Skip to main content

2024 | OriginalPaper | Buchkapitel

Towards an Information Privacy Competency Model for the Usage of Mobile Applications

verfasst von : Aikaterini Soumelidou, Aggeliki Tsohou

Erschienen in: ICT Systems Security and Privacy Protection

Verlag: Springer Nature Switzerland

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

In a world where the industry of mobile applications (apps) is continuously expanding, the need for reinforcing users’ protection of information privacy is urgent. Focusing on this emerging need, this study aims at highlighting the main competencies that a user of mobile apps should hold in order to protect their information privacy. The contribution of the paper is threefold; First, it proposes a framework which describes the actions that users of mobile applications make before and after the installation of the application. Second, based on conceptual analysis, this study introduces a framework for the synthesis of the Information Privacy Competency Model for Users of Mobile Apps incorporating widely known personality theories namely Protection Motivation Theory and Big Personality Theory. Finally, synthesizes the results into indicative competencies that users of mobile apps should hold so as to be competent to protect their information privacy. This study offers important implications regarding privacy protection in mobile apps not only for users, but also for privacy researchers, online service providers and educators.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
2.
Zurück zum Zitat Zhao, Y., Ni, Q., Zhou, R.: What factors influence the mobile health service adoption? A meta-analysis and the moderating role of age. Int. J. Inf. Manage. 43, 342–350 (2017) Zhao, Y., Ni, Q., Zhou, R.: What factors influence the mobile health service adoption? A meta-analysis and the moderating role of age. Int. J. Inf. Manage. 43, 342–350 (2017)
3.
Zurück zum Zitat Flora, H.K., Wang, X., Chande, S.V.: An investigation on the characteristics of mobile applications: a survey study. Int. J. Inf. Technol. Comput. Sci. 6, 21–27 (2014) Flora, H.K., Wang, X., Chande, S.V.: An investigation on the characteristics of mobile applications: a survey study. Int. J. Inf. Technol. Comput. Sci. 6, 21–27 (2014)
4.
Zurück zum Zitat Gu, J., Xu, Y., Xu, H., Zhang, C., Ling, H.: Privacy concerns for mobile app download: an elaboration likelihood model perspective. Decis. Support. Syst. 94, 19–28 (2017)CrossRef Gu, J., Xu, Y., Xu, H., Zhang, C., Ling, H.: Privacy concerns for mobile app download: an elaboration likelihood model perspective. Decis. Support. Syst. 94, 19–28 (2017)CrossRef
5.
Zurück zum Zitat Nema, P., Anthonysamy, P., Taft, N., Peddinti, S.: Analyzing user perspectives on mobile app privacy at scale. In: The 44th International Conference on Software Engineering (ICSE ‘22), pp. 112–124. Association for Computing Machinery, New York, NY, USA (2022) Nema, P., Anthonysamy, P., Taft, N., Peddinti, S.: Analyzing user perspectives on mobile app privacy at scale. In: The 44th International Conference on Software Engineering (ICSE ‘22), pp. 112–124. Association for Computing Machinery, New York, NY, USA (2022)
6.
Zurück zum Zitat Porter Felt, A., Ha, E., Egelman, S., Haney, A., Chin, E., Wagner, D.: Android permissions: user attention, comprehension, and behavior. In: Proceedings of the SOUPS (2012) Porter Felt, A., Ha, E., Egelman, S., Haney, A., Chin, E., Wagner, D.: Android permissions: user attention, comprehension, and behavior. In: Proceedings of the SOUPS (2012)
8.
Zurück zum Zitat Tang, J., Zhang, B., Xiao, S.: Examining the intention of authorization via apps: personality traits and expanded privacy calculus perspectives. Behav. Sci. (Basel) 12, 218 (2022). https://doi.org/10.3390/bs12070218. PMID: 35877288. PMCID: PMC9311954 Tang, J., Zhang, B., Xiao, S.: Examining the intention of authorization via apps: personality traits and expanded privacy calculus perspectives. Behav. Sci. (Basel) 12, 218 (2022). https://​doi.​org/​10.​3390/​bs12070218. PMID: 35877288. PMCID: PMC9311954
10.
