474
Views
3
CrossRef citations to date
0
Altmetric
Original Articles

The Influence of privacy control options on the evaluation and user acceptance of mobile applications for volunteers in crisis situations

ORCID Icon, ORCID Icon &
Pages 759-775 | Received 01 Dec 2016, Accepted 25 Jan 2020, Published online: 05 Feb 2020

References

  • Aiken, L. S., and S. G. West. 1991. Multiple Regression: Testing and Interpreting Interactions. Newbury Park, CA: Sage.
  • Ajzen, I. 1991. “The Theory of Planned Behavior.” Organizational Behavior and Human Decision Processes 50 (2): 179–211. doi:10.1016/0749-5978(91)90020-T.
  • Bacile, T. J., C. Ye, and E. Swilley. 2014. “From Firm-Controlled to Consumer-Contributed: Consumer Co-Production of Personal Media Marketing Communication.” Journal of Interactive Marketing 28 (2): 117–133. doi:10.1016/j.intmar.2013.12.001.
  • Barnes, S. B. 2006. “A Privacy Paradox: Social Networking in the United States.” First Monday 11 (9). doi:10.5210/fm.v11i9.1394.
  • Burgoon, J. K. 1982. “Privacy and Communication.” Annals of the International Communication Association 6 (1): 206–249. doi:10.1080/23808985.1982.11678499.
  • Chin, E., A. P. Felt, V. Sekar, and D. Wagner. 2012. “Measuring User Confidence in Smartphone Security and Privacy.” In Proceedings of the Eighth Symposium on Usable Privacy and Security. New York: ACM.doi:10.1145/2335356.2335358.
  • Clary, E. G., and M. Snyder. 1999. “The Motivations to Volunteer Theoretical and Practical Considerations.” Current Directions in Psychological Science 8 (5): 156–159. doi:10.1111/1467-8721.00037.
  • Clary, E. G., M. Snyder, R. D. Ridge, J. Copeland, A. A. Stukas, J. Haugen, and P. Miene. 1998. “Understanding and Assessing the Motivations of Volunteers: A Functional Approach.” Journal of Personality and Social Psychology 74 (6): 1516–1530. doi:10.1037/0022-3514.74.6.1516.
  • Culnan, M. J., and P. K. Armstrong. 1999. “Information Privacy Concerns, Procedural Fairness, and Impersonal Trust: An Empirical Investigation.” Organization Science 10 (1): 104–115. doi:10.1287/orsc.10.1.104.
  • Davis, F. D. 1989. “Perceived Usefulness, Perceived Ease of Use, and User Acceptance of Information Technology.” MIS Quarterly 13 (3): 319–340. doi:10.2307/249008.
  • Dienlin, T., and M. J. Metzger. 2016. “An Extended Privacy Calculus Model for SNSs: Analyzing Self-Disclosure and Self-Withdrawal in a Representative US Sample.” Journal of Computer-Mediated Communication 21 (5): 368–383. doi:10.1111/jcc4.12163.
  • Dinev, T., and P. Hart. 2004. “Internet Privacy Concerns and Their Antecedents-Measurement Validity and a Regression Model.” Behaviour & Information Technology 23 (6): 413–422. doi:10.1080/01449290410001715723.
  • Grossklags, J., and A. Acquisti. 2007. “When 25 Cents is Too Much: An Experiment on Willingness-to-sell and Willingness-to-protect Personal Information.” Paper presented at the Sixth Workshop on the Economics of Information Security, Pittsburgh, June 7−8.
  • Hayes, A. F. 2013. Introduction to Mediation, Moderation, and Conditional Process Analysis: A Regression-Based Approach. New York, NY: Guilford Press.
  • Hayes, A. F., and K. J. Preacher. 2014. “Statistical Mediation Analysis with a Multicategorical Independent Variable.” British Journal of Mathematical and Statistical Psychology 67 (3): 451–470. doi:10.1111/bmsp.2014.67.issue-3 . doi: 10.1111/bmsp.12028
  • Horstmann, A. C., S. Winter, L. Rösner, and N. C. Krämer. 2018. “S.O.S. on My Phone: An Analysis of Motives and Incentives for Participation in Smartphone-based Volunteering.” Journal of Contingencies and Crisis Management 26 (1): 193–199. doi:10.1111/jccm.2018.26.issue-1 doi: 10.1111/1468-5973.12174
  • Houle, B. J., B. J. Sagarin, and M. F. Kaplan. 2005. “A Functional Approach to Volunteerism: Do Volunteer Motives Predict Task Preference?” Basic and Applied Social Psychology 27 (4): 337–344. doi:10.1207/s15324834basp2704_6.
  • Hughes, A. L., and L. Palen. 2009. “Twitter Adoption and Use in Mass Convergence and Emergency Events.” International Journal of Emergency Management 6 (3-4): 248–260. doi:10.1504/IJEM.2009.031564.
  • Kalyanaraman, S., and S. S. Sundar. 2006. “The Psychological Appeal of Personalized Content in Web Portals: Does Customization Affect Attitudes and Behavior?” Journal of Communication 56 (1): 110–132. doi:10.1111/j.1460-2466.2006.00006.x.
  • Keith, M. J., S. C. Thompson, J. Hale, P. B. Lowry, and C. Greer. 2013. “Information Disclosure on Mobile Devices: Re-Examining Privacy Calculus with Actual User Behavior.” International Journal of Human-Computer Studies 71 (12): 1163–1173. doi:10.1016/j.ijhcs.2013.08.016.
  • Libaque-Saenz, C. F., Y. Chang, J. Kim, M. C. Park, and J. J. Rho. 2016. “The Role of Perceived Information Practices on Consumers’ Intention to Authorise Secondary Use of Personal Data.” Behaviour & Information Technology 35 (5): 339–356. doi:10.1080/0144929X.2015.1128973.
  • Liu, C., J. T. Marchewka, J. Lu, and C. S. Yu. 2005. “Beyond Concern − a Privacy-Trust-Behavioral Intention Model of Electronic Commerce.” Information & Management 42 (2): 289–304. doi:10.1016/j.im.2004.01.003.
  • Liu, Z., J. Shan, R. Bonazzi, and Y. Pigneur. 2014. “Privacy as a Tradeoff: Introducing the Notion of Privacy Calculus for Context-Aware Mobile Applications.” In Proceedings of the 47th Hawaii International Conference on System Sciences, edited by R. H. Sprague Jr., 1063–1072. Hawaii: IEEE.doi:10.1109/HICSS.2014.138.
  • Ludwig, T., C. Reuter, T. Siebigteroth, and V. Pipek. 2015. “Crowdmonitor: Mobile Crowd Sensing for Assessing Physical and Digital Activities of Citizens During Emergencies.” In Proceedings of the 33rd Annual CHI Conference on Human Factors in Computing Systems, 4083−4092. New York, NY: ACM
  • Malhotra, N. K., S. S. Kim, and J. Agarwal. 2004. “Internet Users’ Information Privacy Concerns (IUIPC): The Construct, the Scale, and a Causal Model.” Information Systems Research 15 (4): 336–355. doi:10.1287/isre.1040.0032.
  • Marathe, S., and S. S. Sundar. 2011. “What Drives Customization? Control or Identity?” In Proceedings of the CHI Conference on Human Factors in Computing Systems, 781–790. New York, NY: ACM.doi:10.1145/1978942.1979056.
  • Nissenbaum, H. 2010. Privacy in Context: Technology, Policy, and the Integrity of Social Life. Stanford, CA: Stanford University Press.
  • Njenga, K., and S. Ndlovu. 2012. “On Privacy Calculus and Underlying Consumer Concerns Influencing Mobile Banking Subscriptions.” In Proceedings of the Information Security for South Africa (ISSA) 2012 Conference, edited by H. S. Venter, M. Loock, M. Coetzee, 1–9. Red Hook: IEEE.doi:10.1109/ISSA.2012.6320453.
