2,543
Views
5
CrossRef citations to date
0
Altmetric
OPERATIONS, INFORMATION & TECHNOLOGY

Sentiments and perceptions after a privacy breach incident

, &
Article: 2050018 | Received 13 Sep 2019, Accepted 13 Feb 2022, Published online: 21 Mar 2022

References

  • Acquisiti, A., & Gross, R. (2006). Imagined communities: Awareness, information sharing, and privacy on the Facebook. Proceedings of the International Workshop on Privacy Enhancing Technologies Germany, 36–12.
  • Bellman, S., Johnson, E., Kobrin, S. K., & Lohse, G. L. (2004). Internationla differences in information privacy concerns: A global survey of consumers. The Information Society, 20(5), 313–324. https://doi.org/10.1080/01972240490507956
  • Burgess, M. (2021). Ignore China’s new privacy law at your peril, WIRED, Retrieved May 11, 2021, from https://www.wired.com/story/china-personal-data-law-pipl/
  • Chen, Z. T., & Cheung, M. (2018). Privacy perception and protection on Chinese social media: A case study of WeChat. Ethics Information Technology, 20(4), 279–289. https://doi.org/10.1007/s10676-018-9480-6
  • Choi, H., Park, J., & Jung, Y. (2018). The role of privacy fatigue in online privacy behavior. Computers in Human Behavior, 81(1), 42–51. https://doi.org/10.1016/j.chb.2017.12.001
  • Debatin, B., Lovejoy, J. P., Horn, A., & Hughes, B. N. (2009). Facebook and online privacy: Attitudes, behaviors, and unintended consequences. Journal of Computer-Mediated Communication, 15(1), 83–108. https://doi.org/10.1111/j.1083-6101.2009.01494.x
  • DeGennaro, T. (2020). The top ten most popular social media websites in China, Dragon Social, https://www.dragonsocial.net/blog/social-media-in-china/
  • Dhaoui, C., Webster, C., Tan, L. P., Norberg, P., & Fortin, D. (2017). Social media sentiment analysis: Lexicon versus machine learning. Journal of Consumer Marketing, 34(6), 480–488. https://doi.org/10.1108/JCM-03-2017-2141
  • Dinev, T., & Hart, P. (2006). An extended privacy calculus model for e-commerce transactions. Information Systems Research, 17(1), 61–80. https://doi.org/10.1287/isre.1060.0080
  • Edwards, D., Cheng, M., Wong, I. A., Zhang, J., & Wu, Q. (2017). Ambassadors of knowledge sharing: Co-produced travel information through tourist-local social media exchange. International Journal of Contemporary Hospitality Management, 29(2), 690–708. https://doi.org/10.1108/IJCHM-10-2015-0607
  • Fiesler, C., & Hallinan, B. (2018). “We are the product”: Public reactions to online data sharing and privacy controversies in the Media, Proceedings of the 2018 Human Factors Conference in Computing Systems, https://dl.acm.org/doi/10 .1145/3173574.3173627
  • Gellman, R., & Dixon, P. (2011). Online privacy: A reference handbook. ABC Clio.
  • Hinds, J., Williams, E. J., & Joinson, A. N. (2020). It wouldn’t happen to me”: Privacy concerns and perspectives following Cambridge Analytica scandal. International Journal of Human-Computer Studies, 143(4), 1–13. https://doi.org/10.1016/j.ijhcs.2020.102498
  • Isaak, J., & Hanna, M. J. (2018). User data privacy: Facebook, Cambridge Analytica, and privacy protection. Computer, 51(8), 56–59. https://doi.org/10.1109/MC.2018.3191268
  • Kennedy, G., & Zhang, X. (2017). China passes cybersecurity law. Intellectual Property & Technology Law Journal, 29(3), 20–21.
  • Kong, L. (2007). Online privacy in China: A survey on information practices of Chinese websites. Chinese Journal of International Law, 6(1), 157–183. https://doi.org/10.1093/chinesejil/jml061
  • Labrie, R., Steinke, G. H., Li, X., & Cazier, J. A. (2018). Big data analytics sentiment: US-China reaction to data collection by business and government. Technological Forecasting and Social Change, 130(1), 45–55. https://doi.org/10.1016/j.techfore.2017.06.029
  • Lee, T. H., Sung, W. K., & Kim, H. W. (2016). A text mining approach to the analysis of information security awareness: Korea, United States, and China. Proceedings of the 20th Pacific Asia Conference on Information Systems, PACIS 2016 Taiwan (Association of Information Systems).
  • Loukides, G., & Gkoulalas-Divanis, A. (2009). Privacy challenges and solutions in the social web. XRDS: Crossroads, the ACM Magazine for Students, 16(2), 14–18. https://doi.org/10.1145/1665997.1666002
  • Ma, Y. (2021). Number of online shoppers in China 2009–2020, Statista Retrieved September 21, 2021, Statista https://www.statista.com/statistics/277391/number-of-online-buyers-in-china/