Zurück zum Zitat Brandtzaeg, P.B., Pultier, A., Harrand, N.: Privacy in mobile apps: measuring privacy risks in mobile apps. Privacy in Mobile Apps (2016) Brandtzaeg, P.B., Pultier, A., Harrand, N.: Privacy in mobile apps: measuring privacy risks in mobile apps. Privacy in Mobile Apps (2016)
11.
13.
Zurück zum Zitat McClelland, D.C.: Testing for competence rather than for “intelligence”. Am. Psychol. 28(1), 1–14 (1973) McClelland, D.C.: Testing for competence rather than for “intelligence”. Am. Psychol. 28(1), 1–14 (1973)
14.
Zurück zum Zitat Boyatzis, R.E.: Competencies in the 21st century. J. Manage. Dev. 27(1), 5–12 (2008)CrossRef Boyatzis, R.E.: Competencies in the 21st century. J. Manage. Dev. 27(1), 5–12 (2008)CrossRef
15.
Zurück zum Zitat Page, C., Wilson, M.G.: Management competencies in New Zealand. On the inside looking in Wellington. Ministry of Commerce – 5 (1994) Page, C., Wilson, M.G.: Management competencies in New Zealand. On the inside looking in Wellington. Ministry of Commerce – 5 (1994)
16.
Zurück zum Zitat Holtkamp, P., Lau, I., Pawlowski, J.M.: How do software development competences change in global settings – an explorative study. J. Softw. Evol. Process 27(1), 50–72 (2014)CrossRef Holtkamp, P., Lau, I., Pawlowski, J.M.: How do software development competences change in global settings – an explorative study. J. Softw. Evol. Process 27(1), 50–72 (2014)CrossRef
17.
Zurück zum Zitat Yan, Y.J.: Problems of quality of migrant workers and countermeasures from the perspective of iceberg model. Asian Agric. Res. 5, 48–50 (2012) Yan, Y.J.: Problems of quality of migrant workers and countermeasures from the perspective of iceberg model. Asian Agric. Res. 5, 48–50 (2012)
19.
Zurück zum Zitat Staškeviča, A.: The importance of competency model development. Acta Oeconomica Pragensia 27(2), 62–71 (2019)CrossRef Staškeviča, A.: The importance of competency model development. Acta Oeconomica Pragensia 27(2), 62–71 (2019)CrossRef
20.
Zurück zum Zitat Alidrisi, H.M., Mohamed, S.: Developing a personal leadership competency model for safety managers: a systems thinking approach. Int. J. Environ. Res. Public Health 19(4), 2197 (2022)CrossRef Alidrisi, H.M., Mohamed, S.: Developing a personal leadership competency model for safety managers: a systems thinking approach. Int. J. Environ. Res. Public Health 19(4), 2197 (2022)CrossRef
21.
Zurück zum Zitat Boyatzis, R.E.: The Competent Manager: A Model for Effective Performance. Wiley, New York (1982) Boyatzis, R.E.: The Competent Manager: A Model for Effective Performance. Wiley, New York (1982)
22.
Zurück zum Zitat Spencer, L.M., Spencer, S.M.: Competence at Work: Models for Superior Performance. Wiley, New York (1993) Spencer, L.M., Spencer, S.M.: Competence at Work: Models for Superior Performance. Wiley, New York (1993)
23.
Zurück zum Zitat Klendauer, R., Berkovich, M., Gelvin, R., Leimeister, J., Krcmar, H.: Towards a competency model for requirements analysts. Inf. Syst. J. 22(6), 475–503 (2012)CrossRef Klendauer, R., Berkovich, M., Gelvin, R., Leimeister, J., Krcmar, H.: Towards a competency model for requirements analysts. Inf. Syst. J. 22(6), 475–503 (2012)CrossRef
24.
