Open Access. Powered by Scholars. Published by Universities.®
Management Information Systems Commons™
Open Access. Powered by Scholars. Published by Universities.®
Articles 1 - 4 of 4
Full-Text Articles in Management Information Systems
Electronic Privacy: Patient Concerns, Anza A. Akram
Electronic Privacy: Patient Concerns, Anza A. Akram
Communications of the IIMA
This study postulates issues related to electronic privacy and addresses the factors that directly effect personal electronic information. There is no positivist study done to measure patient privacy concerns using Smith et a 1(1996) privacy model and the effect of previous experience and media on these concerns. This study measures the four dimensions of patient concerns against the electronic privacy, defines as the automation of patient records, meaning that computerized patient records will be signed, modified, authenticated, stored, and retrieved via computer. The defined model uses multiple constructs with multiple indicators and thus. Partial Least Square (PLS) is applied to …
Lying About Private Information: An Ethical Justification, Sabah S. Al-Fedaghi
Lying About Private Information: An Ethical Justification, Sabah S. Al-Fedaghi
Communications of the IIMA
Lying motivated by a fear of misusing private information is a key issue in ethics with many important applications in law, business, politics, and psychology. In this paper, lying is separated according to two types of assertions: lying about non-private information and lying about private information. This distinction is applied to the case of the 'known murderer' in the context of Kant's categorical imperative. The main result of the paper is narrowing the ethical dilemma to a choice between 'a zero private information society' and 'an alTlying-about-private-information society'. We claim that privacy as a universal requirement supports lying about private …
Cracking Down On Cybercrime Global Response: The Cybercrime Convention, Sylvia Mercado Kierkegaard
Cracking Down On Cybercrime Global Response: The Cybercrime Convention, Sylvia Mercado Kierkegaard
Communications of the IIMA
Computers and the Internet have brought innumerable benefits to society. They have revolutionized the way people work, play, and communicate. In spite of the benefits the Internet has introduced to the global community, it is also fraught with risks associated with undesirable elements keen to misuse its usage. Computers and the Internet present new ways to engage in old crimes, such as fraud and piracy. They also have made it possible for criminals to perpetrate new harmful acts, like data access and interference. However, national legislations and regional agreements are not sufficient to address the global nature of cybercrime. Therefore, …
Effects Of Exchange Benefits, Security Concerns And Situational Privacy Concerns On Mobile Commerce Adoption, Hua Dai, Yan Chen
Effects Of Exchange Benefits, Security Concerns And Situational Privacy Concerns On Mobile Commerce Adoption, Hua Dai, Yan Chen
Journal of International Technology and Information Management
Few empirical studies have examined both privacy and security concerns in the context of mobile commerce (m-commerce) while accounting for the effects of situational privacy concerns specific to the context of m-commerce. This research fills this gap in research by exploring users’ exchange perceptions specific to the context of m-commerce in China and by examining the inhibitors and drives of m-commerce adoption in China from the perspectives of social exchange. Particularly, this research develops an integrated research model in which users’ perceptions on value added of and usefulness of m-commerce, and users’ privacy concerns and security concerns of m- commerce …