The Dark Side of Information Technology Use

Permanent URI for this collection


Recent Submissions

Now showing 1 - 9 of 9
  • Item
    The Impact of Threat and Efficacy on Information Security Behavior: Applying an Extended Parallel Process Model to the Fear of Ransomware.
    ( 2021-01-05) Masuch, Kristin ; Hengstler, Sebastian ; Schulze, Laura ; Trang, Simon
    Information security has become an increasingly important aspect in companies and households during this time of digitalization. Cyber attacks and especially ransomware attacks are a growing threat. How people react to and perceive this threat is a central component of this study. This paper is meant to investigate how threat and efficacy influence individuals’ information security behavior. For this purpose, a structural equation model was developed using the Extended Parallel Process Model (EPPM). The results show that participants who received a low threat message in their ransom demand were less afraid and more likely to deal with the issue. At the same time, they were not as confident as people who perceived a significant threat. Participants who felt that they had little adequate protection against ransomware were more fearful and therefore dealt with the topic more defensively. Conversely, they also had the intention to behave safely.
  • Item
    Social Media Addiction: A Systematic Review through Cognitive-Behavior Model of Pathological Use
    ( 2021-01-05) Ahmed, Eiman ; Vaghefi, Isaac
    The proliferation of social media platforms such as Facebook, Twitter, and Instagram have revolutionized the way people communicate, consume, and share information. As a result, social media addiction, a type of behavioral addiction related to the compulsive use of social media and associated with adverse outcomes, has been discussed by scholars and practitioners alike. Despite the abundance of research published on social media addiction, this literature is fragmented, and there is no synthesis of the drivers and outcomes of this behavior. In this study, we use the cognitive-behavioral model of pathological use and conduct a systematic review of social media addiction literature from 2008-2019. Based on the review of 132 papers, we propose a framework that integrates prior findings. Our review reveals several avenues for future research on this increasingly prominent research topic.
  • Item
    Review of Research on Privacy Decision Making from a Time Perspective
    ( 2021-01-05) Jiang, Zhuoran ; Jarvenpaa, Sirkka
    Managing privacy is a process in which people continuously negotiate the boundaries of their personal space. Time is embedded in and influences this continuous negotiation. Digital technologies increasingly incorporate temporal elements, such as allowing users to define the expiration date of social network postings. Yet, researchers have not systematically examined the effects of temporal elements in privacy decision making. In this paper, we review how existing information privacy research has related to time in terms of three dimensions: duration, timing, and past, present, and future modalities. Our findings suggest that 1) duration has a negative influence on information disclosure; 2) timing, in the form of personal and external events, influences how people make privacy decisions; and 3) sensemaking that involves prior experience and planning for the future affect privacy decisions. We discuss how privacy decision making frameworks need to be adjusted to account for a time perspective.
  • Item
    Privacy in a Digitized Workplace: Towards an Understanding of Employee Privacy Concerns
    ( 2021-01-05) Teebken, Mena ; Hess, Thomas
    When employees are required to work remotely, the digitization of the workplace becomes imperative to organizations. The introduction of digital workplaces leads to challenges and potentially negative consequences for employee privacy. Research did not yet shed light on the issue of employee privacy concerns. Therefore, the goal of this study is to evaluate the concept of privacy concerns in the context of the digitized workplace. Within the scope of this study, we conducted 33 semi-structured interviews with employees in order to gain insights into their Workplace Privacy Concerns (WPCs). Based on an iterative thematic analysis approach, we identified eight dimensions of WPCs: Six of these dimensions are adapted from the consumer context, two further dimensions represent concerns exclusive to the workplace context. This study serves as a starting point towards an understanding of WPCs and future research on the digitized workplace.
  • Item
    Modeling the C(o)urse of Privacy-critical Location-based Services – Exposing Dark Side Archetypes of Location Tracking
    ( 2021-01-05) Burmeister, Fabian ; Drews, Paul ; Schirmer, Ingrid
    With the ubiquitous use of mobile devices, location-based services (LBS) have rapidly pervaded daily life. By providing context- and location-specific information, LBS enable a myriad of opportunities for individuals and organizations. However, the manifold advantages come along with a radical increase in location privacy concerns and non-transparent data flows between the various actors involved. While research often focuses on protecting the dyadic relation between the user and LBS provider, the entirety of dark sides constituting privacy violations remains hidden. In this paper, we follow the paradigm of architectural thinking to shed light on the diverse dark sides emerging in today’s LBS. By drawing on a multiple case study and developing a notation for architectural maps that help understand LBS from a socio-technical and privacy-oriented perspective, we reveal six dark side archetypes of LBS.
  • Item
    Computing and Social Welfare: Minimizing the Societal Harm From Digital Transfor-mation While Preserving the Benefits of Innovation
    ( 2021-01-05) Clemons, Eric ; Waran, Ravi V. ; Li , Victoria ; Hermes, Sebastian ; Schreieck, Maximilian
    Social Welfare Computing is an emerging discipline that seeks to direct technology to cause minimum social disruption, and in particular seeks to minimize the harm caused directly by technology. This is markedly different from the better understood strategic use of technology to create value or to address existing social needs. Innovative technologies that are widely adopted created significant value for their users; otherwise they would not be widely adopted. Often the companies that create them obtain new sources of wealth and power, which inevitably lead to new abuses of power and new forms of societal disruption. Societal disruption in turn requires social adaptation, including new regulations to influence the behavior of firms and to define and to protect the rights of an individual in the changed society. Social Welfare Computing seeks to guide social adaptation, combining insights from disciplines as varied as anthropology, business strategy, economics, strategic planning, and law.
  • Item
    A Cautionary Tale: How Co-Constructed Work Obligations Lead to ICT-Related Technostress
    ( 2021-01-05) Stana, Raluca ; Nicolajsen, Hanne Westh
    Technostress is a growing area of research and a concern for practitioners. So far, IS research on technostress has focused on either neurophysiological or psychological measurements. We argue for a sociological approach that allows us to reveal the socially co-created obligations around using ICTs (information and communication technologies). We ask, "What can the sociological analytical concept of obligation reveal about ICT related technostress in organizations?" To investigate this question, we use the sociological concept of obligation. We conduct interpretative research based on qualitative interviews. We find that employees see technostress as their individual obligation and devise strategies to avoid it. These strategies add to their technostress and augment group obligations that can lead to technostress for the collective. We contribute to theory by employing a new-to-IS theory and a qualitative approach to investigate technostress. We also contribute to practice by revealing specific obligations that contribute to technostress.
  • Item
    A Bibliometric Review of Technostress: Historical Roots, Evolution and Central Publications of a Growing Research Field
    ( 2021-01-05) Grummeck-Braamt, Julius-Viktor ; Nastjuk, Ilja ; Najmaei, Arash ; Adam, Marc
    While previous research has provided critical insights into the different perspectives, methods, and theories on technostress, there is currently no bibliometric review available that clarifies the evolution and structure of the field. We use three bibliometric methods to assess the body of 252 technostress publications until 2019: reference publication year spectroscopy, co-word analysis, and co-citation analysis. In doing so, we analyze how the technostress field has evolved over time, clarify the interconnected concepts forming the discourse and identify the most influential works.
  • Item
    Introduction to the Minitrack on The Dark Side of Information Technology Use
    ( 2021-01-05) Turel, Ofir ; Vaghefi, Isaac ; Qahri-Saremi, Hamed