Search results for "Internet privacy"
showing 10 items of 223 documents
Usability and Trust in E-Banking
2007
This study assessed the role of usability in trust of e-banking services. A questionnaire was administered to 185 Italian undergraduate working students who volunteered for the experiment (M age = 30.5 yr., SD = 3.1). Participants were differentiated on computer ability (Expert, n=104; Nonexpert, n = 81) and e-banking use (User, n = 93; Nonusers, n = 92). Analysis showed that the website usability of e-banking services did not play a very important role for the User group. Instead, institution-based trust, e.g., the trust in the security policy of the Web merchant, customers, and the overall trust of the bank were the crucial factors in the adoption of e-banking. © Psychological Reports 200…
The challenge of the predatory open-access publishing outbreak
2019
NA
Organizational information and communication technologies and their influence on communication visibility and perceived proximity
2021
This study investigates the relationships between the use of various organizational ICTs, communication visibility, and perceived proximity to distant colleagues. In addition, this study examines the interplay between visibility and proximity, to determine whether visibility improves proximity, or vice versa. These relationships are tested in a global company using two waves of panel survey data. ESM use increases communication visibility and perceived proximity, while controlling for prior levels of visibility, proximity, and the use of other organizational ICTs. The influence of ESM on network translucence and perceived proximity is generally stronger than the impact of other technologie…
Benefits and Threats to Using Social Media for Presenting and Implementing Evidence.
2018
As a potential high-yield tool for disseminating information that can reach many people, social media is transforming how clinicians, the public, and policy makers are educated and find new knowledge associated with research-related information. Social media is available to all who access the internet, reducing selected barriers to acquiring original source documents such as journal articles or books and potentially improving implementation-the process of formulating a conclusion and moving on that decision. The use of social media for evidence dissemination/implementation of research has both benefits and threats. It is the aim of this Viewpoint to provide a balanced view of each. J Orthop…
Plant visibility through mobile learning? Implementation and evaluation of an interactiveFlower Huntin a botanic garden
2017
Plants have an enormous importance for life on earth but are often overlooked. This phenomenon called plant blindness is reinforced as students prefer to spend their recreation time with modern med...
Radiation Therapy in Palestine: Not Only Money, But Also Real Accessibility
2017
An Investigation of Security and Privacy for Human Bond Communications
2017
ICT for Consumers or Human Beings
2011
The large scale deployment of mobile applications inevitably impacts upon our culture as a whole and affects more intimately our daily lives. Not all of these effects are desirable. In a market economy, ethical issues are not the most important drivers in the development of technology. In this chapter, the authors ask whether the mobile human-computer interaction community could take an active role in discussing ethical issues. In so doing as a community we could focus our attention on developing technology for ‘human beings’ rather than fine tuning our emerging gadgets.
Default effects in app selection: German adolescents’ tendency to adhere to privacy or social relatedness features in smartphone apps
2019
Cognitive biases such as default effects impact on user preferences for a broad range of different choices. This paper investigates these default effects among adolescents configuring apps that either satisfy relatedness or enhance autonomy by protecting privacy. Relatedness and privacy are two innate needs that adolescents can satisfy with the use of smartphone apps. This study argues that adolescents’ choice of features supporting either privacy protection or social relatedness is a consequence of default effects, so that adolescents adhere to preselected defaults. We test this assumption in an experimental survey design including four app configuration tasks with N = 280 German adolesce…
User behaviours after critical mobile application incidents: the relationship with situational context
2015
Users occasionally have critical incidents with information systems IS. A critical IS incident is an IS product or service experience that a user considers to be unusually positive or negative. Critical IS incidents are highly influential in terms of users' overall perceptions and customer relationships; thus, they are crucial for IS product and service providers. Therefore, it is important to study user behaviours after such incidents. Within IS, the relationships between the situational context and user behaviours after critical incidents have not been addressed at all. Prior studies on general mobile use as a related research area have recognized the influence of the situational context,…