  • McCoy, K. (2017). Target to pay $18.5M for 2013 data breach that affected 41 million consumer, USA Today, 23 May. https://www.usatoday.com/story/money/2017/05/23/target-pay-185m-2013-data-breach-affected-consumers/102063932/
  • Min, K., Ma, C., Zhao, T., & Li, H. (2015). BosonNLP: An ensemble approach for word segmentation and POS tagging Li, J., Ji, H., Zhao, D., Feng, J. In Natural language processing and chinese computing (pp. 520–526). Springer.
  • Nakamura, T., Tesfay, W. B., Kiyomoto, S., & Serna, J. (2017). Default privacy setting prediction by grouping user’s attributes and settings preferences Garcia-Alfaro, J., et al., . In Data privacy management, cryptocurrencies and blockchain technology (pp. 107–123). Springer, Cham.
  • Ortiz-Ospina, E. (2019). The rise of social media, Our World in Data, Sep 2019: https://ourworldindata.org/rise-of-social-media
  • Schneble, C. O., Elger, B. S., & Shaw, D. (2018). The Cambridge Analytica affair and Internet-mediated research. EMBO Reports. http://embor.embopress.org/content/early/2018/07/02/embr.201846579.
  • Shen, X. (2018). Chinese internet users criticize Baidu CEO for saying people in China are willing to give up data privacy for convenience, South China Morning Post, https://www.scmp.com/abacus/tech/article/3028402/chinese-internet-users-criticize-baidu-ceo-saying-people-china-are
  • Shklovski, I., Mainwaring, S. D., Skuladottir, H. H., & Borgthorsson, H. (2014). Leakiness and creepiness in app space: Perceptions of privacy and mobile app use. Proceedings of the ACM Conference on Human Factors in Computing Systems Toronto, Canada (New York: Association for Computing Machinery), 2347–2356.
  • Snelson, C. L. (2016). Qualitative and mixed methods social media research: A review of the literature. International Journal of Qualitative Methods, 15(1), 1–15. https://doi.org/10.1177/1609406915624574
  • Standaland, A. J. S., & Lwin, M. O. (2013). Online privacy practices: Advances in China. Journal of International Business Research, 12(2), 33–46.
  • Stempel, J. (2020). Home Depot reaches $17.5million settlement over 2014 data breach, Reuters, Nov 25: https://www.reuters.com/article/us-home-depot-cyber-settlement-idUSKBN2842W5
  • Sun, J. (2015). Jieba Chinese word segmentation tool, https://github.com/fxsjy/jieba
  • Tao, Y., Zhang, F., Shi, C., & Che, Y. (2019). Social media data-based sentiment analysis of tourists’ air quality perception. Sustainability, 11(1), 1–23. https://doi.org/10.3390/su11185070
  • Timms, H., & Heimans, J. (2018). Commentary: #DeleteFacebook is just the beginning. Here’s the movement we could see next. Fortune, April 16. https://fortune.com/2018/04/16/delete-facebook-data-privacy-movement/
  • Vinodhini, G., & Chandrasekaran, R. M. (2012). Sentiment analysis and opinion mining: A survey. International Journal of Advanced Research in Computer Science and Software Engineering, 2(6), 282–292.
  • Wang, Y. (2017). The rise of Weibo: Lessons Twitter can learn from Chinese upstart. Forbes. https://www.forbes.com/sites/ywang/2017/06/06/the-rise-of-weibo-lessonstwitter-can-learn-from-chinese-upstart/#4bf1d3ba20b0
  • Wang, Y., Balnaves, M., & Sander, J. (2020). Shameful secrets and self-presentation: Negotiatign privacy practices among youth and rural women in China, SAGE Open, Jan-Mar, 1–12.
  • Wang, Y., Norcie, G., & Cranor, L. R. (2011). Who is concerned about what? A study of American, Chinese and Indian users’ privacy concerns on social network sites. In J. M. McCune, B. Balacheff, A. Perrig, A. R. Sadeghi, A. Sasse, & Y. Beres Eds., Trust and trustworthy computing. Trust 2011. Lecture notes in computer science (Vol. 6740). Springer, Berlin, Heidelberg 146–153 . https://doi.org/10.1007/978-3-642-21599-5_11
  • Wu, Y., Lau, T., Atkin, D. J., & Lin, C. A. (2011). A comparative study of online privacy regulations in the U.S. and China. Telecommunication, 35(7), 603–616. https://doi.org/10.1016/j.telpol.2011.05.002
  • Ying, K., Pan, J., & Wu, M. (2017). Research on sentiment analysis of micro-blog’s topic based on textrank’s abstract. In Proceedings of the 2017 International Conference on Information Technology, Singapore, 27–29 December 2017, ACM, NY, 86–90.
  • Youyou, W., Kosinski, M., & Stillwell, D. (2015). Computer-based personality judgements are more accurate than those made by human. Proceedings of the National Academy of Science 112 4 . https://doi.org/10.1073/pnas.1418680112