Zurück zum Zitat Moustroufas, E., Stamelos, I., Angelis, L.: Competency profiling for software engineers: literature review and a new model. In: PCI ‘15: Proceedings of the 19th Panhellenic Conference on Informatics, pp. 235–240 (2015) Moustroufas, E., Stamelos, I., Angelis, L.: Competency profiling for software engineers: literature review and a new model. In: PCI ‘15: Proceedings of the 19th Panhellenic Conference on Informatics, pp. 235–240 (2015)
25.
Zurück zum Zitat Holtkamp, P., Jokinen, J.P., Pawlowski, M.Y.: Soft competency requirements in requirements engineering, software design, implementation, and testing. J. Syst. Softw. 101, 136–146 (2015)CrossRef Holtkamp, P., Jokinen, J.P., Pawlowski, M.Y.: Soft competency requirements in requirements engineering, software design, implementation, and testing. J. Syst. Softw. 101, 136–146 (2015)CrossRef
26.
Zurück zum Zitat Bogoviz, A., Suglobov, A., Maloletko, A., Kaurova, O., Lobova, S.: Frontier Information Technology and Systems Research in Cooperative Economics (2021) Bogoviz, A., Suglobov, A., Maloletko, A., Kaurova, O., Lobova, S.: Frontier Information Technology and Systems Research in Cooperative Economics (2021)
27.
Zurück zum Zitat Prifti, L., Knigge, M., Kienegger, H., Krcmar, H.: A competency model for “Industrie 4.0” employees. In: Proceedings der 13. Internationalen Tagung Wirtschaftsinformatik (WI 2017), pp. 46–60. St. Gallen, S. (2017) Prifti, L., Knigge, M., Kienegger, H., Krcmar, H.: A competency model for “Industrie 4.0” employees. In: Proceedings der 13. Internationalen Tagung Wirtschaftsinformatik (WI 2017), pp. 46–60. St. Gallen, S. (2017)
28.
Zurück zum Zitat Eschenbrenner, B., Nah, F.F.: Information systems user competency: a conceptual foundation. Commun. Assoc. Inf. Syst. 34, 80 (2014) Eschenbrenner, B., Nah, F.F.: Information systems user competency: a conceptual foundation. Commun. Assoc. Inf. Syst. 34, 80 (2014)
29.
Zurück zum Zitat Tsohou, A., Holtkamp, P.: Are users competent to comply with information security policies? An analysis of professional competence models. Inf. Technol. People 31(5), 1047–1106 (2018)CrossRef Tsohou, A., Holtkamp, P.: Are users competent to comply with information security policies? An analysis of professional competence models. Inf. Technol. People 31(5), 1047–1106 (2018)CrossRef
30.
Zurück zum Zitat Lauricella, A.R., Herdzina, J., Robb, M.: Early childhood educators’ teaching of digital citizenship competencies. Comput. Educ. 158, 103989 (2020) Lauricella, A.R., Herdzina, J., Robb, M.: Early childhood educators’ teaching of digital citizenship competencies. Comput. Educ. 158, 103989 (2020)
31.
Zurück zum Zitat James, L.T., Wallace, L., Warkentin, M., Kim, B., Collignon, S.: Exposing others’ information on online social networks (OSNs): perceived shared risk, its determinants, and its influence on OSN privacy control use. Inf. Manage. 54, 851–865 (2017) James, L.T., Wallace, L., Warkentin, M., Kim, B., Collignon, S.: Exposing others’ information on online social networks (OSNs): perceived shared risk, its determinants, and its influence on OSN privacy control use. Inf. Manage. 54, 851–865 (2017)
32.
Zurück zum Zitat Cham, K., Edwards, M.-L., Kruesi, L., Celeste, T., Hennessey, T.: Digital preferences and perceptions of students in health professional courses at a leading Australian university: a baseline for improving digital skills and competencies in health graduates. Australas. J. Educ. Technol. 38(1), 69–86 (2021)CrossRef Cham, K., Edwards, M.-L., Kruesi, L., Celeste, T., Hennessey, T.: Digital preferences and perceptions of students in health professional courses at a leading Australian university: a baseline for improving digital skills and competencies in health graduates. Australas. J. Educ. Technol. 38(1), 69–86 (2021)CrossRef
33.
