Purpose: This paper presents an initial development of a Personal Data Attitude (PDA) measurement instrument based on established psychometric principles. The aim of the research was to develop a reliable measurement scale for quantifying and comparing attitudes towards personal data that can be incorporated into cybersecurity behavioral research models. Such a scale has become necessary for understanding individuals’ attitudes towards specific sets of data as more technologies are being designed to harvest, collate, share and analyze personal data. Design/methodology/approach: An initial set of 34 five-point Likert style items were developed with 8 sub-scales and administered to participants online. The data collected were subjected to ...
Privacy has been identified as a key issue in a variety of domains, including electronic commerce an...
With society now heavily invested in cyber-technology and most cyber-attacks due to human error, it ...
This paper reports on a three-part investigation into people’s perceptions of cybersecurity, based o...
© Emerald Publishing Limited. Purpose - This paper presents an initial development of a personal dat...
As organizations have become more reliant on computers and technology to operate in a globalized wor...
This paper reports on a mixed-method research project that examined the attitudes of computer users ...
As the use of different applications and platforms has increased together with the use of Internet-c...
There has been a general consensus in the computer security research community that the usability of...
With the prevalence and significance of cybercrimes increasing, cybersecurity has become one of the ...
With the rapid development of information and communication technologies (ICT), many organizations e...
Over the last few years, digitalisation has accelerated its pace, fuelling the creation of a massive...
While individual differences in decision-making have been examined within the social sciences for se...
Rapid digitalisation has resulted in a massive exchange of digital data between individuals and orga...
To explain, at least partially, what influences attitude of systems end users regarding protection o...
As the Internet grows in importance, concerns about online privacy have arisen. The authors describe...
Privacy has been identified as a key issue in a variety of domains, including electronic commerce an...
With society now heavily invested in cyber-technology and most cyber-attacks due to human error, it ...
This paper reports on a three-part investigation into people’s perceptions of cybersecurity, based o...
© Emerald Publishing Limited. Purpose - This paper presents an initial development of a personal dat...
As organizations have become more reliant on computers and technology to operate in a globalized wor...
This paper reports on a mixed-method research project that examined the attitudes of computer users ...
As the use of different applications and platforms has increased together with the use of Internet-c...
There has been a general consensus in the computer security research community that the usability of...
With the prevalence and significance of cybercrimes increasing, cybersecurity has become one of the ...
With the rapid development of information and communication technologies (ICT), many organizations e...
Over the last few years, digitalisation has accelerated its pace, fuelling the creation of a massive...
While individual differences in decision-making have been examined within the social sciences for se...
Rapid digitalisation has resulted in a massive exchange of digital data between individuals and orga...
To explain, at least partially, what influences attitude of systems end users regarding protection o...
As the Internet grows in importance, concerns about online privacy have arisen. The authors describe...
Privacy has been identified as a key issue in a variety of domains, including electronic commerce an...
With society now heavily invested in cyber-technology and most cyber-attacks due to human error, it ...
This paper reports on a three-part investigation into people’s perceptions of cybersecurity, based o...