DOI QR코드

DOI QR Code

The determinants of increasing privacy concerns in the mobile apps

  • Received : 2012.04.13
  • Accepted : 2012.06.17
  • Published : 2012.06.28

Abstract

This study identifies the determinants of increasing privacy concerns in the mobile apps. The privacy affecting factors will be divided into the 3 categories on the basis of both users' and developers' perspective. First, this study explores whether the users' seeking value affects concern of the mobile apps privacy. Second, gender gap on the mobile privacy sensitivity will be tested. Third, this study identifies the meaning of apps developers' providing toolkit in the users' sensitivity on the privacy. The result showed that innovation among the customer's characteristics was identified the most significant factor to affect the mobile app privacy sensitivity. Ethical norm related variables (ethical identity, subjective norm and utilitarian value) were also identified as the meaningful variables in the mobile app privacy. Toolkits provided by app developers are also appeared a significant variable to affect the customer's app privacy sensitivity negatively. Finally gender also appears the meaningful factor in the mobile app privacy sensitivity.

Keywords

References

  1. Ajzen (1991), "The theory of planned behavior," Organizational Behavior and Human Decision Processes, 50, pp. 179-211. https://doi.org/10.1016/0749-5978(91)90020-T
  2. Aiken, K. D. and Boush D. M. (2006), "Trustmarks, objective-source ratings, and implied investments in advertising: investigating online trust and the contextspecific nature of Internet signals," Journal of the academy of marketing science, 34(3), pp. 308-323. https://doi.org/10.1177/0092070304271004
  3. Ashworth, L. and Free C. (2006), "Marketing dataveillance and digital privacy: Using theories of justice to understand to consumers' online privacy concerns," Journal of business ethics, 67, pp. 107-123. https://doi.org/10.1007/s10551-006-9007-7
  4. Babin, B. J., Darden W. R. and Griffin M. (1994), "Work and/or fun: Measuring hedonic and utilitarian shopping value," Journal of consumer research, 20, March, pp. 644-656. https://doi.org/10.1086/209376
  5. Bilton, N. (2012a), Disruptions: And the privacy gaps just keep on coming, NYTIMES, February 19.
  6. Bilton, N. (2012 b), F.T.C. Finds Privacy Problems with Apps for Children, NYTIMES, February 16.
  7. Bloch, P. H. and Richins M. L. (1983), "Shopping without purchase: An investigation of consumer browsing behavior," Advances in consumer research, 10, pp. 389-393.
  8. Buchanan, T., Paine C, Joinson A. N. and Reips U. (2007), "Development of measure of online privacy concern and protection for user on the internet," Journal of the American society for information science and technology, 58(2), pp. 157-165. https://doi.org/10.1002/asi.20459
  9. DeCew, J. (1997). In pursuit of privacy: Law, ethics, and the rise of technology. Ithaca, NY: Cornell University Press
  10. Deci, E. L., Betley G., Kahle J., Abraham L. Porac J. (1981), "When trying to win: Competition and intrinsic motivation," Personality and Social psychology bulletin, 7(March), pp. 79-83. https://doi.org/10.1177/014616728171012
  11. Emarketer (2008), College students' social networking, September 22, available at http://www. emarketer. com
  12. Fisher, R. J. and Price L. L. (1992), "An investigation into social context of early adoption behavior," Journal of Consumer Research, 19(3), pp. 477-486. https://doi.org/10.1086/209317
  13. Fogel, J. and NehmadE. (2009), "Internet Social Network Communities: Risk Taking, Trust and Privacy Concerns," Computers in Human Behavior, 25, pp.153-160. https://doi.org/10.1016/j.chb.2008.08.006
  14. FPF (2010), "Future of Privacy Forum Releases Behavioral Notices Study," available at http://www. futureofprivacy.org /2010/01/27/(accessed January 29, 2010).
  15. FTC (2012), "Mobile apps for kids: Current privacy disclosure are disappointing," Staff Report, Http://www. ftc.goc/os/2012/02/120216mobile_apps_kids.pdf.
  16. Gefen, D., Karahana E., and Straub D. W. (2003), "Trust and TAM in online shopping: An integrated model," MIS quarterly, 27(1), pp. 51-90. https://doi.org/10.2307/30036519
  17. Hirshman, E. C. (1980), "Innovativeness, Novelty seeking and consumer creativity," Journal of consumer research, 7, December, pp. 283-295. https://doi.org/10.1086/208816
  18. Hoy, M. and Milne G. (2010), "Gender differences in privacy-related measure for young adult Facebook users," Journal of interactive advertising, 10(2), pp. 28-45. https://doi.org/10.1080/15252019.2010.10722168
  19. Hung C., Chou J. C. and Dong T. (2011), "Innovation and communication through innovative users: An exploratory mechanism of social networking website," International journal of information management, 31, pp. 317-326. https://doi.org/10.1016/j.ijinfomgt.2010.12.003
  20. Javelin strategy and Research (2009), "Latest Jave line research shows identity fraud increased 22 percent," May, 1, available at http://javelinestrategy.com
  21. John L. K., Acquisti A. and Lowenstein G. (2011), "Strangers on a plane: Context-dependent willingness to divulge sensitive information," Journal of consumer research, 37, February, pp. 858-873. https://doi.org/10.1086/656423
