Skip to main content

Influence of Users’ Privacy Risks Literacy on the Intention to Install a Mobile Application

  • Conference paper

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 353))

Abstract

While users are increasingly embracing smartphones worldwide, these devices, storing our most personal information, are repeatedly found to be leaking users’ data. Despite various attempts to inform users of these privacy issues, they continue to adopt risky behaviors. In order to better protect users of these devices, we need to understand the antecedents of the decision to install potentially privacy-threatening applications on them. We ran a large experiment in order to determine the influence of privacy risks literacy on the intent to install a potentially privacy threatening application on a smartphone. Using partial least squares (PLS), we were able to find that more than the privacy risks literacy, it is the coping behavior literacy that influences the user’s decision to install a mobile application. These findings are relevant to help determine a course of action in order to increase the user’s privacy protection when using such devices.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   369.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Anderson, C.L., Agarwal, R.: Practicing safe computing: a multimedia empirical examination of home computer user security behavioral intentions. MIS Q 34(3), 613–643 (2010)

    Google Scholar 

  2. Angst, C.M., Agarwal, R.: Adoption of electronic health records in the presence of privacy concerns: the elaboration likelihood model and individual persuasion. MIS Q 33(2), 339–370 (2009)

    Google Scholar 

  3. Bélanger, F., Crossler, R.E.: Privacy in the digital age: a review of information privacy research in information systems. MIS Q 35(4), 1017–1042 (2011)

    Google Scholar 

  4. Bennett, C.: In defense of privacy: the concept and the regime. Surveill 8(4), 485–496 (2011)

    Google Scholar 

  5. Bollen, K., Lennox, R.: Conventional wisdom on measurement: A structural equation perspective. Psychol. Bull. 110(2), 305–314 (1991)

    Article  Google Scholar 

  6. Chin, W.W.: Commentary: Issues and Opinion on Structural Equation Modeling. Manag. Inf. Syst. Q. 22(1), vii–xvi (1998)

    Google Scholar 

  7. Dinev, T., Hart, P.: An Extended Privacy Calculus Model for E-Commerce Transactions. Inf. Syst. Res. 17(1), 61–80 (2006)

    Article  Google Scholar 

  8. Glaser, B.G., Strauss, A.L.: Awareness Contexts and Social Interaction. Am. Sociol. Rev. 29(5), 669–679 (1964)

    Article  Google Scholar 

  9. Günther, O., Spiekermann, S.: RFID and the perception of control. Commun. ACM. 48(9), 73–76 (2005)

    Article  Google Scholar 

  10. Johnston, A.C., Warkentin, M.: Fear appeals and information security behaviors: an empirical study. MIS Q 34(3), 549–566 (2010)

    Google Scholar 

  11. Maddux, J.E., Rogers, R.W.: Protection motivation and self-efficacy: A revised theory of fear appeals and attitude change. J. Exp. Soc. Psychol. 19(5), 469–479 (1983)

    Article  Google Scholar 

  12. Malhotra, N.K., et al.: Internet Users’ Information Privacy Concerns (IUIPC): The Construct, the Scale, and a Causal Model. Inf. Syst. Res. 15(4), 336–355 (2004)

    Article  Google Scholar 

  13. Öztaş Ayhan, H., Işiksal, S.: Memory recall errors in retrospective surveys: A reverse record check study. Qual. Quant. 38(5), 475–493 (2005)

    Article  Google Scholar 

  14. Pavlou, P.A.: State of the information privacy literature: where are we now and where should we go? MIS Q 35(4), 977–988 (2011)

    Google Scholar 

  15. Ringle, C.M., et al.: Editor’s comments: a critical look at the use of PLS-SEM in MIS quarterly. MIS Q. 36(1), iii–xiv (2012)

    Google Scholar 

  16. Smith, H.J. et al.: Information Privacy Research: An Interdisciplinary Review. MIS Q. 35(4), 989–1015 (2011)

    Google Scholar 

  17. Smith, H.J. et al.: Information Privacy: Measuring Individuals’ Concerns about Organizational Practices. MIS Q. 20(2), 167–196 (1996)

    Google Scholar 

  18. Stone, E.F., et al.: A field experiment comparing information-privacy values, beliefs, and attitudes across several types of organizations. J. Appl. Psychol. 68(3), 459–468 (1983)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Alessio De Santo .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer International Publishing Switzerland

About this paper

Cite this paper

De Santo, A., Gaspoz, C. (2015). Influence of Users’ Privacy Risks Literacy on the Intention to Install a Mobile Application. In: Rocha, A., Correia, A., Costanzo, S., Reis, L. (eds) New Contributions in Information Systems and Technologies. Advances in Intelligent Systems and Computing, vol 353. Springer, Cham. https://doi.org/10.1007/978-3-319-16486-1_33

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-16486-1_33

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-16485-4

  • Online ISBN: 978-3-319-16486-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics