The penalty for privacy violations: How privacy violations impact trust online
نویسندگان
چکیده
منابع مشابه
The Complexity Underlying JetBlue’s Privacy Policy Violations
This report examines the actions of JetBlue Airways Corporation (JetBlue), which violated its privacy policy when it gave the travel records of five million customers to Torch Concepts, a private Department of Defense contractor. JetBlue’s actions have prompted at least two lawsuits, including a claim by the Electronic Privacy Information Center with the Federal Trade Commission that JetBlue en...
متن کاملPrivacy Friendly Apps - Making Developers Aware of Privacy Violations
Android devices are widely used on a daily basis. As those devices can open doors for attackers and companies to privacy sensitive data, developers have to be aware of potential risks. We introduce the project of Privacy Friendly Apps, explain its design principles and describe some of its resulted apps. The long-term goal of this project is twofold: (1) raise awareness of developers regarding ...
متن کاملDetecting Privacy Violations in Multiple Views Publishing
We present a sound data-value-dependent method of detecting privacy violations in the context of multiple views publishing. We assume that privacy violation takes the form of linkages, that is, identifier-privacy value pair appearing in the same data record. At first, we perform a theoretical study of the following security problem: given a set of views to be published, if linking of two views ...
متن کاملExpectations and Violations of Privacy during Adolescence
This study tested a conceptual model of adolescents' feelings of privacy invasion derived from CPM. Specifically, goals were to describe adolescents' expectations of privacy, to describe how often adolescents are exposed to behaviors that threaten privacy, and to test privacy beliefs, potentially invasive behaviors, and having things to hide as predictors of individual differences in feelings o...
متن کاملDetecting Privacy Violations in Sensitive XML Databases
Privacy violations and the exposition of sensitive data to a third party may seriously damage the business of a company. Therefore, it is crucial for the company to identify that set of users that may have exposed the sensitive data. To identify that set of users is a problem, when multiple users must have access rights that allow them to access the exposed sensitive data. Our solution to the p...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Journal of Business Research
سال: 2018
ISSN: 0148-2963
DOI: 10.1016/j.jbusres.2017.08.034