Language: English ❌
You searched for subject:(privacy decision making)
.
Showing records 1 – 8 of
8 total matches.
No search limiters apply to these results.
1.
Anastasopoulou, Kalliopi.
Privacy decision-making in the digital era.
Degree: 2016, University of the Aegean; Πανεπιστήμιο Αιγαίου
URL: http://hdl.handle.net/10442/hedi/41036
► Human activities that involve the Internet lead to the disclosure of personal information, either directly, as in the case of posting photos, videos and personal…
(more)
▼ Human activities that involve the Internet lead to the disclosure of personal information, either directly, as in the case of posting photos, videos and personal thoughts on an online social network, or indirectly, as in the case of purchase preferences revealed by consumers in an internet shop. Modern systems that can store and process vast amounts of information provide boundless capabilities for using and misusing personal information. Thus, information privacy has become a prime issue of concern for users, technologists, entrepreneurs, researchers and governments.People negotiate their information privacy when they interact with enterprises and government agencies via the Internet. In this context, all relevant stakeholders take privacy-related decisions. Individuals, either as consumers buying online products and services or citizens using e-government services, they face decisions about the use of online services, the disclosure of personal information, and the use of privacy enhancing technologies. Enterprises make decisions regarding their investments in policies and technologies for privacy protection. Governments also decide on privacy regulations, as well as on the development of e-government services that store and process citizens’ personal information.Motivated by the issues and challenges above, this doctoral thesis focuses on aspects of privacy decision-making in the digital era and uses a variety of research methods to address issues of individuals’ privacy behaviour and issues of strategic privacy decision-making for online service providers and e-government service providers.Based on the Cultural Theory of Risk we study citizens’ intention to use e-Government services from the perspective of decision biases. In this context, we present the results of an empirical study regarding citizens’ intention to use a new service offered by the Greek Ministry of Finance, the so-called “Tax Card”. Tax Card has been used to collect information about everyday purchases and aims to diminish tax avoidance. We have examined the strong influence of Cultural Bias on the formulation of intention to use and concluded that different cultural types of people should be addressed in various ways to achieve broad adoption of e-government services.Based on Behavioral Game Theory we introduce models of strategic interactions between users and enterprises. In this context, we study several cases. We present the strategic interactions of cloud-based online storage providers with sensitive privacy stakeholders. Privacy-related interactions are conducted between service providers and end users when the latter place their personal data in the cloud system. In this study, we use a game-theoretic model to analyse stakeholders’ interactions and show how their behaviour can increase or not system reliability and also, improve or not the quality of service in a cloud computing content.We also, present an analysis of privacy-related strategic choices of buyers and sellers in e-commerce transactions. E-commerce transactions, in addition…
Subjects/Keywords: Λήψη αποφάσεων ιδιωτικότητας; Ιδιωτικότητα; Λήψη αποφάσεων; Θεωρία παιγνίων; Privacy decision-making; Privacy; Decision-making; Game theory
Record Details
Similar Records
Cite
Share »
Record Details
Similar Records
Cite
« Share





❌
APA ·
Chicago ·
MLA ·
Vancouver ·
CSE |
Export
to Zotero / EndNote / Reference
Manager
APA (6th Edition):
Anastasopoulou, K. (2016). Privacy decision-making in the digital era. (Thesis). University of the Aegean; Πανεπιστήμιο Αιγαίου. Retrieved from http://hdl.handle.net/10442/hedi/41036
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Chicago Manual of Style (16th Edition):
Anastasopoulou, Kalliopi. “Privacy decision-making in the digital era.” 2016. Thesis, University of the Aegean; Πανεπιστήμιο Αιγαίου. Accessed January 25, 2021.
http://hdl.handle.net/10442/hedi/41036.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
MLA Handbook (7th Edition):
Anastasopoulou, Kalliopi. “Privacy decision-making in the digital era.” 2016. Web. 25 Jan 2021.
Vancouver:
Anastasopoulou K. Privacy decision-making in the digital era. [Internet] [Thesis]. University of the Aegean; Πανεπιστήμιο Αιγαίου; 2016. [cited 2021 Jan 25].
Available from: http://hdl.handle.net/10442/hedi/41036.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Council of Science Editors:
Anastasopoulou K. Privacy decision-making in the digital era. [Thesis]. University of the Aegean; Πανεπιστήμιο Αιγαίου; 2016. Available from: http://hdl.handle.net/10442/hedi/41036
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Indiana University
2.
