Tamara Dinev’s research while affiliated with Florida Atlantic University and other places

What is this page?


This page lists works of an author who doesn't have a ResearchGate profile or hasn't added the works to their profile yet. It is automatically generated from public (personal) data to further our legitimate goal of comprehensive and accurate scientific recordkeeping. If you are this author and want this page removed, please let us know.

Publications (41)


Revisiting APCO
  • Chapter
  • Full-text available

February 2022

·

493 Reads

·

7 Citations

·

Tamara Dinev

·

Imagine that you are a product manager at a software company. When users disclose some information to your product, they can use all the great features you and your team have integrated into the software. Utilizing these features is essential for the success of your product: it makes users satisfied and encourages others to use the software as well. Furthermore, the user and usage data can be used to improve the product and help implementing new features over time. However, since your product collects users’ data, you are worried about privacy-related issues. What causes users’ privacy concerns, and what are the potential consequences of those concerns? The APCO ( A ntecedents → P rivacy C oncerns → O utcomes) and enhanced APCO models provide a summary of the current scientific findings related to these questions and present them in a conceptual model. The APCO framework will help practitioners and scholars to bring different privacy-related aspects of a product to their attention and suggests how these aspects can interrelate. Throughout this chapter, we will consider a use case scenario of a fitness tracker application and discuss how APCO applies to this scenario.

Download


Data Governance, Consumer Privacy, and Project Status Reporting: Remembering H. Jeff Smith

December 2019

·

93 Reads

·

7 Citations

In October 2019, the information systems community was shocked and saddened to learn that H. Jeff Smith had passed away after battling lymphoma. While primarily known for his pioneering work on privacy, Jeff made a number of significant contributions to the field of information systems. In this invited editorial, we examine the impact of Jeff’s scholarship on the areas of data governance, consumer privacy, and project status reporting.


Editorial: Special issue on cyber security, privacy and ethics of information systems

November 2019

·

116 Reads

·

3 Citations

This special Issue of Information Systems Frontiers, dedicated to the memory of H. Jeff Smith (Keil et al. 2019), contains a selection of manuscripts originally accepted for the ICIS 2018 track on Cyber Security, Privacy and Ethics of IS. Authors of all manuscripts accepted into the ICIS track were invited to submit revised versions of their manuscripts for peer-review at the journal. Six manuscripts were eventually chosen for this issue. The manuscripts encompass multiple methodologies (including meta-analysis, expert interviews, and experiments) and a plurality of topics (from information security compliance to the impact of data regulation on innovation; from identity theft to consumers’ perceptions of information security). Together, they encapsulate and showcase the richness and variety of contemporary IS research at the intersection of security, privacy, trust, and ethics.


Table 2 . Indicators of a Potentially Weak Security/Privacy Study and Possible Solutions 
Why Security and Privacy Research Lies at the Centre of the Information Systems (IS) Artefact: Proposing A Bold Research Agenda

November 2017

·

3,059 Reads

·

194 Citations

In this essay, we outline some important concerns in the hope of improving the effectiveness of security and privacy research. We discuss the need to re-examine our understanding of information technology (IT) and information system (IS) artefacts and to expand the range of the latter to include those artificial phenomena that are crucial to information security and privacy research. We then briefly discuss some prevalent limitations in theory, methodology, and contributions that generally weaken security/privacy studies and jeopardise their chances of publication in a top IS journal. More importantly, we suggest remedies for these weaknesses, identifying specific improvements that can be made and offering a couple of illustrations of such improvements. In particular, we address the notion of loose re-contextualisation, using deterrence theory (DT) research as an example. We also provide an illustration of how the focus on intentions may have resulted in an underuse of powerful theories in security and privacy research, because such theories explain more than just intentions. We then outline three promising opportunities for IS research that should be particularly compelling to security and privacy researchers: online platforms, the Internet of things (IoT), and big data. All of these carry innate information security and privacy risks and vulnerabilities that can be addressed only by researching each link of the systems chain, that is, technologies–policies–processes–people–society–economy–legislature. We conclude by suggesting several specific opportunities for new research in these areas.


Individuals’ Attitudes Towards Electronic Health Records: A Privacy Calculus Perspective

January 2016

·

828 Reads

·

132 Citations

Tamara Dinev

·

·

·

[...]

