• Title/Summary/Keyword: Mobile privacy

Search Result 349, Processing Time 0.028 seconds

The determinants of increasing privacy concerns in the mobile apps

  • Baek, Young-Mi;Ohk, Kyung-Young
    • International Journal of Contents
    • /
    • v.8 no.2
    • /
    • pp.43-51
    • /
    • 2012
  • This study identifies the determinants of increasing privacy concerns in the mobile apps. The privacy affecting factors will be divided into the 3 categories on the basis of both users' and developers' perspective. First, this study explores whether the users' seeking value affects concern of the mobile apps privacy. Second, gender gap on the mobile privacy sensitivity will be tested. Third, this study identifies the meaning of apps developers' providing toolkit in the users' sensitivity on the privacy. The result showed that innovation among the customer's characteristics was identified the most significant factor to affect the mobile app privacy sensitivity. Ethical norm related variables (ethical identity, subjective norm and utilitarian value) were also identified as the meaningful variables in the mobile app privacy. Toolkits provided by app developers are also appeared a significant variable to affect the customer's app privacy sensitivity negatively. Finally gender also appears the meaningful factor in the mobile app privacy sensitivity.

How do multilevel privacy controls affect utility-privacy trade-offs when used in mobile applications?

  • Kim, Seung-Hyun;Ko, In-Young
    • ETRI Journal
    • /
    • v.40 no.6
    • /
    • pp.813-823
    • /
    • 2018
  • In existing mobile computing environments, users need to choose between their privacy and the services that they can receive from an application. However, existing mobile platforms do not allow users to perform such trade-offs in a fine-grained manner. In this study, we investigate whether users can effectively make utility-privacy trade-offs when they are provided with a multilevel privacy control method that allows them to recognize the different quality of service that they will receive from an application by limiting the disclosure of their private information in multiple levels. We designed a research model to observe users' utility-privacy trade-offs in accordance with the privacy control methods and other factors such as the trustworthiness of an application, quality level of private information, and users' privacy preferences. We conducted a user survey with 516 participants and found that, compared with the existing binary privacy controls, both the service utility and the privacy protection levels were significantly increased when the users used the multilevel privacy control method.

Mobile Payment Use in Light of Privacy Protection and Provider's Market Control

  • Mohammad Bakhsh;Hyein Jeong;Lingyu Zhao;One-Ki Daniel Lee
    • Asia pacific journal of information systems
    • /
    • v.31 no.3
    • /
    • pp.257-276
    • /
    • 2021
  • This study investigates the factors that facilitate or hinder people to use mobile payment, especially drawing upon the theoretical perspectives on individual's privacy protection motivation and perceived market condition. Survey data (n = 200) were collected through a web-based platform and used to test a theoretical model. The results show that one's privacy protection power is formed by various individual and technological factors (i.e., perceived data exposure, self-efficacy, and response efficacy), and in turn it determines his/her intention to use mobile payment. Moreover, the relationship between privacy protection power and mobile payment use is conditional on the perceived market control by the service provider - with a perception of the high level of provider's market control, one uses mobile payment regardless of his/her privacy protection power, while under the low level of provider's market control, the decision depends on the degree of privacy protection power. The findings would help our understanding of why some people are more susceptible to mobile payment and others are not.

Mobile App Privacy Checklist for Consumer (모바일 앱 프라이버시 보호를 위한 소비자 체크리스트)

  • Li, Hua-Yu;Kim, Lin-Ah;Rha, Jong-Youn
    • Journal of Digital Convergence
    • /
    • v.13 no.6
    • /
    • pp.1-12
    • /
    • 2015
  • In recent years, the privacy concern for mobile consumers is emerging as the use of mobile application(apps) is growing according to the rapid spread of mobile devices such as smart phones and tablet PCs. To improve privacy protections in the mobile communications and apps, overseas organizations are announcing guidelines and/or checklists for stake holders. Although personal information protection guidelines for application developers have been prepared in the country, efforts to improve consumer privacy capability is insufficient. Thus, in this paper we first scope the app privacy related guidelines in both domestic and foreign affairs, then present the risk factors of privacy invasion by the stage of mobile application use based on the "Privacy Protection Act", offering privacy checklists for consumers. This checklist will enhance the self-management capability of consumer privacy and create virtuous cycle in the mobile ecosystem.

A Study of Antecedents of Continuance Intention in Mobile Social Network Service: The Role of Trust and Privacy Concerns (모바일 소셜네트워크서비스 환경에서 지속 사용 의도의 선행 요인에 관한 연구: 신뢰와 프라이버시 우려의 역할)

  • Kim, Byoungsoo
    • Knowledge Management Research
    • /
    • v.13 no.4
    • /
    • pp.83-100
    • /
    • 2012
  • Given the prevalence of mobile social network services (SNS) such as Facebook and Kakaotalk, it has become important to understand user's continuance behavior in a mobile SNS environment. Although trust and privacy concerns play a key role in SNS users' decision-making processes, most studies on SNS have shed little light on the effects of trust and privacy concerns on SNS continuance intention. In this regard, this paper developed an integrated model to deeply understand the key antecedents of user's continuance intention to use mobile SNS by incorporating trust and privacy concerns into extended expectation-confirmation model. The proposed research model was tested by using survey data collected from 170 users who have experience with Kakaotalk. The findings of this study found that the proposed theoretical framework provides a statistically significant explanation of the variance in continuance intention of mobile SNS. The analysis results indicate that trust serves as the salient antecedent of continuance intention to use mobile SNS. However, it was found that privacy concerns negatively influence trust, whereas it is not significantly related to continuance intention of mobile SNS. The theoretical and practical implications of the findings were described.

  • PDF

An Appraoch for Preserving Loaction Privacy using Location Based Services in Mobile Cloud Computing

  • Abbas, Fizza;Hussain, Rasheed;Son, Junggab;Oh, Heekuck
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2013.05a
    • /
    • pp.621-624
    • /
    • 2013
  • Mobile Cloud Computing is today's emerging technology. Customers enjoy the services and application from this combination of mobile technology and cloud computing. Beside all these benefits it also increases the concerns regarding privacy of users, while interacting with this new paradigm One of the services is Location based services, but to get their required services user has to give his/her current location to the LBS provider that is violation of location privacy of mobile client. Many approaches are in literature for preserve location privacy but some has computation restriction and some suffer from lack of privacy. In this paper we proposed a novel idea that not only efficient in its protocol but also completely preserves the user's privacy. The result shows that by sharing just service name and a large enough geographic area (e.g. a city) user gets required information from the server by doing little client side processing We perform experiments at client side by developing and testing an android based mobile client application to support our argument.

A Lightweight and Privacy-Preserving Answer Collection Scheme for Mobile Crowdsourcing

  • Dai, Yingling;Weng, Jian;Yang, Anjia;Yu, Shui;Deng, Robert H.
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.8
    • /
    • pp.2827-2848
    • /
    • 2021
  • Mobile Crowdsourcing (MCS) has become an emerging paradigm evolved from crowdsourcing by employing advanced features of mobile devices such as smartphones to perform more complicated, especially spatial tasks. One of the key procedures in MCS is to collect answers from mobile users (workers), which may face several security issues. First, authentication is required to ensure that answers are from authorized workers. In addition, MCS tasks are usually location-dependent, so the collected answers could disclose workers' location privacy, which may discourage workers to participate in the tasks. Finally, the overhead occurred by authentication and privacy protection should be minimized since mobile devices are resource-constrained. Considering all the above concerns, in this paper, we propose a lightweight and privacy-preserving answer collection scheme for MCS. In the proposed scheme, we achieve anonymous authentication based on traceable ring signature, which provides authentication, anonymity, as well as traceability by enabling malicious workers tracing. In order to balance user location privacy and data availability, we propose a new concept named current location privacy, which means the location of the worker cannot be disclosed to anyone until a specified time. Since the leakage of current location will seriously threaten workers' personal safety, causing such as absence or presence disclosure attacks, it is necessary to pay attention to the current location privacy of workers in MCS. We encrypt the collected answers based on timed-release encryption, ensuring the secure transmission and high availability of data, as well as preserving the current location privacy of workers. Finally, we analyze the security and performance of the proposed scheme. The experimental results show that the computation costs of a worker depend on the number of ring signature members, which indicates the flexibility for a worker to choose an appropriate size of the group under considerations of privacy and efficiency.

Motivational Factors Affecting Intention to Use Mobile Health Apps: Focusing on Regulatory Focus Tendency and Privacy Calculus Theory (모바일 헬스 앱 사용의도 동기요인: 조절초점성향과 프라이버시계산이론을 중심으로)

  • So, Hyeon-jeong;Kwahk, Kee-Young
    • Knowledge Management Research
    • /
    • v.22 no.2
    • /
    • pp.33-53
    • /
    • 2021
  • Use of mobile apps being extended, privacy concern on the side of the users is increased while they are willing to provide the private information to use the apps. In this study, we tried to identify the motivating elements that influence the users' intention to use the apps, based on the tendency towards regulatory focus and the privacy calculus theory. To verify the study model, we collected data from 151 adults who use health apps throughout the country, and analyzed the data using the PLS-SEM method. According to the result of the study, it was turned out that tendency towards promotion focus had negative impact on privacy concern and privacy danger, and tendency towards prevention focus had positive impact on privacy concern. Privacy concern had negative impact on the intention to use the mobile apps, and privacy benefit and privacy knowledge had positive impact on the intention to use the mobile apps. Finally, the intention to use the mobile apps had positive impact on the intention to continue to use the mobile apps. In this study, we identified different impacts of two types of tendency towards regulatory focus on privacy concern, and identified different influences on the intention to use the mobile apps accordingly.

Enabling Route Optimization for Large Networks with Location Privacy Consideration

  • Thanh Vu Truong;Yokota Hidetoshi;Urano Yoshiyori
    • Proceedings of the IEEK Conference
    • /
    • summer
    • /
    • pp.42-46
    • /
    • 2004
  • Mobile IP [9] was introduced to help the mobile user to be contacted with a single IP address even though the point-of-access changes. However, mobile IP creates the so-called 'triangle routing' which makes the delays for data packets longer, as well as creating unnecessary traffic at the home network of the mobile user. To overcome this, Route Optimization (RO) for mobile IP [1] was proposed, which eliminated the triangle routing phenomenon. But [l] requires that the network protocol stack of all existing hosts to change. Privacy is also another matter to be considered. This paper introduces a scheme called Peer Agent scheme to implement RO for mobile IP without requiring existing hosts to change. Method to preserve location privacy while still enabling RO is also considered.

  • PDF

An Empirical Study on the Drivers of Mobile VOD Contents Purchases (모바일 VOD 콘텐츠 구매 요인에 관한 실증 연구)

  • Choi, Jeonghye;Chung, Yerim;Jo, Wooyong;Kim, Mingyung
    • Knowledge Management Research
    • /
    • v.16 no.3
    • /
    • pp.1-21
    • /
    • 2015
  • The mobile market has introduced unprecedented shopping opportunities to customers and is expected to grow rapidly over time. However, little is known about how customers make purchase decisions in the mobile market. The purpose of this study is to investigate the drivers of mobile VOD purchases and to deliver valuable insights to mobile business operators. We focus on the purchase of VOD contents that have to be purchased and consumed using mobile devices and examine how individual-level purchase decisions are determined by three factors: perceived usefulness, usage behavior, and privacy concern. We obtained the panel data from a leading market research company that contains the mobile logs and survey results. Our main results suggest the followings. First, the perceived usefulness affects customers' mobile VOD contents purchases positively whereas the usage behavior exerts no influence on mobile contents purchases. Moreover, the privacy concern lowers the positive effect of perceived usefulness on mobile content purchases; however, it enhances the effect of the usage behavior on mobile contents purchases. These empirical findings indicate that mobile business operators should pay more attention to potential differences in perception and behavior using mobile devices and keep in mind that the privacy concern plays an additional key role in driving mobile contents purchases.