Internet Privacy Concerns versus Behavior : A Protection Motivation Approach
This study examines the possible disconnect between student concerns about privacy when using the Internet and their behavior. The literature indicates that Internet users are concerned about privacy but their web-browsing habits consistently put their privacy at risk. Browsing habits were examined...
Ausführliche Beschreibung
Autor*in: |
Sousa, Kenneth J. [verfasserIn] MacDonald, Laurie E. [author] Fougere, Kenneth T. [author] |
---|
Format: |
E-Artikel |
---|---|
Sprache: |
Englisch |
Erschienen: |
2012 |
---|
Schlagwörter: |
---|
Umfang: |
Online-Ressource |
---|
Reproduktion: |
IGI Global InfoSci Journals Archive 2000 - 2012 |
---|---|
Übergeordnetes Werk: |
In: International journal of information systems and social change - Hershey, Pa : IGI Publ, 2010, 3(2012), 4, Seite 53-64 |
Übergeordnetes Werk: |
volume:3 ; year:2012 ; number:4 ; pages:53-64 |
Links: |
---|
DOI / URN: |
10.4018/jissc.2012100104 |
---|
Katalog-ID: |
NLEJ244484384 |
---|
LEADER | 01000caa a22002652 4500 | ||
---|---|---|---|
001 | NLEJ244484384 | ||
003 | DE-627 | ||
005 | 20240202180204.0 | ||
007 | cr uuu---uuuuu | ||
008 | 150605s2012 xx |||||o 00| ||eng c | ||
024 | 7 | |a 10.4018/jissc.2012100104 |2 doi | |
035 | |a (DE-627)NLEJ244484384 | ||
035 | |a (VZGNL)10.4018/jissc.2012100104 | ||
040 | |a DE-627 |b ger |c DE-627 |e rakwb | ||
041 | |a eng | ||
100 | 1 | |a Sousa, Kenneth J. |e verfasserin |4 aut | |
245 | 1 | 0 | |a Internet Privacy Concerns versus Behavior |b A Protection Motivation Approach |
264 | 1 | |c 2012 | |
300 | |a Online-Ressource | ||
336 | |a nicht spezifiziert |b zzz |2 rdacontent | ||
337 | |a nicht spezifiziert |b z |2 rdamedia | ||
338 | |a nicht spezifiziert |b zu |2 rdacarrier | ||
520 | |a This study examines the possible disconnect between student concerns about privacy when using the Internet and their behavior. The literature indicates that Internet users are concerned about privacy but their web-browsing habits consistently put their privacy at risk. Browsing habits were examined using five factors: (1) privacy concerns, (2) self-efficacy, (3) risk assessment, (4) threat assessment, and (5) privacy involvement. These factors were analyzed for their relationship to privacy behavior. A survey questionnaire was developed and administered to a sample drawn from university students | ||
533 | |f IGI Global InfoSci Journals Archive 2000 - 2012 | ||
650 | 4 | |a Privacy | |
650 | 4 | |a Privacy Behavior | |
650 | 4 | |a Privacy Concerns | |
650 | 4 | |a Privacy Involvement | |
650 | 4 | |a Self-Efficacy | |
650 | 4 | |a Threat Assessment | |
700 | 1 | |a MacDonald, Laurie E. |e author |4 aut | |
700 | 1 | |a Fougere, Kenneth T. |e author |4 aut | |
773 | 0 | 8 | |i In |t International journal of information systems and social change |d Hershey, Pa : IGI Publ, 2010 |g 3(2012), 4, Seite 53-64 |h Online-Ressource |w (DE-627)NLEJ244419191 |w (DE-600)2579268-4 |x 1941-8698 |7 nnns |
773 | 1 | 8 | |g volume:3 |g year:2012 |g number:4 |g pages:53-64 |
856 | 4 | 0 | |u http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/jissc.2012100104 |m X:IGIG |x Verlag |z Deutschlandweit zugänglich |
856 | 4 | 2 | |u http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/jissc.2012100104&buylink=true |q text/html |y Abstract |z Deutschlandweit zugänglich |
912 | |a ZDB-1-GIS | ||
912 | |a GBV_NL_ARTICLE | ||
951 | |a AR | ||
952 | |d 3 |j 2012 |e 4 |h 53-64 |
author_variant |
k j s kj kjs l e m le lem k t f kt ktf |
---|---|
matchkey_str |
article:19418698:2012----::nentrvccnenvr |
hierarchy_sort_str |
2012 |
publishDate |
2012 |
allfields |
10.4018/jissc.2012100104 doi (DE-627)NLEJ244484384 (VZGNL)10.4018/jissc.2012100104 DE-627 ger DE-627 rakwb eng Sousa, Kenneth J. verfasserin aut Internet Privacy Concerns versus Behavior A Protection Motivation Approach 2012 Online-Ressource nicht spezifiziert zzz rdacontent nicht spezifiziert z rdamedia nicht spezifiziert zu rdacarrier This study examines the possible disconnect between student concerns about privacy when using the Internet and their behavior. The literature indicates that Internet users are concerned about privacy but their web-browsing habits consistently put their privacy at risk. Browsing habits were examined using five factors: (1) privacy concerns, (2) self-efficacy, (3) risk assessment, (4) threat assessment, and (5) privacy involvement. These factors were analyzed