Zurück zum Zitat Moll, R., Pieschl, S., Bromme, R.: Competent or clueless? Users’ knowledge and misconceptions about their online privacy management. Comput. Hum. Behav. 41, 212–219 (2014)CrossRef Moll, R., Pieschl, S., Bromme, R.: Competent or clueless? Users’ knowledge and misconceptions about their online privacy management. Comput. Hum. Behav. 41, 212–219 (2014)CrossRef
34.
Zurück zum Zitat Schueller, S.M., Armstrong, C.M., Neary, M., Ciulla, R.: An introduction to core competencies for the use of mobile apps in cognitive and behavioral practice. Cogn. Behav. Pract. 29, 69–80 (2021) Schueller, S.M., Armstrong, C.M., Neary, M., Ciulla, R.: An introduction to core competencies for the use of mobile apps in cognitive and behavioral practice. Cogn. Behav. Pract. 29, 69–80 (2021)
35.
Zurück zum Zitat Bitton, R., Finkelshtein, A., Sidi, L., Puzis, R., Rokach, L., Shabtai, A.: Taxonomy of mobile users’ security awareness. Comput. Secur. 73, 266–293 (2018)CrossRef Bitton, R., Finkelshtein, A., Sidi, L., Puzis, R., Rokach, L., Shabtai, A.: Taxonomy of mobile users’ security awareness. Comput. Secur. 73, 266–293 (2018)CrossRef
36.
Zurück zum Zitat Trepte, S., et al.: Do people know about privacy and data protection strategies? Towards the “online privacy literacy scale” (OPLIS). In: Gutwirth, S., Leenes, R., de Hert, P. (eds.) Reforming European Data Protection Law. LGTS, vol. 20, pp. 333–365. Springer, Dordrecht (2015). https://doi.org/10.1007/978-94-017-9385-8_14CrossRef Trepte, S., et al.: Do people know about privacy and data protection strategies? Towards the “online privacy literacy scale” (OPLIS). In: Gutwirth, S., Leenes, R., de Hert, P. (eds.) Reforming European Data Protection Law. LGTS, vol. 20, pp. 333–365. Springer, Dordrecht (2015). https://​doi.​org/​10.​1007/​978-94-017-9385-8_​14CrossRef
38.
Zurück zum Zitat Park, Y., Jones-Jang, M.: Understanding privacy knowledge and skill in mobile communication. Comput. Hum. Behav. 38, 296–303 (2014) Park, Y., Jones-Jang, M.: Understanding privacy knowledge and skill in mobile communication. Comput. Hum. Behav. 38, 296–303 (2014)
39.
Zurück zum Zitat Pentina, I., Zhang, L., Bata, H., Chen, Y.: Exploring privacy paradox in information-sensitive mobile app adoption: a cross-cultural comparison. Comput. Hum. Behav. 65, 409–419 (2016)CrossRef Pentina, I., Zhang, L., Bata, H., Chen, Y.: Exploring privacy paradox in information-sensitive mobile app adoption: a cross-cultural comparison. Comput. Hum. Behav. 65, 409–419 (2016)CrossRef
40.
Zurück zum Zitat Kokolakis, S.: Privacy attitudes and privacy behavior: a review of current research on the privacy paradox phenomenon. Comput. Secur. 64, 122–134 (2017)CrossRef Kokolakis, S.: Privacy attitudes and privacy behavior: a review of current research on the privacy paradox phenomenon. Comput. Secur. 64, 122–134 (2017)CrossRef
41.
Zurück zum Zitat Soumelidou, A., Tsohou, A.: Towards the creation of a profile of the information privacy aware user through a systematic literature review of information privacy awareness. Telematics Inform. 61, 101592 (2021) Soumelidou, A., Tsohou, A.: Towards the creation of a profile of the information privacy aware user through a systematic literature review of information privacy awareness. Telematics Inform. 61, 101592 (2021)
42.
