Skip to main content

Datenschutz, Informationssicherheit und Copyright

Zugriffsrechte von Mobile Learning-Applikationen und Nutzerbedenken

  • Chapter
  • First Online:
Handbuch Mobile Learning

Zusammenfassung

Dieser Beitrag behandelt Zugriffsrechte von Mobile Learning-Applikationen (Apps) und die Frage, welche Folgen diese bewirken können. Der Zugriff auf persönliche Nutzerdaten kann dazu führen, dass Nutzer und Nutzerinnen mobiler Endgeräte eine Bedrohung ihrer Privatsphäre befürchten und diese davon abhalten, mobile Apps zu installieren oder sie dazu bewegen, mobile Apps zu deinstallieren. In der „Privacy“-Forschung wurden Nutzerbedenken bzgl. der Privatsphäre aus unterschiedlichen Perspektiven betrachtet, so etwa aus organisationaler Sicht entweder mit Fokus auf Internetnutzer und -nutzerinnen oder auf Nutzer und Nutzerinnen mobiler Endgeräte. Dieser Beitrag wählt die Sicht von Nutzern und Nutzerinnen mobiler Endgeräte und erweitert diese Perspektive um vier Dimensionen hinsichtlich des Zugriffs auf persönliche Nutzerdaten: Zugriff auf persönliche Identität, Standort, Inhalte mobiler Endgeräte sowie System- und Netzwerkeinstellungen. Es werden Zugriffsrechte verschiedener Mobile Learning Apps betrachtet und eine Befragung mit 474 Nutzern und Nutzerinnen mobiler Endgeräte durchgeführt. Hierdurch wird der Einfluss der vier Dimensionen auf die Bedenken von Nutzern und Nutzerinnen mobiler Endgeräte mithilfe einer Strukturgleichungsmodellierung untersucht.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD 169.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Literatur

  • Anthes, G. (2011). Invasion of the Mobile Apps. Communications of the ACM 54 (9), 16-18.

    Google Scholar 

  • d’Arcy, J., & Herath, T. (2011). A Review and Analysis of Deterrence Theory in the IS Security Literature: Making Sense of the Disparate Findings. European Journal of Information Systems 20 (6), 643-658.

    Google Scholar 

  • d’Arcy, J., Hovav, A., & Galetta, D. F. (2009). User Awareness of Security Countermeasures and its Impact on Information Systems Misuse: A Deterrence Approach. Information Systems Research 20 (1), 79-98.

    Google Scholar 

  • Barak, A., & Gluck-Ofri, O. (2007). Degree and Reciprocity of Self-Disclosure in Online Forums. Cyberpsychology & Behavior 10 (3), 407-417.

    Google Scholar 

  • Bettini, C., & Riboni, D. (2015). Privacy Protection in Pervasive Systems: State of the Art and Technical Challenges. Pervasive and Mobile Computing 17, 159-174.

    Google Scholar 

  • Boyles, J. L., Smith, A., & Madden, M. (2012). Privacy and Data Management on Mobile Devices. Pew Research Center. http://www.pewinternet.org/2012/09/05/privacy-and-data-management-on-mobile-devices. Zugegriffen: 13. Juni 2016.

  • Buck, C., Kaubisch, D., & Eymann, T. (2016). Wer weiß was? – Digitale Privatsphäre und App-Literacy aus Nutzerperspektive. In V. Nissen, D. Stelzer, S. Straßburger & D. Fischer (Hrsg.), Multikonferenz Wirtschaftsinformatik (MKWI) 2016, Technische Universität Ilmenau, 09. – 11. März 2016. Ilmenau, 391-402.

    Google Scholar 

  • Bulgurcu, B., Cavusoglu, H., & Benbasat, I. (2010). Information Security Policy Compliance: An Empirical Study of Rationality-Based Beliefs and Information Security Awareness. MIS Quarterly 34 (3), 523-548.

    Google Scholar 

  • Chellappa, R. K., & Sin, R. G. (2005). Personalization versus Privacy: An Empirical Examination of the Online Consumer’s Dilemma. Information Technology and Management 6 (2-3), 181-202.

    Google Scholar 

  • Chin, W.W. (1998). Commentary: Issues and Opinion on Structural Equation Modeling. MIS Quarterly, 22 (1), vii-xvi.