for their relationship to privacy behavior. A survey questionnaire was developed and administered to a sample drawn from university students IGI Global InfoSci Journals Archive 2000 - 2012 Privacy Privacy Behavior Privacy Concerns Privacy Involvement Self-Efficacy Threat Assessment MacDonald, Laurie E. author aut Fougere, Kenneth T. author aut In International journal of information systems and social change Hershey, Pa : IGI Publ, 2010 3(2012), 4, Seite 53-64 Online-Ressource (DE-627)NLEJ244419191 (DE-600)2579268-4 1941-8698 nnns volume:3 year:2012 number:4 pages:53-64 http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/jissc.2012100104 X:IGIG Verlag Deutschlandweit zugänglich http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/jissc.2012100104&buylink=true text/html Abstract Deutschlandweit zugänglich ZDB-1-GIS GBV_NL_ARTICLE AR 3 2012 4 53-64 |
spelling |
10.4018/jissc.2012100104 doi (DE-627)NLEJ244484384 (VZGNL)10.4018/jissc.2012100104 DE-627 ger DE-627 rakwb eng Sousa, Kenneth J. verfasserin aut Internet Privacy Concerns versus Behavior A Protection Motivation Approach 2012 Online-Ressource nicht spezifiziert zzz rdacontent nicht spezifiziert z rdamedia nicht spezifiziert zu rdacarrier This study examines the possible disconnect between student concerns about privacy when using the Internet and their behavior. The literature indicates that Internet users are concerned about privacy but their web-browsing habits consistently put their privacy at risk. Browsing habits were examined using five factors: (1) privacy concerns, (2) self-efficacy, (3) risk assessment, (4) threat assessment, and (5) privacy involvement. These factors were analyzed for their relationship to privacy behavior. A survey questionnaire was developed and administered to a sample drawn from university students IGI Global InfoSci Journals Archive 2000 - 2012 Privacy Privacy Behavior Privacy Concerns Privacy Involvement Self-Efficacy Threat Assessment MacDonald, Laurie E. author aut Fougere, Kenneth T. author aut In International journal of information systems and social change Hershey, Pa : IGI Publ, 2010 3(2012), 4, Seite 53-64 Online-Ressource (DE-627)NLEJ244419191 (DE-600)2579268-4 1941-8698 nnns volume:3 year:2012 number:4 pages:53-64 http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/jissc.2012100104 X:IGIG Verlag Deutschlandweit zugänglich http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/jissc.2012100104&buylink=true text/html Abstract Deutschlandweit zugänglich ZDB-1-GIS GBV_NL_ARTICLE AR 3 2012 4 53-64 |
allfields_unstemmed |
10.4018/jissc.2012100104 doi (DE-627)NLEJ244484384 (VZGNL)10.4018/jissc.2012100104 DE-627 ger DE-627 rakwb eng Sousa, Kenneth J. verfasserin aut Internet Privacy Concerns versus Behavior A Protection Motivation Approach 2012 Online-Ressource nicht spezifiziert zzz rdacontent nicht spezifiziert z rdamedia nicht spezifiziert zu rdacarrier This study examines the possible disconnect between student concerns about privacy when using the Internet and their behavior. The literature indicates that Internet users are concerned about privacy but their web-browsing habits consistently put their privacy at risk. Browsing habits were examined using five factors: (1) privacy concerns, (2) self-efficacy, (3) risk assessment, (4) threat assessment, and (5) privacy involvement. These factors were analyzed for their relationship to privacy behavior. A survey questionnaire was developed and administered to a sample drawn from university students IGI Global InfoSci Journals Archive 2000 - 2012 Privacy Privacy Behavior Privacy Concerns Privacy Involvement Self-Efficacy Threat Assessment MacDonald, Laurie E. author aut Fougere, Kenneth T. author aut In International journal of information systems and social change Hershey, Pa : IGI Publ, 2010 3(2012), 4, Seite 53-64 Online-Ressource (DE-627)NLEJ244419191 (DE-600)2579268-4 1941-8698 nnns volume:3 year:2012 number:4 pages:53-64 http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/jissc.2012100104 X:IGIG Verlag Deutschlandweit zugänglich http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/jissc.2012100104&buylink=true text/html Abstract Deutschlandweit zugänglich ZDB-1-GIS GBV_NL_ARTICLE AR 3 2012 4 53-64 |
allfieldsGer |
