Skip to main content

Towards an Information Privacy Competency Model for the Usage of Mobile Applications

  • Conference paper
  • First Online:
ICT Systems Security and Privacy Protection (SEC 2023)

Abstract

In a world where the industry of mobile applications (apps) is continuously expanding, the need for reinforcing users’ protection of information privacy is urgent. Focusing on this emerging need, this study aims at highlighting the main competencies that a user of mobile apps should hold in order to protect their information privacy. The contribution of the paper is threefold; First, it proposes a framework which describes the actions that users of mobile applications make before and after the installation of the application. Second, based on conceptual analysis, this study introduces a framework for the synthesis of the Information Privacy Competency Model for Users of Mobile Apps incorporating widely known personality theories namely Protection Motivation Theory and Big Personality Theory. Finally, synthesizes the results into indicative competencies that users of mobile apps should hold so as to be competent to protect their information privacy. This study offers important implications regarding privacy protection in mobile apps not only for users, but also for privacy researchers, online service providers and educators.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 99.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD 109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Amity.co homepage. https://www.amity.co/blog/mobile-app-usage-statistics-to-grow-your-user-engagement. Accessed 21 Feb 2023

  2. Zhao, Y., Ni, Q., Zhou, R.: What factors influence the mobile health service adoption? A meta-analysis and the moderating role of age. Int. J. Inf. Manage. 43, 342–350 (2017)

    Google Scholar 

  3. Flora, H.K., Wang, X., Chande, S.V.: An investigation on the characteristics of mobile applications: a survey study. Int. J. Inf. Technol. Comput. Sci. 6, 21–27 (2014)

    Google Scholar 

  4. Gu, J., Xu, Y., Xu, H., Zhang, C., Ling, H.: Privacy concerns for mobile app download: an elaboration likelihood model perspective. Decis. Support. Syst. 94, 19–28 (2017)

    Article  Google Scholar 

  5. Nema, P., Anthonysamy, P., Taft, N., Peddinti, S.: Analyzing user perspectives on mobile app privacy at scale. In: The 44th International Conference on Software Engineering (ICSE ‘22), pp. 112–124. Association for Computing Machinery, New York, NY, USA (2022)

    Google Scholar 

  6. Porter Felt, A., Ha, E., Egelman, S., Haney, A., Chin, E., Wagner, D.: Android permissions: user attention, comprehension, and behavior. In: Proceedings of the SOUPS (2012)

    Google Scholar 

  7. Wottrich, V.M., van Reijmersdal, E.A., Smit, E.G.: The privacy trade-off for mobile app downloads: the roles of app value, intrusiveness, and privacy concerns. Decis. Support. Syst. 106, 44–52 (2018). https://doi.org/10.1016/j.dss.2017.12.003

    Article  Google Scholar 

  8. Tang, J., Zhang, B., Xiao, S.: Examining the intention of authorization via apps: personality traits and expanded privacy calculus perspectives. Behav. Sci. (Basel) 12, 218 (2022). https://doi.org/10.3390/bs12070218. PMID: 35877288. PMCID: PMC9311954

  9. Chen, H., Li, W.: Mobile device users’ privacy security assurance behavior: a technology threat avoidance perspective. Inf. Comput. Secur. 25(3), 330–344 (2017). https://doi.org/10.1108/ICS-04-2016-0027

    Article  Google Scholar 

  10. Brandtzaeg, P.B., Pultier, A., Harrand, N.: Privacy in mobile apps: measuring privacy risks in mobile apps. Privacy in Mobile Apps (2016)

    Google Scholar 

  11. European Union Agency for Cybersecurity, Privacy and data protection in mobile applications: a study on the app development ecosystem and the technical implementation of GDPR, European Network and Information Security Agency (2018). https://data.europa.eu/doi/10.2824/114584

  12. Tsohou, A.: Towards an information privacy and personal data protection competency model for citizens. In: Fischer-Hübner, S., Lambrinoudakis, C., Kotsis, G., Tjoa, A.M., Khalil, I. (eds.) TrustBus 2021. LNCS, vol. 12927, pp. 112–125. Springer, Cham (2021). https://doi.org/10.1007/978-3-030-86586-3_8

