Many applications on smart Phones can use various sensors embedded in the mobiles to provide users’ private information. This can result in a variety of privacy issues that may lessening level of mobile apps usage. To understand this issue better the researcher identified the root causes of privacy concerns. The study proposed a model identifies the root causes of privacy concerns and perceived benefits based on our interpretation for information boundary theory. The proposed model also addresses the usage behavior and behavioral intention toward using mobile apps by using the Theory of Planned Behavior. The result shows that “Cultural values” alone explains 70% of “Perceived privacy concerns” followed by “Self-defense” which explains around 23% of “Perceived privacy concerns”, and then “Context of the situation” with 5%. Whereas, the findings show that “Perceived effectiveness of privacy policy” and “Perceived effectiveness of industry self-regulation” both are factors which have the ability to reduce individuals “Perceived privacy concerns” by 9% and 8% respectively.
Forensic Tools Performance Analysis on Android-based Blackberry Messenger usi...IJECEIAES
Blackberry Messenger is one of the popularly used instant messaging applications on Android with user’s amount that increase significantly each year. The increase off Blackberry Messenger users might lead to application misuse, such as for commiting digital crimes. To conduct investigation involving smartphone devices, the investigators need to use forensic tools. Therefore, a research on current forensic tool’s performance in order to handle digital crime cases involving Android smartphones and Blackberry Messenger in particular need to be done. This research focuses on evaluating and comparing three forensic tools to obtain digital evidence from Blackberry Messenger on Android smartphones using parameter from National Institute of Standard Technology and Blackberry Messenger’s acquired digital evidences. The result shows that from comparative analysis conducted, Andriller gives 25% performance value, Oxygen Forensic Suite gives 100% performance value, and Autopsy 4.1.1 gives 0% performance value. Related to National Institute of Standard Technology parameter criterias, Andriller has performance value of 47.61%. Oxygen Forensic Suite has performance value of 61.90%. Autopsy 4.1.1 has performance value of 9.52%.
The document discusses smartphone forensics analysis through a case study from Oman. It summarizes the analysis of a smartphone using two forensic tools, Oxygen Forensic Suite and UFED Physical Analyzer, to extract evidence for a case where a person's phone was allegedly hacked and their WhatsApp contacts received messages. The tools found evidence that WhatsApp messages can be sent over Wi-Fi without cellular data, allowing for two possible compromise scenarios: the SIM was removed and Wi-Fi used, or the phone was sold but WhatsApp not deleted and the new owner used Wi-Fi. Comparing evidence across tools helps solve the case.
The document summarizes the findings of a global study on consumer confidence and trust in mobile technologies. It found that while mobile device usage is widespread, many users lack confidence in the security of their devices and the networks and services they access. The rapid growth of mobile threats has not been matched with adequate security precautions by users. Building greater trust will require coordinated efforts across the entire mobile industry to address security and reliability issues.
Government Web Application Security: Issues and Challenges - A Case of IndiaEditor IJCATR
The public services offered by the government are trustworthy, for that reason the government needs to understand various
threats, vulnerabilities, and trends in order to protect the citizen database and offered services. This paper studied various acts, rules,
policies, guidelines and standards adopted by the government departments for development of design, development & deployment of
web-based applications and cited various problems related to coding, manpower and funding issues as a case of India. This study
shows, the majority of government departments is developing and audited web applications before hosting on the public domain. But,
for this most departments have to depend on the private organizations. This drawback arises in the government departments because of
lack of certified or educated staff. Thus the government departments ought to train their staff along with administrators in information
security from time to time. This will ensure making improvements to the internal protection and reduce the dependency on private
organization tremendously.
Report: A Model For Remote Parental Control System Using SmartphonesIJCI JOURNAL
The document summarizes a research paper that proposes a model called "RePort" for remotely monitoring children and teens' access and online activities via their computers and smartphones. The 4-layer RePort model includes layers to monitor smartphone usage through call logs, SMS, GPS, WiFi, and Bluetooth; desktop computer usage; social networking activities; and generate reports. It was implemented as an Android app and Windows service to track parameters like time spent, posts, and messages. Experiments validated the model's ability to monitor access behaviors remotely with 93.46% accuracy.
This document proposes a web-based location-aware system architecture to combat electoral crimes in Nigeria. It would allow the Independent National Electoral Commission (INEC), police, and public to exchange information about crimes in real-time. The system uses a client-server model, with GPS sensors on electoral devices to track their location if stolen. The public could anonymously report crimes or missing devices via a mobile app. INEC could then locate stolen devices on a server map. This is proposed to improve communication between authorities and the public to better detect and respond to electoral crimes.
Getting the social side of pervasive computing rightblogzilla
The document discusses privacy issues that may arise with the rise of pervasive computing technologies. It outlines four "dark scenarios" showing potential social problems, including inaccurate personal profiling, location tracking without consent, and health monitoring system failures. The document calls for privacy to be designed into new technologies from the start through principles like data minimization, in order to build public trust and avoid privacy disasters.
A Study on the Analysis of the Child Personal Information Processing Status i...IJERA Editor
This study aims to empirically examine the reality that a child's personal information can be easily exposed through an app service. As a result of surveying 100 child-targeted apps in the Apple and Google Play App Stores, we collected on average 12 personal information of individuals that included social security numbers and location information that were not collected and clarified for the purpose of collection.
Forensic Tools Performance Analysis on Android-based Blackberry Messenger usi...IJECEIAES
Blackberry Messenger is one of the popularly used instant messaging applications on Android with user’s amount that increase significantly each year. The increase off Blackberry Messenger users might lead to application misuse, such as for commiting digital crimes. To conduct investigation involving smartphone devices, the investigators need to use forensic tools. Therefore, a research on current forensic tool’s performance in order to handle digital crime cases involving Android smartphones and Blackberry Messenger in particular need to be done. This research focuses on evaluating and comparing three forensic tools to obtain digital evidence from Blackberry Messenger on Android smartphones using parameter from National Institute of Standard Technology and Blackberry Messenger’s acquired digital evidences. The result shows that from comparative analysis conducted, Andriller gives 25% performance value, Oxygen Forensic Suite gives 100% performance value, and Autopsy 4.1.1 gives 0% performance value. Related to National Institute of Standard Technology parameter criterias, Andriller has performance value of 47.61%. Oxygen Forensic Suite has performance value of 61.90%. Autopsy 4.1.1 has performance value of 9.52%.
The document discusses smartphone forensics analysis through a case study from Oman. It summarizes the analysis of a smartphone using two forensic tools, Oxygen Forensic Suite and UFED Physical Analyzer, to extract evidence for a case where a person's phone was allegedly hacked and their WhatsApp contacts received messages. The tools found evidence that WhatsApp messages can be sent over Wi-Fi without cellular data, allowing for two possible compromise scenarios: the SIM was removed and Wi-Fi used, or the phone was sold but WhatsApp not deleted and the new owner used Wi-Fi. Comparing evidence across tools helps solve the case.
The document summarizes the findings of a global study on consumer confidence and trust in mobile technologies. It found that while mobile device usage is widespread, many users lack confidence in the security of their devices and the networks and services they access. The rapid growth of mobile threats has not been matched with adequate security precautions by users. Building greater trust will require coordinated efforts across the entire mobile industry to address security and reliability issues.
Government Web Application Security: Issues and Challenges - A Case of IndiaEditor IJCATR
The public services offered by the government are trustworthy, for that reason the government needs to understand various
threats, vulnerabilities, and trends in order to protect the citizen database and offered services. This paper studied various acts, rules,
policies, guidelines and standards adopted by the government departments for development of design, development & deployment of
web-based applications and cited various problems related to coding, manpower and funding issues as a case of India. This study
shows, the majority of government departments is developing and audited web applications before hosting on the public domain. But,
for this most departments have to depend on the private organizations. This drawback arises in the government departments because of
lack of certified or educated staff. Thus the government departments ought to train their staff along with administrators in information
security from time to time. This will ensure making improvements to the internal protection and reduce the dependency on private
organization tremendously.
Report: A Model For Remote Parental Control System Using SmartphonesIJCI JOURNAL
The document summarizes a research paper that proposes a model called "RePort" for remotely monitoring children and teens' access and online activities via their computers and smartphones. The 4-layer RePort model includes layers to monitor smartphone usage through call logs, SMS, GPS, WiFi, and Bluetooth; desktop computer usage; social networking activities; and generate reports. It was implemented as an Android app and Windows service to track parameters like time spent, posts, and messages. Experiments validated the model's ability to monitor access behaviors remotely with 93.46% accuracy.
This document proposes a web-based location-aware system architecture to combat electoral crimes in Nigeria. It would allow the Independent National Electoral Commission (INEC), police, and public to exchange information about crimes in real-time. The system uses a client-server model, with GPS sensors on electoral devices to track their location if stolen. The public could anonymously report crimes or missing devices via a mobile app. INEC could then locate stolen devices on a server map. This is proposed to improve communication between authorities and the public to better detect and respond to electoral crimes.
Getting the social side of pervasive computing rightblogzilla
The document discusses privacy issues that may arise with the rise of pervasive computing technologies. It outlines four "dark scenarios" showing potential social problems, including inaccurate personal profiling, location tracking without consent, and health monitoring system failures. The document calls for privacy to be designed into new technologies from the start through principles like data minimization, in order to build public trust and avoid privacy disasters.
A Study on the Analysis of the Child Personal Information Processing Status i...IJERA Editor
This study aims to empirically examine the reality that a child's personal information can be easily exposed through an app service. As a result of surveying 100 child-targeted apps in the Apple and Google Play App Stores, we collected on average 12 personal information of individuals that included social security numbers and location information that were not collected and clarified for the purpose of collection.
Face Recognition Using ML in Public Transportsijtsrd
Modernization of railways has forever been an issue focused on the development of the fundamental infrastructure of a nation. Since the railways represent one of the most effective modes of transport offered to the people, It is important to keep a check on the security issues that are arising in todays world. According to the need there must be an upgradation in systems we use. One such upgradation is that the role of Artificial Intelligence and e ticketing that is achieved with the assistance of face recognition technology. This technology has been extensively employed as a biometric method and hence can be used for passenger verification. Mangal Kotkar | Shubham Gawade | Shubham Mandavkar | Prathamesh Gujar "Face Recognition Using ML in Public Transports" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-5 | Issue-6 , October 2021, URL: https://www.ijtsrd.com/papers/ijtsrd47656.pdf Paper URL : https://www.ijtsrd.com/engineering/information-technology/47656/face-recognition-using-ml-in-public-transports/mangal-kotkar
Strategic Database Security Management and Cybercrime Reduction among Youths ...ijtsrd
The purpose of this study is to investigate the relationship between strategic database security management and cybercrime reduction among youth in Information Technology sector in Nigeria. Cross sectional survey design was used for this study. The population of the study comprises 32 information and technology companies in Rivers state. The method of data collection was questionnaire. Data from the distributed questionnaire was further analyzed, using the spearman rank order Correlation Coefficient. The hypotheses of the study were tested through the help of Statistical Package for Social Science SPSS , version 20. Findings revealed that strategic database security management have a significant relationship between the measures cybercrime reduction among youth in information technology companies in Nigeria. Therefore, we recommend that Management of information technology companies should ensure that proper computer security measures are put in place in order to fortify their database from unauthorized persons. Agbeche, Aaron | Elechi, Bobby Chime | Okechukwu, Prince Jumbo "Strategic Database Security Management and Cybercrime Reduction among Youths in Information Technology Companies in Nigeria" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-5 | Issue-6 , October 2021, URL: https://www.ijtsrd.com/papers/ijtsrd47643.pdf Paper URL : https://www.ijtsrd.com/management/strategic-management/47643/strategic-database-security-management-and-cybercrime-reduction-among-youths-in-information-technology-companies-in-nigeria/agbeche-aaron
Indonesia Netizen Facts (April - June 2015)ICT Watch
This document summarizes internet and technology initiatives in Indonesia. It discusses programs by ICT Watch to promote safe and wise internet use through educational materials and workshops. It also outlines ICT Watch's role in advocating for improved internet governance and supporting civil society organizations. The document provides statistics on internet usage in Indonesia and trends around online activities, devices used, and age demographics of internet users. It summarizes issues around online freedom of expression and content filtering as well as multi-stakeholder initiatives on internet governance, child protection online, and handling of negative online content.
