Dissertations / Theses on the topic 'Privacy Calculus'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 33 dissertations / theses for your research on the topic 'Privacy Calculus.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.
Doig, Jennifer Michelle. "Impact of online privacy concerns and brand reputation on consumer willingness to provide personal information." Thesis, Queensland University of Technology, 2016. https://eprints.qut.edu.au/91648/1/Jennifer_Doig_Thesis.pdf.
Full textWilson, David W. "Overcoming Information Privacy Concerns: Learning from Three Disclosure Contexts." Diss., The University of Arizona, 2015. http://hdl.handle.net/10150/555938.
Full textHosseini, Shaghayegh, and Anas Dahan. "Willingness to be Targeted byPersonalized Online Advertising : A Cross-Cultural Study on Privacy Calculus." Thesis, Mälardalens högskola, Akademin för ekonomi, samhälle och teknik, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:mdh:diva-48625.
Full textMohammed, Zareef. "The Role of Cognitive Disposition in Re-examining the Privacy Paradox: A Neuroscience Study." NSUWorks, 2017. http://nsuworks.nova.edu/gscis_etd/997.
Full textWagner, Amina [Verfasser], Peter [Akademischer Betreuer] Buxmann, and Alexander [Akademischer Betreuer] Benlian. "Beyond the Privacy Calculus: Dynamics Behind Online Self-Disclosure / Amina Wagner ; Peter Buxmann, Alexander Benlian." Darmstadt : Universitäts- und Landesbibliothek, 2021. http://d-nb.info/1237816874/34.
Full textAlemany, Bordera José. "Measures of Privacy Protection on Social Environments." Doctoral thesis, Universitat Politècnica de València, 2020. http://hdl.handle.net/10251/151456.
Full text[ES] En la actualidad, las redes sociales se han convertido en un fenómeno cultural dominante para millones de usuarios de Internet. Las redes sociales son un entorno ideal para la generación de todo tipo de beneficios sociales para los usuarios. Los usuarios comparten experiencias, mantienen el contacto con sus familiares, amigos y conocidos, y obtienen beneficios económicos gracias al poder de su influencia (lo que se traduce en nuevas oportunidades de trabajo). Sin embargo, el uso de las redes sociales y la acción de compartir información implica la perdida de la privacidad de los usuarios. Recientemente ha emergido un gran interés en proteger la privacidad de los usuarios. Esta situación se ha debido a los casos de arrepentimientos documentados en las acciones de los usuarios, escándalos empresariales producidos por usos indebidos de la información personal, y a los sesgos que introducen los mecanismos de privacidad. Los proveedores de redes sociales han incluido mejoras en sus sistemas para reducir los riesgos en privacidad de los usuarios; por ejemplo, restringiendo las políticas de privacidad por defecto, añadiendo nuevos elementos de configuración de la privacidad, y diseñando accesos fáciles y directos para configurar la privacidad de los usuarios. En el campo de la investigación de la privacidad, nuevos avances se proponen para mejorar los mecanismos de privacidad la mayoría centrados en la automatización, selección de grano fino, y uso de características extraídas de la información y sus interacciones para recomendar la mejor política de privacidad para el usuario. A pesar de estos avances, muchos estudios han demostrado que la preocupación de los usuarios por la privacidad no se corresponde con las decisiones que finalmente toman en las redes sociales. Este desajuste en el comportamiento de los usuarios podría deberse a la complejidad del propio concepto de privacidad. Este inconveniente hace que los usuarios ignoren los riesgos de privacidad, o los perciban como temporalmente distantes. Otra causa del desajuste en el comportamiento de los usuarios podría deberse a la complejidad del proceso de toma de decisiones sobre la privacidad. Esto se debe a que los usuarios deben considerar todos los escenarios posibles y los factores involucrados (por ejemplo, el número de amigos, el tipo de relación, el contexto de la información, etc.) para tomar una decisión apropiada sobre la privacidad. Las principales contribuciones de esta tesis son el desarrollo de métricas para evaluar los riesgos de privacidad, y la propuesta de mecanismos de privacidad explicables (haciendo uso de las métricas desarrolladas) para asistir y concienciar a los usuarios durante el proceso de decisión sobre la privacidad. Atendiendo a la definición del concepto de la privacidad, las dimensiones del alcance de la información y la sensibilidad de la información se han considerado en esta tesis para evaluar los riesgos de privacidad. En cuanto a los mecanismos de privacidad explicables, se han diseñado utilizando técnicas de paternalismo blando y elementos de gamificación que hacen uso de las métricas propuestas. Estos mecanismos se han integrado en la red social PESEDIA y evaluado en experimentos con usuarios reales. PESEDIA es una red social desarrollada en el marco de la tesina de Master del doctorando [15], esta tesis y los proyectos nacionales “Privacidad en Entornos Sociales Educativos durante la Infancia y la Adolescencia” (TIN2014-55206-R) y “Agentes inteligentes para asesorar en privacidad en redes sociales” (TIN2017-89156-R). Los resultados confirman la validez de las métricas propuestas para calcular el alcance de los usuarios y la sensibilidad de las publicaciones de las redes sociales. En cuanto a la métrica del alcance, los resultados también mostraron la posibilidad de estimarla mediante métricas de centralidad local y social para escenarios con acceso limitado a la información. En cuanto a la métrica de sensibilidad, los resultados también pusieron de manifiesto la falta de concordancia de los usuarios en el caso de algunos tipos de información y el consenso en el caso de la mayoría de ellos. El uso de estas métricas como parte de los mensajes sobre las posibles consecuencias de las opciones de política de privacidad y las acciones de intercambio de información a los usuarios mostró efectos positivos en el comportamiento de los usuarios con respecto a la privacidad. Además, los resultados de la exploración de la compensación de los usuarios entre los costos y los beneficios durante las acciones de divulgación de información personal mostraron relaciones significativas con los círculos sociales habituales (familiares, amigos, compañeros de trabajo y usuarios desconocidos) y sus propiedades. Esto permitió diseñar mejores mecanismos de privacidad que restringen adecuadamente el acceso a la información y reducen los arrepentimientos. Por último, los elementos de gamificación aplicados a las redes sociales y a la privacidad de los usuarios mostraron un efecto positivo en el comportamiento de los usuarios hacia la privacidad y las prácticas seguras en las redes sociales.
