Data Base for Advances in Information Systems, volume 51, issue 1, pages 14-36

Information Disclosure and Privacy Paradox

Publication typeJournal Article
Publication date2020-01-21
scimago Q2
wos Q1
SJR0.706
CiteScore4.3
Impact factor2.8
ISSN00950033, 15320936
Computer Networks and Communications
Management Information Systems
Abstract

Self-disclosure of personal information is generally accepted as a security risk. Nonetheless, many individuals who are concerned about their privacy will often voluntarily reveal information to others. This inconsistency between individuals' expressed privacy concern and the willingness to divulge personal information is referred to as privacy paradox. Several arguments have been proposed to explain the inconsistency. One set of arguments centers around the possible effects of differences in personality characteristics, such as the Big Five factors. In the current article, we examine the role of one personality characteristic, impulsivity, in explaining the relationship between privacy concern and information disclosure. We report the results of a survey-based study that consisted of two hundred and forty-two (242) usable responses from subjects recruited on Amazon Mechanical Turk. The results show that one of the three dimensions of impulsivity, motor impulsivity, directly influences the extent of information disclosure and also moderates the relationship between privacy concern and information disclosure. Furthermore, our study shows impulsivity explains more variance in information disclosure than explained by the Big Five factors only.

Xu H., Dinev T., Smith J., Hart P.
2018-02-04 citations by CoLab: 379 Abstract  
Organizational information practices can result in a variety of privacy problems that can increase consumers’ concerns for information privacy. To explore the link between individuals and organizations regarding privacy, we study how institutional privacy assurances such as privacy policies and industry self-regulation can contribute to reducing individual privacy concerns. Drawing on Communication Privacy Management (CPM) theory, we develop a research model suggesting that an individual’s privacy concerns form through a cognitive process involving perceived privacy risk, privacy control, and his or her disposition to value privacy. Furthermore, individuals’ perceptions of institutional privacy assurances -namely, perceived effectiveness of privacy policies and perceived effectiveness of industry privacy self-regulation -are posited to affect the riskcontrol assessment from information disclosure, thus, being an essential component of privacy concerns. We empirically tested the research model through a survey that was administered to 823 users of four different types of websites: 1) electronic commerce sites, 2) social networking sites, 3) financial sites, and 4) healthcare sites. The results provide support for the majority of the hypothesized relationships. The study reported here is novel to the extent that existing empirical research has not explored the link between individuals’ privacy perceptions and institutional privacy assurances. We discuss implications for theory and practice and provide suggestions for future research.
Hadlington L.
Heliyon scimago Q1 wos Q1 Open Access
2017-07-05 citations by CoLab: 146 Abstract  
The present study explored the relationship between risky cybersecurity behaviours, attitudes towards cybersecurity in a business environment, Internet addiction, and impulsivity. 538 participants in part-time or full-time employment in the UK completed an online questionnaire, with responses from 515 being used in the data analysis. The survey included an attitude towards cybercrime and cybersecurity in business scale, a measure of impulsivity, Internet addiction and a 'risky' cybersecurity behaviours scale. The results demonstrated that Internet addiction was a significant predictor for risky cybersecurity behaviours. A positive attitude towards cybersecurity in business was negatively related to risky cybersecurity behaviours. Finally, the measure of impulsivity revealed that both attentional and motor impulsivity were both significant positive predictors of risky cybersecurity behaviours, with non-planning being a significant negative predictor. The results present a further step in understanding the individual differences that may govern good cybersecurity practices, highlighting the need to focus directly on more effective training and awareness mechanisms.
Han J., Kim Y.J., Kim H.
Computers and Security scimago Q1 wos Q1
2017-05-01 citations by CoLab: 77 Abstract  
Psychological contract fulfillment is integrated into ISP compliance research model.The difference between supervisor and supervisee groups was found in the integrated model.The mediating effect of psychological contract fulfillment exists in the supervisor group.Employees anticipate to comply with ISP when they recognize the benefits of ISP compliance. Organizations are trying to induce employees to comply with information security policy (ISP) as organizational damage of information breach incidents gets serious. Many previous approaches to ISP compliance have focused on security technologies. However, researchers in this area agree that technology approach is not sufficient so that other approaches such as behavioral and social are required. This study suggests the integrated research model including ISP compliance antecedents and psychological contract fulfillment. The study investigates the mediating effect of psychological contract fulfillment between perceived costs and ISP compliance intention comparing supervisor and supervisee groups. The results show that psychological contract fulfillment can mitigate the negative effect of costs on ISP compliance intention in supervisor group. Employees also anticipate complying with ISP when they recognize the benefits of ISP compliance. This study could shed more lights on the ISP compliance area by integrating and examining ISP compliance research model with psychological contract as a social factor.
Hallam C., Zanella G.
Computers in Human Behavior scimago Q1 wos Q1
2017-03-01 citations by CoLab: 172 Abstract  
Technological innovations are increasingly helping people expand their social capital through online networks by offering new opportunities for sharing personal information. Online social networks are perceived to provide individuals new benefits and have led to a surge of personal data uploaded, stored, and shared. While privacy concerns are a major issue for many users of social networking sites, studies have shown that their information disclosing behavior does not align with their concerns. This gap between behavior and concern is called the privacy paradox. Several theories have been explored to explain this, but with inconsistent and incomplete results. This study investigates the paradox using a construal level theory lens. We show how a privacy breach, not yet experienced and psychologically distant, has less weight in everyday choices than more concrete and psychologically-near social networking activities and discuss the implications for research and practice. An explanation of the information privacy paradox using Construal Level Theory.Intentions mediate the relationship between privacy concerns and self-disclosure behavior.Social Rewards predict online behavior through near-future intentions.Privacy Concerns relate to distant-future intentions, but do not directly affect the online behavior.Privacy concerns indirectly affect online behavior through near-future intentions.
Kokolakis S.
Computers and Security scimago Q1 wos Q1
2017-01-01 citations by CoLab: 681 Abstract  
Do people really care about their privacy? Surveys show that is a primary concern for citizens in the digital age. On the other hand, individuals reveal personal information for relatively small rewards, often just for drawing the attention of peers in an online social network. This inconsistency of attitudes and behaviour is often referred to as the privacy In this paper, we present the results of a review of research literature on the paradox. We analyse studies that provide evidence of a paradoxical dichotomy between attitudes and behaviour and studies that challenge the existence of such a phenomenon. The diverse research results are explained by the diversity in research methods, the different contexts and the different conceptualisations of the paradox. We also present several interpretations of the paradox, stemming from social theory, psychology, behavioural economics and, in one case, from quantum theory. We conclude that current research has improved our understanding of the paradox phenomenon. It is, however, a complex phenomenon that requires extensive further research. Thus, we call for synthetic studies to be based on comprehensive theoretical models that take into account the diversity of personal information and the diversity of concerns. We suggest that future studies should use evidence of actual behaviour rather than self-reported behaviour.
Coventry L.M., Jeske D., Blythe J.M., Turland J., Briggs P.
Frontiers in Psychology scimago Q2 wos Q2 Open Access
2016-09-07 citations by CoLab: 25 PDF Abstract  
Despite their best intentions, people struggle with the realities of privacy protection and will often sacrifice privacy for convenience in their online activities. Individuals show systematic, personality dependent differences in their privacy decision making, which makes it interesting for those who seek to design ‘nudges’ designed to manipulate privacy behaviors. We explore such effects in a cookie decision task. Two hundred and ninety participants were given an incidental website review task that masked the true aim of the study. At the task outset, they were asked whether they wanted to accept a cookie in a message that either contained a social framing ’nudge’ (they were told that either a majority or a minority of users like themselves had accepted the cookie) or contained no information about social norms (control). At the end of the task, participants were asked to complete a range of personality assessments (impulsivity, risk-taking, willingness to self-disclose and sociability). We found social framing to be an effective behavioral nudge, reducing cookie acceptance in the minority social norm condition. Further, we found personality effects such that those scoring highly on risk-taking and impulsivity were significantly more likely to accept the cookie. Finally, we found that the application of a social nudge could attenuate the personality effects of impulsivity and risk-taking. We explore the implications for those working in the privacy-by-design space.
