Open Access. Powered by Scholars. Published by Universities.®

Business Commons

Open Access. Powered by Scholars. Published by Universities.®

Privacy

Discipline
Institution
Publication Year
Publication
Publication Type
File Type

Articles 31 - 60 of 136

Full-Text Articles in Business

Privateex: Privacy Preserving Exchange Of Crypto-Assets On Blockchain, Lei Xu, Lin Chen, Zhimin Gao, Keshav Kasichainula, Miguel Fernandez, Bogdan Carbunar, Weidong Shi Mar 2020

Privateex: Privacy Preserving Exchange Of Crypto-Assets On Blockchain, Lei Xu, Lin Chen, Zhimin Gao, Keshav Kasichainula, Miguel Fernandez, Bogdan Carbunar, Weidong Shi

Computer Science Faculty Publications and Presentations

Bitcoin introduces a new type of cryptocurrency that does not rely on a central system to maintain transactions. Inspired by the success of Bitcoin, all types of alt cryptocurrencies were invented in recent years. Some of the new cryptocurrencies focus on privacy enhancement, where transaction information such as value and sender/receiver identity can be hidden, such as Zcash and Monero. However, there are few schemes to support multiple types of cryptocurrencies/assets and offer privacy enhancement at the same time. The major challenge for a multiple asset system is that it needs to support two-way assets exchange between participants besides one-way …


Refocusing Loyalty Programs In The Era Of Big Data: A Societal Lens Paradigm, Valeria Stourm, Scott A. Neslin, Eric T. Bradlow, Els Breugelmans, So Yeon Chun, Pedro Gardete, P. K. Kannan, Praveen Kopalle, Young-Hoon Park, David Restrepo Amariles, Raphael Thomadsen, Yuping Liu-Thompkins, Rajkumar Venkatesan Jan 2020

Refocusing Loyalty Programs In The Era Of Big Data: A Societal Lens Paradigm, Valeria Stourm, Scott A. Neslin, Eric T. Bradlow, Els Breugelmans, So Yeon Chun, Pedro Gardete, P. K. Kannan, Praveen Kopalle, Young-Hoon Park, David Restrepo Amariles, Raphael Thomadsen, Yuping Liu-Thompkins, Rajkumar Venkatesan

Marketing Faculty Publications

Big data and technological change have enabled loyalty programs to become more prevalent and complex. How these developments influence society has been overlooked, both in academic research and in practice. We argue why this issue is important and propose a framework to refocus loyalty programs in the era of big data through a societal lens. We focus on three aspects of the societal lens-inequality, privacy, and sustainability. We discuss how loyalty programs in the big data era impact each of these societal factors, and then illustrate how, by adopting this societal lens paradigm, researchers and practitioners can generate insights and …


Social Media, Personality, And Leadership As Predictors Of Job Performance, Timothy Charles Lisk Jan 2020

Social Media, Personality, And Leadership As Predictors Of Job Performance, Timothy Charles Lisk

CGU Theses & Dissertations

A thorough assessment of privacy concerns, reviewer bias, and applicant computer familiarity informs this longitudinal study incorporating features derived from social media, personality, leadership, traditional selection methodology, and objective measures of employee performance to build an empirical foundation for future research. To date, limited research has embarked upon an in-depth examination of the organizational implications of using social media data to assess job applicants. This dissertation addresses the question of whether social media data matters in the practical context of talent selection. I begin with a review of pertinent online communication theories, including media richness, cues filtered out, and social …


It Security Policy Compliance: A University Perspective, Jack D. Barnes Jan 2020

It Security Policy Compliance: A University Perspective, Jack D. Barnes

Honors Theses and Capstones

No abstract provided.


