Suche

Wo soll gesucht werden?
Erweiterte Literatursuche

Ariadne Pfad:

Inhalt

Literaturnachweis - Detailanzeige

 
Autor/inMaar, Michael C.
TitelAn Examination of Organizational Information Protection in the Era of Social Media: A Study of Social Network Security and Privacy Protection
Quelle(2013), (359 Seiten)
PDF als Volltext Verfügbarkeit 
Ph.D. Dissertation, Capella University
Spracheenglisch
Dokumenttypgedruckt; online; Monographie
ISBN978-1-2679-8935-2
SchlagwörterHochschulschrift; Dissertation; Social Networks; Information Security; Privacy; Motivation; Online Surveys; Structural Equation Models; Deception; Self Efficacy; Trust (Psychology); Ownership; Cost Effectiveness; Disclosure
AbstractThis study investigates information protection for professional users of online social networks. It addresses management's desire to motivate their employees to adopt protective measures while accessing online social networks and to help their employees improve their proficiency in information security and ability to detect deceptive practices. The study examines the protection motivation factors, privacy management practices, and their relationships. The privacy and security issues related to online social networks are discussed. A review of protection motivation theories and privacy management theories has been conducted. Combining protection motivation theories and communication privacy management, an integrated information protection model has been created. Motivating factors include perceived privacy threat, perceived security threat, perceived trustworthiness of online social networks, perceived deception threats, information security self-efficacy, response efficacy, benefit-cost ratio, personal norms, and habits. Privacy management practices are characterized by boundary permeability, boundary linkage, and boundary ownership. With respect to online social networks, these three privacy management constructs have been defined as breadth, depth, and frequency of information disclosure, control of social network connections, and control of sensitive information respectively. Based on the research model, a set of hypotheses have been developed for testing using online survey. The survey data has been analyzed using structural equation modeling and a more detailed model developed that is based on theories and findings from published studies. The findings confirm the hypotheses of the direct relations of the refined research model. Privacy, deception, and security concerns influence boundary permeability, linkage, and ownership respectively. Self-efficacy and response efficacy are positive motivators for social network connection and sensitive information control. Trust reduces privacy, deception, and security concerns. Trust enhances perception of benefits and efficacy. Aggravated security concern can depress self-efficacy. Personal norms and habits can be valuable drivers for information protection behavior. The integrated information protection model may be used to develop security promotion messages and training for employees to help them protect their personal private information and confidential business information. Future research may include larger samples, research in businesses or organizations, cross-cultural studies, other information sharing or collaboration environments, and meta-analysis. [The dissertation citations contained here are published with the permission of ProQuest LLC. Further reproduction is prohibited without permission. Copies of dissertations may be obtained by Telephone (800) 1-800-521-0600. Web page: http://www.proquest.com/en-US/products/dissertations/individuals.shtml.] (As Provided).
AnmerkungenProQuest LLC. 789 East Eisenhower Parkway, P.O. Box 1346, Ann Arbor, MI 48106. Tel: 800-521-0600; Web site: http://www.proquest.com/en-US/products/dissertations/individuals.shtml
Erfasst vonERIC (Education Resources Information Center), Washington, DC
Update2020/1/01
Literaturbeschaffung und Bestandsnachweise in Bibliotheken prüfen
 

Standortunabhängige Dienste
Die Wikipedia-ISBN-Suche verweist direkt auf eine Bezugsquelle Ihrer Wahl.
Tipps zum Auffinden elektronischer Volltexte im Video-Tutorial

Trefferlisten Einstellungen

Permalink als QR-Code

Permalink als QR-Code

Inhalt auf sozialen Plattformen teilen (nur vorhanden, wenn Javascript eingeschaltet ist)

Teile diese Seite: