Security Concerns in the Nomological Network of Trust and Big 5: First Order Vs. Second Order

نویسنده

  • Gaurav Bansal
چکیده

Even though Privacy concerns (PC) and security concerns (SC) are acknowledged as separate constructs, many studies argue that they are related or, even worse, confused. Building upon the non-overlapping SC and PC dimensions, we propose Internet Users Information Transmission Security Concern (IUITSC) scale. We argue that the scale when used in conjunction with PC scale would cover the entire gamut of SC-PC. The construct is tested in a nomological network of Big 5 and trust. The results based on extensive statistical tests including chi-square difference tests suggest that IUITSC may be represented as a second-order factor structure rather than a set of four first-order factors. The results show that personality dimensions of conscientiousness, emotional instability and extraversion are positively associated with IUITSC (second order), which in turn is found to significantly lower trust in a website. Big5 dimensions are found to impact the IUITSC differently depending upon the factor structure.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Privacy and Security of Big Data in THE Cloud

Big data has been arising a growing interest in both scien- tific and industrial fields for its potential value. However, before employing big data technology into massive appli- cations, a basic but also principle topic should be investigated: security and privacy. One of the biggest concerns of big data is privacy. However, the study on big data privacy is still at a very early stage. Many or...

متن کامل

Privacy and Security of Big Data in THE Cloud

Big data has been arising a growing interest in both scien- tific and industrial fields for its potential value. However, before employing big data technology into massive appli- cations, a basic but also principle topic should be investigated: security and privacy. One of the biggest concerns of big data is privacy. However, the study on big data privacy is still at a very early stage. Many or...

متن کامل

Significant Characteristics of Multi Carrier Energy Networks for Integration of Plug-In Electric Vehicles to Electric Distribution Network

One of the big concerns of big cities is facing with the increase of fossil fuel vehicles in the roads. The cars intensify greenhouse gas emission in civic centers. One approach to reduce the emission is replacing the cars by Plug-In Electric Vehicles (PEVs). In spite of reducing the emission, PEVs have some adverse effect on electric distribution networks. Technical challenges such as load and...

متن کامل

A New Approach to Testing Nomological Validity and Its Application to a Second-Order Measurement Model of Trust

Research Article Liping Liu The University of Akron [email protected] Chan Li The University of Pittsburgh [email protected] Dan Zhu Iowa State University [email protected] This paper examines the concept of the nomological validity of secondand/or higher-order measurement models. It also proposes a new approach that consists of measuring two validity indices — predictive and mediating efficiencies...

متن کامل

Designing a trust-based recommender system in Social Rating Networks

One of the most common styles of business today is electronic business, since it is considered as a principal mean for financial transactions among advanced countries. In view of the fact that due to the evolution of human knowledge and the increase of expectations following that, traditional marketing in electronic business cannot meet current generation’s needs, in order to survive, organizat...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2011