Improving the Information System of Tourist Destinations in the Context of th...ijtsrd
This article discusses how Uzbekistan may improve its smart tourism and tourism information infrastructure of tourist destinations. Because of the technological services supplied to passengers before, during, and after their journey, smart tourism is a terrific way to save not only money, but also nerves and valuable time. The authors remarks, conclusions, and recommendations are included in the paper, as well as an analysis of the pertinent data. Nosirova U. M. "Improving the Information System of Tourist Destinations in the Context of the Digitalization of the Economy" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-5 | Issue-6 , October 2021, URL: https://www.ijtsrd.com/papers/ijtsrd47690.pdf Paper URL : https://www.ijtsrd.com/economics/other/47690/improving-the-information-system-of-tourist-destinations-in-the-context-of-the-digitalization-of-the-economy/nosirova-u-m
Application Of Android Enabled Mobile Device For Personal Information Systemsijasa
The document describes a proposed personal mobile information system (PMIS) developed on the Android platform. The PMIS would provide location-based services like GPS-enabled proximity alerts and a rating system for points of interest. It would also plot routes from a user's location to points of interest, alerting users of any crime incidents along the way based on police data. The system has two types of users: general users who can rate and find points of interest, and police users who can log crime events and update safety ratings to inform alerts for general users. The goal is to create a personalized mobile information system that enhances user safety during navigation.
A SMART WIZARD SYSTEM SUITABLE FOR USE WITH INTERNET MOBILE DEVICES TO ADJUST...ijsptm
The privacy of personal information is an important issue affecting the confidence of internet users. The
widespread adoption of online social networks and access to these platforms using mobile devices has
encouraged developers to make the systems and interfaces acceptable to users who seek privacy. The aim
of this study is to test a wizard that allows users to control the sharing of personal information with others.
We also assess the concerns of users in terms of such sharing such as whether to hide personal data in
current online social network accounts. Survey results showed the wizard worked very well and that
females concealed more personal information than did males. In addition, most users who were concerned
about misuse of personal information hid those items. The results can be used to upgrade current privacy
systems or to design new systems that work on mobile internet devices. The system can also be used to save
time when setting personal privacy settings and makes users more aware of items that will be shared with
others.
The document discusses cyber security challenges for smart communities. It notes that cyber threats are becoming more sophisticated and pose risks to critical infrastructure. Establishing effective cooperation between public and private sectors is important for developing strategies to address cyber challenges in smart communities. As communities become more connected through information and communication technologies, demand for robust cyber security will continue to grow.
State regulation of the IoT in the Russian Federation: Fundamentals and chall...IJECEIAES
The purpose of this section is to study the problems with implementing technical and legal regulations for the development of public administration functions in the Russian Federation when using the internet of things (IoT). The introduction is based on an analysis of regulatory legal acts and presents the main strategic directions for the development of public administration functions in the Russian federation when using IoT. State reports, scientific literature, a system of technical and legal regulation are analyzed, and the main problems of implementing the IoT that impede the achievement of effective public administration are studied. The Russian practice of using IoT in various economic areas is investigated. Based on an analysis of the mechanisms for ensuring data safety of information technology users in the Russian federation, problems were investigated, such as the collecting data through IoT, including publicly available personal data in order to profile human activities, and creating of a digital twin of a person. The social constraints for introducing distributed registry technologies are users' distrust in the field of data privacy protection and mathematical algorithms that are used to establish trust in a digital environment instead of trusted centralized intermediaries; these problems were also analyzed. The Russian approach was analyzed in comparison to European experience in this field. To ensure information security and the possibility of its distribution, the IoT is revealed.
This document provides an overview of mobile internet and applications. It discusses how mobile media usage has grown significantly, with over 35% of mobile users now browsing, downloading apps or using other internet-based services on their phones. Mobile internet and app usage is driven by improving device technology, the expansion of 3G networks and data plans. Popular mobile activities include messaging, photography, games and mobile browsing for information. Traditional media brands have also seen strong mobile growth. The document reviews mobile internet and app usage data and trends to give insights into this growing space.
This research paper analyzes exposed cyber assets in critical sectors across US cities using data from the search engine Shodan. Some key findings include:
- Emergency services in Houston and Lafayette had many exposed assets.
- New York City, as a financial hub, had the most exposed assets in the financial sector.
- Exposed utilities assets were mostly in small towns, not large cities.
- Philadelphia alone had over 65,000 exposed devices in the education sector.
The paper also examines exposed industrial control systems and human machine interfaces that could impact critical infrastructure if accessed maliciously. It concludes by calling for improved awareness and security of these exposed city cyber assets.
Securing mobile devices_in_the_business_environmentK Singh
This document discusses securing mobile devices in the business environment. It notes that mobile devices are increasingly being used for both personal and work purposes. While this brings advantages like increased productivity, it also poses security risks if not properly addressed. The document outlines various security threats to mobile devices like loss/theft, malware, spam, phishing, and issues with Bluetooth/Wi-Fi. It recommends developing a mobile security strategy that addresses data access, platform support, management, and best practices. The strategy should apply controls across identity/access, data protection, applications, and other areas based on IBM's security framework.
IRJET- Awareness and Knowledge about Android Smartphones Security among Ghana...IRJET Journal
The document summarizes a study that assessed awareness and knowledge of Android smartphone security among Ghanaians. The study surveyed 1240 adult smartphone users in Ghana. It found that most respondents had previously owned an Android smartphone, which they either still had or gave away. While photos, contacts, and documents were seen as private, many accessed email, finances, health and academic info on their phones. The study also found gender and age predicted knowledge of encryption and data recovery. Overall, respondents' vulnerability to attacks after disposing of phones was deemed high. The study recommends awareness campaigns to help users better protect sensitive data and reduce risks of cybercrime if phones are lost, stolen or damaged.
Privacy prescriptions for technology interventions on covid 19 in india(2)sabrangsabrang
This document discusses technology interventions being developed for contact tracing during the COVID-19 pandemic in India and their implications for privacy. It analyzes location tracking systems and contact tracing apps from other countries. It also assesses India's Aarogya Setu app, finding broad data collection and a lack of transparency. The document makes recommendations to ensure contact tracing respects privacy rights under India's legal framework.
Indonesia Netizen Facts (July - September 2016)ICT Watch
Indonesia Netizen Facts (July - September 2016). For Bahasa Indonesia, read here http://www.slideshare.net/internetsehat/netizen-indonesia-kini-juli-september2016
- The document discusses trends in mobile internet usage based on a survey of over 17,000 internet users across 13 countries
- A key finding is that 69% of internet users accessed the internet through a mobile device in the past year, with smartphones being the most popular
- Usage is growing across demographics but emerging markets and younger users have higher adoption rates
- Activities like email, social media, banking and content consumption are increasingly common on mobile
- Drivers of usage include improved networks and growing availability of useful apps
Mobile computing application risks in ZimbabweIOSR Journals
Abstract: Mobile technology has now become the order of the day. Everyone seems to own one or more mobile
devices. Everyone is so excited because this has made life easier for a lot of people. Though mobile technology
has brought many benefits to people’s lives, its application has some risks that come with it. This paper
therefore looked at mobile computing application areas in Zimbabwe, the risks brought about by mobile
computing application in Zimbabwe and how mobile computing application risks are mitigated in a developing
country like Zimbabwe where the technology level seems to be behind. The study findings showed that mobile
application areas in Zimbabwe include paying bills, social networking and playing games. Most Zimbabweans
revealed that they do not know how to mitigate mobile computing application risks. The study finally
recommended that mobile computing application risks should be taught in schools as well as in televisions and
radios so that everyone is aware of them.
Keywords: application risks, mobile computing, mobile device,mobile technology
This document provides a brief survey of mobile forensics analysis on social networking applications. It discusses two popular social networking applications, Tagged and Hi5, and describes some of their key features that could be relevant to forensic investigations. Specifically, it outlines features like registration details, friend networks, media sharing, instant messaging, status updates, and other profile building features. The document suggests electronic evidence retrieved from activities on these social networking platforms could help investigate criminal cases by incriminating or proving the innocence of suspects.
ANDROID & FIREBASE BASED ANTI THEFT MOBILE APPLICATIONIRJET Journal
This document summarizes an Android & Firebase based anti-theft mobile application. The application secretly runs in the background after installation. If the phone is lost or stolen, it sends the thief's location, photos taken by the front camera, and other identifying information to registered contacts. This is done without the thief's knowledge through features like fake shutdown and fake airplane mode. The application aims to facilitate easy retrieval of stolen phones and protect private data. It was created using Java technology and Firebase for backend connectivity and alert systems. The proposed system provides an effective solution for mobile security and theft prevention.
A Dynamic Intelligent Policies Analysis Mechanism for Personal Data Processin...Konstantinos Demertzis
The document describes an Intelligent Policies Analysis Mechanism (IPAM) that is part of the ADVOCATE framework. IPAM uses machine learning methods like Fuzzy Cognitive Maps and Extreme Learning Machines to identify potentially conflicting rules or consents from a user that could lead to personal data collection and profiling without consent. The framework aims to help users maintain control over their personal data as required by GDPR regulations. IPAM simulates how smart devices collect personal data and identifies rules that may enable profiling, training on example data to learn how to detect such instances.
This document summarizes a research paper on smartphone security and protection practices. The paper identifies several mobile security threats, including phishing apps, supply chain compromise, and crypto miners embedded in games. It also outlines key best practices like using strong authentication, regularly updating apps and OS, enabling encryption and remote data wiping. A survey was conducted to assess usage of these practices among 167 mobile users. The findings showed fingerprint scanning was the most common authentication method, while automatic backups and updates were also widely used. The paper concludes that balancing security and usability will remain an ongoing challenge as the mobile landscape continues to evolve.
