Omotayo et al., 2023 - Google Patents
Privacy and security information awareness and disclosure of private information by users of online social media in the Ibadan metropolis, NigeriaOmotayo et al., 2023
View PDF- Document ID
- 40195241639063628
- Author
- Omotayo F
- Olayiwola J
- Publication year
- Publication venue
- The African Journal of Information Systems
External Links
Snippet
The purpose of this paper is to investigate information privacy and security awareness among online social media (OSM) users in the Ibadan metropolis, Nigeria. Building upon the social exchange theory, some factors that could influence the disclosure of private …
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
- G06F21/6263—Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Wu | The privacy paradox in the context of online social networking: A self‐identity perspective | |
Kingsford Owusu et al. | Barriers affecting effective application of anticorruption measures in infrastructure projects: Disparities between developed and developing countries | |
Khan et al. | Cyber-security and risky behaviors in a developing country context: A Pakistani perspective | |
Hu et al. | Detecting and resolving privacy conflicts for collaborative data sharing in online social networks | |
Kesan et al. | A comprehensive empirical study of data privacy, trust, and consumer autonomy | |
Renaud et al. | Cyber security responsibilization: an evaluation of the intervention approaches adopted by the Five Eyes countries and China | |
Aydın et al. | Fuzzy assessment of health information system users’ security awareness | |
Pasquale | Redescribing health privacy: the importance of information policy | |
Hossain et al. | Privacy and security concern of online social networks from user perspective | |
Suhluli et al. | Determinants of user acceptance of wearable IoT devices | |
Fisher et al. | Ethical considerations in HIV eHealth intervention research: implications for informational risk in recruitment, data maintenance, and consent procedures | |
Nthala et al. | “If it’s urgent or it is stopping me from doing something, then I might just go straight at it”: a study into Home Data Security Decisions | |
Aïmeur et al. | Data privacy: an end-user perspective | |
Mendel et al. | Social support for mobile security: Comparing close connections and community volunteers in a field experiment | |
Adu et al. | Factors influencing individuals’ personal health information privacy concerns. A study in Ghana | |
Schofield et al. | Privacy, trust, and disclosure online | |
Seng et al. | A look into user privacy andthird-party applications in Facebook | |
Omotayo et al. | Privacy and security information awareness and disclosure of private information by users of online social media in the Ibadan metropolis, Nigeria | |
Rauer | Patient Trust in Internet‐based Health Records: An Analysis Across Operator Types and Levels of Patient Involvement in Germany | |
Villareal | Factors influencing the adoption of zero-trust decentralized identity management solutions | |
Aljedaani et al. | End-users' knowledge and perception about security of mobile health apps: An empirical study | |
Gautam | Navigating the Risks of Dark Data: An Investigation into Personal Safety | |
Aeschlimann et al. | Re-setting the stage for privacy: A multi-layered privacy interaction framework and its application | |
Sipior et al. | Privacy in online social networking: Applying a privacy calculus model | |
Zhang | A cross-site study of user behavior and privacy perception in social networks |