    Chapter  Google Scholar 

  13. McClelland, D.C.: Testing for competence rather than for “intelligence”. Am. Psychol. 28(1), 1–14 (1973)

    Google Scholar 

  14. Boyatzis, R.E.: Competencies in the 21st century. J. Manage. Dev. 27(1), 5–12 (2008)

    Article  Google Scholar 

  15. Page, C., Wilson, M.G.: Management competencies in New Zealand. On the inside looking in Wellington. Ministry of Commerce – 5 (1994)

    Google Scholar 

  16. Holtkamp, P., Lau, I., Pawlowski, J.M.: How do software development competences change in global settings – an explorative study. J. Softw. Evol. Process 27(1), 50–72 (2014)

    Article  Google Scholar 

  17. Yan, Y.J.: Problems of quality of migrant workers and countermeasures from the perspective of iceberg model. Asian Agric. Res. 5, 48–50 (2012)

    Google Scholar 

  18. CEU (The Council of the European Union), Council Recommendation on Key Competences for Lifelong Learning. [online] ec.europa.eu. https://education.ec.europa.eu/focus-topics/improving-quality/key-competences. Accessed 22 Feb 2023

  19. Staškeviča, A.: The importance of competency model development. Acta Oeconomica Pragensia 27(2), 62–71 (2019)

    Article  Google Scholar 

  20. Alidrisi, H.M., Mohamed, S.: Developing a personal leadership competency model for safety managers: a systems thinking approach. Int. J. Environ. Res. Public Health 19(4), 2197 (2022)

    Article  Google Scholar 

  21. Boyatzis, R.E.: The Competent Manager: A Model for Effective Performance. Wiley, New York (1982)

    Google Scholar 

  22. Spencer, L.M., Spencer, S.M.: Competence at Work: Models for Superior Performance. Wiley, New York (1993)

    Google Scholar 

  23. Klendauer, R., Berkovich, M., Gelvin, R., Leimeister, J., Krcmar, H.: Towards a competency model for requirements analysts. Inf. Syst. J. 22(6), 475–503 (2012)

    Article  Google Scholar 

  24. Moustroufas, E., Stamelos, I., Angelis, L.: Competency profiling for software engineers: literature review and a new model. In: PCI ‘15: Proceedings of the 19th Panhellenic Conference on Informatics, pp. 235–240 (2015)

    Google Scholar 

  25. Holtkamp, P., Jokinen, J.P., Pawlowski, M.Y.: Soft competency requirements in requirements engineering, software design, implementation, and testing. J. Syst. Softw. 101, 136–146 (2015)

    Article  Google Scholar 

  26. Bogoviz, A., Suglobov, A., Maloletko, A., Kaurova, O., Lobova, S.: Frontier Information Technology and Systems Research in Cooperative Economics (2021)

    Google Scholar 

  27. Prifti, L., Knigge, M., Kienegger, H., Krcmar, H.: A competency model for “Industrie 4.0” employees. In: Proceedings der 13. Internationalen Tagung Wirtschaftsinformatik (WI 2017), pp. 46–60. St. Gallen, S. (2017)

    Google Scholar 

  28. Eschenbrenner, B., Nah, F.F.: Information systems user competency: a conceptual foundation. Commun. Assoc. Inf. Syst. 34, 80 (2014)

    Google Scholar 

  29. Tsohou, A., Holtkamp, P.: Are users competent to comply with information security policies? An analysis of professional competence models. Inf. Technol. People 31(5), 1047–1106 (2018)

    Article  Google Scholar 

  30. Lauricella, A.R., Herdzina, J., Robb, M.: Early childhood educators’ teaching of digital citizenship competencies. Comput. Educ. 158, 103989 (2020)

    Google Scholar 

  31. James, L.T., Wallace, L., Warkentin, M., Kim, B., Collignon, S.: Exposing others’ information on online social networks (OSNs): perceived shared risk, its determinants, and its influence on OSN privacy control use. Inf. Manage. 54, 851–865 (2017)

    Google Scholar 

  32. Cham, K., Edwards, M.-L., Kruesi, L., Celeste, T., Hennessey, T.: Digital preferences and perceptions of students in health professional courses at a leading Australian university: a baseline for improving digital skills and competencies in health graduates. Australas. J. Educ. Technol. 38(1), 69–86 (2021)

    Article  Google Scholar 

  33. Moll, R., Pieschl, S., Bromme, R.: Competent or clueless? Users’ knowledge and misconceptions about their online privacy management. Comput. Hum. Behav. 41, 212–219 (2014)

