Open Access. Powered by Scholars. Published by Universities.®

Business Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 10 of 10

Full-Text Articles in Business

Icts For Surveillance And Suppression: The Case Of The Indian Emergency 1975-1977, Ramesh Subramanian Jan 2021

Icts For Surveillance And Suppression: The Case Of The Indian Emergency 1975-1977, Ramesh Subramanian

Journal of International Technology and Information Management

Information and Communications technologies (ICT) pervade society. The Internet, wireless communication, and social media are ubiquitous in and indispensable in society today. As they continue to grow and mushroom, there are new and increased calls from various segments of the society such as technologists, activists, sociologists, and legal experts, who issue warnings on the more nefarious and undesirable uses of ICTs, especially by governments. In fact, government control and surveillance using ICTs is not a new phenomenon. By looking at history, we are able to see several instances when ICTs have been used by governments to control, surveil, and infringe …


An Examination Of The Impact Of Gender And Culture On Facebook Privacy And Trust In Guam, Sathasivam Mathiyalakan, George Heilman, Kevin K.W. Ho, Wai Law Jan 2018

An Examination Of The Impact Of Gender And Culture On Facebook Privacy And Trust In Guam, Sathasivam Mathiyalakan, George Heilman, Kevin K.W. Ho, Wai Law

Journal of International Technology and Information Management

Facebook, the world’s largest social network, allows users to develop a profile containing personal information. Users may choose privacy settings to control information access, but improper settings risk personal exposure. Several US studies examining gender differences in privacy management found that females have more privacy concerns. This study investigates gender differences in Facebook privacy settings among college students in Guam, a US territory whose ethnicity and culture differ from mainland US. Results show that neither gender trusts Facebook nor feels Facebook protects them. Significant differences in number and type of privacy settings indicate females are more security conscious. Gender differences …


Privacy Risks And Security Threats In Mhealth Apps, Brinda Hansraj Sampat, Bala Prabhakar Dec 2017

Privacy Risks And Security Threats In Mhealth Apps, Brinda Hansraj Sampat, Bala Prabhakar

Journal of International Technology and Information Management

mHealth (Mobile Health) applications (apps) have transformed the doctor-patient relationship. They help users with varied functionalities such as monitoring their health, understanding specific health conditions, consulting doctors online and achieving fitness goals. Whilst these apps provide an option of equitable and convenient access to healthcare, a lot of personal and sensitive data about users is collected, stored and shared to achieve these functionalities. Little is known about the privacy and security concerns these apps address. Based on literature review, this paper identifies the privacy risks and security features for evaluating thirty apps in the Medical category across two app distribution …


Emergent Ai, Social Robots And The Law: Security, Privacy And Policy Issues, Ramesh Subramanian Jan 2017

Emergent Ai, Social Robots And The Law: Security, Privacy And Policy Issues, Ramesh Subramanian

Journal of International Technology and Information Management

The rapid growth of AI systems has implications on a wide variety of fields. It can prove to be a boon to disparate fields such as healthcare, education, global logistics and transportation, to name a few. However, these systems will also bring forth far-reaching changes in employment, economy and security. As AI systems gain acceptance and become more commonplace, certain critical questions arise: What are the legal and security ramifications of the use of these new technologies? Who can use them, and under what circumstances? What is the safety of these systems? Should their commercialization be regulated? What are the …


Privacy And The Information Age: A Longitudinal View, Charles E. Downing Jul 2016

Privacy And The Information Age: A Longitudinal View, Charles E. Downing

Journal of International Technology and Information Management

As information systems and data storage capacity become increasingly sophisticated, an important ethical question for organizations is “What can/will/should be done with the personal information that has been and can be collected?” Individuals’ privacy is certainly important, but so is less costly and more targeted business processes. As this conflict intensifies, consumers, managers and policy makers are left wondering: What privacy principles are important to guide organizations in self-regulation? For example, do consumers view the five rights originally stated in the European Data Protection Directive as important? Comprehensive? Is there a product discount point where consumers would forsake these principles? …


