Skip to main content
Top

2024 | OriginalPaper | Chapter

Towards an Information Privacy Competency Model for the Usage of Mobile Applications

Authors : Aikaterini Soumelidou, Aggeliki Tsohou

Published in: ICT Systems Security and Privacy Protection

Publisher: Springer Nature Switzerland

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

In a world where the industry of mobile applications (apps) is continuously expanding, the need for reinforcing users’ protection of information privacy is urgent. Focusing on this emerging need, this study aims at highlighting the main competencies that a user of mobile apps should hold in order to protect their information privacy. The contribution of the paper is threefold; First, it proposes a framework which describes the actions that users of mobile applications make before and after the installation of the application. Second, based on conceptual analysis, this study introduces a framework for the synthesis of the Information Privacy Competency Model for Users of Mobile Apps incorporating widely known personality theories namely Protection Motivation Theory and Big Personality Theory. Finally, synthesizes the results into indicative competencies that users of mobile apps should hold so as to be competent to protect their information privacy. This study offers important implications regarding privacy protection in mobile apps not only for users, but also for privacy researchers, online service providers and educators.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
2.
go back to reference Zhao, Y., Ni, Q., Zhou, R.: What factors influence the mobile health service adoption? A meta-analysis and the moderating role of age. Int. J. Inf. Manage. 43, 342–350 (2017) Zhao, Y., Ni, Q., Zhou, R.: What factors influence the mobile health service adoption? A meta-analysis and the moderating role of age. Int. J. Inf. Manage. 43, 342–350 (2017)
3.
go back to reference Flora, H.K., Wang, X., Chande, S.V.: An investigation on the characteristics of mobile applications: a survey study. Int. J. Inf. Technol. Comput. Sci. 6, 21–27 (2014) Flora, H.K., Wang, X., Chande, S.V.: An investigation on the characteristics of mobile applications: a survey study. Int. J. Inf. Technol. Comput. Sci. 6, 21–27 (2014)
4.
go back to reference Gu, J., Xu, Y., Xu, H., Zhang, C., Ling, H.: Privacy concerns for mobile app download: an elaboration likelihood model perspective. Decis. Support. Syst. 94, 19–28 (2017)CrossRef Gu, J., Xu, Y., Xu, H., Zhang, C., Ling, H.: Privacy concerns for mobile app download: an elaboration likelihood model perspective. Decis. Support. Syst. 94, 19–28 (2017)CrossRef
5.
go back to reference Nema, P., Anthonysamy, P., Taft, N., Peddinti, S.: Analyzing user perspectives on mobile app privacy at scale. In: The 44th International Conference on Software Engineering (ICSE ‘22), pp. 112–124. Association for Computing Machinery, New York, NY, USA (2022) Nema, P., Anthonysamy, P., Taft, N., Peddinti, S.: Analyzing user perspectives on mobile app privacy at scale. In: The 44th International Conference on Software Engineering (ICSE ‘22), pp. 112–124. Association for Computing Machinery, New York, NY, USA (2022)
6.
go back to reference Porter Felt, A., Ha, E., Egelman, S., Haney, A., Chin, E., Wagner, D.: Android permissions: user attention, comprehension, and behavior. In: Proceedings of the SOUPS (2012) Porter Felt, A., Ha, E., Egelman, S., Haney, A., Chin, E., Wagner, D.: Android permissions: user attention, comprehension, and behavior. In: Proceedings of the SOUPS (2012)
8.
go back to reference Tang, J., Zhang, B., Xiao, S.: Examining the intention of authorization via apps: personality traits and expanded privacy calculus perspectives. Behav. Sci. (Basel) 12, 218 (2022). https://doi.org/10.3390/bs12070218. PMID: 35877288. PMCID: PMC9311954 Tang, J., Zhang, B., Xiao, S.: Examining the intention of authorization via apps: personality traits and expanded privacy calculus perspectives. Behav. Sci. (Basel) 12, 218 (2022). https://​doi.​org/​10.​3390/​bs12070218. PMID: 35877288. PMCID: PMC9311954
10.
go back to reference Brandtzaeg, P.B., Pultier, A., Harrand, N.: Privacy in mobile apps: measuring privacy risks in mobile apps. Privacy in Mobile Apps (2016) Brandtzaeg, P.B., Pultier, A., Harrand, N.: Privacy in mobile apps: measuring privacy risks in mobile apps. Privacy in Mobile Apps (2016)
13.
