全部 标题 作者
关键词 摘要

OALib Journal期刊
ISSN: 2333-9721
费用:99美元

查看量下载量

相关文章

更多...

Educating Students’ Privacy Decision Making through Information Ethics Curriculum

DOI: 10.4236/ce.2016.71017, PP. 171-179

Keywords: Privacy, Self-Efficacy, Decision Making, Information Ethics, Ethics Curriculum

Full-Text   Cite this paper   Add to My Lib

Abstract:

Increasingly sophisticated technologies nowadays have equipped powerful capabilities to obtain and exploit consumers’ information privacy on the Internet. The contemporary privacy protection techniques seem fail to guard information privacy. Besides of the technological protections, information ethics education is described as the ideal way to increase people’s consciousness. This study proposes a privacy decision making model which posits that attitudes toward privacy protection, privacy self-efficacy for protection, and privacy self-efficacy for non-acquisition are critical factors essential to behavioral intention. Further, a longitudinal model explores whether information ethics education plays a role in influencing students’ concepts of protecting information privacy. A survey of 111 senior-level undergraduate students in the department of Information Management was conducted to test the hypothesized model. The findings exhibit important insights: through information ethics education, students demonstrate significant model paths changes in the relationships of attitude, privacy self-efficacy for protection, and privacy self-efficacy for non-acquisition to intention. The implications to the ethics curriculum concerning information privacy are discussed.

