Open Access. Powered by Scholars. Published by Universities.®

Science and Technology Studies Commons

Open Access. Powered by Scholars. Published by Universities.®

Eastern Michigan University

Privacy

Articles 1 - 2 of 2

Full-Text Articles in Science and Technology Studies

Personal Privacy: A Study To Determine Views On Privacy As It Relates To Technology Acceptance, Keith A. Wuotinen Nov 2016

Personal Privacy: A Study To Determine Views On Privacy As It Relates To Technology Acceptance, Keith A. Wuotinen

Master's Theses and Doctoral Dissertations

This descriptive correlation study sought to learn the relationships, if any, between a person’s concern for privacy and their acceptance of technology, in conjunction with the control factors of the Big Five personality factors. The study employed a modified Concern for Information Privacy (CFIP) scale and a modified Technology Acceptance Model (TAM) approach in conjunction with the Big Five personality factors using a 51-question survey.

The study surveyed students at Eastern Michigan University in Ypsilanti, Michigan, who were enrolled in the College of Technology. The results indicated that there was a significant positive relationship between the CFIP and the TAM. …


Assessment Of Users' Information Security Behavior In Smartphone Networks, Mohammadjafar Esmaeili Jun 2014

Assessment Of Users' Information Security Behavior In Smartphone Networks, Mohammadjafar Esmaeili

Master's Theses and Doctoral Dissertations

With the exponential growth of smartphone usage, providing information security has become one of the main challenges that researchers and information-security specialists must consider. In contrast to traditional mobile phones that only enable people to talk and text, smartphone networks give users a variety of convenient functions such as connection to the Internet, online shopping, e-mail and social media, data storage, global positioning systems, and many other applications. Providing security in smartphone networks is critical for the overall information security of individuals and businesses. Smartphone networks could become vulnerable to security breaches if users do not practice safe behaviors such …