[CA] En l’actualitat, les xarxes socials s’han convertit en un fenomen cultural dominant per a milions d’usuaris d’Internet. Les xarxes socials són un entorn ideal per a la generació de tota mena de beneficis socials per als usuaris. Els usuaris comparteixen experiències, mantenen el contacte amb els seus familiars, amics i coneguts, i obtenen beneficis econòmics gràcies al poder de la seva influència (el que es tradueix en noves oportunitats de treball). No obstant això, l’ús de les xarxes socials i l’acció de compartir informació implica la perduda de la privacitat dels usuaris. Recentment ha emergit un gran interès per protegir la privacitat dels usuaris. Aquesta situació s’ha degut als casos de penediments documentats en les accions dels usuaris, escàndols empresarials produïts per usos indeguts de la informació personal, i als caires que introdueixen els mecanismes de privacitat. Els proveïdors de xarxes socials han inclòs millores en els seus sistemes per a reduir els riscos en privacitat dels usuaris; per exemple, restringint les polítiques de privacitat per defecte, afegint nous elements de configuració de la privacitat, i dissenyant accessos fàcils i directes per a configurar la privacitat dels usuaris. En el camp de la recerca de la privacitat, nous avanços es proposen per a millorar els mecanismes de privacitat la majoria centrats en l’automatització, selecció de gra fi, i ús de característiques extretes de la informació i les seues interaccions per a recomanar la millor política de privacitat per a l’usuari. Malgrat aquests avanços, molts estudis han demostrat que la preocupació dels usuaris per la privacitat no es correspon amb les decisions que finalment prenen en les xarxes socials. Aquesta desalineació en el comportament dels usuaris podria deure’s a la complexitat del propi concepte de privacitat. Aquest inconvenient fa que els usuaris ignorin els riscos de privacitat, o els percebin com temporalment distants. Una altra causa de la desalineació en el comportament dels usuaris podria deure’s a la complexitat del procés de presa de decisions sobre la privacitat. Això es deu al fet que els usuaris han de considerar tots els escenaris possibles i els factors involucrats (per exemple, el nombre d’amics, el tipus de relació, el context de la informació, etc.) per a prendre una decisió apropiada sobre la privacitat. Les principals contribucions d’aquesta tesi són el desenvolupament de mètriques per a avaluar els riscos de privacitat, i la proposta de mecanismes de privacitat explicables (fent ús de les mètriques desenvolupades) per a assistir i conscienciar als usuaris durant el procés de decisió sobre la privacitat. Atesa la definició del concepte de la privacitat, les dimensions de l’abast de la informació i la sensibilitat de la informació s’han considerat en aquesta tesi per a avaluar els riscos de privacitat. Respecte als mecanismes de privacitat explicables, aquests s’han dissenyat utilitzant tècniques de paternalisme bla i elements de gamificació que fan ús de les mètriques propostes. Aquests mecanismes s’han integrat en la xarxa social PESEDIA i avaluat en experiments amb usuaris reals. PESEDIA és una xarxa social desenvolupada en el marc de la tesina de Màster del doctorant [15], aquesta tesi i els projectes nacionals “Privacitat en Entorns Socials Educatius durant la Infància i l’Adolescència” (TIN2014-55206-R) i “Agents Intel·ligents per a assessorar en Privacitat en xarxes socials” (TIN2017-89156-R). Els resultats confirmen la validesa de les mètriques propostes per a calcular l’abast de les accions dels usuaris i la sensibilitat de les publicacions de les xarxes socials. Respecte a la mètrica de l’abast, els resultats també van mostrar la possibilitat d’estimarla mitjançant mètriques de centralitat local i social per a escenaris amb accés limitat a la informació. Respecte a la mètrica de sensibilitat, els resultats també van posar de manifest la falta de concordança dels usuaris en el cas d’alguns tipus d’informació i el consens en el cas de la majoria d’ells. L’ús d’aquestes mètriques com a part dels missatges sobre les possibles conseqüències de les opcions de política de privacitat i les accions d’intercanvi d’informació als usuaris va mostrar efectes positius en el comportament dels usuaris respecte a la privacitat. A més, els resultats de l’exploració de la compensació dels usuaris entre els costos i els beneficis durant les accions de divulgació d’informació personal van mostrar relacions significatives amb els cercles socials habituals (familiars, amics, companys de treball i usuaris desconeguts) i les seves propietats. Això ha permés dissenyar millors mecanismes de privacitat que restringeixen adequadament l’accés a la informació i redueixen els penediments. Finalment, els elements de gamificació aplicats a les xarxes socials i a la privacitat dels usuaris van mostrar un efecte positiu en el comportament dels usuaris cap a la privacitat i les pràctiques segures en les xarxes socials.
Alemany Bordera, J. (2020). Measures of Privacy Protection on Social Environments [Tesis doctoral no publicada]. Universitat Politècnica de València. https://doi.org/10.4995/Thesis/10251/151456
TESIS
Princi, Evgenia [Verfasser], and Nicole [Akademischer Betreuer] Krämer. "I always feel like something is watchin’ me, and I have no privacy – Privacy Calculus and Data-Tracking as Determinants of IoT-Acceptance / Evgenia Princi ; Betreuer: Nicole Krämer." Duisburg, 2020. http://d-nb.info/1223849376/34.
Full textDavids, Natheer. "The Privacy Paradox: Factors influencing information disclosure in the use of the Internet of Things (IoT) in South Africa." Master's thesis, Faculty of Commerce, 2021. http://hdl.handle.net/11427/32636.
Full textScherini, Sonya. "Facebook: Where privacy concerns and social needs collide." Thesis, Edith Cowan University, Research Online, Perth, Western Australia, 2020. https://ro.ecu.edu.au/theses/2331.
Full textNitulescu, Anca. "A tale of SNARKs : quantum resilience, knowledge extractability and data privacy." Thesis, Paris Sciences et Lettres (ComUE), 2019. http://www.theses.fr/2019PSLEE014.
Full textThe contributions detailed in this thesis focus on the design and the analysis of Succinct non-interactive arguments of knowledge, known as SNARKs. SNARKs enable a party with large computational resources to prove to a weaker party that a particular statement is true in an efficient way without further interaction and under a minimal communication requirement. Our results deal with three different aspects of SNARK protocols: the postquantum security of SNARKs, the composability of SNARKs with other cryptographic primitives and the confidentiality of the inputs in the computations verified by SNARKs. First, we propose a new framework that allows the instantiation of a quantumresilient SNARK scheme from lattice assumptions. We also study the notion of extractability that is part of the soundness definition for SNARKs. We remark some limitations of this definition and we address this problem, by introducing and studying a new notion, O-SNARKs. Finally, to achieve data privacy in delegated computation, we study the possibility of constructing SNARKs that enables verification of computations over encrypted data
Kumar, Amrit. "Titre : sécurité et protection de la vie privée pour le calcul déporté." Thesis, Université Grenoble Alpes (ComUE), 2016. http://www.theses.fr/2016GREAM093/document.
Full textHashing and hash-based data structures are ubiquitous. Apart from their role inthe design of efficient algorithms, they particularly form the core to manycritical software applications. Whether it be in authentication on theInternet, integrity/identification of files, payment using Bitcoins, webproxies, or anti-viruses, the use of hashing algorithms might only be internalbut yet very pervasive.This dissertation studies the pitfalls of employing hashing and hash-based datastructures in software applications, with a focus on their security and privacyimplications. The mainstay of this dissertation is the security and privacyanalysis of software solutions built atop Bloom filters --- a popularhash-based data structure, and Safe Browsing --- a malicious websitedetection tool developed by Google that uses hash functions. The softwaresolutions studied in this dissertation have billions of clients, which includesoftware developers and end users.For Bloom filters and their privacy, we study a novel use case, where they forman essential tool to privately query leaked databases of personal data. Whilefor security, we study Bloom filters in adversarial settings. The studyencompasses both theory and practice. From a theoretical standpoint, we defineadversary models that capture the different access privileges of an adversary onBloom filters. We put the theory into practice by identifying several securityrelated software solutions (employing Bloom filters) that are vulnerable to ourattacks. This includes: a web crawler, a web proxy, a malware filter, forensictools and an intrusion detection system. Our attacks are similar to traditionaldenial-of-service attacks capable of bringing the concerned infrastructures toknees.As for Safe Browsing, we study vulnerabilities in the architecture that anadversary can exploit. We show several attacks that can simultaneouslyincrease traffic towards both the Safe Browsing server and the client. Ourattacks are highly feasible as they essentially require inverting hash digestsof 32 bits. We also study the privacy achieved by the service by analyzing thepossibility of re-identifying websites visited by a client. Our analysis andexperimental results show that Safe Browsing can potentially be used as a toolto track specific classes of individuals.This dissertation highlights the misunderstandings related to the use of hashingand hash-based data structures in a security and privacy context. Thesemisunderstandings are the geneses of several malpractices that include the useof insecure hash functions, digest truncation among others. Motivated by ourfindings, we further explore several countermeasures to mitigate the ensuingsecurity and privacy risks
Cherrueau, Ronan-Alexandre. "Un langage de composition des techniques de sécurité pour préserver la vie privée dans le nuage." Thesis, Nantes, Ecole des Mines, 2016. http://www.theses.fr/2016EMNA0233/document.
Full textA cloud service can use security techniques to ensure information privacy. These techniques protect privacy by converting the client’s personal data into unintelligible text. But they can also cause the loss of some functionalities of the service. For instance, a symmetric-key cipher protects privacy by converting readable personal data into unreadable one. However, this causes the loss of computational functionalities on this data.This thesis claims that a cloud service has to compose security techniques to ensure information privacy without the loss of functionalities. This claim is based on the study of the composition of three techniques: symmetric cipher, vertical data fragmentation and client-side computation. This study shows that the composition makes the service privacy preserving, but makes its formulation overwhelming. In response, the thesis offers a new language for the writing of cloud services that enforces information privacy using the composition of security techniques. This language comes with a set of algebraic laws to systematically transform a local service without protection into its cloud equivalent protected by composition. An Idris implementation harnesses the Idris expressive type system to ensure the correct composition of security techniques. Furthermore, an encoding translates the language intoProVerif, a model checker for automated reasoning about the security properties found in cryptographic protocols. This translation checks that the service preserves the privacy of its client
Shang, Ling. "Experiments and programming paradigms for large scale scientific computing on grids, desktop grids and private clouds." Thesis, Lille 1, 2010. http://www.theses.fr/2010LIL10095/document.
