REFERENCES
Alashoor, T., Baskerville, R., & Zhu, R. (2016). Privacy and identity theft recovery planning: An onion skin model. doi:10.1109/HICSS.2016.461
Alkaldi, N., Renaud, K., & Mackenzie, L. (2019). Encouraging password manager adoption by meeting adopter self-determination needs. Retrieved from http://eprints.gla.ac.uk/169744
Al-Khouri, A. M. (2014). Digital identity: Transforming GCC economies. Innovation: Management, Policy & Practice, 16(2), 184-194. Retrieved from https://search.proquest.com/docview/1645743237?accountid=14745
Allison, A., Currall, J., Moss, M., & Stuart, S. (2005). Digital identity matters. Journal of the American Society for Information Science and Technology, 56(4), 364-372. doi://dx.doi.org/10.1002/asi.20112
Alsaedi, T., Stefanidis, A., Phalp, K., & Ali, R. (2019). Social transparency in enterprise information systems: Peculiarities and assessment factors. 2019 6th International Conference on Behavioral, Economic and Socio-Cultural Computing (BESC), 1-4. doi:10.1109/BESC48373.2019.8963048
Anakath, A. S., Rajakumar, S., & Ambika, S. (2019). Privacy preserving multi factor authentication using trust management. Cluster Computing, 22(S5), 10817-10823. doi:10.1007/s10586-017-1181-0
Auxier, B., Rainie, L., Anderson, M., Perrin, A., Kumar, M., & Turner, E. (2019). Americans and privacy: Concerned, confused and feeling lack of control over their personal information. 85, 88-93. Retrieved from https://statistical.proquest.com/statisticalinsight/result/pqpresultpage.previewtitle?docType=PQSI&titleUri=/content/2019/R8588-93.22221.xml
Bélanger, F., & Crossler, R. E. (2011). Privacy in the digital age. Management Information Systems, 35(4), 1017-1041. Retrieved from http://www.econis.eu/PPNSET?PPN=675839327
Boyatzis, R. E. (1998). Transforming qualitative information: Thematic analysis and code development. SAGE Publications. Retrieved from https://books.google.com/books?id=_rfClWRhIKAC
Braun, V., & Clarke, V. (2006). Using thematic analysis in psychology. Qualitative Research in Psychology, 3(2), 77-101. doi:10.1191/1478088706qp063oa
Brown, A. S., Bracken, E., Zoccoli, S., & Douglas, K. (2004). Generating and remembering passwords. Applied Cognitive Psychology, 18(6), 641-651. doi:10.1002/acp.1014
Brunk, J., Mattern, J., & Riehle, D. M. (2019). Effect of transparency and trust on acceptance of automatic online comment moderation systems. 429-435. doi:10.1109/CBI.2019.00056
California Consumer Privacy Act. (2018). Retrieved from https://oag.ca.gov/privacy/ccpa
Cambridge English Dictionary. (2020). Identity. In Cambridge English dictionary. Retrieved from https://dictionary.cambridge.org/us/dictionary/english/identity
Camp, J. L. (2004). Digital identity.* IEEE Technology and Society Magazine*, 23(3), 34-41. doi:10.1109/MTAS.2004.1337889
Charney, S. (2009). The evolution of online identity. IEEE Security & Privacy, 7(5), 56-59. doi:10.1109/MSP.2009.140
Chen, H., Beaudoin, C. E., & Hong, T. (2017). Securing online privacy: An empirical test on internet scam victimization, online privacy concerns, and privacy protection behaviors. Computers in Human Behavior, 70, 291-302. https://doi.org/10.1016/j.chb.2017.01.003
Choi, D. D., Wang, G. A., & Lowry, P. B. (2020). The design of personal privacy and security risk scores for minimizing consumers cognitive gaps in IOT settings. Advances in Design Science Research. doi:10.24251/HICSS.2020.624
Clarke, V., & Braun, V. (2018). Using thematic analysis in counselling and psychotherapy research: A critical reflection. Counselling and Psychotherapy Research, 18(2), 107-110. doi:10.1002/capr.12165
Colbert, A., Yee, N., & George, G. (2016). The digital workforce and the workplace of the future. Academy of Management Journal, 59(3), 731-739. doi:10.5465/amj.2016.4003
Cooper, C. (2017, October 10). Awareness training is key to reducing security risk. Cybersecurity insights. Retrieved from https://www.csoonline.com/article/3229969/awareness-training-is-key-to-reducingsecurity-risk.html
Corbin, J., & Strauss, A. (2014). Basics of qualitative research: Techniques and procedures for developing grounded theory. SAGE Publications. Retrieved from https://books.google.com/books?id=hZ6kBQAAQBAJ
