COMMUNICATION PRIVACY MANAGEMENT ABSTRACTS
Communication Privacy Management in Electronic Commerce
Abstract
This study applies Petronio’s Communication Privacy Management theory (CPM) to understand the tension between information disclosure and privacy within e-commerce relationships. It proposes that consumers manage their privacy concerns through decisions to reveal or conceal information about themselves in interactions with online retailers. The study investigates the degree to which privacy management strategies identified by CPM theory to regulate privacy and disclosure within interpersonal relationships, including withholding and falsifying information, as well as seeking information seeking from a relational partner, operate in the computer-mediated context of e-commerce relational transactions. Findings suggest that online consumers do erect boundaries around personal information and form rules to decide when to reveal information that are consistent with CPM theory. Overall, this study provides knowledge about privacy in online commercial transactions, serves as a basis for more directed theory construction in this arena, and has important practical and policy implications.
Online privacy remains a critical factor for customers and traders inhibiting the internet use for the purpose of commerce. Disclosure of personal and private information which includes information on email address and credit card details required in majority of electronic-commerce transactions, are some responsible for privacy implication and complexion. Some of privacy concerns include the use of personal information for purposes of electronic surveillance, data transfer which results in theft of one’s identity or credit card or even email solicitation. To address and cope with the privacy issues, people need to understand when to disclose information to be used in e-commerce and other related internet transactions.
Abstract
This study examined the perceived motivations and consequences of voluntary disclosure of Facebook active users using a survey administered to college students in a public-speaking course. College-age students who took the survey were motivated to use Facebook because they perceived their relationships improved with friends and family, although using Facebook could become negatively habit forming. The research suggests that users of Facebook use it more for disclosing to distant friends rather than to close friends, which is divergent from most early disclosure research that equates disclosure with intimacy. This research utilizes Communication Privacy Management Theory for the theoretical framework.
Social media networks such as Facebook have established onine relationships that area as a consequence of online interaction. Research done by Working to Halt Online Abuse(WHOA),a company which monitors cyber-stacking statistics, showed that there was increased misuse, abuse and online bullying from social networking media especially Facebook. The theory of communication privacy management The theory of communication privacy management has roled out a privacy management system that checks areas where boundaries are maintained and manged between individuals comes up with ways to seal the conflict between revealing and concealing personal information. Users of social media networks should not share personal and private information, store personal data or motivated to reveal personal details to keep up with the trend and show off. Considerable care should be taken through online interaction especially on matters in which private information may be disclosed. Social networks generate a conducive environment where people with ill intentions can prey on unsuspecting individuals to lead to the involuntary disclosure of personal data through social assertive methods.
Privacy enhanced web personalization
Abstract
Consumer studies demonstrate that online users value personalized content. At the same time, providing personalization on websites seems quite profitable for web vendors. This win-win situation is however marred by privacy concerns since personalizing people’s interaction entails gathering considerable amounts of data about them. As numerous recent surveys have consistently demonstrated, computer users are very concerned about their privacy on the internet. Moreover, the collection of personal data is also subject to legal regulations in many countries and states. Both user concerns and privacy regulations impact frequently used personalization methods. This article analyzes the tension between personalization and privacy, and presents approaches to reconcile the both.
A tension exists between personal privacy and personalization in web sites. Privacy and personalization has advantages to both user and those who manage personalized websites. The degree of privacy and personalization need to be considered when looking at the overall variability of personalized system from a privacy point of view. Some of threats, which could arise, include the disclosure of data to other users that may be using similar computers, unsanctioned access to the accounts and computers establishing solutions for the user. Web users feel differently on the exposure of varied forms of information ranging from willingness to disclose demographic and social lifestyle to personal interest, hobbies and tastes. Trust and positive experience is very important on disclosure of personal information. Most web users decline to give personal information to web sites because they do not have trust with the site. Research on web personalization that upholds privacy helps in minimizing web threats, which could arise from personalized information, and maintaining the best personalization privacy levels within required and pre-set privacy boundaries.
Communicating and Controlling Strategy: An Empirical Study of the Effectiveness of the Balanced Scorecard
Abstract
This paper reports evidence on the effectiveness of the Balanced Scorecard (BSC) as a strategy communication and management‐control device. This study first reviews communication and management control literatures that identify attributes of effective communication and control of strategy The study includes data from multiple divisions of a large, international manufacturing company.
Data indicate that this specific BSC, as designed and implemented, is an effective device for controlling corporate strategy. Results also indicate disagreement and tension between top and middle management regarding the appropriateness of specific aspects of the BSC as a communication, control, and evaluation mechanism. Specific results include evidence of causal relations between effective management control, motivation, strategic alignment, and beneficial effects of the BSC.
The purpose of BSC was to increase knowledge on the presentation of the balanced scorecard, to analyze the usage of this method and the rate of spreading of this knowledge and to determine variables for BSC used in some companies and not applicable to others. The empirical studies already performed did not concentrate on small and medium-sized enterprises. In real life situation, only a residual percentage of the enterprises use this method. Challenges faced by this method should be handled appropriately between the different levels of management. Either BSC can be improved to deal with the shortcomings that lead to consistent and pertinent complaints.
Privacy and Identity Management
Abstract
Creating and managing individual identities is a central challenge of the digital age. As identity management systems defined here as programs or frameworks that administer the collection, authentication, or use of identity and information linked to identity are implemented in both the public and private sectors, individuals are required to identify themselves with increasing frequency. Traditional identity management systems are run by organizations that control all mechanisms for authentication (establishing confidence in an identity claim's truth) and authorization (deciding what an individual should be allowed to do), as well as any behind-the-scenes profiling or scoring of individuals
Designers should consider privacy needs and system purpose when developing identity management systems since it is a central challenge to create and manage individual identities of the digital age. There are principles in ensuring that privacy is maintained and in management of identities systems. To utilize an absolute privacy and identity management principle requires concrete knowledge of the operating environment for the system and the perils and advantages involved must equalize. Designing and choosing of appropriate privacy and identity management systems require a firm foundation on privacy principles. Application of these principles is mainly on the collection and usage of personal information using names, addresses, and governmental identity cards. Models developed in the future will be more customer oriented as new technologies strive to incorporate users into the core work of data management while limiting the use of traditional methods through incorporation features that improve data management tools.
References
Hansen, M., Schwartz, A., & Cooper, A. (2008). Privacy and Identity Management. IEEE Security & Privacy Magazine, 6(2), 38-45. doi:10.1109/msp.2008.41
Kobsa, A. (2007). Privacy-enhanced personalization. Communications of the ACM, 50(8), 24-33. doi:10.1145/1278201.1278202
Malina, M. A., & Selto, F. H. (2001). Communicating and Controlling Strategy: An Empirical Study of the Effectiveness of the Balanced Scorecard. Journal of Management Accounting Research, 13(1), 47-90. doi:10.2308/jmar.2001.13.1.47
Metzger, M. J. (2007). Communication Privacy Management in Electronic Commerce. Journal of Computer-Mediated Communication, 12(2), 335-361. doi:10.1111/j.1083-6101.2007.00328.x
Waters, S., & Ackerman, J. (2011). Exploring Privacy Management on Facebook: Motivations and Perceived Consequences of Voluntary Disclosure. Journal of Computer-Mediated Communication, 17(1), 101-115. doi:10.1111/j.1083-6101.2011.01559.x