Open Access. Powered by Scholars. Published by Universities.®
Management Information Systems Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Technology and Innovation (12)
- Social and Behavioral Sciences (8)
- Computer Sciences (7)
- Physical Sciences and Mathematics (7)
- E-Commerce (6)
-
- Communication (5)
- Computer Engineering (4)
- Engineering (4)
- Information Security (4)
- Business Administration, Management, and Operations (3)
- Business Analytics (3)
- Business Intelligence (3)
- Communication Technology and New Media (3)
- Computer and Systems Architecture (3)
- Data Storage Systems (3)
- Digital Communications and Networking (3)
- Information Literacy (3)
- Law (3)
- Library and Information Science (3)
- Science and Technology Studies (3)
- Social Media (3)
- Computer Law (2)
- Databases and Information Systems (2)
- Economics (2)
- Education (2)
- Health Information Technology (2)
- Internet Law (2)
- Management Sciences and Quantitative Methods (2)
- Institution
-
- California State University, San Bernardino (13)
- Kennesaw State University (4)
- Selected Works (3)
- Montclair State University (2)
- Boise State University (1)
-
- Butler University (1)
- Claremont Colleges (1)
- Clemson University (1)
- Cleveland State University (1)
- Fort Hays State University (1)
- Singapore Management University (1)
- Southern Cross University (1)
- University of Arkansas, Fayetteville (1)
- University of Massachusetts Amherst (1)
- University of New Hampshire (1)
- University of Pittsburgh School of Law (1)
- University of Richmond (1)
- Virginia Commonwealth University (1)
- Publication Year
- Publication
-
- Journal of International Technology and Information Management (9)
- Communications of the IIMA (4)
- Journal of Cybersecurity Education, Research and Practice (3)
- Department of Information Management and Business Analytics Faculty Scholarship and Creative Works (2)
- All Dissertations (1)
-
- Book Chapters (1)
- CGU Faculty Publications and Research (1)
- Doctoral Dissertations (1)
- George M Coles (1)
- Graduate Theses and Dissertations (1)
- Hongjiang Xu (1)
- Honors Theses and Capstones (1)
- IT and Supply Chain Management Faculty Publications and Presentations (1)
- Informatics Open Educational Resources (1)
- Information Systems (1)
- Jared A. Harshbarger (1)
- Management Faculty Publications (1)
- Qing Hu (1)
- Research Collection School Of Computing and Information Systems (1)
- Scholarship and Professional Work - Business (1)
- The African Journal of Information Systems (1)
- Theses and Dissertations (1)
- Publication Type
Articles 31 - 36 of 36
Full-Text Articles in Management Information Systems
An Integrated Social Actor And Service Oriented Architecture (Soa) Approach For Improved Electronic Health Record (Ehr) Privacy And Confidentiality In The Us National Healthcare Information Network (Nhin), Gondy Leroy, Elliot Sloane, Steven Sheetz
An Integrated Social Actor And Service Oriented Architecture (Soa) Approach For Improved Electronic Health Record (Ehr) Privacy And Confidentiality In The Us National Healthcare Information Network (Nhin), Gondy Leroy, Elliot Sloane, Steven Sheetz
CGU Faculty Publications and Research
The emerging US National Healthcare Information Network (NHIN) will improve healthcare’s efficacy, efficiency, and safety. The first-generation NHIN being developed has numerous advantages and limitations. One of the most difficult aspects of today’s NHIN is ensuring privacy and confidentiality for personal health data, because family and caregivers have multiple complex legal relationships to a patient. A Social Actor framework is suggested to organize and manage these legal roles, but the Social Actor framework would be very difficult to implement in today’s NHIN. Social Actor Security Management could, however, be effectively implemented using Service Oriented Architectures (SOAs), which are rapidly becoming …
Releasing Individually Identifiable Microdata With Privacy Protection Against Stochastic Threat: An Application To Health Information, Robert Garfinkel, Ram Gopal, Steven M. Thompson
Releasing Individually Identifiable Microdata With Privacy Protection Against Stochastic Threat: An Application To Health Information, Robert Garfinkel, Ram Gopal, Steven M. Thompson
Management Faculty Publications
The ability to collect and disseminate individually identifiable microdata is becoming increasingly important in a number of arenas. This is especially true in health care and national security, where this data is considered vital for a number of public health and safety initiatives. In some cases legislation has been used to establish some standards for limiting the collection of and access to such data. However, all such legislative efforts contain many provisions that allow for access to individually identifiable microdata without the consent of the data subject. Furthermore, although legislation is useful in that penalties are levied for violating the …
Personal Data Collection Via The Internet: The Role Of Privacy Sensitivity And Technology Trust, Susan K. Lippert, Paul Michael Swiercz
Personal Data Collection Via The Internet: The Role Of Privacy Sensitivity And Technology Trust, Susan K. Lippert, Paul Michael Swiercz
Journal of International Technology and Information Management
Policy makers and researchers from a wide range of perspectives have expressed concern about the interplay between privacy rights and information exchanges via the Internet. Of particular interest has been the challenge of protecting sensitive personal information. In this paper, we assert that user willingness to share sensitive data is an area of critical concern and requires additional investigation. In an effort to enrich the dialogue on the question of voluntary sharing of sensitive personal data via the Internet, we present a model showcasing the relationship between personal data sharing, privacy sensitivity, and technology trust and discuss how organizations can …
Consumers’ Attitudes Of E-Commerce In China, Hongjiang Xu, Xiaowen Zou, Hengshan Wang
Consumers’ Attitudes Of E-Commerce In China, Hongjiang Xu, Xiaowen Zou, Hengshan Wang
Scholarship and Professional Work - Business
This research studied the problem of B2C and C2C
consumers’ attitudes towards trust of the business
transaction process in China by using the
“Consumer Attitudes towards Trust in the e-
Business Model.” Four factors in the model were
analyzed, privacy, security, financial institution and
trusted seal. From this analysis, the conclusion on
the consumers’ attitudes was drawn.
Do Information Privacy Concerns Affect Students’ Feeling Of Alienation?, Joseph S. Mollick, John Michael Pearson
Do Information Privacy Concerns Affect Students’ Feeling Of Alienation?, Joseph S. Mollick, John Michael Pearson
Journal of International Technology and Information Management
Organizations such as universities collect and use personal data about customers such as students. How do students feel about their university’s practices related to the collection and use of personal data? Using data collected via a survey of 187 students at a large U.S. university, we investigate the effects of these two privacy concerns on students’ feeling of alienation. Implications of the results are discussed in light of ethics, strategy, design, control and administration of personal information management systems.
Online Privacy Policies: An Assessment Of The Fortune Global 100, Randy Ryker, M. Khurrum S. Bhutta
Online Privacy Policies: An Assessment Of The Fortune Global 100, Randy Ryker, M. Khurrum S. Bhutta
Journal of International Technology and Information Management
Both industry leaders and government officials around the globe are struggling with how to address online privacy. One solution suggested by both groups within the United States is for companies to voluntarily comply with the fair information practices of Notice, Choice, Access, and Security. A content analysis of the online privacy policies of the firms in the Fortune Global 100 was conducted to determine the extent to which the most successful global companies comply with fair information practices. The results indicate that 1.2% fully complies, 87.2% partially comply and 11.6% fail to comply with one or more fair information practice.