The Effects of Applying Privacy by Design to Preserve Privacy and Personal Data Protection in Mobile Cloud Computing: An Exploratory Study

被引:5
作者
Alnajrani, Hussain Mutlaq [1 ,2 ]
Norman, Azah Anir [1 ]
机构
[1] Univ Malaya, Fac Comp Sci & Informat Technol, Kuala Lumpur 50603, Malaysia
[2] Albaha Univ, Fac Comp Sci & Informat Technol, Albaha, Saudi Arabia
来源
SYMMETRY-BASEL | 2020年 / 12卷 / 12期
关键词
mobile cloud computing; privacy; personal data protection; privacy by design; SECURITY BEHAVIORS; HEALTH; EXPERIENCE; MODELS;
D O I
10.3390/sym12122039
中图分类号
O [数理科学和化学]; P [天文学、地球科学]; Q [生物科学]; N [自然科学总论];
学科分类号
07 ; 0710 ; 09 ;
摘要
Mobile cloud computing (MCC) is a domain that stemmed from advances in mobile technology and cloud computing. Although debate continues about the best strategies to preserve privacy and personal data protection in MCC, it is essential to explore the effects of applying privacy by design (PbD) to preserve privacy and personal data protection in MCC. PbD is a general philosophy that demonstrates privacy should not be overviewed as an afterthought, but rather as a first-class requirement in the design of IT systems. This study explores the effects of applying PbD to preserve privacy and personal data protection in MCC, and is focused on the privacy of personal data. In this exploration, a framework using PbD has been demonstrated, and seven hypotheses were formulated. Moreover, a survey was implemented where 386 responses were used to test the formulated hypotheses. The results of this study supported the perceived benefits, cues to action of PbD, and perceived threat are positively and directly related to privacy and personal data protection behavior in MCC. Moreover, the results supported that the perceived barriers are negatively and directly related to privacy and personal data protection behavior in MCC. Overall, the results support the utilization of PbD to preserve privacy and personal data protection in MCC and encourage the practitioners to utilize PbD to preserve privacy and personal data protection in MCC.
引用
收藏
页码:1 / 24
页数:24
相关论文
共 97 条
[1]   Discriminant Validity Assessment: Use of Fornell & Larcker criterion versus HTMT Criterion [J].
Ab Hamid, M. R. ;
Sami, W. ;
Sidek, M. H. Mohmad .
1ST INTERNATIONAL CONFERENCE ON APPLIED & INDUSTRIAL MATHEMATICS AND STATISTICS 2017 (ICOAIMS 2017), 2017, 890
[2]   Rich Mobile Applications: Genesis, taxonomy, and open issues [J].
Abolfazli, Saeid ;
Sanaei, Zohreh ;
Gani, Abdullah ;
Xia, Feng ;
Yang, Laurence T. .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2014, 40 :345-362
[3]   Dynamic software updating: a systematic mapping study [J].
Ahmed, Babiker Hussien ;
Lee, Sai Peck ;
Su, Moon Ting ;
Zakari, Abubakar .
IET SOFTWARE, 2020, 14 (05) :468-481
[4]   The Effects of Static Analysis for Dynamic Software Updating: An Exploratory Study [J].
Ahmed, Babiker Hussien ;
Lee, Sai Peck ;
Su, Moon Ting .
IEEE ACCESS, 2020, 8 :35161-35171
[5]  
Al Khater N.R., 2017, THESIS
[6]   Cybersecurity and privacy issues for socially integrated mobile healthcare applications operating in a multi-cloud environment [J].
Al-Muhtadi, Jalal ;
Shahzad, Basit ;
Saleem, Kashif ;
Jameel, Wasif ;
Orgun, Mehmet A. .
HEALTH INFORMATICS JOURNAL, 2019, 25 (02) :315-329
[7]   Current State of Cloud Computing Adoption - An Empirical Study in Major Public Sector Organizations of Saudi Arabia (KSA) [J].
Al-Ruithe, Majid ;
Benkhelifa, Elhadj ;
Hameed, Khawar .
14TH INTERNATIONAL CONFERENCE ON MOBILE SYSTEMS AND PERVASIVE COMPUTING (MOBISPC 2017) / 12TH INTERNATIONAL CONFERENCE ON FUTURE NETWORKS AND COMMUNICATIONS (FNC 2017) / AFFILIATED WORKSHOPS, 2017, 110 :378-385
[8]   Privacy and Security Issues in Online Social Networks [J].
Ali, Shaukat ;
Islam, Naveed ;
Rauf, Azhar ;
Din, Ikram Ud ;
Guizani, Mohsen ;
Rodrigues, Joel J. P. C. .
FUTURE INTERNET, 2018, 10 (12)
[9]   Privacy and data protection in mobile cloud computing: A systematic mapping study [J].
Alnajrani, Hussain Mutlaq ;
Norman, Azah Anir ;
Ahmed, Babiker Hussien .
PLOS ONE, 2020, 15 (06)
[10]  
Alnemr R., 2015, ser. Lecture Notes in Computer Science, P60