当前位置: X-MOL 学术J. Strategic Inf. Syst. › 论文详情
Our official English website, www.x-mol.net, welcomes your feedback! (Note: you will need to create a separate account there.)
Dealing with digital traces: Understanding protective behaviors on mobile devices
The Journal of Strategic Information Systems ( IF 7 ) Pub Date : 2019-03-01 , DOI: 10.1016/j.jsis.2018.11.002
France Belanger , Robert E. Crossler

Abstract With increasingly digitization, more and more information is collected from individuals and organizations, leading to several privacy concerns. These risks are further heightened in the mobile realm as data collection can occur continuously and ubiquitously. When individuals use their own devices in work settings, these issues become concerns for organization as well. The question then is how to ensure individuals perform proper information protection behaviors on mobile devices. In this research, we develop a model of mobile information protection based on an integration of the Theory of Planned Behavior and the information privacy literature to explore the antecedents of the attitude of individuals towards sharing information on their mobile devices, their intentions to use protective settings, and their actual practices. The model is tested with data from 228 iPhone users. The results indicate that mobile information protection intention leads to actual privacy settings practice, and that attitude towards information sharing and mobile privacy protection self-efficacy affect this intention. Determinants of attitude towards information sharing include mobile privacy concern and trust of the mobile platform. Finally, prior invasion experience is related to privacy concern. These findings provide insights into factors that can be targeted to enhance individuals’ protective actions to limit the amount of digital information they share via their smartphones.

中文翻译:

处理数字迹线:了解移动设备上的保护行为

摘要随着数字化的日益发展,越来越多的个人和组织收集到信息,这引起了一些隐私问题。这些风险在移动领域进一步加剧,因为数据收集可以连续不断地发生。当个人在工作环境中使用自己的设备时,这些问题也成为组织关注的问题。然后的问题是如何确保个人在移动设备上执行正确的信息保护行为。在这项研究中,我们基于计划行为理论和信息隐私文献的集成,开发了一种移动信息保护模型,以探索个人对在其移动设备上共享信息的态度,其使用保护性环境的意图的前因。 ,以及他们的实际做法。该模型已经过228位iPhone用户的数据测试。结果表明,移动信息保护意图导致了实际的隐私设置实践,并且对信息共享和移动隐私保护自我效能的态度影响了这一意图。信息共享态度的决定因素包括对移动隐私的关注和对移动平台的信任。最后,先前的入侵经历与隐私问题有关。这些发现提供了对可用于增强个人保护作用的因素的见解,以限制他们通过智能手机共享的数字信息量。这种对信息共享和移动隐私保护自我效能的态度影响了这一意图。信息共享态度的决定因素包括对移动隐私的关注和对移动平台的信任。最后,先前的入侵经历与隐私问题有关。这些发现提供了对可用于增强个人保护作用的因素的见解,以限制他们通过智能手机共享的数字信息量。这种对信息共享和移动隐私保护自我效能的态度影响了这一意图。信息共享态度的决定因素包括对移动隐私的关注和对移动平台的信任。最后,先前的入侵经历与隐私问题有关。这些发现提供了对可用于增强个人保护作用的因素的见解,以限制他们通过智能手机共享的数字信息量。
更新日期:2019-03-01
down
wechat
bug