Full textGrid computing and Desktop Grid computing provide interesting alternatives for large scale scientific computing which needs very large scale computing resources. However gridification is hard to develop because of series of factors such as complex programming interface. The aim of this dissertation is to find a solution to make large scientific computing in an easy way. To do that, research on Gauss Jordan algorithm is made and a new parallel programming version is presented. The parallel version can achieve maximum degree parallelism between operations. Also the Gauss Jordan algorithm as an excellent example is used to evaluate different experimental environments and tools. Experiments with YML, OmniRPC and XtremWeb on Grid and Desktop Grid environments testify YML can be a good solution for end users to make large scale scientific computing for its series of good features such as higher level interface, component reuse and acceptable overhead. To get better performance of platform, related issues such as task granularity, data persistence and schedule mechanism are also discussed in this dissertation. According to analysis made above and the common features of Clouds possessed, YML-PC a reference architecture based on workflow for building scientific Private Clouds is proposed. YML-PC inherits those good features presented above and some other key technologies such as “data persistence”, “available time prediction” and “evaluation on heterogeneous computing nodes” for YML-PC are also discussed in this dissertation. Evaluations are made based on Gauss Jordan algorithm on Grids, Desktop Grids and Private Clouds which build on Grid5000, Polytech Lille platform, France and Hohai platform, China
Hajjej, Ishak. "Contrat optimal pour les partenariats public-privé avec aléa moral : une approche de contrôle stochastique." Electronic Thesis or Diss., Institut polytechnique de Paris, 2020. http://www.theses.fr/2020IPPAG007.
Full textIn this thesis, we are interested in the contract with moral hazard for public private partnerships (PPP). PPP is defined as a long-term contract between a private party and a public entity, for the construction and/or the management of an asset or public service, in which the consortium takes the risks and a responsibility to manage the project. The public undertakes to pay him a rent. However, the effort that the consortium does to improve the social value of the project is not observable by the public. It is a principal-agent problem with moral hazard, in which the principal is the public and the agent is the consortium. We assume that the public pays the consortium continuously and the effort of the consortium affects the drift of the social value of the project. We assume that the agent is risk averse and the public is risk-neutral. In chapter 2 of the thesis, we consider a perpetual contract between a public entity and a consortium. We characterize the optimal contract in this moral hazard framework. We use the strong formulation : we consider different filtrations corresponding to the different level of information as in the context of stochastic control under partial observation. In this approach, we use martingale methods and stochastic control techniques. In chapter 3, we consider a public-private partnership problem with a random horizon, in which the public has the possibility to stop the contract at a fixed or a random time and gives compensation to the consortium. We solve this optimal stochastic control with optimal stopping problem in this context of moral hazard. We use the weak approach, that is the agent changes the distribution of the social value of the project by changing the drift and this amounts to considering a new probability that depends on the effort of the consortium. In the chapter 4, we also consider the problem of public-private partnership with a random horizon but using the strong formulation. Then, we deal with the risk-sharing framework, we assume that the public and the consortium have the same information. We analyze numerically the value of information. Chapter 5 focuses on the existence of a solution of the Hamilton Jacobi-Bellman equation that appears in our theoretical study. Then, we detail the numerical results for the numerical resolution of a Hamilton Jacobi-Bellman equation and variational inequality as part of our numerical study
Svetlana, Jakšić. "Types for Access and Memory Control." Phd thesis, Univerzitet u Novom Sadu, Fakultet tehničkih nauka u Novom Sadu, 2016. https://www.cris.uns.ac.rs/record.jsf?recordId=101762&source=NDLTD&language=en.
Full textУ тези су разматрана три проблема. Први је администрација и контролаправа приступа података у рачунарској мрежи са XML подацима, санагласком на безбедости посматраних података. Други је администрација икотрола права приступа подацима у рачунарској мрежи са RDF подацима,са нагласком на приватности посматраних података. Трећи је превенцијагрешака и цурења меморије, као и грешака у комуникацији генерисанимпрограмима написаних на језику Sing# у којима су присутни изузеци. За сватри проблема биће предложени формални модели и одговарајући типскисистеми помоћу којих се показује одсуство неповољних понашања тј.грешака у мрежама односно програмима.
U tezi su razmatrana tri problema. Prvi je administracija i kontrolaprava pristupa podataka u računarskoj mreži sa XML podacima, sanaglaskom na bezbedosti posmatranih podataka. Drugi je administracija ikotrola prava pristupa podacima u računarskoj mreži sa RDF podacima,sa naglaskom na privatnosti posmatranih podataka. Treći je prevencijagrešaka i curenja memorije, kao i grešaka u komunikaciji generisanimprogramima napisanih na jeziku Sing# u kojima su prisutni izuzeci. Za svatri problema biće predloženi formalni modeli i odgovarajući tipskisistemi pomoću kojih se pokazuje odsustvo nepovoljnih ponašanja tj.grešaka u mrežama odnosno programima.
