Open Access. Powered by Scholars. Published by Universities.®
Management Information Systems Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Discipline
- Institution
- Publication
- Publication Type
Articles 1 - 3 of 3
Full-Text Articles in Management Information Systems
The Mechanisms Of Interpersonal Privacy In Social Networking Websites: A Study Of Subconscious Processes, Social Network Analysis, And Fear Of Social Exclusion, Bryan I. Hammer
Graduate Theses and Dissertations
With increasing usage of Social networking sites like Facebook there is a need to study privacy. Previous research has placed more emphasis on outcome-oriented contexts, such as e-commerce sites. In process-oriented contexts, like Facebook, privacy has become a source of conflict for users. The majority of architectural privacy (e.g. privacy policies, website mechanisms) enables the relationship between a user and business, focusing on the institutional privacy concern and trust; however, architectural privacy mechanisms that enables relationships between and among users is lacking. This leaves users the responsibility to manage privacy for their interpersonal relationships. This research focuses on the following …
Does Privacy Still Matter In The Era Of Web 2.0? A Qualitative Study Of User Behavior Towards Online Social Networking Activities, Qing Hu, Shuo Ma
Does Privacy Still Matter In The Era Of Web 2.0? A Qualitative Study Of User Behavior Towards Online Social Networking Activities, Qing Hu, Shuo Ma
Qing Hu
In this study, we attempt to understand one frequently observed paradox in user social networking behavior – highly concerned about privacy issues on social networking sites, yet actively participating in social networking activities. Based on qualitative analysis of student essays on their social networking activities and perceptions, we propose a theory for user online social networking behavior – the adaptive cognition theory (ACT). The main argument of the theory is that user behavior toward social networking is dynamic and adaptive primarily influenced by the perceived benefits and risks. More often than not, the perceived benefits dominate the perceived risks in …
Enforcing Secure And Privacy-Preserving Information Brokering In Distributed Information Sharing, Fengjun Li, Bo Luo, Peng Liu, Dongwon Lee, Chao-Hsien Chu
Enforcing Secure And Privacy-Preserving Information Brokering In Distributed Information Sharing, Fengjun Li, Bo Luo, Peng Liu, Dongwon Lee, Chao-Hsien Chu
Research Collection School Of Computing and Information Systems
Today’s organizations raise an increasing need for information sharing via on-demand access. Information brokering systems (IBSs) have been proposed to connect large-scale loosely federated data sources via a brokering overlay, in which the brokers make routing decisions to direct client queries to the requested data servers. Many existing IBSs assume that brokers are trusted and thus only adopt server-side access control for data confidentiality. However, privacy of data location and data consumer can still be inferred from metadata (such as query and access control rules) exchanged within the IBS, but little attention has been put on its protection. In this …