Factors affecting perceptions of privacy breach among smartphone application users

Stanislav Mamonov, Raquel Benbunan-Fich

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

1 Scopus citations

Abstract

Drawing on psychological contract theory, we experimentally examine four factors affecting perceptions of privacy breach among smartphone application users. We investigate the effects of the type of information which is perceived to be misappropriated by the application, the presence of legal agreement giving application developers rights to use the information, the source of information suggesting that a privacy breach may have occurred and the application type (free or paid). We find that perceptions of misappropriation of financial information are more distressing than perceived misappropriation of geo-location data. The presence of legal contracts giving application developers rights to information only partially attenuates perceptions of privacy breach among application users. This study offers a novel theoretical perspective and a new focal construct of perceived privacy breach for future research on privacy. Additionally, this study highlights the practical limitations of legal contracts in preventing perceptions of privacy breach.

Original languageEnglish
Title of host publicationProceedings of the 47th Annual Hawaii International Conference on System Sciences, HICSS 2014
PublisherIEEE Computer Society
Pages3178-3187
Number of pages10
ISBN (Print)9781479925049
DOIs
StatePublished - 2014
Event47th Hawaii International Conference on System Sciences, HICSS 2014 - Waikoloa, HI, United States
Duration: 6 Jan 20149 Jan 2014

Publication series

NameProceedings of the Annual Hawaii International Conference on System Sciences
ISSN (Print)1530-1605

Other

Other47th Hawaii International Conference on System Sciences, HICSS 2014
Country/TerritoryUnited States
CityWaikoloa, HI
Period6/01/149/01/14

Fingerprint

Dive into the research topics of 'Factors affecting perceptions of privacy breach among smartphone application users'. Together they form a unique fingerprint.

Cite this