Neupane A., Saxena N., Maximo J.O., Kana R.
2016-09-01 citations by CoLab: 18 Abstract  
The security of computer systems often relies upon decisions and actions of end users. In this paper, we set out to investigate users' susceptibility to cybercriminal attacks by concentrating at the most fundamental component governing user behavior-the human brain. We introduce a novel neuroscience-based study methodology to inform the design of user-centered security systems as it relates to cybercrime. In particular, we report on an functional magnetic resonance imaging study measuring users' security performance and underlying neural activity with respect to two critical security tasks: (1) distinguishing between a legitimate and a phishing website and (2) heeding security (malware) warnings. We identify the neural markers that might be controlling users' performance in these tasks, and establish relationships between brain activity and behavioral performance as well as between users' personality traits and security behavior. Our results provide a largely positive perspective on users' capability and performance vis-à-vis these crucial security tasks. First, we show that users exhibit significant brain activity in key regions associated with decision-making, attention, and problem-solving (phishing and malware warnings) as well as language comprehension and reading (malware warnings), which means that users are actively engaged in these security tasks. Second, we demonstrate that certain individual traits, such as impulsivity measured via an established questionnaire, are associated with a significant negative effect on brain activation in these tasks. Third, we discover a high degree of correlation in brain activity (in decision-making regions) across phishing detection and malware warnings tasks, which implies that users' behavior in one task may potentially be predicted by their behavior in the other. Fourth, we discover high functional connectivity among the core regions of the brain, while users performed the phishing detection task. Finally, we discuss the broader impacts and implications of our work on the field of user-centered security, including the domain of security education, targeted security training, and security screening.
Williams M., Nurse J.R., Creese S.
2016-08-01 citations by CoLab: 27 Abstract  
Privacy is a concept found throughout human history and opinion polls suggest that the public value this principle. However, while many individuals claim to care about privacy, they are often perceived to express behaviour to the contrary. This phenomenon is known as the Privacy Paradox and its existence has been validated through numerous psychological, economic and computer science studies. Several contributory factors have been suggested including user interface design, risk salience, social norms and default configurations. We posit that the further proliferation of the Internet-of-Things (IoT) will aggravate many of these factors, posing even greater risks to individuals' privacy. This paper explores the evolution of both the paradox and the IoT, discusses how privacy risk might alter over the coming years, and suggests further research required to address a reasonable balance. We believe both technological and socio-technical measures are necessary to ensure privacy is protected in a world of ubiquitous technology.
Wang T., Duong T.D., Chen C.C.
2016-08-01 citations by CoLab: 191 Abstract  
We apply the privacy calculus model to examine intention to disclose via mobile app.We test perceived benefit and risk as two paths of influence on disclose intention.Mobile users value benefits more than risks when offering personal information.Enhanced personalized services inspire mobile users to release privacy data.Perceived severity discourages mobile users from revealing personal privacy information. This study aimed to investigate the issue of consumer intention to disclose personal information via mobile applications (apps). Drawing on the literature of privacy calculus theory, this research examined the factors that influence the trade-off decision of receiving perceived benefits and being penalized with perceived risks through the calculus lens. In particular, two paths of the direct effects on perceived benefits and risks that induce the ultimate intention to disclose personal information via mobile apps were proposed and empirically tested. The analysis showed that self-presentation and personalized services positively influence consumers' perceived benefits, which in turn positively affects the intention to disclose personal information. Perceived severity and perceived control serve as the direct antecedents of perceived risks that negatively affect the intention of consumers to disclose personal information. Compared with the perceived risks, the perceived benefits more strongly influence the intention to disclose personal information. This study extends the literature on privacy concerns to consumer intention to disclose personal information by theoretically developing and empirically testing four hypotheses in a research model. Results were validated in the mobile context, and implications and discussions were presented.
