Skip to main content

Location Privacy Apprehensions in Location-Based Services Among Literate and Semi-literate Users

  • Conference paper
  • First Online:
Information and Communication Technologies in Organizations and Society

Abstract

Personalized services provided by Location Based Services (LBS) are becoming increasingly prevalent to the large population of semi-literate users living in emerging economies due to the low costs and ubiquity. However, usage of LBS is still threatened by location privacy threats as it keeps track of the individuals’ location. Studies typically only addressed how to mitigate location privacy apprehensions for the literate users and not the semi-literate users. To fill that gap and better understand location privacy apprehensions among different communities, this study draws upon theories of Restrict Access/Limited Control and Familiarity to identify the antecedents of location privacy apprehensions related to personalized services provided by LBS and user literacy. The proposed research model is empirically tested in a laboratory experiment. The findings show that the different types of LBS do affect the degree of location privacy apprehensions between the literate and semi-literate users. Implications for enhancing usage intentions and mitigating location privacy apprehensions for different types of mobile applications are discussed.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Angst, C., Agarval, R.: Adoption of electronic health records in the presence of privacy concerns: the elaboration likelihood model and individual persuasion. MIS Q. 33(2), 339–370 (2009)

    Google Scholar 

  2. Carolyn, W., Beth, E.: Studying mobile phone use in context: cultural, political, and economic dimensions of mobile phone use. In: International Professional Communication Conference Proceedings, pp. 205–212. IEEE, Limerick, Ireland (2005)

    Google Scholar 

  3. Chua, W.Y., Chang, K.T.T., Wan, P.H., Yi, W.: Improving mobile applications usage experience of novice users through user-acclimatized interaction: a case study. In: Twentieth Americas Conference on Information Systems. AIS Electronic Library, Savanna, Georgia (2014)

    Google Scholar 

  4. Culnan, M.: How did they get my name?: An exploratory investigation of consumer attitudes toward secondary information use. MIS Q. 17(3), 341–363 (1993)

    Article  Google Scholar 

  5. Culnan, M.: Consumer awareness of name removal procedures: implications for direct marketing. J. Direct Mark. 9(2), 10–19 (1995)

    Article  Google Scholar 

  6. Culnan, M., Armstrong, P.K.: Information privacy concerns, procedural fairness, and impersonal trust: an empirical investigation. Organ. Sci. 10(1), 104–115 (1999)

    Article  Google Scholar 

  7. Dinev, T., Hart, P.: Internet privacy concerns and their antecedents-measurement validity and a regression model. Behav. Inf. Technol. 23(6), 413–422 (2004)

    Google Scholar 

  8. Gefen, D., Karahanna, E., Straub, D.: Trust and TAM in online shopping: an integrated model. MIS Q. 51–90 (2003)

    Google Scholar 

  9. Hann, I.-H., Hui, K.-L., Lee, S.-Y.T., Png, P.L.: Overcoming online information privacy concerns: an information-processing theory approach. J. Manag. Inf. Syst. 24(2), 13–42 (2007)

    Google Scholar 

  10. Herman T.H., Moor, J.H.: Privacy protection, control of information, and privacy-enhancing technologies. ACM SIGCAS Comput. Soc. 31(1), 6–11 (2001)

    Google Scholar 

  11. Ling, L.: From data privacy to location privacy: models and algorithms. In: Proceedings of the 33rd international Conference on Very Large Data Bases, pp. 1429–1430. ACM Digital Library, Vienna, Austria (2007)

    Google Scholar 

  12. Luhmann, N.: Familiarity, confidence, trust: problems and alternatives. Trust: Making Breaking Coop. Relat. 6, 94–107 (2000)

    Google Scholar 

  13. Masizana-Katongo, A., Morakanyane, R.: Representing information for semi-literate users: digital inclusion using mobile phone technology. Department of Computer Science, University of Botswana, Gaborone (n.d.)

    Google Scholar 

  14. Moor, J.: The ethics of privacy protection. Library Trends 39(1–2), 69–82 (1990)

    Google Scholar 

  15. Ning, A.: Mobile internet services personalization customization via Mobile portals. In: Web Information Systems and Mining, pp. 381–385. IEEE, Shanghai, China (2009)

    Google Scholar 

  16. Nunnally, J.: Psychometric Theory. McGraw-Hill, New York (1978)

    Google Scholar 

  17. Sandys, A.: Key growth opportunities for global smartphone market lie increasingly in developing countries, 31 Oct 2014. Retrieved from Yahoo Finance: https://uk.finance.yahoo.com/news/key-growth-opportunities-global-smartphone-000000662.html

  18. Sheehan, K.: Toward a typology of internet users and online privacy concerns. Inf. Soc. 18(1), 21–32 (2002)

    Article  Google Scholar 

  19. Srinivasan, J.: The role of trustworthiness in information service usage: the case of parry information kiosks, Tamil Nadu, India. In: ICTD 2007: Information and Communication Technologies and Development, pp. 1–8. IEEE, Bangalore, India (2007)

    Google Scholar 

  20. Tan, Z., Chua, W., Chang, K.: Location based services and information privacy concerns among literate. In: 47th Hawaii International Conference on System Science, pp. 3198–3206. IEEE, Hawaii (2014)

    Google Scholar 

  21. Thomas, D., Strauss, J., Maria-Helena, H.: How does mother’s education affect child height? J. Human Resour. 183–211 (1991)

    Google Scholar 

  22. Venkatesh, V., Morris, M.G., Davis, G.B., Davis, F.D.: User acceptance of information technology: toward a unified view. MIS Q. 425–478 (2003)

    Google Scholar 

  23. Westin, A.: Privacy and freedom. Washington Lee Law Rev. 25(1), 166 (1967)

    Google Scholar 

  24. Xu, H.: The effects of self-construal and perceived control on privacy concern. In: 28th Annual International Conference on Information Systems. Montreal, Quebec, AIS Electronic Library, Canada

    Google Scholar 

  25. Xu, H., Teo, H., Tan, B.C.Y.: The role of push-pull technology in privacy calculus: the case of location-based services. J. Manag. Inf. Syst. 26(3), 135–174

    Google Scholar 

  26. Xu, H., Teo, H., Tan, B., Agarwal, R.: Research note—effects of individual self-protection, industry self-regulation, and government regulation on privacy concerns: a study of location-based services. Inf. Syst. Res. 23(4), 1342–1363 (2012)

    Article  Google Scholar 

Download references

Acknowledgements

This research is supported by the National Research Foundation, Prime Minister’s Office, Singapore under its International Research Centres in Singapore Funding Initiative and administered by the Interactive Digital Media Programme Office.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Wen Yong Chua .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer International Publishing Switzerland

About this paper

Cite this paper

Chua, W.Y., Chang, K.T.T., Wan, M.PH. (2016). Location Privacy Apprehensions in Location-Based Services Among Literate and Semi-literate Users. In: Ricciardi, F., Harfouche, A. (eds) Information and Communication Technologies in Organizations and Society. Lecture Notes in Information Systems and Organisation, vol 15. Springer, Cham. https://doi.org/10.1007/978-3-319-28907-6_16

Download citation

Publish with us

Policies and ethics