Desenvolvimento e Validação de um Instrumento para Mensurar a Preocupação de Usuários de Smartphones sobre a Invasão de Privacidade

Yves Wanderley Estanislau da Costa Netto, Vergílio Ricardo Ricardo Britto da Silva, Antônio Carlos Gastaud Maçada

Resumo


O uso de smartphones cresceu de forma consistente ao longo dos últimos anos. Na medida que os aparelhos adquiriram novas funções, aumentou a sua capacidade de suportar serviços e aplicações. Preocupações sobre a privacidade durante o uso dos equipamentos como: coleta e armazenamento de dados, localização e uso de informações por terceiros sem autorização passaram a ser comuns entre os usuários. O presente artigo apresenta um questionário composto por cinco dimensões e dezesseis itens e tem como objetivo iniciar o processo de desenvolvimento e validação de uma escala para mensurar os fatores que influenciam a preocupação dos usuários sobre invasão de privacidade durante o uso de smartphones. Dentre as conclusões, verificou-se que a inclusão de duas dimensões que mensuram percepções positivas relacionadas ao uso dos aparelhos (Auto Eficácia e Benefício Percebido), pode contribuir para a mensuração de como os usuários avaliam as ameaças e benefícios ao usar os smartphones.


Palavras-chave


Invasão de privacidade; Smartphones; Validação de instrumento de pesquisa.

Texto completo:

PDF

Referências


Aaker, D. A., Kumar, V., & Day, G. S. (2008). Marketing research: John Wiley & Sons.

Acquisti, A., Brandimarte, L., & Loewenstein, G. (2015). Privacy and human behavior in the age of information. Science, 347(6221), 509-514.

Acquisti, A., & Grossklags, J. (2005). Privacy and rationality in individual decision making. IEEE Security & Privacy, 3(1), 26-33.

Akhter, S. (2014). Privacy concern and online transactions: the impact of internet self-efficacy and internet involvement. Journal of Consumer Marketing, 31(2), 118-125.

Bandura, A. (1977). Self-efficacy: toward a unifying theory of behavioral change. Psychological review, 84(2), 191.

Botha, R. A., Furnell, S. M., & Clarke, N. L. (2009). From desktop to mobile: Examining the security experience. Computers & Security, 28(3-4), 130-137.

Carvalho, C. A., & Vieira, M. M. F. (2007). O poder nas organizações: Thomson.

Chellappa, R. K., & Sin, R. G. (2005). Personalization versus privacy: An empirical examination of the online consumer’s dilemma. Information technology and management, 6(2-3), 181-202.

Chin, E., Felt, A. P., Sekar, V., & Wagner, D. (2012). Measuring user confidence in smartphone security and privacy. Paper presented at the Proceedings of the Eighth Symposium on Usable Privacy and Security.

Compeau, D. R., & Higgins, C. A. (1995). Computer self-efficacy: Development of a measure and initial test. Mis Quarterly, 189-211.

Computerworld. (2017, 09 Abr. 2017). Mais privacidade e segurança nas comunicações móveis envolve decisões políticas, diz estudo. Retrieved 20 Jul. 2018, 2018, from http://computerworld.com.br/2017/4/9/mais-privacidade-e-seguranca-nas-comunicacoes-moveis-envolve-decisoes-politicas-diz-estudo

Culnan, M. J. (1993). " How Did They Get My Name?": An Exploratory Investigation of Consumer Attitudes toward Secondary Information Use. Mis Quarterly, 341-363.

Davis, F. D. (1989). Perceived usefulness, perceived ease of use, and user acceptance of information technology. Mis Quarterly, 319-340.

Degirmenci, K., Guhr, N., & Breitner, M. H. (2013). Mobile applications and access to personal information: A discussion of users' privacy concerns.

Dehling, T., & Sunyaev, A. (2014). Information Security and Privacy of Patient-Centered Health IT Services: What Needs to Be Done? Paper presented at the System Sciences (HICSS), 2014 47th Hawaii International Conference on.

Dienlin, T., & Trepte, S. (2015). Is the privacy paradox a relic of the past? An in‐depth analysis of privacy attitudes and privacy behaviors. European Journal of Social Psychology, 45(3), 285-297.

Dinev, T., & Hart, P. (2006). Privacy concerns and levels of information exchange: An empirical investigation of intended e-services use. E-Service, 4(3), 25-60.

Dogruel, L., Joeckel, S., & Vitak, J. (2017). The valuation of privacy premium features for smartphone apps: The influence of defaults and expert recommendations. Computers in Human Behavior.

