Open Access. Powered by Scholars. Published by Universities.®

Management Information Systems Commons

Open Access. Powered by Scholars. Published by Universities.®

PDF

Privacy

Discipline
Institution
Publication Year
Publication
Publication Type

Articles 31 - 36 of 36

Full-Text Articles in Management Information Systems

An Integrated Social Actor And Service Oriented Architecture (Soa) Approach For Improved Electronic Health Record (Ehr) Privacy And Confidentiality In The Us National Healthcare Information Network (Nhin), Gondy Leroy, Elliot Sloane, Steven Sheetz Dec 2007

An Integrated Social Actor And Service Oriented Architecture (Soa) Approach For Improved Electronic Health Record (Ehr) Privacy And Confidentiality In The Us National Healthcare Information Network (Nhin), Gondy Leroy, Elliot Sloane, Steven Sheetz

CGU Faculty Publications and Research

The emerging US National Healthcare Information Network (NHIN) will improve healthcare’s efficacy, efficiency, and safety. The first-generation NHIN being developed has numerous advantages and limitations. One of the most difficult aspects of today’s NHIN is ensuring privacy and confidentiality for personal health data, because family and caregivers have multiple complex legal relationships to a patient. A Social Actor framework is suggested to organize and manage these legal roles, but the Social Actor framework would be very difficult to implement in today’s NHIN. Social Actor Security Management could, however, be effectively implemented using Service Oriented Architectures (SOAs), which are rapidly becoming …


Releasing Individually Identifiable Microdata With Privacy Protection Against Stochastic Threat: An Application To Health Information, Robert Garfinkel, Ram Gopal, Steven M. Thompson Feb 2007

Releasing Individually Identifiable Microdata With Privacy Protection Against Stochastic Threat: An Application To Health Information, Robert Garfinkel, Ram Gopal, Steven M. Thompson

Management Faculty Publications

The ability to collect and disseminate individually identifiable microdata is becoming increasingly important in a number of arenas. This is especially true in health care and national security, where this data is considered vital for a number of public health and safety initiatives. In some cases legislation has been used to establish some standards for limiting the collection of and access to such data. However, all such legislative efforts contain many provisions that allow for access to individually identifiable microdata without the consent of the data subject. Furthermore, although legislation is useful in that penalties are levied for violating the …


Personal Data Collection Via The Internet: The Role Of Privacy Sensitivity And Technology Trust, Susan K. Lippert, Paul Michael Swiercz Jan 2007

Personal Data Collection Via The Internet: The Role Of Privacy Sensitivity And Technology Trust, Susan K. Lippert, Paul Michael Swiercz

Journal of International Technology and Information Management

Policy makers and researchers from a wide range of perspectives have expressed concern about the interplay between privacy rights and information exchanges via the Internet. Of particular interest has been the challenge of protecting sensitive personal information. In this paper, we assert that user willingness to share sensitive data is an area of critical concern and requires additional investigation. In an effort to enrich the dialogue on the question of voluntary sharing of sensitive personal data via the Internet, we present a model showcasing the relationship between personal data sharing, privacy sensitivity, and technology trust and discuss how organizations can …


Consumers’ Attitudes Of E-Commerce In China, Hongjiang Xu, Xiaowen Zou, Hengshan Wang Jan 2006

Consumers’ Attitudes Of E-Commerce In China, Hongjiang Xu, Xiaowen Zou, Hengshan Wang

Scholarship and Professional Work - Business

This research studied the problem of B2C and C2C
consumers’ attitudes towards trust of the business
transaction process in China by using the
“Consumer Attitudes towards Trust in the e-
Business Model.” Four factors in the model were
analyzed, privacy, security, financial institution and
trusted seal. From this analysis, the conclusion on
the consumers’ attitudes was drawn.


Do Information Privacy Concerns Affect Students’ Feeling Of Alienation?, Joseph S. Mollick, John Michael Pearson Jan 2006

Do Information Privacy Concerns Affect Students’ Feeling Of Alienation?, Joseph S. Mollick, John Michael Pearson

Journal of International Technology and Information Management

Organizations such as universities collect and use personal data about customers such as students. How do students feel about their university’s practices related to the collection and use of personal data? Using data collected via a survey of 187 students at a large U.S. university, we investigate the effects of these two privacy concerns on students’ feeling of alienation. Implications of the results are discussed in light of ethics, strategy, design, control and administration of personal information management systems.


Online Privacy Policies: An Assessment Of The Fortune Global 100, Randy Ryker, M. Khurrum S. Bhutta Jan 2005

Online Privacy Policies: An Assessment Of The Fortune Global 100, Randy Ryker, M. Khurrum S. Bhutta

Journal of International Technology and Information Management

Both industry leaders and government officials around the globe are struggling with how to address online privacy. One solution suggested by both groups within the United States is for companies to voluntarily comply with the fair information practices of Notice, Choice, Access, and Security. A content analysis of the online privacy policies of the firms in the Fortune Global 100 was conducted to determine the extent to which the most successful global companies comply with fair information practices. The results indicate that 1.2% fully complies, 87.2% partially comply and 11.6% fail to comply with one or more fair information practice.