Years for Selection: 2006 - 2007 - 2008 - 2009 - 2010 - 2011 - 2012 - 2013|
What Drives Perceptions of Threats to Your Facebook Friends’ Information?
Stéphane Collignon, Tabitha James, Merrill Warkentin* and Byung Cho Kim+
Virginia Tech, VA, Mississippi State University*, MS and Korea University, South Korea+
Concerns about privacy in the online environment are quite prevalent and continue to increase with the use of the Internet for both commercial and social activities. Research concerning online privacy has rightfully focused on e-commerce applications and, therefore, on companies’ collection and usage of personal information. Therefore, the assumed threat of misusing information has traditionally been viewed as coming from a company. With the introduction of social media, we are increasingly using the Internet for socialization. In this case, we have transferred concerns of improper use of information in social situations from a face-to-face environment to an electronic one. The threats to unwanted disclosure are increasingly coming from third party use of our information. In this paper, we examine how we perceive Facebook use as constituting a threat to others and drivers of this perception. We survey 403 students at a major public US university who are Facebook users. We find that self-efficacy and personal privacy concerns increase one’s perception of the severity of the threat to other people caused by the disclosure of one’s personal information as a result of online activity, while frequency of use tends to decrease that same perception. We also find that personal privacy concern increases one’s perception of the susceptibility of such threats and that the perception of susceptibility increases the threat severity perception.See the ASIA ‘13 Proceedings for the complete paper...
One person's "paranoia" is another person's "engineering redundancy".
- Marcus J. Ranum
The superior man, when resting in safety, does not forget that danger may come. When in state of security he does not forget disorder may come. Thus his person is not endangered and his states and all their clans are preserved.
- Confucius (551-479 BC)
Securing a computer system has traditionally been a battel of wits: the penetrator tries to find the holes, and the designer tries to close them.