Fornell, C., & Larcker, D. F. (1981). Structural equation models with unobservable variables and measurement error: Algebra and statistics. Journal of marketing research, 382-388.

Forsythe, S., Liu, C., Shannon, D., & Gardner, L. C. (2006). Development of a scale to measure the perceived benefits and risks of online shopping. Journal of Interactive Marketing, 20(2), 55-75.

Gecas, V. (1989). The social psychology of self-efficacy. Annual review of sociology, 15(1), 291-316.

Gerbing, D. W., & Anderson, J. C. (1988). An updated paradigm for scale development incorporating unidimensionality and its assessment. Journal of marketing research, 186-192.

Gist, M. E. (1987). Self-efficacy: Implications for organizational behavior and human resource management. Academy of management review, 12(3), 472-485.

Hair, J., Babin, B., Money, A., & Samouel, P. (2005). Fundamentos de métodos de pesquisa em administração: Bookman Companhia Ed.

Hair, J. F., Black, W. C., Babin, B. J., Anderson, R. E., & Tatham, R. L. (1998). Multivariate data analysis (Vol. 5): Prentice hall Upper Saddle River, NJ.

Hair Jr, J. F., Gabriel, M. L. D. d. S., & Patel, V. K. (2014). Modelagem de Equações Estruturais Baseada em Covariância (CB-SEM) com o AMOS: Orientações sobre a sua aplicação como uma Ferramenta de Pesquisa de Marketing. REMark, 13(2), 43.

Hinkin, T. R. (1998). A brief tutorial on the development of measures for use in survey questionnaires. Organizational research methods, 1(1), 104-121.

Introna, L., & Pouloudi, A. (1999). Privacy in the information age: Stakeholders, interests and values. Journal of Business Ethics, 22(1), 27-38.

Junglas, I. A., Johnson, N. A., & Spitzmüller, C. (2008). Personality traits and concern for privacy: an empirical study in the context of location-based services. European Journal of Information Systems, 17(4), 387-402.

Ketelaar, P. E., & van Balen, M. (2018). The smartphone as your follower: The role of smartphone literacy in the relation between privacy concerns, attitude and behaviour towards phone-embedded tracking. Computers in Human Behavior, 78, 174-182.

Kinard, B. R., & Capella, M. L. (2006). Relationship marketing: the influence of consumer involvement on perceived service benefits. Journal of Services Marketing, 20(6), 359-368.

Kline, R. B. (2011). Principles and Practice of Structural Equation Modeling (3rd ed.): Guilford Press.

Kokolakis, S. (2017). Privacy attitudes and privacy behaviour: A review of current research on the privacy paradox phenomenon. Computers & Security, 64, 122-134. doi: https://doi.org/10.1016/j.cose.2015.07.002

Koufteros, X. A. (1999). Testing a model of pull production: a paradigm for manufacturing research using structural equation modeling. Journal of Operations Management, 17(4), 467-488.

La Polla, M., Martinelli, F., & Sgandurra, D. (2013). A survey on security for mobile devices. IEEE communications surveys & tutorials, 15(1), 446-471.

Lewis, B. R., & Byrd, T. A. (2003). Development of a measure for the information technology infrastructure construct. European Journal of Information Systems, 12(2), 93-109.

Lom, H. S., Thoo, A. C., Sulaiman, Z., & Adam, S. (2018). Moderating Role of Mobile Users' Information Privacy Concerns Towards Behavioural Intention and Use Behaviour in Mobile Advertising. Advanced Science Letters, 24(6), 4259-4264. doi: 10.1166/asl.2018.11584

Luarn, P., & Lin, H.-H. (2005). Toward an understanding of the behavioral intention to use mobile banking. Computers in Human Behavior, 21(6), 873-891.

Lynch, M. (2016, 19 Feb. 2016, ). Leave My IPhone Alone: Why Our Smartphones Are Extensions of Ourselves., from www.theguardian.com/technology/2016/feb/19/iphone-apple-privacy-smartphones-extension-of-ourselves.

Malhotra, N. K. (2012). Pesquisa de marketing: uma orientação aplicada: Bookman Editora.

Malhotra, N. K., Kim, S. S., & Agarwal, J. (2004). Internet users' information privacy concerns (IUIPC): The construct, the scale, and a causal model. Information systems research, 15(4), 336-355.

Newell, P. B. (1995). Perspectives on privacy. Journal of Environmental Psychology, 15(2), 87-104.

Norusis, M. J. (1993). SPSS: SPSS for Windows, base system user's guide release 6.0: SPSS Inc.

Nov, O., & Wattal, S. (2009). Social computing privacy concerns: antecedents and effects. Paper presented at the Proceedings of the SIGCHI conference on human factors in computing systems.

Oppenheim, A. N. (2000). Questionnaire design, interviewing and attitude measurement: Bloomsbury Publishing.

Orlikowski, W. J., & Iacono, C. S. (2001). Research commentary: Desperately seeking the “IT” in IT research—A call to theorizing the IT artifact. Information systems research, 12(2), 121-134.

Pedersen, D. M. (1997). Psychological functions of privacy. Journal of Environmental Psychology, 17(2), 147-156.

Pedhazur, E. J., & Schmelkin, L. P. (1991). Measurement, design, and analysis: An integrated analysis: Hillsdale: Erlbaum.

Pedhazur, E. J., & Schmelkin, L. P. (2013). Measurement, design, and analysis: An integrated approach: Psychology Press.

Pennekamp, J., Henze, M., & Wehrle, K. (2017). A survey on the evolution of privacy enforcement on smartphones and the road ahead. Pervasive and Mobile Computing.

Pinsonneault, A., & Kraemer, K. (1993). Survey research methodology in management information systems: an assessment. Journal of management information systems, 10(2), 75-105.

Preibusch, S. (2013). Guide to measuring privacy concern: Review of survey and observational instruments. International Journal of Human-Computer Studies, 71(12), 1133-1143.

Ryschka, S., Rodewyk, B., Ha, K.-H., & Bick, M. (2014). A qualitative investigation of risk perceptions in the case of check-in services.

Smith, H. J., Milberg, S. J., & Burke, S. J. (1996). Information privacy: measuring individuals' concerns about organizational practices. Mis Quarterly, 167-196.

Solove, D. J. (2007). I've got nothing to hide and other misunderstandings of privacy. San Diego L. Rev., 44, 745.

Stewart, K. A., & Segars, A. H. (2002). An empirical examination of the concern for information privacy instrument. Information systems research, 13(1), 36-49.

Sutanto, J., Palme, E., Tan, C.-H., & Phang, C. W. (2013). Addressing the Personalization-Privacy Paradox: An Empirical Assessment from a Field Experiment on Smartphone Users. Mis Quarterly, 37(4).

Tan, C. (2014). Empirical Study on Acceptance Level of Mobile Transaction Due To Privacy Invasion: eprints.intimal.edu.my.

Wang, C., Wang, C., Chen, Y., Xie, L., & Lu, S. (2017). Smartphone Privacy Leakage of Social Relationships and Demographics from Surrounding Access Points. Paper presented at the Proceedings - International Conference on Distributed Computing Systems.

Werts, C. E., Linn, R. L., & Jöreskog, K. G. (1974). Intraclass reliability estimates: Testing structural assumptions. Educational and Psychological measurement, 34(1), 25-33.

Westin, A. F. (2003). Social and political dimensions of privacy. Journal of social issues, 59(2), 431-453.

Wilson, D., & Valacich, J. S. (2012). Unpacking the privacy paradox: Irrational decision-making within the privacy calculus.

Xu, H. (2007). The effects of self-construal and perceived control on privacy concerns. ICIS 2007 proceedings, 125.

Xu, H., Gupta, S., Rosson, M. B., & Carroll, J. M. (2012). Measuring mobile users' concerns for information privacy.

Xu, H., & Tan, B. C. Y. (2012). Why Do I Keep Checking Facebook: Effects of Message Characteristics On the Formation of Social Network Services Addiction. ICIS 2012 Proceedings.

Xu, K., Li, J., Lau, R., Liao, S., & Fang, B. (2011). An Effective Method of Discovering Target Groups on Social Networking Sites. ICIS 2011 Proceedings.

Xu, Y., Zhang, C., Xue, L., & Yeo, L. L. (2008). Product Adoption in Online Social Network. ICIS 2008 Proceedings.

Zimmerman, B. J. (2000). Self-efficacy: An essential motive to learn. Contemporary educational psychology, 25(1), 82-91. doi: 10.1006/ceps.1999.1016




DOI: https://doi.org/10.20397/2177-6652/2018.v18i3.1462

Métricas do artigo

Carregando Métricas ...

Metrics powered by PLOS ALM

Apontamentos

  • Não há apontamentos.




Direitos autorais 2018 Revista Gestão & Tecnologia

Licença Creative Commons
Esta obra está licenciada sob uma licença Creative Commons Atribuição - NãoComercial 4.0 Internacional.