Regulation Of Algorithmic Tools In The United States, Christopher S. Yoo, Alicia Lai Jan 2020

Regulation Of Algorithmic Tools In The United States, Christopher S. Yoo, Alicia Lai

All Faculty Scholarship

Policymakers in the United States have just begun to address regulation of artificial intelligence technologies in recent years, gaining momentum through calls for additional research funding, piece-meal guidance, proposals, and legislation at all levels of government. This Article provides an overview of high-level federal initiatives for general artificial intelligence (AI) applications set forth by the U.S. president and responding agencies, early indications from the incoming Biden Administration, targeted federal initiatives for sector-specific AI applications, pending federal legislative proposals, and state and local initiatives. The regulation of the algorithmic ecosystem will continue to evolve as the United States continues to search …


Implementing Ethics Into Artificial Intelligence: A Contribution, From A Legal Perspective, To The Development Of An Ai Governance Regime, Axel Walz, Kay Firth-Butterfield Dec 2019

Implementing Ethics Into Artificial Intelligence: A Contribution, From A Legal Perspective, To The Development Of An Ai Governance Regime, Axel Walz, Kay Firth-Butterfield

Duke Law & Technology Review

The increasing use of AI and autonomous systems will have revolutionary impacts on society. Despite many benefits, AI and autonomous systems involve considerable risks that need to be managed. Minimizing these risks will emphasize the respective benefits while at the same time protecting the ethical values defined by fundamental rights and basic constitutional principles, thereby preserving a human centric society. This Article advocates for the need to conduct in-depth risk-benefit-assessments with regard to the use of AI and autonomous systems. This Article points out major concerns in relation to AI and autonomous systems such as likely job losses, causation of …


End-Users Compliance To The Information Security Policy: A Comparison Of Motivational Factors, Peter Straver, Pascal Ravesteyn Dec 2019

End-Users Compliance To The Information Security Policy: A Comparison Of Motivational Factors, Peter Straver, Pascal Ravesteyn

Communications of the IIMA

Business information, held within information systems, is critical for most organizations. To protect these critical information assets, security controls should be deployed which might come as a hindrance for the end-users. The Information Security Policies (ISP) give direction to their behaviors. Organizations can focus on conditions likely to promote so-called motivational factors influencing the end-users intentions to perform the desired behavior of compliance to ISP in order to protect these information assets.

In total, six motivational factors, applicable to intentions on compliance, are found during research and are measured within five organizational contexts. From the measurements and analysis is learned, …


Of Promoting Networking And Protecting Privacy: Effects Of Defaults And Regulatory Focus On Social Media Users’ Preference Settings, Hichang Cho, Sungjong Roh, Byungho Park Dec 2019

Of Promoting Networking And Protecting Privacy: Effects Of Defaults And Regulatory Focus On Social Media Users’ Preference Settings, Hichang Cho, Sungjong Roh, Byungho Park

Research Collection Lee Kong Chian School Of Business

Privacy research has debated whether privacy decision-making is determined by users' stable preferences (i.e., individual traits), privacy calculus (i.e., cost-benefit analysis), or “responses on the spot” that vary across contexts. This study focuses on two factors—default setting as a contextual factor and regulatory focus as an individual difference factor—and examines the degree to which these factors affect social media users' decision-making when using privacy preference settings in a fictitious social networking site. The results, based on two experimental studies (study 1, n = 414; study 2, n = 213), show that default settings significantly affect users' privacy preferences, such that …


Law School News: Throw Out The Old Thinking 9-30-2019, Michael M. Bowden Sep 2019

Law School News: Throw Out The Old Thinking 9-30-2019, Michael M. Bowden

Life of the Law School (1993- )

No abstract provided.


Antecedents And Outcome Of Deficient Self-Regulation In Unknown Wireless Networks Use Context: An Exploratory Study, Emmanuel Wusuhon Yanibo Ayaburi, James Wairimu, Francis K. Andoh-Baidoo Jul 2019

Antecedents And Outcome Of Deficient Self-Regulation In Unknown Wireless Networks Use Context: An Exploratory Study, Emmanuel Wusuhon Yanibo Ayaburi, James Wairimu, Francis K. Andoh-Baidoo

Information Systems Faculty Publications and Presentations

Wireless networks are becoming the norm in the society, where hotspots afford users access to the internet through mobile devices. Unknown wireless networks, open public networks with unknown identity, pose threats as hackers can gain unauthorized access to users’ private information stored in their mobile devices. Despite the imminent dangers, individuals continue to use these networks. This study explicates a self-regulation theory to investigate the antecedents of deficient self-regulation (DSR) and its effects on habitual use of technology. We posit that both habit cues and information security experiential factors influence DSR, leading to habitual use of unknown wireless networks. The …


Consumers And Augmented Reality In Shopping And Services: Drivers And Consequences, Atieh Poushneh Jul 2019

Consumers And Augmented Reality In Shopping And Services: Drivers And Consequences, Atieh Poushneh

Theses and Dissertations

This dissertation investigated the effect of augmented reality on user experience and also the mediation effect of user experience in the relationship between augmented reality and the outcome variables including user satisfaction and user’s willingness to buy/user’s willingness to use augmented reality. Three studies were conducted in three different contexts, including buying consumer products, entertainment services and vehicle service use. The results indicate that augmented reality significantly and positively influence user experience, and user experience fully mediates the impact of augmented reality on user satisfaction and user’s willingness to buy/ user’s willingness to use augmented reality. Further, the results showed …


The Personalization-Privacy Paradox Explored Through A Privacy Calculus Model And Hofstede’S Model Of Cultural Dimensions, Kellen M. Schwartz Jun 2019

The Personalization-Privacy Paradox Explored Through A Privacy Calculus Model And Hofstede’S Model Of Cultural Dimensions, Kellen M. Schwartz

Honors Projects

The Personalization-Privacy Paradox is a relevant issue for companies today, as it deals with the paradox of customers who on the one hand want to keep their personal data private, but on the other hand desire the personalization benefits that can be gained by giving up that privacy. Many studies in the past have observed the Personalization-Privacy Paradox, but not thoroughly through the lens of a privacy calculus model. This paper uses a privacy calculus model to examine the Personalization-Privacy Paradox using Hofstede’s Six Dimensions of Culture and examines the United States, Germany, and China as case studies of three …


Impact Of Conditional Job Offer On Applicant Reactions To Social Media In The Selection Process, Ashley Gomez Mar 2019

Impact Of Conditional Job Offer On Applicant Reactions To Social Media In The Selection Process, Ashley Gomez

Electronic Theses, Projects, and Dissertations

Social media (SM) permits the sharing of personal information online, which can lead to employers accessing personal, non-job-related information about applicants throughout the selection process. Limited prior research (Jeske & Shultz, in press; Stoughton et al., 2015) has found that, to varying degrees, applicants find this access of their personal information to be an invasion of their personal privacy. The aim of the present study was to replicate prior findings regarding invasion of privacy moderating the relationship between SM screening presence and procedural justice perceptions and to expand on prior research by exploring whether the stage at which this information …


Individual Differences In Sensitivity To Privacy Violations Following Targeted Advertising, Sanjay Puligadda, John Ni Feb 2019

Individual Differences In Sensitivity To Privacy Violations Following Targeted Advertising, Sanjay Puligadda, John Ni

Atlantic Marketing Association Proceedings

No abstract provided.


A Novel Framework For Social Internet Of Things: Leveraging The Friendships And The Services Exchanged Between Smart Devices, Javad Abed Jan 2019

A Novel Framework For Social Internet Of Things: Leveraging The Friendships And The Services Exchanged Between Smart Devices, Javad Abed

Theses and Dissertations

As humans, we tackle many problems in complex societies and manage the complexities of networked social systems. Cognition and sociability are two vital human capabilities that improve social life and complex social interactions. Adding these features to smart devices makes them capable of managing complex and networked Internet of Things (IoT) settings.

