EXPRESS: The Bulletproof Glass Effect: Unintended Consequences of Privacy Notices

2021 ◽  
pp. 002224372110690
Author(s):  
Aaron R. Brough ◽  
David A. Norton ◽  
Shannon L. Sciarappa ◽  
Leslie K. John

Drawing from a content analysis of publicly-traded companies’ privacy notices, a survey of managers, a field study, and five online experiments, this research investigates how consumers respond to privacy notices. A privacy notice, by placing legally-enforceable limits on a firm’s data practices, communicating safeguards, and signaling transparency, might be expected to promote confidence that personal data will not be misused. Indeed, most managers expected a privacy notice to make customers feel more secure (Study 1). Yet, consistent with the analogy that bulletproof glass can increase feelings of vulnerability despite the protection offered, formal privacy notices undermined consumer trust and decreased purchase interest even when they emphasized objective protection (Studies 2, 3, and 5) or omitted any mention of potentially concerning data practices (Study 6). These unintended consequences did not occur, however, when consumers had an a priori reason to be distrustful (Study 4) or when benevolence cues were added to privacy notices (Studies 5-6). Finally, Study 7 showed that both the presence and conspicuous absence of privacy information are sufficient to trigger decreased purchase intent. Together, these results provide actionable guidance to managers on how to effectively convey privacy information (without hurting purchase interest).

2018 ◽  
pp. 142-155 ◽  
Author(s):  
T. A. Garanina ◽  
A. A. Muravyev

This article studies the gender composition of corporate boards of Russian companies, including its relation to company performance. The analysis is based on a unique longitudinal dataset of virtually all Russian companies whose shares were traded on the stock market in 1998-2014. It shows a relatively small representation of women, just 12% of all the seats, while about 40% of the companies did not have any female director. At the same time, both the share of companies that appoint female directors and the share of female directors on boards show a clear upward trend. The econometric analysis suggests a positive link between the presence of female directors on boards and company performance, especially when firms appoint several, rather than one, female directors.


Author(s):  
Joseph K. Tanimura ◽  
Eric W. Wehrly

According to many business publications, firms that experience information security breaches suffer substantial reputational penalties. This paper examines incidents in which confidential information, for a firms customers or employees, is stolen from or lost by publicly traded companies. Firms that experience such breaches suffer statistically significant losses in the market value of their equity. On the whole, the data indicate that these losses are of similar magnitudes to the direct costs. Thus, direct costs, and not reputational penalties, are the primary deterrents to information security breaches. Contrary to many published assertions, on average, firms that lose customer information do not suffer reputational penalties. However, when firms lose employee information, we find significant reputational penalties.


2007 ◽  
Vol 22 (1) ◽  
pp. 11-20 ◽  
Author(s):  
William R. Cron ◽  
Randall B. Hayes

2021 ◽  
Vol 2021 (2) ◽  
pp. 88-110
Author(s):  
Duc Bui ◽  
Kang G. Shin ◽  
Jong-Min Choi ◽  
Junbum Shin

Abstract Privacy policies are documents required by law and regulations that notify users of the collection, use, and sharing of their personal information on services or applications. While the extraction of personal data objects and their usage thereon is one of the fundamental steps in their automated analysis, it remains challenging due to the complex policy statements written in legal (vague) language. Prior work is limited by small/generated datasets and manually created rules. We formulate the extraction of fine-grained personal data phrases and the corresponding data collection or sharing practices as a sequence-labeling problem that can be solved by an entity-recognition model. We create a large dataset with 4.1k sentences (97k tokens) and 2.6k annotated fine-grained data practices from 30 real-world privacy policies to train and evaluate neural networks. We present a fully automated system, called PI-Extract, which accurately extracts privacy practices by a neural model and outperforms, by a large margin, strong rule-based baselines. We conduct a user study on the effects of data practice annotation which highlights and describes the data practices extracted by PI-Extract to help users better understand privacy-policy documents. Our experimental evaluation results show that the annotation significantly improves the users’ reading comprehension of policy texts, as indicated by a 26.6% increase in the average total reading score.


2018 ◽  
Vol 62 (10) ◽  
pp. 1319-1337 ◽  
Author(s):  
Yong Jin Park ◽  
Jae Eun Chung ◽  
Dong Hee Shin

This study presents a conceptual model of understanding algorithmic digital surveillance systems, borrowing insight from Giddens, who proposed the notion of structuration as social practices deriving from the intersection between structure and agents. We argue that the status of privacy, or lack of it, is a product of these interactions, of which the personal data practices and related interests constitute the reproduction of a data ecosystem. We trace the process of data production and consumption, dissecting the interactive dynamics between digital media producers (personal data users) and users (personal data producers). Inadequacies, limits, and social and policy implications of data surveillance and its algorithmic reproduction of identities are discussed.