Hasan, Rakibul.
A SOCIO-TECHNICAL APPROACH TO PROTECTING PEOPLE'S PRIVACY IN THE CONTEXT OF SHARING IMAGES ON SOCIAL MEDIA
.
Degree: 2020, Indiana University
URL: http://hdl.handle.net/2022/26035
► Billions of photos are being shared on social media platforms every day. A large portion of these photos are taken in public places, and may…
(more)
▼ Billions of photos are being shared on social media platforms every day. A large portion of these
photos are taken in public places, and may contain people who were inadvertently captured (i.e.,
bystanders) and are not important for the
subject matter of the photos. When these photos are
shared online, they reveal the bystanders' identity, location, and other
privacy-sensitive information
to a potentially unbounded number of internet users. Social media users not only share photos they
own but also re-share photos from their peers and those they find on the internet; for example, the
sharing of image macros or memes on social media has risen in popularity. Internet users create
memes using photos of other people who are often unknown to them. Such photos usually portray
people in embarrassing situations, which are highlighted and ampli fied with additional text or captions.
These photos can go `viral' and cause severe personal, social, and professional consequences
to the photo subjects. While the research community has made signi cant efforts to reduce photosharers'
privacy risks on social media, protecting the
privacy of people who do not actively take
part in photo-taking or sharing activities, e.g., bystanders and meme subjects, has not received
adequate attention. This dissertation proposes machine learning and computer vision-based techniques
to reduce bystanders'
privacy risks. More specfi cally, we offer an automated and scalable
system to detect bystanders in images so that their
privacy can be protected by, e.g., removing or
obfuscating them using image transforms. In an online study, we evaluated the effectiveness and
usability of commonly used image transforms. We constructed and empirically validated models of
interactions among image filters and utility variables. Based on these models, we proposed a principled
approach to design novel obfuscations to balance the
privacy-utility trade-o s. To protect
the
privacy of meme subjects, we explored the potential of behavioral interventions to discourage
meme sharing. Through controlled experiments, we identfi ed demographic factors and personality
traits that affect behaviors regarding photo sharing that may threaten other people's
privacy. We
also discovered links between people's personality traits and their reactions to
privacy nudges that were designed to discourage them from sharing memes. These results can be used to develop direct
and personalized interventions to stimulate
privacy-respecting and prosocial behaviors among social
media users.
Advisors/Committee Members: Kapadia, Apu (advisor).
Subjects/Keywords: privacy;
social media;
human decision making;
computer vision
Record Details
Similar Records
Cite
Share »
Record Details
Similar Records
Cite
« Share





❌
APA ·
Chicago ·
MLA ·
Vancouver ·
CSE |
Export
to Zotero / EndNote / Reference
Manager
APA (6th Edition):
Hasan, R. (2020). A SOCIO-TECHNICAL APPROACH TO PROTECTING PEOPLE'S PRIVACY IN THE CONTEXT OF SHARING IMAGES ON SOCIAL MEDIA
. (Thesis). Indiana University. Retrieved from http://hdl.handle.net/2022/26035
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Chicago Manual of Style (16th Edition):
Hasan, Rakibul. “A SOCIO-TECHNICAL APPROACH TO PROTECTING PEOPLE'S PRIVACY IN THE CONTEXT OF SHARING IMAGES ON SOCIAL MEDIA
.” 2020. Thesis, Indiana University. Accessed January 25, 2021.
http://hdl.handle.net/2022/26035.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
MLA Handbook (7th Edition):
Hasan, Rakibul. “A SOCIO-TECHNICAL APPROACH TO PROTECTING PEOPLE'S PRIVACY IN THE CONTEXT OF SHARING IMAGES ON SOCIAL MEDIA
.” 2020. Web. 25 Jan 2021.
Vancouver:
Hasan R. A SOCIO-TECHNICAL APPROACH TO PROTECTING PEOPLE'S PRIVACY IN THE CONTEXT OF SHARING IMAGES ON SOCIAL MEDIA
. [Internet] [Thesis]. Indiana University; 2020. [cited 2021 Jan 25].
