Proceedings of the 50th Hawaii International Conference on System Sciences (2017) 2017
DOI: 10.24251/hicss.2017.491
|View full text |Cite
|
Sign up to set email alerts
|

The Mobile Privacy-Security Knowledge Gap Model: Understanding Behaviors

Abstract: Abstract

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
18
0

Year Published

2018
2018
2021
2021

Publication Types

Select...
5
2
2

Relationship

0
9

Authors

Journals

citations
Cited by 28 publications
(18 citation statements)
references
References 52 publications
0
18
0
Order By: Relevance
“…Research into the practices of m‐health application vendors (FTC, ) suggest that these assumptions are flawed. Due to the sensitivity of health data, we urge privacy researchers to further investigate the gaps in privacy knowledge (Crossler & Bélanger, ) across all age groups and privacy contexts to inform educational efforts that can build literacy and address knowledge gaps.…”
Section: Discussionmentioning
confidence: 99%
“…Research into the practices of m‐health application vendors (FTC, ) suggest that these assumptions are flawed. Due to the sensitivity of health data, we urge privacy researchers to further investigate the gaps in privacy knowledge (Crossler & Bélanger, ) across all age groups and privacy contexts to inform educational efforts that can build literacy and address knowledge gaps.…”
Section: Discussionmentioning
confidence: 99%
“…Recent studies adopted the PMT in the context of BYOD security behaviour (e.g. Putri & Hovav, 2014;Tu, Adkins & Zhao, 2018;Al Askar & Shen, 2016;Hovav & Putri, 2016;Han, 2017;Dang-Pham & Pittayachawan, 2015;Crossler & Bélanger, 2017;Blythe and Coventry, 2018). The analysis of these studies shows that there is a gap in research in terms of understanding gender differences in employees' smartphone security behaviour in a cross-national context and in accounting for the role of culture.…”
Section: Conceptual Modelmentioning
confidence: 99%
“…Smartphones, which are both widely used and vulnerable to information breaches, form a growing domain for privacy and security threats [4], [5]. In particular, significant amounts of personal information are being shared with third parties through apps [6]. App permissions, which provide smartphone users with control over what information is shared with apps, are often difficult to understand and lack transparency [7].…”
Section: Introductionmentioning
confidence: 99%