Tamara Dinev’s research while affiliated with Florida Atlantic University and other places

What is this page?


This page lists works of an author who doesn't have a ResearchGate profile or hasn't added the works to their profile yet. It is automatically generated from public (personal) data to further our legitimate goal of comprehensive and accurate scientific recordkeeping. If you are this author and want this page removed, please let us know.

Publications (41)


USER BEHAVIOR TOWARD PREVENTIVE TECHNOLOGIES–EXAMINING CROSS-CULTURAL DIFFERENCES BETWEEN THE UNITED STATES AND …
  • Article
  • Full-text available

252 Reads

·

6 Citations

Tamara Dinev

·

·

Jayhun Goo

Preventive technologies -computer technologies that secure data and systems from viruses, unauthorized access, disruptions, spyware, and other negative technologies -have become increasingly important in the global networked economy and society. Yet, little is known about user attitudes and behavior and their predictors. This study examines cross-cultural differences between South Korea and the United States in user behavior toward preventive technologies in the context of anti-spyware technologies. The theoretical model developed is based on the framework of the theory of planned behavior and the Hofstede's cultural indicators. Several propositions about the strength of the model's relationships are made. The methodology of the empirical analysis is described as a future work. Theoretical and practical implications of the study are discussed. We believe that the theoretical propositions of this study shed insights on designing effective information security policies, practices, and technologies for different cultures.

Download

Citations (39)


... Smith et al. [14] determined the antecedents, privacy concerns and outcomes of the disclosure of personal data by using the macro APCO (Antecedents, Privacy, Concerns, Outcomes) model. APCO brings together the body of knowledge on information privacy by integrating key factors explored in various studies, commencing with the examination of privacy apprehensions, which is the most frequently investigated element within this domain [15]. Dinev et al. [16] proposed the macro APCO model, in which individuals are affected by external factors while sharing their personal data, and this influence causes behavioural changes by creating privacy concerns. ...

Reference:

Decoding privacy concerns: the role of perceived risk and benefits in personal health data disclosure
Revisiting APCO

... The rookie personality informs the user about its flaws (Ahmad et al., 2022;Benner et al., 2021) and is, therefore, likely to be perceived to be less reliable (Jiang et al., 2002;Meyer-Waarden et al., 2020). The actual performance is not influenced by this statement, but the perception of the CA is still changed and priming users' assessment (Buck & Dinev, 2020;Meyer-Waarden et al., 2020). Support can be found in the literature for this deduction. ...

Low Effort and Privacy – How Textual Priming Affects Privacy Concerns of Email Service Users
  • Citing Conference Paper
  • January 2020

... Another stream of studies examines the magnitude of cybersecurity risk. Acquisti et al. (2019) reported that a cyber breach statistically reduced the short-term value of the stocks. Gao et al. (2020) concluded that a successful data breach negatively impacts a company's reputation and customer relationships. ...

Editorial: Special issue on cyber security, privacy and ethics of information systems

... Repeated breaches can also lead to privacy fatigue (Choi et al., 2018). Here, an organization's practices revolving ethics, privacy policy and visibility influences customer satisfaction, lowers privacy concerns and enhances trust (Keil et al., 2019;Singh et al., 2020;Xu et al., 2011) which leads to increased purchase intent (Martin and Murphy, 2017) and satisfactory transaction experience (Chatterjee and Bolar, 2019) during online shopping resulting in customer patronage. Contrary to this, the mishandling of customers' private information or accidental disclosure manifested in form of identity theft, spam, hacking and unauthorized access leads to online privacy concerns and lower acceptance of e-commerce (Bandyopadhyay, 2009;Chen et al., 2017;Dinev and Hart, 2004). ...

Data Governance, Consumer Privacy, and Project Status Reporting: Remembering H. Jeff Smith

... Human-computer interaction (HCI) challenges-including interface usability, privacy controls, and system transparency-are critical to a whistleblower's willingness to report misconduct. Research in behavioral information security indicates that users' perceptions of anonymity, control, and risk directly affect their adoption of security-related tools (Lowry et al., 2017), yet whistleblowing studies rarely incorporate these concerns. ...

Why Security and Privacy Research Lies at the Centre of the Information Systems (IS) Artefact: Proposing A Bold Research Agenda

... While often treated as a whole, a prior study found that the data within a medical record varies in sensitivity and may require different levels of consent [21]. Other studies have noted the complexities and discrepancies of users' perceptions about their privacy across the context of clinical care and personal health management [36,45,69,184]. For example, individuals exhibited lower privacy concerns regarding data collected from fitness trackers as they believed the threats to be very unlikely to occur [69], but in a study by Tran et al., only 20% of participants considered the benefits of the wearable to outweigh the dangers [184]. ...

Individuals’ Attitudes Towards Electronic Health Records: A Privacy Calculus Perspective
  • Citing Chapter
  • January 2016

Tamara Dinev

·

·

·

[...]

·

Paul Hart

... The extended APCO model [20] called for consideration of other constructs from sources such as psychology to explain individual behaviors when making privacy decisions. Rather than all decisions being made in a deliberative, highly cognitive fashion which was studied with the original APCO model, responses of a less taxing mental response should be considered. ...

Research Commentary—Informing Privacy Research Through Information Systems, Psychology, and Behavioral Economics: Thinking Outside the “APCO” Box
  • Citing Article
  • November 2015

Information Systems Research

... A user's decision to make an on-line retail purchase is influenced by trust, perceived vulnerability, and concern with privacy, which are known to be among the most important factors that drive electronic commerce (Dinev, et al., 2017). Therefore, understanding the antecedents of trust should be a core concern for on-line retail operators. ...

PRIVACY TRADE-OFF FACTORS IN E-COMMERCE - A STUDY OF ITALY AND THE UNITED STATES.
  • Citing Article
  • August 2005

Academy of Management Proceedings

... In the United States, academics also examined individual beliefs and concerns about government surveillance on the Internet and compared it with users in Italy. They concluded that Italians have less Internet privacy concerns than Americans, lower perceived need for government surveillance but higher concerns about government intrusion (Dinev et al. 2006). Researchers using individual-level data from US are also interested in what influences attitudes to government surveillance. ...

Internet Users' Privacy Concerns and Beliefs About Government Surveillance
  • Citing Article
  • October 2008

... This strategy involved the execution of both technical safeguards, such as encryption and multi-factor authentication, as well as administrative measures, which encompassed the development of robust security policies and comprehensive employee training (Siponen et al., 2014). TTAT recognized the pivotal role that employees played in the realm of cybersecurity, underscoring the necessity for organizations to ensure their personnel were well-informed about potential threats and prepared to take actions that effectively mitigated risks (Hu et al., 2012). ...

Managing Employee Compliance with Information Security Policies: The Critical Role of Top Management and Organizational Culture*
  • Citing Article
  • August 2012

Decision Sciences