Tamara Dinev's research while affiliated with Florida Atlantic University and other places

Publications (41)

Chapter
Full-text available
Imagine that you are a product manager at a software company. When users disclose some information to your product, they can use all the great features you and your team have integrated into the software. Utilizing these features is essential for the success of your product: it makes users satisfied and encourages others to use the software as well...
Article
Full-text available
In October 2019, the information systems community was shocked and saddened to learn that H. Jeff Smith had passed away after battling lymphoma. While primarily known for his pioneering work on privacy, Jeff made a number of significant contributions to the field of information systems. In this invited editorial, we examine the impact of Jeff’s sch...
Article
This special Issue of Information Systems Frontiers, dedicated to the memory of H. Jeff Smith (Keil et al. 2019), contains a selection of manuscripts originally accepted for the ICIS 2018 track on Cyber Security, Privacy and Ethics of IS. Authors of all manuscripts accepted into the ICIS track were invited to submit revised versions of their manusc...
Article
Full-text available
In this essay, we outline some important concerns in the hope of improving the effectiveness of security and privacy research. We discuss the need to re-examine our understanding of information technology (IT) and information system (IS) artefacts and to expand the range of the latter to include those artificial phenomena that are crucial to inform...
Chapter
National adoption of Electronic Health Records (EHRs) is considered an essential component of the health care system overhaul sought by policy makers and health care professionals, in both U.S. and Europe, to cut costs and increase benefits. And yet, along with the technological aspects, the human factor consistently proves to be a critical compone...
Article
Recently, several researchers provided overarching macromodels to explain individuals' privacy-related decision making. These macromodels-and almost all of the published privacy-related information systems (IS) studies to date-rely on a covert assumption: responses to external stimuli result in deliberate analyses, which lead to fully informed priv...
Article
Privacy is one of the few concepts that has been studied across many disciplines, but is still difficult to grasp. The current understanding of privacy is largely fragmented and discipline-dependent. This study develops and tests a framework of information privacy and its correlates, the latter often being confused with or built into definitions of...
Article
We develop an individual behavioral model that integrates the role of top management and organizational culture into the theory of planned behavior in an attempt to better understand how top management can influence security compliance behavior of employees. Using survey data and structural equation modeling, we test hypotheses on the relationships...
Article
In the Security-Liberty balance, individuals would weigh the benefits of government surveillance against what the cost would be to our civil liberties. Drawing on Social Cognitive Theory (SCT), this study empirically operationalises and tests citizens' attitudes towards internet government surveillance and discusses predictors of these attitudes th...
Article
Full-text available
To date, many important threads of information privacy research have developed, but these threads have not been woven together into a cohesive fabric. This paper provides an interdisciplinary review of privacy-related research in order to enable a more cohesive treatment. With a sample of 320 privacy articles and 128 books and book sections, we cla...
Article
Organizational information practices can result in a variety of privacy problems that can increase consumers' concerns for information privacy. To explore the link between individuals and organizations regarding privacy, we study how institutional privacy assurances such as privacy policies and industry self-regulation can contribute to reducing in...
Article
Full-text available
Social computing and online communities are changing the fundamental way people share information and communicate with each other. Social computing focuses on how users may have more autonomy to express their ideas and participate in social exchanges in various ways, one of which may be peer-to-peer (P2P) file sharing. Given the greater risk of opp...
Article
Full-text available
Methods for evaluating and effectively managing the security behavior of employees.
Conference Paper
Full-text available
Computer offences and crimes against corporate computer systems have increasingly become a major challenge to information security management in the Internet-enabled global economy and society. In this study, we attempt to develop a theoretical model that integrates three main stream criminology theories, i.e., general deterrence, rational choice,...
Article
Abstract Computer technologies that protect data and systems from viruses, unauthorized access, disruptions, spyware and other threats have become increasingly important in the globally networked economy and society. Yet little is known about user attitudes and behaviour towards this category of information technologies. Comparative studies across...
Conference Paper
Full-text available
The commercial potential and rapid growth of Web 2.0 phenomenon have been accompanied by concerns regarding the collection, dissemination, and re-identification of personal information by Web site operators, marketers, and other users on the social networks. To address critical and acute concerns for information privacy, this study investigated use...
Conference Paper
Social computing and online communities are changing the fundamental way people communicate and share information. Social computing focuses on how users may have more autonomy to express their ideas and participate in social exchanges in various ways, one of which may be Peer-to-Peer (P2P) file sharing. Given the risk of opportunistic behavior by m...
Article
Full-text available
This study develops a theoretical model, based on the theory of reasoned action and the concept of behavioral calculus, for understanding on-line advertiser behavior. Structural equation modeling and survey data are used to test hypotheses on how beliefs about on-line pay-per-click advertising shape the attitudes and subjective norms that lead adve...
