Not All Privacy Losses Cost the Same: Examining the Relative Perceived Trust Violation in a Hacking Versus Unauthorized Information Sharing Scenario

نویسندگان

  • Gaurav Bansal
  • Ellyn Hansen
  • Lijun Chen
چکیده

Using the attribution Theory, the study examines the relative trust loss in a hacking versus unauthorized information sharing by a Website. An experiment was conducted in which the respondents were asked to view a website and answer questions related to their trust, at two different phases both before and after reading the news scenario. The results of the study show that users experience significantly higher degree of trust drop when the website intentionally and unethically share the user data with other companies for data mining or other unauthorized purposes as opposed to information hacking by unknown hackers. The findings suggest that there is more to privacy than just exposure. Both the scenarios entailed exposure of the same number of user accounts, still the trust lost was greater for unauthorized sharing instead of hacking. It suggests that privacy is important, no doubt, however, the way it is lost, is important as well.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

تأثیر حریم خصوصی، امنیت و اعتماد ادراک شده بر رفتار به اشتراک‌گذاری اطلاعات در شبکه‌های اجتماعی موبایل: نقش تعدیل‌کننده متغیر جنسیت

The appearance of social networks has been one of the most important events in recent decades. One of the issues raised in these networks, is how to trust. The purpose of this paper is to examine the impact of security, trust and privacy about information sharing on mobile social networks. The study also describes how users' gender moderates the privacy and security impact on trust. The current...

متن کامل

Moderating Role of Perceived Health Status on Privacy Concern Factors and Intentions to Transact with High versus Low Trustworthy Health Websites

Prior research suggests four privacy concern factors namely 1) collection, 2) unauthorized secondary use, 3) improper access and 4) errors in handling one’s information. This research investigates the moderating role of perceived health status on the relationship between health information privacy concern factors and one’s intentions to transact with high trust websites (offering no discount) v...

متن کامل

The Relationship Between Patients’ Perceived Health Status and Trust Propensity With Privacy Calculus

Background: Patients need peace of mind to disclose their information to medical staff and with the lack of trust or in specific health status, they may avoid providing sensitive information for their care or might change the information. This research aims to examine the impact of perceived health status and trust propensity on privacy calculus. Methods: This research was analytical-study. 3 ...

متن کامل

Insider Privacy Breach and Trust Restoration: Is the CEO's Gender as Important as the CEO's Response?

In this study we use Politeness Theory to understand the trust violation and restoration process. The study examines the role of CEO gender, perceived CEO status, and response type (apology vs. denial) on restored trust and trusting beliefs in the case of an insider data breach incident. The data were collected using a scenario based experiment from students studying in a Midwestern University....

متن کامل

Incentive mechanism based on cooperative advertising for cost information sharing in a supply chain with competing retailers

This paper proposes a new motivation for information sharing in a decentralized channel consisting of a single manufacturer and two competing retailers. The manufacturer provides a common product to the retailers at the same wholesale price. Both retailers add their own values to the product and distribute it to consumers. Factors such as retail prices, values added to the product, and local ad...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2017