Filters








4,791 Hits in 14.1 sec

Conversational Assistants: Investigating Privacy Concerns, Trust, and Self-Disclosure

Kambiz Saffarizadeh, Maheshwar Boodraj, Tawfiq M. Alashoor
2017 International Conference on Information Systems  
Specifically, we investigate the effect of conversational assistants' self-disclosure on the relationship between users' privacy concerns and their self-disclosure.  ...  In this study, we examine the role of reciprocal self-disclosure and trust within the novel and emerging context of conversational assistants.  ...  Second, we seek to open the black-box of trust and shed light on the specific mechanisms (namely, cognitive trust and emotional trust) through which users' privacy concerns impact their self-disclosure  ... 
dblp:conf/icis/SaffarizadehBA17 fatcat:oodwvpoej5dthivpsyxwxggkoi

Risky Mail: Concerns in Confidential Attorney-Client Email

Rebecca Bolin
2012 Social Science Research Network  
actions" for violations of terms of service. 258 Whereas the previous policy was black and white, the new AOL policy is tinged with gray.  ...  The ABA does not mention any technical solution, such as encryption, in the context of third-party access, nor discuss the attorney's duty to understand technology.  ...  When email is on a third-party server, both sender and recipient risk disclosure of confidential information and privilege waiver through unrelated disclosure.  ... 
doi:10.2139/ssrn.2013502 fatcat:hbwgrsl4ajg6pjsmni5rtk3i4m

Transparency you can trust: Transparency requirements for artificial intelligence between legal norms and contextual concerns

Heike Felzmann, Eduard Fosch Villaronga, Christoph Lutz, Aurelia Tamò-Larrieux
2019 Big Data & Society  
We then discuss the pitfalls with respect to this requirement by focusing on the significance of contextual and performative factors in the implementation of transparency.  ...  We first investigate the ratio legis of the transparency requirement in the General Data Protection Regulation and its ethical underpinnings, showing its focus on the provision of information and explanation  ...  The authors are listed in alphabetical order and have contributed equally to this article  ... 
doi:10.1177/2053951719860542 fatcat:ckdhn6jj3zdntpfhcpglp75yee

To Reveal or Conceal? Managers' Disclosures of Private Information During Emotional Intelligence Training

Kathryn Thory
2015 Human Resource Development Quarterly  
In order to capture the function of emotions, the article also draws on Stiles ' (1987) fever model of distress disclosure.  ...  By applying Petronio's theory to a new work context of training and extending Stiles' model to a range of emotions, the article provides novel insights into managerial control over disclosures, privacy  ...  However, we require a greater understanding of how a range of emotions affect decision criteria to reveal or conceal private information.  ... 
doi:10.1002/hrdq.21222 fatcat:wxhrlypsqnh6ffkexpewonq7yu

Concerning the Research and Science

Kiyoung Kim
2015 Social Science Research Network  
The scientific knowledge is qualified of some elements, i.e., evidence-based, universal frame to be applied, sense of understanding, pragmatic in comprehension or application, more persuasion on theory  ...  A cultivation of knowledge to serve the economic use and its industrialization reveals it's competitive edge in the society.  ...  Both authors were able to demonstrate the origin of their intellect in the article, how the concepts related to the theory have been used, and how the investigators were able to fill the vacuum in the  ... 
doi:10.2139/ssrn.2592858 fatcat:vdwhczqzbjf5bdwxhroijkz6ri

End-User Privacy in Human-Computer Interaction

Giovanni Iachello, Jason Hong
2007 Foundations and Trends® in Human–Computer Interaction  
Practitioners and researchers can draw upon this review when working on topics related to privacy in the context of HCI and CSCW.  ...  The purpose of this article is twofold. First, we summarize research on the topic of privacy in Human-Computer Interaction (HCI), outlining current approaches, results, and trends.  ...  Support for this work was provided by the NSF Graduate Research Fellowship Program, the President of Georgia Tech, the Dean of the College of Computing of Georgia Tech, and the MacArthur Foundation through  ... 
doi:10.1561/1100000004 fatcat:scnw3n6ccnf6fj6pcpacahiori

Leveraging Artificial Intelligence in Marketing for Social Good—An Ethical Perspective

Erik Hermann
2021 Journal of Business Ethics  
By revealing interdependencies and tensions between ethical principles, the authors shed light on the applicability of a purely principled, deontological approach to AI ethics in marketing.  ...  Building on the literature on AI ethics, the authors systematically scrutinize the ethical challenges of deploying AI in marketing from a multi-stakeholder perspective.  ...  However, black box AI can be an obstacle to such an understanding.  ... 
doi:10.1007/s10551-021-04843-y pmid:34054170 pmcid:PMC8150633 fatcat:5kb54mmvvjgerhd7hygkehklfe

