Open Access. Powered by Scholars. Published by Universities.®

Management Information Systems Commons

Open Access. Powered by Scholars. Published by Universities.®

PDF

Series

Privacy

Discipline
Institution
Publication Year
Publication

Articles 1 - 9 of 9

Full-Text Articles in Management Information Systems

Governing Smart Cities As Knowledge Commons - Introduction, Chapter 1 & Conclusion, Brett M. Frischmann, Michael J. Madison, Madelyn Sanfilippo Jan 2023

Governing Smart Cities As Knowledge Commons - Introduction, Chapter 1 & Conclusion, Brett M. Frischmann, Michael J. Madison, Madelyn Sanfilippo

Book Chapters

Smart city technology has its value and its place; it isn’t automatically or universally harmful. Urban challenges and opportunities addressed via smart technology demand systematic study, examining general patterns and local variations as smart city practices unfold around the world. Smart cities are complex blends of community governance institutions, social dilemmas that cities face, and dynamic relationships among information and data, technology, and human lives. Some of those blends are more typical and common. Some are more nuanced in specific contexts. This volume uses the Governing Knowledge Commons (GKC) framework to sort out relevant and important distinctions. The framework grounds …


An Evaluation Of Security In Blockchain-Based Sharing Of Student Records In Higher Education, Timothy Arndt, Angela Guercio, Yonghun Chae May 2022

An Evaluation Of Security In Blockchain-Based Sharing Of Student Records In Higher Education, Timothy Arndt, Angela Guercio, Yonghun Chae

Information Systems

Blockchain has recently taken off as a disruptive technology, from its initial use in cryptocurrencies to wider applications in areas such as property registration and insurance due to its characteristic as a distributed ledger which can remove the need for a trusted third party to facilitate transactions. This spread of the technology to new application areas has been driven by the development of smart contracts – blockchain-based protocols which can automatically enforce a contract by executing code based on the logic expressed in the contract. One exciting area for blockchain is higher education. Students in higher education are ever more …


The Impact Of Information Security Threat Awareness On Privacy-Protective Behaviors, Stanislav Mamonov, Raquel Benbunan-Fich Jun 2018

The Impact Of Information Security Threat Awareness On Privacy-Protective Behaviors, Stanislav Mamonov, Raquel Benbunan-Fich

Department of Information Management and Business Analytics Faculty Scholarship and Creative Works

In this study, we examine how to motivate computer users to protect themselves from potential security and privacy threats. We draw on the Information Processing framework which posits that threat mitigation commonly occurs before full cognitive threat assessment and we conduct an empirical study to evaluate the effects of an exposure to general information security threats on the strength of passwords and the disclosure of personal information. Through an online experiment, we compare immediate computer user reactions to potential non-individually specific security and privacy threats in an extra-organizational context. We find evidence consistent with automatic security and privacy protective actions …


The Role Of User Psychological Contracts In The Sustainability Of Social Networks, Stanislav Mamonov, Marios Koufaris, Raquel Benbunan-Fich Apr 2017

The Role Of User Psychological Contracts In The Sustainability Of Social Networks, Stanislav Mamonov, Marios Koufaris, Raquel Benbunan-Fich

Department of Information Management and Business Analytics Faculty Scholarship and Creative Works

Many emergent ventures, such as social networks, leverage crowd-sourced information assets as essential pillars supporting their business models. The appropriation of rights to information assets through legal contracts often fails to prevent conflicts between the users and the companies that claim information rights. In this paper, we focus on social networks and examine why those conflicts arise and what their consequences are by drawing on psychological contract theory. We propose that intellectual property and privacy expectancies comprise core domains of psychological contracts between social networks and their users. In turn, perceived breaches of those expectancies trigger a psychological contract violation. …


A Response To The Ais Bright Ict Initiative, Glen Sagers, Douglas P. Twitchell Jan 2016

A Response To The Ais Bright Ict Initiative, Glen Sagers, Douglas P. Twitchell

IT and Supply Chain Management Faculty Publications and Presentations

In 2015, the President of the Associate for Information Systems introduced the Bright ICT Initiative (Lee 2015), which provides a framework for improving Internet security based on four principles: origin responsibility, deliverer responsibility, rule-based digital search warrants, and traceable anonymity. We review these principles and show that at least three of these principles are at odds with the United Nation's Universal Declaration of Human Rights and the founding principles of the Internet and may actually decrease individual security. We conclude giving suggestions for developing principles more in line with human rights.