    Article  Google Scholar 

  34. Schueller, S.M., Armstrong, C.M., Neary, M., Ciulla, R.: An introduction to core competencies for the use of mobile apps in cognitive and behavioral practice. Cogn. Behav. Pract. 29, 69–80 (2021)

    Google Scholar 

  35. Bitton, R., Finkelshtein, A., Sidi, L., Puzis, R., Rokach, L., Shabtai, A.: Taxonomy of mobile users’ security awareness. Comput. Secur. 73, 266–293 (2018)

    Article  Google Scholar 

  36. Trepte, S., et al.: Do people know about privacy and data protection strategies? Towards the “online privacy literacy scale” (OPLIS). In: Gutwirth, S., Leenes, R., de Hert, P. (eds.) Reforming European Data Protection Law. LGTS, vol. 20, pp. 333–365. Springer, Dordrecht (2015). https://doi.org/10.1007/978-94-017-9385-8_14

    Chapter  Google Scholar 

  37. Büchi, M., Just, N., Latzer, M.: Caring is not enough: the importance of Internet skills for online privacy protection. Inf. Commun. Soc. 20, 1261–1278 (2016). https://doi.org/10.1080/1369118X.2016.1229001

  38. Park, Y., Jones-Jang, M.: Understanding privacy knowledge and skill in mobile communication. Comput. Hum. Behav. 38, 296–303 (2014)

    Google Scholar 

  39. Pentina, I., Zhang, L., Bata, H., Chen, Y.: Exploring privacy paradox in information-sensitive mobile app adoption: a cross-cultural comparison. Comput. Hum. Behav. 65, 409–419 (2016)

    Article  Google Scholar 

  40. Kokolakis, S.: Privacy attitudes and privacy behavior: a review of current research on the privacy paradox phenomenon. Comput. Secur. 64, 122–134 (2017)

    Article  Google Scholar 

  41. Soumelidou, A., Tsohou, A.: Towards the creation of a profile of the information privacy aware user through a systematic literature review of information privacy awareness. Telematics Inform. 61, 101592 (2021)

    Google Scholar 

  42. Chouhan, V.S., Sandeep, S.: Understanding competencies and competency modeling - a literature survey. IOSR J. Bus. Manag. 16, 14–22 (2014)

    Article  Google Scholar 

  43. Yuan, L.: Empirical studies on online information privacy concerns: literature review and an integrative framework. Commun. Assoc. Inf. Syst. 28, 28 (2011). https://doi.org/10.17705/1CAIS.02828

  44. Stone, E.F., Gueutal, H.G., Gardner, D.G., McClure, S.: A field experiment comparing information-privacy values, beliefs, and attitudes across several types of organizations. J. Appl. Psychol. 68(3), 459–468 (1983)

    Article  Google Scholar 

  45. Wallace, K.A.: Anonymity. Ethics Inf. Technol. 1(1), 21–31 (1999)

    Google Scholar 

  46. Kang, J., Lan, J., Yan, H., Li, W., Shi, X.: Antecedents of information sensitivity and willingness to provide. Mark. Intell. Plan. 40(6), 787–803 (2022)

    Article  Google Scholar 

  47. Skalkos, A, Tsohou, A., Karyda, M., Kokolakis, S.: Identifying the values associated with users’ behavior towards anonymity tools through means-end analysis. Comput. Hum. Behav. Rep. 2, 100034 (2020)

    Google Scholar 

  48. Skrinjaric, B., Budak, J., Žokalj, M.: The effect of personality traits on online privacy concern. Ekonomski Pregled. 69, 106–130 (2018). https://doi.org/10.32910/ep.69.2.2

  49. Korzaan, L.M., Boswell, T.K.: The influence of personality traits and information privacy concerns on behavioral intentions. J. Comput. Inf. Syst. 48(4), 15–24 (2008)

    Google Scholar 

  50. Junglas, A.I., Johnson, N.A., Spitzmüller, C.: Personality traits and concern for privacy: an empirical study in the context of location-based services. Eur. J. Inf. Syst. 17(4), 387–402 (2008). https://doi.org/10.1057/ejis.2008.29

    Article  Google Scholar 

  51. Huseynov, F.: Understanding usage behavior of different mobile application categories based on personality traits. Interact. Comput. 32, 66–80 (2020)

    Google Scholar 

  52. van der Schyff, K., Flowerday, S., Lowry, P.B.: Information privacy behavior in the use of Facebook apps: a personality-based vulnerability assessment. Heliyon 6(8), e04714 (2020). https://doi.org/10.1016/j.heliyon.2020. PMID: 32904276. PMCID: PMC7452521