go back to reference McClelland, D.C.: Testing for competence rather than for “intelligence”. Am. Psychol. 28(1), 1–14 (1973) McClelland, D.C.: Testing for competence rather than for “intelligence”. Am. Psychol. 28(1), 1–14 (1973)
14.
go back to reference Boyatzis, R.E.: Competencies in the 21st century. J. Manage. Dev. 27(1), 5–12 (2008)CrossRef Boyatzis, R.E.: Competencies in the 21st century. J. Manage. Dev. 27(1), 5–12 (2008)CrossRef
15.
go back to reference Page, C., Wilson, M.G.: Management competencies in New Zealand. On the inside looking in Wellington. Ministry of Commerce – 5 (1994) Page, C., Wilson, M.G.: Management competencies in New Zealand. On the inside looking in Wellington. Ministry of Commerce – 5 (1994)
16.
go back to reference Holtkamp, P., Lau, I., Pawlowski, J.M.: How do software development competences change in global settings – an explorative study. J. Softw. Evol. Process 27(1), 50–72 (2014)CrossRef Holtkamp, P., Lau, I., Pawlowski, J.M.: How do software development competences change in global settings – an explorative study. J. Softw. Evol. Process 27(1), 50–72 (2014)CrossRef
17.
go back to reference Yan, Y.J.: Problems of quality of migrant workers and countermeasures from the perspective of iceberg model. Asian Agric. Res. 5, 48–50 (2012) Yan, Y.J.: Problems of quality of migrant workers and countermeasures from the perspective of iceberg model. Asian Agric. Res. 5, 48–50 (2012)
19.
go back to reference Staškeviča, A.: The importance of competency model development. Acta Oeconomica Pragensia 27(2), 62–71 (2019)CrossRef Staškeviča, A.: The importance of competency model development. Acta Oeconomica Pragensia 27(2), 62–71 (2019)CrossRef
20.
go back to reference Alidrisi, H.M., Mohamed, S.: Developing a personal leadership competency model for safety managers: a systems thinking approach. Int. J. Environ. Res. Public Health 19(4), 2197 (2022)CrossRef Alidrisi, H.M., Mohamed, S.: Developing a personal leadership competency model for safety managers: a systems thinking approach. Int. J. Environ. Res. Public Health 19(4), 2197 (2022)CrossRef
21.
go back to reference Boyatzis, R.E.: The Competent Manager: A Model for Effective Performance. Wiley, New York (1982) Boyatzis, R.E.: The Competent Manager: A Model for Effective Performance. Wiley, New York (1982)
22.
go back to reference Spencer, L.M., Spencer, S.M.: Competence at Work: Models for Superior Performance. Wiley, New York (1993) Spencer, L.M., Spencer, S.M.: Competence at Work: Models for Superior Performance. Wiley, New York (1993)
23.
go back to reference Klendauer, R., Berkovich, M., Gelvin, R., Leimeister, J., Krcmar, H.: Towards a competency model for requirements analysts. Inf. Syst. J. 22(6), 475–503 (2012)CrossRef Klendauer, R., Berkovich, M., Gelvin, R., Leimeister, J., Krcmar, H.: Towards a competency model for requirements analysts. Inf. Syst. J. 22(6), 475–503 (2012)CrossRef
24.
go back to reference Moustroufas, E., Stamelos, I., Angelis, L.: Competency profiling for software engineers: literature review and a new model. In: PCI ‘15: Proceedings of the 19th Panhellenic Conference on Informatics, pp. 235–240 (2015) Moustroufas, E., Stamelos, I., Angelis, L.: Competency profiling for software engineers: literature review and a new model. In: PCI ‘15: Proceedings of the 19th Panhellenic Conference on Informatics, pp. 235–240 (2015)
25.
go back to reference Holtkamp, P., Jokinen, J.P., Pawlowski, M.Y.: Soft competency requirements in requirements engineering, software design, implementation, and testing. J. Syst. Softw. 101, 136–146 (2015)CrossRef Holtkamp, P., Jokinen, J.P., Pawlowski, M.Y.: Soft competency requirements in requirements engineering, software design, implementation, and testing. J. Syst. Softw. 101, 136–146 (2015)CrossRef
26.
go back to reference Bogoviz, A., Suglobov, A., Maloletko, A., Kaurova, O., Lobova, S.: Frontier Information Technology and Systems Research in Cooperative Economics (2021) Bogoviz, A., Suglobov, A., Maloletko, A., Kaurova, O., Lobova, S.: Frontier Information Technology and Systems Research in Cooperative Economics (2021)
27.
