首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 31 毫秒
1.
ABSTRACT

Higher education institutions have started using big data analytics tools. By gathering information about students as they navigate information systems, learning analytics employs techniques to understand student behaviors and to improve instructional, curricular, and support resources and learning environments. However, learning analytics presents important moral and policy issues surrounding student privacy. We argue that there are five crucial questions about student privacy that we must address in order to ensure that whatever the laudable goals and gains of learning analytics, they are commensurate with respecting students' privacy and associated rights, including (but not limited to) autonomy interests. We address information access concerns, the intrusive nature of information-gathering practices, whether or not learning analytics is justified given the potential distribution of consequences and benefits, and issues related to student autonomy. Finally, we question whether learning analytics advances the aims of higher education or runs counter to those goals.  相似文献   

2.
Remote data integrity checking is of great importance to the security of cloud-based information systems. Previous works generally assume a trusted third party to oversee the integrity of the outsourced data, which may be invalid in practice. In this paper, we utilize the blockchain to construct a novel privacy-preserving remote data integrity checking scheme for Internet of Things (IoT) information management systems without involving trusted third parties. Our scheme leverages the Lifted EC-ElGamal cryptosystem, bilinear pairing, and blockchain to support efficient public batch signature verifications and protect the security and data privacy of the IoT systems. The results of the experiment demonstrate the efficiency of our scheme.  相似文献   

3.
杨宏玲  缪小明 《软科学》2009,23(7):21-25
通过对中国银行产品消费者调查收集的数据来验证影响消费者对银行信息行为信任的因素。结果发现,消费者的信任信念和隐私声明信任会显著地影响其对银行信息行为的信任;而消费者的整体隐私关注越强,其对银行信息行为的信任越弱,但是消费者的整体隐私关注对其隐私声明信任的影响不显著,表明消费者的整体隐私关注直接影响消费者对银行信息行为的信任。  相似文献   

4.
We use the legal framework of captive audience to examine the Federal Trade Commission 2012 privacy guidelines as applied to mobile marketing. We define captive audiences as audiences without functional opt-out mechanisms to avoid situations of coercive communication. By analyzing the current mobile marketing ecosystem, we show that the Federal Trade Commission's privacy guidelines inspired by the Canadian “privacy by design” paradigm fall short of protecting consumers against invasive mobile marketing in at least three respects: (a) The guidelines overlook how, in the context of data monopolies, the combination of location and personal history data threatens autonomy of choice; (b) the guidelines focus exclusively on user control over data sharing, while ignoring control over communicative interaction; and (c) the reliance on market mechanisms to produce improved privacy policies may actually increase opt-out costs for consumers. We conclude by discussing two concrete proposals for improvement: a “home mode” for mobile privacy and target-specific privacy contract negotiation.  相似文献   

5.
Web2.0时代网络信息资源管理隐私权保护已严重影响用户对网站的安全度和信任度。网络信息资源管理中的隐私权侵权行为主要有:对网络用户个人信息使用不当,个人活动隐私的侵犯,个人网络痕迹隐私的侵犯以及个人网络空间隐私权的侵犯;网络信息资源管理中的隐私权保护对策主要有:完善网络隐私权保护的立法,加强网络信息产业的行业自律,提高网络用户的自我保护意识,最大限度地利用信息安全技术、成立网络隐私权保护的专门机构以及融入国际网络隐私权保护体系等。  相似文献   

6.
Abuse of information entrusted to organizations can result in a variety of privacy violations and trust concerns for consumers. In the event of violations, a social media brand or organization renders an apology – a form of social account – to alleviate users’ concerns and maintain user membership and engagement with the platform. To explore the link between apology offered by a social media brand or organization and the users’ trust dynamics in the brand’s services, we study how organizational integrity can contribute to reducing individuals’ privacy concerns whiles increasing or repairing their trust. Drawing on organizational behavioral integrity literature, our proposed research model suggests that the persuasiveness of an apology following a data breach affects users’ trust or spillover trust through their perceptions of the degree of alignment between the words in the apology and the actions of the violating entity. Based on a survey of Facebook users, our findings show that persuasiveness of an apology has a significant impact on users’ perceptions of the alignment between the social media brand’s (i.e. Facebook) words and subsequent actions. These perceptions impact social media brand trust (i.e. users’ trust in Facebook and allied services such as Instagram). We also find that, post data breach incidence, while integrity of the social media organization partially mediates the relationship between persuasive apology and users’ trust, it fully mediates the relationship between the persuasive apology and the privacy concerns expressed by the users. However, users’ privacy concerns do not contribute much to the repair of trust needed to maintain their membership.  相似文献   

7.
In the United States, Congress has had a long-standing interest in consumer privacy and the extent to which company practices are based on fair information practices. Previously, public policy was largely informed by anecdotal evidence about the effectiveness of industry self-regulatory programs. However, the Internet has made it possible to unobtrusively sample web sites and their privacy disclosures in a way that is not feasible in the offline world. Beginning in 1998, the Federal Trade Commission relied upon a series of three surveys of web sites to assess whether organizations post online privacy disclosures and whether these disclosures represent the U.S. definition of fair information practices. While each year's survey has provided an important snapshot of U.S. web-site practices, there has been no longitudinal analysis of the multiyear trends. This study compares a subset of equivalent individual-level web-site data for the 1998, 1999, 2000, and 2001 web surveys. Implications for using this type of research to inform public policy are discussed.  相似文献   

8.
The accuracy principle is one of the key standards of informational privacy. It epitomises the obligation for those processing personal data to keep their records accurate and up-to-date, with the aim of protecting individuals from unfair decisions. Currently, however, different practices being put in place in order to enhance the protection of individuals appear to deliberately rely on the use of ‘inaccurate’ personal information. This article explores such practices and tries to assess their potential for privacy protection, giving particular attention to their legal implications and to related ethical issues. Ultimately, it suggests that the use of ‘inaccurate’ data can potentially play a useful role to preserve the informational autonomy of the individual, and that any understandings of privacy or personal data protection that would tend to unduly limit such potential should be critically questioned.  相似文献   

9.
物联网是什么?物联网不是互联网、传感网、产品电子代码,也不单纯是一种技术应用。物联网将“互联网”和“物”连接在一起,就意味着把破坏性创新引进到当今的信息和通信技术世界。与互联网不同,物联网是物、网络、语义等视角的综合而形成的集网络、应用服务于一体的技术融合系统。在物联网语境中,物联网技术像人一样形成了人为的自主特征。物联网意味着一种潜在的技术异化的环境:个人隐私以多种方式受到威胁。而现有对隐私的制度规约存在诸多的不完备性。  相似文献   

10.
Government agencies often face trade-offs in developing initiatives that address a public good given competing concerns of various constituent groups. Efforts to construct data warehouses that enable data mining of citizens’ personal information obtained from other organizations (including sister agencies) create a complex challenge, since privacy concerns may vary across constituent groups whose priorities diverge from agencies’ e-government goals. In addition to privacy concerns, participating government agencies’ priorities related to the use of the information may also be in conflict. This article reports on a case study of the Integrated Non-Filer Compliance System used by the California Franchise Tax Board for which data are collected from federal, state, and municipal agencies and other organizations in a data mining application that aims to identify residents who under-report income or fail to file tax returns. This system pitted the public good (ensuring owed taxes are paid) against citizen concerns about privacy. Drawing on stakeholder theory, the authors propose a typology of four stakeholder groups (data controllers, data subjects, data providers, and secondary stakeholders) to address privacy concerns and argue that by ensuring procedural fairness for the data subjects, agencies can reduce some barriers that impede the successful adoption of e-government applications and policies. The article concludes that data controllers can reduce adoption and implementation barriers when e-government data mining applications rely on data shared across organizational boundaries: identify legitimate stakeholders and their concerns prior to implementation; enact procedures to ensure procedural fairness when data are captured, shared, and used; explain to each constituency how the data mining application helps to ensure distributive fairness; and continue to gauge stakeholders’ responses and ongoing concerns as long as the application is in use.  相似文献   

11.
刘石兰  郝斌 《科学学研究》2012,30(2):312-320
 有关消费者创新性与新产品采用行为的关系研究发现两者的结论并不一致,但这种不一致关系背后的原因探讨和每种关系存在的条件研究却明显不足。文章试图在消费者创新性结构的基础上探讨影响两者关系的调节机制。结论表明,只有认知创新性才与新产品的实际采用正向相关,而感知创新性只与新产品的创新性信息搜寻正向相关;创新性消费者的社会沟通与学习、对新产品的风险感知以及新产品的创新性属性对感知创新者和认知创新者的新产品创新性行为具有不同程度的调节作用。上述结论不仅在一定程度上弥补了以往研究的不足,进一步完善了现有的消费者创新性和新产品采用理论,而且还为新产品的营销实践提供新的理论支持。  相似文献   

