1982
DOI: 10.2307/256087
|View full text |Cite
|
Sign up to set email alerts
|

A Survey of Employee Perceptions of Information Privacy in Organizations.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
11
0

Year Published

1989
1989
2015
2015

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 48 publications
(11 citation statements)
references
References 8 publications
0
11
0
Order By: Relevance
“…Typically, more personally defining or identifying items, such as social security number [17], financial data [21] or medical data [20] are perceived as more sensitive; however, sensitivity assessments can vary with the situation [4]. Collection, storage, and use of more sensitive items are associated with feelings of discomfort [20] and perceptions of privacy invasion [18] [19]. Consequently, individuals are more likely to omit or falsify [17] [22] data they consider sensitive.…”
Section: Managing Disclosure Of Personal Datamentioning
confidence: 99%
See 1 more Smart Citation
“…Typically, more personally defining or identifying items, such as social security number [17], financial data [21] or medical data [20] are perceived as more sensitive; however, sensitivity assessments can vary with the situation [4]. Collection, storage, and use of more sensitive items are associated with feelings of discomfort [20] and perceptions of privacy invasion [18] [19]. Consequently, individuals are more likely to omit or falsify [17] [22] data they consider sensitive.…”
Section: Managing Disclosure Of Personal Datamentioning
confidence: 99%
“…Relevance of a data request is related to the perceived data needs of the receiver in that context and whether the expected usage of the data is perceived as legitimate [25] [26]. Lower relevance or legitimacy of a data request is associated with a higher privacy cost [23] and feelings of privacy invasion [19] [24]. Lower perceived relevance of a data request has not been associated with privacy protection behaviours.…”
Section: Managing Disclosure Of Personal Datamentioning
confidence: 99%
“…Research in psychology suggests that individuals seek privacy to maintain self-identity, establish personal boundaries, and avoid unwanted disclosure and intrusion [23, Downloaded by [Texas A & M International University] at 00:24 17 August 2015 24]. In many experimental and organizational settings, people are found to perceive privacy invasions when they are not granted sufficient control on the solicitation, storage, use, and disclosure of various types of personal information [15,63,69]. Such perception may deter them from taking part in transactions that involve personal information solicitation [8,62].…”
Section: Theory and Hypothesesmentioning
confidence: 99%
“…A few other authors have also considered the government's increasing use of computers for purposes of control and surveillance (e.g., [5,19,28]). However, other than some recent work in the domain of targeted marketing (e.g., [6]) and some 1980s research into personnel and related topics (e.g., [35]), little of the recent effort has been directed toward privacy issues in the commercial sector. As businesses increasingly use personal information to gain strategic advantage, new privacy concerns naturally emerge.…”
Section: ® Business Computingmentioning
confidence: 99%
“…Table 6 shows the percent-9Some studies in other fields (e.g., personnel research) have utilized different types of information and have' found that individuals display varying thresholds of sensitivity toward such types. (See, for example, [35]). Such work should be extended into the policy domain, where consistency with corporate approaches can be measured.…”
Section: Policy Weaknessesmentioning
confidence: 99%