  22. Manning, M. (2009), "The effects of subjective norms on behavior in the theory of planned behavior: A metaanalysis," British journal of social psychology, 48, pp. 649-705. https://doi.org/10.1348/014466608X393136
  23. Midgley, D. F. and Dowling G. R. (1978), "Innovativeness: The concept and its measurement," Journal of consumer research, 4, March, pp. 229-242. https://doi.org/10.1086/208701
  24. Milne, G. R. and Culnan M. J. (2004), "Strategy for reducing online privacy risks: Why consumers read (or don't read) online privacy notices," Journal of interactive marketing, 18(3), pp. 15-29. https://doi.org/10.1002/dir.20009
  25. Miyazaki, D. and Krishnamurthy S (2002), Internet seals of approval: Effects on online privacies and consumer perceptions," Journal of consumer affairs, 36, summer, pp.28-49. https://doi.org/10.1111/j.1745-6606.2002.tb00419.x
  26. Nonaka, I. (1994), "A dynamic theory of organizational knowledge creation," Organization Science, 5(1), pp. 14-37. https://doi.org/10.1287/orsc.5.1.14
  27. Okazaki S., Li H. and Hirose M. (2009), "Consumer privacy concerns and reference for degree of regulation control," Journal of advertising, 38(4), pp.63-77.
  28. OECD (2003), Privacy online: OECD guidance on policy and practice, at http://www.1.oecd.org/publications/ebook/ 9303051E.pdf
  29. Pagani, M. and Hofacker C. F. and Goldsmith R. E. (2011), "The influence of personality on active and passive user of social networking sites," Psychology and marketing, 28(4), pp. 441- 456. https://doi.org/10.1002/mar.20395
  30. Palmer, D. (2005), "Pop-ups, Cookies, and Spam: Toward a deeper analysis of the ethical significance of Internet marketing practices," Journal of business ethics, 58(1), pp. 271-280. https://doi.org/10.1007/s10551-005-1421-8
  31. Perlroth, N. and Bilton N. (2012), Mobile apps tale data without permission. NYTIMES, February 1.
  32. Pollach, I. (2005), "A typology of communicative strategies in online privacy policies: Ethics, Power and informed consent," Journal business ethics, 62, pp. 221- 235. https://doi.org/10.1007/s10551-005-7898-3
  33. Pool, G. J. and Schwegler A. F. (2007), "Differentiating among motives for norm conformity," Basic and Applied Social Psychology, 29(1), pp. 47-60. https://doi.org/10.1080/01973530701330983
  34. Rogers E. M. and Shoemaker F. F. (1971), Communication of innovation. New York: The Free Press.
  35. Rapp, J., Hill R. P., Gaines J. and Wilson R. M. (2009), "Advertising and consumer privacy," Journal of advertising, 38(4), pp. 51-61.
  36. Shaw, D. and Shiu E. (2003), "Ethics in consumer choice: a multivariable modeling approach," European journal of marketing, 37(10), pp. 1485-1498. https://doi.org/10.1108/03090560310487202
  37. Sheehan, K. B. (1999), "An investigation of gender difference in online privacy concerns and resultant behaviors," Journal of interactive marketing, 13(4), pp. 24-38. https://doi.org/10.1002/(SICI)1520-6653(199923)13:4<24::AID-DIR3>3.0.CO;2-O
  38. Sparks, P., Shepherd R. and Frewer L. J. (1995), "Assessing and structuring attitudes toward the use of gene technology in food production: the role of perceived ethical obligation," Basic an applied social psychology, 16(3), pp. 267-285. https://doi.org/10.1207/s15324834basp1603_1
  39. Stanaland, A. J. W., Lwin M. O. and Miyazaki A. D., "Online privacy trust-marks," Journal of advertising research, September, pp. 511- 523.
  40. Taylor, D. G., Lewin J. and Strutton D. (2011), "Friends, Fans and followers: Do ads work on social networks?: How gender and age shape receptivity," Journal of advertising research, March, pp. 258-275.
  41. TRUSTe (2011), Mobile privacy: A user's perspective. Harris Interactive, April.
  42. Turban E., King, D. and Land, J. (2009), Introduction to electronic commerce, Prentice Hall.
  43. Turow, J. (2004), American and Online privacy: The system in broken, A report from the Annenberg public policy center of the university of Pennsylvania.
  44. Warren, S. and Brandeis L. (1890), "The right of privacy," Harvard law review, 4( 5), pp. 193-220. https://doi.org/10.2307/1321160
  45. Weiser, R. (2000), "Gender Differences in Internet Use Patterns and Internet Application Preferences: A Two- Sample Comparison," Cyber Psychology and Behavior, 3( 2), pp. 167-178. https://doi.org/10.1089/109493100316012
  46. Westin, A. F. (1967), Privacy and Freedom. Atheneum, New York.
  47. WHOA (2009), "Comparison statistics 2000-2009," available at http://haltabuse.org/resources/stats/cumulative 2000-2007.pdf
  48. Wolin, L.and Korgaonkar P. (2003), "Web Advertising: Gender Differences in Beliefs, Attitudes and Behavior," Internet Research, 13(5), pp.375-385. https://doi.org/10.1108/10662240310501658
  49. Weiss S. (2009), "Privacy threat model for data portability in social network applications," International journal of information management, 29, pp. 249-254. https://doi.org/10.1016/j.ijinfomgt.2009.03.007

Cited by

  1. Assessment criteria for parents to determine the trustworthiness of maternal and child health apps: a pilot study vol.8, pp.1-2, 2018, https://doi.org/10.1007/s12553-018-0216-8