Chakraborty R., Lee J., Bagchi-Sen S., Upadhyaya S., Raghav Rao H.
Decision Support Systems scimago Q1 wos Q1
2016-03-01 citations by CoLab: 100 Abstract  
Data breaches through hacking incidents have become a significant phenomenon in the world of online shopping. These breaches can result in loss of personal data belonging to customers. This study builds a research model to examine people's intention to engage in e-commerce in the context of a significant data breach (the Target breach in December 2013). In addition, this paper focuses on the difference in responses regarding post-breach online shopping intent among younger adults (below 55years) and older adults (senior citizens-above 55years). Our findings show the importance of internal (self) monitoring of bank transactions in reducing the effect of perceptions of severity of data breaches on post-breach online shopping intent particularly for senior citizens. The study also demonstrates that perceptions of severity of a hacking incident are significant drivers of perceived online shopping risk for both age groups. Further, perceptions of severity of a hacking incident are significant drivers of post-breach online shopping intent but only marginally significant for younger adults. Trusting beliefs in online shopping services and attitude toward e-commerce are significant for the older generation for post-breach online shopping intentions and also for younger adults. Gender is significant for seniors while it is not significant for younger adults. The impact of perceived online shopping risk on post-breach online shopping is significantly different between the two age groups. The implication of this research lies in informing shopping websites the need to prepare better plans for notifying customers about not only data breaches but also their proposed mitigation steps so as to increase trust and reduce perceived risks associated with online shopping. This paper focuses on the difference in responses regarding post-breach online shopping intent among younger adults (below 55years) and older adults (senior citizens-above 55years).Findings show the importance of internal (self) monitoring of bank transactions in reducing the effect of perceptions of severity of data breaches on post-breach online shopping intent, particularly for senior citizens.The study also demonstrates that perceptions of severity of a hacking incident are significant drivers of perceived online shopping risk for both age groups, and while they are significant drivers of post-breach online shopping intent for seniors, they are only marginally significant for younger adults.Trusting beliefs in online shopping services and attitude towards e-commerce are significant for the older generation for post-breach online shopping intentions and also for younger adults.Gender and the impact of perceived online shopping risk on post-breach online shopping are significantly different between the two age groups.
Jeske D., Shultz K.S.
Work, Employment and Society scimago Q1 wos Q1
2015-11-20 citations by CoLab: 57 Abstract  
The article considers the arguments that have been made in defence of social media screening as well as issues that arise and may effectively erode the reliability and utility of such data for employers. First, the authors consider existing legal frameworks and guidelines that are present in the UK and the USA, as well as the subsequent ethical concerns that arise when employers access and use social networking content for employment purposes. Second, several arguments in favour of the use of social networking content are made, each of which is considered from several angles, including concerns about impression management, bias and discrimination, data protection and security. Ultimately, the current state of knowledge does not provide a definite answer as to whether information from social networks is helpful in recruitment and selection.
Bansal G., Zahedi F.‘., Gefen D.
2015-11-01 citations by CoLab: 116 Abstract  
Privacy policy statements and privacy assurance cues are among the most important website features that online providers use to increase individuals’ trust and willingness to disclose private infor...
Sun Y., Wang N., Shen X., Zhang J.X.
Computers in Human Behavior scimago Q1 wos Q1
2015-11-01 citations by CoLab: 218 Abstract  
Hedonic benefits have stronger impacts on perceived benefits than utilitarian benefits.There is an interaction effect between perceived benefits and privacy risks.Males stress on utilitarian benefits while females stress on hedonic benefits.Males stress on perceived benefits while females stress on privacy risks. As the mechanisms underlying users' location information disclosure behavior under the context of location-based social network services (LBSNS) have been rarely investigated, this study builds a research model to examine the privacy calculus, benefit structure and gender differences. Specifically, hedonic benefits have stronger impacts on perceived benefits than utilitarian benefits and there is an interaction effect between perceived benefits and privacy risks. Further, utilitarian (hedonic) benefits are more influential for males (females) than for females (males) when formulating overall benefit perceptions, and perceived benefits (privacy risks) have stronger impacts on disclosure intention for males (females) than for females (males). Theoretical and practical implications are also discussed.