go back to reference Prifti, L., Knigge, M., Kienegger, H., Krcmar, H.: A competency model for “Industrie 4.0” employees. In: Proceedings der 13. Internationalen Tagung Wirtschaftsinformatik (WI 2017), pp. 46–60. St. Gallen, S. (2017) Prifti, L., Knigge, M., Kienegger, H., Krcmar, H.: A competency model for “Industrie 4.0” employees. In: Proceedings der 13. Internationalen Tagung Wirtschaftsinformatik (WI 2017), pp. 46–60. St. Gallen, S. (2017)
28.
go back to reference Eschenbrenner, B., Nah, F.F.: Information systems user competency: a conceptual foundation. Commun. Assoc. Inf. Syst. 34, 80 (2014) Eschenbrenner, B., Nah, F.F.: Information systems user competency: a conceptual foundation. Commun. Assoc. Inf. Syst. 34, 80 (2014)
29.
go back to reference Tsohou, A., Holtkamp, P.: Are users competent to comply with information security policies? An analysis of professional competence models. Inf. Technol. People 31(5), 1047–1106 (2018)CrossRef Tsohou, A., Holtkamp, P.: Are users competent to comply with information security policies? An analysis of professional competence models. Inf. Technol. People 31(5), 1047–1106 (2018)CrossRef
30.
go back to reference Lauricella, A.R., Herdzina, J., Robb, M.: Early childhood educators’ teaching of digital citizenship competencies. Comput. Educ. 158, 103989 (2020) Lauricella, A.R., Herdzina, J., Robb, M.: Early childhood educators’ teaching of digital citizenship competencies. Comput. Educ. 158, 103989 (2020)
31.
go back to reference James, L.T., Wallace, L., Warkentin, M., Kim, B., Collignon, S.: Exposing others’ information on online social networks (OSNs): perceived shared risk, its determinants, and its influence on OSN privacy control use. Inf. Manage. 54, 851–865 (2017) James, L.T., Wallace, L., Warkentin, M., Kim, B., Collignon, S.: Exposing others’ information on online social networks (OSNs): perceived shared risk, its determinants, and its influence on OSN privacy control use. Inf. Manage. 54, 851–865 (2017)
32.
go back to reference Cham, K., Edwards, M.-L., Kruesi, L., Celeste, T., Hennessey, T.: Digital preferences and perceptions of students in health professional courses at a leading Australian university: a baseline for improving digital skills and competencies in health graduates. Australas. J. Educ. Technol. 38(1), 69–86 (2021)CrossRef Cham, K., Edwards, M.-L., Kruesi, L., Celeste, T., Hennessey, T.: Digital preferences and perceptions of students in health professional courses at a leading Australian university: a baseline for improving digital skills and competencies in health graduates. Australas. J. Educ. Technol. 38(1), 69–86 (2021)CrossRef
33.
go back to reference Moll, R., Pieschl, S., Bromme, R.: Competent or clueless? Users’ knowledge and misconceptions about their online privacy management. Comput. Hum. Behav. 41, 212–219 (2014)CrossRef Moll, R., Pieschl, S., Bromme, R.: Competent or clueless? Users’ knowledge and misconceptions about their online privacy management. Comput. Hum. Behav. 41, 212–219 (2014)CrossRef
34.
go back to reference Schueller, S.M., Armstrong, C.M., Neary, M., Ciulla, R.: An introduction to core competencies for the use of mobile apps in cognitive and behavioral practice. Cogn. Behav. Pract. 29, 69–80 (2021) Schueller, S.M., Armstrong, C.M., Neary, M., Ciulla, R.: An introduction to core competencies for the use of mobile apps in cognitive and behavioral practice. Cogn. Behav. Pract. 29, 69–80 (2021)
35.
go back to reference Bitton, R., Finkelshtein, A., Sidi, L., Puzis, R., Rokach, L., Shabtai, A.: Taxonomy of mobile users’ security awareness. Comput. Secur. 73, 266–293 (2018)CrossRef Bitton, R., Finkelshtein, A., Sidi, L., Puzis, R., Rokach, L., Shabtai, A.: Taxonomy of mobile users’ security awareness. Comput. Secur. 73, 266–293 (2018)CrossRef
36.
38.
go back to reference Park, Y., Jones-Jang, M.: Understanding privacy knowledge and skill in mobile communication. Comput. Hum. Behav. 38, 296–303 (2014) Park, Y., Jones-Jang, M.: Understanding privacy knowledge and skill in mobile communication. Comput. Hum. Behav. 38, 296–303 (2014)
39.
go back to reference Pentina, I., Zhang, L., Bata, H., Chen, Y.: Exploring privacy paradox in information-sensitive mobile app adoption: a cross-cultural comparison. Comput. Hum. Behav. 65, 409–419 (2016)CrossRef Pentina, I., Zhang, L., Bata, H., Chen, Y.: Exploring privacy paradox in information-sensitive mobile app adoption: a cross-cultural comparison. Comput. Hum. Behav. 65, 409–419 (2016)CrossRef
40.
go back to reference Kokolakis, S.: Privacy attitudes and privacy behavior: a review of current research on the privacy paradox phenomenon. Comput. Secur. 64, 122–134 (2017)CrossRef Kokolakis, S.: Privacy attitudes and privacy behavior: a review of current research on the privacy paradox phenomenon. Comput. Secur. 64, 122–134 (2017)CrossRef
41.
go back to reference Soumelidou, A., Tsohou, A.: Towards the creation of a profile of the information privacy aware user through a systematic literature review of information privacy awareness. Telematics Inform. 61, 101592 (2021) Soumelidou, A., Tsohou, A.: Towards the creation of a profile of the information privacy aware user through a systematic literature review of information privacy awareness. Telematics Inform. 61, 101592 (2021)
42.
go back to reference Chouhan, V.S., Sandeep, S.: Understanding competencies and competency modeling - a literature survey. IOSR J. Bus. Manag. 16, 14–22 (2014)CrossRef Chouhan, V.S., Sandeep, S.: Understanding competencies and competency modeling - a literature survey. IOSR J. Bus. Manag. 16, 14–22 (2014)CrossRef
44.
go back to reference Stone, E.F., Gueutal, H.G., Gardner, D.G., McClure, S.: A field experiment comparing information-privacy values, beliefs, and attitudes across several types of organizations. J. Appl. Psychol. 68(3), 459–468 (1983)CrossRef Stone, E.F., Gueutal, H.G., Gardner, D.G., McClure, S.: A field experiment comparing information-privacy values, beliefs, and attitudes across several types of organizations. J. Appl. Psychol. 68(3), 459–468 (1983)CrossRef
45.
go back to reference Wallace, K.A.: Anonymity. Ethics Inf. Technol. 1(1), 21–31 (1999) Wallace, K.A.: Anonymity. Ethics Inf. Technol. 1(1), 21–31 (1999)
46.
go back to reference Kang, J., Lan, J., Yan, H., Li, W., Shi, X.: Antecedents of information sensitivity and willingness to provide. Mark. Intell. Plan. 40(6), 787–803 (2022)CrossRef Kang, J., Lan, J., Yan, H., Li, W., Shi, X.: Antecedents of information sensitivity and willingness to provide. Mark. Intell. Plan. 40(6), 787–803 (2022)CrossRef
47.
go back to reference Skalkos, A, Tsohou, A., Karyda, M., Kokolakis, S.: Identifying the values associated with users’ behavior towards anonymity tools through means-end analysis. Comput. Hum. Behav. Rep. 2, 100034 (2020) Skalkos, A, Tsohou, A., Karyda, M., Kokolakis, S.: Identifying the values associated with users’ behavior towards anonymity tools through means-end analysis. Comput. Hum. Behav. Rep. 2, 100034 (2020)
49.
go back to reference Korzaan, L.M., Boswell, T.K.: The influence of personality traits and information privacy concerns on behavioral intentions. J. Comput. Inf. Syst. 48(4), 15–24 (2008) Korzaan, L.M., Boswell, T.K.: The influence of personality traits and information privacy concerns on behavioral intentions. J. Comput. Inf. Syst. 48(4), 15–24 (2008)
51.
go back to reference Huseynov, F.: Understanding usage behavior of different mobile application categories based on personality traits. Interact. Comput. 32, 66–80 (2020) Huseynov, F.: Understanding usage behavior of different mobile application categories based on personality traits. Interact. Comput. 32, 66–80 (2020)
53.
go back to reference Costa, P., McCrae, R.R.: A five-factor theory of personality. In: The Five-Factor Model of Personality: Theoretical Perspectives, vol. 2, pp. 51–87 (1999) Costa, P., McCrae, R.R.: A five-factor theory of personality. In: The Five-Factor Model of Personality: Theoretical Perspectives, vol. 2, pp. 51–87 (1999)
54.
go back to reference Soto, C.J., Kronauer, A., Liang, J.K.: Five-factor model of personality. In: Whitbourne, S.K. (ed.) Encyclopedia of Adulthood and Aging, vol. 2, pp. 506–510. Wiley, Hoboken (2016) Soto, C.J., Kronauer, A., Liang, J.K.: Five-factor model of personality. In: Whitbourne, S.K. (ed.) Encyclopedia of Adulthood and Aging, vol. 2, pp. 506–510. Wiley, Hoboken (2016)
56.
