Reconciliation of Privacy with Preventive Cybersecurity: The Bright Internet Approach
Author
Abstract
Suggested Citation
DOI: 10.1007/s10796-020-09984-5
Download full text from publisher
As the access to this document is restricted, you may want to search for a different version of it.
References listed on IDEAS
- Arunabha Mukhopadhyay & Samir Chatterjee & Kallol K. Bagchi & Peteer J. Kirs & Girja K. Shukla, 2019. "Cyber Risk Assessment and Mitigation (CRAM) Framework Using Logit and Probit Models for Cyber Insurance," Information Systems Frontiers, Springer, vol. 21(5), pages 997-1018, October.
- Ahmet Bulent Ozturk & Khaldoon Nusair & Fevzi Okumus & Dipendra Singh, 0. "Understanding mobile hotel booking loyalty: an integration of privacy calculus theory and trust-risk framework," Information Systems Frontiers, Springer, vol. 0, pages 1-15.
- Darrell Carpenter & Alexander McLeod & Chelsea Hicks & Michele Maasberg, 0. "Privacy and biometrics: An empirical examination of employee concerns," Information Systems Frontiers, Springer, vol. 0, pages 1-20.
- Jingguo Wang & Nan Xiao & H. Raghav Rao, 2015. "Research Note—An Exploration of Risk Characteristics of Information Security Threats and Related Public Information Search Behavior," Information Systems Research, INFORMS, vol. 26(3), pages 619-633, September.
- Paul John Steinbart & Mark J. Keith & Jeffry Babb, 2016. "Examining the Continuance of Secure Behavior: A Longitudinal Field Study of Mobile Device Authentication," Information Systems Research, INFORMS, vol. 27(2), pages 219-239, June.
- Mousa Albashrawi & Luvai Motiwalla, 2019. "Privacy and Personalization in Continued Usage Intention of Mobile Banking: An Integrative Perspective," Information Systems Frontiers, Springer, vol. 21(5), pages 1031-1043, October.
- I. Reay & P. Beatty & S. Dick & J. Miller, 2013. "Privacy policies and national culture on the internet," Information Systems Frontiers, Springer, vol. 15(2), pages 279-292, April.
- Nicholas Martin & Christian Matt & Crispin Niebel & Knut Blind, 2019. "How Data Protection Regulation Affects Startup Innovation," Information Systems Frontiers, Springer, vol. 21(6), pages 1307-1324, December.
- Ravi Inder Singh & Manasa Sumeeth & James Miller, 2011. "A user-centric evaluation of the readability of privacy policies in popular web sites," Information Systems Frontiers, Springer, vol. 13(4), pages 501-514, September.
- John D'Arcy & Anat Hovav & Dennis Galletta, 2009. "User Awareness of Security Countermeasures and Its Impact on Information Systems Misuse: A Deterrence Approach," Information Systems Research, INFORMS, vol. 20(1), pages 79-98, March.
- Jae Kyu Lee, 2016. "Invited Commentary—Reflections on ICT-enabled Bright Society Research," Information Systems Research, INFORMS, vol. 27(1), pages 1-5, March.
- Darrell Carpenter & Alexander McLeod & Chelsea Hicks & Michele Maasberg, 2018. "Privacy and biometrics: An empirical examination of employee concerns," Information Systems Frontiers, Springer, vol. 20(1), pages 91-110, February.
- Nong Ye & Toni Farley & Deepak Lakshminarasimhan, 2006. "An attack-norm separation approach for detecting cyber attacks," Information Systems Frontiers, Springer, vol. 8(3), pages 163-177, July.
- Tamara Dinev & Paul Hart, 2006. "An Extended Privacy Calculus Model for E-Commerce Transactions," Information Systems Research, INFORMS, vol. 17(1), pages 61-80, March.
- MinJae Lee & JinKyu Lee, 2012. "The impact of information security failure on customer behaviors: A study on a large-scale hacking incident on the internet," Information Systems Frontiers, Springer, vol. 14(2), pages 375-393, April.
- Eytan Adar & Rajan Lukose & Caesar Sengupta & Josh Tyler & Nathaniel Good, 2003. "Shock: Aggregating Information While Preserving Privacy," Information Systems Frontiers, Springer, vol. 5(1), pages 15-28, January.
- Ahmet Bulent Ozturk & Khaldoon Nusair & Fevzi Okumus & Dipendra Singh, 2017. "Understanding mobile hotel booking loyalty: an integration of privacy calculus theory and trust-risk framework," Information Systems Frontiers, Springer, vol. 19(4), pages 753-767, August.
- Athanasios Loukas & Dimitrios Damopoulos & Sofia A. Menesidou & Maria E. Skarkala & Georgios Kambourakis & Stefanos Gritzalis, 2012. "MILC: A secure and privacy-preserving mobile instant locator with chatting," Information Systems Frontiers, Springer, vol. 14(3), pages 481-497, July.
Citations
Citations are extracted by the CitEc Project, subscribe to its RSS feed for this item.
Cited by:
- Dan J. Kim & Indranil Bose & Arunabha Mukhopadhyay, 2023. "Special Issue on Bright Information and Communication Technologies in the 21st Century," Information Systems Frontiers, Springer, vol. 25(5), pages 1661-1665, October.
- Jae Yeon Kim & Jaeung Sim & Daegon Cho, 2023. "Identity and Status: When Counterspeech Increases Hate Speech Reporting and Why," Information Systems Frontiers, Springer, vol. 25(5), pages 1683-1694, October.
- Paras Bhatt & Naga Vemprala & Rohit Valecha & Govind Hariharan & H. Raghav Rao, 2023. "User Privacy, Surveillance and Public Health during COVID-19 – An Examination of Twitterverse," Information Systems Frontiers, Springer, vol. 25(5), pages 1667-1682, October.
- R. Ramesh & H. R. Rao, 2020. "ISF Editorial 2020," Information Systems Frontiers, Springer, vol. 22(1), pages 1-9, February.
- V. S. Prakash Attili & Saji K. Mathew & Vijayan Sugumaran, 2022. "Information Privacy Assimilation in IT Organizations," Information Systems Frontiers, Springer, vol. 24(5), pages 1497-1513, October.
- Supunmali Ahangama, 2023. "Relating Social Media Diffusion, Education Level and Cybersecurity Protection Mechanisms to E-Participation Initiatives: Insights from a Cross-Country Analysis," Information Systems Frontiers, Springer, vol. 25(5), pages 1695-1711, October.
- Ben Krishna & Satish Krishnan & M. P. Sebastian, 2023. "Examining the Relationship between National Cybersecurity Commitment, Culture, and Digital Payment Usage: An Institutional Trust Theory Perspective," Information Systems Frontiers, Springer, vol. 25(5), pages 1713-1741, October.
- Antonia Russo & Gianluca Lax & Baptiste Dromard & Menad Mezred, 2022. "A System to Access Online Services with Minimal Personal Information Disclosure," Information Systems Frontiers, Springer, vol. 24(5), pages 1563-1575, October.
Most related items
These are the items that most often cite the same works as this one and are cited by the same works as this one.- Chulhwan Chris Bang, 2015. "Information systems frontiers: Keyword analysis and classification," Information Systems Frontiers, Springer, vol. 17(1), pages 217-237, February.
- Alraja, Mansour, 2022. "Frontline healthcare providers’ behavioural intention to Internet of Things (IoT)-enabled healthcare applications: A gender-based, cross-generational study," Technological Forecasting and Social Change, Elsevier, vol. 174(C).
- Nicholas Martin & Christian Matt & Crispin Niebel & Knut Blind, 2019. "How Data Protection Regulation Affects Startup Innovation," Information Systems Frontiers, Springer, vol. 21(6), pages 1307-1324, December.
- V. S. Prakash Attili & Saji K. Mathew & Vijayan Sugumaran, 2022. "Information Privacy Assimilation in IT Organizations," Information Systems Frontiers, Springer, vol. 24(5), pages 1497-1513, October.
- Gregor Dorfleitner & Lars Hornuf & Julia Kreppmeier, 2021. "Promise not Fulfilled: FinTech Data Privacy, and the GDPR," CESifo Working Paper Series 9359, CESifo.
- Gregor Dorfleitner & Lars Hornuf & Julia Kreppmeier, 2023. "Promise not fulfilled: FinTech, data privacy, and the GDPR," Electronic Markets, Springer;IIM University of St. Gallen, vol. 33(1), pages 1-29, December.
