Measuring mobile users' concerns for information privacy

Heng Xu, Sumeet Gupta, Mary Beth Rosson, John M. Carroll

Research output: Chapter in Book/Report/Conference proceedingConference contribution

116 Scopus citations


The evolution of mobile network technologies and smartphones has provided mobile consumers with unprecedented access to Internet and value-added services while on the move. Privacy issues in such context become critically important because vendors may access a large volume of personal information. Although several pioneering studies have examined general privacy risks, few systematic attempts have been made to provide a theory-driven framework on the specific nature of privacy concerns among mobile consumers. To fill the gap in the literature, this article introduced a 9-item scale, which was shown to reasonably represent the dimensionality of mobile users' information privacy concerns (MUIPC), categorized as perceived surveillance, perceived intrusion, and secondary use of personal information. Through a survey study (n=310), the three-factor structure of MUIPC as revealed in exploratory factor analysis was further confirmed through confirmatory factor analysis. Further analysis revealed that the second-order model of MUIPC performed better than its first-order model.

Original languageEnglish (US)
Title of host publicationInternational Conference on Information Systems, ICIS 2012
Number of pages16
StatePublished - 2012
EventInternational Conference on Information Systems, ICIS 2012 - Orlando, FL, United States
Duration: Dec 16 2012Dec 19 2012

Publication series

NameInternational Conference on Information Systems, ICIS 2012


OtherInternational Conference on Information Systems, ICIS 2012
Country/TerritoryUnited States
CityOrlando, FL

All Science Journal Classification (ASJC) codes

  • Computer Science Applications
  • Statistics, Probability and Uncertainty
  • Applied Mathematics
  • Library and Information Sciences


Dive into the research topics of 'Measuring mobile users' concerns for information privacy'. Together they form a unique fingerprint.

Cite this