go back to reference Abdel-Khalek, A.: Introduction to the psychology of self-esteem (2016) Abdel-Khalek, A.: Introduction to the psychology of self-esteem (2016)
58.
go back to reference Nardis, Y., Panek, E.: Explaining privacy control on Instagram and Twitter: the roles of narcissism and self-esteem. Commun. Res. Rep. 36(1), 24–34 (2019)CrossRef Nardis, Y., Panek, E.: Explaining privacy control on Instagram and Twitter: the roles of narcissism and self-esteem. Commun. Res. Rep. 36(1), 24–34 (2019)CrossRef
59.
go back to reference Kleinginna, P.R., Kleinginna, A.M.: A categorized list of motivation definitions, with a suggestion for a consensual definition. Motiv. Emot. 5(3), 263–291 (1981)CrossRef Kleinginna, P.R., Kleinginna, A.M.: A categorized list of motivation definitions, with a suggestion for a consensual definition. Motiv. Emot. 5(3), 263–291 (1981)CrossRef
60.
go back to reference McNeil, E.B., Rubin, Z.: The Psychology of Being Human, 2nd edn. Canfield, San Francisco (1977) McNeil, E.B., Rubin, Z.: The Psychology of Being Human, 2nd edn. Canfield, San Francisco (1977)
61.
go back to reference Rogers, R., Cacioppo, J., Richard P.: Cognitive and physiological processes in fear appeals and attitude change: a revised theory of protection motivation (1983) Rogers, R., Cacioppo, J., Richard P.: Cognitive and physiological processes in fear appeals and attitude change: a revised theory of protection motivation (1983)
63.
go back to reference Sharma, S., Singh, G., Sharma, R., Jones, P., Kraus, S., Dwivedi, Y.K.: Digital health innovation: exploring adoption of COVID-19 digital contact tracing apps. IEEE Trans. Eng. Manage. 1–17 (2020) Sharma, S., Singh, G., Sharma, R., Jones, P., Kraus, S., Dwivedi, Y.K.: Digital health innovation: exploring adoption of COVID-19 digital contact tracing apps. IEEE Trans. Eng. Manage. 1–17 (2020)
64.
go back to reference Chen, J.V., Widjaja, A.E., Yen, D.C.: Need for affiliation, need for popularity, self-esteem, and the moderating effect of Big Five personality traits affecting individuals’ self-disclosure on Facebook. Int. J. Hum. Comput. Interact. 31(11), 815–831 (2015)CrossRef Chen, J.V., Widjaja, A.E., Yen, D.C.: Need for affiliation, need for popularity, self-esteem, and the moderating effect of Big Five personality traits affecting individuals’ self-disclosure on Facebook. Int. J. Hum. Comput. Interact. 31(11), 815–831 (2015)CrossRef
65.
go back to reference Wang, T., Duong, T.D., Chen, C.: Intention to disclose personal information via mobile applications: a privacy calculus perspective. Int. J. Inf. Manage. 36(4), 531–542 (2016)CrossRef Wang, T., Duong, T.D., Chen, C.: Intention to disclose personal information via mobile applications: a privacy calculus perspective. Int. J. Inf. Manage. 36(4), 531–542 (2016)CrossRef
66.
go back to reference Zhang, L., McDowell, W.C.: Am I really at risk? Determinants of online users’ intentions to use strong passwords. J. Internet Commer. 8(3), 180–197 (2009) Zhang, L., McDowell, W.C.: Am I really at risk? Determinants of online users’ intentions to use strong passwords. J. Internet Commer. 8(3), 180–197 (2009)
67.
go back to reference Kong, H., Anawar, S., Othman, N., Ayop, Z., Erman, H.: User privacy protection behavior and information sharing in mobile health application. Int. J. Adv. Trends Comput. Sci. Eng. 9, 5250–5258 (2022) Kong, H., Anawar, S., Othman, N., Ayop, Z., Erman, H.: User privacy protection behavior and information sharing in mobile health application. Int. J. Adv. Trends Comput. Sci. Eng. 9, 5250–5258 (2022)
Metadata
Title
Towards an Information Privacy Competency Model for the Usage of Mobile Applications
Authors
Aikaterini Soumelidou
Aggeliki Tsohou
Copyright Year
2024
DOI
https://doi.org/10.1007/978-3-031-56326-3_16

Premium Partner