An Investigation of Consumer’s Security and Privacy Perceptions in Mobile Commerce
Full text | |||
Source | Journal of Information Systems Security Volume 9, Number 2 (2013)
Pages 3–25
ISSN 1551-0123 (Print)ISSN 1551-0808 (Online) |
||
Authors | Hua Dai — University of Wisconsin-La Crosse, USA
Rahul Singh — University of North Carolina at Greensboro, USA
Lakshmi S. Iyer — University of North Carolina at Greensboro, USA
|
||
Publisher | Information Institute Publishing, Washington DC, USA |
Abstract
This study investigates the factors that shape consumers’ security and privacy perceptions of mobile commerce (m-commerce). We utilize strong theoretical foundations to develop eight factors that impact consumers’ security and privacy concerns in the m-commerce context: information type, information collection, secondary use of information, error, unauthorized access, location awareness, information transfer, and personalization. We collected data and analyzed data from 141 respondents. Our analysis revealed a lack of support for the global treatment of security and privacy concerns, which has been treated as a global construct in much of the security and privacy literature, heretofore. In this paper we identified three distinct dimensions for the security and privacy perception construct. Based on this analysis, we developed and tested three models to explain the impact of our eight factors on these three dimensions: consumers’ confidence of information control, concerns on third party, and the awareness of information protection in the m-commerce context. The study has implications for professionals to meet the consumers’ requirements and expectations on security and privacy for m-commerce.
Keywords
Privacy, Security, Mobile Commerce, Information Collection, Location Awareness, Personalization, Unauthorized access, Secondary Use
References
Beccera, M. and Gupta, A.K. 1999. "Trust within the Organization: Integrating the Trust Literature with Agency Theory and Transaction Cost Economics," Public Administration Quarterly, 177-203.
Belanger, F., Hiller, J. S., and Smith, W. J. 2002. “Trustworthiness in electronic commerce: The role of privacy, security, and site attributes,” Journal of Strategic Information Systems, 11, 245–270,
Brown, M. and Muchira, R. 2004. “Investigating the Relationship between Internet Privacy Concerns and Online Purchase Behavior,” Journal of Electronic Commerce Research, (5:1),
Chellappa, R. K. and Sin, R. 2005. “Personalization versus Privacy: An Empirical Examination of the Online Consumer’s Dilemma,” Information Technology and Management, (6:2-3).
Chellappa, R.K., " Consumers’ Trust in Electronic Commerce Transactions: The Role of Perceived Privacy and Perceived Security," under submission
CNN. 200. Survey: Most in U.S. Want Companies to Guarantee Online Privacy. Cahle News Network online, August 21, available online at http://www.cnn.com/2000/TECH/computing/08/18/privacy.report/index.html
Culnan, M. J. 1995. “Consumer awareness of name removal procedures: Implications for direct marketing,” J. Direct Marketing (9:2), 10–19.
Culnan, M.J. and Armstrong, P.K. 1999. "Information privacy concerns, procedural fairness, and impersonal trust: An empirical investigation," Organization Science (10:1), 104-115.
Customer Reports Online, 1998. Some Bits and Bytes of Consumer-Friendly sites, http://www.consumersunion.org/special/samples/reports/98/12shp2.htm, accessed by Miyazaki, A.D.
Dai, Hua; Iyer, Lakshmi; and Singh, Rahul, 2007. "An Investigation of Consumer's Security and Privacy Perceptions in Mobile Commerce", in Americas Conference on Information Systems (AMCIS2007) proceedings, Keystone, CO, USA.
Dutta, A. and McCrohan, K. 2002. “Management’s Role in Information Security in a Cyber Economy,” California Management Review, (45:1), 67-87,
Earp, J. B., Anton, A. I., Aiman-Smith, L., and Stufflebeam, W. H. 2005. Examining Internet privacy policies within the context of user privacy values. IEEE Transactions on Engineering Management, (52:2), 227-237.
Earp, J.B. and Anton, A.I. 2004. “Addressing End-User Privacy Concerns”, Proceedings of the Tenth Americas Conference on Information Systems, New York.
Fornell, C., Robinson, W. T., and Wernerfelt, B. 1985. “Consumption experience and sales promotion expenditure,” Management Science (31), pp.1084–1105.
Foxman, E. R., and Kilcoyne, P. 1993. “Information technology, marketing practice, and consumer privacy: Ethical issues,” Journal of Public Policy Marketing (12:1), 106–119.
Ghosh, A. K. and Swaminatha, T. M. 2001. “Software Security and Privacy Risk in Mobile E-commerce,” Communications of the ACM, (44:2).
Goodhue, D.L. and Straub, D.W. 1991. "Security Concerns of Systems Users: A Study of Perceptions of the Adequacy of Security," Information and Management (20), 13-27.
Hann, I.H., K. L.Hui, T. Lee, and I. Png, 2007. “Overcoming Information Privacy Concerns: An Information Processing Theory Approach,” Journal of Management Information Systems, 24(2), 13-42.
Harris P., Rettie R. and Kwan C. C. 2005. “Adoption and Usage of M-Commerce: A Cross-Cultural Comparison of Hong Kong and United Kingdom,” Journal of Electronic Commerce Research, (6:3).
Hoffman, D.L., Novak, T.P., Peralta, M. 1999. “Building consumer trust online”. Communications of the ACM (42:4), 80–85.