Ladjel, Riad. "Secure distributed computations for the personal cloud." Electronic Thesis or Diss., université Paris-Saclay, 2020. http://www.theses.fr/2020UPASG043.
Full textThanks to smart disclosure initiatives and new regulations like GDPR, individuals are able to get the control back on their data and store them locally in a decentralized way. In parallel, personal data management system (PDMS) solutions, also called personal clouds, are flourishing. Their goal is to empower users to leverage their personal data for their own good. This decentralized way of managing personal data provides a de facto protection against massive attacks on central servers and opens new opportunities by allowing users to cross their data gathered from different sources. On the other side, this approach prevents the crossing of data from multiple users to perform distributed computations. The goal of this thesis is to design a generic and scalable secure decentralized computing framework which allows the crossing of personal data of multiple users while answering the following two questions raised by this approach. How to preserve individuals' trust on their PDMS when performing global computations crossing data from multiple individuals? And how to guarantee the integrity of the final result when it has been computed by a myriad of collaborative but independent PDMSs?
Yeh, Hsiao-Chiao, and 葉小僑. "Adoption of NFC Payment: A Privacy Calculus Perspective." Thesis, 2014. http://ndltd.ncl.edu.tw/handle/59301352246382115266.
Full text國立臺灣大學
資訊管理學研究所
102
NFC payment is a new form of mobile payment with the advantage of being quick and versatile. However, the use of NFC payment would involve in the storage and transmission of user’s personal data and financial data. This has been evident in a number of NFC research and survey indicating that privacy concern may inhabit the development of NFC payment. Therefore, this research attempts to understand how benefit and risk may influence the intention to adopt NFC payment. In the past literature, user’s intention to adopt has been seen as the outcome of privacy calculus. In this research, we draw on privacy calculus theory and add some characteristics of NFC payment to understand user’s intention to adopt NFC payment. For empirical analysis, we distribute online questionnaire to collect data and use Structural Equation Modeling to analyze our model. Results show that the benefits of using NFC payment-ease of use, compatibility, and relative advantage have significant positive relationship with intention to adopt. The risk of using NFC payment-perceived privacy risk has significant negative relationship with intention to adopt. And the antecedent of perceived privacy risk-trust in service provider has significant negative relationship with privacy risk. Based on our results, we suggest that when designing NFC payment application, it should be not only compatible with user experience but ease of use. Therefore, service providers should formulate a complete privacy policy to protect users’ data in order to reduce users’ privacy concern and increase the intention to adopt NFC payment.
Wagner, Amina. "Beyond the Privacy Calculus: Dynamics Behind Online Self-Disclosure." Phd thesis, 2021. https://tuprints.ulb.tu-darmstadt.de/19049/1/Diss_Wagner_v2.pdf.
Full textChen, Ken-Yen, and 陳耕硯. "Understanding the factors of LBS app downloads as a privacy calculus." Thesis, 2015. http://ndltd.ncl.edu.tw/handle/44b237.
Full text國立中山大學
資訊管理學系研究所
103
Mobile devices have become the most popular personal communication devices to date. The popularity of the smartphone has increased the diversity of location based services (LBS). Many apps have added location information based functions. Despite the growth of the LBS market and LBS technology, privacy concerns have arisen around the possibility of inappropriate use of the personal location information. When deciding whether or not to allow the use of their personal information in exchange for the LBS app’s benefits, users will first weigh the benefits and risks. This measurement is referred to as a “privacy calculus.” When downloading apps, users evaluate the app’s benefits and risks using their observations of the permissions requested by the app, the vendor’s reputation, the comments of other users, and the app’s ratings and number of downloads. This research intends to determine whether or not, in addition to the factors noted above, the app cost (paid or free) and the app category (hedonic or utilitarian) influence users’ privacy calculus. The core of this research is privacy calculus theory, which we combine with the TAM to develop our research model. The results show that users pay more attention to the benefits of the app if it is utilitarian as opposed to hedonic. Conversely, users pay more attention to the potential risks of a hedonic app. Users attach greater importance to the benefits of a paid app.
AgungWinursito, Bayu, and 文正修. "Privacy Calculus: A Study of Social Network Location Service in Indonesia." Thesis, 2013. http://ndltd.ncl.edu.tw/handle/43321825072621691393.
Full text國立成功大學
國際經營管理研究所碩士班
101
In the context of social network location service, privacy concern consisting of three dimensions: collection, control, and awareness, still becomes a major hindrance in location information disclosure intention. Even though privacy concern would inhibit location information disclosure intention, the trend of social network use is still growing in Indonesia. This is because when people want to share their personal information, they also would think about the benefit that they could get. This study finds that usefulness and enjoyment as beneficial factors of disclosing information have a positive effect towards intention to disclose information location. Furthermore, it appears that religious values play a role in affecting information disclosure intention. The finding of this study also shows that one of Islamic values which is silaturrahim values, has a positive indirect relationship toward intention to disclose location information and this relationship is mediated by trusting beliefs. Therefore, despite of concern over privacy, Indonesian Muslims are still willing to disclose their location information because they see that social relationship is more important.
Yu-HsuanCheng and 鄭宇軒. "Privacy Calculus on Customer Self-disclosure Behavior: Social Influence as a Moderator." Thesis, 2014. http://ndltd.ncl.edu.tw/handle/kuwhab.