10.4018/jissc.2012100104 doi (DE-627)NLEJ244484384 (VZGNL)10.4018/jissc.2012100104 DE-627 ger DE-627 rakwb eng Sousa, Kenneth J. verfasserin aut Internet Privacy Concerns versus Behavior A Protection Motivation Approach 2012 Online-Ressource nicht spezifiziert zzz rdacontent nicht spezifiziert z rdamedia nicht spezifiziert zu rdacarrier This study examines the possible disconnect between student concerns about privacy when using the Internet and their behavior. The literature indicates that Internet users are concerned about privacy but their web-browsing habits consistently put their privacy at risk. Browsing habits were examined using five factors: (1) privacy concerns, (2) self-efficacy, (3) risk assessment, (4) threat assessment, and (5) privacy involvement. These factors were analyzed for their relationship to privacy behavior. A survey questionnaire was developed and administered to a sample drawn from university students IGI Global InfoSci Journals Archive 2000 - 2012 Privacy Privacy Behavior Privacy Concerns Privacy Involvement Self-Efficacy Threat Assessment MacDonald, Laurie E. author aut Fougere, Kenneth T. author aut In International journal of information systems and social change Hershey, Pa : IGI Publ, 2010 3(2012), 4, Seite 53-64 Online-Ressource (DE-627)NLEJ244419191 (DE-600)2579268-4 1941-8698 nnns volume:3 year:2012 number:4 pages:53-64 http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/jissc.2012100104 X:IGIG Verlag Deutschlandweit zugänglich http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/jissc.2012100104&buylink=true text/html Abstract Deutschlandweit zugänglich ZDB-1-GIS GBV_NL_ARTICLE AR 3 2012 4 53-64 |
allfieldsSound |
10.4018/jissc.2012100104 doi (DE-627)NLEJ244484384 (VZGNL)10.4018/jissc.2012100104 DE-627 ger DE-627 rakwb eng Sousa, Kenneth J. verfasserin aut Internet Privacy Concerns versus Behavior A Protection Motivation Approach 2012 Online-Ressource nicht spezifiziert zzz rdacontent nicht spezifiziert z rdamedia nicht spezifiziert zu rdacarrier This study examines the possible disconnect between student concerns about privacy when using the Internet and their behavior. The literature indicates that Internet users are concerned about privacy but their web-browsing habits consistently put their privacy at risk. Browsing habits were examined using five factors: (1) privacy concerns, (2) self-efficacy, (3) risk assessment, (4) threat assessment, and (5) privacy involvement. These factors were analyzed for their relationship to privacy behavior. A survey questionnaire was developed and administered to a sample drawn from university students IGI Global InfoSci Journals Archive 2000 - 2012 Privacy Privacy Behavior Privacy Concerns Privacy Involvement Self-Efficacy Threat Assessment MacDonald, Laurie E. author aut Fougere, Kenneth T. author aut In International journal of information systems and social change Hershey, Pa : IGI Publ, 2010 3(2012), 4, Seite 53-64 Online-Ressource (DE-627)NLEJ244419191 (DE-600)2579268-4 1941-8698 nnns volume:3 year:2012 number:4 pages:53-64 http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/jissc.2012100104 X:IGIG Verlag Deutschlandweit zugänglich http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/jissc.2012100104&buylink=true text/html Abstract Deutschlandweit zugänglich ZDB-1-GIS GBV_NL_ARTICLE AR 3 2012 4 53-64 |
language |
English |
source |
In International journal of information systems and social change 3(2012), 4, Seite 53-64 volume:3 year:2012 number:4 pages:53-64 |
sourceStr |
In International journal of information systems and social change 3(2012), 4, Seite 53-64 volume:3 year:2012 number:4 pages:53-64 |
format_phy_str_mv |
Article |
institution |
findex.gbv.de |
topic_facet |
Privacy Privacy Behavior Privacy Concerns Privacy Involvement Self-Efficacy Threat Assessment |
isfreeaccess_bool |
false |
container_title |
International journal of information systems and social change |
authorswithroles_txt_mv |
Sousa, Kenneth J. @@aut@@ MacDonald, Laurie E. @@aut@@ Fougere, Kenneth T. @@aut@@ |
publishDateDaySort_date |
2012-01-01T00:00:00Z |
hierarchy_top_id |
NLEJ244419191 |
id |
NLEJ244484384 |
language_de |
englisch |
fullrecord |