Chen J.V., Widjaja A.E., Yen D.C.
2015-10-22 citations by CoLab: 35 Abstract  
The purpose of this study is to explore the moderating effect of Big Five personality traits on the relationship between the predictors (need for affiliation, need for popularity, and self-esteem) and self-disclosure on Facebook. The sample of this study is 354 Facebook users from 5 different cultures in East Asia. A partial least square structural equation modeling data analysis technique was performed to analyze the moderator research framework. This study demonstrates that particular Big Five personality traits moderate each relationship. Specifically, Conscientiousness and Emotional Stability negatively moderate the relationship between need for affiliation and self-disclosure. Agreeableness negatively moderates the relationship between self-esteem and self-disclosure. Openness to New Experience negatively moderates the relationship between need for popularity and self-disclosure. The study suggests the importance of the interaction of personality variables to better understand self-disclosure phenome...
Egelman S., Peer E.
2015-02-19 citations by CoLab: 37 Abstract  
While individual differences in decision-making have been examined within the social sciences for several decades, this research has only recently begun to be applied by computer scientists to examine privacy and security attitudes (and ultimately behaviors). Specifically, several researchers have shown how different online privacy decisions are correlated with the "Big Five" personality traits. However, in our own research, we show that the five factor model is actually a weak predictor of privacy preferences and behaviors, and that other well-studied individual differences in the psychology literature are much stronger predictors. We describe the results of several experiments that showed how decision-making style and risk-taking attitudes are strong predictors of privacy attitudes, as well as a new scale that we developed to measure security behavior intentions. Finally, we show that privacy and security attitudes are correlated, but orthogonal.
Schötteler S., Meier F.J., Gengler E., Laumer S.
2025-01-28 citations by CoLab: 0 Abstract  
Professional social media (PSM) platforms, such as LinkedIn, enable professional networking. Larger network sizes on PSM are associated with benefits similar to those that result from bridging social capital. Disclosing profile information, in general, is related to increased network size. Thus, digital profiles may be useful features for shaping PSM network size. However, how profile disclosure breadth shapes network size and which profile information has the strongest effect on network size is unknown. Lastly, how gender affects the relationship between profile disclosure breadth and network size is unclear. To close these research gaps, this study applied regression analysis to 67,189 LinkedIn profiles to explore the relationship between profile disclosure breadth and network size on PSM moderated by gender. The results demonstrate that higher levels of profile disclosure breadth are associated with increased network size. Moreover, profile picture presence, profile headline length, and the number of skills listed affected network size the most. Women had smaller network sizes than men on average, indicating a gender network gap. Furthermore, while remarkable levels of profile disclosure breadth seem to benefit women more than men in terms of network size, the threshold levels required to manifest this benefit are not often achieved in practice.
Omar A., Tiwari V., Saad M.
2025-01-17 citations by CoLab: 0 Abstract  
Purpose This study aims to develop a model that explains the relationship between broad personality traits and specific aspects of smart technology acceptance among visitors to smart destinations. It incorporates privacy and safety risks as moderating factors within the Unified Theory of Acceptance and Use of Technology (UTAUT) model, thereby advancing research in this area. Design/methodology/approach The cross-sectional study collected data from 519 respondents using purposive sampling. The questionnaire was administered across two smart destinations to validate the study’s findings. Findings Performance expectancy, effort expectancy and facilitating conditions significantly influence behavioral intentions for smart technology use, emphasizing the importance of user-centric design. While social influence’s impact is modest compared to the practical benefits users gain from the technology. Privacy and safety concerns act as barriers, reducing the influence of these drivers and underscoring the need for their mitigation in technology adoption. Research limitations/implications This study enhances smart destination theory and practice by emphasizing the critical role of privacy and data security in the deployment of smart technologies. By addressing both the benefits and challenges of these technologies, it offers valuable insights into improving visitors’ overall experience and satisfaction, contributing to more effective smart tourism strategies. Originality/value The originality of this research lies in integrating the UTAUT model with risk theory by incorporating perceived privacy and safety risks as moderating factors in the context of smart destinations. This approach deepens the understanding of smart technology acceptance and offers valuable insights into the complex dynamics of technology adoption in tourism environments.
