Abstract
In a world where the industry of mobile applications (apps) is continuously expanding, the need for reinforcing users’ protection of information privacy is urgent. Focusing on this emerging need, this study aims at highlighting the main competencies that a user of mobile apps should hold in order to protect their information privacy. The contribution of the paper is threefold; First, it proposes a framework which describes the actions that users of mobile applications make before and after the installation of the application. Second, based on conceptual analysis, this study introduces a framework for the synthesis of the Information Privacy Competency Model for Users of Mobile Apps incorporating widely known personality theories namely Protection Motivation Theory and Big Personality Theory. Finally, synthesizes the results into indicative competencies that users of mobile apps should hold so as to be competent to protect their information privacy. This study offers important implications regarding privacy protection in mobile apps not only for users, but also for privacy researchers, online service providers and educators.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Amity.co homepage. https://www.amity.co/blog/mobile-app-usage-statistics-to-grow-your-user-engagement. Accessed 21 Feb 2023
Zhao, Y., Ni, Q., Zhou, R.: What factors influence the mobile health service adoption? A meta-analysis and the moderating role of age. Int. J. Inf. Manage. 43, 342–350 (2017)
Flora, H.K., Wang, X., Chande, S.V.: An investigation on the characteristics of mobile applications: a survey study. Int. J. Inf. Technol. Comput. Sci. 6, 21–27 (2014)
Gu, J., Xu, Y., Xu, H., Zhang, C., Ling, H.: Privacy concerns for mobile app download: an elaboration likelihood model perspective. Decis. Support. Syst. 94, 19–28 (2017)
Nema, P., Anthonysamy, P., Taft, N., Peddinti, S.: Analyzing user perspectives on mobile app privacy at scale. In: The 44th International Conference on Software Engineering (ICSE ‘22), pp. 112–124. Association for Computing Machinery, New York, NY, USA (2022)
Porter Felt, A., Ha, E., Egelman, S., Haney, A., Chin, E., Wagner, D.: Android permissions: user attention, comprehension, and behavior. In: Proceedings of the SOUPS (2012)
Wottrich, V.M., van Reijmersdal, E.A., Smit, E.G.: The privacy trade-off for mobile app downloads: the roles of app value, intrusiveness, and privacy concerns. Decis. Support. Syst. 106, 44–52 (2018). https://doi.org/10.1016/j.dss.2017.12.003
Tang, J., Zhang, B., Xiao, S.: Examining the intention of authorization via apps: personality traits and expanded privacy calculus perspectives. Behav. Sci. (Basel) 12, 218 (2022). https://doi.org/10.3390/bs12070218. PMID: 35877288. PMCID: PMC9311954
Chen, H., Li, W.: Mobile device users’ privacy security assurance behavior: a technology threat avoidance perspective. Inf. Comput. Secur. 25(3), 330–344 (2017). https://doi.org/10.1108/ICS-04-2016-0027
Brandtzaeg, P.B., Pultier, A., Harrand, N.: Privacy in mobile apps: measuring privacy risks in mobile apps. Privacy in Mobile Apps (2016)
European Union Agency for Cybersecurity, Privacy and data protection in mobile applications: a study on the app development ecosystem and the technical implementation of GDPR, European Network and Information Security Agency (2018). https://data.europa.eu/doi/10.2824/114584
Tsohou, A.: Towards an information privacy and personal data protection competency model for citizens. In: Fischer-Hübner, S., Lambrinoudakis, C., Kotsis, G., Tjoa, A.M., Khalil, I. (eds.) TrustBus 2021. LNCS, vol. 12927, pp. 112–125. Springer, Cham (2021). https://doi.org/10.1007/978-3-030-86586-3_8
McClelland, D.C.: Testing for competence rather than for “intelligence”. Am. Psychol. 28(1), 1–14 (1973)
Boyatzis, R.E.: Competencies in the 21st century. J. Manage. Dev. 27(1), 5–12 (2008)
Page, C., Wilson, M.G.: Management competencies in New Zealand. On the inside looking in Wellington. Ministry of Commerce – 5 (1994)
Holtkamp, P., Lau, I., Pawlowski, J.M.: How do software development competences change in global settings – an explorative study. J. Softw. Evol. Process 27(1), 50–72 (2014)
Yan, Y.J.: Problems of quality of migrant workers and countermeasures from the perspective of iceberg model. Asian Agric. Res. 5, 48–50 (2012)
CEU (The Council of the European Union), Council Recommendation on Key Competences for Lifelong Learning. [online] ec.europa.eu. https://education.ec.europa.eu/focus-topics/improving-quality/key-competences. Accessed 22 Feb 2023
Staškeviča, A.: The importance of competency model development. Acta Oeconomica Pragensia 27(2), 62–71 (2019)