Article
The study examines differences in individual’s privacy concerns and beliefs about government surveillance in Italy and the United States. By incorporating aspects of multiple cultural theories, we argue that for both countries, the user’s decision to conduct e-commerce transactions on the Internet is influenced by privacy concerns, perceived need f...
Article
This U.S.-based research attempts to understand the relationships between users’ perceptions about Internet privacy concerns, the need for government surveillance, government intrusion concerns, and the willingness to disclose personal information required to complete online transactions. We test a theoretical model based on a privacy calculus fram...
Conference Paper
This study focuses on exploring Internet literacy and social awareness as antecedents to Internet users' attitudes towards government surveillance in the Internet environment. Previously developed instruments for Internet literacy, social awareness, perceived need for government surveillance, and government intrusion concerns have been employed in...
Conference Paper
Full-text available
Numerous public opinion polls reveal that individuals are quite concerned about threats to their information privacy. However, the current understanding of privacy that emerges is fragmented and usually discipline-dependent. A systematic understanding of individuals’ privacy concerns is of increasing importance as information technologies increasin...
Article
Full-text available
While there is a rich body of literature on user acceptance of technologies with positive outcomes, little is known about user behavior toward what we call protective technologies: information technologies that protect data and systems from disturbances such as viruses, unauthorized access, disruptions, spyware, and others. In this paper, we presen...
Article
The study examines differences in individual’s privacy concerns and beliefs about government surveillance in Italy and the United States. By incorporating aspects of multiple cultural theories, we argue that for both countries, the user’s decision to conduct e-commerce transactions on the Internet is influenced by privacy concerns, perceived ne...
Article
Web spoofing that extract personal financial information of unwary web visitors is a great threat to undermine the consumers confidence in Internet shopping and banking. Web spoofing involves construction of a fake Web site similar to legitimate Web site and use of phishing to extract sensitive personal and financial information of online users for...
Article
This study examines cross-cultural differences beliefs related to e-commerce use for Italy and the United States. We argue that for both cultures, the user's decision to make an online purchase is simultaneously influenced by a set of contrary factors. These include decision facilitators such as propensity to trust and institutional trust, and deci...
Article
In this study we report on a classification scheme of intended e-services use based on levels of information exchange between users and Web sites. We refer to the broader concept of e-service as a service available via the Internet that completes tasks or conducts transactions. Each level varies by the amount and sensitivity of personal information...
Article
While privacy is a highly cherished value, few would argue with the notion that absolute privacy is unattainable. Individuals make choices in which they surrender a certain degree of privacy in exchange for outcomes that are perceived to be worth the risk of information disclosure. This research attempts to better understand the delicate balance be...
Article
This study focuses on antecedents to Internet privacy concerns and the behavioral intention to conduct on-line transactions. Perceptions of privacy are socially constructed through communication and transactions with social entities over a networked environment, a process that involves a certain level of technical skill and literacy. The research m...
Article
This study examines cross-cultural differences in privacy trade-off factors as related to e-commerce use for Italy and the United States. By employing the model of trade-off factors, we argue that for both cultures the user's decision to make a purchase is influenced by trust, perceived vulnerability, and privacy concerns which are known to be amon...
Article
Full-text available
Recent media attention to spyware [2, 5, 7, 8] has brought to light the blunt intrusion into individual privacy and the uncertain hidden cost of free access to Internet sites, along with freeware and shareware. Most spyware programs belong to the more benign category of adware that delivers targeted pop-up ads based on a user's Web surfing habits....
Article
Full-text available
Little is known about user behavior toward what we call preventive computer technologies that have become increasingly important in the networked economy and society to secure data and systems from viruses, unauthorized access, disruptions, spyware, and similar harmful technologies. We present the results of a study of user behavior toward preventi...
Article
This research focuses on the development and validation of an instrument to measure the privacy concerns of individuals who use the Internet and two antecedents, perceived vulnerability and perceived ability to control information. The results of exploratory factor analysis support the validity of the measures developed. In addition, the regression...
Article
While privacy is a highly cherished value, few would argue with the notion that absolute privacy is unattainable. Individuals make choices based on tradeoffs in which they surrender a certain degree of privacy in exchange for benefits that are perceived to be worth the cost of information disclosure. This research focuses on the delicate balance be...
Article
This study focuses on exploring Internet technical literacy and social awareness as antecedents to Internet privacy concerns. We report on the development and validation of instruments for Internet technical literacy and social awareness. Individual's privacy concerns are then considered with respect to these two constructs. The relationships are m...
Article
Full-text available
Preventive technologies -computer technologies that secure data and systems from viruses, unauthorized access, disruptions, spyware, and other negative technologies -have become increasingly important in the global networked economy and society. Yet, little is known about user attitudes and behavior and their predictors. This study examines cross-c...

