Start Date

10-12-2017 12:00 AM

Description

The increasing use of mobile devices has been accompanied by the development of mobile cloud-computing applications (MCC apps), which are multi-platform and send the users’ data to the cloud. Despite their benefits, MCC apps raise privacy concerns because the users’ information is sent to remote locations where users lack direct control. This paper studies predictors of individuals’ decisions to disclose personal information to MCC apps and proposes a privacy-security model. Analyses of data collected through an online survey with 385 responses find perceived privacy concerns to be the main inhibitor and perceived usefulness and perceived security to be the main enablers. Perceived ease of use does not directly affect the disclosing of information to MCC apps and improper access does not impact privacy concerns. Results also suggest the surprising relationships between perceived security, privacy policy, and perceived usefulness. The paper’s theoretical and practical implications are discussed.

Share

COinS
 
Dec 10th, 12:00 AM

A Privacy-Security Model of Mobile Cloud Computing Applications

The increasing use of mobile devices has been accompanied by the development of mobile cloud-computing applications (MCC apps), which are multi-platform and send the users’ data to the cloud. Despite their benefits, MCC apps raise privacy concerns because the users’ information is sent to remote locations where users lack direct control. This paper studies predictors of individuals’ decisions to disclose personal information to MCC apps and proposes a privacy-security model. Analyses of data collected through an online survey with 385 responses find perceived privacy concerns to be the main inhibitor and perceived usefulness and perceived security to be the main enablers. Perceived ease of use does not directly affect the disclosing of information to MCC apps and improper access does not impact privacy concerns. Results also suggest the surprising relationships between perceived security, privacy policy, and perceived usefulness. The paper’s theoretical and practical implications are discussed.