …


Cloud Privacy Audit Framework: A Value-Based Design, David Coss Jan 2013

Cloud Privacy Audit Framework: A Value-Based Design, David Coss

Theses and Dissertations

The rapid expansion of cloud technology provides enormous capacity, which allows for the collection, dissemination and re-identification of personal information. It is the cloud’s resource capabilities such as these that fuel the concern for privacy. The impetus of these concerns are not too far removed from those expressed by Mason in 1986, when he identified privacy as one of the biggest ethical issues facing the information age. There seems to be continuous ebb and flow relationship with respect to privacy concerns and the development of new information communication technologies such as cloud computing. Privacy issues are a concern to all …


Online Privacy Policy Of The Thirty Dow Jones Corporations: Compliance With Ftc Fair Information Practice Principles And Readability Assessment, Yuanxiang Li Jan 2012

Online Privacy Policy Of The Thirty Dow Jones Corporations: Compliance With Ftc Fair Information Practice Principles And Readability Assessment, Yuanxiang Li

Theses Digitization Project

This project conducted a statistical study of online privacy to examine how well corporations comply with FIPs and assess how easy their privacy was to read.


The Impact Of Online Influence Strategies On Consumer Response And Privacy Expectations, Jason Aaron Gabisch May 2011

The Impact Of Online Influence Strategies On Consumer Response And Privacy Expectations, Jason Aaron Gabisch

Open Access Dissertations

Identifying effective strategies for encouraging individuals to disclose their personal information on the Internet is important for marketers. In today's informationbased economy, access to consumer data is imperative for organizations in conducting marketing activities. However, the extant privacy literature has found conflicting results regarding the effectiveness of safety cues (e.g., privacy policies) and rewards (e.g., discounts) for encouraging consumers to provide their personal information to Web sites (Andrade et al. 2002). There is also scant research on the implications of compensating consumers for their information, and its subsequent impact on privacy control expectations.

This dissertation consists of two essays that …


Privacy On The Internet : Investigation Into Corporate Privacy Policy Of Australian Large Private Sector Organisations On The Internet, Keiko Sato Jan 2001

Privacy On The Internet : Investigation Into Corporate Privacy Policy Of Australian Large Private Sector Organisations On The Internet, Keiko Sato

Theses: Doctorates and Masters

The popularity of the Internet has been dramatically increased over recent years. The rapid growth of this technology and its international use has made it almost impossible to regulate the internet. As a result, the Internet has certainly provided freedoms to people and it has led to some abusing systems. Privacy is one of the major issues in the development of Electronic Commerce using the Internet. As an enormous amount of personal information is transmitted to several hosts connecting to the Internet, the information can be accessed by both authorised and unauthorised people. Although it is certain that there are …


The Death Of Privacy, Darren W. Bax Jan 2000

The Death Of Privacy, Darren W. Bax

Theses

This thesis will focus on the issue of personal privacy and the growing threat to its existence in a technological society.

The areas most associated with privacy loss include increased government intrusions, legislation, workplace, healthcare industry, Internet, and identity theft. Chapter one provides a historical perspective beginning with primitive culture and their struggle to maintain privacy in the lives. Interesting enough, privacy protection was not mentioned by the judicial system until 1880 when privacy was defined as the "right to be left alone." To address concerns about privacy reform the Supreme Court cited this right of privacy as having " …