    Google Scholar 

  • Choobineh, J., Dhillon, G., Grimaila, M. R., & Rees, J. (2007). Management of Information Security: Challenges and Research Directions. Communications of the Association for Information Systems 20, 958-971. http://aisel.aisnet.org/cais/vol20/iss1/57. Zugegriffen: 03. März 2017.

  • Culnan, M. J., & Armstrong, P. K. (1999). Information Privacy Concerns, Procedural Fairness, and Impersonal Trust: An Empirical Investigation. Organization Science 10 (1), 104-115.

    Google Scholar 

  • Dhar, S., & Varshney, U. (2011). Challenges and Business Models for Mobile Location-based Services and Advertising. Communications of the ACM 54 (5), 121-129.

    Google Scholar 

  • Dinev, T., & Hart, P. (2006). An Extended Privacy Calculus Model for E-Commerce Transactions. Information Systems Research 17 (1), 61-80.

    Google Scholar 

  • Disterer, G., & Kleiner, C. (2016). Sicherer Einsatz mobiler Endgeräte im Unternehmen. In M. Knoll & S. Meinhardt (Hrsg.), Mobile Computing – Grundlagen – Prozesse und Plattformen – Branchen und Anwendungsszenarien. Wiesbaden, 27-52.

    Google Scholar 

  • Edwards, J. R. (2001). Multidimensional Constructs in Organizational Behavior Research: An Integrative Analytical Framework. Organizational Research Methods 4 (2), 144-192.

    Google Scholar 

  • eMarketer (2016). Most Mobile Users Will Delete an App If Concerned about Security. http://www.emarketer.com/Article/Most-Mobile-Users-Will-Delete-App-Concerned-About-Security/1013488. Zugegriffen: 13. Juni 2016.

  • Enck, W. (2011). Defending Users against Smartphone Apps: Techniques and Future Directions. In S. Jajodia & C. Mazumdar (Eds.), Information Systems Security. ICISS 2011. Lecture Notes in Computer Science, Vol 7093. Berlin, Heidelberg, 49-70.

    Google Scholar 

  • Forgó, N., & Heinemeyer, D. (2013). Urheber- und datenschutzrechtliche Fragen des Mobile Learning. In C. de Witt & A. Sieber (Hrsg.), Mobile Learning, Potenziale, Einsatzszenarien und Perspektiven des Lernens mit mobilen Endgeräten. Wiesbaden, 159-169.

    Google Scholar 

  • Gefen, D., Karahanna, E., & Straub, D. W. (2003). Trust and TAM in Online Shopping: An Integrated Model. MIS Quarterly 27 (1), 51-90.

    Google Scholar 

  • Gloerfeld, C., Kuszpa, M., & de Witt, C. (2015). Mobile Learning – von den Erwartungen 2005 zur Realität 2015. Eine vergleichende Untersuchung zu Mobile Learning in Unternehmen. FernUniversität in Hagen. https://d-nb.info/1079982876/34. Zugegriffen: 03. März 2017.

  • Hansen, M. (2008). User-Controlled Identity Management: The Key to the Future of Privacy? International Journal of Intellectual Property Management 2 (4), 325-344.

    Google Scholar 

  • Hedström, K., Kolkowska, E., Karlsson, F., & Allen, J. P. (2011). Value Conflicts for Information Security Management. Journal of Strategic Information Systems 20 (4), 373-384.

    Google Scholar 

  • Herath, T., & Rao, H. R. (2009a). Encouraging Information Security Behaviors in Organizations: Role of Penalties, Pressures and Perceived Effectiveness. Decision Support Systems 47(2), 154-165.

    Google Scholar 

  • Herath, T., & Rao, H. R. (2009b). Protection Motivation and Deterrence: A Framework for Security Policy Compliance in Organizations. European Journal on Information Systems 18 (2), 106-125.

    Google Scholar 

  • Herring, S. C., Scheidt, L. A., Wright, E., & Bonus, S. (2005). Weblogs as a Bridging Genre. Information. Information Technology & People 18 (2), 142-171.

    Google Scholar 

  • Huffaker, D. A., & Calvert, S. L. (2005). Gender, Identity, and Language Use in Teenage Blogs. Journal of Computer-Mediated Communication 10 (2), 26.

