Search results for "Internet privacy"

showing 10 items of 223 documents

Usability and Trust in E-Banking

2007

This study assessed the role of usability in trust of e-banking services. A questionnaire was administered to 185 Italian undergraduate working students who volunteered for the experiment (M age = 30.5 yr., SD = 3.1). Participants were differentiated on computer ability (Expert, n=104; Nonexpert, n = 81) and e-banking use (User, n = 93; Nonusers, n = 92). Analysis showed that the website usability of e-banking services did not play a very important role for the User group. Instead, institution-based trust, e.g., the trust in the security policy of the Web merchant, customers, and the overall trust of the bank were the crucial factors in the adoption of e-banking. © Psychological Reports 200…

AdultMaleSettore M-PSI/01 - Psicologia GeneraleEconomicse-banking e-banking servicesInternet privacyTrustSecurity policyRisk AssessmentUser groupHumansStudentsWeb usabilityComputer SecurityGeneral PsychologyInternetAttitude to Computersbusiness.industryData CollectionFraudE bankingUsabilityItalyInstitution (computer science)FemalePsychologybusinessPsychological Reports
researchProduct

The challenge of the predatory open-access publishing outbreak

2019

NA

Anesthesiology and Pain MedicinePredatory publishingbusiness.industryOpen access publishingmedia_common.quotation_subjectInternet privacyMEDLINEMedicineOutbreakDeceptionbusinessethicsmedia_common
researchProduct

Organizational information and communication technologies and their influence on communication visibility and perceived proximity

2021

This study investigates the relationships between the use of various organizational ICTs, communication visibility, and perceived proximity to distant colleagues. In addition, this study examines the interplay between visibility and proximity, to determine whether visibility improves proximity, or vice versa. These relationships are tested in a global company using two waves of panel survey data. ESM use increases communication visibility and perceived proximity, while controlling for prior levels of visibility, proximity, and the use of other organizational ICTs. The influence of ESM on network translucence and perceived proximity is generally stronger than the impact of other technologie…

Auditing and AccountabilityCommunication and Media StudiesComputer sciencetieto- ja viestintätekniikkaEconomics Econometrics and Finance (miscellaneous)Internet privacysosiaalinen media050801 communication & media studiesyhteisöviestintä0508 media and communicationsFile sharingAccounting0502 economics and businessperceived proximitycommunication visibilitysisäinen viestintäbusiness.industry05 social sciencesVisibility (geometry)Business and ManagementTeleconferenceteleconferencingetäkokouksetBusiness & ManagementInformation and Communications Technologyenterprise social mediafile sharingBusiness Management and Accounting (miscellaneous)ICTSnäkyvyysbusiness050203 business & managementInternational Journal of Business Communication
researchProduct

Benefits and Threats to Using Social Media for Presenting and Implementing Evidence.

2018

As a potential high-yield tool for disseminating information that can reach many people, social media is transforming how clinicians, the public, and policy makers are educated and find new knowledge associated with research-related information. Social media is available to all who access the internet, reducing selected barriers to acquiring original source documents such as journal articles or books and potentially improving implementation-the process of formulating a conclusion and moving on that decision. The use of social media for evidence dissemination/implementation of research has both benefits and threats. It is the aim of this Viewpoint to provide a balanced view of each. J Orthop…

Biomedical Research020205 medical informaticsbusiness.industryProcess (engineering)Information DisseminationInternet privacyAdministrative PersonnelPhysical Therapy Sports Therapy and Rehabilitation02 engineering and technologyGeneral MedicineResearch Personnel03 medical and health sciences0302 clinical medicineProfessionalism0202 electrical engineering electronic engineering information engineeringMedicineHumansThe InternetSocial media030212 general & internal medicineSource documentbusinessDisseminationHealth EducationSocial MediaThe Journal of orthopaedic and sports physical therapy
researchProduct

Plant visibility through mobile learning? Implementation and evaluation of an interactiveFlower Huntin a botanic garden

2017

Plants have an enormous importance for life on earth but are often overlooked. This phenomenon called plant blindness is reinforced as students prefer to spend their recreation time with modern med...

