首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 15 毫秒
1.
This study investigated the association between trust in individuals, social institutions and online trust on the disclosure of personal identifiable information online. Using the Internet attributes approach that argues that some structural characteristics of the Internet such as lack of social cues and controllability are conducive to a disinhibitive behavior it was expected that face to face trust and online trust will not be associated. In addition, it was expected that from the three components of trust, online trust only will be associated with the disclosure of identifiable personal information online. A secondary analysis of the 2009 Pew and American Life of Internet users (n = 1698) survey was conducted. In contrast with the Internet attribute approach the effect of trust in individuals and institutions was indirectly associated with the disclosure of identifiable information online. Trust in individuals and institutions were found to be associated with online trust. However, online trust only, was found to be associated with the disclosure of personal identifiable information. While trust online encourages the disclosure of identifiable information, perception of privacy risks predicted refraining from posting identifiable information online. The results show a complex picture of the association of offline and online characteristics on online behavior.  相似文献   

2.
Firms have at their disposal an increasing amount of personal information about consumers gathered through various means. Studies find that personalizing online interactions improves customer relationships and increases desirable behaviors, such as positive word-of-mouth and increased purchase intent. However, other research suggests that the use of personal information stimulates privacy concern, which has a negative effect on behavior. This study examines potential moderators of the negative effects of privacy concern on behavioral intentions in the context of personalized online interactions. Results show that increasing perceived information control reduces the negative effect of privacy concern on intentions to engage in positive behaviors. In contrast, the offer of compensation has no effect on the relationship between privacy concern and these behavioral intentions. However, compensation increases the salience of trust to privacy concern.  相似文献   

3.
Consumer-generated self-disclosure is better than firm-generated advertising and sales reports in increasing contact opportunities and also more credible for firms to foster alignment with future market expectations. Previous research mostly assesses online self-disclosure from the rational approach of anticipated benefits and privacy risks without considering the “privacy paradox” phenomenon (users behave contrarily to privacy concern) in social networking sites (SNSs). We develop a theoretical model, grounded in constraint-based (lock-in) and dedication-based (trust-building) mechanisms and social identity theory, to predict online self-disclosure. We test the proposed theoretical model by surveying 395 consumers with participation experience in an online SNS. Different from the rational approach behind personalization, we advance knowledge on how to apply social identity, as well as constraint-based and dedication-based mechanisms, to motivate online self-disclosure induced by consumers. We provide theoretical and practical insights based on our research findings for managing the motivational mechanisms of online self-disclosure.  相似文献   

4.
Non-empirical publications have espoused the importance of monitoring/controlling children’s online and computer activities through monitoring software; however, no empirical research has verified whether this is a viable means for promoting responsible and safe internet use. This study examined the association between parenting behaviours and adolescent online aggression. The sample included 733 adolescents (451 females), between 10 and 18 years, from Western Canada. Participants completed a questionnaire that included questions on internet aggression, and parenting. The parenting questions were modified from Stattin and Kerr’s (2000) questionnaire to better suit the online environment. Results from the univariate least squares factor analysis revealed two distinct factors: (1) Parent Solicitation (parents ask where child is going on the internet), (2) Child Disclosure (child naturally tells parents what they are doing). Hierarchical Linear Regression analysis revealed that having a computer in the bedroom increased the likelihood of engaging in online aggression and that adolescent self-disclosure of online behaviours (and not controlling or monitoring online activities) was negatively associated with online aggression. These findings emphasize the importance of establishing good communication between parents and adolescents rather than investing money on monitoring software and on controlling adolescent internet use.  相似文献   

5.
Trust and distrust are considered crucial elements affecting online relationships – particularly those involving electronic transactions. Although some studies propose that they are distinct, others claim that they are merely opposite ends of one continuum. Further adding to the debate is the possibility of ambivalence, a topic that has not been examined in electronic transaction relationships. Unfortunately, current models of trust and distrust have limitations that impede explanations of how – or even if – ambivalence is generated by feelings of trust and distrust and how these two constructs can best coexist. We thus propose a hybrid model which considers the limitations and strengths of previous models. Namely, we posit that trust and distrust can coexist as separate components with related continua. We use polynomial regression analysis (PRA) and response surface analysis (RSA) to test these complex relationships. Using an empirical study of online consumer behaviour with 521 experienced online consumers, strong empirical validation is found for the model. We examine the effects of ambivalence on the truster’s intentions towards a website and find a small positive effect which increases such intentions. PRA and RSA confirm that trust and distrust are most likely separate components – not opposite ends of a continuum – with related continua. The continua within the subconstructs of trust and distrust likely have more complex and interesting relationships than have been considered previously. These findings lead to interesting future research opportunities on trust, distrust and ambivalence using advanced techniques such as PRA and RSA.  相似文献   

6.
In what circumstances might privacy concerns about new communication tools like instant messaging help predict the degree to which people feel comfortable communicating via these new communication tools? The current study examined whether topic intimacy and perceived privacy predict levels of comfort with disclosure, and whether these associations are moderated by overall levels of trust and frequency of technology use. Participants reported on the degree to which they would feel comfortable discussing each of 32 topics (e.g., “times when I felt that I was in love”) using 10 different communication tools. Topic and tool interacted, such that the privacy of the communication tool was related to disclosure comfort only for intimate topics. Privacy concerns were more important to less frequent technology users, and topic intimacy mattered most to participants with low levels of trust. Results are discussed in terms of implications for extending models of disclosure to the selection of new communication tools.  相似文献   

7.
Price and trust are considered to be two important factors that influence customer purchasing decisions in Internet shopping. This paper examines the relative influence they have on online purchasing decisions for both potential and repeat customers. The knowledge of their relative impacts and changes in their relative roles over customer transaction experience is useful in developing customized sales strategies to target different groups of customers. The results of this study revealed that perceived trust exerted a stronger effect than perceived price on purchase intentions for both potential and repeat customers of an online store. The results also revealed that perceived price exerted a stronger influence on purchase decisions of repeat customers as compared to that of potential customers. Perceived trust exerted a stronger influence on purchase decisions of potential customers as compared to that of repeat customers.  相似文献   

8.
Concurrent computation has been with us for over 50 years, and has become essential today. Concurrency paradigms affect the way we think about parallelism, the programs we try to write, the algorithms we choose, the performance we achieve, the errors we make, and the support mechanisms we need. The paradigms are not equivalent. Although each paradigm can usually be simulated in environments designed for a different paradigm, such a “Turing machine style” proof of computational equivalency does not establish equivalency in terms of the effort required to program solutions, the proclivity for solutions to be error-prone, or the comparable effectiveness of solutions. Two classic concurrency paradigms are reviewed. A third (not so widely recognized) concurrency paradigm is then discussed.  相似文献   

9.
The advent of social networks opened a myriad opportunities for merging the social character of trust with the technical possibilities offered by the Internet and its availability as a mobile service. While most of the computational trust models aim to detect trustworthy entities, much less attention is paid to how these models are perceived by the users who are the core of the system. This paper delves into the workings of online trust systems under user bias and analyses the user behaviour through biases defined by Prospect theory. By performing empirical study on an existing system, we are able to demonstrate that there is a huge discrepancy between the aim of implementation of the online trust models and the users’ perception of those models. Understanding of this relation by the system designers can reduce complexity and improve the user experience and the system performance. The results imply that the tendency of the users to exhibit cognitive biases is not only the cause, but also the effect from the trust system design. These results and the analysis are then used to propose to the system designers a methodology for user bias identification and mitigation in the form of a Choice architecture for trust systems.  相似文献   

10.
This article analyzes the relationships among online trust and two of its most important antecedents, namely privacy and security, and explains how consumers’ characteristics (gender, age, education and extraversion), moderate the influence of both privacy and security in online trust. This study expands previous literature by identifying the conditions under which perceived privacy and security are likely to have the greatest positive effects on consumer trust in the online retailer. Based on data from 398 online consumers, the results revealed that the influence of both privacy and security on online trust was stronger for male, younger, more educated, and less extraverted consumers. Implications for theory and management are discussed.  相似文献   

11.
Online peer-to-peer (P2P) lending is a new but essential financing method for small and micro enterprises that is conducted on the Internet and excludes the involvement of collateral and financial institutions. To tackle the inherent risk of this new financing method, trust must be cultivated. Based on trust theories, the present study develops an integrated trust model specifically for the online P2P lending context, to better understand the critical factors that drive lenders’ trust. The model is empirically tested using surveyed data from 785 online lenders of PPDai, the first and largest online P2P platform in China. The results show that both trust in borrowers and trust in intermediaries are significant factors influencing lenders’ lending intention. However, trust in borrowers is more critical, and not only directly nurtures lenders’ lending intention more efficiently than trust in intermediaries, but also carries the impact of trust in intermediaries on lenders’ lending intention. To develop lenders’ trust, borrowers should provide high-quality information for their loan requests and intermediaries should provide high-quality services and sufficient security protection. The findings provide valuable insights for both borrowers and intermediaries.  相似文献   