12.
In 2014, a large archive of hacked nude photos of female celebrities was released on 4chan and organized and discussed primarily on Reddit. This paper explores the ethical implications of this celebrity nude photo leak within a frame of gendered privacy violations. I analyze a selection of a mass capture of 5143 posts and 94,602 comments from /thefappening subreddit, as well as editorials written by female celebrities, feminists, and journalists. Redditors justify the photo leak by arguing the subjects are privileged because they are celebrities; that the celebrities are at fault for failing to appropriately protect their information; and that the only person ethically responsible for the leak is the hacker. The popular press primarily took a feminist perspective, linking the photo leak to institutionalized sexism and misogyny. I argue that the Reddit participants frame the privacy violations within a context of geek masculinity, in which references to masturbation and pornography and casually misogynist language are used to signify a normative masculine self. Privacy violations are de-emphasized when the victims are women and gender or feminist concerns are rejected. Entitlement to viewing women’s bodies and male sexual desire are prioritized over ethical concerns over privacy violations. The paper contributes to understanding how privacy violations are normatively gendered and reinforced by gender inequality.  相似文献   

13.
泄露他人隐私行为意向的影响要素研究   总被引:1,自引:0,他引:1       下载免费PDF全文
吴娜  李文立  吕欣  柯育龙 《科研管理》2015,36(11):139-147
互联网的发展为人们的生活带来巨大便利,但也带来了隐私安全隐患,通过互联网渠道泄露他人隐私的现象已经引起社会的高度关注。基于犯罪学领域的中和技术理论,分析了否认责任、否认伤害、否认受害者、更高层次效忠、避免更多的伤害和隐私意识对泄露他人隐私行为发生意向的影响,构建了互联网环境下泄露他人隐私意向的研究模型。以人肉搜索这一典型例子进行场景设计,通过问卷调查,收集759份有效问卷,采用Smart PLS2.0软件进行结构方程检验。实证结果表明否认责任、否认受害者和避免更多伤害三类中和技术正向影响泄露他人隐私行为的意向,否认伤害和更高层次效忠技术对泄露他人隐私意向没有显著影响。另外,增强个人隐私意识能有效削弱泄露他人隐私行为的意向。本研究结果有助于了解隐私泄露者的行为动机,为规范互联网用户上网行径和制定隐私保护政策提供借鉴。  相似文献   

14.
Social commerce (s-commerce) has become increasingly impactful to e-commerce and has generated potential economic benefits. With the rise of online privacy concerns, we have seen the need to explain how concerns about privacy affect consumers’ social interaction behavior and purchase decision-making on s-commerce sites. Synthesizing the privacy-trust-behavioral intention (PTB) and consumer decision-making models, this study proposes a comprehensive model by specifically refining its privacy and trust from an institutional perspective and investigating the influences of social interaction on purchase intention and actual purchase behaviors. Our results found that institutional privacy assurance positively influences institutional-based trust, which, in turn, affects online social interactions, and consequently increases the likelihood of product purchases on s-commerce sites. Theoretical development of this research contributes to both marketing and information systems disciplines in the social media era.  相似文献   

15.
姜宁  顾锋 《科技管理研究》2021,41(1):160-165
基于企业非授权信息使用在手机购物APP情境下对消费者的影响,根据收集的269份消费者问卷,对提出的概念模型与研究假设进行检验.研究结果显示,非授权信息使用会增加消费者感知的信息脆弱性,而信息脆弱性则会促进消费者的转换行为;另外,信息设置有效性和信息政策有效性都可以减弱信息脆弱性与转换行为之间的正向关系.研究不仅促进相关...  相似文献   

