PL EN


Preferencje help
Widoczny [Schowaj] Abstrakt
Liczba wyników
Tytuł artykułu

Protection of one’s own personal data – conceptualisation and measurement

Autorzy
Treść / Zawartość
Identyfikatory
Warianty tytułu
Języki publikacji
EN
Abstrakty
EN
The main objective of the article is to conceptualise and operationalise a variable relating to a set of actions in all fields of human activity that reduce the risk of unauthorised use of personal data. In contrast to the approach focusing exclusively on technical ways of securing data, the proposed construct refers to a general reasonable caution in the disposal of one’s own personal data excluding technical aspects. Commitment to protecting one’s own personal data was operationalised using the author’s validated index. The high reliability coefficient (Cronbach’s alpha = 0.85) predisposes the developed tool for use in research on personal data security. In addition, a factor analysis was carried out in the article, allowing a rejection of the hypothesis that the variable in question has at least two independent dimensions, each of which includes activities carried out in the real or virtual world.
Rocznik
Strony
165--179
Opis fizyczny
Bibliogr. 30 poz., tab.
Twórcy
  • Faculty of Security and Legal Sciences, Police Academy in Szczytno, Poland
Bibliografia
  • 1. Addae, J.H., Brown, M., Sun, X., Towey, D., Radenkovic, M., (2017). Measuring attitude towards personal data for adaptive cybersecurity. Information Computer Security, No. 25(5), pp. 560–579. https://doi.org/10.1108/ICS-11-2016-0085
  • 2. Aronson, E., Wilson, T.D., Akert, R.M., (1997). Psychologia społeczna. Serce i umysł. Poznań (1st edition).
  • 3. Babbie, E.R., (2008). Podstawy badań społecznych. Warsaw: PWN.
  • 4. Buchanan, T., Paine, C., Joinson, A.N., Reips, U.D., (2007). Development of measures of online privacy concern and protection for use on the Internet. Journal of the American Society for Information Science and Technology, No. 58(2), pp. 157–165. https://doi.org/10.1002/asi.20459
  • 5. Dhamija, R., Tygar, J.D., Hearst, M., (2006). Why phishing works. Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pp. 581–590. https://doi.org/10.1145/1124772.1124861
  • 6. Ferguson, G.A., Takane, Y., (2003). Analiza statystyczna w psychologii i pedagogice (3rd edition). Warsaw: PWN.
  • 7. Frankfort-Nachmias, C., Nachmias, D., (2001). Metody badawcze w naukach społecznych. Poznan: Zysk i S-ka.
  • 8. Frauenstein, E.D., Flowerday, S., (2020). Susceptibility to phishing on social network sites: A personality information processing model. Computers & Security, No. 94, 101862. https://doi.org/10.1016/j.cose.2020.101862
  • 9. Gerber, N., Gerber, P., Volkamer M., (2018). Explaining the privacy paradox: A systematic review of literature investigating privacy attitude and behavior. Computers & Security, No. 77, pp. 226–261. https://doi.org/10.1016/j.cose.2018.04.002
  • 10. Hornowska, E., (2005). Testy psychologiczne: Teoria i praktyka. Warsaw: Scholar.
  • 11. Huang, D.-L., Rau, P-L., Salvendy, G., (2010). Perception of information security. Behaviour & Information Technology, No. 29(3), pp. 221–232. https://doi.org/10.1080/01449290701679361
  • 12. Jagatic, T.N., Johnson, N.A., Jakobsson, M., Menczer F., (2007). Social phishing. Communications of the ACM, No. 50(10), pp. 94–100. https://doi.org/10.1145/1290958.1290968
  • 13. Jansson, K., von Solms, R., (2013). Phishing for phishing awareness. Behaviour & Information Technology, No. 32(6), pp. 584–593. https://doi.org/10.1080/0144929X.2011.632650
  • 14. Kokolakis, S., (2017). Privacy attitudes and privacy behaviour: A review of current research on the privacy paradox phenomenon. Computers & Security, No. 64, pp. 122–134. https://doi.org/10.1016/j.cose.2015.07.002
  • 15. Mäihäniemi, B., (2022). The role of behavioural economics in shaping remedies for facebook’s excessive data gathering. Computer Law & Security Review, No. 46, 105709. https://doi.org/10.1016/j.clsr.2022.105709
  • 16. Malandrino, D., Scarano, V., Spinelli, R., (2013). How Increased Awareness Can Impact Attitudes and Behaviors toward Online Privacy Protection. International Conference on Social Computing, pp. 57–62. https://doi.org/10.1109/SocialCom.2013.15
  • 17. Malhotra, N.K., Kim, S.S., Agarwal, J., (2004). Internet Users’ Information Privacy Concerns (IUIPC): The Construct, the Scale, and a Causal Model. Information Systems Research, No. 15(4), pp. 336–355. https://doi.org/10.1287/isre.1040.0032
  • 18. Mamonov, S., Benbunan-Fich, R., (2018). The impact of information security threat awareness on privacy-protective behaviors. Computers in Human Behavior, No. 83, pp. 32–44. https://doi.org/10.1016/j.chb.2018.01.028
  • 19. Mordwa, S., (2013). Przestępczość i poczucie bezpieczeństwa w przestrzeni miasta. Przykład Łodzi. Lodz: Lodz University of Technology.
  • 20. Ng, B.-Y., Kankanhalli, A., Xu, Y., (Calvin).(2009). Studying users’ computer security behavior: A health belief perspective. Decision Support Systems, No. 46(4), pp. 815–825. https://doi.org/10.1016/j.dss.2008.11.010
  • 21. Niemierko, B., (2009). Diagnostyka edukacyjna. Warsaw: PWN.
  • 22. Norberg, P.A., Horne, D.R., Horne, D.A., (2007). The Privacy Paradox: Personal Information Disclosure Intentions versus Behaviors. Journal of Consumer Affairs, No. 41(1), pp. 100–126. https://doi.org/10.1111/j.1745-6606.2006.00070.x
  • 23. Öğütçü, G., Testik, Ö.M., Chouseinoglou, O., (2016). Analysis of personal information security behavior and awareness. Computers & Security, No. 56, pp. 83–93. https://doi.org/10.1016/j.cose.2015.10.002
  • 24. Płocki, R., (2021). Badanie poczucia bezpieczeństwa – wybrane problemy. In: Krzewniak, D. (ed.), Praktyczny wymiar bezpieczeństwa. Siedlce: UPH.
  • 25. Robertson, V.H.S.E., (2020). Excessive data collection: Privacy considerations and abuse of dominance in the era of big data. Common Market Law Review, No. 57, Issue 1, pp. 161–190. https://doi.org/10.54648/COLA2020006
  • 26. Smith, H.J., Milberg, S.J., Burke, S.J., (1996). Information Privacy: Measuring individuals’ concerns about organizational practices. MIS Quarterly, No. 20(2), pp. 167–196. 27. Stanisz, A., (2007). Przystępny kurs statystyki z zastosowaniem STATISTICA PL na przykładach z medycyny. Analizy Wielowymiarowe, Vol. 3.
  • 28. Thurstone, L.L., (1931). Multiple factor analysis. Psychological Review, No. 38(5), pp. 406–427. https://doi.org/10.1037/h0069792
  • 29. Witt, A.C., (2021). Excessive Data Collection as a Form of Anticompetitive Conduct: The German Facebook Case. The Antitrust Bulletin, No. 66(2), pp. 276–307. https://doi.org/10.1177/0003603X21997028
  • 30. Zakrzewska, M., (1994). Analiza czynnikowa w budowaniu i sprawdzaniu modeli psychologicznych. Poznan: UAM.
Uwagi
Opracowanie rekordu ze środków MNiSW, umowa nr POPUL/SP/0154/2024/02 w ramach programu "Społeczna odpowiedzialność nauki II" - moduł: Popularyzacja nauki (2025).
Typ dokumentu
Bibliografia
Identyfikator YADDA
bwmeta1.element.baztech-8d500433-89c5-4818-839f-3696c66518b5
JavaScript jest wyłączony w Twojej przeglądarce internetowej. Włącz go, a następnie odśwież stronę, aby móc w pełni z niej korzystać.