Study on Personal Information Protection Behavior in Social Network Service Using Health Belief Model
نویسندگان
چکیده
منابع مشابه
Presenting the proposed model of health information social network
This article has no abstract.
متن کاملQualitative Study of Students' Information Sharing Behavior in Social Network Sites
Aim: The main purpose was to investigate the students’ information sharing behavior in social network sites with a qualitative approach. Methodology: An applied research with qualitative approach - A Thematic Analysis method was used. Population consisted of all the students at the Universities in South Khorasan Province affiliated with the Ministry of Science, Research and Technology who had ...
متن کاملExamining Information Disclosure Behavior on Social Network Sites Using Protection Motivation Theory, Trust and Risk
This paper reports on an empirical study that investigates the information disclosure behavior on Social Network Sites (SNS) focusing on undergraduate University students as our population. Although much have been reported on the issue of information privacy or privacy leakage on SNS, very few have employed the Protection Motivation Theory (PMT) as a framework to understand SNS user’s behavior ...
متن کاملDetermining the components of a health information social network based on a Delphi study
Background & Objective: In recent years, social networks have been considered by organizations active in the field of health and have provided many opportunities to Consulting, training and information sharing and promise to increase the quality and safety of health care and reduce costs, so it is necessary to study their dimensions and requirements. The purpose of this study is to identify the...
متن کاملDevelopment of Personal Information Protection Model using a Mobile Agent
This paper proposes a personal information protection model that allows a user to regulate his or her own personal information and privacy protection policies to receive services provided by a service provider without having to reveal personal information in a way that the user is opposed to. When the user needs to receive a service that requires personal information, the user will only reveal ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Journal of the Korea Institute of Information Security and Cryptology
سال: 2016
ISSN: 1598-3986
DOI: 10.13089/jkiisc.2016.26.6.1619