JOURNAL BROWSE
Search
Advanced SearchSearch Tips
The determinants of increasing privacy concerns in the mobile apps
facebook(new window)  Pirnt(new window) E-mail(new window) Excel Download
 Title & Authors
The determinants of increasing privacy concerns in the mobile apps
Baek, Young-Mi; Ohk, Kyung-Young;
  PDF(new window)
 Abstract
This study identifies the determinants of increasing privacy concerns in the mobile apps. The privacy affecting factors will be divided into the 3 categories on the basis of both users' and developers' perspective. First, this study explores whether the users' seeking value affects concern of the mobile apps privacy. Second, gender gap on the mobile privacy sensitivity will be tested. Third, this study identifies the meaning of apps developers' providing toolkit in the users' sensitivity on the privacy. The result showed that innovation among the customer's characteristics was identified the most significant factor to affect the mobile app privacy sensitivity. Ethical norm related variables (ethical identity, subjective norm and utilitarian value) were also identified as the meaningful variables in the mobile app privacy. Toolkits provided by app developers are also appeared a significant variable to affect the customer's app privacy sensitivity negatively. Finally gender also appears the meaningful factor in the mobile app privacy sensitivity.
 Keywords
mobile apps;online privacy;privacy concerns;ethical identity;consumer value;
 Language
English
 Cited by
1.
지방자치단체의 모바일 앱 서비스 이용 활성화 방안에 관한 연구: 부산광역시를 중심으로,정수희;홍순구;차윤숙;김종원;

한국산업정보학회논문지, 2013. vol.18. 2, pp.71-83 crossref(new window)
2.
무선 센서망에서 생체시스템 기반의 전송노드 선택 및 다중 채널 전송 알고리즘,손재현;양윤기;변희정;

인터넷정보학회논문지, 2014. vol.15. 5, pp.1-7 crossref(new window)
1.
A Study on the Activation for the Mobile App Services of Local Government, Journal of the Korea Industrial Information System Society, 2013, 18, 2, 71  crossref(new windwow)
 References
1.
Ajzen (1991), "The theory of planned behavior," Organizational Behavior and Human Decision Processes, 50, pp. 179-211. crossref(new window)

2.
Aiken, K. D. and Boush D. M. (2006), "Trustmarks, objective-source ratings, and implied investments in advertising: investigating online trust and the contextspecific nature of Internet signals," Journal of the academy of marketing science, 34(3), pp. 308-323. crossref(new window)

3.
Ashworth, L. and Free C. (2006), "Marketing dataveillance and digital privacy: Using theories of justice to understand to consumers' online privacy concerns," Journal of business ethics, 67, pp. 107-123. crossref(new window)

4.
Babin, B. J., Darden W. R. and Griffin M. (1994), "Work and/or fun: Measuring hedonic and utilitarian shopping value," Journal of consumer research, 20, March, pp. 644-656. crossref(new window)

5.
Bilton, N. (2012a), Disruptions: And the privacy gaps just keep on coming, NYTIMES, February 19.

6.
Bilton, N. (2012 b), F.T.C. Finds Privacy Problems with Apps for Children, NYTIMES, February 16.

7.
Bloch, P. H. and Richins M. L. (1983), "Shopping without purchase: An investigation of consumer browsing behavior," Advances in consumer research, 10, pp. 389-393.

8.
Buchanan, T., Paine C, Joinson A. N. and Reips U. (2007), "Development of measure of online privacy concern and protection for user on the internet," Journal of the American society for information science and technology, 58(2), pp. 157-165. crossref(new window)

9.
DeCew, J. (1997). In pursuit of privacy: Law, ethics, and the rise of technology. Ithaca, NY: Cornell University Press

10.
Deci, E. L., Betley G., Kahle J., Abraham L. Porac J. (1981), "When trying to win: Competition and intrinsic motivation," Personality and Social psychology bulletin, 7(March), pp. 79-83. crossref(new window)

11.
Emarketer (2008), College students' social networking, September 22, available at http://www. emarketer. com

12.
Fisher, R. J. and Price L. L. (1992), "An investigation into social context of early adoption behavior," Journal of Consumer Research, 19(3), pp. 477-486. crossref(new window)

13.
Fogel, J. and NehmadE. (2009), "Internet Social Network Communities: Risk Taking, Trust and Privacy Concerns," Computers in Human Behavior, 25, pp.153-160. crossref(new window)

14.
FPF (2010), "Future of Privacy Forum Releases Behavioral Notices Study," available at http://www. futureofprivacy.org /2010/01/27/(accessed January 29, 2010).

15.
FTC (2012), "Mobile apps for kids: Current privacy disclosure are disappointing," Staff Report, Http://www. ftc.goc/os/2012/02/120216mobile_apps_kids.pdf.

16.
Gefen, D., Karahana E., and Straub D. W. (2003), "Trust and TAM in online shopping: An integrated model," MIS quarterly, 27(1), pp. 51-90.

