Abstract
Past research indicates that people have strong concerns about their information privacy. This study applies multi-attribute utility theory to conceptualize the concern for smartphone privacy and examine how people value smartphone privacy protection. We also investigated how the value of privacy varied by the identity of a privacy attacker and individual user characteristics. Respondents were given a hypothetical choice between an encrypted smartphone and a regular one. The encrypted smartphone increases the level of privacy protection at the cost of lower usability, greater monthly service payments, slower speed, and additional inconvenience. Respondents were asked to simply make binary choices between hypothetical pairs of smartphone configurations. The results show that respondents were willing to make non-trivial sacrifices for smartphone privacy protection. Interestingly, specifying the identity of an attacker collecting information decreased the value of privacy protection compared to not specifying the identity of the attacker. We also observed effects of individual user characteristics, including general privacy concern, age, and self-reported political attitude, on the value of smartphone privacy protection. These results offer greater insight on how people value their privacy.
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.