2021
DOI: 10.4018/joeuc.286766
|View full text |Cite
|
Sign up to set email alerts
|

Comprehension, Perception, and Projection

Abstract: Health social networks (HSNs) allow individuals with health information needs to connect and discuss health-related issues online. Political-technology intertwinement (e.g. GDPR and Digital Technology) highlights that users need to be aware, understand, and willing to provide electronic consent (eConsent) when sharing personal information online. The objective of this study is to explore the ‘As-Is’ factors which impact individuals’ decisional autonomy when consenting to the privacy policy (PP) and Terms and C… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
3

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(2 citation statements)
references
References 109 publications
0
2
0
Order By: Relevance
“…Robust data privacy and security in AI-driven financial decision-making is imperative for trust building, regulatory compliance, and ethical AI implementation (Rowan et al, 2021). Bussmann et al (2020) and Ghazwani et al (2022) have advocated for tracking and assessing security incidents as a suitable best practice that enhances data protection and effectively safeguards sensitive financial data.…”
Section: Hypotheses Developmentmentioning
confidence: 99%
“…Robust data privacy and security in AI-driven financial decision-making is imperative for trust building, regulatory compliance, and ethical AI implementation (Rowan et al, 2021). Bussmann et al (2020) and Ghazwani et al (2022) have advocated for tracking and assessing security incidents as a suitable best practice that enhances data protection and effectively safeguards sensitive financial data.…”
Section: Hypotheses Developmentmentioning
confidence: 99%
“…Most recent cyber SA research has been conducted after the research data for this case study was collected in 2021. For example Rowan et al (2021) leveraged SA approach to examine decision autonomy when individuals concerned the permission for eConsent and Renaud and Ophoff (2021) conducted a SA model to improve the implementation of Cyber security controls and precautions. Ahmad et al (2021) conducted a model that guides organisations to build a SA of cyber threats and business context emphasising the incident response approach.…”
Section: Early Workmentioning
confidence: 99%