1990
DOI: 10.2307/248772
|View full text |Cite
|
Sign up to set email alerts
|

Key Information Liability Issues Facing Managers: Software Piracy, Proprietary Databases, and Individual Rights to Privacy

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
62
0

Year Published

1996
1996
2017
2017

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 112 publications
(63 citation statements)
references
References 20 publications
1
62
0
Order By: Relevance
“…This requires a new information infrastructure which, in turn, requires huge investments and therefore novel processes and procedures (Kahin, 1997). The transformation of information in a machinereadable format at the same time produces new problems, for example mobility and reproducibility (Straub & Collins, 1990). The technical use of information also suggests that information must be machine-readable and thus quantifiable (Bloomfield & Coombs, 1992).…”
Section: Definitions Of Informationmentioning
confidence: 99%
“…This requires a new information infrastructure which, in turn, requires huge investments and therefore novel processes and procedures (Kahin, 1997). The transformation of information in a machinereadable format at the same time produces new problems, for example mobility and reproducibility (Straub & Collins, 1990). The technical use of information also suggests that information must be machine-readable and thus quantifiable (Bloomfield & Coombs, 1992).…”
Section: Definitions Of Informationmentioning
confidence: 99%
“…This is a significant exclusion because such employees are likely to be most aware about the incidence of consumer privacy invasions, while at the same time, these employees may not realize the impact of such invasions. Recognizing these employee views will benefit managers as they are the organizational members who have oversight responsibility for information liability [12]. Such perceptions will provide the field with a basis for analyzing industry privacy practices.…”
Section: Theoretical Backgroundmentioning
confidence: 99%
“…When consumers provide their social security numbers, occupations, addresses, telephone numbers, income levels, loan amounts, medical conditions, and medical backgrounds, these details often lead to unwanted inclusion in commercial databases. These occurrences follow technological changes that emerged in the 1980s, and as a result the importance of information privacy has surfaced and new laws addressing information use have begun to emerge [10][11][12][13][14]. These are discussed below and include GLB, HIPAA, and Model State Emergency Health Powers Act of 2001 [10].…”
Section: Industry Privacy Issues and Is Frameworkmentioning
confidence: 99%
See 1 more Smart Citation
“…Drawing on prior research on information rights (Mason, 1986;Straub & Collins, 1990) and through theoretically integrating prior research, we propose that expectancies in relation to intellectual property rights and privacy exist inherently in the psychological contracts of all social network users and are key to their continuous involvement. To understand how a perceived breach of these expectancies affects social networks' sustainability, we draw on psychological contract theory and develop a framework on the impact of perceived psychological contract breaches on social network user behavior.…”
Section: Introductionmentioning
confidence: 99%