Available from: http://hdl.handle.net/2022/26035.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Council of Science Editors:
Hasan R. A SOCIO-TECHNICAL APPROACH TO PROTECTING PEOPLE'S PRIVACY IN THE CONTEXT OF SHARING IMAGES ON SOCIAL MEDIA
. [Thesis]. Indiana University; 2020. Available from: http://hdl.handle.net/2022/26035
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

University of California – Irvine
3.
Knijnenburg, Bart Piet.
A User-Tailored Approach to Privacy Decision Support.
Degree: Information and Computer Science, 2015, University of California – Irvine
URL: http://www.escholarship.org/uc/item/9282g37p
► As an increasingly important part of our social, professional and financial lives happens online, the frequency with which we have to deal with privacy problems…
(more)
▼ As an increasingly important part of our social, professional and financial lives happens online, the frequency with which we have to deal with privacy problems is ever on the rise. In this dissertation I answer the question: How can we help users to balance the benefits and risks of information disclosure in a user-friendly manner, so that they can make good privacy decisions? After briefly motivating this question in Chapter 1, I first discuss problems with existing answers to this question in Chapters 2 and 3. In Chapter 2, I explain how providing transparency and control does sufficiently not help users in making better privacy decisions. Specifically, I demonstrate that people’s privacy decisions fall prey to all sorts of decision biases, and that most privacy decisions are too complex for people to fathom. In effect, many people refrain from exploiting the provided transparency and control altogether.In Chapter 3, I explain how “privacy nudging” is also not sufficient in its presently studied form. Specifically, I demonstrate that although nudges relieve some of the burden of privacy decision making, they tend to overlook the inherent diversity of users’ privacy preferences and the context-dependency of their decisions.The main argument of this dissertation is that because of these shortcomings of transparency-and-control and privacy nudges, privacy scholars need to move beyond the “one-size-fits-all” approach to privacy embodied in both nudges and transparency and control. I argue that because of the high variability and context-dependency of people’s privacy decisions, nudges need to be tailored to the user and her context.In several studies, I contextualize users’ privacy decisions by showing how disclosure depended on the person’s privacy profile, the type of information, and the recipient of the information (Chapter 4). Then, I present the idea of a “privacy adaptation procedure” and demonstrate its merit in Chapter 5. Finally, I test a complete implementation of the privacy adaptation procedure in Chapter 6. The results of this final study cause reserved optimism regarding the feasibility of user-tailored privacy decision support.
Subjects/Keywords: Computer science; Behavioral psychology; Information science; Adaptive systems; Decision making; Human-computer interaction; Privacy; Recommender systems; User experiments
Record Details
Similar Records
Cite
Share »
Record Details
Similar Records
Cite
« Share





❌
APA ·
Chicago ·
MLA ·
Vancouver ·
CSE |
Export
to Zotero / EndNote / Reference
Manager
APA (6th Edition):
Knijnenburg, B. P. (2015). A User-Tailored Approach to Privacy Decision Support. (Thesis). University of California – Irvine. Retrieved from http://www.escholarship.org/uc/item/9282g37p
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Chicago Manual of Style (16th Edition):
Knijnenburg, Bart Piet. “A User-Tailored Approach to Privacy Decision Support.” 2015. Thesis, University of California – Irvine. Accessed January 25, 2021.
http://www.escholarship.org/uc/item/9282g37p.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
MLA Handbook (7th Edition):
Knijnenburg, Bart Piet. “A User-Tailored Approach to Privacy Decision Support.” 2015. Web. 25 Jan 2021.
Vancouver:
Knijnenburg BP. A User-Tailored Approach to Privacy Decision Support. [Internet] [Thesis]. University of California – Irvine; 2015. [cited 2021 Jan 25].
Available from: http://www.escholarship.org/uc/item/9282g37p.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Council of Science Editors:
Knijnenburg BP. A User-Tailored Approach to Privacy Decision Support. [Thesis]. University of California – Irvine; 2015. Available from: http://www.escholarship.org/uc/item/9282g37p
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Ohio University
4.
Hopkins, Ashley R.
Privacy Within Photo-Sharing and Gaming Applications:
Motivation and Opportunity and the Decision to Download.