    Google Scholar 

  • ibi systems (2015). Studie zur IT-Sicherheit 2015. http://www.ibi-systems.de/informationssicherheit-in-deutschland-oesterreich-und-der-schweiz-2015. Zugegriffen: 10. November 2016.

  • Jabeur, N., Zeadally, S., & Sayed, B. (2013). Mobile Social Networking Applications. Communications of the ACM 56 (3), 71-79.

    Google Scholar 

  • Johnston, A. C., & Warkentin, M. (2010). Fear Appeals and Information Security Behaviors: An Empirical Study. MIS Quarterly 34 (3), 549-566.

    Google Scholar 

  • Karjalainen, M., & Siponen, M. (2011). Toward a New Meta-Theory for Designing Information Sys-tems (IS) Security Training Approaches. Journal of the Association for Information Systems 12 (8), 518-555.

    Google Scholar 

  • Kearney, W. D., & Kruger, H. A. (2016). Can Perceptual Differences Account for Enigmatic Information Security Behavior in an Organization? Computers & Security 61, 46-58.

    Google Scholar 

  • Keith, M. J., Babb Jr., J. S., Furner, C. P., & Abdullat, A. (2010). Privacy Assurance and Network Effects in the Adoption of Location-Based Services: An iPhone Experiment. In R. Sabherwal & M. Sumner (Eds.), ICIS 2010 31st International Conference on Information Systems Proceedings. Association for Information Systems. http://aisel.aisnet.org/icis2010_submissions/237/. Zugegriffen: 03. März 2017.

  • Keith, M. J., Thompson, S. C., Hale, J. E., & Greer, C. (2012). Examining the Rationality of Information Disclosure through Mobile Devices. In F. G. Joey (Eds.), Proceedings of the International Conference on Information Systems, ICIS 2012, Orlando, USA, 16th – 19th December 2012. Association for Information Systems 2012. http://aisel.aisnet.org/icis2012/proceedings/ISSecurity/8/. Zugegriffen: 03. März 2017.

  • Königs, H.-P. (2013). IT-Risiko-Management mit System – Von den Grundlagen bis zur Realisierung. Ein praxisorientierter Leitfaden. Wiesbaden.

    Google Scholar 

  • Kranz, J., & Häußinger, F. (2014). Why Deterrence is not Enough: The Role of Endogenous Moti-vations on Employees` Information Security Behavior. In International Conference on Information Systems (ICIS), Building a Better World through Information Systems Auckland, New Zealand, 14th – 17th December 2014. New York/NY, 3147-3160.

    Google Scholar 

  • Lai, G.-H., Lee, Y.-H., Chu, T.-H., & Cheng, T.-H. (2015). A Structure Similarity-Based Approach to Malicious Android App Detection. In Proceedings of the 19th Pacific Asia Conference on Infor mation Systems, Marina Bay Sands, Singapore. http://aisel.aisnet.org/pacis2015/. Zugegriffen: 03. März 2017.

  • Laufer, R. S., & Wolfe, M. (1977). Privacy as a Concept and a Social Issue: Multidimensional Development Theory. Journal of Social Issues 33 (3), 22-42.

    Google Scholar 

  • Leavitt, N. (2011). Mobile Security: Finally a Serious Problem? Computer 44(6), 11-14.

    Google Scholar 

  • Lebek, B., Guhr, N., & Breitner, M. H. (2014). Transformational Leadership and Employees` Infor-mation Security Performance: The Mediation Role of Motivation and Climate. In International Conference on Information Systems (ICIS), Building a Better World through Information Systems, Auckland, New Zealand, 14th – 17th December 2014. New York/NY, 3110-3131.

    Google Scholar 

  • Malhotra, N. K., Kim, S. S., & Agarwal, J. (2004). Internet Users’ Information Privacy Concerns (IUIPC): The Construct, the Scale, and a Causal Model. Information Systems Research 15 (4), 336-355.

    Google Scholar 

  • McKnight, D. H., Choudhury, V., & Kacmar, C. (2002). Developing and Validating Trust Measures for e-Commerce: An Integrative Typology. Information Systems Research 13 (3), 334-359.

    Google Scholar 

  • Meschtscherjakov, A. (2009). Mobile Attachment – Emotional Attachment Towards Mobile Devices and Services. Proceedings of the 11th International Conference on Human-Computer Interaction with Mobile Devices and Services, Bonn, Germany — September 15 – 18, 2009. https://doi.org/10.1145/1613858.1613975

  • Miners, Z. (2015). The Curious Case of Google Street View’s Missing Streets. http://www.computerworld.com/article/2946453/search/the-curious-case-of-google-street-views-missing-streets.html. Zugegriffen: 6. Februar 2017.

  • mmb Trendmonitor (2016). Weiterbildung und Digitales Lernen heute und in drei Jahren: Mobiles Lernen wird der Umsatzbringer No. 1 – Ergebnisse der 10. Trendstudie „mmb Learning Delphi“. mmb Trendmonitor I/2016. http://www.mmb-institut.de/mmb-monitor/trendmonitor/mmb-Trendmonitor_2016_I.pdf. Zugegriffen: 03. März 2017.

  • Moebert, T., Biermann, M., Jank, H., & Lucke, U. (2015). Konzepte und Verfahren zur Visualisierung von Kontextinformationen und Adoptionsmechanismen in mobilen adaptiven Lernanwendungen. In S. Rathmayer & H. Pongratz (Hrsg.), Proceedings of DeLFI Workshops 2015, co-located with 13th e-Learning Conference of the German Computer Society, München, September 1, 201. http://ceur-ws.org/Vol-1443/paper41.pdf. Zugegriffen: 03. März 2017.

  • Motiwalla, L. F., & Li, X.-B. (2016). Unveiling Consumer’s Privacy Paradox Behaviour in an Economic Exchange. International Journal of Business Information Systems 23 (3), 307-329.

    Google Scholar 

  • Najjar, M., & Bui, S. (2012). The Influence of Technology Characteristics on Privacy Calculus: A Theoretical Framework. Proceedings of the 18th Americas Conference on Information Systems (AMCIS 2012), Seattle, WA, USA, 9 – 12 August 2012. https://aisel.aisnet.org/amcis2012/proceedings/ISSecurity/13. Zugegriffen: 03. März 2017.

  • Norberg P. A, Horne D. R., & Horne D. A. (2007). The Privacy Paradox: Personal Information Disclosure Intentions Versus Behaviors. Journal of Consumer Affairs 41 (1), 100-126.

    Google Scholar 

  • Plachkinova, M., Vo, A., & Alluhaidan, A. (2016). Emerging Trends in Smart Home Security, Privacy, and Digital Forensics. Proceedings of the 22nd Americas Conference on Information Systems, San Diego, CA, USA. http://aisel.aisnet.org/cgi/viewcontent.cgi?article=1434&context=amcis2016. Zugegriffen: 03. März 2017.

  • Polites, G. L., Roberts, N., & Thatcher, J. (2012). Conceptualizing Models Using Multidimensional Constructs: A Review and Guidelines for their Use. European Journal of Information Systems 21 (1), 22-48.

    Google Scholar 

  • Qian, H., & Scott, C. R. (2007). Anonymity and Self-Disclosure on Weblogs. Journal of Computer-Mediated Communication 12 (4), 1428-1451.

    Google Scholar 

  • Reinecke, L., & Trepte, S. (2008). Privatsphäre 2.0: Konzepte von Privatheit, Intimsphäre und Werten im Umgang mit „user-generated-content“. In A. Zerfass, M. Welker & J. Schmidt (Hrsg.), Kommunikation, Partizipation und Wirkungen im Social Web, Bd. 1: Grundlagen und Methoden: Von der Gesellschaft zum Individuum. Köln, 205-228.

    Google Scholar 

  • Schilit, B., Adams, N., & Want, R. (1994). Context-Aware Computing Applications. WMCSA ’94 Proceedings of the 1994 First Workshop on Mobile Computing Systems and Applications. https://doi.org/10.1109/wmcsa.1994.16

  • Shirazi, A. S., Clawson, J., Hassanpour, Y., Tourian, M. J., Schmidt, A., Chi, E. H., Borazio, M., & Laerhoven, K. V. (2013). Already Up? Using Mobile Phones to Track & Share Sleep Behavior. International Journal of Human-Computer Studies. https://doi.org/10.1016/j.ijhcs.2013.03.001

  • Siponen, M. T., & Vance, A. (2010). Neutralization: New Insight into the Problem of Employee In-formation Systems Security Policy Violations. MIS Quarterly 34 (3), 487-502.

    Google Scholar 

  • Smith, H. J., Milberg, S. J., & Burke, S. J. (1996). Information Privacy: Measuring Individuals’ Concerns about Organizational Practices. MIS Quarterly 20 (2), 167-196.

    Google Scholar 

  • Solove, D. J. (2006). A Taxonomy of Privacy. University of Pennsylvania Law Review 154 (3), 477-560.

    Google Scholar 

  • Soper, D. (2012). Is Human Mobility Tracking a Good Idea? Communications of the ACM 55 (4), 35-37.

    Google Scholar 

  • Spielkamp, M. (2015) Mobile Learning, Datenschutz und Urheberrecht in der EU – Rahmenbedingungen zur Nutzung mobiler Endgeräte für den Unterricht an Schulen. http://www.vodafone-institut.de/wp-content/uploads/2015/09/VFI_MobileLearning_DE.pdf. Zugegriffen: 15. November 2016.

  • Stewart, K. A., & Segars, A. H. (2002). An Empirical Examination of the Concern for Information Privacy Instrument. Information Systems Research 13 (1), 36-49.

    Google Scholar 

  • Thurm, S., & Kane, Y. I. (2010). Your Apps Are Watching You: A WSJ Investigation finds that iPhone and Android apps are breaching the privacy of smartphone users. http://online.wsj.com/article/SB10001424052748704694004576020083703574602.html. Zugegriffen: 29. April 2013.

  • Viégas, F. B. (2005). Bloggers’ Expectations of Privacy and Accountability: An Initial Survey. Journal of Computer-Mediated Communication. https://doi.org/10.1111/j.1083-6101.2005.tb00260.x

  • Viseu, A., Clement, A., & Aspinall, J. (2004). Situating Privacy Online: Complex Perceptions and Everyday Practices. Information, Communication and Society 7 (1), 92-114.

    Google Scholar 

  • Vogel, D. L., & Wester, S. R. (2003). To Seek Help or Not to Seek Help: The Risks of Selfdisclosure. Journal of Counseling Psychology 50 (3), 351-361.

    Google Scholar 

  • Weil, F. (2005). Privatsphäre – schützenswert oder uncool? In P. Grimm & R. Capurro (Hrsg.), Tugenden der Medienkultur. Zu Sinn und Sinnverlust tugendhaften Handelns in der medialen Kommunikation. Stuttgart, 107-119.

    Google Scholar 

  • Xu, H., Gupta, S., Rosson, M. B., & Carroll, J. M. (2012). Measuring Mobile Users’ Concerns for Information Privacy. Proceedings of the 33rd International Conference on Information Systems, Orlando, FL, USA. https://faculty.ist.psu.edu/xu/papers/Xu_etal_ICIS_2012a.pdf. Zugegriffen: 03. März 2017.

  • Xu, H., Teo, H.-H., Tan, B. C. Y., & Agarwal, R. (2012). Effects of Individual Self-Protection, Industry Self-Regulation, and Government Regulation on Privacy Concerns: A Study of Location-Based Services. Information Systems Research 23(4), 1342-1363.

    Google Scholar 

  • Zhang, D., Adipat, B., & Mowafi, Y. (2009). User-Centered Context-Aware Mobile Applications – The Next Generation of Personal Mobile Computing. Communications of the AIS 24 (3), 27-46.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Kenan Degirmenci .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer Fachmedien Wiesbaden GmbH, ein Teil von Springer Nature

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Degirmenci, K., Guhr, N., Breitner, M.H. (2018). Datenschutz, Informationssicherheit und Copyright. In: de Witt, C., Gloerfeld, C. (eds) Handbuch Mobile Learning. Springer VS, Wiesbaden. https://doi.org/10.1007/978-3-658-19123-8_13

Download citation

  • DOI: https://doi.org/10.1007/978-3-658-19123-8_13

  • Published:

  • Publisher Name: Springer VS, Wiesbaden

  • Print ISBN: 978-3-658-19122-1

  • Online ISBN: 978-3-658-19123-8

  • eBook Packages: Social Science and Law (German Language)

Publish with us

Policies and ethics