Inattention and Forewarning on Individuals' Smart Apps Permissions-Consenting Behavior

Inattention and Forewarning on Individuals' Smart Apps Permissions-Consenting Behavior

Solomon Negash, Peter Meso, Philip F. Musa
Copyright: © 2023 |Pages: 26
DOI: 10.4018/JGIM.328519
Article PDF Download
Open access articles are freely available for download

Abstract

In the era of bring-your-own-device and general data protection regulation, corporate network managers have limited control over the non-corporate-owned devices connected onto their corporation's network. However, they are principally responsible for the consequent liabilities that may accrue from breaches of individual consumers' privacy traceable to the network. Hence, this study revisits the notion of information-privacy at the point of contact between an individual end user and the smart-apps that the end user employs. The authors examine the impacts of inattention on consumers' behavioral reactions to perceived smart-app privacy concerns. The authors find that inattention's effects on consumers' behavioral reactions, especially pertaining to re-examination and modification of an app's default permissions settings, is significant. Forewarning has significant impacts on mitigating inattention and altering consumers' behavioral reactions pertaining to re-examination and modification of an app's default permissions settings. Implications of these findings on corporate privacy management are discussed.
Article Preview
Top

Introduction

The era of smart applications (hereafter referred to as smart-apps) and the Internet of Things (IoT) brings with it tensions among communications and economic considerations and personal information privacy concerns (Rath & Kumar, 2021; Fox et al., 2021; Acquisti et al., 2015; Dinev, 2014; Teubner & Flath, 2019; FTC, 2014; Carpenter et al., 2019; Chan & Saqib, 2021). Fundamental to these tensions is, first, the mechanisms and methods used to harvest personal data. Second, how much of one’s personal information is too-much when disclosed, shared, collected, or mined in the economic and communications transactions. As Teubner and Flath (2019) point out, ‘the boundaries between the private and economic spheres have started to erode’ (pp. 213). Software applications designed to function on mobile phones, tablets, wearables, and IoT user-interfaces incrementally mandate the exchange of personal information. Thus, serving as fodder for the community-building and/or trust-enhancement initiatives that leverage the success of their economic models (Einav et al., 2015; Proserpio et al., 2016; Stutzman & Kramer-Duffield, 2010). These software applications are collectively termed smart-apps. Smart-apps have shifted the way personal information is collected and used by companies, hence, raising critical information privacy concerns (Dinev & Hart, 2006; Krasnova et al., 2012; Goldfard & Tucker, 2012; Lutz et al., 2018).

One consequence of this is that the related issues of privacy-consent mechanisms employed within smart-apps and consequent impacts on end-users’ information privacy are increasingly becoming contentious in present day information society. Advances in the architecture, structure, and complexity of smart-apps as well as enhancements in the scope, breadth, and ubiquity-of-usages has significantly changed. Hence the need to examine whether consumers are harmed or better served by current privacy-consenting mechanisms inherent in these apps. This notwithstanding, it is worth noting that Bring Your Own Device (BYOD) is changing control of organizational computing. The mobile generation relies heavily on BYOD and more employees in international organizations are using their personal smartphones for work purposes (Ameen et al., 2021). The 186 billion BYOD market in 2019 (Onanuga, 2020) is projected to grow to 367 billion in 2022 (Georgiev, 2021) and 430 billion in 2025 (Onanuga, 2020). BYOD is adopted by 69% of organizations (BYOD, 2020). BYOD market analysis indicates that 95% of organizations allow personal devices in some way in the workplace, 78% of organizations in the US had BYOD activities since 2018, 67% of employees use personal devices at work, BYOD generates $350 of value each year per employee, a BYOD-carrying employee works an extra two hours, and 87% of businesses are dependent on their employee’s ability to access mobile business apps from their smartphone (Georgiev, 2021).

Complete Article List

Search this Journal:
Reset
Volume 32: 1 Issue (2024)
Volume 31: 9 Issues (2023)
Volume 30: 12 Issues (2022)
Volume 29: 6 Issues (2021)
Volume 28: 4 Issues (2020)
Volume 27: 4 Issues (2019)
Volume 26: 4 Issues (2018)
Volume 25: 4 Issues (2017)
Volume 24: 4 Issues (2016)
Volume 23: 4 Issues (2015)
Volume 22: 4 Issues (2014)
Volume 21: 4 Issues (2013)
Volume 20: 4 Issues (2012)
Volume 19: 4 Issues (2011)
Volume 18: 4 Issues (2010)
Volume 17: 4 Issues (2009)
Volume 16: 4 Issues (2008)
Volume 15: 4 Issues (2007)
Volume 14: 4 Issues (2006)
Volume 13: 4 Issues (2005)
Volume 12: 4 Issues (2004)
Volume 11: 4 Issues (2003)
Volume 10: 4 Issues (2002)
Volume 9: 4 Issues (2001)
Volume 8: 4 Issues (2000)
Volume 7: 4 Issues (1999)
Volume 6: 4 Issues (1998)
Volume 5: 4 Issues (1997)
Volume 4: 4 Issues (1996)
Volume 3: 4 Issues (1995)
Volume 2: 4 Issues (1994)
Volume 1: 4 Issues (1993)
View Complete Journal Contents Listing