Full text國立成功大學
企業管理學系
102
Self-disclosure is a way to help e-retailers receive customer information that contributes to building good relationships. This study tries to provide a better understanding on the effect of customer willingness on self-disclosure. The objective of this study is to investigate the role of e-retailers and the customers themselves with regard to their willingness toward self-disclosure. To achieve this goal, this study adopts privacy calculus theory to explain the process of forming customer willingness. However, privacy calculus theory only considers one’s own perception; therefore, social influence is integrated into privacy calculus theory to examine the moderating effect of surrounding people. 405 valid questionnaires were collected from the Internet. Data consists of respondents who have both independent online shopping experience and online privacy invasion experience. The data results demonstrate that an e-retailer’s responsiveness and compensation provisions can increase perceived benefits and reduce customer privacy concerns. It was also found that previous privacy experience plays an important role in the perception of risk. In addition, perceived benefits can increase perceived value, which further increases self-disclosure willingness, but perceived risk shows the contrary result with regard to increasing willingness. Furthermore, the moderating effect of normative social influence and informational social influence on belief were proven. Based on the findings, e-retailers should respond to customers rapidly and offer compensations to encourage information sharing; in addition, e-retailers should create a good store image and put understandable privacy protection remarks on their websites to make customers trust them.
Sapi, Isabelle Carvalho. "Examining the Privacy Calculus: What Impacts Consumers´ willingness to disclose personal data online." Master's thesis, 2020. https://hdl.handle.net/10216/131032.
Full textSapi, Isabelle Carvalho. "Examining the Privacy Calculus: What Impacts Consumers´ willingness to disclose personal data online." Dissertação, 2020. https://hdl.handle.net/10216/131032.
Full textSeow, Yoke May, and 蕭玉媚. "Intention to Disclose Location Information on Location-based Service: The Roles of Technology Trust, Information Privacy Concerns and Privacy Calculus." Thesis, 2019. http://ndltd.ncl.edu.tw/handle/m9a3t7.
Full text元智大學
資訊管理學系
107
It is inevitable that the exponential growth of mobile location-based service (LBS) will continue to change the way we live and work. With the LBS-enabled device and an Internet connection, anyone at anytime and anywhere can instantly access real-time location-based information or services. The convenience of accessing LBS coupled with the abundant benefits of using LBS is likely to attract more people to use LBSs and in turn, drive the growth of the LBS market. Yet, in spite of the benefits, there are also privacy risks involved in using LBS. Thus, it is not surprising that privacy is the major inhibiting factor in the adoption of LBS. Since the LBS-enabled device is required to access LBS and privacy is a fundamental issue, this study aims to investigate the influence of the user’s trust toward the LBS-enabled device on information privacy concerns (IPC), and on the user’s perceived trade-off between the benefits and privacy risks of using a specific LBS (privacy calculus). Hence, drawing upon the technology trust lens, this empirical study explores the role of technology trust in LBS-enabled device—cognitive trust in LBS-enabled device (CTT) and affective trust in LBS-enabled device (ATT)—in its relationship with the psychological and economic perspectives of privacy, IPC and privacy calculus respectively, to explain location disclosure intention. Additionally, IPC and privacy calculus are investigated to determine their potential impacts on location disclosure intention. Partial Least Squares Structural Equation Modeling (PLS-SEM) is employed to analyze the data collected from 460 users of mobile LBS in Taiwan R.O.C. The results of the analysis reveal that CTT has no negative influence on IPC as expected, ATT has a negative impact on IPC and both have a significant positive influence on privacy calculus. In addition, the findings also demonstrate that IPC have negative impact on location disclosure intention, while privacy calculus has a positive impact on location disclosure intention. Lastly, the results show that technology trust in LBS-enabled device has an indirect impact on users’ inclination to disclose their location information.
Rosenberg, Dale Patrick. "The value required to negate consumer privacy concerns around location." Diss., 2012. http://hdl.handle.net/2263/27021.
Full textDissertation (MBA)--University of Pretoria, 2013.
Gordon Institute of Business Science (GIBS)
unrestricted
Hao-RanSun and 孫浩然. "Consumers\' Product Experience Disclosure on Virtual Brand Community: From the Perspective of Privacy Calculus." Thesis, 2018. http://ndltd.ncl.edu.tw/handle/s7rbsp.
Full text國立成功大學
企業管理學系
106
In the virtual brand community, customer disclosures related to product usage experience not only enable the product’s brand company to obtain customer information, but also attract potential customers to participate in brand community discussions. This research adopted the privacy calculus theory to explore customer usage experience disclosure and to understand the roles that the virtual brand community and customers play in the disclosure process. Therefore, sense of virtual community and brand community engagement were adopted to discuss customer disclosure emotional elicitation, and privacy calculus factors were treated as antecedents of a sense of virtual community and brand community engagement. Moreover, brand community was also adopted as a moderator in the model. The survey focused on members of a virtual brand community, and a total of 944 valid questionnaires were collected. Structural equation modeling was adopted for the data analyses. The results showed that socialization and self-expression increased a sense of virtual community and brand community engagement, but pleasing others only positively affected the sense of virtual community. Reward and flaming (a hostile and insulting interaction between persons over the Internet) had a significant impact on the sense of virtual community and brand community engagement on the part of customers. In addition, a high level of brand community engagement and sense of virtual community increased intention toward customer disclosure related to product experience. Finally, this study suggested that brand community managers should not only provide a two-way communication platform for customers, but also need to manage and regulate the use of hostile, negative responses. In addition, some tokens can be provided as a reward to encourage customer willingness toward disclosure of experiences. Further, managers also can establish a good virtual brand community culture that encourages customers to participate in the discussion and increases engagement rates in their virtual brand communities.
