A Research Model for Studying Privacy Concerns Pertaining to Location-Based Services

Location-based services (LBS) are services that take into account the geographic location of a user. With the rapid growth of mobile devices, LBS are expected to spread rapidly. While LBS promise efficiency and effectiveness gains, their use also raises fundamental privacy issues. In a market survey, 24% of the respondents mentioned that they are seriously concerned about the privacy implications of disclosing their location. Thus the focus of this paper is to understand what antecedents determine intentions to use LBS. A research model is developed that incorporates constructs, such as personality traits, task and technology characteristics, perceived privacy, trust and risk, and usefulness as antecedents of LBS usage intentions.

[1]  Kai Lung Hui,et al.  Online Information Privacy: Measuring the Cost-Benefit Trade-Off , 2002, ICIS.

[2]  Dale Goodhue,et al.  Task-Technology Fit and Individual Performance , 1995, MIS Q..

[3]  Paul A. Pavlou,et al.  Building Effective Online Marketplaces with Institution-Based Trust , 2004, Inf. Syst. Res..

[4]  Sirkka L. Jarvenpaa,et al.  Consumer Trust in an Internet Store: A Cross-Cultural Validation , 2006, J. Comput. Mediat. Commun..

[5]  Priscilla M. Regan Privacy and Commercial Use of Personal Data: Policy Developments in the United States , 2003 .

[6]  J. H. Davis,et al.  An Integrative Model Of Organizational Trust , 1995 .

[7]  J. Webster,et al.  Where is the line between benign and invasive? An examination of psychological barriers to the acceptance of awareness monitoring systems , 2002 .

[8]  Anind K. Dey,et al.  Location-Based Services for Mobile Telephony: a Study of Users' Privacy Concerns , 2003, INTERACT.

[9]  Chandana Unnithan,et al.  Mobile Location Based Services , 2005 .

[10]  Fred D. Davis,et al.  User Acceptance of Computer Technology: A Comparison of Two Theoretical Models , 1989 .

[11]  Howard Rheingold,et al.  Smart Mobs: The Next Social Revolution , 2002 .

[12]  P. Costa,et al.  Revised NEO Personality Inventory (NEO-PI-R) and NEO-Five-Factor Inventory (NEO-FFI) , 1992 .

[13]  Jochen Schiller,et al.  Location Based Services , 2004 .

[14]  P. Pavlou INTEGRATING TRUST IN ELECTRONIC COMMERCE WITH THE TECHNOLOGY ACCEPTANCE MODEL: MODEL DEVELOPMENT AND VALIDATION , 2001 .

[15]  Robert P. Minch,et al.  Privacy issues in location-aware mobile devices , 2004, 37th Annual Hawaii International Conference on System Sciences, 2004. Proceedings of the.

[16]  John M. Barron,et al.  PRIVACY ON THE INTERNET:AN ECONOMIC ANALYSIS , 2002 .

[17]  M. Lynn Hawaii International Conference on System Sciences , 1996 .

[18]  Ewald A. Kaluscha,et al.  Empirical research in on-line trust: a review and critical assessment , 2003, Int. J. Hum. Comput. Stud..

[19]  Daniel Heller,et al.  Five-factor model of personality and job satisfaction: a meta-analysis. , 2002, The Journal of applied psychology.

[20]  John Leubsdorf,et al.  Privacy and Freedom , 1968 .

[21]  H. Jeff Smith,et al.  Information Privacy: Measuring Individuals' Concerns About Organizational Practices , 1996, MIS Q..

[22]  K. Siau,et al.  Development of a Framework for Trust in Mobile Commerce , 2003 .

[23]  C. A. Higgins,et al.  THE BIG FIVE PERSONALITY TRAITS, GENERAL MENTAL ABILITY, AND CAREER SUCCESS ACROSS THE LIFE SPAN , 1999 .

[24]  Richard T. Watson,et al.  U-Commerce: An Experimental Investigation of Ubiquity and Uniqueness , 2003, ICIS.

[25]  Dix Alan,et al.  A lightweight approach to managing privacy in location-based services, Equator-02-058 , 2002 .

[26]  H. Levenson 2 – DIFFERENTIATING AMONG INTERNALITY, POWERFUL OTHERS, AND CHANCE , 1981 .

[27]  Joseph Gray Jackson,et al.  Privacy and Freedom , 1968 .

[28]  Paul Dourish,et al.  Unpacking "privacy" for a networked world , 2003, CHI '03.

[29]  Murray R. Barrick,et al.  THE BIG FIVE PERSONALITY DIMENSIONS AND JOB PERFORMANCE: A META-ANALYSIS , 1991 .

[30]  Robert Boncella Internet Privacy: At Home and At Work , 2001, Commun. Assoc. Inf. Syst..

[31]  Anind K. Dey,et al.  Who wants to know what when? privacy preference determinants in ubiquitous computing , 2003, CHI Extended Abstracts.

[32]  James A. Landay,et al.  Approximate Information Flows: Socially-Based Modeling of Privacy in Ubiquitous Computing , 2002, UbiComp.

[33]  Euro Beinat Location-based services: market and business drivers , 2001 .

[34]  Jane Webster,et al.  Personality as a moderator of monitoring acceptance , 2003, Comput. Hum. Behav..

[35]  A. Tellegen,et al.  PERSONALITY PROCESSES AND INDIVIDUAL DIFFERENCES An Alternative "Description of Personality": The Big-Five Factor Structure , 2022 .

[36]  H. Lefcourt,et al.  Research With the Locus of Control Construct , 1981 .

[37]  P. Costa,et al.  Solid ground in the wetlands of personality: a reply to Block. , 1995, Psychological bulletin.

[38]  Murray R. Barrick,et al.  Personality and Performance at the Beginning of the New Millennium: What Do We Know and Where Do We Go Next? , 2001 .

[39]  Hal G. Gueutal,et al.  A Field Experiment Comparing Information-Privacy Values, Beliefs, and Attitudes Across Several Types of Organizations , 1983 .

[40]  Euro Beinat,et al.  Privacy and location-based services: stating the policies clearly , 2001 .

[41]  Kai Lung Hui,et al.  Consumer Trust and Online Information Privacy , 2003, ICIS.

[42]  J. Rotter Generalized expectancies for internal versus external control of reinforcement. , 1966, Psychological monographs.

[43]  Susan Harrington,et al.  Impact of the Unique Card on Electronic Commerce , 2003, AMCIS.