·

Paul Hart

National adoption of Electronic Health Records (EHRs) is considered an essential component of the health care system overhaul sought by policy makers and health care professionals, in both U.S. and Europe, to cut costs and increase benefits. And yet, along with the technological aspects, the human factor consistently proves to be a critical component to diffusion of any IT system, and is even more so regarding health care. The highly personal and sensitive nature of health care data and the associated concerns about privacy impede even the most efficient and technologically perfect system. Our objective is to investigate individuals’ attitudes towards EHR and what factors form these attitudes. If we understand individuals’ attitudes regarding EHR and the factors that influence them, we will be in a better position to take responsive measure to facilitate Privacy by Design for EHRs. A positivist research model is empirically tested using survey data from U.S. and Italy and structural equation modeling techniques. We find that perceived effectiveness of regulatory mechanisms positively impact trust; perceived effectiveness of technological mechanisms positively impacts perceived privacy control and trust; the latter two help reduce privacy concerns which, along with perceived benefits, convenience, and Internet experience, play the privacy calculus-type formation of attitudes towards EHR.


Research Commentary—Informing Privacy Research Through Information Systems, Psychology, and Behavioral Economics: Thinking Outside the “APCO” Box

November 2015

·

561 Reads

·

228 Citations

Information Systems Research

Recently, several researchers provided overarching macromodels to explain individuals' privacy-related decision making. These macromodels-and almost all of the published privacy-related information systems (IS) studies to date-rely on a covert assumption: responses to external stimuli result in deliberate analyses, which lead to fully informed privacy-related attitudes and behaviors. The most expansive of these macromodels, labeled "Antecedents- Privacy Concerns-Outcomes" (APCO), reflects this assumption. However, an emerging stream of IS research demonstrates the importance of considering principles from behavioral economics (such as biases and bounded rationality) and psychology (such as the elaboration likelihood model) that also affect privacy decisions. We propose an enhanced APCO model and a set of related propositions that consider both deliberative (high-effort) cognitive responses (the only responses considered in the original APCO model) and low-effort cognitive responses inspired by frameworks and theories in behavioral economics and psychology. These propositions offer explanations of many behaviors that complement those offered by extant IS privacy macromodels and the information privacy literature stream. We discuss the implications for research that follow from this expansion of the existing macromodels.



Information Privacy and Correlates: An Empirical Attempt to Bridge and Distinguish Privacy-Related Concepts

May 2013

·

830 Reads

·

439 Citations

Privacy is one of the few concepts that has been studied across many disciplines, but is still difficult to grasp. The current understanding of privacy is largely fragmented and discipline-dependent. This study develops and tests a framework of information privacy and its correlates, the latter often being confused with or built into definitions of information privacy per se. Our framework development was based on the privacy theories of Westin and Altman, the economic view of the privacy calculus, and the identity management framework of Zwick and Dholakia. The dependent variable of the model is perceived information privacy. The particularly relevant correlates to information privacy are anonymity, secrecy, confidentiality, and control. We posit that the first three are tactics for information control; perceived information control and perceived risk are salient determinants of perceived information privacy; and perceived risk is a function of perceived benefits of information disclosure, information sensitivity, importance of information transparency, and regulatory expectations. The research model was empirically tested and validated in the Web 2.0 context, using a survey of Web 2.0 users. Our study enhances the theoretical understanding of information privacy and is useful for privacy advocates, and legal, management information systems, marketing, and social science scholars.


Managing Employee Compliance with Information Security Policies: The Critical Role of Top Management and Organizational Culture*

August 2012

·

5,117 Reads

·

524 Citations

Decision Sciences

We develop an individual behavioral model that integrates the role of top management and organizational culture into the theory of planned behavior in an attempt to better understand how top management can influence security compliance behavior of employees. Using survey data and structural equation modeling, we test hypotheses on the relationships among top management participation, organizational culture, and key determinants of employee compliance with information security policies. We find that top management participation in information security initiatives has significant direct and indirect influences on employees’ attitudes towards, subjective norm of, and perceived behavioral control over compliance with information security policies. We also find that the top management participation strongly influences organizational culture which in turn impacts employees’ attitudes towards and perceived behavioral control over compliance with information security policies. Furthermore, we find that the effects of top management participation and organizational culture on employee behavioral intentions are fully mediated by employee cognitive beliefs about compliance with information security policies. Our findings extend information security research literature by showing how top management can play a proactive role in shaping employee compliance behavior in addition to the deterrence oriented remedies advocated in the extant literature. Our findings also refine the theories about the role of organizational culture in shaping employee compliance behavior. Significant theoretical and practical implications of these findings are discussed.


Citations (39)


... Smith et al. [14] determined the antecedents, privacy concerns and outcomes of the disclosure of personal data by using the macro APCO (Antecedents, Privacy, Concerns, Outcomes) model. APCO brings together the body of knowledge on information privacy by integrating key factors explored in various studies, commencing with the examination of privacy apprehensions, which is the most frequently investigated element within this domain [15]. Dinev et al. [16] proposed the macro APCO model, in which individuals are affected by external factors while sharing their personal data, and this influence causes behavioural changes by creating privacy concerns. ...

Reference:

Decoding privacy concerns: the role of perceived risk and benefits in personal health data disclosure
Revisiting APCO

... The rookie personality informs the user about its flaws (Ahmad et al., 2022;Benner et al., 2021) and is, therefore, likely to be perceived to be less reliable (Jiang et al., 2002;Meyer-Waarden et al., 2020). The actual performance is not influenced by this statement, but the perception of the CA is still changed and priming users' assessment (Buck & Dinev, 2020;Meyer-Waarden et al., 2020). Support can be found in the literature for this deduction. ...

Low Effort and Privacy – How Textual Priming Affects Privacy Concerns of Email Service Users
  • Citing Conference Paper
  • January 2020

... Another stream of studies examines the magnitude of cybersecurity risk. Acquisti et al. (2019) reported that a cyber breach statistically reduced the short-term value of the stocks. Gao et al. (2020) concluded that a successful data breach negatively impacts a company's reputation and customer relationships. ...

Editorial: Special issue on cyber security, privacy and ethics of information systems

... Repeated breaches can also lead to privacy fatigue (Choi et al., 2018). Here, an organization's practices revolving ethics, privacy policy and visibility influences customer satisfaction, lowers privacy concerns and enhances trust (Keil et al., 2019;Singh et al., 2020;Xu et al., 2011) which leads to increased purchase intent (Martin and Murphy, 2017) and satisfactory transaction experience (Chatterjee and Bolar, 2019) during online shopping resulting in customer patronage. Contrary to this, the mishandling of customers' private information or accidental disclosure manifested in form of identity theft, spam, hacking and unauthorized access leads to online privacy concerns and lower acceptance of e-commerce (Bandyopadhyay, 2009;Chen et al., 2017;Dinev and Hart, 2004). ...

Data Governance, Consumer Privacy, and Project Status Reporting: Remembering H. Jeff Smith

... We contribute to the international literature on continuance intention, where we are the first to incorporate an Indian sample (Franque et al., 2020). We also answer prior calls for re-contextualization in security and privacy research (Lowry et al., 2017). ...

Why Security and Privacy Research Lies at the Centre of the Information Systems (IS) Artefact: Proposing A Bold Research Agenda

... Trust in a retailer might not diminish intrusiveness perceptions of collecting individual-level data because consumers are perhaps still concerned about the potential for misuse of data (e.g., unauthorized access, secondary usage) due to the granularity of data and the many uncertainties about data collection, storage, use of, and control over data [94,95], especially when swap suggestions are not provided by an expert [96,97]. In simpler terms, even if consumers trust the retailer, concerns could overshadow any positive effects of trust. ...

Individuals’ Attitudes Towards Electronic Health Records: A Privacy Calculus Perspective
  • Citing Chapter
  • January 2016

... The extended APCO model [20] called for consideration of other constructs from sources such as psychology to explain individual behaviors when making privacy decisions. Rather than all decisions being made in a deliberative, highly cognitive fashion which was studied with the original APCO model, responses of a less taxing mental response should be considered. ...

Research Commentary—Informing Privacy Research Through Information Systems, Psychology, and Behavioral Economics: Thinking Outside the “APCO” Box
  • Citing Article
  • November 2015

Information Systems Research

... A user's decision to make an on-line retail purchase is influenced by trust, perceived vulnerability, and concern with privacy, which are known to be among the most important factors that drive electronic commerce (Dinev, et al., 2017). Therefore, understanding the antecedents of trust should be a core concern for on-line retail operators. ...

PRIVACY TRADE-OFF FACTORS IN E-COMMERCE - A STUDY OF ITALY AND THE UNITED STATES.
  • Citing Article
  • August 2005

Academy of Management Proceedings

... In the United States, academics also examined individual beliefs and concerns about government surveillance on the Internet and compared it with users in Italy. They concluded that Italians have less Internet privacy concerns than Americans, lower perceived need for government surveillance but higher concerns about government intrusion (Dinev et al. 2006). Researchers using individual-level data from US are also interested in what influences attitudes to government surveillance. ...

Internet Users' Privacy Concerns and Beliefs About Government Surveillance
  • Citing Article
  • October 2008

... This emphasizes the importance of organizations providing robust support to their workforce. Studies confirm that organizational support is a critical determinant of employee compliance with health protocols, as it reduces barriers and fosters a sense of care and accountability [102,103]. To further strengthen drivers' compliance intentions, ride-hailing platforms should expand their support systems by offering subsidized PPE, free COVID-19 testing, and financial incentives for adherence to safety protocols. ...

Managing Employee Compliance with Information Security Policies: The Critical Role of Top Management and Organizational Culture*
  • Citing Article
  • August 2012

Decision Sciences