Alidrisi, H.M., Mohamed, S.: Developing a personal leadership competency model for safety managers: a systems thinking approach. Int. J. Environ. Res. Public Health 19(4), 2197 (2022)
Boyatzis, R.E.: The Competent Manager: A Model for Effective Performance. Wiley, New York (1982)
Spencer, L.M., Spencer, S.M.: Competence at Work: Models for Superior Performance. Wiley, New York (1993)
Klendauer, R., Berkovich, M., Gelvin, R., Leimeister, J., Krcmar, H.: Towards a competency model for requirements analysts. Inf. Syst. J. 22(6), 475–503 (2012)
Moustroufas, E., Stamelos, I., Angelis, L.: Competency profiling for software engineers: literature review and a new model. In: PCI ‘15: Proceedings of the 19th Panhellenic Conference on Informatics, pp. 235–240 (2015)
Holtkamp, P., Jokinen, J.P., Pawlowski, M.Y.: Soft competency requirements in requirements engineering, software design, implementation, and testing. J. Syst. Softw. 101, 136–146 (2015)
Bogoviz, A., Suglobov, A., Maloletko, A., Kaurova, O., Lobova, S.: Frontier Information Technology and Systems Research in Cooperative Economics (2021)
Prifti, L., Knigge, M., Kienegger, H., Krcmar, H.: A competency model for “Industrie 4.0” employees. In: Proceedings der 13. Internationalen Tagung Wirtschaftsinformatik (WI 2017), pp. 46–60. St. Gallen, S. (2017)
Eschenbrenner, B., Nah, F.F.: Information systems user competency: a conceptual foundation. Commun. Assoc. Inf. Syst. 34, 80 (2014)
Tsohou, A., Holtkamp, P.: Are users competent to comply with information security policies? An analysis of professional competence models. Inf. Technol. People 31(5), 1047–1106 (2018)
Lauricella, A.R., Herdzina, J., Robb, M.: Early childhood educators’ teaching of digital citizenship competencies. Comput. Educ. 158, 103989 (2020)
James, L.T., Wallace, L., Warkentin, M., Kim, B., Collignon, S.: Exposing others’ information on online social networks (OSNs): perceived shared risk, its determinants, and its influence on OSN privacy control use. Inf. Manage. 54, 851–865 (2017)
Cham, K., Edwards, M.-L., Kruesi, L., Celeste, T., Hennessey, T.: Digital preferences and perceptions of students in health professional courses at a leading Australian university: a baseline for improving digital skills and competencies in health graduates. Australas. J. Educ. Technol. 38(1), 69–86 (2021)
Moll, R., Pieschl, S., Bromme, R.: Competent or clueless? Users’ knowledge and misconceptions about their online privacy management. Comput. Hum. Behav. 41, 212–219 (2014)
Schueller, S.M., Armstrong, C.M., Neary, M., Ciulla, R.: An introduction to core competencies for the use of mobile apps in cognitive and behavioral practice. Cogn. Behav. Pract. 29, 69–80 (2021)
Bitton, R., Finkelshtein, A., Sidi, L., Puzis, R., Rokach, L., Shabtai, A.: Taxonomy of mobile users’ security awareness. Comput. Secur. 73, 266–293 (2018)
Trepte, S., et al.: Do people know about privacy and data protection strategies? Towards the “online privacy literacy scale” (OPLIS). In: Gutwirth, S., Leenes, R., de Hert, P. (eds.) Reforming European Data Protection Law. LGTS, vol. 20, pp. 333–365. Springer, Dordrecht (2015). https://doi.org/10.1007/978-94-017-9385-8_14
Büchi, M., Just, N., Latzer, M.: Caring is not enough: the importance of Internet skills for online privacy protection. Inf. Commun. Soc. 20, 1261–1278 (2016). https://doi.org/10.1080/1369118X.2016.1229001
Park, Y., Jones-Jang, M.: Understanding privacy knowledge and skill in mobile communication. Comput. Hum. Behav. 38, 296–303 (2014)
Pentina, I., Zhang, L., Bata, H., Chen, Y.: Exploring privacy paradox in information-sensitive mobile app adoption: a cross-cultural comparison. Comput. Hum. Behav. 65, 409–419 (2016)
Kokolakis, S.: Privacy attitudes and privacy behavior: a review of current research on the privacy paradox phenomenon. Comput. Secur. 64, 122–134 (2017)
Soumelidou, A., Tsohou, A.: Towards the creation of a profile of the information privacy aware user through a systematic literature review of information privacy awareness. Telematics Inform. 61, 101592 (2021)
Chouhan, V.S., Sandeep, S.: Understanding competencies and competency modeling - a literature survey. IOSR J. Bus. Manag. 16, 14–22 (2014)
Yuan, L.: Empirical studies on online information privacy concerns: literature review and an integrative framework. Commun. Assoc. Inf. Syst. 28, 28 (2011). https://doi.org/10.17705/1CAIS.02828
Stone, E.F., Gueutal, H.G., Gardner, D.G., McClure, S.: A field experiment comparing information-privacy values, beliefs, and attitudes across several types of organizations. J. Appl. Psychol. 68(3), 459–468 (1983)
Wallace, K.A.: Anonymity. Ethics Inf. Technol. 1(1), 21–31 (1999)