Enforcing Secure And Privacy-Preserving Information Brokering In Distributed Information Sharing, Fengjun Li, Bo Luo, Peng Liu, Dongwon Lee, Chao-Hsien Chu Jun 2013

Enforcing Secure And Privacy-Preserving Information Brokering In Distributed Information Sharing, Fengjun Li, Bo Luo, Peng Liu, Dongwon Lee, Chao-Hsien Chu

Research Collection School Of Computing and Information Systems

Today’s organizations raise an increasing need for information sharing via on-demand access. Information brokering systems (IBSs) have been proposed to connect large-scale loosely federated data sources via a brokering overlay, in which the brokers make routing decisions to direct client queries to the requested data servers. Many existing IBSs assume that brokers are trusted and thus only adopt server-side access control for data confidentiality. However, privacy of data location and data consumer can still be inferred from metadata (such as query and access control rules) exchanged within the IBS, but little attention has been put on its protection. In this …


An Integrated Social Actor And Service Oriented Architecture (Soa) Approach For Improved Electronic Health Record (Ehr) Privacy And Confidentiality In The Us National Healthcare Information Network (Nhin), Gondy Leroy, Elliot Sloane, Steven Sheetz Dec 2007

An Integrated Social Actor And Service Oriented Architecture (Soa) Approach For Improved Electronic Health Record (Ehr) Privacy And Confidentiality In The Us National Healthcare Information Network (Nhin), Gondy Leroy, Elliot Sloane, Steven Sheetz

CGU Faculty Publications and Research

The emerging US National Healthcare Information Network (NHIN) will improve healthcare’s efficacy, efficiency, and safety. The first-generation NHIN being developed has numerous advantages and limitations. One of the most difficult aspects of today’s NHIN is ensuring privacy and confidentiality for personal health data, because family and caregivers have multiple complex legal relationships to a patient. A Social Actor framework is suggested to organize and manage these legal roles, but the Social Actor framework would be very difficult to implement in today’s NHIN. Social Actor Security Management could, however, be effectively implemented using Service Oriented Architectures (SOAs), which are rapidly becoming …


Releasing Individually Identifiable Microdata With Privacy Protection Against Stochastic Threat: An Application To Health Information, Robert Garfinkel, Ram Gopal, Steven M. Thompson Feb 2007

Releasing Individually Identifiable Microdata With Privacy Protection Against Stochastic Threat: An Application To Health Information, Robert Garfinkel, Ram Gopal, Steven M. Thompson

Management Faculty Publications

The ability to collect and disseminate individually identifiable microdata is becoming increasingly important in a number of arenas. This is especially true in health care and national security, where this data is considered vital for a number of public health and safety initiatives. In some cases legislation has been used to establish some standards for limiting the collection of and access to such data. However, all such legislative efforts contain many provisions that allow for access to individually identifiable microdata without the consent of the data subject. Furthermore, although legislation is useful in that penalties are levied for violating the …


Consumers’ Attitudes Of E-Commerce In China, Hongjiang Xu, Xiaowen Zou, Hengshan Wang Jan 2006

Consumers’ Attitudes Of E-Commerce In China, Hongjiang Xu, Xiaowen Zou, Hengshan Wang

Scholarship and Professional Work - Business

This research studied the problem of B2C and C2C
consumers’ attitudes towards trust of the business
transaction process in China by using the
“Consumer Attitudes towards Trust in the e-
Business Model.” Four factors in the model were
analyzed, privacy, security, financial institution and
trusted seal. From this analysis, the conclusion on
the consumers’ attitudes was drawn.