{"id":"https://openalex.org/W2053796486","doi":"https://doi.org/10.4018/jisp.2008010103","title":"An Empirical Investigation of an Individual's Perceived Need for Privacy and Security","display_name":"An Empirical Investigation of an Individual's Perceived Need for Privacy and Security","publication_year":2008,"publication_date":"2008-01-01","ids":{"openalex":"https://openalex.org/W2053796486","doi":"https://doi.org/10.4018/jisp.2008010103","mag":"2053796486"},"language":"en","primary_location":{"id":"doi:10.4018/jisp.2008010103","is_oa":false,"landing_page_url":"https://doi.org/10.4018/jisp.2008010103","pdf_url":null,"source":{"id":"https://openalex.org/S191782446","display_name":"International Journal of Information Security and Privacy","issn_l":"1930-1650","issn":["1930-1650","1930-1669"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320547","host_organization_name":"Taylor & Francis","host_organization_lineage":["https://openalex.org/P4310320547"],"host_organization_lineage_names":["Taylor & Francis"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Information Security and Privacy","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5085371981","display_name":"Taner Pirim","orcid":null},"institutions":[{"id":"https://openalex.org/I35765314","display_name":"Pittsburgh Supercomputing Center","ror":"https://ror.org/04tac1482","country_code":"US","type":"facility","lineage":["https://openalex.org/I35765314"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Taner Pirim","raw_affiliation_strings":["Mississsippi Center for Supercomputing Research, USA"],"affiliations":[{"raw_affiliation_string":"Mississsippi Center for Supercomputing Research, USA","institution_ids":["https://openalex.org/I35765314"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5023755737","display_name":"Tabitha James","orcid":"https://orcid.org/0000-0002-0143-958X"},"institutions":[{"id":"https://openalex.org/I859038795","display_name":"Virginia Tech","ror":"https://ror.org/02smfhw86","country_code":"US","type":"education","lineage":["https://openalex.org/I859038795"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Tabitha James","raw_affiliation_strings":["Virginia Polytechnic Institute and State University, USA","Virginia Polytechnic Institute and State University,#R#USA,"],"affiliations":[{"raw_affiliation_string":"Virginia Polytechnic Institute and State University, USA","institution_ids":["https://openalex.org/I859038795"]},{"raw_affiliation_string":"Virginia Polytechnic Institute and State University,#R#USA,","institution_ids":["https://openalex.org/I859038795"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5029250225","display_name":"Katherine Boswell","orcid":null},"institutions":[{"id":"https://openalex.org/I71730758","display_name":"University of Louisiana at Monroe","ror":"https://ror.org/02qeh3c90","country_code":"US","type":"education","lineage":["https://openalex.org/I2799628689","https://openalex.org/I71730758"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Katherine Boswell","raw_affiliation_strings":["University of Louisiana at Monroe, USA"],"affiliations":[{"raw_affiliation_string":"University of Louisiana at Monroe, USA","institution_ids":["https://openalex.org/I71730758"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5007616093","display_name":"Brian J. Reithel","orcid":"https://orcid.org/0009-0004-7471-3107"},"institutions":[{"id":"https://openalex.org/I368840534","display_name":"University of Mississippi","ror":"https://ror.org/02teq1165","country_code":"US","type":"education","lineage":["https://openalex.org/I368840534","https://openalex.org/I4210141039"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Brian Reithel","raw_affiliation_strings":["University of Mississippi, USA","(University of Mississippi, USA)"],"affiliations":[{"raw_affiliation_string":"University of Mississippi, USA","institution_ids":["https://openalex.org/I368840534"]},{"raw_affiliation_string":"(University of Mississippi, USA)","institution_ids":["https://openalex.org/I368840534"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5031452879","display_name":"Reza Barkhi","orcid":"https://orcid.org/0000-0001-8016-0343"},"institutions":[{"id":"https://openalex.org/I859038795","display_name":"Virginia Tech","ror":"https://ror.org/02smfhw86","country_code":"US","type":"education","lineage":["https://openalex.org/I859038795"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Reza Barkhi","raw_affiliation_strings":["Virginia Polytechnic Institute and State University, USA","Virginia Polytechnic Institute and State University,#R#USA,"],"affiliations":[{"raw_affiliation_string":"Virginia Polytechnic Institute and State University, USA","institution_ids":["https://openalex.org/I859038795"]},{"raw_affiliation_string":"Virginia Polytechnic Institute and State University,#R#USA,","institution_ids":["https://openalex.org/I859038795"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5085371981"],"corresponding_institution_ids":["https://openalex.org/I35765314"],"apc_list":null,"apc_paid":null,"fwci":1.7049,"has_fulltext":false,"cited_by_count":10,"citation_normalized_percentile":{"value":0.88859213,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":"2","issue":"1","first_page":"42","last_page":"53"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9836999773979187,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9836999773979187,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11045","display_name":"Privacy, Security, and Data Protection","score":0.9753999710083008,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T10068","display_name":"Technology Adoption and User Behaviour","score":0.9541000127792358,"subfield":{"id":"https://openalex.org/subfields/1802","display_name":"Information