17.
Hirshman, E. C. (1980), "Innovativeness, Novelty seeking and consumer creativity," Journal of consumer research, 7, December, pp. 283-295. crossref(new window)

18.
Hoy, M. and Milne G. (2010), "Gender differences in privacy-related measure for young adult Facebook users," Journal of interactive advertising, 10(2), pp. 28-45. crossref(new window)

19.
Hung C., Chou J. C. and Dong T. (2011), "Innovation and communication through innovative users: An exploratory mechanism of social networking website," International journal of information management, 31, pp. 317-326. crossref(new window)

20.
Javelin strategy and Research (2009), "Latest Jave line research shows identity fraud increased 22 percent," May, 1, available at http://javelinestrategy.com

21.
John L. K., Acquisti A. and Lowenstein G. (2011), "Strangers on a plane: Context-dependent willingness to divulge sensitive information," Journal of consumer research, 37, February, pp. 858-873. crossref(new window)

22.
Manning, M. (2009), "The effects of subjective norms on behavior in the theory of planned behavior: A metaanalysis," British journal of social psychology, 48, pp. 649-705. crossref(new window)

23.
Midgley, D. F. and Dowling G. R. (1978), "Innovativeness: The concept and its measurement," Journal of consumer research, 4, March, pp. 229-242. crossref(new window)

24.
Milne, G. R. and Culnan M. J. (2004), "Strategy for reducing online privacy risks: Why consumers read (or don't read) online privacy notices," Journal of interactive marketing, 18(3), pp. 15-29. crossref(new window)

25.
Miyazaki, D. and Krishnamurthy S (2002), Internet seals of approval: Effects on online privacies and consumer perceptions," Journal of consumer affairs, 36, summer, pp.28-49. crossref(new window)

26.
Nonaka, I. (1994), "A dynamic theory of organizational knowledge creation," Organization Science, 5(1), pp. 14-37. crossref(new window)

27.
Okazaki S., Li H. and Hirose M. (2009), "Consumer privacy concerns and reference for degree of regulation control," Journal of advertising, 38(4), pp.63-77.

28.
OECD (2003), Privacy online: OECD guidance on policy and practice, at http://www.1.oecd.org/publications/ebook/ 9303051E.pdf

29.
Pagani, M. and Hofacker C. F. and Goldsmith R. E. (2011), "The influence of personality on active and passive user of social networking sites," Psychology and marketing, 28(4), pp. 441- 456. crossref(new window)

30.
Palmer, D. (2005), "Pop-ups, Cookies, and Spam: Toward a deeper analysis of the ethical significance of Internet marketing practices," Journal of business ethics, 58(1), pp. 271-280. crossref(new window)

31.
Perlroth, N. and Bilton N. (2012), Mobile apps tale data without permission. NYTIMES, February 1.

32.
Pollach, I. (2005), "A typology of communicative strategies in online privacy policies: Ethics, Power and informed consent," Journal business ethics, 62, pp. 221- 235. crossref(new window)

33.
Pool, G. J. and Schwegler A. F. (2007), "Differentiating among motives for norm conformity," Basic and Applied Social Psychology, 29(1), pp. 47-60. crossref(new window)

34.
Rogers E. M. and Shoemaker F. F. (1971), Communication of innovation. New York: The Free Press.

35.
Rapp, J., Hill R. P., Gaines J. and Wilson R. M. (2009), "Advertising and consumer privacy," Journal of advertising, 38(4), pp. 51-61.

36.
Shaw, D. and Shiu E. (2003), "Ethics in consumer choice: a multivariable modeling approach," European journal of marketing, 37(10), pp. 1485-1498. crossref(new window)

37.
Sheehan, K. B. (1999), "An investigation of gender difference in online privacy concerns and resultant behaviors," Journal of interactive marketing, 13(4), pp. 24-38. crossref(new window)

38.
Sparks, P., Shepherd R. and Frewer L. J. (1995), "Assessing and structuring attitudes toward the use of gene technology in food production: the role of perceived ethical obligation," Basic an applied social psychology, 16(3), pp. 267-285. crossref(new window)

39.
Stanaland, A. J. W., Lwin M. O. and Miyazaki A. D., "Online privacy trust-marks," Journal of advertising research, September, pp. 511- 523.

40.
Taylor, D. G., Lewin J. and Strutton D. (2011), "Friends, Fans and followers: Do ads work on social networks?: How gender and age shape receptivity," Journal of advertising research, March, pp. 258-275.

41.
TRUSTe (2011), Mobile privacy: A user's perspective. Harris Interactive, April.

42.
Turban E., King, D. and Land, J. (2009), Introduction to electronic commerce, Prentice Hall.

43.
Turow, J. (2004), American and Online privacy: The system in broken, A report from the Annenberg public policy center of the university of Pennsylvania.

44.
Warren, S. and Brandeis L. (1890), "The right of privacy," Harvard law review, 4( 5), pp. 193-220. crossref(new window)

45.
Weiser, R. (2000), "Gender Differences in Internet Use Patterns and Internet Application Preferences: A Two- Sample Comparison," Cyber Psychology and Behavior, 3( 2), pp. 167-178. crossref(new window)

46.
Westin, A. F. (1967), Privacy and Freedom. Atheneum, New York.

47.
WHOA (2009), "Comparison statistics 2000-2009," available at http://haltabuse.org/resources/stats/cumulative 2000-2007.pdf

48.
Wolin, L.and Korgaonkar P. (2003), "Web Advertising: Gender Differences in Beliefs, Attitudes and Behavior," Internet Research, 13(5), pp.375-385. crossref(new window)

49.
Weiss S. (2009), "Privacy threat model for data portability in social network applications," International journal of information management, 29, pp. 249-254. crossref(new window)