Open Access. Powered by Scholars. Published by Universities.®
Management Information Systems Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Communication (4)
- Social and Behavioral Sciences (4)
- Technology and Innovation (4)
- Communication Technology and New Media (3)
- Computer Engineering (3)
-
- Computer and Systems Architecture (3)
- Data Storage Systems (3)
- Digital Communications and Networking (3)
- Engineering (3)
- Information Literacy (3)
- Library and Information Science (3)
- Science and Technology Studies (3)
- Social Media (3)
- Business Intelligence (2)
- E-Commerce (2)
- Management Sciences and Quantitative Methods (2)
- Operational Research (2)
- Operations Research, Systems Engineering and Industrial Engineering (2)
- Health Information Technology (1)
- Health and Medical Administration (1)
- Medicine and Health Sciences (1)
- Telemedicine (1)
- Publication Year
Articles 1 - 13 of 13
Full-Text Articles in Management Information Systems
Icts For Surveillance And Suppression: The Case Of The Indian Emergency 1975-1977, Ramesh Subramanian
Icts For Surveillance And Suppression: The Case Of The Indian Emergency 1975-1977, Ramesh Subramanian
Journal of International Technology and Information Management
Information and Communications technologies (ICT) pervade society. The Internet, wireless communication, and social media are ubiquitous in and indispensable in society today. As they continue to grow and mushroom, there are new and increased calls from various segments of the society such as technologists, activists, sociologists, and legal experts, who issue warnings on the more nefarious and undesirable uses of ICTs, especially by governments. In fact, government control and surveillance using ICTs is not a new phenomenon. By looking at history, we are able to see several instances when ICTs have been used by governments to control, surveil, and infringe …
End-Users Compliance To The Information Security Policy: A Comparison Of Motivational Factors, Peter Straver, Pascal Ravesteyn
End-Users Compliance To The Information Security Policy: A Comparison Of Motivational Factors, Peter Straver, Pascal Ravesteyn
Communications of the IIMA
Business information, held within information systems, is critical for most organizations. To protect these critical information assets, security controls should be deployed which might come as a hindrance for the end-users. The Information Security Policies (ISP) give direction to their behaviors. Organizations can focus on conditions likely to promote so-called motivational factors influencing the end-users intentions to perform the desired behavior of compliance to ISP in order to protect these information assets.
In total, six motivational factors, applicable to intentions on compliance, are found during research and are measured within five organizational contexts. From the measurements and analysis is learned, …
An Examination Of The Impact Of Gender And Culture On Facebook Privacy And Trust In Guam, Sathasivam Mathiyalakan, George Heilman, Kevin K.W. Ho, Wai Law
An Examination Of The Impact Of Gender And Culture On Facebook Privacy And Trust In Guam, Sathasivam Mathiyalakan, George Heilman, Kevin K.W. Ho, Wai Law
Journal of International Technology and Information Management
Facebook, the world’s largest social network, allows users to develop a profile containing personal information. Users may choose privacy settings to control information access, but improper settings risk personal exposure. Several US studies examining gender differences in privacy management found that females have more privacy concerns. This study investigates gender differences in Facebook privacy settings among college students in Guam, a US territory whose ethnicity and culture differ from mainland US. Results show that neither gender trusts Facebook nor feels Facebook protects them. Significant differences in number and type of privacy settings indicate females are more security conscious. Gender differences …
Privacy Risks And Security Threats In Mhealth Apps, Brinda Hansraj Sampat, Bala Prabhakar
Privacy Risks And Security Threats In Mhealth Apps, Brinda Hansraj Sampat, Bala Prabhakar
Journal of International Technology and Information Management
mHealth (Mobile Health) applications (apps) have transformed the doctor-patient relationship. They help users with varied functionalities such as monitoring their health, understanding specific health conditions, consulting doctors online and achieving fitness goals. Whilst these apps provide an option of equitable and convenient access to healthcare, a lot of personal and sensitive data about users is collected, stored and shared to achieve these functionalities. Little is known about the privacy and security concerns these apps address. Based on literature review, this paper identifies the privacy risks and security features for evaluating thirty apps in the Medical category across two app distribution …
Privacy And The Information Age: A Longitudinal View, Charles E. Downing
Privacy And The Information Age: A Longitudinal View, Charles E. Downing
Journal of International Technology and Information Management
As information systems and data storage capacity become increasingly sophisticated, an important ethical question for organizations is “What can/will/should be done with the personal information that has been and can be collected?” Individuals’ privacy is certainly important, but so is less costly and more targeted business processes. As this conflict intensifies, consumers, managers and policy makers are left wondering: What privacy principles are important to guide organizations in self-regulation? For example, do consumers view the five rights originally stated in the European Data Protection Directive as important? Comprehensive? Is there a product discount point where consumers would forsake these principles? …
Electronic Privacy: Patient Concerns, Anza A. Akram
Electronic Privacy: Patient Concerns, Anza A. Akram
Communications of the IIMA
This study postulates issues related to electronic privacy and addresses the factors that directly effect personal electronic information. There is no positivist study done to measure patient privacy concerns using Smith et a 1(1996) privacy model and the effect of previous experience and media on these concerns. This study measures the four dimensions of patient concerns against the electronic privacy, defines as the automation of patient records, meaning that computerized patient records will be signed, modified, authenticated, stored, and retrieved via computer. The defined model uses multiple constructs with multiple indicators and thus. Partial Least Square (PLS) is applied to …