2021 ◽  
Vol 20 ◽  
pp. e3206
Author(s):  
Glaysson Aguilar de Araújo ◽  
Lara Alves Corrêa ◽  
Valéria Gama Fully Bressan ◽  
João Estevão Barbosa Neto ◽  
Bruna Camargos Avelino

This research analyzes the relationship between free cash flows (FCFs) and the different levels of Corporate Governance present in the Brazilian stock market. To this end, the sample was composed of 212 Brazilian publicly traded companies listed on Brasil, Bolsa, Balcão [B]³, in the period from 2010 to 2018. The methodology consisted of estimating a regression for panel data, using the random effects model, estimating by generalized least square (GLS) and assuming adjustments for autocorrelation and robust standard errors for heteroscedasticity. The results found, for the sample studied, suggest that Corporate Governance levels are positively related to the FCFs. In synergy, when compared to the Traditional level of [B]³, companies listed on the Novo Mercado and Level 2 levels tend to present higher FCF values. In addition, the larger the size of the companies and the higher their return on equity, the higher their FCFs tend to be, just as companies in stages of maturity tend to present lower FCF values. The relevance of this research is based on analyzing, in a stock market subject to imperfections, factors that may affect decisions about the level of cash maintenance of companies, more specifically by evaluating how Corporate Governance mechanisms relate to the theory of FCFs, in a context of potential conflict of interest.


2019 ◽  
Vol 17 (2) ◽  
pp. 72
Author(s):  
Breno Augusto de Oliveira Silva ◽  
Daniel Ferreira Caixe ◽  
Elizabeth Krauter

This study aimed to investigate the investment-cash flow sensitivity for Brazilian companies with different degrees of financial constraint according to the quality level of their corporate governance practices. An investment model was estimated through GMM for a panel data of 248 Brazilian publicly traded companies, which were a priori classified in two groups of financial constraint degrees (high and low) according to the Corporate Governance Practices Index (IPGC). The results showed that the quality of corporate governance influences the investment-cash flow sensitivity, and this sensitivity is negative and significant only for firms with poor governance, classified with high financial constraint. Furthermore, it can be concluded that IPGC proved to be an interesting variable for a priori classification of companies and an important determinant of the investment-cash flow sensitivity to identify potentially financially constrained firms.


2021 ◽  
Vol 29 (6) ◽  
pp. 0-0

Data security incidents are continually increasing; hackers, governments, and other actors increasingly attempt to gain unauthorized access to confidential data. Information Systems (IS) users are becoming more vulnerable to the risks of data breaches. Many stakeholders perceive cybersecurity incidents as indicators of firms' operational and technological internal deficiencies. Previous research has revealed that investors react negatively to data breaches, yet little is known about investors' reactions to material data security incidents. Using a sample of 232 data security incidents for 132 publicly traded companies in the United States, we applied an event study methodology to discern investors' reactions to material versus immaterial incidents. We also use multivariate regression and time-to-event analysis to examine what determines the degree of investors' reactions, considering several intervals around the event day. Our results show that investors perceive material data security incidents as a deficiency of breached companies in comparison to immaterial incidents.


2019 ◽  
Vol 31 (5) ◽  
pp. 1509-1514
Author(s):  
Biljana Karovska-Andonovska ◽  
Zoran Jovanovski

The reforms in the communications monitoring system as part of the wider reform of the security services in the Republic of Macedonia, resulted with creation of a package of several laws whose adoption was supposed to provide the legislative basis for a system that would really work in accordance with the goals for which it was established. The communications monitoring system should provide a balanced protection of the right to security, on the one hand, and the right to privacy, on the other. Only on that way a priori primacy of the right to security over the right to privacy will it be disabled. Hence, the reforms in communications monitoring system are a precondition for the effective protection, primarily for the right to privacy and the secrecy of communications, but also for the right to personal data protection, the inviolability of the home as well as for the right to presumption of innocence. It is a complex and delicate matter where opening of a real debate through which the present deficiencies will be perceived in order to create an appropriate legal solutions was very important. However, the new Law on Interception of Communications as the most important in this area, retained a certain part of the provisions that were debatable in the previous legal solutions. The provisions regarding the model for interception of communications, which stipulates the establishment of a separate agency that mediates between the operators and the authorized bodies for interception of communications, were questionable as well. Also, new measures for monitoring communications in the interest of security and defense, as well as the provisions which regulate the disposition and delivery of metadata for security and defense, are also debatable. On the other side, the reform laws made an evident progress in a positive sense through the provisions for oversight and control over the interception of communications. With these changes, certain debatable elements have been overcome, especially those that have hindered it so far, and in some cases completely paralyzed the oversight and control over the monitoring of communications. In this paper we analyzed the debatable elements in the reform package of laws on interception of communications as well as some positive aspects contained in the provisions of the reform laws.


Sign in / Sign up

Export Citation Format

Share Document