2015
DOI: 10.1016/j.dss.2015.01.009
|View full text |Cite
|
Sign up to set email alerts
|

Trust violation and repair: The information privacy perspective

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

2
96
0

Year Published

2016
2016
2024
2024

Publication Types

Select...
5
2
2

Relationship

1
8

Authors

Journals

citations
Cited by 103 publications
(98 citation statements)
references
References 73 publications
2
96
0
Order By: Relevance
“…It has been shown that trust plays an important role not only in ecommerce [14,88], but also in online health care [138] and banking [41,62]. We focus on trust as the salient attitude in disclosing private information online, since trust determines the extent to which people are willing to reveal sensitive information [52] to the business entity that owns the website [8].…”
Section: Trust Attitudementioning
confidence: 99%
“…It has been shown that trust plays an important role not only in ecommerce [14,88], but also in online health care [138] and banking [41,62]. We focus on trust as the salient attitude in disclosing private information online, since trust determines the extent to which people are willing to reveal sensitive information [52] to the business entity that owns the website [8].…”
Section: Trust Attitudementioning
confidence: 99%
“…They found that when there is weak evidence against the organization trust is restored more successfully with denial. Bansal and Zahedi (2015) Empirical study Shows the effect of intentional and unintentional trust violation from an online privacy perspective and the consequence on trust. Bozic (2017) Literature review Reviews the extant literature on trust repair.…”
Section: Trust Repairmentioning
confidence: 99%
“…What is novel is how they apply brain imaging technologies-magnetic resonance imaging (fMRI) and electroencephalography (EEG) to explain selfcontrol as an inhibitor of desire for immediate gratification and how low self-control could short circuit moral judgement and rational choice. There were instances where scholarly work was coded for two or more theories used by scholars to explain information security policy violations (Aurigemma & Mattson, 2014;Bansal & Zahedi, 2015;Barlow et al, 2013;Browne et al, 2015;Cheng et al, 2013). An important consideration arising from the previous sections that have addressed various perspectives of scholarly work on IS security policy violation is the omission of the paradox perspective to problematize IS security violations.…”
Section: Interdisciplinary Perspectives In Is Security Policy Violationmentioning
confidence: 99%
“…Emotional displeasure and tensions are bound to occur on either choice of use. Bansal and Zahedi (2015) in their use of Attribution theory talk of emotional displeasures that result from changes in ways people have previously interacted with systems and this often becoming a cause for violations of these systems. The paradox is that unavoidably, change must happen, but change is not pleasurable.…”
Section: The Paradox Perspective In Is Security Policy Violation Learmentioning
confidence: 99%