privacy concern
Recently Published Documents


TOTAL DOCUMENTS

298
(FIVE YEARS 144)

H-INDEX

25
(FIVE YEARS 4)

The purpose of this paper is to understand the consumer behavior by investigating the effect of flow experience and marketing mix on consumers continued intention to use e-services provided through mobile applications and subsequent effect on consumers loyalty. The study also tests through a moderated mediation approach, the mediation of continued intention to use between flow experience-marketing mix and consumers loyalty while considering the moderating role of e-trust and privacy concern with the application. An online survey was conducted to collect data from the consumers, obtaining 405 valid samples which were analyzed using multiple regression to test the conceptual model of this study. The findings support that flow experience in mobile apps increases consumes intention to use, which is a significant predictor for consumer loyalty for services availed through mobile apps. This study provides insights for the marketers to build the flow in the mobile apps with interactive features, aesthetic design and ease of use to drive for continued intention to use and loyalty.


The extend of clever gadgets has accelerated touchy statistics trade on the Internet the usage of most of the time unsecured channels. Since a large use of RFID (Radio-frequency Identification) tags in the transportation and development industries from 1980 to 1990, with the multiplied use of the Internet with 2G/3G or 4G when you consider that 2000, we are witnessing a new generation of related objects. . This paper aims to understand and additionally grant continuing doe’s research topic, challenge, and Future Direction related to Iot security. A systematic mapping finds out about (SMS) is thus utilized on the way to organize the chosen Articles into the following classification: contribution type, Type of Research, Iot Security, and their approach. We take out an overall of twenty-four Articles in support of this systematic discover out about also they categorize the following described criterion. The findings of this SMS are mentioned and the researcher was once given hints on the possible route for future research


2022 ◽  
Vol 0 (0) ◽  
pp. 0
Author(s):  
You Zhao ◽  
Zibin Cui ◽  
Jianxin Chen ◽  
Rui Hou

<p style='text-indent:20px;'>This study considers a supply chain consists of one manufacturer produces a product with a quality level and sells it through one retailer. A stylized model is developed to investigate the impacts of consumers' privacy concerns on pricing, quality decisions, and profitability through the relationship between product quality and personal information. When consumers' privacy concern is considered, the product quality level, the wholesale price, the payoffs of the manufacturer and retailer, and consumer surplus decrease with the personal information loss, whereas the selling price increases if this loss is low. Our results also show that the retailer prefers to charge a high selling price if the information benefit and the personal information loss are low, or the information benefit is relatively high. Moreover, a "win-win-win" outcome can be achieved among the manufacturer, retailer, and consumers if the personal information loss is sufficiently low. In the case of quality-differentiated products, however, although the manufacturer improves the product quality level, the wholesale prices are increased if the information benefit and the personal information loss are low, or the information benefit is high.</p>


The purpose of this paper is to understand the consumer behavior by investigating the effect of flow experience and marketing mix on consumers continued intention to use e-services provided through mobile applications and subsequent effect on consumers loyalty. The study also tests through a moderated mediation approach, the mediation of continued intention to use between flow experience-marketing mix and consumers loyalty while considering the moderating role of e-trust and privacy concern with the application. An online survey was conducted to collect data from the consumers, obtaining 405 valid samples which were analyzed using multiple regression to test the conceptual model of this study. The findings support that flow experience in mobile apps increases consumes intention to use, which is a significant predictor for consumer loyalty for services availed through mobile apps. This study provides insights for the marketers to build the flow in the mobile apps with interactive features, aesthetic design and ease of use to drive for continued intention to use and loyalty.


2022 ◽  
Vol 14 (1) ◽  
pp. 0-0

The purpose of this paper is to understand the consumer behavior by investigating the effect of flow experience and marketing mix on consumers continued intention to use e-services provided through mobile applications and subsequent effect on consumers loyalty. The study also tests through a moderated mediation approach, the mediation of continued intention to use between flow experience-marketing mix and consumers loyalty while considering the moderating role of e-trust and privacy concern with the application. An online survey was conducted to collect data from the consumers, obtaining 405 valid samples which were analyzed using multiple regression to test the conceptual model of this study. The findings support that flow experience in mobile apps increases consumes intention to use, which is a significant predictor for consumer loyalty for services availed through mobile apps. This study provides insights for the marketers to build the flow in the mobile apps with interactive features, aesthetic design and ease of use to drive for continued intention to use and loyalty.