Lying About Private Information: An Ethical Justification, Sabah S. Al-Fedaghi
Lying About Private Information: An Ethical Justification, Sabah S. Al-Fedaghi
Communications of the IIMA
Lying motivated by a fear of misusing private information is a key issue in ethics with many important applications in law, business, politics, and psychology. In this paper, lying is separated according to two types of assertions: lying about non-private information and lying about private information. This distinction is applied to the case of the 'known murderer' in the context of Kant's categorical imperative. The main result of the paper is narrowing the ethical dilemma to a choice between 'a zero private information society' and 'an alTlying-about-private-information society'. We claim that privacy as a universal requirement supports lying about private …
Cracking Down On Cybercrime Global Response: The Cybercrime Convention, Sylvia Mercado Kierkegaard
Cracking Down On Cybercrime Global Response: The Cybercrime Convention, Sylvia Mercado Kierkegaard
Communications of the IIMA
Computers and the Internet have brought innumerable benefits to society. They have revolutionized the way people work, play, and communicate. In spite of the benefits the Internet has introduced to the global community, it is also fraught with risks associated with undesirable elements keen to misuse its usage. Computers and the Internet present new ways to engage in old crimes, such as fraud and piracy. They also have made it possible for criminals to perpetrate new harmful acts, like data access and interference. However, national legislations and regional agreements are not sufficient to address the global nature of cybercrime. Therefore, …
Effects Of Exchange Benefits, Security Concerns And Situational Privacy Concerns On Mobile Commerce Adoption, Hua Dai, Yan Chen
Effects Of Exchange Benefits, Security Concerns And Situational Privacy Concerns On Mobile Commerce Adoption, Hua Dai, Yan Chen
Journal of International Technology and Information Management
Few empirical studies have examined both privacy and security concerns in the context of mobile commerce (m-commerce) while accounting for the effects of situational privacy concerns specific to the context of m-commerce. This research fills this gap in research by exploring users’ exchange perceptions specific to the context of m-commerce in China and by examining the inhibitors and drives of m-commerce adoption in China from the perspectives of social exchange. Particularly, this research develops an integrated research model in which users’ perceptions on value added of and usefulness of m-commerce, and users’ privacy concerns and security concerns of m- commerce …
The Voyeur Among Us: Navigating Around The Global Spyware Epidemic, Daniel B. Garrie, Liane R. Komagome
The Voyeur Among Us: Navigating Around The Global Spyware Epidemic, Daniel B. Garrie, Liane R. Komagome
Journal of International Technology and Information Management
Spyware poses a serious threat of privacy infringement to unassuming internet users across the globe. Existing European legislation attempts to protect end-users from unethical review and use of their personal data. Outlawing spyware technology and strengthening the legal consent requirement for data- mining may offer end users additional assurances that their privacy rights are upheld, as well as more tangible shelter from the existing spyware epidemic. These proposed solutions, however, will only create successful safe havens for internet users by obtaining international buy-in.
Personal Data Collection Via The Internet: The Role Of Privacy Sensitivity And Technology Trust, Susan K. Lippert, Paul Michael Swiercz
Personal Data Collection Via The Internet: The Role Of Privacy Sensitivity And Technology Trust, Susan K. Lippert, Paul Michael Swiercz
Journal of International Technology and Information Management
Policy makers and researchers from a wide range of perspectives have expressed concern about the interplay between privacy rights and information exchanges via the Internet. Of particular interest has been the challenge of protecting sensitive personal information. In this paper, we assert that user willingness to share sensitive data is an area of critical concern and requires additional investigation. In an effort to enrich the dialogue on the question of voluntary sharing of sensitive personal data via the Internet, we present a model showcasing the relationship between personal data sharing, privacy sensitivity, and technology trust and discuss how organizations can …
Do Information Privacy Concerns Affect Students’ Feeling Of Alienation?, Joseph S. Mollick, John Michael Pearson
Do Information Privacy Concerns Affect Students’ Feeling Of Alienation?, Joseph S. Mollick, John Michael Pearson
Journal of International Technology and Information Management
Organizations such as universities collect and use personal data about customers such as students. How do students feel about their university’s practices related to the collection and use of personal data? Using data collected via a survey of 187 students at a large U.S. university, we investigate the effects of these two privacy concerns on students’ feeling of alienation. Implications of the results are discussed in light of ethics, strategy, design, control and administration of personal information management systems.
Online Privacy Policies: An Assessment Of The Fortune Global 100, Randy Ryker, M. Khurrum S. Bhutta
Online Privacy Policies: An Assessment Of The Fortune Global 100, Randy Ryker, M. Khurrum S. Bhutta
Journal of International Technology and Information Management
Both industry leaders and government officials around the globe are struggling with how to address online privacy. One solution suggested by both groups within the United States is for companies to voluntarily comply with the fair information practices of Notice, Choice, Access, and Security. A content analysis of the online privacy policies of the firms in the Fortune Global 100 was conducted to determine the extent to which the most successful global companies comply with fair information practices. The results indicate that 1.2% fully complies, 87.2% partially comply and 11.6% fail to comply with one or more fair information practice.