Degree: PhD, Journalism (Communication), 2019, Ohio University
URL: http://rave.ohiolink.edu/etdc/view?acc_num=ohiou1556821782704244
► This study worked to determine the amount of attention users of mobile application devices dedicate to opt-in privacy policies. As the average user is often…
(more)
▼ This study worked to determine the amount of attention
users of mobile application devices dedicate to opt-in
privacy
policies. As the average user is often faced with a variety of
motivations and distractions when determining whether to download
an application, this study created an experimental setting in which
certain participants were told that they would have to justify
their
decision to download with a sample of their peers upon
reviewing typical opt-in
privacy policies, while others faced a
time restraint when
making a
decision to download.Based on the
academic literature, this study hypothesized that 1) When faced
with a time restraint, participants would be less likely to
download an application than those who did not face a time
restraint; 2) Participants who were asked to justify the basis of
their
decision would be less likely to download an application than
those who were not asked to justify their
decision; 3) Participants
who faced a time restraint and who were not asked to consider the
basis of their decisions prior to download would be more likely to
download an application than those in other experimental
conditions; 4) Participants who did not face a time restraint and
who were asked to consider the basis of their
decision prior to
download would be less likely to download an application than those
in other experimental conditions; and 5) Participants who scored
higher on a self-efficacy scale would be more likely to download
applications than those who scored lower. It also questioned how
the various factors outlined in this study (motivation,
opportunity, and self-efficacy) worked together to affect the
decision-
making process.The results of this study help to show that
while motivation and opportunity has often been shown to play a
role in
decision-
making processes, age, experience, and self-
efficacy may play a larger part in the access mobile application
users are willing to provide to third-party developers than was
previously considered. While individuals boast the importance of
protecting their
privacy online, the more one interacts with the
technology the less risk they come to expect when deciding whether
or not to accept permissions and download a mobile
application.
Advisors/Committee Members: Meyer, Hans (Advisor).
Subjects/Keywords: Journalism; mobile applications; apps; smartphone; social media; privacy; data; datamining; data mine; Android; Apple; privacy permissions; terms and conditions; motivation; opportunity; decision-making; gaming; photo-sharing; Facebook; MODE model
Record Details
Similar Records
Cite
Share »
Record Details
Similar Records
Cite
« Share





❌
APA ·
Chicago ·
MLA ·
Vancouver ·
CSE |
Export
to Zotero / EndNote / Reference
Manager
APA (6th Edition):
Hopkins, A. R. (2019). Privacy Within Photo-Sharing and Gaming Applications:
Motivation and Opportunity and the Decision to Download. (Doctoral Dissertation). Ohio University. Retrieved from http://rave.ohiolink.edu/etdc/view?acc_num=ohiou1556821782704244
Chicago Manual of Style (16th Edition):
Hopkins, Ashley R. “Privacy Within Photo-Sharing and Gaming Applications:
Motivation and Opportunity and the Decision to Download.” 2019. Doctoral Dissertation, Ohio University. Accessed January 25, 2021.
http://rave.ohiolink.edu/etdc/view?acc_num=ohiou1556821782704244.
MLA Handbook (7th Edition):
Hopkins, Ashley R. “Privacy Within Photo-Sharing and Gaming Applications:
Motivation and Opportunity and the Decision to Download.” 2019. Web. 25 Jan 2021.
Vancouver:
Hopkins AR. Privacy Within Photo-Sharing and Gaming Applications:
Motivation and Opportunity and the Decision to Download. [Internet] [Doctoral dissertation]. Ohio University; 2019. [cited 2021 Jan 25].
Available from: http://rave.ohiolink.edu/etdc/view?acc_num=ohiou1556821782704244.
Council of Science Editors:
Hopkins AR. Privacy Within Photo-Sharing and Gaming Applications:
Motivation and Opportunity and the Decision to Download. [Doctoral Dissertation]. Ohio University; 2019. Available from: http://rave.ohiolink.edu/etdc/view?acc_num=ohiou1556821782704244
5.
Lustgarten, Samuel David.
Ethical considerations for the information age: a qualitative study of doctoral psychology trainees' preparation and decision making for technology use.
