scholarly journals Emerging Applications on Smart Phones: The Role of Privacy Concerns and its Antecedents on Smart Phones Usage

Author(s):  
Waleed Al-Ghaith

Many applications on smart Phones can use various sensors embedded in the mobiles to provide users’ private information. This can result in a variety of privacy issues that may lessening level of mobile apps usage. To understand this issue better the researcher identified the root causes of privacy concerns. The study proposed a model identifies the root causes of privacy concerns and perceived benefits based on our interpretation for information boundary theory. The proposed model also addresses the usage behavior and behavioral intention toward using mobile apps by using the Theory of Planned Behavior. The result shows that “Cultural values” alone explains 70% of “Perceived privacy concerns” followed by “Self-defense” which explains around 23% of “Perceived privacy concerns”, and then “Context of the situation” with 5%. Whereas, the findings show that “Perceived effectiveness of privacy policy” and “Perceived effectiveness of industry self-regulation” both are factors which have the ability to reduce individuals “Perceived privacy concerns” by 9% and 8% respectively.

2019 ◽  
Vol 32 (6) ◽  
pp. 1679-1703 ◽  
Author(s):  
Le Wang ◽  
Zao Sun ◽  
Xiaoyong Dai ◽  
Yixin Zhang ◽  
Hai-hua Hu

Purpose The purpose of this paper is to facilitate understanding of how to mitigate the privacy concerns of users who have experienced privacy invasions. Design/methodology/approach Drawing on the communication privacy management theory, the authors developed a model suggesting that privacy concerns form through a cognitive process involving threat-coping appraisals, institutional privacy assurances and privacy experiences. The model was tested using data from an empirical survey with 913 randomly selected social media users. Findings Privacy concerns are jointly determined by perceived privacy risks and privacy self-efficacy. The perceived effectiveness of institutional privacy assurances in terms of established privacy policies and privacy protection technology influences the perceptions of privacy risks and privacy self-efficacy. More specifically, privacy invasion experiences are negatively associated with the perceived effectiveness of institutional privacy assurances. Research limitations/implications Privacy concerns are conceptualized as general concerns that reflect an individual’s worry about the possible loss of private information. The specific types of private information were not differentiated. Originality/value This paper is among the first to clarify the specific mechanisms through which privacy invasion experiences influence privacy concerns. Privacy concerns have long been viewed as resulting from individual actions. The study contributes to literature by linking privacy concerns with institutional privacy practice.


2021 ◽  
Vol 29 (3) ◽  
pp. 131-164
Author(s):  
John H. Benamati ◽  
Zafer D. Ozdemir ◽  
H. Jeff Smith

The global nature of e-commerce is complicating privacy issues because perceptions of privacy, trust, risk, and fair information practices vary across cultures, and differences in national regulation create challenges for global information management strategies. Despite the spike in international regulatory attention devoted to privacy issues and the tensions associated with them, there has been very little research on the relationship between information privacy concerns and consumers' regulatory preferences, and even rarer is research that incorporates cultural values into a framework that includes privacy concerns and regulation. This study examines privacy concerns, a full complement of cultural values, trust, risk, and regulation at the individual level in a cohesive manner. Relying on a dataset of consumers gathered in the United States and India, the authors test a model that incorporates these constructs as well as trust and risk beliefs. The model explains 48% of the variance in consumers' regulatory preferences, and all but one of the hypotheses find statistical support.


Information ◽  
2021 ◽  
Vol 12 (8) ◽  
pp. 311
Author(s):  
Jie Tang ◽  
Bin Zhang ◽  
Umair Akram

Personal information has been likened to “golden data”, which companies have chased using every means possible. Via mobile apps, the incidents of compulsory authorization and excessive data collection have evoked privacy concerns and strong repercussions among app users. This manuscript proposes a privacy boundary management model, which elaborates how such users can demarcate and regulate their privacy boundaries. The survey data came from 453 users who authorized certain operations through mobile apps. The partial least squares (PLS) analysis method was used to validate the instrument and the proposed model. Results indicate that information relevance and transparency play a significant role in shaping app users’ control–risk perceptions, while government regulation is more effective than industry self-discipline in promoting the formation of privacy boundaries. Unsurprisingly, privacy risk control perceptions significantly affect users’ privacy concerns and trust beliefs, which are two vital factors that ultimately influence their willingness to authorize. The implications of conducting a thorough inquiry into app users’ willingness to authorize their privacy information are far-reaching. In relation to this, app vendors should probe into the privacy-relevant beliefs of their users and enact effective privacy practices to intercept the economic and reputational damages induced by improper information collection. More significantly, a comprehensive understanding of users’ willingness to authorize their information can serve as an essential reference for relevant regulatory bodies to formulate reasonable privacy protection policies in the future.


Author(s):  
M. Manikandakumar ◽  
E. Ramanujam

In this information era, big data is revolutionizing business. The data are generated by each and every user from servers, terminals, smart phones, appliances, satellites, and a range of other sensors on vehicles: military, agriculture, and the like. Anything the end users does online can be traced, stored, and analyzed. It is also possible to analyze from various diverse sources such as social media postings, credit card or e-cash purchases, internet searches, mobile phone locations, etc. Users are willing to provide their private information, linked to their real-life identities, in exchange for faster or better digital services. But, the companies yet may not have the fundamental rights of the user from a security perspective. More risks are associated with big data security. The main purpose of this chapter is to explore the security concerns and privacy issues in big data environments.


Author(s):  
M. Manikandakumar ◽  
E. Ramanujam

In this information era, big data is revolutionizing business. The data are generated by each and every user from servers, terminals, smart phones, appliances, satellites, and a range of other sensors on vehicles: military, agriculture, and the like. Anything the end users does online can be traced, stored, and analyzed. It is also possible to analyze from various diverse sources such as social media postings, credit card or e-cash purchases, internet searches, mobile phone locations, etc. Users are willing to provide their private information, linked to their real-life identities, in exchange for faster or better digital services. But, the companies yet may not have the fundamental rights of the user from a security perspective. More risks are associated with big data security. The main purpose of this chapter is to explore the security concerns and privacy issues in big data environments.


2010 ◽  
pp. 2046-2065
Author(s):  
Veda C. Storey ◽  
Gerald C. Kane ◽  
Kathy Stewart Schwaig

Privacy concerns and practices, especially those dealing with the acquisition and use of consumer personal information by corporations, are at the forefront of business and social issues associated with the information age. This research examines the privacy policies of large U.S. companies to assess the substance and quality of their stated information practices. Six factors are identified that indicate the extent to which a firm is dependent upon consumer personal information, and therefore more likely to develop high quality privacy statements. The study’s findings provide practical and theoretical implications for information privacy issues, particularly for consumers who need to determine whether or not to disclose their personal identifying information to firms. The results illustrate the complexity involved in managing personal private information.


2019 ◽  
Vol 33 (4) ◽  
pp. 1174-1213 ◽  
Author(s):  
Xiang Gong ◽  
Kem Z.K. Zhang ◽  
Chongyang Chen ◽  
Christy M.K. Cheung ◽  
Matthew K.O. Lee

Purpose Drawing on the control agency theory and the network effect theory, the purpose of this paper is to examine the effect of privacy assurance approaches, network externality and technology complementarity on consumers’ self-disclosure in mobile payment (MP) applications. The authors identify four types of privacy assurance approaches: perceived effectiveness of privacy setting, perceived effectiveness of privacy policy, perceived effectiveness of industry self-regulation and perceived effectiveness of government legislation. The research model considers how these privacy assurance approaches influence privacy concerns and consumers’ self-disclosure in MP applications under boundary conditions of network externality and technology complementarity. Design/methodology/approach An online survey with 647 sample users was conducted to empirically validate the model. The target respondents were current consumers of a popular MP application. The empirical data were analyzed by a structural equation modeling approach. Findings The empirical results reveal several major findings. First, privacy assurance approaches can effectively decrease privacy concerns, which ultimately formulates consumers’ self-disclosure in MP applications. Second, network externality and technology complementarity weaken the effect of perceived effectiveness of privacy setting on privacy concerns. Third, network externality and technology complementarity strengthen the relationship between perceived effectiveness of government legislation and privacy concerns, while they have non-significant interaction effect with perceived effectiveness of privacy policy and industry self-regulation on privacy concerns. Practical implications MP providers and stakeholders can harness the efficacy of privacy assurance approaches in alleviating privacy concerns and promoting consumers’ self-disclosure in MP applications. Originality/value The authors’ work contributes to the information privacy literature by identifying effective privacy assurance approaches in promoting consumers’ self-disclosure in MP applications, and by highlighting boundary conditions of these privacy assurance approaches.


Author(s):  
Shankar Chaudhary

Despite being in nascent stage m-commerce is gaining momentum in India. The explosive growth of smart-phone users has made India much loved business destination for whole world. Indian internet user is becoming the second largest in the world next to China surpassing US, which throws open plenty of e-commerce opportunities, not only for Indian players, offshore players as well. Mobile commerce is likely to overtake e-commerce in the next few years, spurred by the continued uptrend in online shopping and increasing use of mobile apps.The optimism comes from the fact that people accessing the Internet through their mobiles had jumped 33 per cent in 2014 to 173 million and is expected to grow 21 per cent year-on-year till 2019 to touch 457 million. e-Commerce brands are eyeing on the mobile app segment by developing user-friendly and secure mobile apps offering a risk-free and easy shopping experience to its users. Budget 4G smart phones coupled with affordable plans, can very well drive 4G growth in India.


2015 ◽  
Vol 8 (1) ◽  
Author(s):  
Himanshu Rajput

Social networking sites (SNSs) have become popular in India with the proliferation of Internet. SNSs have gained the interests of academicians and researchers. The current study is an endeavor to understand the continuance of social networking sites in India. The study applies an extended version of theory of planned behavior. Additional factors privacy concerns and habits were incorporated into the standard theory of planned behaviour. A survey was conducted in a Central University in India. Overall, data was collected from 150 respondents. PLS-SEM was used to test the proposed model. All the hypotheses except the moderating role of habits between intentions and continued use of social networking sites, were supported by the results. Habits were found to affect continued use of social networking sites indirectly through continued intentions.


Sign in / Sign up

Export Citation Format

Share Document