2021 ◽  
Vol 25 (2) ◽  
pp. 127-136
Author(s):  
Putri Wardhani ◽  
Laras Sekarasih

The practice of publishing photos and videos containing children’s private information on social media—also known as sharenting—is popular among parents in Jakarta. Embarking from the debate about privacy paradox in which it is believed that privacy concern does not predict someone’s behaviors in managing his/her private information online, this research aims to reveal the considerations underlying parental decisions when sharing their children’s private information through social media and their perceived risk toward their children’s online safety. Using a qualitative approach, the researcher conducted interviews with 20 parents in Jakarta with at least one child younger the 13 years. The result suggests that the perceived benefit of sharenting exceeds its perceived risks. The study also found four reasons why parents exercise sharenting: to document their children’s development, to gain social support from their followers on social media, and to overcome loneliness as new parents and the low self-efficacy of parents in protecting children’s privacy on the internet. Unsurprisingly sharenting through social media has become a growing trend among parents. This finding thus will be useful as a groundwork to develop an intervention program regarding relevant sharenting in the context of Jakarta, Indonesia.


2021 ◽  
Vol 35 (6) ◽  
pp. 447-456
Author(s):  
Preet Kamal Kaur ◽  
Kanwal Preet Singh Attwal ◽  
Harmandeep Singh

With the continuous advancements in Information and Communication Technology, healthcare data is stored in the electronic forms and accessed remotely according to the requirements. However, there is a negative impact like unauthorized access, misuse, stealing of the data, which violates the privacy concern of patients. Sensitive information, if not protected, can become the basis for linkage attacks. Paper proposes an improved Privacy-Preserving Data Classification System for Chronic Kidney Disease dataset. Focus of the work is to predict the disease of patients’ while preventing the privacy breach of their sensitive information. To accomplish this goal, a metaheuristic Firefly Optimization Algorithm (FOA) is deployed for random noise generation (instead of fixed noise) and this noise is added to the least significant bits of sensitive data. Then, random forest classifier is applied on both original and perturbed dataset to predict the disease. Even after perturbation, technique preserves required significance of prediction results by maintaining the balance between utility and security of data. In order to validate the results, proposed method is compared with the existing technology on the basis of various evaluation parameters. Results show that proposed technique is suitable for healthcare applications where both privacy protection and accurate prediction are necessary conditions.


Author(s):  
Gaurav Bansal ◽  
Merrill Warkentin

Recently, data breaches, especially insider data breaches, have become increasingly common. However, there is a limited amount of research on the factors associated with the decrease in users' trust in response to these events. In this study, social role theory and socioemotional selectivity theory are applied to understand the role of age (younger and older), biological (male and female) and cultural (masculinity and femininity) gender, and the four dimensions of privacy concern-collection, secondary use, unauthorized access, and error-on initial trust and the corresponding decrease in trust associated with the three trust beliefs of ability, benevolence, and integrity. A scenario-based approach is used to focus on a case study of an insider breach. The findings also provide helpful insights into the comparative roles of trust builders (e.g., reputation and design) and trust crashers (e.g., privacy concerns) in the process of trust building and trust decrease in different demographics (e.g., older and younger, males and females) for overall trust and trusting beliefs. Theoretical, managerial, and social implications are discussed.


2021 ◽  
Vol 4 ◽  
Author(s):  
Cornelia Herbert ◽  
Verena Marschin ◽  
Benjamin Erb ◽  
Dominik Meißner ◽  
Maria Aufheimer ◽  
...  

Digital interactions via the internet have become the norm rather than the exception in our global society. Concerns have been raised about human-centered privacy and the often unreflected self-disclosure behavior of internet users. This study on human-centered privacy follows two major aims: first, investigate the willingness of university students (as digital natives) to disclose private data and information about their person, social and academic life, their mental health as well as their health behavior habits, when taking part as a volunteer in a scientific online survey. Second, examine to what extent the participants’ self-disclosure behavior can be modulated by experimental induction of privacy awareness (PA) or trust in privacy (TIP) or a combination of both (PA and TIP). In addition, the role of human factors such as personality traits, gender or mental health (e.g., self-reported depressive symptoms) on self-disclosure behavior was explored. Participants were randomly assigned to four experimental groups. In group A (n = 50, 7 males), privacy awareness (PA) was induced implicitly by the inclusion of privacy concern items. In group B (n = 43, 6 males), trust in privacy (TIP) was experimentally induced by buzzwords and by visual TIP primes promising safe data storage. Group C (n = 79, 12 males) received both, PA and TIP induction, while group D (n = 55, 9 males) served as control group. Participants had the choice to answer the survey items by agreeing to one of a number of possible answers including the options to refrain from self-disclosure by choosing the response options “don’t know” or “no answer.” Self-disclosure among participants was high irrespective of experimental group and irrespective of psychological domains of the information provided. The results of this study suggest that willingness of volunteers to self-disclose private data in a scientific online study cannot simply be overruled or changed by any of the chosen experimental privacy manipulations. The present results extend the previous literature on human-centered privacy and despite limitations can give important insights into self-disclosure behavior of young people and the privacy paradox.


Sign in / Sign up

Export Citation Format

Share Document