Open Access. Powered by Scholars. Published by Universities.®
Management Information Systems Commons™
Open Access. Powered by Scholars. Published by Universities.®
Articles 1 - 2 of 2
Full-Text Articles in Management Information Systems
The Impact Of Information Security Threat Awareness On Privacy-Protective Behaviors, Stanislav Mamonov, Raquel Benbunan-Fich
The Impact Of Information Security Threat Awareness On Privacy-Protective Behaviors, Stanislav Mamonov, Raquel Benbunan-Fich
Department of Information Management and Business Analytics Faculty Scholarship and Creative Works
In this study, we examine how to motivate computer users to protect themselves from potential security and privacy threats. We draw on the Information Processing framework which posits that threat mitigation commonly occurs before full cognitive threat assessment and we conduct an empirical study to evaluate the effects of an exposure to general information security threats on the strength of passwords and the disclosure of personal information. Through an online experiment, we compare immediate computer user reactions to potential non-individually specific security and privacy threats in an extra-organizational context. We find evidence consistent with automatic security and privacy protective actions …
The Role Of User Psychological Contracts In The Sustainability Of Social Networks, Stanislav Mamonov, Marios Koufaris, Raquel Benbunan-Fich
The Role Of User Psychological Contracts In The Sustainability Of Social Networks, Stanislav Mamonov, Marios Koufaris, Raquel Benbunan-Fich
Department of Information Management and Business Analytics Faculty Scholarship and Creative Works
Many emergent ventures, such as social networks, leverage crowd-sourced information assets as essential pillars supporting their business models. The appropriation of rights to information assets through legal contracts often fails to prevent conflicts between the users and the companies that claim information rights. In this paper, we focus on social networks and examine why those conflicts arise and what their consequences are by drawing on psychological contract theory. We propose that intellectual property and privacy expectancies comprise core domains of psychological contracts between social networks and their users. In turn, perceived breaches of those expectancies trigger a psychological contract violation. …