Andrew Boyd, Kaven Williams, Ron Chin, Scott Densten, Diana Diamond, Chris Morgenthaler 1.

Slides:



Advertisements
Similar presentations
Discourses and Framings of Climate Change: What Literatures Do We Need to Review? To realize synergies there is a need to indentify common objectives for.
Advertisements

Social Capital and Cultural Participation in the UK Evidence From National and International Survey Data Liam Delaney Economic and Social Research Institute.
QUALITATIVE RESEARCH SOCIAL METHODS SC20062 Leah Wild Week Four.
British Computer Society Professional Issues Les NealWolverhampton Jan 2003.
Police Leadership Review Horizon Scanning and Interpretation January 2015 Professor Harry Scarbrough.
The Relationship between Facebook and Body Esteem Comparing College Women Greta Hau & Molly Crabb Advised by: Susan Wolfgram Ph.D. University of Wisconsin-Stout.
On Techno-Economics of Mobile Internet THE ECONOMICS OF INFORMATION NETWORKS AND FUTURE INTERNET Economicum Heikki Hämmäinen TKK Comnet April, 2009.
Jessica TeBrake Is it Important for Employees to be Aware of Their Company’s Community Giving Efforts?
Paid Staff and Volunteers: Do Their Attitudes Differ? Riikka Teikari and Christeen George Abstract The aim of the present study was to explore whether.
Fundamentals of Information Systems, Second Edition 1 Telecommunications, the Internet, Intranets, and Extranets Chapter 4.
Amelia Asperin, Ph.D. - North Dakota State University WooMi Jo Phillips, Ph.D. - North Dakota State University Kara Wolfe, Ph.D.- Bradley University EXPLORING.
Sociology  Sociology is the study of society. It is a social science (a term with which it is sometimes synonymous) which uses various methods of empirical.
HATE SPEECH. Content of the presentation Definition of hate speech Online manifestations Impacts on young people Practices online.
AN INVESTIGATION INTO PUBLIC ATTITUDES, AWARENESS AND ACTIONS TOWARDS CLIMATE CHANGE. MALCOLM MCMILLAN Dissertation submitted (in part) for Bachelor of.
Culture and psychological knowledge: A Recap
12/04/2006 Understanding & Predicting E-commerce Adoption: An Extension of the Theory of Planned Behavior (MIS Quarterly March 2006) Presented by: Yasmine.
Privacy in Social Networks CSCE 201. Reading Dwyer, Hiltz, Passerini, Trust and privacy concern within social networking sites: A comparison of Facebook.
Research Update- July 11, 2009 Andrew Boyd 1.  Study recap  Status of bibliographical research  Problems with mental models  Model revision and re-design.
Educational Psychology revision session
VOCATION AS CALLING: THE ROLE OF GENDER IN VOCATIONAL DISCERNMENT AND ACTION AMONG FIRST-YEAR COLLEGE STUDENTS Cindy Miller-Perrin Don Thompson Research.
Mohammad Salehan Department of ITDS University of North Texas.
Health IT RESTful Application Programming Interface (API) Security Considerations Transport & Security Standards Workgroup March 18, 2015.
EDUC 3400 Glenys MacLeod. Intent: 1. Review course outline, assignments and timeline, 2. What is sociology? 3. What are the characteristics of our society?
MSc Health Promotion and Public Health Dr Wendy Martin Programme Leader Brunel University.
Team 2 Andrew Boyd Kaven Williams.  Privacy, Security and Compliance Issues  Current State of Research  Implications  Areas of Research Opportunity.
The Effect of Quality Matters™ on Faculty’s Online Self-efficacy DLA Conference 2010 Jim Wright, Ed.S. June 9, 2010.
SMART GRID: Privacy Awareness and Training – Information for Consumers A Starting Point April 2012 SGIP-CSWG Privacy Group 1 DRAFT v8.
INTERNET- A BOON OR A CURSE AYUSHI PRADHAN. WHAT IS IT? Internet or INTERnational NETwork is a network of networks that crisscrosses the globe and even.
 Examines the nature of culture and the diverse ways in which societies make meaning and are organized across time and space. Topics include cultural.
電管碩一 R 凌伊亭 Social Media Use In a Mobile Broadband Environment : Examination of Determinants of Twitter and Facebook Use International Journal of.
Media & Learning Online behaviour and its impact on media supported learning Brussels, 12 December 2013 Teens, privacy and online security Alessandro Mantelero.