  • Oostlander, J., S. T. Güntert, S. van Schie, and T. Wehner. 2014. “Volunteer Functions Inventory (VFI): Konstruktvalidität und Psychometrische Eigenschaften der Deutschen Adaptation [Construct Validity and Psychometric Characteristics of the German Adation].” Diagnostica 60 (2): 73–85. doi:10.1026/0012-1924/a000098.
  • Petronio, S., and I. Altman. 2002. Boundaries of Privacy. New York: State University of New York Press.
  • Reuter, C., O. Heger, and V. Pipek. 2013. “Combining Real and Virtual Volunteers Through Social Media.” In Proceedings of the 10th International Conference on Information Systems for Crisis Response and Management, edited by T. Comes, F. Fiedrich, S. Fortier, J. Geldermann, and T. Müller, 780–790. ISCRAM.
  • Reuter, C., T. Ludwig, M. A. Kaufhold, and V. Pipek. 2015. “XHELP: Design of a Cross-platform Social-media Application to Support Volunteer Moderators in Disasters.” In Proceedings of the 33rd Annual CHI Conference on Human Factors in Computing Systems, 4093−4102. New York: ACM. doi:10.1145/2702123.2702171.
  • Ryan, R. M., and E. L. Deci. 2000. “Self-determination Theory and the Facilitation of Intrinsic Motivation, Social Development, and Well-Being.” American Psychologist 55 (1): 68–78. doi:10.1037110003-066X.55.1.68 doi: 10.1037/0003-066X.55.1.68
  • Schwarz, A., J. C. Binetti, W. Broll, and A. Mitschele-Thiel. 2016. “New Technologies and Applications in International Crisis Communication.” In The Handbook of International Crisis Communication Research, edited by A. Schwarz, M. Seeger, and C. Auer, 465–477. Chichester: Wiley-Blackwell.
  • Shih, F., I. Liccardi, and D. Weitzner. 2015. “Privacy Tipping Points in Smartphones Privacy Preferences.” In Proceedings of the 33rd Annual CHI Conference on Human Factors in Computing Systems, 807−816. New York: ACM. doi:10.1145/2702123.2702404.
  • Shin, D. H. 2017a. “Conceptualizing and Measuring Quality of Experience of the Internet of Things: Exploring How Quality is Perceived by Users.” Information & Management 54 (8): 998–1011. doi10.1016/j.im.2017.02.006.
  • Shin, D. H. 2017b. “The Role of Affordance in the Experience of Virtual Reality Learning: Technological and Affective Affordances in Virtual Reality.” Telematics and Informatics 34 (8): 1826–1836. doi10.1016/j.tele.2017.05.013.
  • Shin, D. H., and F. Biocca. 2017. “Health Experience Model of Personal Informatics: The Case of a Quantified Self.” Computers in Human Behavior 69: 62–74. doi:10.1016/j.chb.2016.12.019.
  • Smith, H. J., S. J. Milberg, and S. J. Burke. 1996. “Information Privacy: Measuring Individuals’ Concerns About Organizational Practices.” MIS Quarterly 20 (2): 167–196. doi:10.2307/249477.
  • Sundar, S. S. 2008. “The MAIN Model: A Heuristic Approach to Understanding Technology Effects on Credibility.” In Digital Media, Youth, and Credibility, edited by M. J. Metzger, and A. J. Flanagin, 73–100. Cambridge, MA: The MIT Press.
  • Sundar, S. S., H. Jia, T. F. Waddell, and Y. Huang. 2015. “Toward a Theory of Interactive Media Effects (TIME).” In The Handbook of the Psychology of Communication Technology, edited by S. S. Sundar, 47–86. Chichester: John Wiley & Sons, Inc.
  • Sundar, S. S., and S. S. Marathe. 2010. “Personalization Versus Customization: The Importance of Agency, Privacy, and Power Usage.” Human Communication Research 36: 298–322. doi:10.1111/j.1468-2958.2010.01377.x.