Yu, Yi-Ting, and 游依婷. "The Effect of Privacy Calculus and User Interface Design on Consumers' Intention of Mobile Shopping." Thesis, 2015. http://ndltd.ncl.edu.tw/handle/24521325373174128998.
Full text國立屏東大學
國際貿易學系碩士班
103
The development of mobile telecommunication technology increases the demand of mobile shopping rapidly, thus it is an important issue to investigate the factors which may influence consumers’ shopping behaviors via mobile devices. The study examined the relationship among privacy risk, privacy benefit, privacy experience, user interface design, electronic word of mouth, perceived value and usage intention of mobile shopping. Through online and offline survey, this study collected 228 valid responses from Taiwanese who have ever used mobile devices to test the hypotheses. The result of PLS (partial least squares) showed that: (1) perceived value, privacy value and user interface design positively affected the intention of mobile shopping; (2) privacy value user interface design and electronic word of mouth positively impacted perceived value in shopping via mobile devices; (3) privacy benefit, privacy experience and electronic word of mouth have positive influences on privacy value; whereas (4) privacy risk has a negative effect on privacy value in shopping via mobile devices; (5) surprisingly, user interface design influences privacy value with negative effect. The findings provide several significant implications and suggestions for marketing strategy and managerial practice.
Gomes, João Miguel de Vasconcelos. "Using Privacy Calculus Theory To Assess Users´ Acceptance Of Video Conferencing Apps During The Covid-19 Pandemic." Master's thesis, 2021. http://hdl.handle.net/10362/129688.
Full textVideoconferencing (VC) applications (apps) are getting notable attention worldwide, from common citizens to professionals as an alternative to vis-à-vis communication specifically during COVID-19. The growth of VC apps is expected to rise even more in the future with the prediction that widespread adoption of remote work will continue to hold even after the pandemic. This research investigates the key drivers for individuals’ intentions into continuing to use this technology in professional settings. Considering the importance of professionals’ perceptions of privacy in professionals’ settings, this study proposes a conceptual model rooted in the theoretical foundations of privacy calculus theory, extended with the conceptualization of privacy concerns for mobile users (MUIPC), ubiquity, and theoretical underpinnings from social presence theory. The conceptual research model was empirically tested by using data collected from a survey of 487 actual users of videoconferencing apps across Europe. Structural equation modeling (SEM) is performed to test the model. The study revealed several findings (1) perceived value in using VC apps motivates the professionals to continue using VC apps and shapes their perception as they evaluate the risk-benefit trade-off they are making when using VC apps. (2) professionals’ indeed form and articulate their own assessment of value based on the perceived risks and benefits associated with using VC apps. However, professionals' perceptions of value are strongly influenced by potential benefits received from using VC apps than by potential risks associated with using VC apps. (3) professionals’ perceived risk is determined by MUIPC and trust. (4) professionals’ perceived benefits are shaped by ubiquity and social presence. For researchers, this study highlights the usefulness of integrating privacy calculus theory, social presence theory and trust in studying the individuals’ behavioral intentions towards new technologies. For practitioners, understanding the key determinants is pivotal to design and build mobile video-conferencing apps that achieve higher consumer acceptance and higher rates of continued usage of VC apps in professional settings.
Wang, Dan-yu, and 王丹昱. "The Impacts of Mobile Marketing and Privacy Calculus on Willingness to Have Information Sharing and Purchase Intention." Thesis, 2016. http://ndltd.ncl.edu.tw/handle/41423200699910539565.
Full text銘傳大學
國際企業學系碩士班
104
Nowadays, a lot of consumer spends a lot of time on smartphone. A lot of company are design the Apps for themselves to create the opportunity for consumer to purchase from the Apps. Yet, it really convenience however, not a lot of consumers are willing to give their personal information towards companies because of privacy concern. This research paper is standing in the consumer position to discussion about their purchased behavior on the smartphone. Researcher used LISREL to analysis the questionnaire, and gets the following result: 1. Mobile marketing perceived interactivity is positively related to perceived benefit of info disclosure. 2. Mobile marketing perceived interactivity is positively related to perceived risk of info disclosure. 3. Perceived benefit of info disclosure is positively related to perceived value of info disclosure. 4. Perceived value of info disclosure is positively related perceived risk of info disclosure. 5. Perceived value of info disclosure is positively related to willingness to have info used for app of the brand. 6. Willingness to have information used for app of the brand is positively related to consumer purchase intention.
CHENG, CHUN-CHIH, and 鄭群豑. "Exploring the Degree of Information Disclosure Based on Privacy Calculus Theory - Take Internet of Vehicle as an Example." Thesis, 2018. http://ndltd.ncl.edu.tw/handle/v2ah2b.