Zurück zum Zitat Chouhan, V.S., Sandeep, S.: Understanding competencies and competency modeling - a literature survey. IOSR J. Bus. Manag. 16, 14–22 (2014)CrossRef Chouhan, V.S., Sandeep, S.: Understanding competencies and competency modeling - a literature survey. IOSR J. Bus. Manag. 16, 14–22 (2014)CrossRef
44.
Zurück zum Zitat Stone, E.F., Gueutal, H.G., Gardner, D.G., McClure, S.: A field experiment comparing information-privacy values, beliefs, and attitudes across several types of organizations. J. Appl. Psychol. 68(3), 459–468 (1983)CrossRef Stone, E.F., Gueutal, H.G., Gardner, D.G., McClure, S.: A field experiment comparing information-privacy values, beliefs, and attitudes across several types of organizations. J. Appl. Psychol. 68(3), 459–468 (1983)CrossRef
45.
Zurück zum Zitat Wallace, K.A.: Anonymity. Ethics Inf. Technol. 1(1), 21–31 (1999) Wallace, K.A.: Anonymity. Ethics Inf. Technol. 1(1), 21–31 (1999)
46.
Zurück zum Zitat Kang, J., Lan, J., Yan, H., Li, W., Shi, X.: Antecedents of information sensitivity and willingness to provide. Mark. Intell. Plan. 40(6), 787–803 (2022)CrossRef Kang, J., Lan, J., Yan, H., Li, W., Shi, X.: Antecedents of information sensitivity and willingness to provide. Mark. Intell. Plan. 40(6), 787–803 (2022)CrossRef
47.
Zurück zum Zitat Skalkos, A, Tsohou, A., Karyda, M., Kokolakis, S.: Identifying the values associated with users’ behavior towards anonymity tools through means-end analysis. Comput. Hum. Behav. Rep. 2, 100034 (2020) Skalkos, A, Tsohou, A., Karyda, M., Kokolakis, S.: Identifying the values associated with users’ behavior towards anonymity tools through means-end analysis. Comput. Hum. Behav. Rep. 2, 100034 (2020)
49.
Zurück zum Zitat Korzaan, L.M., Boswell, T.K.: The influence of personality traits and information privacy concerns on behavioral intentions. J. Comput. Inf. Syst. 48(4), 15–24 (2008) Korzaan, L.M., Boswell, T.K.: The influence of personality traits and information privacy concerns on behavioral intentions. J. Comput. Inf. Syst. 48(4), 15–24 (2008)
51.
Zurück zum Zitat Huseynov, F.: Understanding usage behavior of different mobile application categories based on personality traits. Interact. Comput. 32, 66–80 (2020) Huseynov, F.: Understanding usage behavior of different mobile application categories based on personality traits. Interact. Comput. 32, 66–80 (2020)
53.
Zurück zum Zitat Costa, P., McCrae, R.R.: A five-factor theory of personality. In: The Five-Factor Model of Personality: Theoretical Perspectives, vol. 2, pp. 51–87 (1999) Costa, P., McCrae, R.R.: A five-factor theory of personality. In: The Five-Factor Model of Personality: Theoretical Perspectives, vol. 2, pp. 51–87 (1999)
54.
Zurück zum Zitat Soto, C.J., Kronauer, A., Liang, J.K.: Five-factor model of personality. In: Whitbourne, S.K. (ed.) Encyclopedia of Adulthood and Aging, vol. 2, pp. 506–510. Wiley, Hoboken (2016) Soto, C.J., Kronauer, A., Liang, J.K.: Five-factor model of personality. In: Whitbourne, S.K. (ed.) Encyclopedia of Adulthood and Aging, vol. 2, pp. 506–510. Wiley, Hoboken (2016)
56.
Zurück zum Zitat Abdel-Khalek, A.: Introduction to the psychology of self-esteem (2016) Abdel-Khalek, A.: Introduction to the psychology of self-esteem (2016)
58.
Zurück zum Zitat Nardis, Y., Panek, E.: Explaining privacy control on Instagram and Twitter: the roles of narcissism and self-esteem. Commun. Res. Rep. 36(1), 24–34 (2019)CrossRef Nardis, Y., Panek, E.: Explaining privacy control on Instagram and Twitter: the roles of narcissism and self-esteem. Commun. Res. Rep. 36(1), 24–34 (2019)CrossRef
59.