Systems and Management"},"field":{"id":"https://openalex.org/fields/18","display_name":"Decision Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7411452531814575},{"id":"https://openalex.org/keywords/asset","display_name":"Asset (computer security)","score":0.7319250702857971},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6460138559341431},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.5607349276542664},{"id":"https://openalex.org/keywords/privacy-by-design","display_name":"Privacy by Design","score":0.4558521509170532},{"id":"https://openalex.org/keywords/cloud-computing-security","display_name":"Cloud computing security","score":0.4291459619998932},{"id":"https://openalex.org/keywords/security-through-obscurity","display_name":"Security through obscurity","score":0.4226319193840027},{"id":"https://openalex.org/keywords/empirical-research","display_name":"Empirical research","score":0.4195234775543213},{"id":"https://openalex.org/keywords/information-privacy","display_name":"Information privacy","score":0.3888133764266968},{"id":"https://openalex.org/keywords/security-information-and-event-management","display_name":"Security information and event management","score":0.352449893951416},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.13154730200767517}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7411452531814575},{"id":"https://openalex.org/C76178495","wikidata":"https://www.wikidata.org/wiki/Q4808784","display_name":"Asset (computer security)","level":2,"score":0.7319250702857971},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6460138559341431},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.5607349276542664},{"id":"https://openalex.org/C193934123","wikidata":"https://www.wikidata.org/wiki/Q7246028","display_name":"Privacy by Design","level":3,"score":0.4558521509170532},{"id":"https://openalex.org/C184842701","wikidata":"https://www.wikidata.org/wiki/Q370563","display_name":"Cloud computing security","level":3,"score":0.4291459619998932},{"id":"https://openalex.org/C114869243","wikidata":"https://www.wikidata.org/wiki/Q133735","display_name":"Security through obscurity","level":5,"score":0.4226319193840027},{"id":"https://openalex.org/C120936955","wikidata":"https://www.wikidata.org/wiki/Q2155640","display_name":"Empirical research","level":2,"score":0.4195234775543213},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.3888133764266968},{"id":"https://openalex.org/C103377522","wikidata":"https://www.wikidata.org/wiki/Q3493999","display_name":"Security information and event management","level":4,"score":0.352449893951416},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.13154730200767517},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C111472728","wikidata":"https://www.wikidata.org/wiki/Q9471","display_name":"Epistemology","level":1,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.4018/jisp.2008010103","is_oa":false,"landing_page_url":"https://doi.org/10.4018/jisp.2008010103","pdf_url":null,"source":{"id":"https://openalex.org/S191782446","display_name":"International Journal of Information Security and Privacy","issn_l":"1930-1650","issn":["1930-1650","1930-1669"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320547","host_organization_name":"Taylor & Francis","host_organization_lineage":["https://openalex.org/P4310320547"],"host_organization_lineage_names":["Taylor & Francis"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Information Security and Privacy","raw_type":"journal-article"},{"id":"pmh:oai:RePEc:igg:jisp00:v:2:y:2008:i:1:p:42-53","is_oa":false,"landing_page_url":"https://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/jisp.2008010103","pdf_url":null,"source":{"id":"https://openalex.org/S4306401271","display_name":"RePEc: Research Papers in Economics","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I77793887","host_organization_name":"Federal Reserve Bank of St. Louis","host_organization_lineage":["https://openalex.org/I77793887"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":["https://openalex.org/W2953227786","https://openalex.org/W2101582069","https://openalex.org/W2994243660","https://openalex.org/W3091445850","https://openalex.org/W2675231964","https://openalex.org/W2118333568","https://openalex.org/W2336014427","https://openalex.org/W139145738","https://openalex.org/W2592164127","https://openalex.org/W2495229164"],"abstract_inverted_index":{"Security":[0],"and":[1,38,54,71,73,90],"privacy":[2,72],"issues":[3],"have":[4],"risen":[5],"in":[6],"importance":[7],"as":[8],"the":[9,75,85,97],"use":[10,30,40],"of":[11,35,41],"technology":[12],"increases.":[13],"Newly":[14],"developed":[15,87],"technological":[16],"devices":[17],"for":[18,69],"asset":[19],"security":[20,43,57,70],"can":[21],"only":[22],"be":[23,46],"successful":[24],"if":[25],"people":[26],"are":[27,51],"willing":[28],"to":[29,48,64],"them.":[31],"Gaining":[32],"an":[33,62,66],"understanding":[34],"individuals\u2019":[36],"acceptance":[37],"possible":[39],"new":[42,56],"technologies":[44],"would":[45],"beneficial":[47],"entities":[49],"that":[50,84,91],"developing,":[52],"marketing,":[53],"implementing":[55],"technologies.":[58],"This":[59],"study":[60],"develops":[61],"instrument":[63,86],"determine":[65],"individual\u2019s":[67],"need":[68],"investigates":[74],"relationship":[76,94],"between":[77,96],"these":[78],"two":[79,98],"constructs.":[80,99],"The":[81],"results":[82],"show":[83],"is":[88],"reliable":[89],"a":[92],"significant":[93],"exists":[95]},"counts_by_year":[{"year":2021,"cited_by_count":2},{"year":2016,"cited_by_count":1},{"year":2015,"cited_by_count":2},{"year":2014,"cited_by_count":2},{"year":2013,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