Creswell, J. W., & Poth, C. N. (2018). Qualitative inquiry & research design: Choosing among five approaches. SAGE Publications. Retrieved from http://ezproxy.lib.usf.edu/login?url=http://search.ebscohost.com/login.aspx?direct=truedb=cat00847a&AN=usflc.036209374&site=eds-live
Dhamija, R., Tygar, J., & Hearst, M. (2006). Why phishing works. *CHI ’06 Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. *doi:10.1145/1124772.1124861
Dourish, P., Grinter, R., Delgado de la Flor, J., & Joseph, M. (2004). Security in the wild: User strategies for managing security as an everyday, practical problem. Personal and Ubiquitous Computing, 8(6), 391-401. doi:10.1007/s00779-004-0308-5
Dutil, P. A., Howard, C., Langford, J., & Roy, J. (2007). Rethinking government-public relationships in a digital world: Customers, clients, or citizens? Journal of Information Technology & Politics, 4(1), 77-90. doi:10.1300/J516v04n01_06
Emont, J., Stevens, L., & McMillan, R. (2018). Amazon investigates employees leaking data for bribes. Dow Jones Institutional News. Retrieved from https://www.wsj.com/articles/amazon-investigates-employees-leaking-data-for-bribes1537106401
European Union Agency for Cybersecurity. (2020). Security of personal data. Retrieved from https://www.enisa.europa.eu/topics/data-protection/security-of-personal-data
European Union. (2016). General data protection regulation. Official Journal of the European Union, 1(31), 1-88. Retrieved from https://eur-lex.europa.eu/legalcontent/EN/TXT/?qid=1559428229433&uri=CELEX:32016R0679
Federal Trade Commission. (2012). Privacy choices for your personal financial information. Retrieved from https://www.consumer.ftc.gov/articles/0222-privacy-choices-yourpersonal-financial-information
Fereday, J., & Muir-Cochrane, E. (2006). Demonstrating rigor using thematic analysis: A hybrid approach of inductive and deductive coding and theme development. International Journal of Qualitative Methods, 5(1), 80-92. doi:10.1177/160940690600500107
Florencio, D., & Herley, C. (2006). A large scale study of web password habits. Retrieved from https://www.microsoft.com/en-us/research/publication/a-large-scale-study-of-webpassword-habits
Florencio, D., & Herley, C. (2007). A large-scale study of web password habits. WWW ’07 Proceedings of the 16th international conference on World Wide Web. doi:10.1145/1242572.1242661 Retrieved from http://dl.acm.org/citation.cfm?id=1242661
Gaw, S., & Felten, E. (2006). Password management strategies for online accounts. SOUPS ’06: Proceedings of the second symposium on Usable privacy and security. doi:10.1145/1143120.1143127
Gramm-Leach-Bliley Act (2002). Retrieved from https://www.ftc.gov/tips-advice/businesscenter/privacy-and-security/gramm-leach-bliley-act
Granville, K. (2018, March 19). Facebook and Cambridge Analytica: What you need to know as fallout widens. New York Times. Retrieved from https://www.nytimes.com/2018/03/19/technology/facebook-cambridge-analyticaexplained.html
Green, A. (2019). Complete guide to privacy laws in the US. Varonis. Retrieved from https://www.varonis.com/blog/us-privacy-laws/
Gunasinghe, H., Kundu, A., Bertino, E., Krawczyk, H., Chari, S., Singh, K., & Su, D. (2019). PrivIdEx: Privacy preserving and secure exchange of digital identity assets. WWW ’19: The World Wide Web Conference. doi:10.1145/3308558.3313574
Higashino, M., Kawato, T., Ohmori, M., & Kawamura, T. (2019). An anti-phishing training system for security awareness and education considering prevention of information leakage. 2019 5th International Conference on Information Management (ICIM), Cambridge, United Kingdom, 82-86. Retrieved from https://search.proquest.com/docview/2226169708
Hodge, R. (2019, December 27).* 2019 Data breach hall of shame: These were the biggest data breaches of the year.* Cnet. Retrieved from https://www.cnet.com/news/2019-databreach-hall-of-shame-these-were-the-biggest-data-breaches-of-the-year/
Horn, I. S., Taros, T., Dirkes, S., Hüer, L., Rose, M., Tietmeyer, R., & Constantinides, E. (2015). Business reputation and social media: A primer on threats and responses. Journal of Direct, Data and Digital Marketing Practice, 16(3), 193-208. doi:10.1057/dddmp.2015.1
