Trust in Data Security Protocols and Knowledge of Privacy and Security Technology

被引:1
|
作者
Lyon, Gregory [1 ]
机构
[1] Georgetown Univ, McDonough Sch Business, Operations & Analy Area, Washington 20057, DC USA
关键词
Data privacy; Security; Companies; Data security; Behavioral sciences; Privacy; Surveys; BEHAVIOR; AWARENESS; BELIEFS;
D O I
10.1109/MSEC.2023.3329739
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This study examines the correspondence between trust in corporate data security and knowledge of the internal mechanisms companies use to guarantee privacy and security. The results show higher trust is associated with lower knowledge.
引用
收藏
页码:29 / 37
页数:9
相关论文
共 50 条
  • [1] Ethics of Big Data: Privacy, Security and Trust
    Yarali, Abdulrahman
    Joyce, Randall
    Dixon, Brandon
    2020 WIRELESS TELECOMMUNICATIONS SYMPOSIUM (WTS), 2020,
  • [2] The Effect of Providing Visualizations in Privacy Policies on Trust in Data Privacy and Security
    Becker, Joerg
    Heddier, Marcel
    Oeksuez, Ayten
    Knackstedt, Ralf
    2014 47TH HAWAII INTERNATIONAL CONFERENCE ON SYSTEM SCIENCES (HICSS), 2014, : 3224 - 3233
  • [3] Datalog for Security, Privacy and Trust
    Bonatti, Piero A.
    DATALOG RELOADED: FIRST INTERNATIONALWORKSHOP, DATALOG 2010, 2011, 6702 : 21 - 36
  • [4] A survey of blockchain technology on security, privacy, and trust in crowdsourcing services
    Ma, Ying
    Sun, Yu
    Lei, Yunjie
    Qin, Nan
    Lu, Junwen
    WORLD WIDE WEB-INTERNET AND WEB INFORMATION SYSTEMS, 2020, 23 (01): : 393 - 419
  • [5] A survey of blockchain technology on security, privacy, and trust in crowdsourcing services
    Ying Ma
    Yu Sun
    Yunjie Lei
    Nan Qin
    Junwen Lu
    World Wide Web, 2020, 23 : 393 - 419
  • [6] A security architecture for data privacy and security
    Weaver, Alfred C.
    ETFA 2005: 10TH IEEE INTERNATIONAL CONFERENCE ON EMERGING TECHNOLOGIES AND FACTORY AUTOMATION, VOL 1, PTS 1 AND 2, PROCEEDINGS, 2005, : 673 - 676
  • [7] Risk Assessment for Big Data in Cloud: Security, Privacy and Trust
    Ali, Hazirah Bee Bt Yusof
    Abdullah, Lili Marziana Bt
    Kartiwi, Mira
    Nordin, Azlin
    PROCEEDINGS OF 2018 ARTIFICIAL INTELLIGENCE AND CLOUD COMPUTING CONFERENCE (AICCC 2018), 2018, : 63 - 67
  • [8] Local Technology to Enhance Data Privacy and Security in Educational Technology
    Amo, Daniel
    Prinsloo, Paul
    Alier, Marc
    Fonseca, David
    Torres Kompen, Ricardo
    Canaleta, Xavier
    Herrero-Martin, Javier
    INTERNATIONAL JOURNAL OF INTERACTIVE MULTIMEDIA AND ARTIFICIAL INTELLIGENCE, 2021, 7 (02): : 262 - 273
  • [9] Differential Privacy by Typing in Security Protocols
    Eigner, Fabienne
    Maffei, Matteo
    2013 IEEE 26TH COMPUTER SECURITY FOUNDATIONS SYMPOSIUM (CSF), 2013, : 272 - 286
  • [10] Gaining Trust by Tracing Security Protocols
    Fredlund, Lars-Ake
    Benac Earle, Clara
    Arts, Thomas
    Svensson, Hans
    ERLANG '19: PROCEEDINGS OF THE 18TH ACM SIGPLAN INTERNATIONAL WORKSHOP ON ERLANG, 2019, : 56 - 67