Measurement of Privacy Leakage Tolerance on the Mobile Internet

نویسندگان

  • Rui Li
  • Wenli Li
  • Shidao Geng
  • Yulin An
چکیده

On the mobile Internet, individual identification and information transmission are more convenient. With the popularity of mobile Internet, private information of users is easily accessed. Appropriate access to users’ information can help enterprises understand consumers’ demand better and improve marketing effectiveness. However, grabbing users’ information excessively may increase the costs of enterprises and induce the privacy leakage, which causes users’ dissatisfaction. Recently, events of privacy leakage based on the mobile Internet are frequently exposed in China. It triggers much attention and results in great social impact. From the perspective of mobile Internet users, the concept of privacy leakage tolerance is put forward to describe users’ acceptance of privacy leakage. Based on the description and dimensions of privacy leakage tolerance, a three-dimension and second-order privacy leakage tolerance measurement scale is designed and will be verified. We believe that the scale has good reliability and validity for the measurement of privacy leakage tolerance on the mobile Internet and data show users’ attitude to privacy leakage exactly. The measurement of privacy leakage tolerance on the mobile Internet has important significance both in business practices and theory studies. It is conducive for mobile Internet enterprises to collect users’ information appropriately and to protect users’ privacy with target, which makes contribution to optimizing information allocation and to exerting the economic value of information. Moreover, it provides a new concept to describe users’ privacy attitude and it is helpful to analyze users’ privacy behaviors and to explain the privacy paradox1.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Analyzing Tools and Algorithms for Privacy Protection and Data Security in Social Networks

The purpose of this research, is to study factors influencing privacy concerns about data security and protection on social network sites and its’ influence on self-disclosure. 100 articles about privacy protection, data security, information disclosure and Information leakage on social networks were studied. Models and algorithms types and their repetition in articles have been distinguished a...

متن کامل

Privacy Leakage in Mobile Online Social Networks

Mobile Online Social Networks (mOSNs) have recently grown in popularity. With the ubiquitous use of mobile devices and a rapid shift of technology and access to OSNs, it is important to examine the impact of mobile OSNs from a privacy standpoint. We present a taxonomy of ways to study privacy leakage and report on the current status of known leakages. We find that all mOSNs in our study exhibit...

متن کامل

User awareness and tolerance of privacy abuse on mobile Internet: An exploratory study

The paper presents the results of an exploratory study about the level of privacy abuse and the awareness level of users when communicating and using mobile Internet. The study looks into the relationships and associations between the telecommunications market developmental level, the wealth of a country, users’ skills, the affordability of mobile technologies, the level of user tolerance of st...

متن کامل

Linear SVM-Based Android Malware Detection for Reliable IoT Services

Current many Internet ofThings (IoT) services are monitored and controlled through smartphone applications. By combining IoT with smartphones, many convenient IoT services have been provided to users. However, there are adverse underlying effects in such services including invasion of privacy and information leakage. Inmost cases, mobile devices have become clutteredwith important personal user...

متن کامل

Privacy Leakage in Mobile Computing: Tools, Methods, and Characteristics

The number of smartphones, tablets, sensors, and connected wearable devices are rapidly increasing. Today, in many parts of the globe, the penetration of mobile computers has overtaken the number of traditional personal computers. This trend and the always-on nature of these devices have resulted in increasing concerns over the intrusive nature of these devices and the privacy risks that they i...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2014