2016
DOI: 10.1080/10447318.2016.1204838
|View full text |Cite
|
Sign up to set email alerts
|

Better Safe than Sorry: A Study of Investigating Individuals’ Protection of Privacy in the Use of Storage as a Cloud Computing Service

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2017
2017
2023
2023

Publication Types

Select...
7

Relationship

0
7

Authors

Journals

citations
Cited by 10 publications
(4 citation statements)
references
References 73 publications
0
4
0
Order By: Relevance
“…While people are not often aware of how their data are stored and managed (Visinescu et al, 2016), research has demonstrated that people in general are willing to forgo some protection of their private information, whether in aggregate or individually, if they stand to benefit from it (see Dinev & Hart, 2003). With the CPIP, researchers can now (1) measure how people feel about privacy protection in general, and (2) understand the different information privacy domains people most want to protect -psychological, technological, legal, and financial -to see where and why people may be willing to sacrifice their privacy.…”
Section: Discussionmentioning
confidence: 99%
“…While people are not often aware of how their data are stored and managed (Visinescu et al, 2016), research has demonstrated that people in general are willing to forgo some protection of their private information, whether in aggregate or individually, if they stand to benefit from it (see Dinev & Hart, 2003). With the CPIP, researchers can now (1) measure how people feel about privacy protection in general, and (2) understand the different information privacy domains people most want to protect -psychological, technological, legal, and financial -to see where and why people may be willing to sacrifice their privacy.…”
Section: Discussionmentioning
confidence: 99%
“…PMT is adopted in various IS research, mostly to explore online safety and security behaviors and relevant motivations that can encourage protection of both individuals and organizations. For example, Hooper and Blunt (2019) examined the factors that influence information security behavioral intentions of IT professionals while Visinescu et al (2016) investigated the mechanisms in threat and coping appraisal processes that influence protection strategies of individuals using cloud computing storage services (Storage as a Service [STaaS]). Jansen and van Schaik (2018) examined how fear appeal messages might impact online information sharing behavior showing their effectiveness in promoting security behaviors against phishing attacks.…”
Section: Theoretical Backgroundmentioning
confidence: 99%
“…PMT is adopted in various IS research, mostly to explore online safety and security behaviors and relevant motivations that can encourage protection of both individuals and organizations. For example, Hooper and Blunt (2019) examined the factors that influence information security behavioral intentions of IT professionals while Visinescu et al (2016) 1996)'s concern for information privacy instrument, privacy concerns regarding one's information disclosure involve several threats related to the collection, secondary use and sharing of personal information, as well as improper access from unauthorized entities, and errors in storage of such information by organizations and service providers. Since PMT focuses on how individuals respond when receiving threatening information about situations they are engaging in, it can be inferred that in the context of privacy, the act of disclosure (i.e., providing personal sensitive information to online providers) can be a risky behavior.…”
Section: Pmt and Privacy Threat Appraisalmentioning
confidence: 99%
“…The topic "Privacy of user information" is closely related to cloud technologies, since data storage in cloud services leads to certain risks for users [Li et al ., 2014;Chandramohan et al ., 2015;Visinescu et al ., 2016] . In addition, there is a connection between re- Note: the topic numbers and constructs are generated automatically, the topics are named by the authors after studying the content of each topic .…”
Section: Findings From the Topic Modelling Analysismentioning
confidence: 99%