Representation of Europe Commonalities and national differences Paszkál Kiss EuroPhD on S.R. & C. Roma, 2005.
Chapter 11: Qualitative and Mixed-Method Research Design
EIT ICT Labs ICT Innovation & Education & Business Our mission is to foster innovative technology and entrepreneurial talent for economic growth and quality.
Communication Planning for the International Asteroid Warning Network Linda Billings, Ph.D., National Institute of Aerospace, USA; Consultant to NASA’s.
A Study on the knowledge, attitudes and practices about solid waste management among Taghbostan mountain climbers Dr. Seyyed Alireza Mousavi Narjes Ozairi.
Network of Excellence in Internet Science Network of Excellence in Internet Science (EINS) 1 st REVIEW Brussels, 12th April 2013 FP7-ICT
Fundamentals of Information Systems, Second Edition 1 Telecommunications, the Internet, Intranets, and Extranets.
Consumer Confidence in Food Risk Management in Europe Results from a multi-phase study E Van Kleef, J Houghton, G Rowe & L Frewer SRA-E, September.
Measuring Crime There are 3 main methods of collecting information: Official Statistics Victim Surveys Self-Report Studies.
By Jordan Snyder. The relationship between a person’s age (minimum 15 years) and the number of various ways a person uses mobile phones in everyday life.
Geneva, Switzerland, September 2014 Considerations for implementing secure enterprise mobility Eileen Bridges Aetna GIS Director.
School of Journalism, Lomonosov Moscow State University Russian Internet Users’ Perception of Ethnic Groups. Empirical Findings Anna Gladkova, Faculty.
Mobile Usage Patterns and Privacy Implications Michael Mitchell March 27, 2015 Ratnesh Patidar, Manik Saini, Parteek Singh, An-I Wang Florida State University.
FCD CWI 1 The Foundation for Child Development Index of Child Well- Being (CWI) 1975 to 2004 with Projections for 2005 A Social Indicators Project Supported.
The Gender Gap on Public Opinion towards Genetically Modified Foods Laurel Elder Department of Political Science Hartwick College Steven Greene Department.
Measuring the impact of Technology on Quality of Services and Operations in an Academic Library Ashok Kumar Sahu Senior Librarian, IIMT Gulam Rasul Asst.
CHAPTER 17 INTERNATIONAL MARKETING IN E-COMMERCE.
Global Contexts Global contexts direct learning towards independent and shared inquiry into our common humanity and shared guardianship of the planet.
Fundamentals of Information Systems, Second Edition 1 Telecommunications, the Internet, Intranets, and Extranets.
TEACHER RESEARCH: BECOMING A RESEARCHER BY INQUIRING INTO TEACHING PRACTICES MARJOLEIN DOBBER.
Personalization versus Privacy Ramnath K. Chellappa Raymond G. Sin Chanhong Min.
Age and Social Networking Use Angelica Craig EDTC 5103 March 2011.
PRIVACY, LAW & ETHICS MBA 563. Source: eMarketing eXcellence Chaffey et al. BH Overview: Establishing trust and confidence in the online world.
Grand Canyon University-PSY-550 December 11, 2013 Raymond Williams.
Human Factors in Cyber Security: A Review for Research & Education P. Vigneswara Ilavarasan, PhD 1.
Communities and Portals Lan Zhang School of Information University of Texas at Austin.
Social research LECTURE 5. PLAN Social research and its foundation Quantitative / qualitative research Sociological paradigms (points of view) Sociological.
Overall NSW Health 2011 YourSay Survey Results YourSay - NSW Health Workplace Survey Results Presentation NSW Health Overall Presented by: Robyn Burley.
Dissertation Research: Managing Visual Privacy in Web Browsers Dr. Kirstie Hawkey Dalhousie University.
Protecting Children from Bullying and Cyberbullying: Awareness Raising and Public Policies: Some examples from Ireland Brian O’Neill Dublin Institute of.
Children with disabilities in the digital environment Gerison Lansdown
Created by Ryan Smith, MSW PPS
E-Learning The Role Model Technology
Blockchain Technology and IoT Security Andy Wang March 21, 2018
Personal profiles in VLE forums: do students use them?
Brian O’Neill Dublin Institute of Technology 9/10 May Florence
Learning through Doing, Learning through Sharing Linking Museum Theory and Practice through Professional Work Placements Dr Rosie Spooner
Educational Research Project Title
Presentation transcript:

Andrew Boyd, Kaven Williams, Ron Chin, Scott Densten, Diana Diamond, Chris Morgenthaler 1

 Privacy, Security and Compliance  Current State of Research  IUIPC Model  Study Design  Initial Results  Implications of Findings  Future Directions for Research  Questions 2

 This topic sits at the intersection of: ◦ Psychology ◦ Management Theory and Corporate Governance ◦ Economic Social Utility, Social Contract and Social Network Theory ◦ Computer Science  It has an impact on: ◦ Civil and Criminal Statutes ◦ Economic Behaviour ◦ Civil Rights and Freedoms ◦ Systems Architecture and Development ◦ The interplay between ‘Personal’ and ‘Public’ space 3

 Various historical models for online privacy attitudes  Many theoretical models- a dearth of empirical studies  Main empirical construct is IUIPC  Internet User Information privacy Concern  IUIPC draws upon Social Contract theory ◦ Presents a theoretical framework based on attitudes and interdependencies towards:  Collection  Control  Awareness of personal information ◦ These dimensions also form some of the principles behind many privacy statutes in North America and Europe. 4

 Great for attitudes, not so good for demographics  May be biased towards overstating privacy concerns  Clearly highlights gap between attitudes and behaviours  Our research team extended IUIPC to include a wider range of demographic co-variants (as a precursor to establishing new models for attitudes and behaviours) 5

6

 IUIPC- Internet User’s Information Privacy Concerns  Multi-dimensional attitudinal survey scaled on a Seven Point Likert Scale  Mixed in with behavioural questions about social media membership and usage  Distributed via Pace , and personal networks of team members  Ran March 1- April 30, 2009  481 respondents, 390 completed 7

8 NumberHypothesisPreliminary Finding H1 Social media privacy attitudes vary by age. Supported H2 Social media privacy attitudes vary by education. Supported H3 Social media privacy attitudes vary by internet experience. Not Supported H4 Social media privacy attitudes vary by ethnicity. Supported H5 Social media privacy attitudes vary by gender. Supported H6 Social media privacy attitudes vary by individual’s sense of victimization. Supported H7 Social media privacy attitudes vary by importance of a large group of friends. Not Supported H8 Social media privacy attitudes vary by media exposure to social media risks. Not Supported H9 Social media privacy attitudes vary by online context. Not Supported

 Leveling of privacy attitudes across age groups  Ambiguities towards trust of social networking sites  Knowledge, experience and comfort lead to increased disclosure  Context Matters- Online Normative Behaviour 9

 Examine forces behind leveling of privacy concerns across age groups  Define ambiguities in trust attitudes towards social networking sites  Discover why ‘familiarity breeds nonchalance’  Establish the role of context (normative behaviour) in online attitudes and behaviours 10

? 11