Yu L., He L., Du J., Wu X.
Information Systems Frontiers scimago Q1 wos Q1
2024-08-30 citations by CoLab: 0 Abstract  
Dealing with privacy threats and adopting appropriate strategies to manage personal information have become crucial challenges for internet users. While adaptive problem-focused coping (APFC) has been extensively discussed in the literature on information privacy, little is known about maladaptive emotion-focused coping (MEFC). This paper proposes that individuals employ privacy protection motivation (a form of APFC) and privacy cynicism (a form of MEFC), according to their threat and coping appraisals. These two coping strategies will then influence their behaviour regarding the disclosure of personal information on the internet. Offering an empirical analysis of 346 samples of survey data from China, this paper reveals that privacy cynicism, which is mainly affected by deep concerns about privacy and high self-efficacy but low response efficacy, and inconsistency between users’ motivations for protecting their privacy and their actual disclosure behavior are the reasons for the privacy paradox. This study provides crucial theoretical support and practical guidance for the privacy management of internet users’ information.
Singh N., Vishnani S., Khandelwal V., Sahoo S., Kumar S.
2024-07-04 citations by CoLab: 2 Abstract  
PurposeThis review study aims to explore the prevalent paradoxes in digital transformation (DTN) of business and provide insights on how businesses can effectively navigate them.Design/methodology/approachThe study conducts a systematic literature review, utilizing findings from a bibliometric analysis. A sample of 229 articles published in top-tier journals, retrieved from the Scopus database, is reviewed to identify nine clusters representing different sectors and paradoxes in DTN.FindingsThe review identifies and summarizes studies addressing the paradoxes that arise during DTN in various sectors. Scholars have analyzed the growing need for digital innovations and the benefits they bring, but this study aggregates high-quality research to address the gap in understanding prevalent paradoxes.Originality/valueThis study provides valuable insights into the paradoxes of DTN and offers guidance to businesses on effectively managing these challenges. It contributes to the existing literature by consolidating and presenting key research findings in this domain.
Solic K., Velki T., Bodalec D.M., Fosic I.
2024-05-20 citations by CoLab: 0
Nguyen B.H., Le H.N.
2024-03-20 citations by CoLab: 1 Abstract  
Purpose This study aims to investigate the moderating role of sociodemographic factors, specifically age and education level, in the knowledge-attitude-behavior (KAB) model concerning information security awareness (ISA) amid growing technological threats. Design/methodology/approach This study uses a survey methodology, collecting data from 400 working individuals in Vietnam, to test the applicability of the KAB model and evaluate the moderating effects of age and education on the model’s established relationships. In addition, the theoretical model and hypotheses were evaluated using the partial least squares structural equation model (PLS-SEM) approach. Findings This research confirms the relationships posited in the KAB model. Notably, it shows that younger employees showcase a more positive attitude and behavior toward information security compared with their older counterparts. In addition, higher education levels strengthen the positive association between information security knowledge and attitude. The findings underscore the imperative for organizations to consider sociodemographic variables when formulating strategies to enhance ISA. Originality/value This study extends the KAB model by exploring the impact of sociodemographic factors, focusing on age and education in ISA. Overcoming the oversight in current literature, particularly in the context of technological threats, the research uses PLS-SEM and targets a specific demographic in Vietnam.
Larson R.B.
2023-12-20 citations by CoLab: 0 Abstract  
Privacy concerns may influence many choices consumers make. However, their expressed concerns are sometimes inconsistent with their information-sharing and privacy-protecting behaviors. Many theories have been proposed to explain the paradoxical gap between privacy attitudes and behaviors. Part of the privacy paradox may be explained with two measures that have received limited consideration: impulsiveness and social desirability bias (SDB). Surveys of US adults in 2015 and 2022 included questions to measure several types of privacy concerns along with impulsive tendencies and SDB (N = 2729). Age, education, gender, race, income, and impulsive tendencies were linked with some privacy concerns. If people with above-average concerns also disclose personal information on impulse, it might explain part of the paradox. Large coefficients on the SDB measure suggest that individuals who adjust their responses to be consistent with social norms may also overstate specific privacy concerns. For these individuals, their high expressed concerns may be inconsistent with their privacy behaviors. When researchers try to explain consumer attitudes or actions that involve privacy, multiple privacy concern dimensions should be considered and demographics, impulsive tendencies, and SDB should be included in the models.
Shen C.
2023-10-07 citations by CoLab: 0 PDF Abstract  
Abstract In order to further promote listed companies to achieve high-quality development, this paper constructs an information disclosure quality assessment system in the context of the big data era. Through big data technology, information disclosure data of listed companies are collected, stored as well as exported to promote the structuring and standardization of massive data. The KNN algorithm is used to classify and organize information features and define hierarchical categories, thus obtaining a more low-dimensional subset of data features. In evaluating and deciding the indicator weights among the levels, the class weights and maximum feature values are calculated using a stratified sampling algorithm, and the evaluation system is formed according to their average values as quantitative and qualitative indicators. To verify the effectiveness of this assessment system, the analysis results show that the system divides the quality of information disclosure into five assessment criteria, and the precision and smoothness can reach about 85.6% and 83.24% on average, respectively. It can be seen that the information disclosure quality assessment system constructed based on big data technology improves the authenticity, usefulness and comparability of information disclosed by enterprises.
Shen C.
2023-09-04 citations by CoLab: 1 PDF Abstract  
Abstract In order to further promote listed companies to achieve high-quality development, this paper constructs an information disclosure quality assessment system in the context of the big data era. Through big data technology, information disclosure data of listed companies are collected, stored as well as exported to promote the structuring and standardization of massive data. The KNN algorithm is used to classify and organize information features and define hierarchical categories, thus obtaining a more low-dimensional subset of data features. In evaluating and deciding the indicator weights among the levels, the class weights and maximum feature values are calculated using a stratified sampling algorithm, and the evaluation system is formed according to their average values as quantitative and qualitative indicators. To verify the effectiveness of this assessment system, the analysis results show that the system divides the quality of information disclosure into five assessment criteria, and the precision and smoothness can reach about 85.6% and 83.24% on average, respectively. It can be seen that the information disclosure quality assessment system constructed based on big data technology improves the authenticity, usefulness and comparability of information disclosed by enterprises.
Kante M., Michel B.
2023-05-01 citations by CoLab: 6 Abstract  
Structural equation modelling (SEM) is a statistical technique used in the field of Information Systems amongst others. The technique has been paid attention thanks to its flexibility and predictive power. However, there is a paucity of guidelines in the application of the technique in the field of Behavioural Information Security. Hence, this paper aims to provide a comprehensive guide of using PLS-SEM in disclosure and privacy studies on Social Network Sites (SNSs). Data has been gathered using papers (n=21) published between 2006 and 2022 from scholarly databases such as Google Scholar, Association for Information Systems eLibrary (AISeL), IEEE Xplore and Science Direct. The Preferred Reporting Items for Systematic reviews and Meta-Analyses (PRISMA 2020) was used to analyse and synthesize the status of the field. Our systematic review covers data characteristics, reasons for using PLS-SEM, the evaluation of measurement models, the evaluation of the structural model and reporting best practices. The review proposed guidelines for the use of PLS-SEM in the discipline of Behavioural Information Security with a focus on disclosure and privacy on SNSs studies and other fields as well.
van der Schyff K., Flowerday S.
Computers and Security scimago Q1 wos Q1
2023-03-01 citations by CoLab: 11 Abstract  
Self-disclosure as influenced by perceived risks and benefits plays an important role within the context of social media use and the associated privacy risk. Some social media platforms, like Facebook (now part of Meta Platforms Inc.), provide users with elaborate means to control privacy risk. Conversely, Instagram (also part of Meta) provides users with fewer such mechanisms as a function of self-disclosure. Therefore, self-disclosure as a product of risk and benefit assessment may differ considerably as a function of the technological affordances that control such disclosure. This is particularly the case considering that such a benefit and risk assessment is further influenced by a user's trust in that provider, not to mention their proclivity for disclosing without any rational risk and benefit assessments, as is the case when disclosing as a function of fear of missing out (FoMO). Given the influence that provider trust and FoMO might have when assessing risks and benefits, this study evaluated the extent to which perceived risks and benefits mediate self-disclosure on Facebook and Instagram, in particular within the context of provider trust and FoMO. Based on an adapted version of privacy calculus, we evaluated our research model by analyzing 720 survey responses using partial least squares path modeling. Our results indicate that perceived benefits mediate the relationship between FoMO and intention to self-disclose when using Instagram, but not when using Facebook. Additionally, we found perceived benefits and perceived risks to mediate the relationship between trust in provider and intention to self-disclose for Facebook and Instagram. Surprisingly, we found no evidence to suggest that the relationship between FoMO and intention to self-disclose is mediated by perceived risks when using Facebook, with the converse being true when using Instagram. We conclude that the transitory (ephemeral) nature of some methods of self-disclosure on Instagram are used as a means to mitigate privacy risks.
Carbone E., Loewenstein G.
2022-12-09 citations by CoLab: 4
Bai S., Zhang J.
2022-12-01 citations by CoLab: 3 Abstract  
This paper explores the key issues of environmental and social governance (ESG) issues and identifies the main ESG themes for companies in the power industry: sustainable development of green and clean energy, energy conservation and emission reduction, physical and mental safety of professionals, global climate change mitigation, supply chain management, community relationships, responsible governance. In-depth research and comparison are carried out on the related issues of sustainable development. Through validation, it is shown that these issues can have further solutions on ESG issues. Compared to other industries, the number of companies working on AI clean energy has increased by about 25%. In the artificial intelligence management of exhaust emissions, it will be reduced by about 20% than before. After using artificial intelligence, the health index of employees increased by about 4% year-on-year. Enterprise management efficiency has also increased by about 6%. This also shows that in the age of artificial intelligence, everything will be improved.
Fleischhauer D., Engelstätter B., Tafreschi O.
2022-11-27 citations by CoLab: 3 Abstract  
In order to better understand the seemingly paradoxical online behavior of smartphone users, i.e. the privacy paradox, we conduct a survey study comprising 488 German university students. Our results indicate that users can be categorized into four different clusters according to their perception of benefits and risks associated with smartphone usage, i.e. ‘indifferent’, ‘benefit-oriented’, ‘ambivalent’ and ‘risk-oriented’ user groups. These clusters show statistically significant differences in terms of age, gender and smartphone usage as well as various privacy-related variables including privacy concerns, awareness for privacy threats, willingness to disclose personal information, trust towards providers of online services, and privacy protection behavior. Moreover, we identify factors that determine an individual’s propensity to employ privacy-protective responses. Our model can be used to predict users’ inclination to protect their online privacy based on the used operating system, their willingness to disclose personal information, reported privacy concerns, privacy literacy, and trust towards online companies.

Top-30

Journals

1
2
1
2

Publishers

1
2
3
4
1
2
3
4
  • We do not take into account publications without a DOI.
  • Statistics recalculated only for publications connected to researchers, organizations and labs registered on the platform.
  • Statistics recalculated weekly.

Are you a researcher?

Create a profile to get free access to personal recommendations for colleagues and new articles.
Share
Cite this
GOST | RIS | BibTex | MLA
Found error?