Keywords

13.1 Introduction

The proliferation of social media and web 2.0 is enabling individuals and companies to engage with digital technologies at an unprecedented scale generating vast amounts of data, also referred to as “big data”. Big data is characterized by higher volume, velocity, and variety (the three V’s) of data that usually cannot be handled by traditional database management tools (Zikopoulos et al. 2012) and is often characterized as a massive volume of both structured and unstructured data that are generated at high velocity with veracity that adds value to the intended process (Demchenko et al. 2013; Kshetri 2014).

An Online Social Network (OSN) is an online platform that allows members to create public profiles within a bounded system, share texts, photos and videos, and other personal information, and thus, connect, develop, and maintain relationships (Boyd and Ellison 2007; Ellison et al. 2007). People may use OSNs for many different reasons including socialization, fun and enjoyment, usefulness in communicating and interacting with friends, bridging, bonding, and maintaining social capital. Use of OSNs have created humongous amount of structured and unstructured data. Indeed, the recent attention that big data is garnering can be largely credited to the rapid development of the Online Social Networks (OSNs). As OSNs have provided additional channels for interpersonal and business communication, huge volumes and variety of data are being generated for collection, storage, and aggregation from OSNs. These data can be used by the governments, business organizations, research agencies, marketing companies, etc. Manyika et al. (2011) estimated the value of big data for U.S. medical industry alone to be $300 billion. Companies in various industry sectors such as healthcare, retail, services market, supply chain and transportation, entertainment, and marketing and advertising have started to pay close attention to the big data phenomenon and thus, to OSNs as one of the primary sources of the big data (Tan et al. 2013). It is also important to note that despite several benefits of OSNs in the big data environment, the ability of organizations to collect, store, and analyze big data poses privacy and security related risks for the users.

The interaction of OSNs with users and the generation of big data on OSNs through these interactions are presented in Fig. 13.1 below. The interactions created in OSNs are accessed by many parties such as government, big organizations, third parties, and consumer and service firms. Figure 13.1 presents the simplistic view of how OSNs acts as a source of big data and thus, the source of privacy and security issues.

Fig. 13.1
figure 1

OSN-big data-privacy

The growth of social media and the culture of sharing information have fueled the proliferation of OSNs such as Facebook, Instagram, Twitter, Google+, and Pinterest in individuals’ daily life. These OSNs are becoming an important social platform for computer-mediated communication (Nadkarni and Hofmann 2012) at an exponential rate—be it for bonding, bridging, or maintaining social capital (Ellison et al. 2007), or using it as a medium of social interaction and exchanges (Boyd and Ellison 2007). With Facebook alone having more than one billion members (Sharma and Crossler 2014), it is no surprise to see that almost fourth-fifths of the Internet users use one or the other OSN (Conroy and Williams 2014). The exponential growth of OSNs has brought an intense focus on the privacy and security issues of its users. OSNs have been plagued with issues of privacy risks such as the surveillance, secondary use of Information, and collection of irrelevant information (Sharma and Crossler 2014). In the context of the big data, this already complex issue becomes further complicated.

An individual may feel a threat to their privacy when they lose control to their personal information. In an online environment, where users feel a certain amount of anonymity and the OSN providers have the freedom to aggregate and share the information easily, the issues of privacy and security may be more predominant. In a social network environment, information privacy may imply the level of identifiable information collected by the organization and the possible unauthorized uses of that information. These privacy concerns can range from information threats such as digital aggregation and improper access of personal data by third parties to dangers arising from the social environment such as online stalking, bullying, or leaking of private data to the world (Hogben 2007). The level of sophistication of technologies analyzing the big data generated by the OSNs has increased greatly over the last few years. In addition, cost-effective and innovative forms of collection and -processing of high volume, high velocity, and high-variety information assets has brought the privacy and security issues to the forefront (Kshetri 2014). As we start capturing life in digital reality in online social networks, it becomes easier for people and organizations with the right skills set to build an accurate portrait of our past, present, and future behavior, without our knowledge. Software such as Rapid Information Overlay Technology developed for the U.S. defense department (theguardian.com 2013) uses ‘extreme-scale analytics’ to gather information about individuals’ online social network habits to predict their future behaviors. Internet giants like Google and Facebook (including Instagram) have been criticized for a long time for the lack of transparency on what’s being done with the users’ data they collect. An example of volume, velocity, and variety of data that Facebook stores and can retrieve is the Facebook Graph Search function that was launched in March 2013. This function can give answers to user’s natural language queries by combining the big data acquired from its billions of members and external data into a search engine. These results can link Facebook activities such as pictures liked, relationship status, and comments made between a user’s friends from the time they joined Facebook. Big data and it tools and techniques that are being used by many OSN companies are opaque, masked by the layers of technical, legal, physical design (Richards and King 2013), making the data being collected and used by these companies questionable. On top of it, there are several third-party applications on OSNs that also collect user information in real-time. As such, real-time structured and unstructured data provided and shared on OSNs such as Facebook, Instagram, Twitter, and Foursquare generally carry privacy risks.

However, even though social media is taking on the role of primary communication, people, especially the millennials, may be in a state of indifference when it comes to their privacy (Yoo et al. 2012). Some of these individuals using OSNs may not be aware of the risk associated with the release of personal information. Others may have experienced privacy invasion and thus, may not consider their information to be private anymore (Solove 2008) becoming apathetic towards their own privacy over time. Some people are comfortable giving up their privacy for patriotic reasons such as for national security while others believe that they have nothing to hide anyway as all of their information is already collected by big organizations like Google or the government (Goitein 2013).

Information Systems (IS) research has focused on privacy and its value. However, we do not yet fully understand why people, despite valuing privacy, still choose to freely share their personal information online. Thus, the concept of privacy on OSN is an interesting one to study as the value of privacy for each individual is situational in nature (Acquisti et al. 2013)—some users may modulate their privacy boundaries; for others, the definition of privacy in itself might vary from one situation/timeline to other. Using the prospect theory and rational apathy theory, this paper analyzes the impact of situational factors such as information control, ownership of personal information, benefits of information disclosure, and apathy towards user’s privacy concern on OSN.

13.2 Literature Review

As OSNs are public platforms by design, any information shared on it carries a significant risk of being collected, stored and used without authorization as organizations and third parties such as advertising agents, employers, law enforcement agents, creditors, and tax authorities are increasingly seeking information shared and provided on OSNs users (Hogben 2007; Krasnova et al. 2012; Stieglitz et al. 2014). Privacy related issues can range from negative impact on personal and family lives, damages to reputation (Afroz et al. 2013), identity theft, and psychological pain such as embarrassment and addiction (Turel and Serenko 2012). With the increasing use of OSNs and big data, privacy concern construct has become one of the most widely used variables in IS research to predict the privacy-related behaviors (Dhami et al. 2013; Johnson et al. 2012; Xu et al. 2008). The findings of these privacy-related behavior studies have been often different from one another and sometimes, even contradictory. Some studies found that privacy concerns are more prevalent among the OSN users and negatively impact OSN usage behavior (O’Brien and Torres 2012; Xu et al. 2013). Other studies found that the OSNs users seem to be oblivious to privacy risks and thus, comfortable sharing their personal information on a social network (Hugl 2011; Rosenblum 2007). Despite the privacy risk, the users still use OSNs and share their personal information (Acquisti and Gross 2006; Tufekci 2008). This study explores how the introduction and rise of big data on OSNs would affect the perception of the users toward the privacy concerns and affect their OSN usage behavior.

It is important to study privacy in relation to big data as most of the hacking and privacy violations are now on bigger and broader terms. In 2010, Julian Assange used WikiLeaks to upload 90,000 documents related to Afghan War and started an unprecedented big data leak in the U.S. military history. Edward Snowden followed the trend by publishing 20 times as many documents. The data that was leaked provided a glimpse of how the U.S. government has been performing surveillance activities on its own citizens as well as leaders around the world such as Angela Merkel, Germany’s chancellor. Recent big data breaches in Anthem Inc. and Ashley Madison are bringing a lot of attention to privacy violations as well. Big data has allowed people to extract implicit, previously unknown, and potentially personally identifiable information about the individuals.

13.3 Theoretical Framework and Hypotheses

13.3.1 Prospect Theory

Prospect theory states that while making decisions, individuals appraise a set of decision alternatives based on personal heuristics, and then select the alternative that brings the highest satisfaction and outcome (Keith et al. 2012). However, such personal decision heuristics may demonstrate bounded rationality (Simon 1982) as the theory is based on the assumption that utility comes from the returns and not the value of assets. Thus, an individual’s reference point would strongly affect the choice of their heuristics (Kahneman and Tversky 1979). This phenomenon has fascinating implications for individuals’ decision to share their personal information on OSNs as users compare the utility derived from information sharing to the loss of information through privacy risk.

13.3.2 Rational Apathy Theory

In many cases, individuals are rationally apathetic towards a cause. When a voter feels that his vote would not have any real influence on the conclusion of an election or change the political scenario, he could develop apathy towards the election. Similarly, a rational shareholder would not put an extra effort to go through the length and complexity of proxy statements unless he feels that his effort will make a difference (Karuitha et al. 2013). Apathy is basically defined as a state of indifference or reasoned assessment where an individual has an absence of interest or concern to certain aspects of emotional, social or physical life often caused by “learned helplessness” (Sarfaraz et al. 2012). Similarly, individuals using OSNs may show a non-pathological lack of interest towards their privacy as they may not consider it important (Solmitz 2000) or may believe that their privacy is already too diluted by the companies collecting data to care about it anymore (Yoo et al. 2012). In a privacy context, a person with a reference point of complete information control may quickly travel to the point of privacy apathy.

Drawing from the Prospect theory which is an extension of expected utility hypothesis and from the Rational Apathy theory, we visualize our research model for this study in the Fig. 13.2. This research model has two dimensions to it: one is the privacy calculus that examines risk and benefits of information disclosure, and the other is the reference point for their privacy control, ownership, and belief. In this paper, we investigate how reference points such as information control, perceived ownership, and existing offline benefits affect user’s protection belief, risk belief, their state of apathy towards privacy, and perceived benefits from using the OSNs. We further study how all these constructs would affect the user’s tendency to disclose information on OSNs. Thus, this paper seeks to answer the following research questions:

  1. 1.

    How do the perceived ownership, perceived information control, and existing offline benefits affect protection belief, risk belief, perceived benefits and state of user’s privacy apathy on OSNs?

  2. 2.

    How do privacy apathy, protection belief, risk belief, and benefits affect information disclosure on OSNs in the age of big data?

Fig. 13.2
figure 2

Research model

To control for an explanation of results due to extraneous factors, prior research on OSN and information systems identified a number of factors that may impact the actual behavior of respondents. Analyzing the impact of control variables is essential for a research model as it removes any confounding variables (Ormond 2014). Thus, for this research model, age, gender, OSN experience, past privacy invasion, number of OSN friends, number of years of experience on Facebook, and time spent on OSN were included as the control variables to see if they impact the dependent variable.

13.4 Hypotheses Testing

While privacy apathy is a relatively newer concept in IS, the concept has been gaining momentum as a way to gauge the indifference of a user towards privacy concerns (Sharma and Crossler 2014). With big data being collected and stored by millions of web sites, applications, agencies, and third parties, individuals may believe that there is no such thing as privacy in the age of Web 2.0 technologies. As stated by Mark Zuckerberg, the co-founder of Facebook on January 2010, privacy is no more a “social norm”. Similar sentiments were echoed by the United States Senate majority leader Harry Reid when he advised to “just calm down and understand that National Security Agency’s (NSA) PRISM isn’t anything that is brand new” (csmonitor.com 2013). Similarly, a recent survey showed that almost half of the Americans take NSA’s PRISM program of data surveillance as “no big deal” as these people believe that “they’re being tracked all over the Internet by companies like Google and Facebook” (csmonitor.com 2013). Thus, it is safe to hypothesize that users with privacy apathy put lower value and price to their personal information and thus, care less about information disclosure (Yoo et al. 2012).

  • H1: Privacy apathy would positively influence intention to disclose information on OSNs despite the threat of big data.

Privacy protection belief is the subjective possibility that consumers believe that their private information is protected as anticipated (Metzger 2004). In an online setting, users who exemplify higher protection beliefs are believed to have more control over their information and thus, are more in control over information disclosure and are more likely to disclose their personal information (Raschke et al. 2014). Thus, it is predicted that:

  • H2: Privacy protection belief would positively influence intention to disclose information on OSNs despite the threat of big data.

Privacy risk belief implies the probability of potential loss because of disclosure of personal information (Malhotra et al. 2004). It is deemed to be the cost of privacy as disclosing information is often considered risky. Such cost and risks associated to OSN can range from unintended third parties receiving users’ personal information to hacking of personal account based on information shared on OSN (Hogben 2007). Several studies have verified the negative effect of perceived privacy risk on people’s intention to disclose personal information on online transactions and activities (Li et al. 2010; Malhotra et al. 2004).

  • H3: Privacy risk belief would negatively influence intention to disclose information on OSNs despite the threat of big data.

Perceived benefits refer to a user’s overall expectation of positive outcomes from an OSN without any significant privacy threats (Bulgurcu 2012). Individuals are likely to give up a degree of privacy in return for potential benefits related to OSNs. In an OSN environment, the user’s fear in the form of losing control of personal information is compensated by the several benefits such as information, enjoyment, and convenience (Hogben 2007). Thus, the following is hypothesized:

  • H4: Perceived benefit would positively influence intention to disclose information on OSNs despite the threat of big data.

Privacy and control has often been linked together in prior work (Westin 1967). The ability of people to control their information has been emphasized as critical in any concept of privacy (Wolfe and Laufer 1974). Thus, it is no surprise to see that there has been an outcry regarding how users have lost control of their information on OSNs (Boyd 2008; Hoadley et al. 2010). When people tend to share information on OSN, it is often broadcasted to the network of friends. Sometimes, such information is accessed by the third party applications installed by the users. An individual believing lower information control on OSNs would believe that such information has been collected and stored by OSNs and third parties and thus, would have higher privacy apathy. Similarly, a sense of higher information control would lead to a positive privacy protection belief and a lower privacy risk belief. Thus, we posit:

  • H5: Perceived information control would negatively influence privacy apathy.

  • H6: Perceived information control would positively influence privacy protection belief.

  • H7: Perceived information control would negatively influence privacy risk belief.

Perceived ownership implies a sense of possession and entitlement (Furby 1978). In the case of information and OSNs, perceived ownership implies the sense of entitlement, possession, and attachment towards the information shared on OSNs (Feuchtl and Kamleitner 2009; Sharma and Crossler 2014). When individuals believe that the information shared on OSN is their information and contains some level of attachment with their identity and privacy, it positively influences their privacy risk belief (Sharma and Crossler 2014). Thus, it is hypothesized that:

  • H8: Perceived ownership would positively influence privacy risk belief.

Away from OSN, there are tremendous opportunities for people to maintain a relationship, enjoy life, consume information, and develop an offline real-life image. Users of OSN will perceive lower benefits from OSN use when they are enjoying many of similar benefits offline in their real life. Thus, existing benefits decrease the perceived benefits of future disclosure (Keith et al. 2012). Thus, we propose:

  • H9: Existing offline benefits would negatively influence perceived benefits of OSNs.

13.5 Hypotheses Testing

The proposed conceptual model will be evaluated using survey design. An online questionnaire survey has been developed to collect data and perform empirical tests of the relationships proposed in the research model. The survey design technique fits the research phenomenon being studied in this research as the objective of this research is to explore user’s information disclosure behavior on OSN. Also, a survey design provides the benefit of generalizability to the study as data could be collected from a wider range of respondents.

All the items used in the survey instrument are adapted from previous studies. The items are reflective likert-scale and have been adapted to fit the context of this study. The items for this study along with their respective original source/s have been presented in Table 13.1 below:

Table 13.1 Pilot survey instrument

Although constructs adopted from earlier studies have been rigorously tested for reliability and validity, additional content validation using a multi-stage iterative procedure is recommended (Churchill 1979). Podsakoff et al. (2003) also have suggested using an ex-ante approach such as expert panel review and a pilot test to control Common Method Bias (CMV). Thus, a preliminary investigation consisting of expert panel review, pretest, and pilot test will be conducted to ensure measurement validity of the instrument. The changes suggested by the expert panel review and pre- and pilot tests such as revisions to wordings to improve clarity and precision, dropping items to make the survey fatigue-free, revision of items to make them unambiguous, etc. will be incorporated. This will ensure content validity of our survey instruments and also reduce CMV. Similarly, to reduce CMV we will keep our survey anonymous, optional, and relatively short. We will also assess the extent of common method variance with two statistical tests. First, we will perform Harman’s single factor test by loading all of the items in a principal component factor analysis (Podsakoff et al. 2003). If the results show that there is more than a single factor that accounts for a majority of covariance, it would suggest absence of CMV in our study. However, as Harman’s single factor test is increasingly contested for its ability to detect common method bias, we will also use Lindell and Whitney’s (2001) test that uses a theoretically unrelated construct (termed a marker variable) to assess CMV. We will use “Perceived effectiveness of credit card guarantees” as our marker variable construct for this study and will use it to adjust the correlations among the principal constructs (Pavlou et al. 2007). The absence of high correlations among any of the items of the study’s principal constructs and perceived effectiveness of credit card guarantees would indicate that the study doesn’t have serious concerns about common method bias as the construct perceived effectiveness of credit card guarantees is expected to be weakly related to the study’s principal constructs.

Undergraduate students from different classes within a public university in California will be invited to complete the survey. The invitations will be sent through emails as well through classroom visits. As the age group of 18–25 years that are educated and college students are the ones that use the OSNs the most (Lenhart et al. 2010), it is appropriate to have undergraduate students as the sample for this study.

A primary investigation consisting of reliability and validity testing, model fit test (i.e. goodness of fit), common method bias test, and t-test is conducted to ensure the validity of the structural model. We will use SmartPLS 2.0, SPSS along with AMOS for our instrument validation and testing of the structural model. SmartPLS uses a Partial Least Square (PLS) regression technique that employs a component-based approach for estimation and places minimal restrictions on sample size, measurement scales and residual distributions (Chin and Todd 1995) and it does not impose normality requirements on the data. We will also use AMOS which is a covariance based structured equation model that provides various overall goodness-of-fit indices forassessing model fit and method variance.

Before testing the hypothesized structural model, we evaluate the psychometric properties of the measures. All the constructs in this study are measured with multiple items. A PLS confirmatory analysis will be conducted to examine convergent validity, discriminant validity, and reliability using commonly accepted guidelines (Churchill 1979). Reliability for the constructs will be measured using composite reliability score and Cronbach’s alpha. The Cronbach’s alpha and composite reliability examine the internal consistency among the data. For all the constructs in our study, we will also perform descriptive statistics of all the constructs including means and standard deviations and the level of each item’s contribution to the overall factor.

To further examine the validity of the measurement model, we will analyze how well the model fits the data with the help of model fit statistics available through AMOS (Anderson and Gerbing 1988). The goodness of fit index (GFI), comparative fit index (CFI), normed fit index (NFI) and incremental fit index (IFI) all assess the goodness of fit of the model with the data and should be above 0.90 to show model fit. Root mean square error of approximation (RMSEA) and Standardized Root Mean Square Residual (SRMR) which measures the “badness of fit” should both be below 0.05. Similarly, we will also assess if the relative chi-square (i.e. CMIN/df), which is also a “badness of fit”, is below the threshold of 3 (Kline 1998) and is thus non-significant. Together, the result would indicate if our hypothesized measurement model is “fitting” the observed data.

The hypotheses and the relationships used for this study will be tested by examining the structural model of our study. A bootstrapping resampling procedure will be performed to assess the significance of the path coefficients within the structural model. The proposed hypotheses for this research model will be tested using t-statistics (p-value) for the standardized path coefficients. The t-statistics (p-value) provided by PLS structural model analysis would show us if the hypothesis is supported or not while the standardized path coefficients would determine the direction and strength of the relationship between exogenous and endogenous variables. The study will have a satisfactory and substantive model if the dependent factors have R-square (the variance explained by the independent variables) greater than 0.10 (Falk and Miller 1992). Thus, we will examine if the proposed paths were mostly significant and how well our model explained the variances in our endogenous variables. Also, we will analyze the effect of our control variables age, gender, education, experience in social networking, and experience on the Internet on the intention to disclose information on OSNs.

13.6 Conclusion

13.6.1 Study Summarization

The objective of this research is to explore the factors that may affect user’s information disclosure behavior on online social networks. There has been limited research on why consumers choose to disclose personal information on OSN despite valuing in privacy. With big data analytics taking the center stage and OSNs becoming as the primary source of big data, privacy and security in social networks have become increasingly important. This research looks at factors that may explain individual’s information disclosure behavior. We use prospect theory and rational apathy theory in our research model. As outlined in our research model, the information disclosure decision of the invidiual depends on variables such as the privacy risk, protection beliefs, and perceived benefits to disclose information on OSNs. The users information disclosure decisions would also be affected by their belief about who owns the information being provided and how the information that has already been collected and stored bysocial media companies is being used by these companies. Thus, this study may help us expand the concept of apathy, risk belief and privacy calculus in regard to the context of information disclosure behavior.

We will be using survey research as our research methodology as this helps in increasing the generalizability of this study. The survey instrument for this research will be hosted in Qualtrics. The main data will be collected from students as they represent the general demographic that use online social network the most. Prior to collecting the data, a preliminary investigation will include expert panel reviews, pre-test, and pilot studies to confirm the reliability and validity of the survey instrument. The loadings, cross-loadings, content and face validity, and reliability will also be examined during the pilot study. Then the structural model will be used to test the path coefficient and t-values for our hypotheses.

13.6.2 Key Findings

We will discuss the key findings based on our data analysis in the future publication.

13.6.3 Contribution and Implications

This paper has several theoretical and practical implications. First, this paper brings together the concept of big data and OSNs to analyze the privacy behavior of OSN users. Previous research on privacy and information disclosure has focused on internet transactions, eCommerce, and social networks (Dinev and Hart 2006; Keith et al. 2012) but the concept of big data and its impact on privacy behavior of OSN users has been studied by very few researchers. Second, this paper brings the concept of privacy apathy and perceived ownership into focus. Users of OSNs are believed to be worried about losing privacy in the age of big data. This paper seeks to study if some of the users would care less about privacy if they believe that they have already lost the ownership of their information on the internet. Third, we are also expanding the prospect theory and apathy theory and the concept of the reference point in guiding OSN users to decide about their privacy-related behavior.

IS research has regularly faced the criticism of lacking relevance to practice (Baskerville and Myers 2004; Benbasat and Zmud 1999). As such, this paper provides value to practitioners in many different ways. First, this study is helpful to OSN providers and third parties as these organizations would now understand how consumer’s information disclosure behavior works. Second, this study helps us understand why people tend to disclose too much of their personal information on OSNs.

13.6.4 Limitations of this Study

McGrath (1995) stated that all research methods are inherently flawed, though each is flawed differently. Thus, the role of the researcher is always to minimize the flaws associated with the research by maximizing the three criteria of good research: generalizability, precision, and realism). This research is no exception to other research and thus, has its limitations. Some of the limitations of this study pertain to the generalizability of the study due to sample frame used for this study, theoretical constructs excluded from the study to achieve parsimonious research model, research method used for testing the proposed model, and use of self-reported scales. However, understanding these limitations also provides with the opportunities for future research. As this research is a research-in-progress, understanding these limitations will also provide us with the opportunities for strengthening the next steps in our research plan and our future research.

Biographies

Shwadhin Sharma is an Assistant Professor in the College of Business at California State University Monterey Bay. His research interests are in the areas of technical and behavioral aspects of big data analytics, privacy and security, electronic commerce and social commerce, role of dispositional factors in IT, and IT adoption and discontinuation. He has published his research in journals such as Journal of Computers Information Systems, Electronic Commerce Research and Applications and Computers & Security and academic conferences. He has served as reviewer for several reputed journals and conferences. He is currently serving on the editorial board of International Journal of the Internet of Things and Cyber-Assurance. He has also co-chaired as a SIGDSA mini-track on “Social Network Analytics in Big Data Environment” in AMCIS 2016.

Babita Gupta is Professor of Information Systems and the Director of AACSB Accreditation at the College of Business, California State University Monterey Bay. She teaches courses in information technology innovation strategies, business intelligence & analytics, database management, and information systems for decision making. Her research interests are in the areas of online security and privacy, business intelligence strategies, technology adoption, and the role of culture in IT. She has published in journals such as the Communications of the Association for Information Systems (CAIS), Journal of Electronic Commerce Research (JECR), the Journal of Strategic Information Systems (JSIS), the Communications of the ACM (CACM), the Journal of Industrial Management and Data System, the Journal of Scientific and Industrial Research, the Journal of Information Technology Cases and Applications, and the Journal of Computing and Information Technology.

She serves as an Advisory Board Member of the Teradata University Network, a non-profit division of Teradata.com. She was elected as the Program-Chair-Elect Officer in 2012 for the Special Interest Group on Decision Support and Analytics (SIGDSA) under the Association for information Systems (AIS) organization. She has also served as a Board Member of the California Coastal Rural Development Corporation for over a decade.