Hsu, C., & Lin, J. C. (2016). An empirical examination of consumer adoption of internet of things services: Network externalities and concern for information privacy perspectives. Computers in Human Behavior, 62, 516-527. doi:10.1016/j.chb.2016.04.023
Hyde, K. F. (2000). Recognising deductive processes in qualitative research. Qualitative Market Research, 3(2), 82-90. doi:10.1108/13522750010322089
Identity Theft Resource Center. (2020). ITRC 2019 end of year data breach report. Retrieved from https://www.idtheftcenter.org/2019-databreaches/?utm_source=web&utm_medium=sitewidenotice&utm_campaign=01282020_019DataBreachReport
International Association of Privacy Professionals. (2020). What does privacy mean? Retrieved from https://iapp.org/about/what-is-privacy/
Kahn, C., & Liñares-Zegarra, J. M. (2016). Identity theft and consumer payment choice: Does security really matter? Journal of Financial Services Research, 50(1), 121-159. doi:10.1007/s10693-015-0218-x
Katzan, H. Jr. (2011). Ontology of trusted identity in cyberspace. Journal of Service Science, 4(1), 1-11. Retrieved from https://search.proquest.com/docview/868857882?accountid=14745
Kim, J., Baskerville, R. L., & Ding, Y. (2018). Breaking the privacy kill chain: Protecting individual and group privacy online. Information Systems Frontiers, 1-15. doi:10.1007/s10796-018-9856-5
Legal Monitor Worldwide. (2020, January 22). NIST publishes privacy framework version 1.0.
Merriam-Webster. (2020a). Definition of privacy. In Merriam-Webster.com dictionary. Retrieved from https://www.merriamwebster.com/dictionary/privacy?utm_campaign=sd&utm_medium=serp&utm_source=jsonld
Merriam-Webster. (2020b). Identity definition. In Merriam-Webster.com dictionary. Retrieved from https://www.merriam-webster.com/dictionary/identity
Mueller, M. L., Park, Y., Lee, J., & Kim, T. (2006). Digital identity: How users value the attributes of online identifiers. Information Economics and Policy, 18(4), 405-422. doi://doi.org/10.1016/j.infoecopol.2006.04.002
Myers, M. (2013). Qualitative research in business and management. SAGE Publications.
National Institute of Standards and Technology. (2017). Digital Identity Guidelines. Retrieved from https://csrc.nist.gov/publications/detail/sp/800-63/3/final
National Institute of Standards and Technology. (2018a). Framework for improving critical infrastructure cybersecurity.
National Institute of Standards and Technology. (2018b). NIST risk management framework. Retrieved from https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-37r2.pdf
Neck, C. (2015). Disappearing women: Why do women leave senior roles in finance? Australian Journal of Management, 40(3), 488-510. doi:10.1177/0312896215578014
Nurse, J. R. C., Creese, S., Goldsmith, M., & Lamberts, K. (2011). Guidelines for usable cybersecurity: Past and present. 2011 Third International Workshop on Cyberspace Safety and Security (CSS), Milan. doi:10.1109/CSS.2011.6058566 Retrieved from https://ieeexplore.ieee.org/document/6058566
Olivero, N., & Lunt, P. (2004). Privacy versus willingness to disclose in e-commerce exchanges: The effect of risk awareness on the relative role of trust and control. Journal of Economic Psychology, 25(2), 243-262. doi:10.1016/S0167-4870(02)00172-1
Papangelis, K., Chamberlain, A., Lykourentzou, I., Khan, V., Saker, M., Liang, H., Sadien, I., & Cao, T. (2020). Performing the digital self. ACM Transactions on Computer-Human Interaction, 27(1), 1-26. doi:10.1145/3364997
Paulsen, C., McDuffie, E., Newhouse, W., & Toth, P. (2012). NICE: Creating a cybersecurity workforce and aware public. IEEE Security & Privacy, 10(3), 76-79. doi:10.1109/MSP.2012.73
Perlroth, N., Satariano, A., & Tsang, A. (2018, November 30). Marriott hacking exposes data of up to 500 million guests. The New York Times. Retrieved from https://www.nytimes.com/2018/11/30/business/marriott-data-breach.html
Privacy Act of 1974. (2014). Retrieved from https://www.justice.gov/opcl/privacy-act-1974
Rossi, P. (2007). How to link the qualitative and the quantitative risk assessment. Paper presented at the PMI® Global Congress 2007-EMEA, Budapest, Hungary. Newtown Square, PA: Project Management Institute.