References

[1]  Ajzen, I. (1991). The Theory of Planned Behavior. Organizational Behavior and Human Decision Processes, 50, 179-211.
http://dx.doi.org/10.1016/0749-5978(91)90020-T
[2]  Ajzen, I. (2002). Perceived Behavioral Control, Self-Efficacy, Locus of Control, and the Theory of Planned Behavior. Journal of Applied Social Psychology, 32, 665-683.
[3]  Ajzen, I., & Fishbein, M. (1980). Understanding Attitudes and Predicting Social Behavior. Englewood Cliffs, NJ: Prentice-Hall.
[4]  Almagno, S., & Carbo, T. (2001). Information Ethics: The Duty, Privilege and Challenge of Educating Information Professionals. Library Trends, 49, 510-518.
[5]  Bandura, A. (1986). Social Foundations of Thought and Action: A Social Cognitive Theory. Englewood Cliffs, NJ: Prentice-Hall, Inc.
[6]  Bandura, A. (1991). Social Cognitive Theory of Moral Thought and Action. In W. M. Kuritines, & J. L. Gewirtz (Eds.), Handbook of Moral Behavior and Development (Vol. 1, pp. 45-103). Hillsdale, NJ: Lawrence Erlbaum Associates.
[7]  Bandura, A. (1997). Self-Efficacy: The Exercise of Control. New York: W.H. Freeman.
[8]  Banerjee, D., Cronan, T. P., & Jones, T. W. (1998). Modeling IT Ethics: A Study in Situational Ethics. MIS Quarterly, 22, 31-60.
http://dx.doi.org/10.2307/249677
[9]  Chin, W. W. (1998). The Partial Least Squares Approach for Structural Equation Modeling. In G. A. Marcoulides (Ed.), Modern Methods for Business Research. Hillsdale, NJ: Lawrence Erlbaum Associates.
[10]  Clarke, R. (1988). Information Technology and Dataveillance. Communications of the ACM, 31, 498-512.
http://dx.doi.org/10.1145/42411.42413
[11]  Compeau, D. R., & Higgins, C. A. (1995). Computer Self-Efficacy: Development of a Measure and Initial Test. MIS Quarterly, 19, 189-211.
[12]  Fornell, C. (1982). A Second Generation of Multivariate Analysis: Methods. New York: Praeger.
[13]  Fornell, C., & Larcker, D. F. (1981). Evaluating Structural Equation Models with Unobservable Variables and Measurement Error. Journal of Marketing Research, 18, 39-50.
http://dx.doi.org/10.2307/3151312
[14]  Gist, M. E., & Mitchell, T. R. (1992). Self-Efficacy: A Theoretical Analysis of Its Determinants and Malleability. Academy of Management Review, 17, 183-211.
[15]  Harrington, S. J. (1996). The Effect of Codes of Ethics and Personal Denial of Responsibility on Computer Abuse Judgments and Intentions. MIS Quarterly, 20, 257-278.
http://dx.doi.org/10.2307/249656
[16]  Henry, J. W., & Stone, R. W. (1999). The Impacts of End-User Gender, Education, Performance, and System Use on Computer Self-Efficacy and Outcome Expectancy. Southern Business Review, 25, 10.
[17]  House, W. (2014). Big Data: Seizing Opportunities, Preserving Values.
http://www.whitehouse.gov/sites/default/files/docs/big_data_privacy_report_5.1.14_final_print.pdf
[18]  Korzaan, M., Brooks, N., & Greer, T. (2009). Demystifying Personality and Privacy: An Empirical Investigation into Antecedents of Concerns for Information Privacy. Journal of Behavioral Studies in Business, 1, 1-17.
[19]  Kosinski, M., Stillwell, D., & Graepel, T. (2013). Private Traits and Attributes Are Predictable from Digital Records of Human Behavior. Proceedings of the National Academy of Sciences, 110, 5802-5805.
http://dx.doi.org/10.1073/pnas.1218772110
[20]  Kuo, F. Y., Lin, C. S., & Hsu, M. H. (2007). Assessing Gender Differences in Computer Professionals’ Self-Regulatory Efficacy Concerning Information Privacy Practices. Journal of Business Ethics, 73, 145-160.
[21]  Lin, C. H., & Chou, C. (2014). Ethics Curricula of the Information Science Departments in Taiwanese Universities and Colleges. Journal of Research in Education Science, 59, 197-228.
[22]  Marakas, G. M., Yi, M. Y., & Johnson, R. D. (1998). The Multilevel and Multifaceted Character of Computer Self-Efficacy: Toward Clarification of the Construct and an Integrative Framework for Research. Information Systems Research, 9, 126-163.
http://dx.doi.org/10.1287/isre.9.2.126
[23]  Mason, R. O. (1986). Four Ethical Issues of the Information Age. MIS Quarterly, 10, 5-12.
http://dx.doi.org/10.2307/248873
[24]  Oz, E. (1992). Ethical Standards for Information Systems Professionals: A Case for a Unified Code. MIS Quarterly, 16, 423-433.
http://dx.doi.org/10.2307/249729
[25]  Parker, D. B., Swope, S., & Baker, B. N. (1990). Ethical Conflicts in Information and Computer Science, Technology, and Business. Wellesley, MA: QED Information Sciences.
[26]  Ringle, C. M., Wende, S., & Will, A. (2005). SmartPLS 2.0. Hamburg.
http://www.smartpls.de
[27]  Sarstedt, M., Henseler, J., & Ringle, C. M. (2011). Multigroup Analysis in Partial Least Squares (PLS) Path Modeling: Alternative Methods and Empirical Results. Advances in International Marketing, 22, 195-218.
http://dx.doi.org/10.1108/S1474-7979(2011)0000022012
[28]  Segars, A. H., & Grover, V. (1998). Strategic Information Systems Planning Success: An Investigation of the Construct and Its Measurement. MIS Quarterly, 22, 139-163.
http://dx.doi.org/10.2307/249393
[29]  Smith, H. J. (1993). Privacy Policies and Practices: Inside the Organizational Maze. Communications of the ACM, 36, 104-122.
http://dx.doi.org/10.1145/163298.163349
[30]  Smith, H. J., Milberg, S. J., & Burke, S. J. (1996). Information Privacy: Measuring Individuals’ Concerns about Organizational Practices. MIS Quarterly, 20, 167-196.
http://dx.doi.org/10.2307/249477
[31]  Smith, S., Fryer-Edwards, K., Diekema, D. S., & Braddock, C. H. (2004). Finding Effective Strategies for Teaching Ethics: A Comparison Trial of Two Interventions. Academic Medicine, 79, 265-271.
http://dx.doi.org/10.1097/00001888-200403000-00015

Full-Text

Contact Us

service@oalib.com

QQ:3279437679

WhatsApp +8615387084133