Citations

... Expecting users to read large amounts of privacy information for a simple service such as an mHealth app is unrealistic, as it requires time and effort [10][11][12]. Previous research has shown that users often engage in trade-offs between being concerned about privacy of personal data and the potential benefits of using new technologies [10][11][12][13]19,20], whereas other studies have also suggested that users' decisions are simultaneously influenced by other factors, such as risk (privacy concern) and trust (perceived control) [56,57]. Similar to previous studies [12,16,[35][36][37], this study showed that the majority of participants were less likely to trust a commercial organization than a nonprofit or governmental organization supporting an mHealth app. ...
... Repeated breaches can also lead to privacy fatigue (Choi et al., 2018). Here, an organization's practices revolving ethics, privacy policy and visibility influences customer satisfaction, lowers privacy concerns and enhances trust (Keil et al., 2019;Singh et al., 2020;Xu et al., 2011) which leads to increased purchase intent (Martin and Murphy, 2017) and satisfactory transaction experience (Chatterjee and Bolar, 2019) during online shopping resulting in customer patronage. Contrary to this, the mishandling of customers' private information or accidental disclosure manifested in form of identity theft, spam, hacking and unauthorized access leads to online privacy concerns and lower acceptance of e-commerce (Bandyopadhyay, 2009;Chen et al., 2017;Dinev and Hart, 2004). ...
... Nowadays, organizations and institutions are managing a huge volume of sensitive data about their customers (Angelopoulos et al., 2021). Data security and privacy are paramount concerns for both consumers and organizations (Lowry, Dinev, & Willison, 2017). As consumers continue to share data for online transactions and organizations become more dependent to store data on the cloud, the concerns of potential security breaches and the demand for data protection will continue to grow. ...
... Due to the increasing cases of data security breaches in recent years (Ayaburi and Treku, 2020), users may have privacy concerns with voice assistants and become cautious about self-disclosure to them (Foehr and Germelmann, 2020). Recent research showed that privacy concerns had a strong negative influence on users' trust of voice assistants (Dinev et al., 2016), which may in turn lead to less use of voice assistants. Hence, it is possible that self-disclosure to voice assistants may increase users' concerns over their privacy, which, in turn, may reduce subsequent self-disclosure. ...
... To address this gap, we build on the emerging research stream advocating for the importance of affective processing in privacy-related decision-making (Adjerid et al. 2018;Alashoor et al. 2018;Dinev et al. 2015;Gerlach et al. 2019;Kehr et al. 2015;Li et al. 2017;Li et al. 2011;Wakefield 2013;Yu et al. 2015 Introducing BNDE as a distinct data disclosure setting. First, we contribute to privacy-related decision-making literature within and beyond the retailing context by introducing BNDE settings as data disclosure situations in which privacy-related decision-making is different to dyadic disclosure situations. ...
... On the downside, the ability to access private information almost anywhere and at anytime comes with implications on user privacy. Acknowledging this issue, a plethora of research investigated the privacy perceptions and concerns of users [18,21,34,35,39,54]. While these works significantly extended our understanding of user privacy, it remains unclear if these findings generalize to the wider populations of the world. ...
... Business executives play a vital role in providing a strategic view, which is crucial for aligning information security requirements to business objectives (Singh et al. 2013). Top management ensures that adequate resources are allocated to the ISM process in order to achieve the organisational business objectives (Hu et al. 2012). Therefore, gaining the support of this important stakeholder can have a significant influence on the participation of other types of stakeholders (Kankanhalli et al. 2003). ...
... In IS literature, two perceptions of information privacy have been established in particular. One central definition describes privacy as an economic, tradable good that can be exchanged with other goods or services (Dinev 2014;Smith et al. 2011). Based on this economic perspective, privacy can be viewed as a commodity (Campbell and Carlson 2002). ...
... In the USA there are no constitutional/legal requirements for data processors on how to use personal data (Schwartz and Peifer 2017). They are nowadays expected to manage the collection, storage and usage of personal information effectively (Dinev et al. 2013). In this respect, privacy engineering in such systems is immense not only in Europe but recently also across the Atlantic. ...
... However, it has also been established that normative forces predominate in motivating organizational investments by senior management in information privacy and security control resources (Attili et al., 2018;Cavusoglu et al., 2015). Furthermore, it is known that senior leaders' and privacy Siponen, 2000;Dinev & Hu, 2005;Bulgurcu et al., 2010;Hu et al., 2012Institutional Theory Bjorck, 2004Hu et al., 2007;Hsu et al., 2012;Hu et al., 2012;Tejay & Barton, 2013;Attili et al., 2015Attili et al., , 2018 Theory of multilevel information privacy management ...