Saldaña, J. (2016). The coding manual for qualitative researchers. SAGE Publications. Retrieved from http://ezproxy.lib.usf.edu/login?url=http://search.ebscohost.com/login.aspx?direct=true&db=cat00847a&AN=usflc.034045048&site=eds-live
Schwartz, P. M. (2013). The EU-U.S. privacy collision: A turn to institutions and procedures. Harvard Law Review, 126(7), 1966-2009. Retrieved from https://www.jstor.org/stable/23415063
Seidman, I. (2013).* Interviewing as qualitative research : A guide for researchers in education and the social sciences*. Teachers College Press. Retrieved from http://ezproxy.lib.usf.edu/login?url=http://search.ebscohost.com/login.aspx?direct=true&db=cat00847a&AN=usflc.031021394&site=eds-live
Sheng, S., Holbrook, M., Kumaraguru, P., Cranor, L., & Downs, J. (2010). Who falls for phish? A demographic analysis of phishing susceptibility and effectiveness of interventions.* CHI’10: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems.* doi:10.1145/1753326.1753383
Shin, L. (2014). ‘Someone had taken over my life’: An identity theft victim’s story. Forbes. Retrieved from https://www.forbes.com/sites/laurashin/2014/11/18/someone-had-takenover-my-life-an-identity-theft-victims-story/
Sobolewski, M., Mazur, J., & Paliski, M. (2017). GDPR: A step towards a user-centric internet? Intereconomics, 52(4), 207-213. http://dx.doi.org/10.1007/s10272-017-0676-5
Srivastava, A., & Geethakumari, G. (2013). Measuring privacy leaks in online social networks. 2013 International Conference on Advances in Computing, Communications and Informatics (ICACCI), Mysore. doi:10.1109/ICACCI.2013.6637504
Stack, B. (2017). Here’s how much your personal information is selling for on the dark web. Retrieved from https://www.experian.com/blogs/ask-experian/heres-how-much-yourpersonal-information-is-selling-for-on-the-dark-web/
Sullivan, C. (2014). Protecting digital identity in the cloud: Regulating cross border data disclosure. Computer Law & Security Review: The International Journal of Technology Law and Practice, 30(2), 137-152. doi:10.1016/j.clsr.2014.01.004
Sullivan, C. (2015). Protecting digital identity in the cloud. In The Cloud Security Ecosystem: Technical, Legal, Business and Management Issues (pp. 149-170). Boston: Syngress. doi.org/10.1016/B978-0-12-801595-7.00007-0
Sullivan, C. (2016). Digital citizenship and the right to digital identity under international law. Computer Law & Security Review, 32(3), 474-481. doi.org/10.1016/j.clsr.2016.02.001
Sullivan, C. (2018). Digital identity – from emergent legal concept to new reality. Computer Law & Security Review, 34(4), 723-731. doi.org/10.1016/j.clsr.2018.05.015
U.S. Department of Health & Human Services. (2015). What is PHI? Retrieved from https://www.hhs.gov/answers/hipaa/what-is-phi/index.html
U.S. Department of Labor. (2020). Guidance on the protection of personal identifiable information. Retrieved from https://www.dol.gov/general/ppii
-“US fines Facebook $5 billion for privacy violations.” (2019, July 24). Deutsche Welle. Retrieved from https://www.dw.com/en/us-fines-facebook-5-billion-for-privacyviolations/a-49730844
Vogels, E. A. (2019). Millennials stand out for their technology use, but older generations also embrace digital life. Retrieved from https://www.pewresearch.org/facttank/2019/09/09/us-generations-technology-use/
Wolfond, G. (2017). A blockchain ecosystem for digital identity: Improving service delivery in canada’s public and private sectors. Technology Innovation Management Review, 7(10), 35-40. Retrieved from https://search.proquest.com/docview/1963139579?accountid=14745
Woodhouse, S. (2007). Information security: End user behavior and corporate culture. Paper presented at the 7th IEEE International Conference on Computer and Information Technology (CIT 2007), 767-774. doi:10.1109/CIT.2007.186
Zastrow, J. (2014). The digital archivist: PIM 101: Personal information management. Computers in Libraries, 34(2).
Table of Contents
- CHAPTER ONE - INTRODUCTION
- CHAPTER TWO - ABOUT IDENTITY
- CHAPTER THREE - LITERATURE REVIEW
- CHAPTER FOUR - METHODOLOGY
- CHAPTER FIVE - FINDINGS
- CHAPTER SIX - DISCUSSION
- REFERENCES
- APPENDIX A - INTERVIEW SOLICITATION FLYER
- APPENDIX B - IRB VERBAL CONSENT FORM
- APPENDIX C - INTERVIEW QUESTIONNAIRE
- APPENDIX D - IRB APPROVAL EXEMPT FORM
- APPENDIX E - ITRC 2019 DATA BREACH REPORT STATISTICS