16.
The popularity of mobile devices has ushered in the prosperity of mobile commerce, yet research on mobile advertising and mobile marketing remains scant. Marketing ads possessing higher media richness generally have a positive effect on consumer decision-making, because rich media conveys more information, but mobile ads with richer media imply higher costs for both the marketer and the audience. The limitations of mobile devices have further highlighted the difficulty of mobile advertising and the issue of advertising costs. Selecting which media to deliver the appropriate information is the latest research trend, but few studies have applied the media richness theory to explain mobile ads’ effect on consumer behavior. This research thus explores the impact of media richness on consumer behavior at different AISAS (attention, interest, search, action, and share) stages, adopting experimental research, convenient sampling, and online questionnaire to collect data. From a total of 424 valid questionnaires, we find that media richness has a greater influence on the three early stages of AIS while having a lower impact on the later stages of AS. This research thus suggests that firms employing mobile ads should choose high richness media for those potential customers who are at the early stage of consumer behavior (AIS). For those who at the later stage (AS), it is good enough for marketers to utilize medium richness mobile ads. Following this suggestion, marketers can place mobile ads more precisely, thus improving the likelihood of a reduction in advertising costs for both the marketer and audience. As mobile ads with high media richness are more effective for high perceived risk products, firms need to use high richness media when they are promoting high perceived risk products even when potential consumers are at the later stage of AS. This research contributes to marketers dedicated to using a mobile advertisement strategy and helps refine both online consumer behavior and the media richness theory when including the context of mobile commerce.  相似文献   

17.
Despite mobile applications being at the frontier of mobile computation technologies, security issues pose a threat to their adoption and diffusion. Recent studies suggest that security violations could be mitigated through improved security behaviors and attitudes, not just through better technologies. Existing literature on behavioral security suggests that one of the main predictors of users’ perceptions of security is their perceived privacy concerns. Using communication privacy management theory (CPM), this study examines the effects of privacy-related perceptions, such as privacy risk and the effectiveness of privacy policies, on the security perceptions of mobile app users. To empirically test the proposed theoretical model, two survey studies were conducted using mobile apps requesting less sensitive information (n = 487) and more sensitive information (n = 559). The findings show that the perceived privacy risk negatively influences the perceived security of the mobile apps; the perceived effectiveness of a privacy policy positively influences user perceptions of mobile app security; and perceived privacy awareness moderates the effect of perceived privacy risk on the perceived security of mobile apps. The results also suggest that users have different privacy-security perceptions based on the information sensitivity of the mobile apps. Theoretical and practical implications are discussed.  相似文献   

18.
网络隐私保护策略分析   总被引:9,自引:0,他引:9  
In the light of the present status of network privacy violations, this paper analyzes the network privacy protection strategies in USA and Europe, and puts forward some strategies that may be adopted in China.  相似文献   

19.
The implementation of digital contact tracing applications around the world to help reduce the spread of the COVID-19 pandemic represents one of the most ambitious uses of massive-scale citizen data ever attempted. There is major divergence among nations, however, between a “privacy-first” approach which protects citizens’ data at the cost of extremely limited access for public health authorities and researchers, and a “data-first” approach which stores large amounts of data which, while of immeasurable value to epidemiologists and other researchers, may significantly intrude upon citizens’ privacy. The lack of a consensus on privacy protection in the contact tracing process creates risks of non-compliance or deliberate obfuscation from citizens who fear revealing private aspects of their lives – a factor greatly exacerbated by recent major scandals over online privacy and the illicit use of citizens’ digital information, which have heightened public consciousness of these issues and created significant new challenges for any collection of large-scale public data. While digital contact tracing for COVID-19 remains in its infancy, the lack of consensus around best practices for its implementation and for reassuring citizens of the protection of their privacy may already have impeded its capacity to contribute to the pandemic response.  相似文献   

20.
In privacy information security literature, Privacy by Design (PbD) is recognized as a positive protection paradigm capable of providing higher privacy protection throughout information products’ entire lifetime. It is becoming the dominant privacy protection pattern. Considered to be a promising development tendency towards the information industry, it is garnering interest among researchers and professionals. However, PbD still lacks specific implementation instructions, and it is not popularized among information system engineers. Weighing the pros and cons leads to information system engineers’ uncertainty regarding PbD adoption, since existing research on the linkage between PbD implementation and information system engineers’ individual factors is inconclusive. Through the lenses of information system engineers, this study aims to advance implementation of PbD by exploring the influence factors of individual and organizational contexts. Real data from 253 practitioners in China’s IT industry were used to understand the antecedent of PbD implementation and interaction effects among different dimensions of engineers’ adopting behaviors. The findings have demonstrated that appropriate incentive mechanism is a critical factor in PbD implementation by promoting engineer’s social influence regarding PbD usage and further affecting both their intentions about adopting PbD and implementing action. This study reveals, for the first time, the role of incentive mechanism in advancing PbD implementation from the information system engineer perspective, and contributes to a deeper understanding of the determinants of PbD adoption by providing a holistic theoretical lens. The findings provide theoretical guidance to IT organizations with guidelines on PbD implementation for higher privacy information protection performance of products.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号