2016
DOI: 10.1016/j.cose.2015.10.002
|View full text |Cite
|
Sign up to set email alerts
|

Analysis of personal information security behavior and awareness

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

5
57
0
5

Year Published

2016
2016
2021
2021

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 166 publications
(67 citation statements)
references
References 30 publications
5
57
0
5
Order By: Relevance
“…It was found that money plays a role in users' decisions to disclose their identity. Some previous research analyzed people's behavior and awareness regarding personal information using a survey method (Chen & Rea, ; Min & Kim, ; Min, ; Ögütçü, Testik, & Chouseinoglou, ). All of these survey results indicated that users are concerned about the collection and misuse of their personal information.…”
Section: Literature Reviewmentioning
confidence: 99%
See 1 more Smart Citation
“…It was found that money plays a role in users' decisions to disclose their identity. Some previous research analyzed people's behavior and awareness regarding personal information using a survey method (Chen & Rea, ; Min & Kim, ; Min, ; Ögütçü, Testik, & Chouseinoglou, ). All of these survey results indicated that users are concerned about the collection and misuse of their personal information.…”
Section: Literature Reviewmentioning
confidence: 99%
“…However, this privacy concern can be offset by some kinds of benefit (Hann et al, ; Steinfeld, ; Min & Kim, ). Moreover, studies have shown that users have heterogeneous attitudes toward privacy and thus can be categorized into different segments according to their attitudes toward privacy (Hann et al, ; Feijóo et al, ; Steinfeld, ; Ögütçü et al, ).…”
Section: Literature Reviewmentioning
confidence: 99%
“…Employees' information security awareness and behaviour, and their resulting (non)compliance with information security policies, which has attracted increased attention in research, are considered a key socio‐organizational resource (Boss, Galletta, Lowry, Moody, & Polak, ; Bulgurcu, Cavusoglu, & Benbasat, ; Dhillon & Backhouse, ; Guo, Yuan, Archer, & Connelly, ; Hu, Dinev, Hart, & Cooke, ; Siponen & Vance, ). While referring to employees as the weakest link in the information security chain, researchers have focused on employees' individual perspectives (Crossler et al, ; Hu et al, ; Kearney & Kruger, ; Öğütçü, Testik, & Chouseinoglou, ; Wall, Prashant, & Lowry, ; Wang, Xiao, & Rao, ; Warkentin & Willison, ). A major challenge for organizations is to find an effective way to promote information security policies to individual employees (Boss, Kirsch, Angermeier, Shingler, & Boss, ; Cram, Proudfoot, & D'Arcy, ; Lowry & Moody, ) because employees have considerable influence on the effectiveness of the information security efforts of the organization (Herath et al, ; Öğütçü et al, ; Posey, Roberts, Lowry, & Hightower, ).…”
Section: Introductionmentioning
confidence: 99%
“…To settle this problem, in this paper, we try design a proper utility loss metric function named UL(G,G') shown in Equation (2). This metric measures both the structure interference and information loss of different anonymizing operations.…”
Section: Graph Utility Measurementmentioning
confidence: 99%
“…Additionally, the k-anonymity l-diversity models aim to sanitize the published graph, eventually leading to data usability reduction for published social network data. Therefore, the tradeoff between the individual's privacy security and data utility while publishing the social network data has become a major concern [2][3][4].…”
Section: Introductionmentioning
confidence: 99%