- Warut Khern-am-nuai & Matthew J. Hashim & Alain Pinsonneault & Weining Yang & Ninghui Li, 2023. "Augmenting Password Strength Meter Design Using the Elaboration Likelihood Model: Evidence from Randomized Experiments," Information Systems Research, INFORMS, vol. 34(1), pages 157-177, March.
- Robert E. Crossler & France Bélanger & Dustin Ormond, 2019. "The quest for complete security: An empirical analysis of users’ multi-layered protection from security threats," Information Systems Frontiers, Springer, vol. 21(2), pages 343-357, April.
- Kasim, Kabir O. & Winter, Scott R. & Liu, Dahai & Keebler, Joseph R. & Spence, Tyler B., 2021. "Passengers’ perceptions on the use of biometrics at airports: A statistical model of the extended theory of planned behavior," Technology in Society, Elsevier, vol. 67(C).
- Chulmo Koo & Francesco Ricci & Cihan Cobanoglu & Fevzi Okumus, 2017. "Special issue on smart, connected hospitality and tourism," Information Systems Frontiers, Springer, vol. 19(4), pages 699-703, August.
- Linyuan Liu & Haibin Zhu & Shenglei Chen, 2022. "Balancing Privacy Risk and Benefit in Service Selection for Multiprovision Cloud Service Composition," Mathematics, MDPI, vol. 10(10), pages 1-33, May.
- Yunxiang Zhang & Xianmin Song & Pengfei Tao & Haitao Li & Tianshu Zhan & Qian Cao, 2023. "Investigating Factors for Travelers’ Parking Behavior Intentions in Changchun, China, under the Influence of Smart Parking Systems," Sustainability, MDPI, vol. 15(15), pages 1-16, July.
- Amita Goyal Chin & Mark A. Harris & Robert Brookshire, 2022. "An Empirical Investigation of Intent to Adopt Mobile Payment Systems Using a Trust-based Extended Valence Framework," Information Systems Frontiers, Springer, vol. 24(1), pages 329-347, February.
- Xing Gao & Weijun Zhong & Shue Mei, 2015. "Security investment and information sharing under an alternative security breach probability function," Information Systems Frontiers, Springer, vol. 17(2), pages 423-438, April.
- Anupriya Khan & Satish Krishnan & Jithesh Arayankalam, 2022. "The Role of ICT Laws and National Culture in Determining ICT Diffusion and Well-Being: A Cross-Country Examination," Information Systems Frontiers, Springer, vol. 24(2), pages 415-440, April.
- Darrell Carpenter & Alexander McLeod & Chelsea Hicks & Michele Maasberg, 2018. "Privacy and biometrics: An empirical examination of employee concerns," Information Systems Frontiers, Springer, vol. 20(1), pages 91-110, February.
- Sophie Cockcroft & Saphira Rekker, 2016. "The relationship between culture and information privacy policy," Electronic Markets, Springer;IIM University of St. Gallen, vol. 26(1), pages 55-72, February.
- Rajan, Rishabh & Rana, Nripendra P. & Parameswar, Nakul & Dhir, Sanjay & Sushil, & Dwivedi, Yogesh K., 2021. "Developing a modified total interpretive structural model (M-TISM) for organizational strategic cybersecurity management," Technological Forecasting and Social Change, Elsevier, vol. 170(C).
- Andrea North-Samardzic, 2020. "Biometric Technology and Ethics: Beyond Security Applications," Journal of Business Ethics, Springer, vol. 167(3), pages 433-450, December.
- Darrell Carpenter & Alexander McLeod & Chelsea Hicks & Michele Maasberg, 0. "Privacy and biometrics: An empirical examination of employee concerns," Information Systems Frontiers, Springer, vol. 0, pages 1-20.
More about this item
Keywords
Bright internet; Privacy rights; GDPR; Preventive cybersecurity protocol; Identifiable anonymity protocol; Self-defense rights;All these keywords.
Statistics
Access and download statisticsCorrections
All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:spr:infosf:v:22:y:2020:i:1:d:10.1007_s10796-020-09984-5. See general information about how to correct material in RePEc.
If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.
If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .
If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.
For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Sonal Shukla or Springer Nature Abstracting and Indexing (email available below). General contact details of provider: http://www.springer.com .
Please note that corrections may take a couple of weeks to filter through the various RePEc services.