{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,5,6]],"date-time":"2022-05-06T19:14:56Z","timestamp":1651864496588},"reference-count":17,"publisher":"IGI Global","issue":"2","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,4,1]]},"abstract":"

Despite of the number of public advice campaigns, researchers have found that individuals still engage in risky cyber behaviour. The first part of this article is focused on the general approach to the cyber security and safety of personal data kept and processed by different entities from the perspective of students, while the second part is dedicated to the privacy aspects from the perspective of loyalty programs. Researchers have found that individuals are typically aware of online security and how to protect their privacy in the network, Nonetheless, individuals are still inclined to take risks because they are unrealistically optimistic and believe that negative events are less likely to happen to them. The survey also shows that even though respondents are aware that retailers collect, and process personal data and respondents feel that the amount of personal data of program members is far beyond the accepted level they still participate in such programs. Authors found also interesting patterns related to behaviour of respondents influenced by demographical data and the area of loyalty.<\/p>","DOI":"10.4018\/ijaci.2018040102","type":"journal-article","created":{"date-parts":[[2018,5,3]],"date-time":"2018-05-03T16:38:24Z","timestamp":1525365504000},"page":"16-31","source":"Crossref","is-referenced-by-count":2,"title":["Cyber Security Patterns Students Behavior and Their Participation in Loyalty Programs"],"prefix":"10.4018","volume":"9","author":[{"given":"Witold","family":"Chmielarz","sequence":"first","affiliation":[{"name":"Chair of Management Information Systems, Faculty of Management, University of Warsaw, Poland"}]},{"given":"Oskar","family":"Szumski","sequence":"additional","affiliation":[{"name":"Chair of Management Information Systems, Faculty of Management, University of Warsaw, Poland"}]}],"member":"2432","reference":[{"key":"IJACI.2018040102-0","unstructured":"Azmi, R., Tibben, W., & Win, K. T. (2016). Motives behind Cyber Security Strategy Development: A literature review of National Cyber Security Strategy. Retrieved from https:\/\/www.researchgate.net\/publication\/308470260_Motives_behind_Cyber_Security_Strategy_Development_A_Literature_Review_of_National_Cyber_Security_Strategy"},{"key":"IJACI.2018040102-1","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2015.09.045"},{"key":"IJACI.2018040102-2","unstructured":"Colloquy. (2015). U.S. Customer Loyalty Program Memberships Top 3 Billion For First Time. Colloquy Census Shows. Retrieved from https:\/\/colloquy.com\/latest-news\/2015-colloquy-loyalty-census\/"},{"key":"IJACI.2018040102-3","author":"V.Kumar","year":"2005","journal-title":"Customer relationship management: A database approach"},{"key":"IJACI.2018040102-4","unstructured":"Leenheer, J., & Bijmolt, T. H. A. (2003). The adoption and effectiveness of loyalty programs: The retailer\u2019s perspective (MSI working paper series, report 03-124)."},{"issue":"6","key":"IJACI.2018040102-5","first-page":"46","article-title":"Does your \u201cloyalty\u201d program inspire any loyalty?","volume":"59","author":"H. G.Lewis","year":"1997","journal-title":"Direct Marketing"},{"key":"IJACI.2018040102-6","doi-asserted-by":"publisher","DOI":"10.1016\/S0148-2963(97)00241-5"},{"key":"IJACI.2018040102-7","unstructured":"McQuivey, J. (2014). Grocery Store Loyalty Card Use is Strong Despite Privacy Concerns. Retrieved from http:\/\/www.prweb.com\/releases\/2004\/12\/prweb191320.htm"},{"key":"IJACI.2018040102-8","unstructured":"Rivard, K. K., & Crossley, K. S. (2014). Customer Loyalty Programs May Face Increased FTC Scrutiny. Retrieved from http:\/\/www.retaillawadvisor.com\/2014\/06\/18\/customer-loyalty-programs-may-face-increased-ftc-scrutiny\/"},{"key":"IJACI.2018040102-9","unstructured":"Sisolak, P. (2014). Are Supermarket Loyalty Programs Worth Your Privacy? Gobankingrates. Retrieved from https:\/\/www.gobankingrates.com\/personal-finance\/participating-supermarket-loyalty-programs-mean-giving-up-privacy"},{"key":"IJACI.2018040102-10","unstructured":"Snyder, B. (2014). 5 huge cybersecurity breaches at companies you know. Fortune. Retrieved from http:\/\/fortune.com\/2014\/10\/03\/5-huge-cybersecurity-breaches-at-big-companies\/"},{"key":"IJACI.2018040102-11","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2013.04.004"},{"key":"IJACI.2018040102-12","unstructured":"Starvish, M. (2011). Customer Loyalty Programs That Work. Harvard Business School Working Knowledge. Retrieved from http:\/\/hbswk.hbs.edu\/item\/customer-loyalty-programs-that-work"},{"issue":"September","key":"IJACI.2018040102-13","first-page":"2016","article-title":"The Biggest Cybersecurity Threats Are Inside Your Company.","author":"M.van Zadelhoff","year":"2016","journal-title":"Harvard Business Review"},{"key":"IJACI.2018040102-14","doi-asserted-by":"crossref","unstructured":"Whitty, M., Doodson, J., Creese S., & Hodges, D., (2015). Individual differences in cyber security behaviors: An examination of who is sharing passwords. Cyberpsychology, Behavior, and Social Networking, 18(1), 3-7.","DOI":"10.1089\/cyber.2014.0179"},{"key":"IJACI.2018040102-15","doi-asserted-by":"publisher","DOI":"10.1089\/cyber.2014.1502"},{"issue":"September","key":"IJACI.2018040102-16","article-title":"Cybersecurity\u2019s Human Factor: Lessons from the Pentagon.","author":"J. A.Winnefeld","year":"2015","journal-title":"Harvard Business Review"}],"container-title":["International Journal of Ambient Computing and Intelligence"],"original-title":[],"language":"ng","link":[{"URL":"https:\/\/www.igi-global.com\/viewtitle.aspx?TitleId=205573","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,6]],"date-time":"2022-05-06T18:34:03Z","timestamp":1651862043000},"score":1,"resource":{"primary":{"URL":"https:\/\/services.igi-global.com\/resolvedoi\/resolve.aspx?doi=10.4018\/IJACI.2018040102"}},"subtitle":[""],"short-title":[],"issued":{"date-parts":[[2018,4,1]]},"references-count":17,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2018,4]]}},"URL":"https:\/\/doi.org\/10.4018\/ijaci.2018040102","relation":{},"ISSN":["1941-6237","1941-6245"],"issn-type":[{"value":"1941-6237","type":"print"},{"value":"1941-6245","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,4,1]]}}}