An Investigation of Consumer's Security and Privacy Perceptions in Mobile Commerce

This study investigates the composition of consumer’s security and privacy perceptions of mobile commerce (m-commerce) and the factors shaping these security and privacy perceptions. Based on literature review, we examined the effect of eight determinants: information type, information collection, secondary use of information, error, unauthorized access, location awareness, information transfer, and personalization; on security and privacy concerns in the m-commerce context. Analysis of data from 141 respondents revealed three dimensions for the security and privacy perception construct. Hence, three models were tested to address the impacts of these factors on the three dimensions: consumers’ confidence of information control, concerns on third party, and the awareness of information protection in the mcommerce context. The study has implications for professionals to meet the consumers’ requirements and expectations on security and privacy for m-commerce.

[1]  France Bélanger,et al.  Trustworthiness in electronic commerce: the role of privacy, security, and site attributes , 2002, J. Strateg. Inf. Syst..

[2]  Paul Zellweger,et al.  Web-based Sales: Defining the Cognitive Buyer , 1997, Electron. Mark..

[3]  William David Salisbury,et al.  Perceived security and World Wide Web purchase intention , 2001, Ind. Manag. Data Syst..

[4]  J. Phelps,et al.  Privacy Concerns and Consumer Willingness to Provide Personal Information , 2000 .

[5]  Chang Liu,et al.  Acceptance of Wireless Internet via Mobile Technology in China , 2005, AMCIS.

[6]  Charles R. Hudson,et al.  Wireless Security , 2007, Information Security Management Handbook, 6th ed..

[7]  Godwin J. Udo,et al.  Privacy and security concerns as major barriers for e-commerce: a survey study , 2001, Inf. Manag. Comput. Secur..

[8]  M. Jones Privacy: A Significant Marketing Issue for the 1990s , 1991 .

[9]  Keng Siau,et al.  Building customer trust in mobile commerce , 2003, CACM.

[10]  Kenneth C. Laudon,et al.  Essentials of Management Information Systems , 2000 .

[11]  Mark R. Brown,et al.  Investigating the Relationship between Internet Privacy Concerns and Online Purchase Behavior , 2004, J. Electron. Commer. Res..

[12]  Anup K. Ghosh,et al.  Software security and privacy risks in mobile e-commerce , 2001, CACM.

[13]  Brenda Dervin,et al.  Private Rights, Public Wrongs: The Computer and Personal Privacy , 1989 .

[14]  Anthony D. Miyazaki,et al.  Consumer Perceptions of Privacy and Security Risks for Online Shopping , 2001 .

[15]  George R. Milne Privacy and Ethical Issues in Database/Interactive Marketing and Public Policy: A Research Framework and Overview of the Special Issue , 2000 .

[16]  Amitava Dutta,et al.  Management's Role in Information Security in a Cyber Economy , 2002 .

[17]  Ramnath K. Chellappa,et al.  Personalization versus Privacy: An Empirical Examination of the Online Consumer’s Dilemma , 2005, Inf. Technol. Manag..

[18]  H. Jeff Smith,et al.  Information Privacy: Measuring Individuals' Concerns About Organizational Practices , 1996, MIS Q..

[19]  Richard Beckwith,et al.  Designing for Ubiquity: The Perception of Privacy , 2003, IEEE Pervasive Comput..

[20]  Ingoo Han,et al.  The Impact of Customer Trust and Perception of Security Control on the Acceptance of Electronic Commerce , 2003, Int. J. Electron. Commer..

[21]  R. Rettie,et al.  Adoption and usage of M-commerce: a cross-cultural comparison of Hong Kong and the United Kingdom , 2005 .

[22]  M. Culnan,et al.  Information Privacy Concerns, Procedural Fairness, and Impersonal Trust: An Empirical Investigation , 1999 .

[23]  James A. Landay,et al.  An architecture for privacy-sensitive ubiquitous computing , 2004, MobiSys '04.

[24]  Sirkka L. Jarvenpaa,et al.  Managing the Paradoxes of Mobile Technology , 2005, Inf. Syst. Manag..

[25]  Peter A. Todd,et al.  Consumer Reactions to Electronic Shopping on the World Wide Web , 1996, Int. J. Electron. Commer..

[26]  J. Rubenfeld The Right of Privacy , 1989 .

[27]  M. Culnan Consumer awareness of name removal procedures: Implications for direct marketing , 1995 .

[28]  Bernd Carsten Stahl,et al.  Responsibility for Information Assurance and Privacy: A Problem of Individual Ethics? , 2004, J. Organ. End User Comput..

[29]  John Mylonakis,et al.  Can mobile services facilitate commerce? Findings from the Greek telecommunications market , 2004, Int. J. Mob. Commun..

[30]  Donna L. Hoffman,et al.  Building consumer trust online , 1999, CACM.

[31]  Anil K. Gupta,et al.  Trust within the Organization: Integrating the Trust Literature with Agency Theory and Transaction Costs Economics , 1999 .

[32]  Annie I. Antón,et al.  Addressing End-User Privacy Concerns , 2004, AMCIS.

[33]  Annie I. Antón,et al.  Examining Internet privacy policies within the context of user privacy values , 2005, IEEE Transactions on Engineering Management.

[34]  Detmar W. Straub,et al.  Security concerns of system users: A study of perceptions of the adequacy of security , 1991, Inf. Manag..

[35]  Albert H. Segars,et al.  An Empirical Examination of the Concern for Information Privacy Instrument , 2002, Inf. Syst. Res..

[36]  David Pollino,et al.  Wireless security , 2002 .

[37]  Ellen R. Foxman,et al.  Information Technology, Marketing Practice, and Consumer Privacy: Ethical Issues , 1993 .

[38]  Eija Kaasinen,et al.  User needs for location-aware mobile services , 2003, Personal and Ubiquitous Computing.

[39]  Naresh K. Malhotra,et al.  Internet Users' Information Privacy Concerns (IUIPC): The Construct, the Scale, and a Causal Model , 2004, Inf. Syst. Res..

[40]  Sirkka L. Jarvenpaa,et al.  Mobile commerce at crossroads , 2003, CACM.

[41]  Robert P. Minch,et al.  Privacy issues in location-aware mobile devices , 2004, 37th Annual Hawaii International Conference on System Sciences, 2004. Proceedings of the.