NotesFAQContact Us
Collection
Advanced
Search Tips
Back to results
ERIC Number: ED552621
Record Type: Non-Journal
Publication Date: 2013
Pages: 359
Abstractor: As Provided
ISBN: 978-1-2679-8935-2
ISSN: N/A
EISSN: N/A
An Examination of Organizational Information Protection in the Era of Social Media: A Study of Social Network Security and Privacy Protection
Maar, Michael C.
ProQuest LLC, Ph.D. Dissertation, Capella University
This study investigates information protection for professional users of online social networks. It addresses management's desire to motivate their employees to adopt protective measures while accessing online social networks and to help their employees improve their proficiency in information security and ability to detect deceptive practices. The study examines the protection motivation factors, privacy management practices, and their relationships. The privacy and security issues related to online social networks are discussed. A review of protection motivation theories and privacy management theories has been conducted. Combining protection motivation theories and communication privacy management, an integrated information protection model has been created. Motivating factors include perceived privacy threat, perceived security threat, perceived trustworthiness of online social networks, perceived deception threats, information security self-efficacy, response efficacy, benefit-cost ratio, personal norms, and habits. Privacy management practices are characterized by boundary permeability, boundary linkage, and boundary ownership. With respect to online social networks, these three privacy management constructs have been defined as breadth, depth, and frequency of information disclosure, control of social network connections, and control of sensitive information respectively. Based on the research model, a set of hypotheses have been developed for testing using online survey. The survey data has been analyzed using structural equation modeling and a more detailed model developed that is based on theories and findings from published studies. The findings confirm the hypotheses of the direct relations of the refined research model. Privacy, deception, and security concerns influence boundary permeability, linkage, and ownership respectively. Self-efficacy and response efficacy are positive motivators for social network connection and sensitive information control. Trust reduces privacy, deception, and security concerns. Trust enhances perception of benefits and efficacy. Aggravated security concern can depress self-efficacy. Personal norms and habits can be valuable drivers for information protection behavior. The integrated information protection model may be used to develop security promotion messages and training for employees to help them protect their personal private information and confidential business information. Future research may include larger samples, research in businesses or organizations, cross-cultural studies, other information sharing or collaboration environments, and meta-analysis. [The dissertation citations contained here are published with the permission of ProQuest LLC. Further reproduction is prohibited without permission. Copies of dissertations may be obtained by Telephone (800) 1-800-521-0600. Web page: http://www.proquest.com/en-US/products/dissertations/individuals.shtml.]
ProQuest LLC. 789 East Eisenhower Parkway, P.O. Box 1346, Ann Arbor, MI 48106. Tel: 800-521-0600; Web site: http://www.proquest.com/en-US/products/dissertations/individuals.shtml
Publication Type: Dissertations/Theses - Doctoral Dissertations
Education Level: N/A
Audience: N/A
Language: English
Sponsor: N/A
Authoring Institution: N/A
Grant or Contract Numbers: N/A