The Dark Side of Information Technology Use

Permanent URI for this collection


Recent Submissions

Now showing 1 - 5 of 9
  • Item
    The Impact of Threat and Efficacy on Information Security Behavior: Applying an Extended Parallel Process Model to the Fear of Ransomware.
    ( 2021-01-05) Masuch, Kristin ; Hengstler, Sebastian ; Schulze, Laura ; Trang, Simon
    Information security has become an increasingly important aspect in companies and households during this time of digitalization. Cyber attacks and especially ransomware attacks are a growing threat. How people react to and perceive this threat is a central component of this study. This paper is meant to investigate how threat and efficacy influence individuals’ information security behavior. For this purpose, a structural equation model was developed using the Extended Parallel Process Model (EPPM). The results show that participants who received a low threat message in their ransom demand were less afraid and more likely to deal with the issue. At the same time, they were not as confident as people who perceived a significant threat. Participants who felt that they had little adequate protection against ransomware were more fearful and therefore dealt with the topic more defensively. Conversely, they also had the intention to behave safely.
  • Item
    Social Media Addiction: A Systematic Review through Cognitive-Behavior Model of Pathological Use
    ( 2021-01-05) Ahmed, Eiman ; Vaghefi, Isaac
    The proliferation of social media platforms such as Facebook, Twitter, and Instagram have revolutionized the way people communicate, consume, and share information. As a result, social media addiction, a type of behavioral addiction related to the compulsive use of social media and associated with adverse outcomes, has been discussed by scholars and practitioners alike. Despite the abundance of research published on social media addiction, this literature is fragmented, and there is no synthesis of the drivers and outcomes of this behavior. In this study, we use the cognitive-behavioral model of pathological use and conduct a systematic review of social media addiction literature from 2008-2019. Based on the review of 132 papers, we propose a framework that integrates prior findings. Our review reveals several avenues for future research on this increasingly prominent research topic.
  • Item
    Review of Research on Privacy Decision Making from a Time Perspective
    ( 2021-01-05) Jiang, Zhuoran ; Jarvenpaa, Sirkka
    Managing privacy is a process in which people continuously negotiate the boundaries of their personal space. Time is embedded in and influences this continuous negotiation. Digital technologies increasingly incorporate temporal elements, such as allowing users to define the expiration date of social network postings. Yet, researchers have not systematically examined the effects of temporal elements in privacy decision making. In this paper, we review how existing information privacy research has related to time in terms of three dimensions: duration, timing, and past, present, and future modalities. Our findings suggest that 1) duration has a negative influence on information disclosure; 2) timing, in the form of personal and external events, influences how people make privacy decisions; and 3) sensemaking that involves prior experience and planning for the future affect privacy decisions. We discuss how privacy decision making frameworks need to be adjusted to account for a time perspective.
  • Item
    Privacy in a Digitized Workplace: Towards an Understanding of Employee Privacy Concerns
    ( 2021-01-05) Teebken, Mena ; Hess, Thomas
    When employees are required to work remotely, the digitization of the workplace becomes imperative to organizations. The introduction of digital workplaces leads to challenges and potentially negative consequences for employee privacy. Research did not yet shed light on the issue of employee privacy concerns. Therefore, the goal of this study is to evaluate the concept of privacy concerns in the context of the digitized workplace. Within the scope of this study, we conducted 33 semi-structured interviews with employees in order to gain insights into their Workplace Privacy Concerns (WPCs). Based on an iterative thematic analysis approach, we identified eight dimensions of WPCs: Six of these dimensions are adapted from the consumer context, two further dimensions represent concerns exclusive to the workplace context. This study serves as a starting point towards an understanding of WPCs and future research on the digitized workplace.
  • Item
    Modeling the C(o)urse of Privacy-critical Location-based Services – Exposing Dark Side Archetypes of Location Tracking
    ( 2021-01-05) Burmeister, Fabian ; Drews, Paul ; Schirmer, Ingrid
    With the ubiquitous use of mobile devices, location-based services (LBS) have rapidly pervaded daily life. By providing context- and location-specific information, LBS enable a myriad of opportunities for individuals and organizations. However, the manifold advantages come along with a radical increase in location privacy concerns and non-transparent data flows between the various actors involved. While research often focuses on protecting the dyadic relation between the user and LBS provider, the entirety of dark sides constituting privacy violations remains hidden. In this paper, we follow the paradigm of architectural thinking to shed light on the diverse dark sides emerging in today’s LBS. By drawing on a multiple case study and developing a notation for architectural maps that help understand LBS from a socio-technical and privacy-oriented perspective, we reveal six dark side archetypes of LBS.