IDEAS home Printed from https://ideas.repec.org/a/eee/ininma/v52y2020ics0268401219309041.html
   My bibliography  Save this article

Mobile application security: Role of perceived privacy as the predictor of security perceptions

Author

Listed:
  • Balapour, Ali
  • Nikkhah, Hamid Reza
  • Sabherwal, Rajiv

Abstract

Despite mobile applications being at the frontier of mobile computation technologies, security issues pose a threat to their adoption and diffusion. Recent studies suggest that security violations could be mitigated through improved security behaviors and attitudes, not just through better technologies. Existing literature on behavioral security suggests that one of the main predictors of users’ perceptions of security is their perceived privacy concerns. Using communication privacy management theory (CPM), this study examines the effects of privacy-related perceptions, such as privacy risk and the effectiveness of privacy policies, on the security perceptions of mobile app users. To empirically test the proposed theoretical model, two survey studies were conducted using mobile apps requesting less sensitive information (n = 487) and more sensitive information (n = 559). The findings show that the perceived privacy risk negatively influences the perceived security of the mobile apps; the perceived effectiveness of a privacy policy positively influences user perceptions of mobile app security; and perceived privacy awareness moderates the effect of perceived privacy risk on the perceived security of mobile apps. The results also suggest that users have different privacy-security perceptions based on the information sensitivity of the mobile apps. Theoretical and practical implications are discussed.

Suggested Citation

  • Balapour, Ali & Nikkhah, Hamid Reza & Sabherwal, Rajiv, 2020. "Mobile application security: Role of perceived privacy as the predictor of security perceptions," International Journal of Information Management, Elsevier, vol. 52(C).
  • Handle: RePEc:eee:ininma:v:52:y:2020:i:c:s0268401219309041
    DOI: 10.1016/j.ijinfomgt.2019.102063
    as

    Download full text from publisher

    File URL: http://www.sciencedirect.com/science/article/pii/S0268401219309041
    Download Restriction: Full text for ScienceDirect subscribers only

    File URL: https://libkey.io/10.1016/j.ijinfomgt.2019.102063?utm_source=ideas
    LibKey link: if access is restricted and if your library uses this service, LibKey will redirect you to where you can use your library subscription to access this item
    ---><---

    As the access to this document is restricted, you may want to search for a different version of it.

    Citations

    Citations are extracted by the CitEc Project, subscribe to its RSS feed for this item.
    as


    Cited by:

    1. Hong, Ying & Hu, Jiangting & Zhao, Yaxin, 2023. "Would you go invisible on social media? An empirical study on the antecedents of users' lurking behavior," Technological Forecasting and Social Change, Elsevier, vol. 187(C).
    2. Ibrahim Mutambik & John Lee & Abdullah Almuqrin & Waleed Halboob & Taha Omar & Ahmad Floos, 2022. "User concerns regarding information sharing on social networking sites: The user’s perspective in the context of national culture," PLOS ONE, Public Library of Science, vol. 17(1), pages 1-27, January.
    3. Shixingyue Hu & Yazao Yang, 2024. "Safety of female ride-hailing passengers: Perception and prevention," Palgrave Communications, Palgrave Macmillan, vol. 11(1), pages 1-18, December.
    4. Azman Ong, Mohd Hanafi & Yusri, Muhammad Yassar & Ibrahim, Nur Syafikah, 2023. "Use and behavioural intention using digital payment systems among rural residents: Extending the UTAUT-2 model," Technology in Society, Elsevier, vol. 74(C).

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:eee:ininma:v:52:y:2020:i:c:s0268401219309041. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    We have no bibliographic references for this item. You can help adding them by using this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Catherine Liu (email available below). General contact details of provider: https://www.journals.elsevier.com/international-journal-of-information-management .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.