Blindnessbusiness.industry05 social sciencesVisibility (geometry)Internet privacyEducational technology050301 education010501 environmental sciencesmedicine.disease01 natural sciencesNatural resourceEducationmedicineBusinessGeneral Agricultural and Biological Sciences0503 educationMobile deviceRecreation0105 earth and related environmental sciencesJournal of Biological Education
researchProduct

Radiation Therapy in Palestine: Not Only Money, But Also Real Accessibility

2017

Cancer ResearchRadiationbusiness.industrymedicine.medical_treatmentInternet privacyRadiation therapy03 medical and health sciences0302 clinical medicineOncology030220 oncology & carcinogenesismedicineRadiology Nuclear Medicine and imaging030212 general & internal medicinePalestinebusinessInternational Journal of Radiation Oncology*Biology*Physics
researchProduct

An Investigation of Security and Privacy for Human Bond Communications

2017

Cloud computing securityPrivacy softwarebusiness.industry020204 information systemsBondInternet privacy0202 electrical engineering electronic engineering information engineering020206 networking & telecommunications02 engineering and technologyBusinessComputer securitycomputer.software_genrecomputerHuman Bond Communication
researchProduct

ICT for Consumers or Human Beings

2011

The large scale deployment of mobile applications inevitably impacts upon our culture as a whole and affects more intimately our daily lives. Not all of these effects are desirable. In a market economy, ethical issues are not the most important drivers in the development of technology. In this chapter, the authors ask whether the mobile human-computer interaction community could take an active role in discussing ethical issues. In so doing as a community we could focus our attention on developing technology for ‘human beings’ rather than fine tuning our emerging gadgets.

CommerceEthical issuesbusiness.industryInformation and Communications TechnologySoftware deploymentScale (social sciences)Internet privacybusiness
researchProduct

Default effects in app selection: German adolescents’ tendency to adhere to privacy or social relatedness features in smartphone apps

2019

Cognitive biases such as default effects impact on user preferences for a broad range of different choices. This paper investigates these default effects among adolescents configuring apps that either satisfy relatedness or enhance autonomy by protecting privacy. Relatedness and privacy are two innate needs that adolescents can satisfy with the use of smartphone apps. This study argues that adolescents’ choice of features supporting either privacy protection or social relatedness is a consequence of default effects, so that adolescents adhere to preselected defaults. We test this assumption in an experimental survey design including four app configuration tasks with N = 280 German adolesce…

Computer Networks and Communicationsbusiness.industryCommunicationInternet privacyCognitive biaslanguage.human_languageGermanSmartphone appMedia TechnologylanguagePsychologybusinessSelection (genetic algorithm)Range (computer programming)Social relatednessMobile Media & Communication
researchProduct

User behaviours after critical mobile application incidents: the relationship with situational context

2015

Users occasionally have critical incidents with information systems IS. A critical IS incident is an IS product or service experience that a user considers to be unusually positive or negative. Critical IS incidents are highly influential in terms of users' overall perceptions and customer relationships; thus, they are crucial for IS product and service providers. Therefore, it is important to study user behaviours after such incidents. Within IS, the relationships between the situational context and user behaviours after critical incidents have not been addressed at all. Prior studies on general mobile use as a related research area have recognized the influence of the situational context,…

Computer Networks and Communicationsbusiness.industrymedia_common.quotation_subject05 social sciencesInternet privacyWord of mouthAdvertisingContext (language use)02 engineering and technologyService provider020204 information systems0502 economics and business0202 electrical engineering electronic engineering information engineeringInformation system050211 marketingContinuanceSituational ethicsPsychologybusinessFunction (engineering)SoftwareMobile serviceInformation Systemsmedia_commonInformation Systems Journal
researchProduct