Degree: PhD, Psychological and Quantitative Foundations, 2018, University of Iowa
URL: https://ir.uiowa.edu/etd/6462
► Psychologists now use and interact with a mélange of technology for client care, including (but not limited to) email (Delsignore et al., 2016; Eysenbach,…
(more)
▼ Psychologists now use and interact with a mélange of technology for client care, including (but not limited to) email (Delsignore et al., 2016; Eysenbach, 2000), text messaging (Bradley & Hendricks, 2009; Elhai & Frueh, 2016), electronic medical records (Harrison & Palacio, 2006; Steinfeld & Keyes, 2011), telemental health/televideo (Richardson, Frueh, Grubaugh, Egede, & Elhai, 2012), and digital assessments (Jellins, 2015; Pearson Education Inc., 2015b). Amidst this technological revolution, threats to ethical obligations and regulations exist that might hinder effective client care (Elhai & Hall, 2016b; Lustgarten, 2015; Lustgarten & Colbow, 2017). Literature suggests that individuals, organizations, companies, and government actors have targeted individuals and nations for their data (Elhai & Hall, 2016b; Greenwald, 2014; Lustgarten, 2015). Despite concerns for protecting client information, little is known about the education and training opportunities present in APA-accredited clinical and/or counseling psychology doctoral programs around technology competence. Researchers have recommended trainees receive technology training for use within psychotherapy (Colbow, 2013; Lustgarten & Colbow, 2017; Mallen, Vogel, & Rochlen, 2005). This study interviewed 9 doctoral trainees about their experiences,
decision making, thought processes, responsibilities for stakeholders, and additional needs from training programs, organizations, and practicum sites when using technology. Results suggested that participants had limited opportunities for education, but interacted with and were expected to use various forms of technology (e.g., email, text messaging, and electronic medical records). Additionally, participants tended to request increased organizational involvement on this topic in the form of formal conversations, workshops, and continuing education. More research is recommended to highlight disparities between expectations and education within doctoral training programs.
Advisors/Committee Members: Westefeld, John S. (supervisor).
Subjects/Keywords: Decision Making; Doctoral Trainees; Ethics; Privacy and Confidentiality; Technology; Training and Education; Educational Psychology
…their experiences, decision making, thought processes, responsibilities for stakeholders,
and… …74
Decision Making around Technology Use… …Additionally, they have improved
clinical decision making (Harrison & Palacio, 2006). By… …privacy and confidentiality, practitioner competence, and a lack of training exist
(Colbow… …11
Privacy and Confidentiality…
Record Details
Similar Records
Cite
Share »
Record Details
Similar Records
Cite
« Share





❌
APA ·
Chicago ·
MLA ·
Vancouver ·
CSE |
Export
to Zotero / EndNote / Reference
Manager
APA (6th Edition):
Lustgarten, S. D. (2018). Ethical considerations for the information age: a qualitative study of doctoral psychology trainees' preparation and decision making for technology use. (Doctoral Dissertation). University of Iowa. Retrieved from https://ir.uiowa.edu/etd/6462
Chicago Manual of Style (16th Edition):
Lustgarten, Samuel David. “Ethical considerations for the information age: a qualitative study of doctoral psychology trainees' preparation and decision making for technology use.” 2018. Doctoral Dissertation, University of Iowa. Accessed January 25, 2021.
https://ir.uiowa.edu/etd/6462.
MLA Handbook (7th Edition):
Lustgarten, Samuel David. “Ethical considerations for the information age: a qualitative study of doctoral psychology trainees' preparation and decision making for technology use.” 2018. Web. 25 Jan 2021.
Vancouver:
Lustgarten SD. Ethical considerations for the information age: a qualitative study of doctoral psychology trainees' preparation and decision making for technology use. [Internet] [Doctoral dissertation]. University of Iowa; 2018. [cited 2021 Jan 25].
Available from: https://ir.uiowa.edu/etd/6462.
Council of Science Editors:
Lustgarten SD. Ethical considerations for the information age: a qualitative study of doctoral psychology trainees' preparation and decision making for technology use. [Doctoral Dissertation]. University of Iowa; 2018. Available from: https://ir.uiowa.edu/etd/6462

Colorado State University
6.
Dewri, Rinku.
Multi-criteria analysis in modern information management.