Full text中原大學
企業管理研究所
106
With the rapid development of Smart Car, people have begun to consider the Internet of Vehicle develop products as the basis for car purchases. As a result, Car Vendors have begun to develop the Internet of Vehicle products, such as: Tesla, Benz, BMW, and Toyota have all launched Internet of Vehicle products to seize the market. However, under this rapid development, people began to realize that their privacy has been continuously exposed. Therefore, people began to pay attention to their privacy, especially in terms of personal information privacy and personal location privacy disclosure. Countries and Car Venders have started to redesign the privacy of Internet of Vehicle products, hoping to grasp this trend and become a leader in the market. Therefore, this research attempts to use privacy as a starting point to observe the relationship between the consumer''s perception of Internet of Vehicle, the risk of perceived exposure, and the behavior of exposing willingness. This research refers to the literature review of previous scholars and finds that most scholars have researched the "protection mechanism" or "how to avoid" information leakage of Internet of Things information and privacy in the Internet of Things. Few scholars focus on the right of privacy. Therefore, the research refers to the content of previous scholars'' research. It develops the research structure and questionnaires of the study. Take perceive disclosed benefits and perceived disclosed risks as self-variables to explore the degree of willingness to expose and the main factor of influence. This search conducted random surveys of physical and online questionnaire surveys, and conducted research hypotheses and verifications through reliability analysis, Pearson correlation analysis, T verification, and regression analysis. The results of the search found that both perceived exposure benefit and perceived exposure risk have a significant impact on the willingness to disclose. Among them, “personalized services” and “self-presentation” are the main factors that affect consumers’ self-disclosure. So if vender provides personalized services and self-presenting products or services, consumers will be willing to expose more privacy. In addition, under different car purchase experiences, consumers'' perceptions of disclosure of interest and perceived exposure to risk exposure will be different due to differences in car purchase experience. The "interests" of consumers who have "car buying experience" are their concerns, and the "interests" and "risks" of consumers who have "no car buying experience but have willing to buy car" are their concerns. Therefore, this research suggests that future internet of car vendors can use the above viewpoints when referring to the promotion and acquisition of consumer information, hoping to provide an indicator of the development of future products and services by car makers.
Gutierrez, A., S. O'Leary, Nripendra P. Rana, Y. K. Dwivedi, and T. Calle. "Using privacy calculus theory to explore entrepreneurial directions in mobile location-based advertising: Identifying intrusiveness as the critical risk factor." 2018. http://hdl.handle.net/10454/17471.
Full textLocation-based advertising is an entrepreneurial and innovative means for advertisers to reach out through personalised messages sent directly to mobile phones using their geographic location. The mobile phone users' willingness to disclose their location and other personal information is essential for the successful implementation of mobile location-based advertising (MLBA). Despite the potential enhancement of the user experience through such personalisation and the improved interaction with the marketer, there is an increasing tension between that personalisation and mobile users' concerns about privacy. While the privacy calculus theory (PCT) suggests that consumers make privacy-based decisions by evaluating the benefits any information may bring against the risk of its disclosure, this study examines the specific risks and benefits that influence consumers' acceptance of MLBA. A conceptual model is proposed based on the existing literature and a standardised survey was developed and targeted at individuals with known interests in the subject matter. From these requests, 252 valid responses were received and used to evaluate the key benefits and risks of MLBA from the users' perspectives. While the results confirmed the importance of internet privacy concerns (IPC) as an important determinant, they also indicate that monetary rewards and intrusiveness have a notably stronger impact on acceptance intentions towards MLBA. Intrusiveness is the most important risk factor in determining mobile users' intentions to accept MLBA and therefore establishing effective means of minimising the perceived intrusiveness of MLBA can be expected to have the greatest impact on achieving effective communications with mobile phone users.
ManhQuyet, Hoang, and 黃孟決. "The Users’ Intention to Disclose Location Information in Social Network Site: The Effect of Privacy Calculus and Personality Traits." Thesis, 2014. http://ndltd.ncl.edu.tw/handle/07302868092245225196.
Full text國立成功大學
國際經營管理研究所
102
Although privacy concern has been paid great attention over time and across disciplines, it is still considered as main inhibitor for disclosure decision, especially in mobile environment where smartphones, wearable devices and location-based services bring it to a new level. In this study we employ privacy calculus perspective framework to reaffirm effects motivators and inhibitors on disclosure intention of location information. Also, Big Five model is used to examine the impacts of disposition factors, such as personality traits, on concern for privacy. Data were collected from 298 respondents, who are representatives for social network users using smartphones. Our findings reaffirm privacy calculus perspective framework in a different culture and environment. Also, effects from personality on privacy concerns are giving interesting theoretical and practical implications for service vendors as well as legislators.
Ming-SungTsai and 蔡明松. "Smartphone as a Medical Device: Examining Users’ Adoption of Mobile Medical Applications – an Empirical Study from Privacy Calculus and Risk-as-Feelings Perspective." Thesis, 2016. http://ndltd.ncl.edu.tw/handle/p974ts.
Full text國立成功大學
經營管理碩士學位學程(AMBA)
104
Thanks to the rapid development and popularization of smartphone and high-speed cellular networks, more and more people today are using mobile applications (apps) to conduct their sport and health management. At the same time, the European Commission has recognized the acute importance of investing in mobile health (mHealth), a kind of medical and public health practice supported by mobile devices, to address the shortage of healthcare workers in the EU countries. While mHealth holds great promise in this field, it should not also be ignored that mHealth has created a new set of risk to privacy and security since personal health information can be stored on mobile devices or shared via networks that are not secure. Drawing on the literatures of privacy calculus theory and risk-as-feelings perspective as the conceptual foundation, this study attempts to understand how privacy perceptions and calculus may influence individuals’ intention to adopt mHealth apps with a particular focus on ResearchKit, which is a killer application introduced by Apple that allows scientists and doctors to create powerful apps for medical research. In this study, 517 measurable samples were collected to empirically verify the research model and partial least squares (PLS) approach was employed as the data analysis tool. The results show that trust in app developer is the key variable to individuals’ adoption intention, and perceived risk and health status emotion both effectively moderate individuals’ adoption intention. The theoretical and practical implications, limitations, and future research directions in mHealth apps are then discussed at the end of this article.