Effects Of Exchange Benefits, Security Concerns And Situational Privacy Concerns On Mobile Commerce Adoption, Hua Dai, Yan Chen Jan 2015

Effects Of Exchange Benefits, Security Concerns And Situational Privacy Concerns On Mobile Commerce Adoption, Hua Dai, Yan Chen

Journal of International Technology and Information Management

Few empirical studies have examined both privacy and security concerns in the context of mobile commerce (m-commerce) while accounting for the effects of situational privacy concerns specific to the context of m-commerce. This research fills this gap in research by exploring users’ exchange perceptions specific to the context of m-commerce in China and by examining the inhibitors and drives of m-commerce adoption in China from the perspectives of social exchange. Particularly, this research develops an integrated research model in which users’ perceptions on value added of and usefulness of m-commerce, and users’ privacy concerns and security concerns of m- commerce …


The Voyeur Among Us: Navigating Around The Global Spyware Epidemic, Daniel B. Garrie, Liane R. Komagome Jan 2008

The Voyeur Among Us: Navigating Around The Global Spyware Epidemic, Daniel B. Garrie, Liane R. Komagome

Journal of International Technology and Information Management

Spyware poses a serious threat of privacy infringement to unassuming internet users across the globe. Existing European legislation attempts to protect end-users from unethical review and use of their personal data. Outlawing spyware technology and strengthening the legal consent requirement for data- mining may offer end users additional assurances that their privacy rights are upheld, as well as more tangible shelter from the existing spyware epidemic. These proposed solutions, however, will only create successful safe havens for internet users by obtaining international buy-in.


Personal Data Collection Via The Internet: The Role Of Privacy Sensitivity And Technology Trust, Susan K. Lippert, Paul Michael Swiercz Jan 2007

Personal Data Collection Via The Internet: The Role Of Privacy Sensitivity And Technology Trust, Susan K. Lippert, Paul Michael Swiercz

Journal of International Technology and Information Management

Policy makers and researchers from a wide range of perspectives have expressed concern about the interplay between privacy rights and information exchanges via the Internet. Of particular interest has been the challenge of protecting sensitive personal information. In this paper, we assert that user willingness to share sensitive data is an area of critical concern and requires additional investigation. In an effort to enrich the dialogue on the question of voluntary sharing of sensitive personal data via the Internet, we present a model showcasing the relationship between personal data sharing, privacy sensitivity, and technology trust and discuss how organizations can …


Do Information Privacy Concerns Affect Students’ Feeling Of Alienation?, Joseph S. Mollick, John Michael Pearson Jan 2006

Do Information Privacy Concerns Affect Students’ Feeling Of Alienation?, Joseph S. Mollick, John Michael Pearson

Journal of International Technology and Information Management

Organizations such as universities collect and use personal data about customers such as students. How do students feel about their university’s practices related to the collection and use of personal data? Using data collected via a survey of 187 students at a large U.S. university, we investigate the effects of these two privacy concerns on students’ feeling of alienation. Implications of the results are discussed in light of ethics, strategy, design, control and administration of personal information management systems.


Online Privacy Policies: An Assessment Of The Fortune Global 100, Randy Ryker, M. Khurrum S. Bhutta Jan 2005

Online Privacy Policies: An Assessment Of The Fortune Global 100, Randy Ryker, M. Khurrum S. Bhutta

Journal of International Technology and Information Management

Both industry leaders and government officials around the globe are struggling with how to address online privacy. One solution suggested by both groups within the United States is for companies to voluntarily comply with the fair information practices of Notice, Choice, Access, and Security. A content analysis of the online privacy policies of the firms in the Fortune Global 100 was conducted to determine the extent to which the most successful global companies comply with fair information practices. The results indicate that 1.2% fully complies, 87.2% partially comply and 11.6% fail to comply with one or more fair information practice.