The Effects of Applying Privacy by Design to Preserve Privacy and Personal Data Protection in Mobile Cloud Computing: An Exploratory Study

被引:5
作者
Alnajrani, Hussain Mutlaq [1 ,2 ]
Norman, Azah Anir [1 ]
机构
[1] Univ Malaya, Fac Comp Sci & Informat Technol, Kuala Lumpur 50603, Malaysia
[2] Albaha Univ, Fac Comp Sci & Informat Technol, Albaha, Saudi Arabia
来源
SYMMETRY-BASEL | 2020年 / 12卷 / 12期
关键词
mobile cloud computing; privacy; personal data protection; privacy by design; SECURITY BEHAVIORS; HEALTH; EXPERIENCE; MODELS;
D O I
10.3390/sym12122039
中图分类号
O [数理科学和化学]; P [天文学、地球科学]; Q [生物科学]; N [自然科学总论];
学科分类号
07 ; 0710 ; 09 ;
摘要
Mobile cloud computing (MCC) is a domain that stemmed from advances in mobile technology and cloud computing. Although debate continues about the best strategies to preserve privacy and personal data protection in MCC, it is essential to explore the effects of applying privacy by design (PbD) to preserve privacy and personal data protection in MCC. PbD is a general philosophy that demonstrates privacy should not be overviewed as an afterthought, but rather as a first-class requirement in the design of IT systems. This study explores the effects of applying PbD to preserve privacy and personal data protection in MCC, and is focused on the privacy of personal data. In this exploration, a framework using PbD has been demonstrated, and seven hypotheses were formulated. Moreover, a survey was implemented where 386 responses were used to test the formulated hypotheses. The results of this study supported the perceived benefits, cues to action of PbD, and perceived threat are positively and directly related to privacy and personal data protection behavior in MCC. Moreover, the results supported that the perceived barriers are negatively and directly related to privacy and personal data protection behavior in MCC. Overall, the results support the utilization of PbD to preserve privacy and personal data protection in MCC and encourage the practitioners to utilize PbD to preserve privacy and personal data protection in MCC.
引用
收藏
页码:1 / 24
页数:24
相关论文
共 97 条
[61]   The antecedents of preventive health care behavior: An empirical study [J].
Jayanti, RK ;
Burns, AC .
JOURNAL OF THE ACADEMY OF MARKETING SCIENCE, 1998, 26 (01) :6-15
[62]   How to Assess the External Validity and Model Validity of Therapeutic Trials: A Conceptual Approach to Systematic Review Methodology [J].
Khorsan, Raheleh ;
Crawford, Cindy .
EVIDENCE-BASED COMPLEMENTARY AND ALTERNATIVE MEDICINE, 2014, 2014
[63]   Understanding Information Security Behaviours of Tanzanian Government Employees: A Health Belief Model Perspective [J].
Koloseni, Daniel Ntabagi ;
Lee, Chong Yee ;
Gan, Ming-Lee .
INTERNATIONAL JOURNAL OF TECHNOLOGY AND HUMAN INTERACTION, 2019, 15 (01) :15-32
[64]   A Strategy for Operationalizing Privacy by Design [J].
Kroener, Inga ;
Wright, David .
INFORMATION SOCIETY, 2014, 30 (05) :355-365
[65]  
Langheinrich M., 2001, P INT C UB COMP ATL, P73
[66]   Privacy by Design: A Matter of Choice [J].
Le Metayer, Daniel .
DATA PROTECTION IN A PROFILED WORLD, 2010, :323-334
[67]  
Lee J, 2010, EDUC TECHNOL SOC, V13, P152
[68]   Robust access control framework for mobile cloud computing network [J].
Li, Fei ;
Rahulamathavan, Yogachandran ;
Conti, Mauro ;
Rajarajan, Muttukrishnan .
COMPUTER COMMUNICATIONS, 2015, 68 :61-72
[69]  
Maurushat Alana., 2019, ETHICAL HACKING
[70]  
Ng BY, 2007, PACIFIC ASIA CONFERENCE ON INFORMATION SYSTEMS 2007, SECTIONS 1-6