Zurück zum Zitat Kleinginna, P.R., Kleinginna, A.M.: A categorized list of motivation definitions, with a suggestion for a consensual definition. Motiv. Emot. 5(3), 263–291 (1981)CrossRef Kleinginna, P.R., Kleinginna, A.M.: A categorized list of motivation definitions, with a suggestion for a consensual definition. Motiv. Emot. 5(3), 263–291 (1981)CrossRef
60.
Zurück zum Zitat McNeil, E.B., Rubin, Z.: The Psychology of Being Human, 2nd edn. Canfield, San Francisco (1977) McNeil, E.B., Rubin, Z.: The Psychology of Being Human, 2nd edn. Canfield, San Francisco (1977)
61.
Zurück zum Zitat Rogers, R., Cacioppo, J., Richard P.: Cognitive and physiological processes in fear appeals and attitude change: a revised theory of protection motivation (1983) Rogers, R., Cacioppo, J., Richard P.: Cognitive and physiological processes in fear appeals and attitude change: a revised theory of protection motivation (1983)
63.
Zurück zum Zitat Sharma, S., Singh, G., Sharma, R., Jones, P., Kraus, S., Dwivedi, Y.K.: Digital health innovation: exploring adoption of COVID-19 digital contact tracing apps. IEEE Trans. Eng. Manage. 1–17 (2020) Sharma, S., Singh, G., Sharma, R., Jones, P., Kraus, S., Dwivedi, Y.K.: Digital health innovation: exploring adoption of COVID-19 digital contact tracing apps. IEEE Trans. Eng. Manage. 1–17 (2020)
64.
Zurück zum Zitat Chen, J.V., Widjaja, A.E., Yen, D.C.: Need for affiliation, need for popularity, self-esteem, and the moderating effect of Big Five personality traits affecting individuals’ self-disclosure on Facebook. Int. J. Hum. Comput. Interact. 31(11), 815–831 (2015)CrossRef Chen, J.V., Widjaja, A.E., Yen, D.C.: Need for affiliation, need for popularity, self-esteem, and the moderating effect of Big Five personality traits affecting individuals’ self-disclosure on Facebook. Int. J. Hum. Comput. Interact. 31(11), 815–831 (2015)CrossRef
65.
Zurück zum Zitat Wang, T., Duong, T.D., Chen, C.: Intention to disclose personal information via mobile applications: a privacy calculus perspective. Int. J. Inf. Manage. 36(4), 531–542 (2016)CrossRef Wang, T., Duong, T.D., Chen, C.: Intention to disclose personal information via mobile applications: a privacy calculus perspective. Int. J. Inf. Manage. 36(4), 531–542 (2016)CrossRef
66.
Zurück zum Zitat Zhang, L., McDowell, W.C.: Am I really at risk? Determinants of online users’ intentions to use strong passwords. J. Internet Commer. 8(3), 180–197 (2009) Zhang, L., McDowell, W.C.: Am I really at risk? Determinants of online users’ intentions to use strong passwords. J. Internet Commer. 8(3), 180–197 (2009)
67.
Zurück zum Zitat Kong, H., Anawar, S., Othman, N., Ayop, Z., Erman, H.: User privacy protection behavior and information sharing in mobile health application. Int. J. Adv. Trends Comput. Sci. Eng. 9, 5250–5258 (2022) Kong, H., Anawar, S., Othman, N., Ayop, Z., Erman, H.: User privacy protection behavior and information sharing in mobile health application. Int. J. Adv. Trends Comput. Sci. Eng. 9, 5250–5258 (2022)
Metadaten
Titel
Towards an Information Privacy Competency Model for the Usage of Mobile Applications
verfasst von
Aikaterini Soumelidou
Aggeliki Tsohou
Copyright-Jahr
2024
DOI
https://doi.org/10.1007/978-3-031-56326-3_16

Premium Partner