首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 0 毫秒
1.
This study examined the relationship between the evaluation of risk, trust and disclosure of personal information in young peoples’ online interactions. A series of 18 focus groups were conducted with young people aged 9–19 years old. The results suggested that the majority of young people have a high level of awareness of the risks and potential outcomes associated with their online behaviour. Participants perceived disclosure of personal information to be important for the development of online relationships, and discussed associated strategies for evaluating trust and verifying identity. The study suggests that the perceived benefits associated with the disclosure of personal information and interacting with ‘strangers’ online may outweigh the perceived risks associated with these behaviours as the result of the importance of peer relationships and the exploration of identity during adolescence. Identified age-related differences and similarities in relation to the themes are explored, and areas for future research discussed.  相似文献   

2.
The buying and selling of goods and services are no longer limited to a general website or a physical store as social networks, such as Facebook or Pinterest, are heavily focusing on social commerce. Prior studies have analyzed impact of trust and culture on social commerce, design and interface aspects of it, and intention to use social commerce by general people. Our study is informed by the literature on information disclosure intention, and Communication Privacy Management theory and is motivated by the fundamental premise that intention to self-disclose in social commerce is affected by perceived ownership of information, privacy apathy, the risks and benefits of disclosure and fairness of information exchange. We analyzed data collected from 252 samples using the scenario method. The results show that shoppers’ information disclosure intention is driven by the fairness of information exchange, privacy benefits and privacy apathy.  相似文献   

3.
Privacy,trust and control: Which relationships with online self-disclosure?   总被引:1,自引:0,他引:1  
A number of studies have examined the relationship between privacy concerns, perceived control over information, trust and online self-disclosure, highlighting different points of view to understand this connection. This paper intends to compare these different models of explanation for self-disclosure behaviors in online social networks. Three different hypotheses are verified, using mediation and moderation analyses. The results allow underling the effect of the interaction between privacy concerns and trust on online self-disclosure, along with the absence of a direct influence of privacy concerns on disclosure itself. The results suggest practical implications for online social network providers, most of all with regard to privacy policies in online environments.  相似文献   

4.
The popularity of online social networking has heightened academic interest in social capital. However, few studies have investigated the role of social capital in online learning. Using exploratory and confirmatory factor analyses of data from online MIS classes, we find that online learning facilitates social capital formation mostly in terms of the dimensions of community, trust, collective action and cooperation, communication, and sociability and inclusion, depending on the media-based human interaction forms of online learning employed. Structural equation modeling confirms a causal effect of social capital on student satisfaction. Social capital is also found to positively affect learning outcomes as measured by students’ group project scores but not class scores. The study's contribution to the literature and practice are discussed.  相似文献   

5.
This article analyzes the relationships among online trust and two of its most important antecedents, namely privacy and security, and explains how consumers’ characteristics (gender, age, education and extraversion), moderate the influence of both privacy and security in online trust. This study expands previous literature by identifying the conditions under which perceived privacy and security are likely to have the greatest positive effects on consumer trust in the online retailer. Based on data from 398 online consumers, the results revealed that the influence of both privacy and security on online trust was stronger for male, younger, more educated, and less extraverted consumers. Implications for theory and management are discussed.  相似文献   

6.
Recent trust research in the information systems (IS) field has described trust as a primary predictor of technology usage and a fundamental construct for understanding user perceptions of technology. Initial trust formation is particularly relevant in an IS context, as users must overcome perceptions of risk and uncertainty before using a novel technology. With initial trust in a more complex, organizational information system, there are a number of external determinants, trusting bases, that may explain trust formation and provide organizations with the needed levers to form or change individuals’ initial trust in technology. In this study, a research model of initial trust formation is developed and includes trusting bases, trusting beliefs, trusting attitude and subjective norm, and trusting intentions. Eight trusting base factors are assessed including personality, cognitive, calculative, and both technology and organizational factors of the institutional base. The model is empirically tested with 443 subjects in the context of initial trust in a national identity system (NID). The proposed model was supported and the results indicate that subjective norm and the cognitive–reputation, calculative, and organizational situational normality base factors significantly influence initial trusting beliefs and other downstream trust constructs. Factors from some of the more commonly investigated bases, personality and technology institutional, did not significantly affect trusting beliefs. The findings have strategic implications for agencies implementing e-government systems and organizational information systems in general.  相似文献   

7.
Social media has become an attractive platform for users to exchange health information with others. However, little research has been done to identify the determinants of health information exchange. By integrating aspects of the social cognitive theory and perceived interactivity, this study proposes a research model to investigate the antecedents of health information exchange in social media. Data collected from Facebook users with health information exchange experience were used to examine the proposed model. The results demonstrate that human-to-human interaction, human-to-information interaction, outcome expectation of health self-management competence, and outcome expectation of social relationships have a significant impact on health information exchange behavior. The results also reveal that human-to-human interaction exerts a significant influence on the outcome expectation of health self-management competence and the outcome expectation of social relationships, while human-to-information interaction has a positive effect on the outcome expectation of health self-management competence. The implications for the theory and practice and future research directions are discussed.  相似文献   

8.
Trust is generally assumed to be an important precondition for people’s adoption of electronic services. This paper provides an overview of the available research into the antecedents of trust in both commercial and non-commercial online transactions and services. A literature review was conducted covering empirical studies on people’s trust in and adoption of computer-mediated services. Results are described using a framework of three clusters of antecedents: customer/client-based, website-based, and company/organization-based antecedents. Results show that there are many possible antecedents of trust in electronic services. The majority of the research has been conducted in the context of e-commerce; only few studies are available in the domains of e-government and e-health. For many antecedents, some empirical support can be found, but the results are far from univocal. The research calls for more, and particularly more systematic, research attention for the antecedents of trust in electronic services. The review presented in this paper offers practitioners an overview of possibly relevant variables that may affect people’s trust in electronic services. It also gives a state-of-the-art overview of the empirical support for the relevance of these variables.  相似文献   

9.
Research and business practice have already established the central role of trust in business, particularly in online interactions. Many online business exchanges require the disclosure of sensitive personal information on a regular basis. Simultaneously, customers are reluctant to disclose private information online due to concerns about privacy. Thus, trust plays a critical role in such disclosures. However, a number of factors could influence the extent of customers’ trust and their willingness to disclose their private information. In this study, we explore the critical roles of two sets of factors: the sensitivity of the context within which the private information is disclosed and the customer's personality. Our theory building is based on the contextualization of the theory of reasoned action (TRA-Privacy) and its synthesis with Prospect theory. Our theory argues that context sensitivity as a moderator and individuals’ salient attributes in terms of personality types and privacy concern are critical factors impacting trust and the willingness to disclose personal information. Our results indicate that context moderates the parameters and path structure of the trust model and that the influence of personality on privacy concern and trust depends on the nature of the context. Applying these “who” and “where” aspects of theory building, the study opens a new avenue of context-related research that can further increase the specificity and richness of trust and privacy research. The study also provides a new perspective in trust scholarship, therein requiring the examination of three inter-related components: trustee, trustor and the context of trust.  相似文献   

10.
Multi-player online battle arena games (MOBAs) are large virtual environments requiring complex problem-solving and social interaction. We asked whether these games generate psychologically interesting data about the players themselves. Specifically, we asked whether user names, which are chosen by players outside of the game itself, predicted in-game behaviour. To examine this, we analysed a large anonymized dataset from a popular MOBA (‘League of Legends’) – by some measures the most popular game in the world.We find that user names contain two pieces of information that correlate with in-game social behaviour. Both player age (estimated from numerical sequences within name) and the presence of highly anti-social words are correlated with the valences of player/player interactions within the game.Our findings suggest that players' real-world characteristics influence behaviour and interpersonal interactions within online games. Anonymized statistics derived from such games may therefore be a valuable tool for studying psychological traits across global populations.  相似文献   

11.
How much information is associated with a particular stimulus?   总被引:2,自引:0,他引:2  
Although the Shannon mutual information can be used to reveal general features of the neural code, it cannot directly address which symbols of the code are significant. Further insight can be gained by using information measures that are specific to particular stimuli or responses. The specific information is a previously proposed measure of the amount of information associated with a particular response; however, as I show, it does not properly characterize the amount of information associated with particular stimuli. Instead, I propose a new measure: the stimulus-specific information (SSI), defined to be the average specific information of responses given the presence of a particular stimulus. Like other information theoretic measures, the SSI does not rely on assumptions about the neural code, and is robust to non-linearities of the system. To demonstrate its applicability, the SSI is applied to data from simulated visual neurons, and identifies stimuli consistent with the neuron's linear kernel. While the SSI reveals the essential linearity of the visual neurons, it also successfully identifies the well-encoded stimuli in a modified example where linear analysis techniques fail. Thus, I demonstrate that the SSI is an appropriate measure of the information associated with particular stimuli, and provides a new unbiased method of analysing the significant stimuli of a neural code.  相似文献   

12.
Micro-blogging sites such as Twitter and its Chinese equivalent Weibo are characterized by fragmentation in information communication (FIC). Yet little is known about information comprehension in the micro-blogging context and the mechanism underlying any possible influence. Using E-Prime® to simulate information communication at Weibo, we conducted two experiments to investigate the effect of Weibo's structural features, namely, irrelevant information interference and feedback, on information comprehension. We found that participants' online information comprehension was negatively affected after browsing (reposting and passing) Weibo messages through the feedback function, and that this negative effect further extended to an offline reading task. Furthermore, meditation analysis showed that cognitive overload mediated the negative effect of reposting on information comprehension. The findings provide important insights into the influence of Internet technology on reading and learning.  相似文献   

13.
This paper reports an investigation of older adults’ needs and preferences concerning online social support. We focused our analysis on seven different aspects of online support: Self disclosure, Deep support, Light support, Community building, Information/Facts, Off topic, and Technical issues. For each aspect we were interested in how older adults perceive this aspect of support, what they think are the similarities and differences of this aspect of support in online settings vs offline settings, and what they perceive are the advantages and disadvantages of communicating this aspect of support online. We did this by conducting detailed interviews with three groups of older adults (31 people in total) with different levels of expertise in using the internet and online communication (older adults who do not use the internet, older adults who use only email, and older adults who participate in online support communities). Interviews were transcribed verbatim and analyzed. Our findings describe older adults’ perception of different aspects of support and identify their motivation for turning to online support and the reasons for any reluctance to do so. Thus, our findings give insight into how online support communities could best be utilized to improve older people’s experience with online support.  相似文献   

14.
Research in information security, risk management and investment has grown in importance over the last few years. However, without reliable estimates on attack probabilities, risk management is difficult to do in practice. Using a novel data set, we provide estimates on attack propensity and how it changes with disclosure and patching of vulnerabilities. Disclosure of software vulnerability has been controversial. On one hand are those who propose full and instant disclosure whether the patch is available or not and on the other hand are those who argue for limited or no disclosure. Which of the two policies is socially optimal depends critically on how attack frequency changes with disclosure and patching. In this paper, we empirically explore the impact of vulnerability information disclosure and availability of patches on attacks targeting the vulnerability. Our results suggest that on an average both secret (non-published) and published (published and not patched) vulnerabilities attract fewer attacks than patched (published and patched) vulnerabilities. When we control for time since publication and patches, we find that patching an already known vulnerability decreases the number of attacks, although attacks gradually increase with time after patch release. Patching an unknown vulnerability, however, causes a spike in attacks, which then gradually decline after patch release. Attacks on secret vulnerabilities slowly increase with time until the vulnerability is published and then attacks rapidly decrease with time after publication.
Rahul TelangEmail:

Ashish Arora   is Professor of Economics and Public Policy in the Heinz School. Arora’s research focuses on the economics of technology and technical change. His research interests include the study of technology-intensive industries such as software, biotechnology, and chemicals; the role of patents and licensing in promoting technology startups; and the economics of information technology. Anand Nandkumar   is a graduate student pursuing Ph.D. at the Carnegie Mellon University. His research interests include economics of information security and economics of entrepreneurship and strategy in the software industry. Rahul Telang   is an Assistant Professor of Information Systems at Carnegie Mellon University. Telang’s key research field is in economics of Information security. He has done extensive empirical and analytical work on disclosure issues surrounding software vulnerabilities, software vendor’s incentives to provide quality, mechanism designs for optimal security investments in a multi-unit firms, etc.   相似文献   

15.
The aim of this study was to test the hypothesis that the absolute number of completed behavioural change phases (ABP) and the sequentially ordered number of completed behavioural change phases (SBP) are positively associated with the use of ergonomic measures by two groups of stakeholders in bricklaying companies (employers/planners, foremen/bricklayers). The measures, consisting of trestles, bricklaying scaffolds, mast-climbing work platforms and cranes, reduce the physical work demands made upon bricklayers and bricklayers' assistants. Structured interviews were conducted with stakeholders of 27 companies. Ordinal regression of behavioural change phases on the use of ergonomic measures showed a significant increase in both ABP and SBP in relation to increased use of three of the four ergonomic measures (i.e. trestles, bricklaying scaffolds, mast-climbing work platforms) by employers/planners and increased use of one ergonomic measure (i.e. trestles) by foremen/bricklayers. In conclusion, the positive and significant associations between the completed behavioural change phases (ABP and SBP) and use of ergonomic measures differ for the stakeholder groups and between the ergonomic measures. The data suggest that there is a higher chance of increasing the use of ergonomic measures by means of a higher ABP than a higher SBP. It is recommended for activities to be carried out-primarily by employers/planners-to facilitate as many behavioural change phases as possible in order to stimulate actual use of ergonomic measures at worksites.  相似文献   

16.
Trust is paramount to developing and maintaining long-term relationships in all stages of the customer lifecycle, including the repurchase stage. This research goes beyond the simple finding documented in the extant trust literature that the effect of trust will diminish. It sheds light on the role of institutional contexts and develops a nuanced understanding of the boundary conditions under which trust operates in the repurchase stage, where knowledge-based trust becomes more predominant. Drawing on a different theoretical tenet, prospect theory, we find that customers exhibit distinctively different transaction intentions in the two perceptual conditions of high and low trust in institutional contexts. Specifically, the nonlinear relationship between trust and repeat online transaction intention is inverted U-shaped curvilinear when trust in institutional contexts is high, but is U-shaped when trust in institutional contexts is low. With data collected from both e-commerce and mobile banking contexts using two different measures of institutional contexts, we employed a new and advanced latent moderated structural (LMS) equations approach for analysis and provided robust results. Our findings largely confirm the hypotheses and offer theoretical, methodological, and practical implications.  相似文献   

17.
Many organisations create, store, or purchase information that links individuals’ identities to other data. Termed personally identifiable information (PII), this information has become the lifeblood of many firms across the globe. As organisations accumulate their constituencies’ PII (e.g. customers’, students’, patients’, and employees’ data), individuals’ privacy will depend on the adequacy of organisations’ information privacy safeguards. Despite existing protections, many breaches still occur. For example, US organisations reported around 4,500 PII-breach events between 2005 and 2015. With such a high number of breaches, determining all threats to PII within organisations proves a burdensome task. In light of this difficulty, we utilise text-mining and cluster analysis techniques to create a taxonomy of various organisational PII breaches, which will help drive targeted research towards organisational PII protection. From an organisational systematics perspective, our classification system provides a foundation to explain the diversity among the myriad of threats. We identify eight major PII-breach types and provide initial literature reviews for each type of breach. We detail how US organisations differ regarding their exposure to these breaches, as well as how the level of severity (i.e. number of records affected) differs among these PII breaches. Finally, we offer several paths for future research.  相似文献   

18.
The aim of this research was to investigate age differences and similarities in the use of the social networking website MySpace, to explore potential differences in social capital among older people (users over 60 years of age) compared to teenagers (users between 13 and 19 years of age). We used locally developed web crawlers to collect data from MySpace’s user profile pages, and to quantify any differences that exist in the networks of friends of older people and teenagers. Content analysis was applied to investigate differences in social activities between the two age groups on MySpace, and the way they represent themselves on their profile pages. Our findings show a social capital divide: teenagers have larger networks of friends compared to older users of MySpace. On the other hand, we found that the majority of teenage users’ friends are in their own age range (age ± 2 years), whilst older people’s networks of friends tend to have a more diverse age distribution. In addition, our results show that teenagers tend to make more use of different media (e.g. video, music) within MySpace and use more self-references and negative emotions when describing themselves on their profile compared to older people.  相似文献   

19.
Why would people feel the need to disclose their negative emotions? Using the theory of conservation of resources, we hypothesize disclosure intention and behavior would be influenced by duration and severity of the negative emotional state. Moreover, we predict the effect of unexpected events and “the Big Five” personality traits on disclosure intention. Besides disclosure intention, we also tapped if the respondents have disclosed their negative emotions on their Facebook profile. In this study, we surveyed 255 Facebook users on their experiences from negative life events under four categories – social relationship, work, health and monetary issues. The results support all of our hypotheses. In particular, our post-hoc analyses show differences between females and males on the influence mechanism behind their disclosure intention. Females are more likely to disclose their problems relating to social relationship, work and health problems on Facebook than males.  相似文献   

20.
The study investigate the subjective aspect of consumers’ online information satisfaction within the frame of flow experience in two processes: ongoing and goal-directed information search. A total of 391 samples for ongoing processes and 415 samples for goal-directed processes obtained in this study were analyzed with structural equation modelling. Flow is conceptualized in the study with Enjoyment, Time Distortion, Curiosity, Perceived Control and Concentration dimensions. The results indicate that flow experience has significant effects on consumers’ online information satisfaction in both processes. Enjoyment, Time distortion, Curiosity and Perceived Control dimensions affect online information satisfaction positively in the ongoing process, which is largely carried out with hedonic urges. In addition to Enjoyment, Perceived Control and Concentration dimensions have positive and Curiosity dimension has negative effects in goal-directed online information satisfaction, which is largely carried out with utilitarian urges. In addition, the results indicate that Enjoyment, Time distortion and Curiosity dimensions have significantly stronger positive effects on online information satisfaction in ongoing search processes compared with goal-directed processes, and Concentration dimension has significantly stronger positive effects on online information satisfaction in goal-directed search processes compared with ongoing processes.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号