12.
In computer-supported collaborative learning research, studies examining the combined effects of individual level, group level and within-group differences level measures on individual achievement are scarce. The current study addressed this by examining whether individual, group and within-group differences regarding engagement and prior knowledge predict individual achievement. Engagement was operationalised as group members' exhibited activities in the task space (i.e., discussing domain-content) and social space (i.e., regulating ideas, actions and socioemotional processes). Prior knowledge and achievement were operationalised as group members' performance on a domain-related pre-test and post-test, respectively. Data was collected for 95 triads of secondary education students collaborating on a complex business-economics problem. Subsequently, three different multilevel models were tested to examine the combined effect. First a model with the individual level measures (model 1) was tested and in subsequent models the group level measures (model 2) and within-group levels measures (model 3) were added. Findings indicate model 2 showed the best fit; group members' individual engagement in the social space activities as well as the groups' average prior knowledge positively predicts individual achievement. No effects were found for either group members' or groups' engagement in the task space and for the within-group differences.  相似文献   

13.
14.
<发明人>:Beckman;Brian C.(Newcastle,WA);Andrews;Anthony D.(Redmond,WA);Armanasu;Alexander A.(Redmond,WA)<代理>:Microsoft Corporation (Redmond,WA)<申请号>:201276  相似文献   

15.
Ever since the beginnings of the internet researchers have questioned its utility in developing and maintaining psychological healthy romantic and sexual relations. Advocates of the social presence theory and media richness theory purport that in leaner media individuals can be quite aggressive towards one another (e.g., in the form of flaming). In contrast, others believe that the lack of traditional cues in CMC can in fact be overcome and instead lead to more personal, intimate relationships. As this paper will demonstrate, when we consider how beneficial it is to form relationships online we also need to consider individuals’ characteristics (e.g., personality characteristics and physical attractiveness), the amount of time people spend online, the duration of online relationships, and how these relationships effect individuals’ offline activities and relationships. Overall, the view here is that online relationships can be empowering for many people; that is, cyberspace provides a unique environment for people to experience and learn about relationships and sexuality.  相似文献   

16.
CROWN:A service grid middleware with trust management mechanism   总被引:7,自引:0,他引:7  
Based on a proposed Web service-based grid architecture, a service grid middleware system called CROWN is designed in this paper. As the two kernel points of the middleware, the overlay-based distributed grid resource management mechanism is proposed, and the policy-based distributed access control mechanism with the capability of automatic negotiation of the access control policy and trust management and negotia- tion is also discussed in this paper. Experience of CROWN testbed deployment and ap- plication development shows that the middleware can support the typical scenarios such as computing-intensive applications, data-intensive applications and mass information processing applications.  相似文献   

17.
Who Are You? The Trade-Off between Information Utility and Privacy   总被引:1,自引:0,他引:1  
There's no doubt that personal information can be valuable to companies. People are willing to give up information about themselves not because they're stupid or because they're being tricked by evil corporations, but because it can sometimes be in their best interests to do so. From this perspective, the important questions are how users can provide or limit access to that information, what benefits they might receive in exchange for a bit of information, and how they perceive the value of those benefits.  相似文献   

18.
This paper discusses a study in supporting collaborative military planning in which groupware, video-conferencing and a desktop Collaborative Virtual Environment (CVE) were used. It discusses the design and implementation of the CVE and the setup and execution of the study using questionnaires and observation. The results of the study questionnaires showed that the CVE was not seen by users as the best of the ways offered to support collaborative planning; these results are discussed and their implication for the design of such a CVE are assessed.
C. DelgadoEmail:
  相似文献   

19.
Recent trust research in the information systems (IS) field has described trust as a primary predictor of technology usage and a fundamental construct for understanding user perceptions of technology. Initial trust formation is particularly relevant in an IS context, as users must overcome perceptions of risk and uncertainty before using a novel technology. With initial trust in a more complex, organizational information system, there are a number of external determinants, trusting bases, that may explain trust formation and provide organizations with the needed levers to form or change individuals’ initial trust in technology. In this study, a research model of initial trust formation is developed and includes trusting bases, trusting beliefs, trusting attitude and subjective norm, and trusting intentions. Eight trusting base factors are assessed including personality, cognitive, calculative, and both technology and organizational factors of the institutional base. The model is empirically tested with 443 subjects in the context of initial trust in a national identity system (NID). The proposed model was supported and the results indicate that subjective norm and the cognitive–reputation, calculative, and organizational situational normality base factors significantly influence initial trusting beliefs and other downstream trust constructs. Factors from some of the more commonly investigated bases, personality and technology institutional, did not significantly affect trusting beliefs. The findings have strategic implications for agencies implementing e-government systems and organizational information systems in general.  相似文献   

20.
Abstract

Countless companies advertising on the Internet claim that they can uncover confidential financial and personal information about any person or organization. Every Internet user receives these messages regularly. For a small fee, these data minersclaim that they can check bankruptcy records, find a person's employment history, check adoption and motor vehicle records, check credit reports, and even determine if someone has a criminal record. In particular, they claim that they can obtain financial information (civil judgments, bankruptcies, credit records) about anybody.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号