Tamara Dinev’s research while affiliated with Florida Atlantic University and other places

What is this page?


This page lists works of an author who doesn't have a ResearchGate profile or hasn't added the works to their profile yet. It is automatically generated from public (personal) data to further our legitimate goal of comprehensive and accurate scientific recordkeeping. If you are this author and want this page removed, please let us know.

Publications (41)


Is There an On-line Advertisers' Dilemma? A Study of Click Fraud in the Pay-Per-Click Model
  • Article
  • Full-text available

December 2008

·

891 Reads

·

38 Citations

International Journal of Electronic Commerce

Tamara Dinev

·

·

Ali Yayla

This study develops a theoretical model, based on the theory of reasoned action and the concept of behavioral calculus, for understanding on-line advertiser behavior. Structural equation modeling and survey data are used to test hypotheses on how beliefs about on-line pay-per-click advertising shape the attitudes and subjective norms that lead advertisers to advertise on-line. The roles of trust, third-party tools, and support from search engine providers are explored. The study confirms that attitudes and subjective norms significantly influence intention to advertise on-line using the pay-per-click model, but trust in search engine providers and third-party monitoring and filtering tools are also found to have central roles. Trust can significantly increase the perceived benefits, in addition to its direct positive impact on attitude and subjective norms. The perceived effectiveness of third-party tools has a positive impact on attitude and trust, and thus on intention to advertise on-line.

Download

Internet Users' Privacy Concerns and Beliefs About Government Surveillance

October 2008

·

76 Reads

·

65 Citations

Tamara Dinev

·

Massimo Bellotto

·

Paul Hart

·

[...]

·

Ilaria Serra

The study examines differences in individual’s privacy concerns and beliefs about government surveillance in Italy and the United States. By incorporating aspects of multiple cultural theories, we argue that for both countries, the user’s decision to conduct e-commerce transactions on the Internet is influenced by privacy concerns, perceived need for government surveillance that would secure the Internet environment from fraud, crime and terrorism, and balancing concerns about government intrusion. An empirical model was tested using LISREL structural equation modeling and multigroup analysis. The results support the hypotheses with regard to direction and relative magnitude of the relationships. Italians exhibit lower Internet privacy concerns than individuals in the U.S., lower perceived need for government surveillance, and higher concerns about government intrusion. The relationships among the model constructs are also different across the two countries. Implications of the findings and directions for future work are discussed.


Internet privacy concerns and beliefs about government surveillance – An empirical investigation

September 2008

·

1,521 Reads

·

239 Citations

The Journal of Strategic Information Systems

This U.S.-based research attempts to understand the relationships between users’ perceptions about Internet privacy concerns, the need for government surveillance, government intrusion concerns, and the willingness to disclose personal information required to complete online transactions. We test a theoretical model based on a privacy calculus framework and Asymmetric Information Theory using data collected from 422 respondents. Using LISREL, we found that privacy concerns have an important influence on the willingness to disclose personal information required to transact online. The perceived need for government surveillance was negatively related to privacy concerns and positively related to willingness to disclose personal information. On the other hand, concerns about government intrusion were positively related to privacy concerns. The theoretical framework of our study can be applied across other countries.


Internet Users' Beliefs about Government Surveillance - The Role of Social Awareness and Internet Literacy.

January 2008

·

66 Reads

·

30 Citations

This study focuses on exploring Internet literacy and social awareness as antecedents to Internet users' attitudes towards government surveillance in the Internet environment. Previously developed instruments for Internet literacy, social awareness, perceived need for government surveillance, and government intrusion concerns have been employed in the study. The relationships are measured and explored through exploratory factor analysis (EFA) followed by linear regression models. Three of the four hypothesized relationships were found to be statistically significant - social awareness positively and Internet literacy negatively related to the perceived need for government surveillance, and Internet literacy positively related to the government intrusion concerns. The contribution of this research is in the attempt to explore surveillance attitudes in the post-9/11 American society. The study presents empirically tested relationships which are important for developing well-balanced policies of security protection and civil liberties.



Table 1 . Discriminant Validity
Examining the Formation of Individual's Privacy Concerns: Toward an Integrative View.

January 2008

·

8,748 Reads

·

396 Citations

Numerous public opinion polls reveal that individuals are quite concerned about threats to their information privacy. However, the current understanding of privacy that emerges is fragmented and usually discipline-dependent. A systematic understanding of individuals’ privacy concerns is of increasing importance as information technologies increasingly expand the ability for organizations to store, process, and exploit personal data. Drawing on information boundary theory, we developed an integrative model suggesting that privacy concerns form because of an individual’s disposition to privacy or situational cues that enable one person to assess the consequences of information disclosure. Furthermore, a cognitive process, comprising perceived privacy risk, privacy control and privacy intrusion is proposed to shape an individual’s privacy concerns toward a specific Web site’s privacy practices. We empirically tested the research model through a survey (n=823) that was administered to users of four different types of web sites: 1) electronic commerce sites, 2) social networking sites, 3) financial sites, and 4) healthcare sites. The study reported here is novel to the extent that existing empirical research has not examined this complex set of privacy issues. Implications for theory and practice are discussed, and suggestions for future research along the directions of this study are provided.


The Centrality of Awareness in the Formation of User Behavioral Intention toward Protective Information Technologies

July 2007

·

3,034 Reads

·

427 Citations

Journal of the Association for Information Systems

While there is a rich body of literature on user acceptance of technologies with positive outcomes, little is known about user behavior toward what we call protective technologies: information technologies that protect data and systems from disturbances such as viruses, unauthorized access, disruptions, spyware, and others. In this paper, we present the results of a study of user behavioral intention toward protective technologies based on the framework of the theory of planned behavior. We find that awareness of the threats posed by negative technologies is a strong predictor of user behavioral intention toward the use of protective technologies. More interestingly, in the presence of awareness, the influence of subjective norm on individual behavioral intention is weaker among basic technology users but stronger among advanced technology users. Furthermore, while our results are consistent with many of the previously established relationships in the context of positive technologies, we find that the determinants ¡°perceived ease of use¡± and ¡°computer self-efficacy¡± are no longer significant in the context of protective technologies. We believe that this result highlights the most significant difference between positive technologies and protective technologies: while the former are used for their designed utilities, for which usefulness and ease of use have a significant impact, the latter are used out of fear of negative consequences, for which awareness becomes a key determinant. We discussed the theoretical and practical implications of these findings. The findings of this study extend the theory of planned behavior to the context of protective technologies and shed insights on designing effective information security policies, practices, and protective technologies for organizations and society.


Internet Users' Privacy Concerns and Beliefs About Government Surveillance: An Exploratory Study of Differences Between Italy and the United States.

October 2006

·

456 Reads

·

96 Citations

The study examines differences in individual’s privacy concerns and beliefs about government surveillance in Italy and the United States. By incorporating aspects of multiple cultural theories, we argue that for both countries, the user’s decision to conduct e-commerce transactions on the Internet is influenced by privacy concerns, perceived need for government surveillance that would secure the Internet environment from fraud, crime and terrorism, and balancing concerns about government intrusion. An empirical model was tested using LISREL structural equation modeling and multigroup analysis. The results support the hypotheses with regard to direction and relative magnitude of the relationships. Italians exhibit lower Internet privacy concerns than individuals in the U.S., lower perceived need for government surveillance, and higher concerns about government intrusion. The relationships among the model constructs are also different across the two countries. Implications of the findings and directions for future work are discussed.


Why Spoofing Is Serious Internet Fraud

October 2006

·

562 Reads

·

58 Citations

Communications of the ACM

Web spoofing that extract personal financial information of unwary web visitors is a great threat to undermine the consumers confidence in Internet shopping and banking. Web spoofing involves construction of a fake Web site similar to legitimate Web site and use of phishing to extract sensitive personal and financial information of online users for illegal use of retried data. According to the US Federal Trade Commission's annual report, Web spoofing has victimized nearly 10 million Americans with costs to business and consumers of almost $ 53 billion in 2003, about 79 % higher than year 2002. Web spoofing can be controlled by increasing public awareness and development of technologies that help consumers identify spoof sites. Online user should never log into a Web site by accessing it from a link in an email message or on an untrusted Web site such as a discussion board or chat room. Online user should open the browser and type the URL on the address bar.


Privacy calculus model in e-commerce - A study of Italy and the United States

August 2006

·

659 Reads

·

416 Citations

This study examines cross-cultural differences beliefs related to e-commerce use for Italy and the United States. We argue that for both cultures, the user's decision to make an online purchase is simultaneously influenced by a set of contrary factors. These include decision facilitators such as propensity to trust and institutional trust, and decision inhibitors such as perceived risk and privacy concerns. We argue that substantial cultural differences exist that affect the above factors and the relationships among them. We use Hofstede's cultural theory and Fukuyama's theory of trust and social capital, along with emic factors important for the Italian society, to develop the study's propositions. The hypotheses were empirically tested using LISREL structural equation modeling and multigroup analysis. The results revealed that the Italian society exhibited lower propensity to trust, institutional trust, privacy concerns, and higher perceived risk. The relationships between institutional trust and e-commerce use, privacy concerns and e-commerce use, and perceived risk and institutional trust are all weaker for Italy. The relationship between perceived risk and privacy concerns is stronger for Italy. The paper's major contribution is in validating an important model of e-commerce use across two cultures and showing the moderating effects of culture.European Journal of Information Systems (2006) 15, 389–402. doi:10.1057/palgrave.ejis.3000590


Citations (39)


... Smith et al. [14] determined the antecedents, privacy concerns and outcomes of the disclosure of personal data by using the macro APCO (Antecedents, Privacy, Concerns, Outcomes) model. APCO brings together the body of knowledge on information privacy by integrating key factors explored in various studies, commencing with the examination of privacy apprehensions, which is the most frequently investigated element within this domain [15]. Dinev et al. [16] proposed the macro APCO model, in which individuals are affected by external factors while sharing their personal data, and this influence causes behavioural changes by creating privacy concerns. ...

Reference:

Decoding privacy concerns: the role of perceived risk and benefits in personal health data disclosure
Revisiting APCO

... The rookie personality informs the user about its flaws (Ahmad et al., 2022;Benner et al., 2021) and is, therefore, likely to be perceived to be less reliable (Jiang et al., 2002;Meyer-Waarden et al., 2020). The actual performance is not influenced by this statement, but the perception of the CA is still changed and priming users' assessment (Buck & Dinev, 2020;Meyer-Waarden et al., 2020). Support can be found in the literature for this deduction. ...

Low Effort and Privacy – How Textual Priming Affects Privacy Concerns of Email Service Users
  • Citing Conference Paper
  • January 2020

... Another stream of studies examines the magnitude of cybersecurity risk. Acquisti et al. (2019) reported that a cyber breach statistically reduced the short-term value of the stocks. Gao et al. (2020) concluded that a successful data breach negatively impacts a company's reputation and customer relationships. ...

Editorial: Special issue on cyber security, privacy and ethics of information systems

... Repeated breaches can also lead to privacy fatigue (Choi et al., 2018). Here, an organization's practices revolving ethics, privacy policy and visibility influences customer satisfaction, lowers privacy concerns and enhances trust (Keil et al., 2019;Singh et al., 2020;Xu et al., 2011) which leads to increased purchase intent (Martin and Murphy, 2017) and satisfactory transaction experience (Chatterjee and Bolar, 2019) during online shopping resulting in customer patronage. Contrary to this, the mishandling of customers' private information or accidental disclosure manifested in form of identity theft, spam, hacking and unauthorized access leads to online privacy concerns and lower acceptance of e-commerce (Bandyopadhyay, 2009;Chen et al., 2017;Dinev and Hart, 2004). ...

Data Governance, Consumer Privacy, and Project Status Reporting: Remembering H. Jeff Smith

... Human-computer interaction (HCI) challenges-including interface usability, privacy controls, and system transparency-are critical to a whistleblower's willingness to report misconduct. Research in behavioral information security indicates that users' perceptions of anonymity, control, and risk directly affect their adoption of security-related tools (Lowry et al., 2017), yet whistleblowing studies rarely incorporate these concerns. ...

Why Security and Privacy Research Lies at the Centre of the Information Systems (IS) Artefact: Proposing A Bold Research Agenda

... While often treated as a whole, a prior study found that the data within a medical record varies in sensitivity and may require different levels of consent [21]. Other studies have noted the complexities and discrepancies of users' perceptions about their privacy across the context of clinical care and personal health management [36,45,69,184]. For example, individuals exhibited lower privacy concerns regarding data collected from fitness trackers as they believed the threats to be very unlikely to occur [69], but in a study by Tran et al., only 20% of participants considered the benefits of the wearable to outweigh the dangers [184]. ...

Individuals’ Attitudes Towards Electronic Health Records: A Privacy Calculus Perspective
  • Citing Chapter
  • January 2016

... The extended APCO model [20] called for consideration of other constructs from sources such as psychology to explain individual behaviors when making privacy decisions. Rather than all decisions being made in a deliberative, highly cognitive fashion which was studied with the original APCO model, responses of a less taxing mental response should be considered. ...

Research Commentary—Informing Privacy Research Through Information Systems, Psychology, and Behavioral Economics: Thinking Outside the “APCO” Box
  • Citing Article
  • November 2015

Information Systems Research

... A user's decision to make an on-line retail purchase is influenced by trust, perceived vulnerability, and concern with privacy, which are known to be among the most important factors that drive electronic commerce (Dinev, et al., 2017). Therefore, understanding the antecedents of trust should be a core concern for on-line retail operators. ...

PRIVACY TRADE-OFF FACTORS IN E-COMMERCE - A STUDY OF ITALY AND THE UNITED STATES.
  • Citing Article
  • August 2005

Academy of Management Proceedings

... In the United States, academics also examined individual beliefs and concerns about government surveillance on the Internet and compared it with users in Italy. They concluded that Italians have less Internet privacy concerns than Americans, lower perceived need for government surveillance but higher concerns about government intrusion (Dinev et al. 2006). Researchers using individual-level data from US are also interested in what influences attitudes to government surveillance. ...

Internet Users' Privacy Concerns and Beliefs About Government Surveillance
  • Citing Article
  • October 2008

... This strategy involved the execution of both technical safeguards, such as encryption and multi-factor authentication, as well as administrative measures, which encompassed the development of robust security policies and comprehensive employee training (Siponen et al., 2014). TTAT recognized the pivotal role that employees played in the realm of cybersecurity, underscoring the necessity for organizations to ensure their personnel were well-informed about potential threats and prepared to take actions that effectively mitigated risks (Hu et al., 2012). ...

Managing Employee Compliance with Information Security Policies: The Critical Role of Top Management and Organizational Culture*
  • Citing Article
  • August 2012

Decision Sciences