@article{XinYingTiberiusAlnooretal.2024, author = {XinYing, Chew and Tiberius, Victor and Alnoor, Alhamzah and Camilleri, Mark and Khaw, Khai Wah}, title = {The dark side of metaverse: a multi-perspective of deviant behaviors from PLS-SEM and fsQCA findings}, series = {International journal of human-computer interaction}, journal = {International journal of human-computer interaction}, publisher = {Taylor \& Francis}, address = {London}, issn = {1044-7318}, doi = {10.1080/10447318.2024.2331875}, pages = {21}, year = {2024}, abstract = {The metaverse has created a huge buzz of interest because such a phenomenon is emerging. The behavioral aspect of the metaverse includes user engagement and deviant behaviors in the metaverse. Such technology has brought various dangers to individuals and society. There are growing cases reported of sexual abuse, racism, harassment, hate speech, and bullying because of online disinhibition make us feel more relaxed. This study responded to the literature call by investigating the effect of technical and social features through mediating roles of security and privacy on deviant behaviors in the metaverse. The data collected from virtual network users reached 1121 respondents. Partial Least Squares based structural equation modeling (PLS-SEM) and fuzzy set Qualitative Comparative Analysis (fsQCA) were used. PLS-SEM results revealed that social features such as user-to-user interaction, homophily, social ties, and social identity, and technical design such as immersive experience and invisibility significantly affect users' deviant behavior in the metaverse. The fsQCA results provided insights into the multiple causal solutions and configurations. This study is exceptional because it provided decisive results by understanding the deviant behavior of users based on the symmetrical and asymmetrical approach to virtual networks.}, language = {en} } @article{AckfeldRohloffRzepka2021, author = {Ackfeld, Viola and Rohloff, Tobias and Rzepka, Sylvi}, title = {Increasing personal data contributions for the greater public good}, series = {Behavioural public policy}, journal = {Behavioural public policy}, publisher = {Cambridge University Press}, address = {Cambridge}, issn = {2398-063X}, doi = {10.1017/bpp.2021.39}, pages = {1 -- 27}, year = {2021}, abstract = {Personal data increasingly serve as inputs to public goods. Like other types of contributions to public goods, personal data are likely to be underprovided. We investigate whether classical remedies to underprovision are also applicable to personal data and whether the privacy-sensitive nature of personal data must be additionally accounted for. In a randomized field experiment on a public online education platform, we prompt users to complete their profiles with personal information. Compared to a control message, we find that making public benefits salient increases the number of personal data contributions significantly. This effect is even stronger when additionally emphasizing privacy protection, especially for sensitive information. Our results further suggest that emphasis on both public benefits and privacy protection attracts personal data from a more diverse set of contributors.}, language = {en} } @article{ErmakovaFabianZarnekow2016, author = {Ermakova, Tatiana and Fabian, Benjamin and Zarnekow, Ruediger}, title = {Improving Individual Acceptance of Health Clouds through Confidentiality Assurance}, series = {Applied clinical informatics}, volume = {7}, journal = {Applied clinical informatics}, publisher = {Schattauer}, address = {Stuttgart}, issn = {1869-0327}, doi = {10.4338/ACI-2016-07-RA-0107}, pages = {983 -- 993}, year = {2016}, abstract = {Background: Cloud computing promises to essentially improve healthcare delivery performance. However, shifting sensitive medical records to third-party cloud providers could create an adoption hurdle because of security and privacy concerns. Methods: We empirically investigate our research question by a survey with over 260 full responses. For the setting with a high confidentiality assurance, we base on a recent multi-cloud architecture which provides very high confidentiality assurance through a secret-sharing mechanism: Health information is cryptographically encoded and distributed in a way that no single and no small group of cloud providers is able to decode it.}, language = {en} } @article{MoellersHaelterlein2013, author = {M{\"o}llers, Norma Tamaria and H{\"a}lterlein, Jens}, title = {Privacy issues in public discourse the case of "smart" CCTV in Germany}, series = {Innovation : the European journal of social sciences}, volume = {26}, journal = {Innovation : the European journal of social sciences}, number = {1-2}, publisher = {Routledge, Taylor \& Francis Group}, address = {Abingdon}, issn = {1351-1610}, doi = {10.1080/13511610.2013.723396}, pages = {57 -- 70}, year = {2013}, abstract = {In dealing with surveillance, scholars have widely agreed to refute privacy as an analytical concept and defining theme. Nonetheless, in public debates, surveillance technologies are still confronted with issues of privacy, and privacy therefore endures as an empirical subject of research on surveillance. Drawing from our analysis of public discourse of so-called smart closed-circuit television (CCTV) in Germany, we propose to use a sociology of knowledge perspective to analyze privacy in order to understand how it is socially constructed and negotiated. Our data comprise 117 documents, covering all publicly available documents between 2006 and 2010 that we were able to obtain. We found privacy to be the only form of critique in the struggle for the legitimate definition of smart CCTV. In this paper, we discuss the implications our preliminary findings have for the relationship between privacy issues and surveillance technology and conclude with suggestions of how this relationship might be further investigated as paradoxical, yet constitutive.}, language = {en} }