  53. Costa, P., McCrae, R.R.: A five-factor theory of personality. In: The Five-Factor Model of Personality: Theoretical Perspectives, vol. 2, pp. 51–87 (1999)

    Google Scholar 

  54. Soto, C.J., Kronauer, A., Liang, J.K.: Five-factor model of personality. In: Whitbourne, S.K. (ed.) Encyclopedia of Adulthood and Aging, vol. 2, pp. 506–510. Wiley, Hoboken (2016)

    Google Scholar 

  55. https://dictionary.apa.org/. Accessed 23 Feb 2023

  56. Abdel-Khalek, A.: Introduction to the psychology of self-esteem (2016)

    Google Scholar 

  57. Wang, L., Yan, J., Lin, J., Cui, W.: Let the users tell the truth: self-disclosure intention and self-disclosure honesty in mobile social networking. Int. J. Inf. Manage. 37, 1428–1440 (2017). https://doi.org/10.1016/j.ijinfomgt.2016.10.006

  58. Nardis, Y., Panek, E.: Explaining privacy control on Instagram and Twitter: the roles of narcissism and self-esteem. Commun. Res. Rep. 36(1), 24–34 (2019)

    Article  Google Scholar 

  59. Kleinginna, P.R., Kleinginna, A.M.: A categorized list of motivation definitions, with a suggestion for a consensual definition. Motiv. Emot. 5(3), 263–291 (1981)

    Article  Google Scholar 

  60. McNeil, E.B., Rubin, Z.: The Psychology of Being Human, 2nd edn. Canfield, San Francisco (1977)

    Google Scholar 

  61. Rogers, R., Cacioppo, J., Richard P.: Cognitive and physiological processes in fear appeals and attitude change: a revised theory of protection motivation (1983)

    Google Scholar 

  62. Courneya, K.S., Hellsten, L.-A.M.: Cancer prevention as a source of exercise motivation: an experimental test using protection motivation theory. Psychol. Health Med. 6(1), 59–64 (2001). https://doi.org/10.1080/13548500125267

    Article  Google Scholar 

  63. Sharma, S., Singh, G., Sharma, R., Jones, P., Kraus, S., Dwivedi, Y.K.: Digital health innovation: exploring adoption of COVID-19 digital contact tracing apps. IEEE Trans. Eng. Manage. 1–17 (2020)

    Google Scholar 

  64. Chen, J.V., Widjaja, A.E., Yen, D.C.: Need for affiliation, need for popularity, self-esteem, and the moderating effect of Big Five personality traits affecting individuals’ self-disclosure on Facebook. Int. J. Hum. Comput. Interact. 31(11), 815–831 (2015)

    Article  Google Scholar 

  65. Wang, T., Duong, T.D., Chen, C.: Intention to disclose personal information via mobile applications: a privacy calculus perspective. Int. J. Inf. Manage. 36(4), 531–542 (2016)

    Article  Google Scholar 

  66. Zhang, L., McDowell, W.C.: Am I really at risk? Determinants of online users’ intentions to use strong passwords. J. Internet Commer. 8(3), 180–197 (2009)

    Google Scholar 

  67. Kong, H., Anawar, S., Othman, N., Ayop, Z., Erman, H.: User privacy protection behavior and information sharing in mobile health application. Int. J. Adv. Trends Comput. Sci. Eng. 9, 5250–5258 (2022)

    Google Scholar 

  68. Brečko, B., Ferrari, A., Vuorikari, R., Punie, Y.: The digital competence framework for consumers. Joint Research Centre Science for Policy Report; EUR 28133 EN (2016). https://doi.org/10.2791/838886

  69. https://support.google.com/android/answer/9457058?hl=en

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Aikaterini Soumelidou .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2024 IFIP International Federation for Information Processing

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Soumelidou, A., Tsohou, A. (2024). Towards an Information Privacy Competency Model for the Usage of Mobile Applications. In: Meyer, N., Grocholewska-Czuryło, A. (eds) ICT Systems Security and Privacy Protection. SEC 2023. IFIP Advances in Information and Communication Technology, vol 679. Springer, Cham. https://doi.org/10.1007/978-3-031-56326-3_16

Download citation

  • DOI: https://doi.org/10.1007/978-3-031-56326-3_16

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-031-56325-6

  • Online ISBN: 978-3-031-56326-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics