Information security and its impact on online user behaviour

open research questions in social media business model

Hemamali Tennakoon, Jean-Noel Ezingeard, Vladlena Benson

Research output: Contribution to conferencePoster

Abstract

Steady growth of e-business and reliance on technology have lead to corporate and personal information becoming valuable assets (eg Gordon et al., 2010). However just as any other assets, protecting information has also become a cause of concern. Information security breaches are on the rise while e-business and individual online users are subject to losses and other negative impacts of the Internet threats (eg Smith et al., 2010; Campbell et al., 2003; Cavusoglu et al., 2004). The focus of this paper is to provide an overview of current research on information security constructs, factors affecting online behaviour and formation of trust in online transactions. Some open questions forming a gap in extant research conclude the paper and call for further empirical evidence. Based on an extensive literature review, as well as using secondary sources of trade publications and news reports, key concepts of information security has been identified. The deductive approach will be used where based on theory, hypotheses can be built. These can then be tested based on observations to confirm their validity. Further empirical data collection methods will be developed and employed (both qualitative and quantitative in nature) at a later stage of the study.
Original languageEnglish
Number of pages1
Publication statusPublished - 10 May 2011

Fingerprint

Information security
Social media
Business model
User behavior
Electronic business
Assets
Empirical data
Factors
Breach
Threat
Personal information
Data collection
Literature review
News
Empirical evidence
World Wide Web

Cite this

Information security and its impact on online user behaviour : open research questions in social media business model. / Tennakoon, Hemamali; Ezingeard, Jean-Noel; Benson, Vladlena.

2011.

Research output: Contribution to conferencePoster

@conference{38cd5fd2a37e4f168de19e30cfa15f4b,
title = "Information security and its impact on online user behaviour: open research questions in social media business model",
abstract = "Steady growth of e-business and reliance on technology have lead to corporate and personal information becoming valuable assets (eg Gordon et al., 2010). However just as any other assets, protecting information has also become a cause of concern. Information security breaches are on the rise while e-business and individual online users are subject to losses and other negative impacts of the Internet threats (eg Smith et al., 2010; Campbell et al., 2003; Cavusoglu et al., 2004). The focus of this paper is to provide an overview of current research on information security constructs, factors affecting online behaviour and formation of trust in online transactions. Some open questions forming a gap in extant research conclude the paper and call for further empirical evidence. Based on an extensive literature review, as well as using secondary sources of trade publications and news reports, key concepts of information security has been identified. The deductive approach will be used where based on theory, hypotheses can be built. These can then be tested based on observations to confirm their validity. Further empirical data collection methods will be developed and employed (both qualitative and quantitative in nature) at a later stage of the study.",
author = "Hemamali Tennakoon and Jean-Noel Ezingeard and Vladlena Benson",
year = "2011",
month = "5",
day = "10",
language = "English",

}

TY - CONF

T1 - Information security and its impact on online user behaviour

T2 - open research questions in social media business model

AU - Tennakoon, Hemamali

AU - Ezingeard, Jean-Noel

AU - Benson, Vladlena

PY - 2011/5/10

Y1 - 2011/5/10

N2 - Steady growth of e-business and reliance on technology have lead to corporate and personal information becoming valuable assets (eg Gordon et al., 2010). However just as any other assets, protecting information has also become a cause of concern. Information security breaches are on the rise while e-business and individual online users are subject to losses and other negative impacts of the Internet threats (eg Smith et al., 2010; Campbell et al., 2003; Cavusoglu et al., 2004). The focus of this paper is to provide an overview of current research on information security constructs, factors affecting online behaviour and formation of trust in online transactions. Some open questions forming a gap in extant research conclude the paper and call for further empirical evidence. Based on an extensive literature review, as well as using secondary sources of trade publications and news reports, key concepts of information security has been identified. The deductive approach will be used where based on theory, hypotheses can be built. These can then be tested based on observations to confirm their validity. Further empirical data collection methods will be developed and employed (both qualitative and quantitative in nature) at a later stage of the study.

AB - Steady growth of e-business and reliance on technology have lead to corporate and personal information becoming valuable assets (eg Gordon et al., 2010). However just as any other assets, protecting information has also become a cause of concern. Information security breaches are on the rise while e-business and individual online users are subject to losses and other negative impacts of the Internet threats (eg Smith et al., 2010; Campbell et al., 2003; Cavusoglu et al., 2004). The focus of this paper is to provide an overview of current research on information security constructs, factors affecting online behaviour and formation of trust in online transactions. Some open questions forming a gap in extant research conclude the paper and call for further empirical evidence. Based on an extensive literature review, as well as using secondary sources of trade publications and news reports, key concepts of information security has been identified. The deductive approach will be used where based on theory, hypotheses can be built. These can then be tested based on observations to confirm their validity. Further empirical data collection methods will be developed and employed (both qualitative and quantitative in nature) at a later stage of the study.

M3 - Poster

ER -