Karen H. Smith Garry L. White McCoy College of Business Administration

Slides:



Advertisements
Similar presentations
Managing Cyber-Identity, Authorization and Trust (and their inter-relationships) Prof. Ravi Sandhu Laboratory for Information Security Technology George.
Advertisements

Why the Right to Data Portability Likely Reduces Consumer Welfare: Antitrust and Privacy Critique Peter Swire Moritz College of Law Yale Law School Information.
Why the Right to Data Portability Likely Reduces Consumer Welfare: Antitrust and Privacy Critique Peter Swire Moritz College of Law Attorneys General Education.
The Other Type of Networking: Social Networks using the Internet Dr.Mike Neal Nicole S. Horn University of Kansas March 11,2009.
What to Know, What to Do Presentation Powered By: The Federal Trade Commission Consumer Protection Toolkit.
Lesson 8.5 Identity Theft July 2011Copyright © … REMTECH, inc … All Rights Reserved1 Introduction Identity theft occurs when someone steals some.
Identity Theft What you need to know Betty White, April 2010.
Resolutions Grassroots Public Policy AAFCS Public Policy Committee.
Hub and Spoke What can a SIG do for you? What can you do for the SIG? What is the scope of this network? What do the spokes look like? What does the hub.
24.3 The Progressive Movement. Government Reform  In the early 1900s reformers known as progressives worked to improve society.  Progressive means “forward.
Privacy in Social Networks CSCE 201. Reading Dwyer, Hiltz, Passerini, Trust and privacy concern within social networking sites: A comparison of Facebook.
Quantifying Privacy Choices with Experimental Economics College of Management North Carolina State University WEIS Harvard University June 2-3, 2005 David.
Chapter 8 Facebook: Building a Business from the Social Graph Laila Esmail BUS 550- Spring 2011 May 17, 2011.
1 Information and Systems Security/Compliance Security Day The Information and Systems Security/Compliance Program Dave Kovarik.
Security of Computerized Medical Information: Threats from Authorized Users James G. Anderson, Ph.D. Purdue University.
Privacy Safety on the Internet. Tips on Prevention  Check to see if website is secure  A padlock icon in the corner indicates a security certificate.
Chi Chapter-Pi Omega Pi New York City Conference, 2007 Social Networking: What Business Educators Need To Know Lisa Lewis Matthew Lutton Chi Chapter Indiana.
Contextualised Concerns The Online Privacy Attitudes of Young Adults Michael DowdAugust 2010.
NTIA Privacy Multistakeholder Meeting March 25, 2014 Amanda Koulousias, Attorney Division of Privacy and Identity Protection Federal Trade Commission FTC.
Genderization of Social Media By: Rakhi, Lisa, Mary, and Tricia.
“Privacy Implications of RFID Technology in Health Care Settings” Marc Rotenberg President EPIC Dept. of Health & Human Services Washington, DC 11 January.
Looking for a Job Networking  Family  Friends  Professional colleagues Direct Contact  Call employers directly Newspapers, Magazines, and Trade Journals.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
BITS Proprietary and Confidential © BITS Security and Technology Risks: Risk Mitigation Activities of US Financial Institutions John Carlson Senior.
1 General Awareness Training Security Awareness Module 1 Overview and Requirements.
Private and Confidential. Levels of Identity Verification Is this person who they claim to be? Knowledge based Authentication Is this a real identity?
Enterprise data (decentralized control, data security and privacy) Incident Response: State and Federal Law Rodney Petersen Security Task Force Coordinator.
Self-Assessment and Formulation of a National Cyber security/ciip Strategy: culture of security.
1 Identity and Transparency ( Bridging the GAPS of Governance Bridging the GAPS of Governance in eGov Initiatives in eGov Initiatives )‏ Badri Sriraman.
The Benefits and Impacts of Facebook By Kidest Araya March 15, 2012.
Fraud Examination, 3E Chapter 15: Consumer Fraud COPYRIGHT © 2009 South-Western, a part of Cengage Learning.
Do they perceive the risks? TEENS AND SOCIAL NETWORKING.
Health Information Technology The Texas Landscape Presentation to TASSCC 2010 Nora Belcher Texas e-Health Alliance August 3, 2010.
How to safely use Facebook. Ken Loveday. TIPS FOR PROTECTING PERSONAL INFORMATION FACEBOOK LOGIN  Required Info  Name   Password  Birthday.
Security and Privacy Concerns Izzat Alsmadi, Assistant Research Professor, BSU.
Internet Privacy By Joel Bryner. The Right to Internet Privacy The right to Internet privacy, like the right to common privacy, is the lawful privilege.
Can We Keep Our Kids Safe on the Internet? By Kim Hollingsworth - ETEC 562.
Social Networking and Protecting Your Identity. Popular Social Networks Myspace Facebook Youtube Twitter.
Targeted Behavioral Advertising Ariel Pierre Section 001.
MEDIA & COMMUNICATIONS.  More than 800 million Facebook users  Over 100 million Twitter users  64 million LinkedIn users in North America alone  1.
Government functions in the Economy  Stabilize the economy  Provide Public Goods  Regulation of Business, Labor, Agriculture  Redistribute Income…Entitlements.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Identity Theft One of America's fastest growing crimes.
© 2009 Cengage Learning. All Rights Reserved. Regulating Hospitals.
PROTECTING YOUR CREDIT PG NAME, TEACHER AND DATE.
Protecting Yourself from Fraud including Identity Theft Advanced Level.
Consumer and Provider Education and Engagement Breakout Session Betsy Abramson, Wisconsin Coalition Against Domestic Violence Alison Bergum, UW Population.
>>0 >>1 >> 2 >> 3 >> 4 >> Privacy and SNS in China Comundus-European Master of Arts in Media, Communication and Cultural Study Jin PENG the case of xiaonei.com.
CMGT 411 Week 3 DQ 3 What are the components of the Federated identity management and are they addressed in White House (2011) Reference White House (2011).
It Matters What We Say: Nutritional Claims on Product Packaging
Combating Identity Fraud In A Virtual World
Part 7 Business and the Consumer
Public Perceptions of Drones Used for Weather-Related Purposes
Guidance for the Cloud: An EU Example - CloudWatch
Social networking risks and benefits.
David P. Reed MIT CFP Draft May 2007
Helping Veterans to Protect their Identity and Online Privacy
ALL ABOUT THE FTC By: Brandon Baldwin.
Introduction to Sociology
Looking for a Job Networking Direct Contact
Educational Oversight Group
Youthlink Members Network
Ann MacPhail, University of Limerick, Ireland
MANG 2049: Introduction - Self test & digital visitor/resident
THE 13TH NATIONAL HIPAA SUMMIT HEALTH INFORMATION PRIVACY & SECURITY IN SHARED HEALTH RECORD SYSTEMS SEPTEMBER 26, 2006 Paul T. Smith, Esq. Partner,
FACTORING PUBLIC SENTIMENT ON CYBERCRIME
Tobey Clark, Director*, Burlington USA
Medicaid <133% FPL 26 million
Educational Oversight Group
KC-ROLO Project Kidderminster College – Repository Of Learning Objects
Presentation transcript:

Knowledge of and Vigilance toward Security and Privacy Risks by Facebook Users Karen H. Smith Garry L. White McCoy College of Business Administration Texas State University-San Marcos

The Problem Identity theft – 10 million Americans in 2008 Cybercrime – up 668% from 2001-2009 Social sharing increases risks Facebook – 500 million active users Benefits – enhance relationships Risks – privacy and security

Knowledge Federal Privacy Act of 1974 (Federal Trade Commission 2007) Importance of knowledge about security and privacy risks (Nowak and Phelps 1995; Peltier, Milne, and Phelps 2009; Anderson 2010)

Vigilance Vigilance construct (Matthews, Davies, and Holley 1993) Importance of vigilance (Ramsey and Venkatesan 2010; Reisz 2005) Vigilance uses cognitive resources (Warm Parasuraman, and Matthews 2008 Vigilance decrement (Parasuraman 1987) Privacy paradox (Norberg, Horne, and Horne 2007)

Narcissism Narcissism construct (Raskin and Terry 1988) Narcissism and Social Networking (Buffardi and Campbell 2008)

Hypotheses Consumers who lack knowledge about how to protect themselves from the security and privacy risks of Facebook tend to be less vigilant than knowledgeable consumers. Consumers who are concerned with security and privacy on Facebook tend to rely on technology for protection rather than their own vigilance. Consumers who are narcissistic tend to post more personal information on Facebook. Consumers who are narcissistic tend to be less vigilant than other consumers.

Research Methods Focus groups – funded Nationwide survey –funding needed Measures Knowledge (objective test developed by researchers) Narcissism scale (Raskin and Terry 1988) Vigilance (scale developed by researchers)