Online Information Privacy and Its Implications for E-Entrepreneurship and E-Business Ethics

2009 ◽  
pp. 2072-2087
Author(s):  
Carmen Gould ◽  
Fang Zhao

This chapter reports the results of a national survey which investigated Australian Internet users’ attitudes and behaviours toward online information privacy using a typology that combines specific demographic and attitudinal measurements with behavioural data. The chapter contains a comprehensive examination of the internal, external/ environmental, and behavioural dimensions of information privacy, incorporating a profile of each of the typologies’ categories along with a general profile of total respondents. The implications of the findings for e-entrepreneurship and e-business ethics also are discussed.

Author(s):  
Carmen Gould ◽  
Fang Zhao

This chapter reports the results of a national survey which investigated Australian Internet users’ attitudes and behaviours toward online information privacy using a typology that combines specific demographic and attitudinal measurements with behavioural data. The chapter contains a comprehensive examination of the internal, external/environmental, and behavioural dimensions of information privacy, incorporating a profile of each of the typologies’ categories along with a general profile of total respondents. The implications of the findings for e-entrepreneurship and e-business ethics also are discussed.


2008 ◽  
pp. 2915-2930
Author(s):  
Carman Gould ◽  
Fang Zhao

This chapter reports the results of a national survey which investigated Australian Internet users’ attitudes and behaviours toward online information privacy using a typology that combines specific demographic and attitudinal measurements with behavioural data. The chapter contains a comprehensive examination of the internal, external/environmental, and behavioural dimensions of information privacy, incorporating a profile of each of the typologies’ categories along with a general profile of total respondents. The implications of the findings for e-entrepreneurship and e-business ethics also are discussed.


Lentera Hukum ◽  
2021 ◽  
Vol 8 (1) ◽  
pp. 73
Author(s):  
Rina Arum Prastyanti ◽  
Eiad Yafi ◽  
Kelik Wardiono ◽  
Arief Budiono

Pop-up advertisements have become prevalent on websites. When users click on the banner, they navigate a separate window; banner and pop-up advertisements contain attractive audio-visual and animated graphics. This intrusive advertising has not explicitly regulated Indonesia's current legislation, including Electronic Transaction and Information Law 11/2008 (ITE Law). Also, it is exempted in the Indonesian Pariwara Ethics, guidelines for advertising ethics and procedure in Indonesia. This study aimed to revisit consumers’ protection toward pop-up advertisements in Indonesia, with two main discussions. First, it discussed online consumers' perceptions of pop-up advertisements and the classification of their responses. Second, it enquired to what extent the legal and ethics protection for online consumers in Indonesia. By using empirical legal research, this study concluded that the ITE Law prohibits anyone from spreading online information with content that violates immorality and gambling, as it often contains in pop-up advertisements. Through the lens of business ethics, pop-up advertisements are new media and they should not be installed in such a way as to interfere with the freedom of internet users, given that pop-up advertisements do not reflect the ethics of honesty, trust, and advice in business. KEYWORDS: Consumers’ Protection, Online Advertisements, Business Ethics.


2019 ◽  
Author(s):  
Francesco Brigo ◽  
Simona Lattanzi ◽  
Giorgia Giussani ◽  
Laura Tassi ◽  
Nicola Pietrafusa ◽  
...  

BACKGROUND The Internet has become one of the most important sources of health information, accessed daily by an ever-growing number of both patients and physicians, seeking medical advice and clinical guidance. A deeper insight into the current use of the Web as source of information on epilepsy would help in clarifying the individual attitude towards this medium by Internet users. OBJECTIVE We investigated views towards the Internet in a sample of Italian healthcare specialists involved in epilepsy field, to explore factors which explained the influence of information found on the internet. METHODS This study was a self-administered survey conducted in a group of members of the Italian Chapter of the International League Against Epilepsy (ILAE) in January 2018. RESULTS 184 questionnaires were analyzed. 97.8% of responders reported to seek online information on epilepsy. The Internet was most frequently searched to obtain new information (69.9%) or to confirm a diagnostic or therapeutic decision (37.3%). The influence of consulting the Internet on clinical practice was associated with registration to social network(s) (OR: 2.94; 95%CI: 1.28-6.76; p=0.011), higher frequency of Internet use (OR: 3.66; 95%CI: 1.56-9.21; p=0.006) and higher confidence in reliability of online information (OR: 2.61; 95%CI: 1.09-6.26; p=0.031). No association was found with age, sex, years in epilepsy practice or easiness to find online information. CONCLUSIONS Internet is frequently used among healthcare professionals involved in the epilepsy to obtain information about this disease. The attitude of being influenced by the Internet for diagnostic and/or therapeutic decisions in epilepsy is independent on age and years of experience in epilepsy, and probably reflects an individual approach towards the Web.


2018 ◽  
Vol 26 (3) ◽  
pp. 264-276 ◽  
Author(s):  
Jurjen Jansen ◽  
Paul van Schaik

Purpose The purpose of this paper is to test the protection motivation theory (PMT) in the context of fear appeal interventions to reduce the threat of phishing attacks. In addition, it was tested to what extent the model relations are equivalent across fear appeal conditions and across time. Design/methodology/approach A pre-test post-test design was used. In the pre-test, 1,201 internet users filled out an online survey and were presented with one of three fear appeal conditions: strong fear appeal, weak fear appeal and control condition. Arguments regarding vulnerability of phishing attacks and response efficacy of vigilant online information-sharing behaviour were manipulated in the fear appeals. In the post-test, data were collected from 786 internet users and analysed with partial least squares path modelling. Findings The study found that PMT model relations hold in the domain of phishing. Self-efficacy and fear were the most important predictors of protection motivation. In general, the model results were equivalent across conditions and across time. Practical Implications It is important to consider online information-sharing behaviour because it facilitates the occurrence and success of phishing attacks. The results give practitioners more insight into important factors to address in the design of preventative measures to reduce the success of phishing attacks. Future research is needed to test how fear appeals work in real-world settings and over longer periods. Originality/value This paper is a substantial adaptation of a previous conference paper (Jansen and Van Schaik, 2017a, b).


This chapter suggests how individual netizens or companies can uncover “pushing hand” operations. It is vitally important that Internet users, either corporations or individuals should acquire some knowledge and skills in identifying Internet mercenary marketing schemes since unrestricted information manipulation has grown to such a large scale that it led to a media claim that 70% of visits to the Chinese Internet derived from pushing hand operations. Evaluating information and deciding whether it is in fact a genuine recommendation from netizens or managed information from pushing hands is not an easy task. Several clues of online information evaluation are provided.


Sign in / Sign up

Export Citation Format

Share Document