Vol. 16, Issue 1, Jul-Dec 2023
Page: 43-53
DEVELOPING A PRIVACY BEHAVIOUR EXAMINATION MODEL LINKED TO THE SOCIAL NETWORKING SITES
Poonam Devi
Received Date: 2018-08-13
Accepted Date: 2018-09-14
Published Date: 2018-09-25
The motivation behind this paper is to propose and inspect a protection conduct model inside the setting of Social systems administration factors (Indian situation). the aftereffects of key parts of SNS factors on apparent estimations of security conduct were by experimentation decided. SNS is conceptualized as a multi-dimensional build just as enthusiastic security, social protection, individual protection, and worth. The examined sociosegment factors encased, age, sexual orientation, identity, instruction level, monetary profit level, and parts of SNS from that occasionally impacts the security conduct. the main information was assembled by a structure review of online clients. abuse 323 study returns, correlational examination, and Z check investigation were used for information investigation and theory testing. The extended model was attempted substantial and furthermore the 5worth builds aggregately represented seventy.2% of the change in SNS for security conduct. Online media boundaries and Privacy tricks extensively influenced apparent social and passionate protection conduct. on-line points of interest and Legal structure significantly influenced all apparent individual security contemplations. Consolidation of enthusiastic protection, social security, individual protection, and worth kind information in creating SNS advancing ways and special projects will encourage firms a great deal of viably pass on wanted estimations of protection to zero in on clients. This observational investigation proficient the need for the higher comprehension of customer security conduct for SNS to help the easier turn of events and advancing. The data picked up from this examination gives important experiences to every academician and mechanical specialists
Back
Download PDF
References
- Akar, E., & Topcu, B. (2011). An examination of the factors influencing consumers' attitudes toward social media marketing. Journal of Internet Commerce , 10 (1), 35-67.
- Angulo, J., Hübne, S. F., Wästlund, E., & Pulls, T. (2012). Towards usable privacy policy display and management. Information Management & Computer Security , 20 (1), 4-17.
- Awad, N., & Krishnan, M. (2006). The personalization privacy paradox: an empirical evaluation of information transparency and the willingness to be profiled online for personalization. Management Information Systems Quarterly , 30 (1), 13-28.
- Bélanger, F., & Crossler, R. (2011). Privacy in the digital age: a review of information privacy research in information systems”,research in information systems. Management Information Systems Quarterly , 35 (3), 1017-1041.
- Boyd, D. M., & Ellison, N. B. (2008). Social networking sites:Defination, history and scholarship. Journal of Computer Mediated Communication , 13 (1), 210-230.
- Bryce, J., & Klang, M. (2009). Young people, disclosure of personal information and online privacy: control, choice and consequences. Information Security Technical Report , 14 (3), 160-166.
- Casado, N. S., Navarro, J. G., Wensley, A., & Solano, E. T. (2016). Social networking sites as a learning tool. The Learning Organization , 23 (1), 23 - 42.
- Cho, H., Lee, J., & Chung, S. (2010). Optimistic bias about online privacy risks: testing the moderating effects of perceived controllability and prior experience. Computers in Human Behavior , 26 (5), 987- 995.
- Christofides, E., Muise, A., & Desmarais, S. (2009). Information disclosure and control on facebook: are they two sides of the same coin or two different processes? Cyber Psychology & Behavior , 12 (3), 341-345.
- Cranor, L. ,. (2003). P3P: making privacy policies more useful. IEEE Security & Privacy , 1 (6), 50-55.
- Culnan, M., & Armstrong, P. (1999). Information privacy concerns, procedural fairness, and impersonal trust: an empirical investigation. Organization Science , 10 (1), 104-115.
- Dinev, T., & Hart, P. (2006). An extended privacy calculus model for e-commerce transactions. Information Systems Research , 17 (1), 61-80.
- Gauzente, C. (2004). Web merchants’ privacy and security statements: how reassuring are they for consumers? A two-sided approach. Journal of Electronic Commerce Research , 5 (3), 181-198.
- Gudura, P., Cranor, L., & Arjula, M. (2006). User interfaces for privacy agents. ACM Transactions on Computer-Human Interaction , 13 (2), 135-178.
- Hiller, J., Smith, W., & Bélanger, F. (2002). Trust worthiness in electronic commerce: the role of privacy, security, and site attributes. Journal of Strategic Information Systems , 11 (3), 245-270.
- Hong, W., & Thong, J. (2013). Internet privacy concerns: an integrated conceptualization and four empirical studies. Management Information Systems Quarterly , 37 (1), 275-298.
- Karyda, M., Gritzalis, S., Park, J., & Kokolaki, S. (2009). Privacy and fair information practices in ubiquitous environments: research challenges and future directions. Internet Research , 19 (2), 194- 208.
- Krasnova, H., Gunther, O., Spikermann, S., & Koroleva, K. (2009). Privacy concerns and identity in online social networks. Identity in the Information Society , 2 (1), 39-63.
- Krasnova, H., Spiekermann, S., Koroleva, K., & Hildebrand, T. (2010). Online social networks:why we disclose. Journal of Information Technology , 25 (6), 109-125.
- Li, K., Wang, X., Li, K., & Che, J. (2016). Information privacy disclosure on social network sites . Nankai Business Review International , 7 (3), 282-300.
- Nissenbaum, H. (2004). Privacy as contextual integrity. Washington Law Review , 79 (1), 101- 139. [22] Rosen, J. (2001). Out of context: the purposes of privacy. Social Research , 68 (1), 209-220.
- Rotenberg, M., & Scott, J. (2015). Privacy in the Modern Age : The Search for Solutions. New York: The New Press.
- Sheehan, K. (2002). Toward a typology or internet users and online privacy concerns. Information Society , 18 (1), 21-32.
- Solove, D. (2001). Privacy and power: computer databases and metaphors for information privacy. Stanford Law Review , 53 (6), 1393-1462.
- Xie, E., Teo, H., & Wan, W. (2006). Volunteering personal information on the internet: effects of reputation, privacy notices, and rewards on online consumer behavior. Marketing Letters , 17 (1), 61-74.
- Xu, H., Luo, X., Carroll, J., & Rosson., M. (2011). The personalization privacy paradox: an exploratory study of decision making process for location-aware marketing. Decision Support Systems , 51 (1), 42- 52.
- Gupta, T., Rani, M., & Bhandari, R. S. (n.d.). AN EMPIRICAL EXAMINATION OF THE PRIVACY BEHAVIOUR WITH REFERENCE SOCIAL NETWORKING SITES. IJESRT, 7(1), 565-573.