Degree: PhD, Computer Science, 2010, Colorado State University
URL: http://hdl.handle.net/10217/40284
► The past few years have witnessed an overwhelming amount of research in the field of information security and privacy. An encouraging outcome of this research…
(more)
▼ The past few years have witnessed an overwhelming amount of research in the field of information security and
privacy. An encouraging outcome of this research is the vast accumulation of theoretical models that help to capture the various threats that persistently hinder the best possible usage of today's powerful communication infrastructure. While theoretical models are essential to understanding the impact of any breakdown in the infrastructure, they are of limited application if the underlying business centric view is ignored. Information management in this context is the strategic management of the infrastructure, incorporating the knowledge about causes and consequences to arrive at the right balance between risk and profit. Modern information management systems are home to a vast repository of sensitive personal information. While these systems depend on quality data to boost the Quality of Service (QoS), they also run the risk of violating
privacy regulations. The presence of network vulnerabilities also weaken these systems since security policies cannot always be enforced to prevent all forms of exploitation. This problem is more strongly grounded in the insufficient availability of resources, rather than the inability to predict zero-day attacks. System resources also impact the availability of access to information, which in itself is becoming more and more ubiquitous day by day. Information access times in such ubiquitous environments must be maintained within a specified QoS level. In short, modern information management must consider the mutual interactions between risks, resources and services to achieve wide scale acceptance. This dissertation explores these problems in the context of three important domains, namely disclosure control, security risk management and wireless data broadcasting. Research in these domains has been put together under the umbrella of multi-criteria
decision making to signify that "business survival" is an equally important factor to consider while analyzing risks and providing solutions for their resolution. We emphasize that businesses are always bound by constraints in their effort to mitigate risks and therefore benefit the most from a framework that allows the exploration of solutions that abide by the constraints. Towards this end, we revisit the optimization problems being solved in these domains and argue that they oversee the underlying cost-benefit relationship. Our approach in this work is motivated by the inherent multi-objective nature of the problems. We propose formulations that help expose the cost-benefit relationship across the different objectives that must be met in these problems. Such an analysis provides a
decision maker with the necessary information to make an informed
decision on the impact of choosing a control measure over the business goals of an organization. The theories and tools necessary to perform this analysis are introduced to the community.
Advisors/Committee Members: Whitley, L. Darrell (advisor), Ray, Indrajit, 1966- (advisor), Ray, Indrakshi (committee member), Siegel, Howard Jay (committee member).
Subjects/Keywords: Information management; data broadcasting; multi-objective optimization; information security and privacy; Computer networks – Security measures; Computer security; Multiple criteria decision making
Record Details
Similar Records
Cite
Share »
Record Details
Similar Records
Cite
« Share





❌
APA ·
Chicago ·
MLA ·
Vancouver ·
CSE |
Export
to Zotero / EndNote / Reference
Manager
APA (6th Edition):
Dewri, R. (2010). Multi-criteria analysis in modern information management. (Doctoral Dissertation). Colorado State University. Retrieved from http://hdl.handle.net/10217/40284
Chicago Manual of Style (16th Edition):
Dewri, Rinku. “Multi-criteria analysis in modern information management.” 2010. Doctoral Dissertation, Colorado State University. Accessed January 25, 2021.
http://hdl.handle.net/10217/40284.
MLA Handbook (7th Edition):
Dewri, Rinku. “Multi-criteria analysis in modern information management.” 2010. Web. 25 Jan 2021.
Vancouver:
Dewri R. Multi-criteria analysis in modern information management. [Internet] [Doctoral dissertation]. Colorado State University; 2010. [cited 2021 Jan 25].
Available from: http://hdl.handle.net/10217/40284.
Council of Science Editors:
Dewri R. Multi-criteria analysis in modern information management. [Doctoral Dissertation]. Colorado State University; 2010. Available from: http://hdl.handle.net/10217/40284
7.
Dahl, Teodor.
A consumer perspective of personalized marketing : An exploratory study on consumer perception of personalized marketing and how it affects the purchase decision making.
Degree: Faculty of Business, 2019, Kristianstad University
URL: http://urn.kb.se/resolve?urn=urn:nbn:se:hkr:diva-19592
► The traditional type of marketing is more directed towards big customer segments in specified areas. Due to technological improvement marketing has evolved into an…
(more)
▼ The traditional type of marketing is more directed towards big customer segments in specified areas. Due to technological improvement marketing has evolved into an extreme form of segmentation where marketing target the individual consumer based on their personal needs and preferences. This has led to a discussion of whether personalized marketing is something that create privacy concerns or benefits in the eyes of the consumer. The purpose of this thesis is to explore the consumer perception of personalized marketing and how the perception affects the purchase decision-making process. A conceptual framework was developed based on earlier research within personalized marketing. A qualitative method with an abductive approach has been used. Our primary data was collected through 8 different semi-structured interviews and consisted of men and women in the age span of 40-59 years’ old who had engaged in e-commerce at least once during the last six months. Our empirical data has been analyzed out of the literature review, which founds the basis for our findings. Our findings show that the consumer perception of personalized marketing affect the consumer decision-making process in varying ways. A positive perception of the personalized marketing makes the consumer more susceptible to it, which further impacts the different stages in the process.
