Security Concerns in the Nomological Network of Trust and Big 5: First Order Vs. Second Order
نویسنده
چکیده
Even though Privacy concerns (PC) and security concerns (SC) are acknowledged as separate constructs, many studies argue that they are related or, even worse, confused. Building upon the non-overlapping SC and PC dimensions, we propose Internet Users Information Transmission Security Concern (IUITSC) scale. We argue that the scale when used in conjunction with PC scale would cover the entire gamut of SC-PC. The construct is tested in a nomological network of Big 5 and trust. The results based on extensive statistical tests including chi-square difference tests suggest that IUITSC may be represented as a second-order factor structure rather than a set of four first-order factors. The results show that personality dimensions of conscientiousness, emotional instability and extraversion are positively associated with IUITSC (second order), which in turn is found to significantly lower trust in a website. Big5 dimensions are found to impact the IUITSC differently depending upon the factor structure.
منابع مشابه
Privacy and Security of Big Data in THE Cloud
Big data has been arising a growing interest in both scien- tific and industrial fields for its potential value. However, before employing big data technology into massive appli- cations, a basic but also principle topic should be investigated: security and privacy. One of the biggest concerns of big data is privacy. However, the study on big data privacy is still at a very early stage. Many or...
متن کاملPrivacy and Security of Big Data in THE Cloud
Big data has been arising a growing interest in both scien- tific and industrial fields for its potential value. However, before employing big data technology into massive appli- cations, a basic but also principle topic should be investigated: security and privacy. One of the biggest concerns of big data is privacy. However, the study on big data privacy is still at a very early stage. Many or...
متن کاملSignificant Characteristics of Multi Carrier Energy Networks for Integration of Plug-In Electric Vehicles to Electric Distribution Network
One of the big concerns of big cities is facing with the increase of fossil fuel vehicles in the roads. The cars intensify greenhouse gas emission in civic centers. One approach to reduce the emission is replacing the cars by Plug-In Electric Vehicles (PEVs). In spite of reducing the emission, PEVs have some adverse effect on electric distribution networks. Technical challenges such as load and...
متن کاملA New Approach to Testing Nomological Validity and Its Application to a Second-Order Measurement Model of Trust
Research Article Liping Liu The University of Akron [email protected] Chan Li The University of Pittsburgh [email protected] Dan Zhu Iowa State University [email protected] This paper examines the concept of the nomological validity of secondand/or higher-order measurement models. It also proposes a new approach that consists of measuring two validity indices — predictive and mediating efficiencies...
متن کاملDesigning a trust-based recommender system in Social Rating Networks
One of the most common styles of business today is electronic business, since it is considered as a principal mean for financial transactions among advanced countries. In view of the fact that due to the evolution of human knowledge and the increase of expectations following that, traditional marketing in electronic business cannot meet current generation’s needs, in order to survive, organizat...
متن کامل