Mobile application security: Role of perceived privacy as the predictor of security perceptions

被引:138
作者
Balapour, Ali [1 ]
Nikkhah, Hamid Reza [1 ]
Sabherwal, Rajiv [1 ]
机构
[1] Univ Arkansas, Dept Informat Syst, Sam M Walton Coll Business, Fayetteville, AR 72701 USA
关键词
Mobile applications; Communication privacy management (CPM); Perceived privacy; Perceived security; Privacy policy; STRUCTURAL EQUATION MODELS; INFORMATION PRIVACY; TECHNOLOGY IDENTITY; LATENT INTERACTIONS; CALCULUS MODEL; SELF-EFFICACY; E-COMMERCE; ONLINE; DISCLOSURE; DETERMINANTS;
D O I
10.1016/j.ijinfomgt.2019.102063
中图分类号
G25 [图书馆学、图书馆事业]; G35 [情报学、情报工作];
学科分类号
1205 ; 120501 ;
摘要
Despite mobile applications being at the frontier of mobile computation technologies, security issues pose a threat to their adoption and diffusion. Recent studies suggest that security violations could be mitigated through improved security behaviors and attitudes, not just through better technologies. Existing literature on behavioral security suggests that one of the main predictors of users' perceptions of security is their perceived privacy concerns. Using communication privacy management theory (CPM), this study examines the effects of privacy-related perceptions, such as privacy risk and the effectiveness of privacy policies, on the security perceptions of mobile app users. To empirically test the proposed theoretical model, two survey studies were conducted using mobile apps requesting less sensitive information (n = 487) and more sensitive information (n = 559). The findings show that the perceived privacy risk negatively influences the perceived security of the mobile apps; the perceived effectiveness of a privacy policy positively influences user perceptions of mobile app security; and perceived privacy awareness moderates the effect of perceived privacy risk on the perceived security of mobile apps. The results also suggest that users have different privacy-security perceptions based on the information sensitivity of the mobile apps. Theoretical and practical implications are discussed.
引用
收藏
页数:13
相关论文
共 91 条
[1]   Privacy and rationality - A survey [J].
Acquisti, A ;
Grossklags, J .
PRIVACY AND TECHNOLOGIES OF IDENTITY: A CROSS-DISCIPLINARY CONVERSATION, 2006, :15-29
[2]   Privacy and human behavior in the age of information [J].
Acquisti, Alessandro ;
Brandimarte, Laura ;
Loewenstein, George .
SCIENCE, 2015, 347 (6221) :509-514
[3]  
Amazon, 2017, AM PRIV NOT
[4]   The Digitization of Healthcare: Boundary Risks, Emotion, and Consumer Willingness to Disclose Personal Health Information [J].
Anderson, Catherine L. ;
Agarwal, Ritu .
INFORMATION SYSTEMS RESEARCH, 2011, 22 (03) :469-490
[5]  
[Anonymous], 2018, BBC
[6]  
Awad NF, 2006, MIS QUART, V30, P13
[7]  
Balapour A., 2017, P AM C INF SYST
[8]   Mobile technology identity and self-efficacy: Implications for the adoption of clinically supported mobile health apps [J].
Balapour, Ali ;
Reychav, Iris ;
Sabherwal, Rajiv ;
Azuri, Joseph .
INTERNATIONAL JOURNAL OF INFORMATION MANAGEMENT, 2019, 49 :58-68
[9]  
Bank of America, 2018, BANK AM US ONL PRIV
[10]   Distinguishing between Privacy and Security Concerns: An Empirical Examination and Scale Validation [J].
Bansal, Gaurav .
JOURNAL OF COMPUTER INFORMATION SYSTEMS, 2017, 57 (04) :330-343