<?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01000caa a22002652 4500</leader><controlfield tag="001">NLEJ244484384</controlfield><controlfield tag="003">DE-627</controlfield><controlfield tag="005">20240202180204.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">150605s2012 xx |||||o 00| ||eng c</controlfield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.4018/jissc.2012100104</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627)NLEJ244484384</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(VZGNL)10.4018/jissc.2012100104</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rakwb</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Sousa, Kenneth J.</subfield><subfield code="e">verfasserin</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Internet Privacy Concerns versus Behavior</subfield><subfield code="b">A Protection Motivation Approach</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="c">2012</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">nicht spezifiziert</subfield><subfield code="b">zzz</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">nicht spezifiziert</subfield><subfield code="b">z</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">nicht spezifiziert</subfield><subfield code="b">zu</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">This study examines the possible disconnect between student concerns about privacy when using the Internet and their behavior. The literature indicates that Internet users are concerned about privacy but their web-browsing habits consistently put their privacy at risk. Browsing habits were examined using five factors: (1) privacy concerns, (2) self-efficacy, (3) risk assessment, (4) threat assessment, and (5) privacy involvement. These factors were analyzed for their relationship to privacy behavior. A survey questionnaire was developed and administered to a sample drawn from university students</subfield></datafield><datafield tag="533" ind1=" " ind2=" "><subfield code="f">IGI Global InfoSci Journals Archive 2000 - 2012</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Privacy</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Privacy Behavior</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Privacy Concerns</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Privacy Involvement</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Self-Efficacy</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Threat Assessment</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">MacDonald, Laurie E.</subfield><subfield code="e">author</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Fougere, Kenneth T.</subfield><subfield code="e">author</subfield><subfield code="4">aut</subfield></datafield><datafield tag="773" ind1="0" ind2="8"><subfield code="i">In</subfield><subfield code="t">International journal of information systems and social change</subfield><subfield code="d">Hershey, Pa : IGI Publ, 2010</subfield><subfield code="g">3(2012), 4, Seite 53-64</subfield><subfield code="h">Online-Ressource</subfield><subfield code="w">(DE-627)NLEJ244419191</subfield><subfield code="w">(DE-600)2579268-4</subfield><subfield code="x">1941-8698</subfield><subfield code="7">nnns</subfield></datafield><datafield tag="773" ind1="1" ind2="8"><subfield code="g">volume:3</subfield><subfield code="g">year:2012</subfield><subfield code="g">number:4</subfield><subfield code="g">pages:53-64</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/jissc.2012100104</subfield><subfield code="m">X:IGIG</subfield><subfield code="x">Verlag</subfield><subfield code="z">Deutschlandweit zugänglich</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="u">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/jissc.2012100104&buylink=true</subfield><subfield code="q">text/html</subfield><subfield code="y">Abstract</subfield><subfield code="z">Deutschlandweit zugänglich</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-1-GIS</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_NL_ARTICLE</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">AR</subfield></datafield><datafield tag="952" ind1=" " ind2=" "><subfield code="d">3</subfield><subfield code="j">2012</subfield><subfield code="e">4</subfield><subfield code="h">53-64</subfield></datafield></record></collection>
|
series2 |
IGI Global InfoSci Journals Archive 2000 - 2012 |
author |
Sousa, Kenneth J. |
spellingShingle |
Sousa, Kenneth J. misc Privacy misc Privacy Behavior misc Privacy Concerns misc Privacy Involvement misc Self-Efficacy misc Threat Assessment Internet Privacy Concerns versus Behavior A Protection Motivation Approach |
authorStr |
Sousa, Kenneth J. |
ppnlink_with_tag_str_mv |
@@773@@(DE-627)NLEJ244419191 |
format |
electronic Article |
delete_txt_mv |
keep |
author_role |
aut aut aut |
collection |
NL |
remote_str |
true |
illustrated |
Not Illustrated |
issn |
1941-8698 |
topic_title |