  • Taylor, K., and L. Silver. 2019. “Smartphone Ownership is Growing Rapidly Around the World, but not Always Equally.” Pew Research Center, February 5, 2019. Accessed 1 December 2019. https://www.pewresearch.org/global/2019/02/05/smartphone-ownership-is-growing-rapidly-around-the-world-but-not-always-equally/.
  • Teles, A. S., F. J. da Silva e Silva, and M. Endler. 2017. “Situation-based Privacy Autonomous Management for Mobile Social Networks.” Computer Communications 107: 75–92. doi:10.1016/j.comcom.2017.04.003.
  • Timmons, S., and A. Vernon-Evans. 2012. “Why Do People Volunteer for Community First Responder Groups?” Emergency Medicine Journal 30 (3): e13. doi:10.1136/emermed-2011-200990.
  • Trepte, S., and P. K. Masur. 2015. “Privatheit im Wandel. Eine Repräsentative Umfrage zur Wahrnehmung und Beurteilung von Privatheit [Privacy Through the Ages. A Representative Survey About the Perception and Appraisal of Privacy].” Universität Hohenheim, June 18. Accessed 17 September 2016. https://www.uni-hohenheim.de/fileadmin/einrichtungen/psych/Team_MP/Berichte/Bericht_-_Privatheit_im_Wandel_2014-06-18.pdf.
  • Tsai, J. Y., P. G. Kelley, L. F. Cranor, and N. Sadeh. 2009. “Location-sharing Technologies: Privacy Risks and Controls.” TPRC 2009, August 15. Accessed 3 November 2016. https://ssrn.com/abstract=1997782.
  • Venkatesh, V., M. G. Morris, G. B. Davis, and F. D. Davis. 2003. “User Acceptance of Information Technology: Toward a Unified View.” MIS Quarterly 27 (3): 425–478. doi:10.2307/30036540.
  • Wang, N., B. Zhang, B. Liu, and H. Jin. 2015. “Investigating Effects of Control and Ads Awareness on Android Users’ Privacy Behaviors and Perceptions.” In Proceedings of the 17th International Conference on Human-Computer Interaction with Mobile Devices and Services, 373−382. New York: ACM. doi:10.1145/2785830.2785845.
  • Westin, A. F. 1967. Privacy and Freedom. New York, NY: Atheneum.
  • Wilson, S., J. Cranshaw, N. Sadeh, A. Acquisti, L. F. Cranor, J. Springfield, S. Y. Jeong, and A. Balasubramanian. 2013. “Privacy Manipulation and Acclimation in a Location Sharing Application.” In Proceedings of the 2013 ACM International Joint Conference on Pervasive and Ubiquitous Computing, 549−558. New York: ACM. doi:10.1145/2493432.2493436.
  • Xu, H. 2007. “The Effects of Self-construal and Perceived Control on Privacy Concerns.” In Proceedings of the 28th International Conference on Information Systems, paper 125. Montréal: AIS.
  • Xu, H., T. Dinev, J. Smith, and P. Hart. 2011. “Information Privacy Concerns: Linking Individual Perceptions With Institutional Privacy Assurances.” Journal of the Association for Information Systems 12 (12): 798–824. doi: 10.17705/1jais.00281
  • Xu, H., S. Gupta, M. B. Rosson, and J. M. Carroll. 2012. “Measuring Mobile Users’ Concerns for Information Privacy.” In Proceedings of the 33rd International Conference on Information Systems, 2278−2293, Orlando: AIS.
  • Xu, H., and H. H. Teo. 2004. “Alleviating Consumers’ Privacy Concerns in Location-based Services: A Psychological Control Perspective.” In Proceedings of the 25th International Conference on Information Systems, 793−806. Singapore: AIS.
  • Xu, H., H. H. Teo, B. C. Tan, and R. Agarwal. 2009. “The Role of Push-Pull Technology in Privacy Calculus: The Case of Location-Based Services.” Journal of Management Information Systems 26 (3): 135–174. doi:10.2753/MIS0742-1222260305.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.