Cognitive and social devices can improve their relationships and connections with other devices and people to better serve human needs. Nowadays, researchers are investigating two future generations of IoT: social IoT (SIoT) and cognitive IoT (CIoT). This study develops a new framework for IoT, called CSIoT, by using …


Chapter: “Health Law And Ethics”, Allison K. Hoffman, I. Glenn Cohen, William M. Sage Jan 2019

Chapter: “Health Law And Ethics”, Allison K. Hoffman, I. Glenn Cohen, William M. Sage

All Faculty Scholarship

Law and ethics are both essential attributes of a high-functioning health care system and powerful explainers of why the existing system is so difficult to improve. U.S. health law is not seamless; rather, it derives from multiple sources and is based on various theories that may be in tension with one another. There are state laws and federal laws, laws setting standards and laws providing funding, laws reinforcing professional prerogatives, laws furthering social goals, and laws promoting market competition. Complying with law is important, but health professionals also should understand that the legal and ethical constraints under which health systems …


The Impact Of Information Security Threat Awareness On Privacy-Protective Behaviors, Stanislav Mamonov, Raquel Benbunan-Fich Jun 2018

The Impact Of Information Security Threat Awareness On Privacy-Protective Behaviors, Stanislav Mamonov, Raquel Benbunan-Fich

Department of Information Management and Business Analytics Faculty Scholarship and Creative Works

In this study, we examine how to motivate computer users to protect themselves from potential security and privacy threats. We draw on the Information Processing framework which posits that threat mitigation commonly occurs before full cognitive threat assessment and we conduct an empirical study to evaluate the effects of an exposure to general information security threats on the strength of passwords and the disclosure of personal information. Through an online experiment, we compare immediate computer user reactions to potential non-individually specific security and privacy threats in an extra-organizational context. We find evidence consistent with automatic security and privacy protective actions …


Brexit’S Effect On The Uk’S Data Privacy Policy And The Eu Privacy Shield, Margaret E. Vroman, Carol Johnson Mar 2018

Brexit’S Effect On The Uk’S Data Privacy Policy And The Eu Privacy Shield, Margaret E. Vroman, Carol Johnson

Journal of Global Business Insights

Today’s business is dependent on information; information about an individual’s financial wealth, education, purchasing preferences and even health conditions. How companies treat the information, or data, they accumulate from individuals is governed by the laws in which they are incorporated and operate. Unfortunately, these laws often conflict especially when an American business is operating in Europe. This conflict led the European Commission to develop data privacy principles known as the Safe Harbor Directive, which if followed allowed US companies to store and use EU customer data. However, a lawsuit challenging the legitimacy of the Safe Harbor’s privacy protections for EU …


Americans, Marketers, And The Internet: 1999-2012, Joseph Turow, Amy Bleakley, John Bracken, Michael X. Delli Carpini, Nora A. Draper, Lauren Feldman, Nathaniel Good, Jens Grossklags, Michael Hennessy, Chris Jay Hoofnagle, Rowan Howard-Williams, Jennifer King, Su Li, Kimberly Meltzer, Deirdre K. Mulligan, Lilach Nir Jan 2018

Americans, Marketers, And The Internet: 1999-2012, Joseph Turow, Amy Bleakley, John Bracken, Michael X. Delli Carpini, Nora A. Draper, Lauren Feldman, Nathaniel Good, Jens Grossklags, Michael Hennessy, Chris Jay Hoofnagle, Rowan Howard-Williams, Jennifer King, Su Li, Kimberly Meltzer, Deirdre K. Mulligan, Lilach Nir

Chris Jay Hoofnagle

This is a collection of the reports on the Annenberg national surveys that explored Americans' knowledge and opinions about the new digital-marketing world that was becoming part of their lives. So far we’ve released seven reports on the subject, in 1999, 2000, 2003, 2005, 2009, 2010, and 2012. The reports raised or deepened a range of provocative topics that have become part of public, policy, and industry discourse. In addition to these reports, I’ve included three journal articles — from I/S, New Media & Society and the Journal of Consumer Affairs — that synthesize some of the findings and place …


An Examination Of The Impact Of Gender And Culture On Facebook Privacy And Trust In Guam, Sathasivam Mathiyalakan, George Heilman, Kevin K.W. Ho, Wai Law Jan 2018

An Examination Of The Impact Of Gender And Culture On Facebook Privacy And Trust In Guam, Sathasivam Mathiyalakan, George Heilman, Kevin K.W. Ho, Wai Law

Journal of International Technology and Information Management

Facebook, the world’s largest social network, allows users to develop a profile containing personal information. Users may choose privacy settings to control information access, but improper settings risk personal exposure. Several US studies examining gender differences in privacy management found that females have more privacy concerns. This study investigates gender differences in Facebook privacy settings among college students in Guam, a US territory whose ethnicity and culture differ from mainland US. Results show that neither gender trusts Facebook nor feels Facebook protects them. Significant differences in number and type of privacy settings indicate females are more security conscious. Gender differences …


A Multi-Objective Framework For Information Security Public Policy: The Case Of Health Informatics, Kane Smith Jan 2018

A Multi-Objective Framework For Information Security Public Policy: The Case Of Health Informatics, Kane Smith

Theses and Dissertations

Detailed holistic patient data is critical for healthcare organizations to better serve their patient populations. This information allows healthcare organizations to create a detailed and holistic record of a patient’s health. However, this large aggregation of personally identifiable patient data raises serious privacy and security concerns amongst patients. For this reason, patient concerns around the privacy and security of information retained by healthcare organizations must be addressed through the development of effective public policy. This research, therefore argues that any decision making process aimed at developing public policy dealing with patient data privacy and security concerns should not only address …


Breadcrumbs: Privacy As A Privilege, Prachi Bhardwaj Dec 2017

Breadcrumbs: Privacy As A Privilege, Prachi Bhardwaj

Capstones

Breadcrumbs: Privacy as a Privilege Abstract

By: Prachi Bhardwaj

In 2017, the world saw more data breaches than in any year prior. The count was more than the all-time high record in 2016, which was 40 percent more than the year before that.

That’s because consumer data is incredibly valuable today. In the last three decades, data storage has gone from being stored physically to being stored almost entirely digitally, which means consumer data is more accessible and applicable to business strategies. As a result, companies are gathering data in ways previously unknown to the average consumer, and hackers are …


Personal Privacy And Data Security In The Age Of The Internet, Alexandra Langone Dec 2017

Personal Privacy And Data Security In The Age Of The Internet, Alexandra Langone

Capstones

This project highlights the vulnerability of personal privacy in the age of the internet and the lack of control consumers have over their own data online. As sharing sensitive personal information with entities like social networks and major corporations becomes more and more commonplace for ordinary people, consumers are slowly waking up to the fact that they are often inadvertently giving up control over their personal information. The articles in this portfolio tackle different aspects of the dangers of online privacy, touching on the lack of regulation in the U.S. to protect consumers from companies that do not do enough …


Privacy Risks And Security Threats In Mhealth Apps, Brinda Hansraj Sampat, Bala Prabhakar Dec 2017

Privacy Risks And Security Threats In Mhealth Apps, Brinda Hansraj Sampat, Bala Prabhakar

Journal of International Technology and Information Management

mHealth (Mobile Health) applications (apps) have transformed the doctor-patient relationship. They help users with varied functionalities such as monitoring their health, understanding specific health conditions, consulting doctors online and achieving fitness goals. Whilst these apps provide an option of equitable and convenient access to healthcare, a lot of personal and sensitive data about users is collected, stored and shared to achieve these functionalities. Little is known about the privacy and security concerns these apps address. Based on literature review, this paper identifies the privacy risks and security features for evaluating thirty apps in the Medical category across two app distribution …


Use Of Smartphones For Clinical And Medical Education, Jazmine Valle, Tyler Godby, David P. Paul Iii, Harlan M. Smith Ii, Alberto Coustasse Jul 2017

Use Of Smartphones For Clinical And Medical Education, Jazmine Valle, Tyler Godby, David P. Paul Iii, Harlan M. Smith Ii, Alberto Coustasse

Management Faculty Research

Introduction: Smartphones for clinical and medical education have been on the rise and show contribution to healthcare and healthcare providers. Smartphones in healthcare facilities has been examined for utilization and efficacy, however, although the advantages are abundant some healthcare facilities and providers are reluctant to change due to threat of mixing personal apps with clinical care applications, distraction to the provider using the smartphone which has led to medication errors followed by errors linked to procedures, treatments, or tests. The purpose of this research was to examine the effects of smartphones in a clinical setting and for medical education to …


Cyber Security For Everyone: An Introductory Course For Non-Technical Majors, Marc J. Dupuis Jun 2017

Cyber Security For Everyone: An Introductory Course For Non-Technical Majors, Marc J. Dupuis

Journal of Cybersecurity Education, Research and Practice

In this paper, we describe the need for and development of an introductory cyber security course. The course was designed for non-technical majors with the goal of increasing cyber security hygiene for an important segment of the population—college undergraduates. While the need for degree programs that focus on educating and training individuals for occupations in the ever-growing cyber security field is critically important, the need for improved cyber security hygiene from the average everyday person is of equal importance. This paper discusses the approach used, curriculum developed, results from two runs of the course, and frames the overall structure of …


The Role Of User Psychological Contracts In The Sustainability Of Social Networks, Stanislav Mamonov, Marios Koufaris, Raquel Benbunan-Fich Apr 2017

The Role Of User Psychological Contracts In The Sustainability Of Social Networks, Stanislav Mamonov, Marios Koufaris, Raquel Benbunan-Fich

Department of Information Management and Business Analytics Faculty Scholarship and Creative Works

Many emergent ventures, such as social networks, leverage crowd-sourced information assets as essential pillars supporting their business models. The appropriation of rights to information assets through legal contracts often fails to prevent conflicts between the users and the companies that claim information rights. In this paper, we focus on social networks and examine why those conflicts arise and what their consequences are by drawing on psychological contract theory. We propose that intellectual property and privacy expectancies comprise core domains of psychological contracts between social networks and their users. In turn, perceived breaches of those expectancies trigger a psychological contract violation. …


What Is Privacy? The Threat Of Surveillance And Blackmail In The 21st Century, Harrison S. Ruprecht Jan 2017

What Is Privacy? The Threat Of Surveillance And Blackmail In The 21st Century, Harrison S. Ruprecht

Senior Independent Study Theses

In an interview published in Wired magazine on November 12, 2013, Steven Levy asked Bill Gates, in virtue of recent NSA revelations, “What is the proper balance of surveillance and security, and where do we go from here?”[1] Gates responded, “Historically, privacy was almost implicit, because it was hard to find and gather information. But in the digital world, whether it's digital cameras or satellites or just what you click on, we need to have more explicit rules - not just for governments but for private companies.”[2] In many ways Gates’ thought anticipates my project. In the pages …


Blown To Bits Project, David Schmidt Jan 2017

Blown To Bits Project, David Schmidt

Informatics Open Educational Resources

The book, Blown to Bits, uncovers the many ways that the new digital world has changed and is changing our whole environment. Some changes are incremental but others are more revolutionary. Some of the changes that we welcome are slowly eroding our privacy and are changing the rules of ownership. This book illuminates the complexities of these changes. I have attempted to capture the central points in selected chapters, and in some cases I have added new material or new examples to replace dated material. I picked chapters to summarize that address the following topics (and more). There are many …


Emergent Ai, Social Robots And The Law: Security, Privacy And Policy Issues, Ramesh Subramanian Jan 2017

Emergent Ai, Social Robots And The Law: Security, Privacy And Policy Issues, Ramesh Subramanian

Journal of International Technology and Information Management

The rapid growth of AI systems has implications on a wide variety of fields. It can prove to be a boon to disparate fields such as healthcare, education, global logistics and transportation, to name a few. However, these systems will also bring forth far-reaching changes in employment, economy and security. As AI systems gain acceptance and become more commonplace, certain critical questions arise: What are the legal and security ramifications of the use of these new technologies? Who can use them, and under what circumstances? What is the safety of these systems? Should their commercialization be regulated? What are the …