Subjects/Keywords: Personalized marketing; Consumer perception; Past experiences; Privacy concerns; Consumer decision-making process; Business Administration; Företagsekonomi
…Consumer behavior online, Consumer
decision-making process, Consumer perception, Privacy concerns… …through a decision-making process which is described as the process from becoming aware
of a… …the personalized
marketing, and this in turn may affect the decision-making and whether the… …it has the ability to build increased trust.
During the decision making process each of… …having an impact on the
decision making process (Sipior, Ward, & Mendoza, 2011)…
Record Details
Similar Records
Cite
Share »
Record Details
Similar Records
Cite
« Share





❌
APA ·
Chicago ·
MLA ·
Vancouver ·
CSE |
Export
to Zotero / EndNote / Reference
Manager
APA (6th Edition):
Dahl, T. (2019). A consumer perspective of personalized marketing : An exploratory study on consumer perception of personalized marketing and how it affects the purchase decision making. (Thesis). Kristianstad University. Retrieved from http://urn.kb.se/resolve?urn=urn:nbn:se:hkr:diva-19592
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Chicago Manual of Style (16th Edition):
Dahl, Teodor. “A consumer perspective of personalized marketing : An exploratory study on consumer perception of personalized marketing and how it affects the purchase decision making.” 2019. Thesis, Kristianstad University. Accessed January 25, 2021.
http://urn.kb.se/resolve?urn=urn:nbn:se:hkr:diva-19592.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
MLA Handbook (7th Edition):
Dahl, Teodor. “A consumer perspective of personalized marketing : An exploratory study on consumer perception of personalized marketing and how it affects the purchase decision making.” 2019. Web. 25 Jan 2021.
Vancouver:
Dahl T. A consumer perspective of personalized marketing : An exploratory study on consumer perception of personalized marketing and how it affects the purchase decision making. [Internet] [Thesis]. Kristianstad University; 2019. [cited 2021 Jan 25].
Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:hkr:diva-19592.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Council of Science Editors:
Dahl T. A consumer perspective of personalized marketing : An exploratory study on consumer perception of personalized marketing and how it affects the purchase decision making. [Thesis]. Kristianstad University; 2019. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:hkr:diva-19592
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
8.
Iucolano, Donna M.
HYPERCONNECTIVITY GIVETH AND TAKETH AWAY: RECONCILING BEING
AN “ALWAYS-ON” EMPOWERED CONSUMER AND PRIVACY IN AN ERA OF
PERVASIVE PERSONAL DATA EXCHANGES.
Degree: PhD, Management, 2019, Case Western Reserve University School of Graduate Studies
URL: http://rave.ohiolink.edu/etdc/view?acc_num=case1554468526463455
► We are living in an era of rising connectivity where consumers of all ages and socioeconomic backgrounds are “always-on.” Consumers can now engage constantly with…
(more)
▼ We are living in an era of rising connectivity where
consumers of all ages and socioeconomic backgrounds are
“always-on.” Consumers can now engage constantly with brands,
retailers, content, and each other through real-time interactions,
facilitated by a mobile-first mindset. This has earned consumers
the moniker, “highly empowered.” Consumers are indeed empowered by
the growth of the internet/mobile, proliferation of devices, and
unprecedented access to information, choice, and control. However,
rising connectivity also has downsides. Consumers now face a
barrage of decisions about whether to share their personal
information with firms or accept its collection without their
explicit consent. The outcomes of these automatic, one-time
decisions are far-reaching and long-lasting. They also empower
firms—perhaps more than consumers; something most marketers prefer
to keep secret. This research study addresses how “always-on”
supposedly empowered consumers behave while shopping and make
decisions in an era of pervasive personal information exchanges
with retailers and others. It uses an exploratory, sequential mixed
methods design beginning with a qualitative study followed by two
quantitative studies. Study 1 investigates how 40 connected
consumers behave and make decisions in shopping/retail
environments. Findings reveal pros and cons of rising connectivity,
dynamic behavior that challenges traditional customer segmentation,
and tensions over
privacy and personal data exchanges with
retailers. These tensions are explored in Study 2 using survey data
collected from 790 U.S. consumers, all heavy internet/mobile users.
Consumer acceptance of personal data collection is interpreted as a
form of coping with the stress of digital life. Study 3 extends
Study 2 by focusing on three moderating effects on consumer
willingness to share personal data or have it collected: perceived
marketing intrusiveness, high versus low
privacy knowledge, and
high versus low
privacy-protecting behaviors. Many findings are
counterintuitive with few statistically significant differences in
consumer attitudes—all affected by their perceptions of fairness in
exchanges with firms. This work contributes to the emerging streams
of research about consumer
privacy, personal data exchanges,
perceptions of fairness, and consumer acceptance in an era of
presumed high consumer empowerment. It also has implications for
marketers and marketing strategies, consumer advocates, and public
policy.
Advisors/Committee Members: Niraj, Rakesh (Committee Chair).
Subjects/Keywords: Management; Marketing; Technology; Information Science; always-on consumer; consumer connectivity; privacy; personal data exchanges; consumer empowerment; disempowerment; fairness of exchanges; consumer acceptance; consumer decision making; shopping; digital commerce; mixed methods; cluster analysis
…consumer decision making; shopping; digital commerce; mixed
methods; cluster analysis
xvii… …behavior and decision making due to technology; how
increased hyperconnectivity is empowering… …Third,
consumer decision making and personal data exchanges between consumers and retailers… …Privacy Knowledge… …127
Privacy Protecting Behavior…
Record Details
Similar Records
Cite
Share »
Record Details
Similar Records
Cite
« Share





❌
APA ·
Chicago ·
MLA ·
Vancouver ·
CSE |
Export
to Zotero / EndNote / Reference
Manager
APA (6th Edition):
Iucolano, D. M. (2019). HYPERCONNECTIVITY GIVETH AND TAKETH AWAY: RECONCILING BEING
AN “ALWAYS-ON” EMPOWERED CONSUMER AND PRIVACY IN AN ERA OF
PERVASIVE PERSONAL DATA EXCHANGES. (Doctoral Dissertation). Case Western Reserve University School of Graduate Studies. Retrieved from http://rave.ohiolink.edu/etdc/view?acc_num=case1554468526463455
Chicago Manual of Style (16th Edition):
Iucolano, Donna M. “HYPERCONNECTIVITY GIVETH AND TAKETH AWAY: RECONCILING BEING
AN “ALWAYS-ON” EMPOWERED CONSUMER AND PRIVACY IN AN ERA OF
PERVASIVE PERSONAL DATA EXCHANGES.” 2019. Doctoral Dissertation, Case Western Reserve University School of Graduate Studies. Accessed January 25, 2021.
http://rave.ohiolink.edu/etdc/view?acc_num=case1554468526463455.
MLA Handbook (7th Edition):
Iucolano, Donna M. “HYPERCONNECTIVITY GIVETH AND TAKETH AWAY: RECONCILING BEING
AN “ALWAYS-ON” EMPOWERED CONSUMER AND PRIVACY IN AN ERA OF
PERVASIVE PERSONAL DATA EXCHANGES.” 2019. Web. 25 Jan 2021.
Vancouver:
Iucolano DM. HYPERCONNECTIVITY GIVETH AND TAKETH AWAY: RECONCILING BEING
AN “ALWAYS-ON” EMPOWERED CONSUMER AND PRIVACY IN AN ERA OF
PERVASIVE PERSONAL DATA EXCHANGES. [Internet] [Doctoral dissertation]. Case Western Reserve University School of Graduate Studies; 2019. [cited 2021 Jan 25].
Available from: http://rave.ohiolink.edu/etdc/view?acc_num=case1554468526463455.
Council of Science Editors:
Iucolano DM. HYPERCONNECTIVITY GIVETH AND TAKETH AWAY: RECONCILING BEING
AN “ALWAYS-ON” EMPOWERED CONSUMER AND PRIVACY IN AN ERA OF
PERVASIVE PERSONAL DATA EXCHANGES. [Doctoral Dissertation]. Case Western Reserve University School of Graduate Studies; 2019. Available from: http://rave.ohiolink.edu/etdc/view?acc_num=case1554468526463455
.