Internet Privacy Concerns versus Behavior A Protection Motivation Approach Privacy Privacy Behavior Privacy Concerns Privacy Involvement Self-Efficacy Threat Assessment |
topic |
misc Privacy misc Privacy Behavior misc Privacy Concerns misc Privacy Involvement misc Self-Efficacy misc Threat Assessment |
topic_unstemmed |
misc Privacy misc Privacy Behavior misc Privacy Concerns misc Privacy Involvement misc Self-Efficacy misc Threat Assessment |
topic_browse |
misc Privacy misc Privacy Behavior misc Privacy Concerns misc Privacy Involvement misc Self-Efficacy misc Threat Assessment |
format_facet |
Elektronische Aufsätze Aufsätze Elektronische Ressource |
format_main_str_mv |
Text Zeitschrift/Artikel |
carriertype_str_mv |
zu |
hierarchy_parent_title |
International journal of information systems and social change |
hierarchy_parent_id |
NLEJ244419191 |
hierarchy_top_title |
International journal of information systems and social change |
isfreeaccess_txt |
false |
familylinks_str_mv |
(DE-627)NLEJ244419191 (DE-600)2579268-4 |
title |
Internet Privacy Concerns versus Behavior A Protection Motivation Approach |
ctrlnum |
(DE-627)NLEJ244484384 (VZGNL)10.4018/jissc.2012100104 |
title_full |
Internet Privacy Concerns versus Behavior A Protection Motivation Approach |
author_sort |
Sousa, Kenneth J. |
journal |
International journal of information systems and social change |
journalStr |
International journal of information systems and social change |
lang_code |
eng |
isOA_bool |
false |
recordtype |
marc |
publishDateSort |
2012 |
contenttype_str_mv |
zzz |
container_start_page |
53 |
author_browse |
Sousa, Kenneth J. MacDonald, Laurie E. Fougere, Kenneth T. |
container_volume |
3 |
physical |
Online-Ressource |
format_se |
Elektronische Aufsätze |
author-letter |
Sousa, Kenneth J. |
title_sub |
A Protection Motivation Approach |
doi_str_mv |
10.4018/jissc.2012100104 |
author2-role |
author |
title_sort |
internet privacy concerns versus behaviora protection motivation approach |
title_auth |
Internet Privacy Concerns versus Behavior A Protection Motivation Approach |
abstract |
This study examines the possible disconnect between student concerns about privacy when using the Internet and their behavior. The literature indicates that Internet users are concerned about privacy but their web-browsing habits consistently put their privacy at risk. Browsing habits were examined using five factors: (1) privacy concerns, (2) self-efficacy, (3) risk assessment, (4) threat assessment, and (5) privacy involvement. These factors were analyzed for their relationship to privacy behavior. A survey questionnaire was developed and administered to a sample drawn from university students |
abstractGer |
This study examines the possible disconnect between student concerns about privacy when using the Internet and their behavior. The literature indicates that Internet users are concerned about privacy but their web-browsing habits consistently put their privacy at risk. Browsing habits were examined using five factors: (1) privacy concerns, (2) self-efficacy, (3) risk assessment, (4) threat assessment, and (5) privacy involvement. These factors were analyzed for their relationship to privacy behavior. A survey questionnaire was developed and administered to a sample drawn from university students |
abstract_unstemmed |
This study examines the possible disconnect between student concerns about privacy when using the Internet and their behavior. The literature indicates that Internet users are concerned about privacy but their web-browsing habits consistently put their privacy at risk. Browsing habits were examined using five factors: (1) privacy concerns, (2) self-efficacy, (3) risk assessment, (4) threat assessment, and (5) privacy involvement. These factors were analyzed for their relationship to privacy behavior. A survey questionnaire was developed and administered to a sample drawn from university students |
collection_details |
ZDB-1-GIS GBV_NL_ARTICLE |
container_issue |
4 |
title_short |
Internet Privacy Concerns versus Behavior |
url |
http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/jissc.2012100104 http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/jissc.2012100104&buylink=true |
remote_bool |
true |
author2 |
MacDonald, Laurie E. Fougere, Kenneth T. |
author2Str |
MacDonald, Laurie E. Fougere, Kenneth T. |
ppnlink |
NLEJ244419191 |
mediatype_str_mv |
z |
isOA_txt |
false |
hochschulschrift_bool |
false |
doi_str |
10.4018/jissc.2012100104 |
up_date |
2024-07-06T08:03:13.035Z |
_version_ |
1803816002425716736 |
fullrecord_marcxml |
<?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01000caa a22002652 4500</leader><controlfield tag="001">NLEJ244484384</controlfield><controlfield tag="003">DE-627</controlfield><controlfield tag="005">20240202180204.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">150605s2012 xx |||||o 00| ||eng c</controlfield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.4018/jissc.2012100104</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627)NLEJ244484384</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(VZGNL)10.4018/jissc.2012100104</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rakwb</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Sousa, Kenneth J.</subfield><subfield code="e">verfasserin</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Internet Privacy Concerns versus Behavior</subfield><subfield code="b">A Protection Motivation Approach</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="c">2012</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">nicht spezifiziert</subfield><subfield code="b">zzz</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">nicht spezifiziert</subfield><subfield code="b">z</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">nicht spezifiziert</subfield><subfield code="b">zu</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">This study examines the possible disconnect between student concerns about privacy when using the Internet and their behavior. The literature indicates that Internet users are concerned about privacy but their web-browsing habits consistently put their privacy at risk. Browsing habits were examined using five factors: (1) privacy concerns, (2) self-efficacy, (3) risk assessment, (4) threat assessment, and (5) privacy involvement. These factors were analyzed for their relationship to privacy behavior. A survey questionnaire was developed and administered to a sample drawn from university students</subfield></datafield><datafield tag="533" ind1=" " ind2=" "><subfield code="f">IGI Global InfoSci Journals Archive 2000 - 2012</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Privacy</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Privacy Behavior</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Privacy Concerns</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Privacy Involvement</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Self-Efficacy</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Threat Assessment</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">MacDonald, Laurie E.</subfield><subfield code="e">author</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Fougere, Kenneth T.</subfield><subfield code="e">author</subfield><subfield code="4">aut</subfield></datafield><datafield tag="773" ind1="0" ind2="8"><subfield code="i">In</subfield><subfield code="t">International journal of information systems and social change</subfield><subfield code="d">Hershey, Pa : IGI Publ, 2010</subfield><subfield code="g">3(2012), 4, Seite 53-64</subfield><subfield code="h">Online-Ressource</subfield><subfield code="w">(DE-627)NLEJ244419191</subfield><subfield code="w">(DE-600)2579268-4</subfield><subfield code="x">1941-8698</subfield><subfield code="7">nnns</subfield></datafield><datafield tag="773" ind1="1" ind2="8"><subfield code="g">volume:3</subfield><subfield code="g">year:2012</subfield><subfield code="g">number:4</subfield><subfield code="g">pages:53-64</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/jissc.2012100104</subfield><subfield code="m">X:IGIG</subfield><subfield code="x">Verlag</subfield><subfield code="z">Deutschlandweit zugänglich</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="u">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/jissc.2012100104&buylink=true</subfield><subfield code="q">text/html</subfield><subfield code="y">Abstract</subfield><subfield code="z">Deutschlandweit zugänglich</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-1-GIS</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_NL_ARTICLE</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">AR</subfield></datafield><datafield tag="952" ind1=" " ind2=" "><subfield code="d">3</subfield><subfield code="j">2012</subfield><subfield code="e">4</subfield><subfield code="h">53-64</subfield></datafield></record></collection>
|
score |
7.3978233 |