Measuring mobile users' concerns for information privacy

Heng Xu, Sumeet Gupta, Mary Beth Rosson, John Carroll

Research output: Chapter in Book/Report/Conference proceedingConference contribution

60 Scopus citations


The evolution of mobile network technologies and smartphones has provided mobile consumers with unprecedented access to Internet and value-added services while on the move. Privacy issues in such context become critically important because vendors may access a large volume of personal information. Although several pioneering studies have examined general privacy risks, few systematic attempts have been made to provide a theory-driven framework on the specific nature of privacy concerns among mobile consumers. To fill the gap in the literature, this article introduced a 9-item scale, which was shown to reasonably represent the dimensionality of mobile users' information privacy concerns (MUIPC), categorized as perceived surveillance, perceived intrusion, and secondary use of personal information. Through a survey study (n=310), the three-factor structure of MUIPC as revealed in exploratory factor analysis was further confirmed through confirmatory factor analysis. Further analysis revealed that the second-order model of MUIPC performed better than its first-order model.

Original languageEnglish (US)
Title of host publicationInternational Conference on Information Systems, ICIS 2012
Number of pages16
StatePublished - Dec 1 2012
EventInternational Conference on Information Systems, ICIS 2012 - Orlando, FL, United States
Duration: Dec 16 2012Dec 19 2012

Publication series

NameInternational Conference on Information Systems, ICIS 2012


OtherInternational Conference on Information Systems, ICIS 2012
CountryUnited States
CityOrlando, FL

All Science Journal Classification (ASJC) codes

  • Computer Science Applications
  • Statistics, Probability and Uncertainty
  • Applied Mathematics
  • Library and Information Sciences

Fingerprint Dive into the research topics of 'Measuring mobile users' concerns for information privacy'. Together they form a unique fingerprint.

Cite this