TY - GEN
T1 - Measuring mobile users' concerns for information privacy
AU - Xu, Heng
AU - Gupta, Sumeet
AU - Rosson, Mary Beth
AU - Carroll, John M.
PY - 2012
Y1 - 2012
N2 - The evolution of mobile network technologies and smartphones has provided mobile consumers with unprecedented access to Internet and value-added services while on the move. Privacy issues in such context become critically important because vendors may access a large volume of personal information. Although several pioneering studies have examined general privacy risks, few systematic attempts have been made to provide a theory-driven framework on the specific nature of privacy concerns among mobile consumers. To fill the gap in the literature, this article introduced a 9-item scale, which was shown to reasonably represent the dimensionality of mobile users' information privacy concerns (MUIPC), categorized as perceived surveillance, perceived intrusion, and secondary use of personal information. Through a survey study (n=310), the three-factor structure of MUIPC as revealed in exploratory factor analysis was further confirmed through confirmatory factor analysis. Further analysis revealed that the second-order model of MUIPC performed better than its first-order model.
AB - The evolution of mobile network technologies and smartphones has provided mobile consumers with unprecedented access to Internet and value-added services while on the move. Privacy issues in such context become critically important because vendors may access a large volume of personal information. Although several pioneering studies have examined general privacy risks, few systematic attempts have been made to provide a theory-driven framework on the specific nature of privacy concerns among mobile consumers. To fill the gap in the literature, this article introduced a 9-item scale, which was shown to reasonably represent the dimensionality of mobile users' information privacy concerns (MUIPC), categorized as perceived surveillance, perceived intrusion, and secondary use of personal information. Through a survey study (n=310), the three-factor structure of MUIPC as revealed in exploratory factor analysis was further confirmed through confirmatory factor analysis. Further analysis revealed that the second-order model of MUIPC performed better than its first-order model.
UR - http://www.scopus.com/inward/record.url?scp=84886512155&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=84886512155&partnerID=8YFLogxK
M3 - Conference contribution
AN - SCOPUS:84886512155
SN - 9781627486040
T3 - International Conference on Information Systems, ICIS 2012
SP - 2278
EP - 2293
BT - International Conference on Information Systems, ICIS 2012
T2 - International Conference on Information Systems, ICIS 2012
Y2 - 16 December 2012 through 19 December 2012
ER -