State-of-the-Art of the Economics of Cyber-Security and Privacy

Nicola Jentzsch
2016 Social Science Research Network  
The following scheme outlines in brief the relation of the two deliverables D4.1 and D4.2 to the developed Privacy and Cyber-Security Market Scheme.  ...  IPACSO will focus on adapting existing innovation methodologies available in other domains, both general and specific, optimizing these approaches for the Privacy and Cyber-Security (PACS) market domains  ...  Then the correlations between the scores on the current scales and two established measures of privacy concern were examined.  ... 
doi:10.2139/ssrn.2671291 fatcat:qddqtvak5jft3gfspybuq2nzgm

New Governance, Chief Privacy Officers, and the Corporate Management of Information Privacy in the United States: An Initial Inquiry

KENNETH A. BAMBERGER, DEIRDRE K. MULLIGAN
2011 Law & Policy  
of such "new governance" approaches on regulated firms' understanding of the laws' demands, and on the structures employed within business organizations to meet them.  ...  This article targets this analytic gap by examining internal corporate practices regarding consumer privacy, an arena in which the Federal Trade Commission and the states have adopted new governance models  ...  to the effects of these tools on regulated firms' understanding of the laws' demands and on the structures employed within business organizations to meet them.  ... 
doi:10.1111/j.1467-9930.2011.00351.x fatcat:3zn3ctbo3fck3p24qxg6ta76hi

Managing the Tension between Trust and Confidentiality in Mobile Supply Chains

Nassim Ghondaghsaz, Zarina Chokparova, Sven Engesser, Leon Urbas
2022 Sustainability  
Implementation of the MSC model could, however, raise trust and confidentiality concerns.  ...  The interplay of trust and confidentiality, or preservation of information privacy, between partners plays a central role in the supply chains, particularly because they are genuinely dependent on each  ...  Grey-Box Scenario A grey-box scenario of integration represents a moderation between the two extremes of total non-disclosure and full disclosure of information.  ... 
doi:10.3390/su14042347 fatcat:3muepun46bfytjxsfgyx6hrazy

Enhancing Privacy Controls for Patients via a Selective Authentic Electronic Health Record Exchange Service: Qualitative Study of Perspectives by Medical Professionals and Patients

Ala Sarah Alaqra, Simone Fischer-Hübner, Erik Framner
2018 Journal of Medical Internet Research  
One example of a privacy-enhancing technology for user-controlled data minimization on content level is a redactable signature.  ...  In this study, we present end users' evaluations of a Cloud-based selective authentic electronic health record (EHR) exchange service (SAE-service) in an electronic health use case.  ...  Acknowledgments This study is supported by the EU Horizon 2020 research project No. 644962 PRISMACLOUD "Privacy and security maintaining services in the Cloud" [49] .  ... 
doi:10.2196/10954 pmid:30578189 pmcid:PMC6322916 fatcat:aiiudtqaardhdodazpotiudovq

The Virtues of Knowing Less: Justifying Privacy Protections Against Disclosure

Daniel J. Solove
2003 Social Science Research Network  
The propriety of disclosures depends upon their purpose, not merely on the type of  ...  Instead, we should focus on the relationships in which information is transferred and the uses to which information is put.  ...  Neil Swidey, A Nation of Voyeurs  ... 
doi:10.2139/ssrn.440200 fatcat:zll5yue7lvaqnj3mz4qocrgncy

eFRIEND: an ethical framework for intelligent environments development

Simon Jones, Sukhvinder Hara, Juan Carlos Augusto
2014 Ethics and Information Technology  
Intelligent environments aim to provide context-sensitive services to humans in the physical spaces in which they work and live.  ...  This article provides a solution to both of these problems. It synthesises the ethical issues addressed by previous work and highlights other important concerns which have been overlooked so far.  ...  For some, the right place for computer technology is in the background, as a black box, helping and at the same time demanding little from the user (Weiser and Brown, 1996) .  ... 
doi:10.1007/s10676-014-9358-1 fatcat:epwjiopdsrcyrj373ghbqykkda

Towards platform observability

Bernhard Rieder, Jeanette Hofmann
2020 Internet Policy Review  
This article questions the popular image of an openable 'black box' .  ...  In light of the transforming impact of platforms on markets, the public sphere, elections, and employment conditions, governments, and civil society alike are demanding more transparency and accountability  ...  ACKNOWLEDGEMENTS This work was, in part, inspired by discussions we had as members of the European Commission's Observatory on the Online Platform Economy.  ... 
doi:10.14763/2020.4.1535 fatcat:ndxbkpktzjb2dg4iw5qthqreny

The language of privacy

Michael Boyle, Saul Greenberg
2005 ACM Transactions on Computer-Human Interaction  
In this thesis I describe four major contributions that fundamentally change our understanding of the nature of privacy, its role in people's daily lives, and how it may be realised in computer supported  ...  This method reveals omissions in the way a media space prototype handles privacy and hidden assumptions regarding technology design, use, users, and their contexts.  ...  People must balance the disclosure demands of social life against the privacy needs for maintenance of the self.  ... 
doi:10.1145/1067860.1067868 fatcat:zrkyacghsfdmzpn6zm7r442bke
« Previous Showing results 1 — 15 out of 4,791 results