Open Access. Powered by Scholars. Published by Universities.®

Management Information Systems Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 5 of 5

Full-Text Articles in Management Information Systems

Does Privacy Still Matter In The Era Of Web 2.0? A Qualitative Study Of User Behavior Towards Online Social Networking Activities, Qing Hu, Shuo Ma Oct 2013

Does Privacy Still Matter In The Era Of Web 2.0? A Qualitative Study Of User Behavior Towards Online Social Networking Activities, Qing Hu, Shuo Ma

Qing Hu

In this study, we attempt to understand one frequently observed paradox in user social networking behavior – highly concerned about privacy issues on social networking sites, yet actively participating in social networking activities. Based on qualitative analysis of student essays on their social networking activities and perceptions, we propose a theory for user online social networking behavior – the adaptive cognition theory (ACT). The main argument of the theory is that user behavior toward social networking is dynamic and adaptive primarily influenced by the perceived benefits and risks. More often than not, the perceived benefits dominate the perceived risks in …


Cloud Computing Providers And Data Security Law: Building Trust With United States Companies, Jared A. Harshbarger Esq. Nov 2011

Cloud Computing Providers And Data Security Law: Building Trust With United States Companies, Jared A. Harshbarger Esq.

Jared A. Harshbarger

Cloud computing and software-as-a-service (SaaS) models are revolutionizing the information technology industry. As these services become more prevalent, data security and privacy concerns will also rise among consumers and the companies who consider using them. Cloud computing providers must establish a sufficient level of trust with their potential customers in order to ease initial fears - and ensure certain compliance obligations will be met - at least to the extent that any such inquiring customer will feel comfortable enough to ultimately take the irreversible step of releasing their sensitive data and personal information into the cloud.


Consumers’ Attitudes Of E-Commerce In China, Hongjiang Xu, Xiaowen Zou, Hengshan Wang Apr 2011

Consumers’ Attitudes Of E-Commerce In China, Hongjiang Xu, Xiaowen Zou, Hengshan Wang

Hongjiang Xu

This research studied the problem of B2C and C2Cconsumers’ attitudes towards trust of the businesstransaction process in China by using the“Consumer Attitudes towards Trust in the e-Business Model.” Four factors in the model wereanalyzed, privacy, security, financial institution andtrusted seal. From this analysis, the conclusion onthe consumers’ attitudes was drawn.


Building Trust In Online Customers, George M. Coles, William J. Smart Jan 2011

Building Trust In Online Customers, George M. Coles, William J. Smart

George M Coles

Although significant progress has been made towards securing the Internet environment, many consumers remain reluctant to participate in making on-line purchases. Cyber- crime continues to have a negative influence upon the uptake and acceptance of E-Commerce by consumers. As a result commercial website operators are faced with the problem of overcoming user distrust in their systems. The main argument put forward in this study is that a consumer’s trust depends more upon traditional marketing strategies than it does upon their beliefs in the security of on-line systems. In many cases these issues have been overlooked by web developers and vendors …


Clinician Assessments Of Workplace Security Training - An Informatics Perspective, Juanita Fernando, Linda Dawson Dec 2007

Clinician Assessments Of Workplace Security Training - An Informatics Perspective, Juanita Fernando, Linda Dawson

Associate Professor Linda Dawson

This paper describes and analyses clinicians’ assessments of workplace privacy and security (PaS) training in the context of contemporary health information system (HIS) practice. The PaS training underpins national e-health frameworks. The paper draws on findings from a forthcoming dissertation. The ‘questerview’ technique was applied to this case study of 26 clinicians in three Victorian (Australia) public hospitals. The technique relies on data collection that applies standardised questions and questionnaires during interviews. Respondents were recorded while they completed the standardised questions and questionnaires and were encouraged to discuss their responses to items in detail. Data analysis involved the scrutiny of …