Kang, J., Lan, J., Yan, H., Li, W., Shi, X.: Antecedents of information sensitivity and willingness to provide. Mark. Intell. Plan. 40(6), 787–803 (2022)
Skalkos, A, Tsohou, A., Karyda, M., Kokolakis, S.: Identifying the values associated with users’ behavior towards anonymity tools through means-end analysis. Comput. Hum. Behav. Rep. 2, 100034 (2020)
Skrinjaric, B., Budak, J., Žokalj, M.: The effect of personality traits on online privacy concern. Ekonomski Pregled. 69, 106–130 (2018). https://doi.org/10.32910/ep.69.2.2
Korzaan, L.M., Boswell, T.K.: The influence of personality traits and information privacy concerns on behavioral intentions. J. Comput. Inf. Syst. 48(4), 15–24 (2008)
Junglas, A.I., Johnson, N.A., Spitzmüller, C.: Personality traits and concern for privacy: an empirical study in the context of location-based services. Eur. J. Inf. Syst. 17(4), 387–402 (2008). https://doi.org/10.1057/ejis.2008.29
Huseynov, F.: Understanding usage behavior of different mobile application categories based on personality traits. Interact. Comput. 32, 66–80 (2020)
van der Schyff, K., Flowerday, S., Lowry, P.B.: Information privacy behavior in the use of Facebook apps: a personality-based vulnerability assessment. Heliyon 6(8), e04714 (2020). https://doi.org/10.1016/j.heliyon.2020. PMID: 32904276. PMCID: PMC7452521
Costa, P., McCrae, R.R.: A five-factor theory of personality. In: The Five-Factor Model of Personality: Theoretical Perspectives, vol. 2, pp. 51–87 (1999)
Soto, C.J., Kronauer, A., Liang, J.K.: Five-factor model of personality. In: Whitbourne, S.K. (ed.) Encyclopedia of Adulthood and Aging, vol. 2, pp. 506–510. Wiley, Hoboken (2016)
https://dictionary.apa.org/. Accessed 23 Feb 2023
Abdel-Khalek, A.: Introduction to the psychology of self-esteem (2016)
Wang, L., Yan, J., Lin, J., Cui, W.: Let the users tell the truth: self-disclosure intention and self-disclosure honesty in mobile social networking. Int. J. Inf. Manage. 37, 1428–1440 (2017). https://doi.org/10.1016/j.ijinfomgt.2016.10.006
Nardis, Y., Panek, E.: Explaining privacy control on Instagram and Twitter: the roles of narcissism and self-esteem. Commun. Res. Rep. 36(1), 24–34 (2019)
Kleinginna, P.R., Kleinginna, A.M.: A categorized list of motivation definitions, with a suggestion for a consensual definition. Motiv. Emot. 5(3), 263–291 (1981)
McNeil, E.B., Rubin, Z.: The Psychology of Being Human, 2nd edn. Canfield, San Francisco (1977)
Rogers, R., Cacioppo, J., Richard P.: Cognitive and physiological processes in fear appeals and attitude change: a revised theory of protection motivation (1983)
Courneya, K.S., Hellsten, L.-A.M.: Cancer prevention as a source of exercise motivation: an experimental test using protection motivation theory. Psychol. Health Med. 6(1), 59–64 (2001). https://doi.org/10.1080/13548500125267
Sharma, S., Singh, G., Sharma, R., Jones, P., Kraus, S., Dwivedi, Y.K.: Digital health innovation: exploring adoption of COVID-19 digital contact tracing apps. IEEE Trans. Eng. Manage. 1–17 (2020)
Chen, J.V., Widjaja, A.E., Yen, D.C.: Need for affiliation, need for popularity, self-esteem, and the moderating effect of Big Five personality traits affecting individuals’ self-disclosure on Facebook. Int. J. Hum. Comput. Interact. 31(11), 815–831 (2015)
Wang, T., Duong, T.D., Chen, C.: Intention to disclose personal information via mobile applications: a privacy calculus perspective. Int. J. Inf. Manage. 36(4), 531–542 (2016)
Zhang, L., McDowell, W.C.: Am I really at risk? Determinants of online users’ intentions to use strong passwords. J. Internet Commer. 8(3), 180–197 (2009)
Kong, H., Anawar, S., Othman, N., Ayop, Z., Erman, H.: User privacy protection behavior and information sharing in mobile health application. Int. J. Adv. Trends Comput. Sci. Eng. 9, 5250–5258 (2022)
Brečko, B., Ferrari, A., Vuorikari, R., Punie, Y.: The digital competence framework for consumers. Joint Research Centre Science for Policy Report; EUR 28133 EN (2016). https://doi.org/10.2791/838886
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2024 IFIP International Federation for Information Processing
About this paper
Cite this paper
Soumelidou, A., Tsohou, A. (2024). Towards an Information Privacy Competency Model for the Usage of Mobile Applications. In: Meyer, N., Grocholewska-Czuryło, A. (eds) ICT Systems Security and Privacy Protection. SEC 2023. IFIP Advances in Information and Communication Technology, vol 679. Springer, Cham. https://doi.org/10.1007/978-3-031-56326-3_16
Download citation
DOI: https://doi.org/10.1007/978-3-031-56326-3_16
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-56325-6
Online ISBN: 978-3-031-56326-3
eBook Packages: Computer ScienceComputer Science (R0)