Hong, J.I. and Landay, J.A. 2004. “Architecture for privacy-sensitive ubiquitous computing,” Proceedings of 2nd International Conference on Mobile Systems, Applications, and Services (MobiSys), Boston.
Jarvenpaa S.L. and Lang K.R. 2005. “Managing the paradoxes of mobile technology”, Information Systems Management (22:4), 7-23.
Jarvenpaa, S.L. and Todd, P.A., 1997. “Consumer reactions to electronic shopping on the world wide web”, International Journal of Electronic Commerce, (2:1).
Jarvenpaa, S.L., Lang, K.R. and Takeda, Y.; Tuunainen, V.K. 2003. “Mobile Commerce at Crossroad,” Communications of the ACM. (46:2), 41-44.
Jones, M.G. 1991. "Privacy: A significant marketing issue for the 1990s," Journal of public Policy and Marketing (10), 133-148.
Kaasinen, E. 2003. User needs for location-aware mobile services. Personal and Ubiquitous Computing, (7:1), 70-79.
Kay, R. 2002 “Wireless Security,” Computer World, (36:26), 38-39.
Khalifa, M. and Sammi, K. N. C. 2002. “Adoption of Mobile Commerce: Role of Exposure” Proceedings of the 35th Hawaii International Conference on System Sciences.
Laudon, K; Laudon, J. 2003. Essentials of Management Information Systems Fifth Edition. Prentice Hall: New Jersey.
Lu, J. Liu, C. Yu, C. and Yao, J. 2003 “Acceptance of Wireless Internet via Mobile Technology in China,” Proceedings of Ninth Americas Conference on Information Systems.
Malhotra, N. K., Kim, S. S. and Agarwal, J. 2004. “Internet users' Information privacy concerns (IUIPC): The construct, the scale and a causal model”, Information Systems Research, 15, 336-355.
Milne, G. R. 2000. “Privacy and Ethical Issues in Database/Interactive Marketing and Public Policy: A Research Framework and Overview of the Special Issue.” Journal of Public Policy & Marketing, 19,1-6.
Minch, R. P. 2004. “Privacy issues in location-aware mobile devices,” In Proceedings of the 37th Hawaii International Conference on System Sciences, Big Island, Hawaii.
Miyazaki, A.D.and Fernandez, A. 2001 "Consumer perceptions of privacy and security risks for online shopping", The Journal of Consumer Affairs, (35:1) 27-44.
Mylonakis, J. 2004. “Can Mobile Services Facilitate Commerce? Findings from the Greek Telecommunications Market", International Journal of Mobile Communication, (2:2) 188-198.
Nunnally, J. C., & Bernstein, I. H. 2006. Psychometric theory (3rd ed). New York: McGraw-Hill, 1994. Pavlou, P. A., and Fygenson, M. “Understanding and Predicting Electronic Commerce Adoption: An Extension of The Theory of Planned Behavior,” MIS Quarterly (30:1), pp.115-143.
Phelps, J., Nowak, G. and Ferrell, F. 2004. “Privacy concerns and consumer willingness to provide personal information,” Journal Public Policy Marketing (19:1), 27–41.
Beckwith. R, 2003. “Designing for ubiquity: The perception of privacy,” Pervasive Computing, (2:2) 40–46.
Rao, M. 2006. "South Korea Aims for Global Leadership in Wireless, Broadband Internet Markets in Information Age," (available online at http://unpan1.un.org/intradoc/groups/public/documents/apcity/unpan006689.pdf).
Reid, H. M., 2001, “Remarks to security and privacy for government online” Available at URL: http://infocom.gc.ca/speeches/speechview-e.asp?intspeechId=5
Rubin, M. R. 1995 “Private Rights, Public Wrongs: The Computer and Personal Privacy”, John Wiley and Sons: New York.
Salisbury, W.D., Pearson, R.A., Pearson, A.W. and Miller, D.W. 2001. “Perceived security and world wide web purchase intention”, Industrial Management & Data Systems, (101:4), 165-76.
Siau, K. and Shen, Z., 2003. “Building customer trust in mobile commerce”, Communications of ACM, (46:4), 91–94.
Smith, J.H., Milberg, S.J. and Burke, S.J. 1996. "Information Privacy: Measuring Individuals' Concerns About Corporate Practices," MIS Quarterly (20:2), pp. 167-196.
Stahl, B. 2004 “Responsibility for Information Assurance and Privacy: A Problem of Individual Ethics?,” Journal of Organizational and End User Computing, (16:3), 59-77.
Stewart, K.A. and Segars, A.H. 2002. "An Empirical Examination of the Concern for Information Privacy Instrument," Information Systems Research (13:1), 36-49.
Suh, B., Han, I. 2003. “The impact of consumer trust and perception of security control on the acceptance of electronic commerce”, International Journal of Electronic Commerce, (7:3), 135-161.
Udo, G.J. 2001. ‘Privacy and Security Concerns as Major Barriers for E-commerce: A Survey Study’, Information Management & Computer Security, (9:4), 165- 174.
Wagner, M.J. 2005. “Cutting the cords”, The American City & County, (120:13), pg-38.
Warren, S. and L., Brandeis 1890 “The Right to Privacy,” Harvard Law Review, (4:5), 193-220.
Westin, A. 1971. Privacy and Freedom. New York: Atheneum Press. www.wikipedia.org
Zellweger, P. 1997. "Web-based sales: Defining the cognitive buyer," Electronic Markets (7:3), pp. 10-16.