Advertisement

Exploring Employee Perspectives on Information Privacy and Security in the Mobile Environment

  • Peter Tarasewich
  • Benjamin Ngugi
  • Mansi Sanghavi
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 5617)

Abstract

Maintaining information privacy and security in the mobile environment, an issue having personal and organizational implications, remains a challenge because the context of a mobile device can change rapidly. In response to this, the authors have been investigating methods of maintaining the privacy of sensitive information accessed in mobile environments (i.e. potentially in public places). This particular study, still in progress, will collect and analyze data on employee information privacy and security practices and perceptions. A complicating factor is that the classification of information as “private” may not be absolute. Privacy levels of organizational information will be dictated by company policy, while privacy concerns with personal information are based on the employee’s own comfort level. Hence potential conflict arises if an individual uses a single mobile device for both personal and organizational information access. A summary and status of design activities and the planned implementation of the study is provided.

Keywords

privacy security information mobile context organization 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Berghel, H.: Identity Theft, Social Security Numbers, and the Web. Comm. of the ACM 43(2), 17–21 (2000)CrossRefGoogle Scholar
  2. 2.
    Britt, P.: Mobile Security for Those On-the-Go. Information Today 23(9), 32 (2006)Google Scholar
  3. 3.
    Bienfang, M., Egan, B.: Handheld Device Trends In the US Retail Brokerage Advisory Industry. TowerGroup Research (2006)Google Scholar
  4. 4.
    Cooper, G.: The Mutable Mobile: Social Theory in the Wireless World. In: Wireless World: Social and Interactional Aspects of the Mobile Age, pp. 19–31. Springer, Heidelberg (2002)CrossRefGoogle Scholar
  5. 5.
    Committee on National Security Systems, National Information Assurance (IA) Glossary, National Security Agency (2006), http://www.cnss.gov/Assets/pdf/cnssi_4009.pdf
  6. 6.
    Cousins, K.C., Robey, D.: Human Agency in Wireless World: Patterns of Technology Use in Nomadic Computing Environments. Info. and Org. 15, 151–180 (2005)CrossRefGoogle Scholar
  7. 7.
    Cronbach, L.J., Meehl, P.E.: Construct Validity in Psychological Tests. Psychological Bulletin (52), 281–302 (1955)CrossRefGoogle Scholar
  8. 8.
    Dourish, P., Grinter, R.E., Delgato de la Flor, J., Joseph, M.: Security in the Wild: User Strategies for Managing Security as an Everyday, Practical Problem. Personal and Ubiquitous Computing 8, 391–401 (2004)CrossRefGoogle Scholar
  9. 9.
    Grimes, A., Tarasewich, P.: Investigating Privacy-Augmented Displays for Mobile Devices. In: Proceedings of HCI International 2005 (2005)Google Scholar
  10. 10.
    Guidelines for Classifying Data, CAL HIPPA (2008), http://www.calhipaa.com/main/classification_sample1.htm
  11. 11.
    Hawkey, K., Inkpen, K.M.: Keeping Up Appearances: Understanding the Dimensions of Incidental Information Privacy. In: Proceedings of CHI 2006, pp. 821–830 (2006)Google Scholar
  12. 12.
    Herold, R.: Top 10 Mobile Device Privacy Policies, InformationWeek (September 1, 2005)Google Scholar
  13. 13.
    Karat, J., Karat, C.-M., Brodie, C., Feng, J.: Privacy in Information Technology: Designing to Enable Privacy Policy Management in Organizations. International Journal of Human Computer Studies, 153–174 (2005)Google Scholar
  14. 14.
    Kavanagh, J.: Plans Into Action. Computer Weekly, pp. 52–54 (September 13, 2005)Google Scholar
  15. 15.
    Malhotra, M., Groover, V.: An Assessment of Survey Research in POM: From Constructs to Theory. J. of Ops. Mgmt. 16(4), 403–423 (1998)CrossRefGoogle Scholar
  16. 16.
    Rosenthal, R., Rosnow, R.: Essential of Behavioral Research:Methods and Data Analysis. McGraw Hill, New York (1991)Google Scholar
  17. 17.
    Smith, H.J., Milberg, S.J., Burke, S.J.: Information Privacy: Measuring Individuals’ Concerns about Organizational Practices. MIS Quarterly 20(2), 167–196 (1996)CrossRefGoogle Scholar
  18. 18.
    Tarasewich, P.: Towards a Comprehensive Model of Context for Mobile and Wireless Computing. In: Proceedings of AMCIS 2003, pp. 114–124 (2003)Google Scholar
  19. 19.
    Tarasewich, P., Campbell, C., Xia, T., Dideles, M.: Evaluation of Visual Notification Cues for Ubiquitous Computing. In: Dey, A.K., Schmidt, A., McCarthy, J.F. (eds.) UbiComp 2003. LNCS, vol. 2864, pp. 349–366. Springer, Heidelberg (2003)CrossRefGoogle Scholar
  20. 20.
    Tarasewich, P., Gong, J., Conlan, R.: Protecting Private Data in Public. In: Adjunct Proceedings of CHI 2006, pp. 1409–1414 (2006)Google Scholar
  21. 21.
    Tarasewich, P., Gong, J., Nah, F., DeWester, D.: Mobile Interaction Design: Integrating Individual and Organizational Perspectives. Information Knowledge Systems Management 7, 121–144 (2008)Google Scholar
  22. 22.
    The State of Information Security 2007, a Worldwide Study by CIO, CSO and PricewaterhouseCoopers. CIO Magazine (September 15, 2007)Google Scholar
  23. 23.
    The Year of Working Dangerously: The Privacy Implications of Wireless in the State Workplace–Part I, NASCIO (2005), http://www.nascio.org/publications/documents/NASCIO-WirelessPartI.pdf

Copyright information

© Springer-Verlag Berlin Heidelberg 2009

Authors and Affiliations

  • Peter Tarasewich
    • 1
  • Benjamin Ngugi
    • 1
  • Mansi Sanghavi
    • 1
  1. 1.ISOM Department, Sawyer Business SchoolSuffolk UniversityBostonUSA

Personalised recommendations