Face Recognition Using ML in Public Transportsijtsrd
Modernization of railways has forever been an issue focused on the development of the fundamental infrastructure of a nation. Since the railways represent one of the most effective modes of transport offered to the people, It is important to keep a check on the security issues that are arising in todays world. According to the need there must be an upgradation in systems we use. One such upgradation is that the role of Artificial Intelligence and e ticketing that is achieved with the assistance of face recognition technology. This technology has been extensively employed as a biometric method and hence can be used for passenger verification. Mangal Kotkar | Shubham Gawade | Shubham Mandavkar | Prathamesh Gujar "Face Recognition Using ML in Public Transports" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-5 | Issue-6 , October 2021, URL: https://www.ijtsrd.com/papers/ijtsrd47656.pdf Paper URL : https://www.ijtsrd.com/engineering/information-technology/47656/face-recognition-using-ml-in-public-transports/mangal-kotkar
Strategic Database Security Management and Cybercrime Reduction among Youths ...ijtsrd
The purpose of this study is to investigate the relationship between strategic database security management and cybercrime reduction among youth in Information Technology sector in Nigeria. Cross sectional survey design was used for this study. The population of the study comprises 32 information and technology companies in Rivers state. The method of data collection was questionnaire. Data from the distributed questionnaire was further analyzed, using the spearman rank order Correlation Coefficient. The hypotheses of the study were tested through the help of Statistical Package for Social Science SPSS , version 20. Findings revealed that strategic database security management have a significant relationship between the measures cybercrime reduction among youth in information technology companies in Nigeria. Therefore, we recommend that Management of information technology companies should ensure that proper computer security measures are put in place in order to fortify their database from unauthorized persons. Agbeche, Aaron | Elechi, Bobby Chime | Okechukwu, Prince Jumbo "Strategic Database Security Management and Cybercrime Reduction among Youths in Information Technology Companies in Nigeria" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-5 | Issue-6 , October 2021, URL: https://www.ijtsrd.com/papers/ijtsrd47643.pdf Paper URL : https://www.ijtsrd.com/management/strategic-management/47643/strategic-database-security-management-and-cybercrime-reduction-among-youths-in-information-technology-companies-in-nigeria/agbeche-aaron
Indonesia Netizen Facts (April - June 2015)ICT Watch
This document summarizes internet and technology initiatives in Indonesia. It discusses programs by ICT Watch to promote safe and wise internet use through educational materials and workshops. It also outlines ICT Watch's role in advocating for improved internet governance and supporting civil society organizations. The document provides statistics on internet usage in Indonesia and trends around online activities, devices used, and age demographics of internet users. It summarizes issues around online freedom of expression and content filtering as well as multi-stakeholder initiatives on internet governance, child protection online, and handling of negative online content.
Improving the Information System of Tourist Destinations in the Context of th...ijtsrd
This article discusses how Uzbekistan may improve its smart tourism and tourism information infrastructure of tourist destinations. Because of the technological services supplied to passengers before, during, and after their journey, smart tourism is a terrific way to save not only money, but also nerves and valuable time. The authors remarks, conclusions, and recommendations are included in the paper, as well as an analysis of the pertinent data. Nosirova U. M. "Improving the Information System of Tourist Destinations in the Context of the Digitalization of the Economy" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-5 | Issue-6 , October 2021, URL: https://www.ijtsrd.com/papers/ijtsrd47690.pdf Paper URL : https://www.ijtsrd.com/economics/other/47690/improving-the-information-system-of-tourist-destinations-in-the-context-of-the-digitalization-of-the-economy/nosirova-u-m
Application Of Android Enabled Mobile Device For Personal Information Systemsijasa
The document describes a proposed personal mobile information system (PMIS) developed on the Android platform. The PMIS would provide location-based services like GPS-enabled proximity alerts and a rating system for points of interest. It would also plot routes from a user's location to points of interest, alerting users of any crime incidents along the way based on police data. The system has two types of users: general users who can rate and find points of interest, and police users who can log crime events and update safety ratings to inform alerts for general users. The goal is to create a personalized mobile information system that enhances user safety during navigation.
A SMART WIZARD SYSTEM SUITABLE FOR USE WITH INTERNET MOBILE DEVICES TO ADJUST...ijsptm
The privacy of personal information is an important issue affecting the confidence of internet users. The
widespread adoption of online social networks and access to these platforms using mobile devices has
encouraged developers to make the systems and interfaces acceptable to users who seek privacy. The aim
of this study is to test a wizard that allows users to control the sharing of personal information with others.
We also assess the concerns of users in terms of such sharing such as whether to hide personal data in
current online social network accounts. Survey results showed the wizard worked very well and that
females concealed more personal information than did males. In addition, most users who were concerned
about misuse of personal information hid those items. The results can be used to upgrade current privacy
systems or to design new systems that work on mobile internet devices. The system can also be used to save
time when setting personal privacy settings and makes users more aware of items that will be shared with
others.
The document discusses cyber security challenges for smart communities. It notes that cyber threats are becoming more sophisticated and pose risks to critical infrastructure. Establishing effective cooperation between public and private sectors is important for developing strategies to address cyber challenges in smart communities. As communities become more connected through information and communication technologies, demand for robust cyber security will continue to grow.
State regulation of the IoT in the Russian Federation: Fundamentals and chall...IJECEIAES
The purpose of this section is to study the problems with implementing technical and legal regulations for the development of public administration functions in the Russian Federation when using the internet of things (IoT). The introduction is based on an analysis of regulatory legal acts and presents the main strategic directions for the development of public administration functions in the Russian federation when using IoT. State reports, scientific literature, a system of technical and legal regulation are analyzed, and the main problems of implementing the IoT that impede the achievement of effective public administration are studied. The Russian practice of using IoT in various economic areas is investigated. Based on an analysis of the mechanisms for ensuring data safety of information technology users in the Russian federation, problems were investigated, such as the collecting data through IoT, including publicly available personal data in order to profile human activities, and creating of a digital twin of a person. The social constraints for introducing distributed registry technologies are users' distrust in the field of data privacy protection and mathematical algorithms that are used to establish trust in a digital environment instead of trusted centralized intermediaries; these problems were also analyzed. The Russian approach was analyzed in comparison to European experience in this field. To ensure information security and the possibility of its distribution, the IoT is revealed.
This document provides an overview of mobile internet and applications. It discusses how mobile media usage has grown significantly, with over 35% of mobile users now browsing, downloading apps or using other internet-based services on their phones. Mobile internet and app usage is driven by improving device technology, the expansion of 3G networks and data plans. Popular mobile activities include messaging, photography, games and mobile browsing for information. Traditional media brands have also seen strong mobile growth. The document reviews mobile internet and app usage data and trends to give insights into this growing space.
This research paper analyzes exposed cyber assets in critical sectors across US cities using data from the search engine Shodan. Some key findings include:
- Emergency services in Houston and Lafayette had many exposed assets.
- New York City, as a financial hub, had the most exposed assets in the financial sector.
- Exposed utilities assets were mostly in small towns, not large cities.
- Philadelphia alone had over 65,000 exposed devices in the education sector.
The paper also examines exposed industrial control systems and human machine interfaces that could impact critical infrastructure if accessed maliciously. It concludes by calling for improved awareness and security of these exposed city cyber assets.
Securing mobile devices_in_the_business_environmentK Singh
This document discusses securing mobile devices in the business environment. It notes that mobile devices are increasingly being used for both personal and work purposes. While this brings advantages like increased productivity, it also poses security risks if not properly addressed. The document outlines various security threats to mobile devices like loss/theft, malware, spam, phishing, and issues with Bluetooth/Wi-Fi. It recommends developing a mobile security strategy that addresses data access, platform support, management, and best practices. The strategy should apply controls across identity/access, data protection, applications, and other areas based on IBM's security framework.
IRJET- Awareness and Knowledge about Android Smartphones Security among Ghana...IRJET Journal
The document summarizes a study that assessed awareness and knowledge of Android smartphone security among Ghanaians. The study surveyed 1240 adult smartphone users in Ghana. It found that most respondents had previously owned an Android smartphone, which they either still had or gave away. While photos, contacts, and documents were seen as private, many accessed email, finances, health and academic info on their phones. The study also found gender and age predicted knowledge of encryption and data recovery. Overall, respondents' vulnerability to attacks after disposing of phones was deemed high. The study recommends awareness campaigns to help users better protect sensitive data and reduce risks of cybercrime if phones are lost, stolen or damaged.
Privacy prescriptions for technology interventions on covid 19 in india(2)sabrangsabrang
This document discusses technology interventions being developed for contact tracing during the COVID-19 pandemic in India and their implications for privacy. It analyzes location tracking systems and contact tracing apps from other countries. It also assesses India's Aarogya Setu app, finding broad data collection and a lack of transparency. The document makes recommendations to ensure contact tracing respects privacy rights under India's legal framework.
Indonesia Netizen Facts (July - September 2016)ICT Watch
Indonesia Netizen Facts (July - September 2016). For Bahasa Indonesia, read here http://www.slideshare.net/internetsehat/netizen-indonesia-kini-juli-september2016
- The document discusses trends in mobile internet usage based on a survey of over 17,000 internet users across 13 countries
- A key finding is that 69% of internet users accessed the internet through a mobile device in the past year, with smartphones being the most popular
- Usage is growing across demographics but emerging markets and younger users have higher adoption rates
- Activities like email, social media, banking and content consumption are increasingly common on mobile
- Drivers of usage include improved networks and growing availability of useful apps
Mobile computing application risks in ZimbabweIOSR Journals
Abstract: Mobile technology has now become the order of the day. Everyone seems to own one or more mobile
devices. Everyone is so excited because this has made life easier for a lot of people. Though mobile technology
has brought many benefits to people’s lives, its application has some risks that come with it. This paper
therefore looked at mobile computing application areas in Zimbabwe, the risks brought about by mobile
computing application in Zimbabwe and how mobile computing application risks are mitigated in a developing
country like Zimbabwe where the technology level seems to be behind. The study findings showed that mobile
application areas in Zimbabwe include paying bills, social networking and playing games. Most Zimbabweans
revealed that they do not know how to mitigate mobile computing application risks. The study finally
recommended that mobile computing application risks should be taught in schools as well as in televisions and
radios so that everyone is aware of them.
Keywords: application risks, mobile computing, mobile device,mobile technology
This document provides a brief survey of mobile forensics analysis on social networking applications. It discusses two popular social networking applications, Tagged and Hi5, and describes some of their key features that could be relevant to forensic investigations. Specifically, it outlines features like registration details, friend networks, media sharing, instant messaging, status updates, and other profile building features. The document suggests electronic evidence retrieved from activities on these social networking platforms could help investigate criminal cases by incriminating or proving the innocence of suspects.
ANDROID & FIREBASE BASED ANTI THEFT MOBILE APPLICATIONIRJET Journal
This document summarizes an Android & Firebase based anti-theft mobile application. The application secretly runs in the background after installation. If the phone is lost or stolen, it sends the thief's location, photos taken by the front camera, and other identifying information to registered contacts. This is done without the thief's knowledge through features like fake shutdown and fake airplane mode. The application aims to facilitate easy retrieval of stolen phones and protect private data. It was created using Java technology and Firebase for backend connectivity and alert systems. The proposed system provides an effective solution for mobile security and theft prevention.
A Dynamic Intelligent Policies Analysis Mechanism for Personal Data Processin...Konstantinos Demertzis
The document describes an Intelligent Policies Analysis Mechanism (IPAM) that is part of the ADVOCATE framework. IPAM uses machine learning methods like Fuzzy Cognitive Maps and Extreme Learning Machines to identify potentially conflicting rules or consents from a user that could lead to personal data collection and profiling without consent. The framework aims to help users maintain control over their personal data as required by GDPR regulations. IPAM simulates how smart devices collect personal data and identifies rules that may enable profiling, training on example data to learn how to detect such instances.
This document summarizes a research paper on smartphone security and protection practices. The paper identifies several mobile security threats, including phishing apps, supply chain compromise, and crypto miners embedded in games. It also outlines key best practices like using strong authentication, regularly updating apps and OS, enabling encryption and remote data wiping. A survey was conducted to assess usage of these practices among 167 mobile users. The findings showed fingerprint scanning was the most common authentication method, while automatic backups and updates were also widely used. The paper concludes that balancing security and usability will remain an ongoing challenge as the mobile landscape continues to evolve.
PERSONAL INFORMATION PRIVACY SETTINGS OF ONLINE SOCIAL NETWORKS AND THEIR S...ijsptm
Protecting personal information privacy has become a controversial issue among online social network
providers and users. Most social network providers have developed several techniques to decrease threats
and risks to the users’ privacy. These risks include the misuse of personal information which may lead to
illegal acts such as identity theft. This study aims to measure the awareness of users on protecting their
personal information privacy, as well as the suitability of the privacy systems which they use to modify
privacy settings. Survey results show high percentage of the use of smart phones for web services but the
current privacy settings for online social networks need to be improved to support different type of mobile
phones screens. Because most users use their mobilephones for Internet services, privacy settings that are
compatible with mobile phones need to be developed. The method of selecting privacy settings should also
be simplified to provide users with a clear picture of the data that will be shared with others. Results of this
study can be used to develop a new privacy system which will help users control their personal information
easily from different devices, including mobile Internet devices and computers.
How to protect privacy sensitive data that is collected to control the corona...Ulf Mattsson
In Singapore, the Government launched an app using short-distance Bluetooth signals to connect one phone using the app with another user who is close by. It stores detailed records on a user's phone for 21 days decrypt the data if there is a public health risk related to an individual's movements.
China used a similar method to track a person's health status and to control movement in cities with high numbers of coronavirus cases. Individuals had to use the app and share their status to be able to access public transportation.
The keys to addressing privacy concerns about high-tech surveillance by the state is de-identifying the data and giving individuals control over their own data. Personal details that may reveal your identity such as a user's name should not be collected or should be protected with access to be granted for only specific health purposes, and data should be deleted after its specific use is no longer needed.
We will discuss how to protect privacy sensitive data that is collected to control the coronavirus outbreak.
App Developers Urged to Take Greater Care in Accessing DataJohn Davis
The Information Commissioner's Office (ICO) has claimed that mobile app developers need to be a lot clearer about what data they happen to be accessing, after a YouGov survey highlighting concerns around how such programs are being used to access people's information. - See more at: http://www.storetec.net/news-blog/app-developers-urged-to-take-greater-care-in-accessing-data
Smartphone Forensic Investigation Process ModelCSCJournals
This document presents a proposed model for conducting forensic investigations of smartphones called the Smartphone Forensic Investigation Process Model (SPFIPM). The SPFIPM was developed as a 14-stage process to guide effective smartphone investigations. It aims to improve on previous forensic methodologies by addressing shortcomings and including additional necessary steps for dealing with advancing technologies. The model explores the different processes involved in smartphone forensic investigations.
In light of the staggering evolution of mobile technologies, the concept of mobility is gaining more attention worldwide. Recent statistics demonstrate mobile channels’ increasing significance in outreach and service delivery. However, governments and businesses face a challenge in reaping the benefits of mobile platforms: how to confirm the authenticity of mobile users and transactions. Mobile devices, by design, are well suited for enabling authentication and digital signing services, similar to traditional PC and laptop environments. But although various implementations support different authentication schemes, they still do not instill sufficient levels of trust and confidence. In this article we explore the practice of mobile identity management. We provide an overview of how EU countries tackle mobile identity. The main part of the article sheds light on the solution framework adopted in the United Arab Emirates (UAE) to address, recently launched mobile government transformation initiatives. Taking into account the newness of the topic, the content of this article should fuel the current limited knowledge base and trigger debate around the presented approaches.
Examining a display-peeping prevention method that uses real-time UI part tra...journalBEEI
In recent years, the use of various information terminals such as smartphones and personal computers have become widespread, and situations where information terminals are used have become diverse. With increased opportunities to use information terminals outdoors and during travel, some users have been using peep-prevention filters, or software with an equivalent function, on their displays, in order to protect their privacy. However, such filters have problems with regards their effectiveness, ease of use, and the user being able recognize when they are vulnerable to peeping. Decrease in display visibility, unprotected angles, and the fact that it is difficult for users to notice when others are watching their screen, are some examples of such problems. Also, recently, many information terminals recently distributed have built-in cameras. In this paper, in order to solve the aforementioned problems, we propose to detect motion, video analyze , and transparentize part of the user interface (UI) in real time by using a laptop’s built-in camera. This method is enabled with low-load and can be applied to various terminals. Further, in order to verify the effectiveness of the method, we implemented a prototype, and carried out an evaluation experiment on experimental subjects. Results from the experiment confirmed that real-time UI transparentization is a very effective method for protecting privacy of information terminals.
MOBILE DEVICE USERS’ SUSCEPTIBILITY TO PHISHING ATTACKSijcsit
The mobile device is one of the fasted growing technologies that is widely used in a diversifying sector. Mobile devices are used for everyday life, such as personal information exchange – chatting, email, shopping, and mobile banking, contributing to information security threats. Users' behavior can influence information security threats. More research is needed to understand users' threat avoidance behavior and motivation. Using Technology threat avoidance theory (TTAT), this study assessed factors that influenced mobile device users' threat avoidance motivations and behaviors as it relates to phishing attacks. From the data collected from 137 mobile device users using a questionnaire, the findings indicate that (1) mobile device users' perceived susceptibility and severity of phishing attacks have a significant correlation with a users' perception of the threat; (2) mobile device users' motivation to avoid a threat is correlated to a users' behavior in avoiding threat; and (3) a mobile device user's susceptibility to phishing attacks can be reduced by their perception of the threat. These findings reveal that a user's perception of threat increases if they perceive that the consequence of such threat to their mobile devices will be severe, thereby increasing a user's motivation and behavior to avoid phishing attack threats. This study is beneficial to mobile device users in personal and organizational settings.
The mobile device is one of the fasted growing technologies that is widely used in a diversifying sector.
Mobile devices are used for everyday life, such as personal information exchange – chatting, email,
shopping, and mobile banking, contributing to information security threats. Users' behavior can influence
information security threats. More research is needed to understand users' threat avoidance behavior and
motivation. Using Technology threat avoidance theory (TTAT), this study assessed factors that influenced
mobile device users' threat avoidance motivations and behaviors as it relates to phishing attacks.
IRJET- App Misbehaviour Check: Development of Virus Modeling, Propagation...IRJET Journal
This document describes a proposed system for detecting and preventing app misbehavior on Android devices. It begins with an overview of existing approaches to identifying "zombie" apps that run in the background without user interaction. The proposed system would design multiple applications, including an antivirus-like app to monitor for misbehaviors like sending SMS messages, draining the battery, storing call logs in the cloud, and crashing the gallery. When misbehaviors are detected, the problematic apps would be quarantined with user acknowledgment. The system is intended to efficiently monitor app permissions and resource usage to identify zombie apps and prevent unwanted activities.
Mobile Technology - Tablets and Workplace Integration (Whitepaper)Fuji Xerox Australia
Smart phones keep getting smarter. Applications for tablet computers are emerging at dizzying speeds. And the cloud that links them all is limitless in scope. Mobile computing is no longer a technology trend, but rather, an integral component of our business and social lives.
As a result, businesses need to be aware of the benefits this might bring, how these technologies are being used, and who is using them. It is important to deliver solutions that make the process of using documentation on these platforms as streamlined as possible.
For more information on improving business process with better document management, visit www.fujixerox.com.au/mobileprint or call us at 13 14 12.
Al-Khouri, A.M. (2014) "Privacy in the Age of Big Data: Exploring the Role of Modern Identity Management Systems". World Journal of Social Science, Vol. 1, No. 1, pp. 37-47.
CONTRIBUTION TO SECURING BYOD SYSTEMS IN FINANCIAL AUTHORITIES AND PUBLIC ADM...ijmvsc
The growth of digital tools, such as mobile phones, computers, and tablets, and the advent of new
information and communication technologies have generated new phenomena in terms of communication
capacity and data processing. This phenomenon is called BYOD, which stands for Bring Your Own Device,
meaning employees use their own devices to access company resources within the company's IT network,
whether internally or externally. On the one hand, it has brought many benefits and opportunities, but on
the other hand, it carries many cybersecurity risks. Incidents of cybercrime, embezzlement, espionage, and
cyberattacks. These are recorded every day in ZELECAF countries in general and in Congo Brazzaville in
particular. In this article, a contribution and optimization to the security of BYOD systems in the financial
authorities of the countries of the African Continental Free Trade Area are presented. Congo Brazzaville
was chosen for the field study, and a few Central African countries were chosen for an online study. The
results obtained are encouraging to the extent that the survey carried out revealed the use of digital tools
in financial management by workers. Also, the lack of solid security in the existing computer networks
within these structures was noted. The principles of raising public awareness of cybersecurity culture,
protecting information, authenticating passwords by the IT manager or network administrator, hiding the
wireless network, and enabling the firewall are part of the attempted solutions proposed. Compared to
studies in the literature, the methodology is adapted, so that in the literature [14], [15], the majority of
surveys were carried out in the field, with a very limited number.
Similar to Emerging Applications on Smart Phones: The Role of Privacy Concerns and its Antecedents on Smart Phones Usage (20)
Home security is of paramount importance in today's world, where we rely more on technology, home
security is crucial. Using technology to make homes safer and easier to control from anywhere is
important. Home security is important for the occupant’s safety. In this paper, we came up with a low cost,
AI based model home security system. The system has a user-friendly interface, allowing users to start
model training and face detection with simple keyboard commands. Our goal is to introduce an innovative
home security system using facial recognition technology. Unlike traditional systems, this system trains
and saves images of friends and family members. The system scans this folder to recognize familiar faces
and provides real-time monitoring. If an unfamiliar face is detected, it promptly sends an email alert,
ensuring a proactive response to potential security threats.
In the era of data-driven warfare, the integration of big data and machine learning (ML) techniques has
become paramount for enhancing defence capabilities. This research report delves into the applications of
big data and ML in the defence sector, exploring their potential to revolutionize intelligence gathering,
strategic decision-making, and operational efficiency. By leveraging vast amounts of data and advanced
algorithms, these technologies offer unprecedented opportunities for threat detection, predictive analysis,
and optimized resource allocation. However, their adoption also raises critical concerns regarding data
privacy, ethical implications, and the potential for misuse. This report aims to provide a comprehensive
understanding of the current state of big data and ML in defence, while examining the challenges and
ethical considerations that must be addressed to ensure responsible and effective implementation.
Cloud Computing, being one of the most recent innovative developments of the IT world, has been
instrumental not just to the success of SMEs but, through their productivity and innovative contribution to
the economy, has even made a remarkable contribution to the economic growth of the United States. To
this end, the study focuses on how cloud computing technology has impacted economic growth through
SMEs in the United States. Relevant literature connected to the variables of interest in this study was
reviewed, and secondary data was generated and utilized in the analysis section of this paper. The findings
of this paper revealed that there have been meaningful contributions that the usage of virtualization has
made in the commercial dealings of small firms in the United States, and this has also been reflected in the
economic growth of the country. This paper further revealed that as important as cloud-based software is,
some SMEs are still skeptical about how it can help improve their business and increase their bottom line
and hence have failed to adopt it. Apart from the SMEs, some notable large firms in different industries,
including information and educational services, have adopted cloud computing technology and hence
contributed to the economic growth of the United States. Lastly, findings from our inferential statistics
revealed that no discernible change has occurred in innovation between small and big businesses in the
adoption of cloud computing. Both categories of businesses adopt cloud computing in the same way, and
their contribution to the American economy has no significant difference in the usage of virtualization.
Energy-constrained Wireless Sensor Networks (WSNs) have garnered significant research interest in
recent years. Multiple-Input Multiple-Output (MIMO), or Cooperative MIMO, represents a specialized
application of MIMO technology within WSNs. This approach operates effectively, especially in
challenging and resource-constrained environments. By facilitating collaboration among sensor nodes,
Cooperative MIMO enhances reliability, coverage, and energy efficiency in WSN deployments.
Consequently, MIMO finds application in diverse WSN scenarios, spanning environmental monitoring,
industrial automation, and healthcare applications.
The AIRCC's International Journal of Computer Science and Information Technology (IJCSIT) is devoted to fields of Computer Science and Information Systems. The IJCSIT is a open access peer-reviewed scientific journal published in electronic form as well as print form. The mission of this journal is to publish original contributions in its field in order to propagate knowledge amongst its readers and to be a reference publication. IJCSIT publishes original research papers and review papers, as well as auxiliary material such as: research papers, case studies, technical reports etc.
With growing, Car parking increases with the number of car users. With the increased use of smartphones
and their applications, users prefer mobile phone-based solutions. This paper proposes the Smart Parking
Management System (SPMS) that depends on Arduino parts, Android applications, and based on IoT. This
gave the client the ability to check available parking spaces and reserve a parking spot. IR sensors are
utilized to know if a car park space is allowed. Its area data are transmitted using the WI-FI module to the
server and are recovered by the mobile application which offers many options attractively and with no cost
to users and lets the user check reservation details. With IoT technology, the smart parking system can be
connected wirelessly to easily track available locations.
Welcome to AIRCC's International Journal of Computer Science and Information Technology (IJCSIT), your gateway to the latest advancements in the dynamic fields of Computer Science and Information Systems.
Computer-Assisted Language Learning (CALL) are computer-based tutoring systems that deal with
linguistic skills. Adding intelligence in such systems is mainly based on using Natural Language
Processing (NLP) tools to diagnose student errors, especially in language grammar. However, most such
systems do not consider the modeling of student competence in linguistic skills, especially for the Arabic
language. In this paper, we will deal with basic grammar concepts of the Arabic language taught for the
fourth grade of the elementary school in Egypt. This is through Arabic Grammar Trainer (AGTrainer)
which is an Intelligent CALL. The implemented system (AGTrainer) trains the students through different
questions that deal with the different concepts and have different difficulty levels. Constraint-based student
modeling (CBSM) technique is used as a short-term student model. CBSM is used to define in small grain
level the different grammar skills through the defined skill structures. The main contribution of this paper
is the hierarchal representation of the system's basic grammar skills as domain knowledge. That
representation is used as a mechanism for efficiently checking constraints to model the student knowledge
and diagnose the student errors and identify their cause. In addition, satisfying constraints and the number
of trails the student takes for answering each question and fuzzy logic decision system are used to
determine the student learning level for each lesson as a long-term model. The results of the evaluation
showed the system's effectiveness in learning in addition to the satisfaction of students and teachers with its
features and abilities.
In the realm of computer security, the importance of efficient and reliable user authentication methods has
become increasingly critical. This paper examines the potential of mouse movement dynamics as a
consistent metric for continuous authentication. By analysing user mouse movement patterns in two
contrasting gaming scenarios, "Team Fortress" and "Poly Bridge," we investigate the distinctive
behavioral patterns inherent in high-intensity and low-intensity UI interactions. The study extends beyond
conventional methodologies by employing a range of machine learning models. These models are carefully
selected to assess their effectiveness in capturing and interpreting the subtleties of user behavior as
reflected in their mouse movements. This multifaceted approach allows for a more nuanced and
comprehensive understanding of user interaction patterns. Our findings reveal that mouse movement
dynamics can serve as a reliable indicator for continuous user authentication. The diverse machine
learning models employed in this study demonstrate competent performance in user verification, marking
an improvement over previous methods used in this field. This research contributes to the ongoing efforts to
enhance computer security and highlights the potential of leveraging user behavior, specifically mouse
dynamics, in developing robust authentication systems.
The AIRCC's International Journal of Computer Science and Information Technology (IJCSIT) is devoted to fields of Computer Science and Information Systems. The IJCSIT is a open access peer-reviewed scientific journal published in electronic form as well as print form. The mission of this journal is to publish original contributions in its field in order to propagate knowledge amongst its readers and to be a reference publication.
Image segmentation and classification tasks in computer vision have proven to be highly effective using neural networks, specifically Convolutional Neural Networks (CNNs). These tasks have numerous
practical applications, such as in medical imaging, autonomous driving, and surveillance. CNNs are capable
of learning complex features directly from images and achieving outstanding performance across several
datasets. In this work, we have utilized three different datasets to investigate the efficacy of various preprocessing and classification techniques in accurssedately segmenting and classifying different structures
within the MRI and natural images. We have utilized both sample gradient and Canny Edge Detection
methods for pre-processing, and K-means clustering have been applied to segment the images. Image
augmentation improves the size and diversity of datasets for training the models for image classification
The AIRCC's International Journal of Computer Science and Information Technology (IJCSIT) is devoted to fields of Computer Science and Information Systems. The IJCSIT is a open access peer-reviewed scientific journal published in electronic form as well as print form. The mission of this journal is to publish original contributions in its field in order to propagate knowledge amongst its readers and to be a reference publication.
This research aims to further understanding in the field of continuous authentication using behavioural
biometrics. We are contributing a novel dataset that encompasses the gesture data of 15 users playing
Minecraft with a Samsung Tablet, each for a duration of 15 minutes. Utilizing this dataset, we employed
machine learning (ML) binary classifiers, being Random Forest (RF), K-Nearest Neighbors (KNN), and
Support Vector Classifier (SVC), to determine the authenticity of specific user actions. Our most robust
model was SVC, which achieved an average accuracy of approximately 90%, demonstrating that touch
dynamics can effectively distinguish users. However, further studies are needed to make it viable option
for authentication systems. You can access our dataset at the following
link:https://github.com/AuthenTech2023/authentech-repo
This paper discusses the capabilities and limitations of GPT-3 (0), a state-of-the-art language model, in the
context of text understanding. We begin by describing the architecture and training process of GPT-3, and
provide an overview of its impressive performance across a wide range of natural language processing
tasks, such as language translation, question-answering, and text completion. Throughout this research
project, a summarizing tool was also created to help us retrieve content from any types of document,
specifically IELTS (0) Reading Test data in this project. We also aimed to improve the accuracy of the
summarizing, as well as question-answering capabilities of GPT-3 (0) via long text
In the realm of computer security, the importance of efficient and reliable user authentication methods has
become increasingly critical. This paper examines the potential of mouse movement dynamics as a
consistent metric for continuous authentication. By analysing user mouse movement patterns in two
contrasting gaming scenarios, "Team Fortress" and "Poly Bridge," we investigate the distinctive
behavioral patterns inherent in high-intensity and low-intensity UI interactions. The study extends beyond
conventional methodologies by employing a range of machine learning models. These models are carefully
selected to assess their effectiveness in capturing and interpreting the subtleties of user behavior as
reflected in their mouse movements. This multifaceted approach allows for a more nuanced and
comprehensive understanding of user interaction patterns. Our findings reveal that mouse movement
dynamics can serve as a reliable indicator for continuous user authentication. The diverse machine
learning models employed in this study demonstrate competent performance in user verification, marking
an improvement over previous methods used in this field. This research contributes to the ongoing efforts to
enhance computer security and highlights the potential of leveraging user behavior, specifically mouse
dynamics, in developing robust authentication systems.
Image segmentation and classification tasks in computer vision have proven to be highly effective using neural networks, specifically Convolutional Neural Networks (CNNs). These tasks have numerous
practical applications, such as in medical imaging, autonomous driving, and surveillance. CNNs are capable
of learning complex features directly from images and achieving outstanding performance across several
datasets. In this work, we have utilized three different datasets to investigate the efficacy of various preprocessing and classification techniques in accurssedately segmenting and classifying different structures
within the MRI and natural images. We have utilized both sample gradient and Canny Edge Detection
methods for pre-processing, and K-means clustering have been applied to segment the images. Image
augmentation improves the size and diversity of datasets for training the models for image classification.
This work highlights transfer learning’s effectiveness in image classification using CNNs and VGG 16 that
provides insights into the selection of pre-trained models and hyper parameters for optimal performance.
We have proposed a comprehensive approach for image segmentation and classification, incorporating preprocessing techniques, the K-means algorithm for segmentation, and employing deep learning models such
as CNN and VGG 16 for classification.
- The document presents 6 different models for defining foot size in Tunisia: 2 statistical models, 2 neural network models using unsupervised learning, and 2 models combining neural networks and fuzzy logic.
- The statistical models (SM and SHM) are based on applying statistical equations to morphological foot data.
- The neural network models (MSK and MHSK) use self-organizing Kohonen maps to cluster foot data and model full and half sizes.
- The fuzzy neural network models (MSFK and MHSFK) incorporate fuzzy logic into the neural network learning process to better account for uncertainty in foot sizes.
The security of Electric Vehicle (EV) charging has gained momentum after the increase in the EV adoption
in the past few years. Mobile applications have been integrated into EV charging systems that mainly use a
cloud-based platform to host their services and data. Like many complex systems, cloud systems are
susceptible to cyberattacks if proper measures are not taken by the organization to secure them. In this
paper, we explore the security of key components in the EV charging infrastructure, including the mobile
application and its cloud service. We conducted an experiment that initiated a Man in the Middle attack
between an EV app and its cloud services. Our results showed that it is possible to launch attacks against
the connected infrastructure by taking advantage of vulnerabilities that may have substantial economic and
operational ramifications on the EV charging ecosystem. We conclude by providing mitigation suggestions
and future research directions.
The AIRCC's International Journal of Computer Science and Information Technology (IJCSIT) is devoted to fields of Computer Science and Information Systems. The IJCSIT is a open access peer-reviewed scientific journal published in electronic form as well as print form. The mission of this journal is to publish original contributions in its field in order to propagate knowledge amongst its readers and to be a reference publication.
The AIRCC's International Journal of Computer Science and Information Technology (IJCSIT) is devoted to fields of Computer Science and Information Systems. The IJCSIT is a open access peer-reviewed scientific journal published in electronic form as well as print form. The mission of this journal is to publish original contributions in its field in order to propagate knowledge amongst its readers and to be a reference publication.
Comparative analysis between traditional aquaponics and reconstructed aquapon...bijceesjournal
The aquaponic system of planting is a method that does not require soil usage. It is a method that only needs water, fish, lava rocks (a substitute for soil), and plants. Aquaponic systems are sustainable and environmentally friendly. Its use not only helps to plant in small spaces but also helps reduce artificial chemical use and minimizes excess water use, as aquaponics consumes 90% less water than soil-based gardening. The study applied a descriptive and experimental design to assess and compare conventional and reconstructed aquaponic methods for reproducing tomatoes. The researchers created an observation checklist to determine the significant factors of the study. The study aims to determine the significant difference between traditional aquaponics and reconstructed aquaponics systems propagating tomatoes in terms of height, weight, girth, and number of fruits. The reconstructed aquaponics system’s higher growth yield results in a much more nourished crop than the traditional aquaponics system. It is superior in its number of fruits, height, weight, and girth measurement. Moreover, the reconstructed aquaponics system is proven to eliminate all the hindrances present in the traditional aquaponics system, which are overcrowding of fish, algae growth, pest problems, contaminated water, and dead fish.
Using recycled concrete aggregates (RCA) for pavements is crucial to achieving sustainability. Implementing RCA for new pavement can minimize carbon footprint, conserve natural resources, reduce harmful emissions, and lower life cycle costs. Compared to natural aggregate (NA), RCA pavement has fewer comprehensive studies and sustainability assessments.
TIME DIVISION MULTIPLEXING TECHNIQUE FOR COMMUNICATION SYSTEMHODECEDSIET
Time Division Multiplexing (TDM) is a method of transmitting multiple signals over a single communication channel by dividing the signal into many segments, each having a very short duration of time. These time slots are then allocated to different data streams, allowing multiple signals to share the same transmission medium efficiently. TDM is widely used in telecommunications and data communication systems.
### How TDM Works
1. **Time Slots Allocation**: The core principle of TDM is to assign distinct time slots to each signal. During each time slot, the respective signal is transmitted, and then the process repeats cyclically. For example, if there are four signals to be transmitted, the TDM cycle will divide time into four slots, each assigned to one signal.
2. **Synchronization**: Synchronization is crucial in TDM systems to ensure that the signals are correctly aligned with their respective time slots. Both the transmitter and receiver must be synchronized to avoid any overlap or loss of data. This synchronization is typically maintained by a clock signal that ensures time slots are accurately aligned.
3. **Frame Structure**: TDM data is organized into frames, where each frame consists of a set of time slots. Each frame is repeated at regular intervals, ensuring continuous transmission of data streams. The frame structure helps in managing the data streams and maintaining the synchronization between the transmitter and receiver.
4. **Multiplexer and Demultiplexer**: At the transmitting end, a multiplexer combines multiple input signals into a single composite signal by assigning each signal to a specific time slot. At the receiving end, a demultiplexer separates the composite signal back into individual signals based on their respective time slots.
### Types of TDM
1. **Synchronous TDM**: In synchronous TDM, time slots are pre-assigned to each signal, regardless of whether the signal has data to transmit or not. This can lead to inefficiencies if some time slots remain empty due to the absence of data.
2. **Asynchronous TDM (or Statistical TDM)**: Asynchronous TDM addresses the inefficiencies of synchronous TDM by allocating time slots dynamically based on the presence of data. Time slots are assigned only when there is data to transmit, which optimizes the use of the communication channel.
### Applications of TDM
- **Telecommunications**: TDM is extensively used in telecommunication systems, such as in T1 and E1 lines, where multiple telephone calls are transmitted over a single line by assigning each call to a specific time slot.
- **Digital Audio and Video Broadcasting**: TDM is used in broadcasting systems to transmit multiple audio or video streams over a single channel, ensuring efficient use of bandwidth.
- **Computer Networks**: TDM is used in network protocols and systems to manage the transmission of data from multiple sources over a single network medium.
### Advantages of TDM
- **Efficient Use of Bandwidth**: TDM all
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECTjpsjournal1
The rivalry between prominent international actors for dominance over Central Asia's hydrocarbon
reserves and the ancient silk trade route, along with China's diplomatic endeavours in the area, has been
referred to as the "New Great Game." This research centres on the power struggle, considering
geopolitical, geostrategic, and geoeconomic variables. Topics including trade, political hegemony, oil
politics, and conventional and nontraditional security are all explored and explained by the researcher.
Using Mackinder's Heartland, Spykman Rimland, and Hegemonic Stability theories, examines China's role
in Central Asia. This study adheres to the empirical epistemological method and has taken care of
objectivity. This study analyze primary and secondary research documents critically to elaborate role of
china’s geo economic outreach in central Asian countries and its future prospect. China is thriving in trade,
pipeline politics, and winning states, according to this study, thanks to important instruments like the
Shanghai Cooperation Organisation and the Belt and Road Economic Initiative. According to this study,
China is seeing significant success in commerce, pipeline politics, and gaining influence on other
governments. This success may be attributed to the effective utilisation of key tools such as the Shanghai
Cooperation Organisation and the Belt and Road Economic Initiative.
A review on techniques and modelling methodologies used for checking electrom...nooriasukmaningtyas
The proper function of the integrated circuit (IC) in an inhibiting electromagnetic environment has always been a serious concern throughout the decades of revolution in the world of electronics, from disjunct devices to today’s integrated circuit technology, where billions of transistors are combined on a single chip. The automotive industry and smart vehicles in particular, are confronting design issues such as being prone to electromagnetic interference (EMI). Electronic control devices calculate incorrect outputs because of EMI and sensors give misleading values which can prove fatal in case of automotives. In this paper, the authors have non exhaustively tried to review research work concerned with the investigation of EMI in ICs and prediction of this EMI using various modelling methodologies and measurement setups.
Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...University of Maribor
Slides from talk presenting:
Aleš Zamuda: Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapter and Networking.
Presentation at IcETRAN 2024 session:
"Inter-Society Networking Panel GRSS/MTT-S/CIS
Panel Session: Promoting Connection and Cooperation"
IEEE Slovenia GRSS
IEEE Serbia and Montenegro MTT-S
IEEE Slovenia CIS
11TH INTERNATIONAL CONFERENCE ON ELECTRICAL, ELECTRONIC AND COMPUTING ENGINEERING
3-6 June 2024, Niš, Serbia
Literature Review Basics and Understanding Reference Management.pptxDr Ramhari Poudyal
Three-day training on academic research focuses on analytical tools at United Technical College, supported by the University Grant Commission, Nepal. 24-26 May 2024
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODELgerogepatton
As digital technology becomes more deeply embedded in power systems, protecting the communication
networks of Smart Grids (SG) has emerged as a critical concern. Distributed Network Protocol 3 (DNP3)
represents a multi-tiered application layer protocol extensively utilized in Supervisory Control and Data
Acquisition (SCADA)-based smart grids to facilitate real-time data gathering and control functionalities.
Robust Intrusion Detection Systems (IDS) are necessary for early threat detection and mitigation because
of the interconnection of these networks, which makes them vulnerable to a variety of cyberattacks. To
solve this issue, this paper develops a hybrid Deep Learning (DL) model specifically designed for intrusion
detection in smart grids. The proposed approach is a combination of the Convolutional Neural Network
(CNN) and the Long-Short-Term Memory algorithms (LSTM). We employed a recent intrusion detection
dataset (DNP3), which focuses on unauthorized commands and Denial of Service (DoS) cyberattacks, to
train and test our model. The results of our experiments show that our CNN-LSTM method is much better
at finding smart grid intrusions than other deep learning algorithms used for classification. In addition,
our proposed approach improves accuracy, precision, recall, and F1 score, achieving a high detection
accuracy rate of 99.50%.
Harnessing WebAssembly for Real-time Stateless Streaming PipelinesChristina Lin
Traditionally, dealing with real-time data pipelines has involved significant overhead, even for straightforward tasks like data transformation or masking. However, in this talk, we’ll venture into the dynamic realm of WebAssembly (WASM) and discover how it can revolutionize the creation of stateless streaming pipelines within a Kafka (Redpanda) broker. These pipelines are adept at managing low-latency, high-data-volume scenarios.
Harnessing WebAssembly for Real-time Stateless Streaming Pipelines
Emerging Applications on Smart Phones: The Role of Privacy Concerns and its Antecedents on Smart Phones Usage
1. International Journal of Computer Science & Information Technology (IJCSIT) Vol 13, No 2, April 2021
10.5121/ijcsit.2021.13204 43
EMERGING APPLICATIONS ON SMART PHONES:
THE ROLE OF PRIVACY CONCERNS AND ITS
ANTECEDENTS ON SMART PHONES USAGE
Waleed Al-Ghaith
Department of Information Systems, Shaqra University, (Imam Muhammad Ibn Saud
Islamic University), Riyadh, Saudi Arabia
ABSTRACT
Many applications on smart Phones can use various sensors embedded in the mobiles to provide users’
private information. This can result in a variety of privacy issues that may lessening level of mobile apps
usage. To understand this issue better the researcher identified the root causes of privacy concerns. The
study proposed a model identifies the root causes of privacy concerns and perceived benefits based on our
interpretation for information boundary theory. The proposed model also addresses the usage behavior and
behavioral intention toward using mobile apps by using the Theory of Planned Behavior. The result shows
that “Cultural values” alone explains 70% of “Perceived privacy concerns” followed by “Self-defense”
which explains around 23% of “Perceived privacy concerns”, and then “Context of the situation” with 5%.
Whereas, the findings show that “Perceived effectiveness of privacy policy” and “Perceived effectiveness of
industry self-regulation” both are factors which have the ability to reduce individuals “Perceived privacy
concerns” by 9% and 8% respectively.
KEYWORDS
Mobile Phone, information boundary theory, Communication Privacy Management theory, Perceived
privacy concerns, Theory of Planned Behavior
1. INTRODUCTION
In recent years, we have witnessed the rapid growth of mobile handheld devices such as cell phones
and personal digital assistants (PDAs). According to a March 2020 CISCO report “By 2023, the
number of IP-connected devices would be more than three times the global population and there
will be 3.6 networked devices per capita, compared to 2.4 devices per capita in 2018. By 2023,
there will be a total of 29.3 billion connected devices, up from 18.4 billion in 2018.” [1].
This growth refers to mobile ability to communicate virtually from anywhere with an
unprecedented level of flexibility and convenience. Thus, the use of mobile handheld devices has
become pervasive in our life. Accessing the Web and checking emails through a handheld device
has become a common daily routine. This leads to emergence the mobile application industry,
especially since the appearance of smartphones such as the iPhone.
A mobile application software (widely known as “apps”) is a computer program developed to run
on mobile devices such as smartphones and tablet computers. Some applications are commonly
preinstalled, such as a web browser, email client and mapping program. Others are usually available
through application distribution platforms and are typically operated by the owner of the mobile
operating system, for instance the App Store for apple products, Google Play for android operating
systems, Windows Phone Store, and BlackBerry App World.
2. International Journal of Computer Science & Information Technology (IJCSIT) Vol 13, No 2, April 2021
44
The latest generations of smartphone devices are equipped with significantly improved processing
capacity that approaches to that of a personal computer. These devices provide numerous sensors,
such as GPS, accelerometer, compass, microphone and cameras which enable capturing the users’
context and using the context to addressing the mobile users’ needs. These sensors also can be used
by mobile applications to gather a lot of “facts” that can be used in deducing context and knowledge
regarding users’ habits, their whereabouts, their movements, and events, and then offer them
personalized information and individually tailored services based on that information [2].
Companies in their pursuit of larger market share and higher profits usually tend to collect and
transfer unauthorized customer private data. According to Angwin and Valentino-DeVries [3]
android smart phones and iPhones secretly track user information and “Google and Apple are
gathering location information as part of their race to build massive databases capable of
pinpointing people's locations via their cellphones” [3]. Smart phone’s applications can easily
accessed user location information without having the user’s permission, and able to gather
information from users address books [4].
This fact has increased concerns about the privacy of users’ personal information, particularly,
among individuals who used to use smartphone devices to achieve their needs or to keep secrets or
for pleasure. Thus, on March 26, 2012, the Federal Trade Commission (FTC) issued its final report
setting forth best practices for companies to protect the privacy of American consumers and allow
them better control over their collected data. The FTC has taken legal action against corporations
that have breached users or customers’ privacy rights by failing to secure their consumers’ sensitive
data. For example on August 9, 2012 Google was forced to pay 22.5 million dollars to FTC in order
to settle its fees for not protecting the privacy rights of safari users.
A January 2015 FTC report addressed user privacy and security risks. This report intensively
identified the term of “Internet of Things” and identified privacy risks related to use any physical
objects which connected to the Internet or to each other through small, embedded sensors, wired,
or wireless technologies. The FTC report stated that “Some of these risks involve the direct
collection of sensitive personal information, such as precise geo location, financial account
numbers, or health information risks already presented by traditional Internet and mobile
commerce. Others arise from the collection of personal information, habits, locations, and physical
conditions over time, which may allow an entity that has not directly collected sensitive information
to infer it” [5].
Figure 1. More than half of the world population still not covered by privacy laws [6].
3. International Journal of Computer Science & Information Technology (IJCSIT) Vol 13, No 2, April 2021
45
Recognizing the notable effort made by FTC, however, USA still needs more effort in this field.
Globally, privacy law is not a settled issue [7], since that more than half of the world population
still not covered by privacy laws [6]. As shown in Figure 1, the white parts of the world represents
areas or countries that not covered by any general privacy laws, the red or grey colors refer to areas
that not covered by privacy law yet, but there is sort of legal debates happening, while the blue or
darkest colors are areas of the world currently covered by privacy laws.
However, different view has been presented by DLA Piper's Data Protection Laws of the World
Map which considers USA as a country with robust privacy legal requirements managed by the
FTC which has jurisdiction over most commercial entities and has authority to issue and enforce
privacy regulations (see Figure 2). In the Middle East and especially in Saudi Arabia there is no
particular privacy laws or official national authority to protect the privacy of Saudi consumers and
allow them greater control over the collection and use of their personal data [8].
Figure 2. Data Protection Laws of the World [8].
In Saudi Arabia, there is no precise statistic number to measure rate of mobile apps usage however
it can be predicted if we know that total number of active Twitter users in the Arab countries
became 5,797,500 users as of March 2014 and Saudi Arabia is the country with the largest number
of active Twitter users in the Arab world with 2.4 million users, accounting for over 40 percent of
all active Twitter users in the Arab countries. In March2014, the total number of tweets created by
Twitter users in the Arab world was 533,165,900, reflecting an average of 17,198,900 tweets per
day [9]. Thus, we can conclude that rate of mobile apps usage is high among Saudi people (see
Figure 3).
4. International Journal of Computer Science & Information Technology (IJCSIT) Vol 13, No 2, April 2021
46
Figure 3. Number of Active Twitter users in the Middle East [9].
As a consequence, with high rate of mobile apps’ usage and absence of privacy laws in Saudi
Arabia, concerns about individuals’ private information were increased. Since that the individual
who is likely to perceive threats about absences of privacy laws that will lead to a higher level of
privacy concerns. This may lessening level of mobile apps usage. To understand this issue better
we should identify the root causes of privacy concerns [10]. Thus, the current study proposes an
integrated theoretical framework brings together concepts from the Theory of Planned Behaviour
(TPB) and Communication Privacy Management (CPM) theory.
The paper proceeds as follows. In section 2, we review new technologies which raised privacy
concerns and present the study theoretical framework which includes Communication Privacy
Management (CPM) theory, as a main theory that guides the development of the study model, and
the Theory of Planned Behaviour (TPB). In section 2 also, the proposed hypotheses with the study
model are presented. Thereafter, section 3, presents the methods of analysis. The findings of the
study are then addressed in Section 4. Following that, in section 5, the Al-ghaith’s equation [11]
has been utilized to measure the contribution of every model’s construct in the model’s explanatory
power. Section 5 presents discussion. Section 6 highlights the implications of the current study to
theory and practice.
2. LITERATURE REVIEW AND THEORICAL FRAMWORK
2.1. New technologies raised privacy concerns
This section presents some of new technologies that coming into existence or development which
may raise privacy concerns. The new technologies presented in this section are radio frequency
identification (RFID) systems, GPS technology, Semantic Web Applications on smart Phones,
Location Management Layer and Environment Layer.
2.1.1. RFID
Radio-frequency identification (RFID) is a technology uses electromagnetic fields to transfer data
and provides a unique identifier for an object by attaching tag on that object. An RFID contains
three basic components: A scanning antenna, a reader (transceiver), and a chip (transponder). A
5. International Journal of Computer Science & Information Technology (IJCSIT) Vol 13, No 2, April 2021
47
chip or (transponder) is a RFID tag contains electronically information. A reader (transceiver) is a
decoder to read and interpret the data from RFID chips. A scanning antenna provides the RFID
chips with the energy to communicate [7]. The RFID is embedded in most android phones for
several years and known as a Near-Field Communication (NFC) and there is a trend to adopt this
technology as a convenient alternative for credit card, thus, mobiles with this technology could be
used broadly for payments soon [12].
2.1.2. GPS Technology
A Global Positioning System (GPS) is a receiver utilizes four or more satellites to determine its
dimensions from three known places to draw its current location. GPS, usually, is embedded in
mobiles and cars [13].
2.1.3. Semantic Web Applications on Smart Phones
The current Web pages are human understandable however a computer is not able to understand
the content and the meaning of the data. Semantic Web is developed to allow machines understand
the web contents. With semantic web environment, entities or objects which have not had any
previous interaction may now be able to automatically interact with each other [14]. Semantic Web
Applications on smart Phones can use various sensors embedded in the mobiles, for instance RFID,
GPS, compass, microphone, accelerometer, and cameras to provide many accurate private
information that can be used in deducing context and knowledge regarding users’ habits, their
whereabouts, their movements, and events [2].
2.2. Theoretical framework
In the following sections, the Theory of Planned Behaviour (TPB) and Communication Privacy
Management (CPM) theory are reviewed and discussed in relation to adoption of mobile apps in
order to extract the most suitable framework for the study.
2.2.1. The Theory of Planned Behaviour (TPB)
The TPB is an extension of the theory of reasoned action (TRA) [15], hence, TPB as a theory has
the ability to explain conditions in which persons have no complete control over their actions [16].
TPB is broadly used in a variety of research disciplines such as social psychology, Information
Systems and marketing research in order to predict and understand individuals’ behavioural
intention and then their behaviour [17].
TPB proposes that behaviour is a direct consequent of behavioural intention and perceived
behavioural control. Behavioural intention is a consequent of three factors: attitude (human feelings
towards performing a behaviour), subjective norms (pressure to perform a behaviour) and
perceived behavioural control (constraints on performing a behaviour). Each factor is in turn
generated by a number of beliefs and evaluations [18, 19] (see Fig.1).
In the context of mobile apps, attitude refers to general user feelings towards the use of mobile
apps based on the positive or negative outcome evaluation of performing that behaviour. Moreover,
subjective norms refer to user perceptions regarding the use of mobile apps by the opinions of
referent group (such as friends or colleagues). Perceived behavioural control reflects beliefs
regarding access to the resources needed to use mobile apps which, in other words, describes user
perceptions of the availability of knowledge, resources, and opportunities necessary for using
mobile apps. Thus, this study considers TPB model hypotheses to form part of the study hypotheses
as follows:
6. International Journal of Computer Science & Information Technology (IJCSIT) Vol 13, No 2, April 2021
48
Hypothesis 1. User behavioural intention will positively influence user behaviour.
Hypothesis 2. Perceived behavioural control will positively influence user behaviour.
Hypothesis 3. User Attitude will positively influence user behavioural intention.
Hypothesis 4. Subjective norms will positively influence user behavioural intention.
Hypothesis 5. Perceived behavioural control will positively influence user behavioural intention.
2.2.2. Privacy Concerns
Privacy or “the right to be left alone” [20] or “full protection in person and in property is a principle
as old as the common law; but it has been found necessary from time to time to define anew the
exact nature and extent of such protection” [20]. Individuals’ fears regarding invasion of their
privacy and consequences of this invasion such as humiliation, insult, exploitation and emotional
distress have paved the way for the emergence of privacy concerns as a term or Phenomenon.
Privacy concerns is a key social issue which influencing individuals, since that the lack of privacy
prevents people from introducing themselves, as they are really, in social interactions [21].
In Information systems discipline, privacy concerns has been studied from various perspectives.
Scholar in their pursuit to define ideal conditions where privacy exists; they found that identify the
root causes of privacy concerns is an essential step to understand privacy as a construct [10]. Thus,
majority of studies examine determinates of privacy concerns and have considered the privacy
concerns construct as an antecedent to many behavior related variables. For instance, intention to
disclose information [22], behavioral intention to use a website [21], location disclosure on a
location based social network applications [23]. Thus, in this study, the dependent variable of our
research model is the construct of adoption of mobile apps behavior. Moreover, this study utilizes
TPB to examine the behaviour and intention to perform behaviour, and CPM to understand
determinates of privacy concerns.
Individuals utilize mobiles or smartphones and their embedded applications due to the benefits that
they have, however, individuals might refrain from using such technology due to their concerns
about violating their privacy by misrepresenting or using their sensitive data [24]. Thus, privacy
concerns represents the individual’s need for privacy which should directly and negatively
influences individual’s attitude towards adoption of mobile apps, however, privacy concern is not
the only factor that influences attitude, perceived benefits which represents the need for use should
be considered also as a second factor however with a positive impact on individual’s attitude.
Therefore, the following hypotheses are proposed:
Hypothesis 6. Perceived benefits will positively influence user attitude.
Hypothesis 7. Privacy concerns will negatively influence user attitude.
2.2.3. Privacy Boundary Management
Individuals may create diverse threat perceptions about the same personal information which might
be accessed by others; thus, the information boundary theory, also known as the communication
boundary management theory [25] or the Communication Privacy Management (CPM) theory [26]
was developed to understand how persons make decisions regarding disclose their information
within interpersonal relationships and to evaluate individuals information access whether it is
considered risky or not.
The CPM theory proposes that each person creates a special informational space around him with
clearly defined boundaries, and these boundaries influence person decision to determine what
information can be shared based on the situational and personal factors. Moreover, any attempt by
others to breach these boundaries may be treated as a potential threat. The CPM theory uses such
7. International Journal of Computer Science & Information Technology (IJCSIT) Vol 13, No 2, April 2021
49
boundaries to explain the motivation behind revealing or holding information. The situation of
boundaries, whether it is open or close, controls the information flow [26]. When it is open, the
information flow is open and when it is closed, the information flow is closed. The CPM theory
explains factors that influencing individuals decisions regarding the situations of boundaries in
dyadic relationships.
The CPM theory was used in many prior studies to understand the information flow in dyadic
relationships such as marital, parental and doctor-patient relationships [26]. Thus and due to its
success in understanding of information flow in dyadic relationships, many recent studies applied
the theory to explain information privacy concerns generated by using various new technologies,
for instance online social context [27] and e-commerce [28, 29].
The CPM theory is developed based on human mental decision process which in turn works based
on three rules (boundary rule formation, boundary coordination, and turbulence). These rules,
according to the CPM theory [26], are responsible to form, determine, and define boundaries
around individuals which contain specific cognitive informational spaces and such boundaries
determine what information can be shared based on the situational and personal factors. These three
rules are discussed further in next section.
2.2.4. Boundary Rule Formation
The CPM theory proposes that individuals’ decision process regarding to disclose or withhold their
private information based on criteria they perceive [26]. According to boundary rule formation, the
CPM theory posits that individuals use certain five criteria to establish privacy rules to manage
their boundaries which are: gender, risk-benefit ratio, cultural’ expectations, motivations for
revealing and concealing, and context of the situation.
For gendered criteria, the CPM theory suggests that males and females have different ways of
defining privacy boundaries, thus, men and woman have unalike set of rules for judging how
revealing and concealing should be formed [26]. In this study, gender and other demographic
variables are included as control variables in the study model. For risk-benefit ratio criteria, the
CPM theory suggests that individuals estimate the risk and benefits for giving or rejecting access
to privacy boundaries. People may expect more benefits than risks from revealing their private
information, they mentally calculate the extent to which disclosure is a positive option and develop
and implement rules reflect that choice. This criteria forms the basis for rule making, since that this
criteria contributes to individuals’ judgments regarding how to manage the balance of privacy
concerns and expected benefits from revealing their private information [26].
For cultural’ expectations criteria, “people are socialized into certain norms for privacy in their
culture and those norms are basic to the way they conceive privacy” [26]. The importance of
privacy and privacy concerns regarding revealing certain information are varied from culture to
culture, and individuals perceive privacy and define their boundaries in different ways according
to their cultural values. Thus, in the CPM theory, cultural values are considered in developing
privacy expectations.
Hypothesis 8. Cultural values will influence users’ perceived privacy concerns.
For context of the situation criteria, the CPM theory sees context as an issue may influence the way
privacy rules are formed and modified [26]. This issue can be categorized based on three live events
or situations, ((1) traumatic events, (2) therapeutic situations, and (3) life circumstances), which
highlight the way privacy rule establish and are changed to meet the immediate needs of the
circumstances. Thus, the privacy implications of specific live events or situations may mean
8. International Journal of Computer Science & Information Technology (IJCSIT) Vol 13, No 2, April 2021
50
something different to each person. For example when individuals experience traumatic events,
their level of stress is dramatically increased, and there is a one clear way to cope is through
disclosure [26]. While, life circumstances category represents situations that may be less stressful
than traumatic events such as when people lose their jobs which temporarily influence the way
people control their privacy boundaries and their privacy rules are temporarily changed to cope
with the demands of this situation [26].
Hypothesis 9. Context of the situation will influence users’ perceived privacy concerns.
For motivational criteria, motivations such as the expectations for rewards, attractions, liking or
costs are motivating to reveal or conceal private information. Motivational basis for disclosure can
be represented by three hypotheses which are (1) expressive need, (2) self-knowledge, and (3) self-
defense. Expressive need, reflects the individuals need to express their feelings and thought to
others, and self-knowledge is an alternative reason for revealing to others. Whereas self-defense
can be seen when some people avoid engaging in self-disclosure due to their feeling that there is a
great potential risk might be happened if they engage in such act. In this study, we belief that
expressive need, and self-knowledge can impact perceived benefits for giving access to privacy
boundaries. Therefore, the study consider examining self-defense as a construct reflects an
individual's need to maintain certain boundaries that frame personal space.
Hypothesis 10. Expressive need will influence users’ perceived benefits.
Hypothesis 11. Self-knowledge will influence users’ perceived benefits.
Hypothesis 12. Self-defense will influence users’ perceived privacy concerns.
2.2.5. Boundary Coordination
According to The CPM theory, when people disclose their personal information to other party, a
boundary is transformed from a personal to a collective. “The recipient shares in the responsibility
of the information. Hence, a personal boundary grows into a collectively managed border” [26]
and then the coordination become necessary between both parties: discloser (e.g., costumer) and
recipients (e.g., companies). In other words, recipient becomes a custodian who has responsibility
for taking care of or protecting discloser personal information, and protection rules will be
negotiated among both parties: discloser (e.g., costumer) and recipients (e.g., companies). Privacy
policies which represents the agreement or sort of coordination between discloser (e.g., costumer)
and recipients (e.g., companies) regarding gathering, using, disclosing, and managing a discloser
or customer's data. In the context of this study, privacy policies is used to represent boundary
coordination.
Hypothesis 13. Perceived effectiveness of privacy policy will negatively influence users’
perceived privacy concerns.
2.2.6. Boundary Turbulence
Sometimes the boundary coordination process fails due to its complexity [26]. Boundary
management may become turbulent, when the boundary coordination mechanism does not work
well or when individuals private information are attacked from external parties. “Boundaries
become turbulent when individuals are put into binds where the solutions are problematic” [26].
Therefore, individuals must therefore determine ways such as determine mechanism to manage the
turbulent or the allowing other party to solve this turbulent with the least amount of negative
outcome for all parties involved. Companies, to ensuring consumer confidence, relies on self-
regulation to address various industry issues, including creating industry standards, developing and
9. International Journal of Computer Science & Information Technology (IJCSIT) Vol 13, No 2, April 2021
51
applying codes of professional ethics. Thus, in this study industry self-regulation is used to
represent boundary turbulence.
Hypothesis14.Perceived effectiveness of industry self-regulation will negatively influence users’
perceived privacy concerns.
Figure 4. The study model.
3. METHODOLOGY
3.1. Measurement
Determining the constructs that will measured, and then select right measuring methods to measure
those constructs is necessary and has an important influence on the accuracy of findings [30]. In
order to test the study’s hypotheses, the survey instrument has been developed. The items used in
the survey instrument to measure the constructs were identified and adopted from prior research;
particularly from the Communication field and IS research, in order to guarantee the validity of the
face (content) of the scale used, we used the items which were broadly utilized in the most prior
relevant studies which represent a sort of subjective agreement between scholars. In the majority
of prior study, these measuring instruments logically appear to reflect accurate measure of the
constructs of interest. Table 1 contains the items developed for each construct in this study along
with a set of prior studies where these items have been adopted from.
10. International Journal of Computer Science & Information Technology (IJCSIT) Vol 13, No 2, April 2021
52
Table 1: List of items by construct
Construct Items Adapted from
Usage
(US)
US1. On average, each week I use my mobile applications often.
US2. For each log session, I use my mobile applications site long.
US3. On my mobile applications, I often post something.
US4. On my mobile applications, I often view something.
US5. On my mobile applications, I often share something.
US6. On my mobile applications, I often reply to others.
[24, 31]
Behavioural
intention
(BI)
BI1. I intend to use mobile applications in next three months.
BI2. I expect my use of the mobile applications to continue in the future.
[32, 33, 34].
Subjective Norm
(SN)
SN1. My friends would think that I should use mobile applications.
SN2. My colleagues/classmates would think that I should use mobile
applications.
SN3. People who are important to me would think that I should mobile
applications.
[32, 34].
Attitude
(AT)
AT1. I have positive opinion in mobile applications.
AT2. I think usage of mobile applications is good for me
AT3. I think usage of mobile applications is appropriate for me
[16, 34].
Perceived
behavioural
control (BC)
BC1. Using mobile applications is entirely within my control
BC2. Whether or not I use mobile applications is entirely up to me
[32, 34].
Perceived
benefits
(PB)
PB1. Mobile applications is more convenient than other traditional social
networks options
PB2. Mobile applications makes it easier to find information and people.
PB3. Mobile applications improves my information and people seeking
PB4. Mobile applications help me to find information more quickly
PB5. I think that mobile applications is useful. Overall, I think that using
the mobile applications is advantageous.
[32, 33].
Perceived
privacy concerns
(PC)
PC1. I am concerned that I could be identified by the company when using
the application for [the focal activity]
PC2. I am concerned with how information about me may be exploited by
the company when using the application for [the focal activity]
PC3. I am concerned with how the information captured during my use of
the application to perform [the focal activity] can be employed by the
company to identify me as an individual
PC4. It bothers me when my personal information is gathered when I use
the application for [the focal activity]
PC5. I am concerned that my personal information gathered during my use
of the application for [the focal activity] may be accessed by
unauthorized people
PC6. I am concerned that my personal information that is captured when I
use the application for [the focal activity] may be kept in a non-
accurate manner
PC7. To what extent are you concerned that your privacy will be
compromised when using the application for the specific activity?
[35, 2].
Cultural values
(CV)
CV1.Your cultural values prevent you from sharing your’ personal photos
stored in your mobile phone to anyone.
CV2.Your cultural values prevent you from sharing your’ family photos
stored in your mobile phone to anyone.
CV3.Your cultural values prevent you from sharing your’ private
information to anyone.
CV4.Your cultural values prevent you from sharing your’ secretes to
anyone.
Self-developed
Context of the
situation
(CS)
CS1. Your situation prevent you from sharing your’ personal photos stored
in your mobile phone to anyone.
CS2. Your situation prevent you from sharing your’ family photos stored
in your mobile phone to anyone.
CS3. Your situation prevent you from sharing your’ private information to
anyone.
CS4. Your situation prevent you from sharing your’ secretes to anyone.
Self-developed
Expressive need
(EN)
EN1. You use some of mobile applications to express your feelings and
thoughts to others.
EN2. Mobile applications let you express your feelings and thoughts to
others.
Self-developed
Self-knowledge
(SK)
SK1. You use some of mobile applications to increase your knowledge.
SK2. Mobile applications let you increase your knowledge.
Self-developed
11. International Journal of Computer Science & Information Technology (IJCSIT) Vol 13, No 2, April 2021
53
Construct Items Adapted from
Self-defense
(SD)
SD1. When you use some of mobile applications you avoid engaging in
self-disclosure due to your feeling that there is a great potential risk
might be happened if you engage in such act.
SD2. Using some of mobile applications may cause self-disclosure.
Self-developed
Perceived
effectiveness of
privacy policy
(PP)
PP1. I feel confident that these mobile applications’ privacy statements
reflect their commitments to protect my personal information.
PP2. 2. With their privacy statements, I believe that my personal
information will be kept private and confidential by these mobile
applications.
PP3. 3. I believe that these mobile applications’ privacy statements are an
effective way to demonstrate their commitments to privacy.
[31]
Perceived
effectiveness of
industry self-
regulation
(SR)
SR1. I believe that privacy seal of approval programs such as TRUSTe will
impose sanctions for mobile applications’ companies’ noncompliance
with its privacy policy.
SR2. Privacy seal of approval programs such as TRUSTe will stand by me
if my personal information is misused during and after transactions
with mobile applications’ companies.
SR3. I am confident that privacy seal of approval programs such as
TRUSTe is able to address violation of the information I provided to
mobile applications’ companies.
[31]
3.2. Data Collection Procedures
Data for this study were collected in four stages (3 months apart), from samples stratified into
gender groups by means of a survey conducted in Saudi Arabia in 2013. This type of sampling
method has been chosen due to the difficulty of drawing an actual representative sample in Saudi
Arabia. Majority of houses in Saudi Arabia have no mail boxes and the postal services are not
presented for every house. Moreover, due to the conservative nature of Saudi Arabian society, it is
hard to approach women in Saudi Arabia. Therefore, stratified samples were drawn from numerous
areas in the country and female relatives were engaged to distribute questionnaires to the female
strata besides using electronic means to guarantee reaching females as well as males. The survey
questionnaires were distributed to 2500 participants (1250 male and 1250 female). A total of 832
responses were received from male participants and 717 from female participants. After checking
the data for validity, 1523 were deemed fit for use in the analysis.
4. DATA ANALYSIS AND RESULTS
4.1. Reliability and validity
Data, obtained from the pilot study of each construct in the instrument, have been used to test a
reliability and internal consistency. The results shows that the alpha values ranged from .902 to
.988 with an overall alpha value of .924. Table 2 shows the Cronbach's alpha reliability of
constructs in the study. The result indicated that all constructs of the model were reliable. As a
result, the internal consistency of the instrument was adequate.
Table 2 Cronbach's Alpha Reliability of Constructs in the Study
Construct Number of Items Cronbach's Alpha
Usage (US) 6 .982
Behavioural intention (BI) 2 .988
Subjective Norm (SN) 3 .970
Attitude (AT) 3 .961
Perceived behavioural control (BC) 2 .902
Perceived benefits (PB) 5 .982
Perceived privacy concerns (PC) 7 .974
Cultural values (CV) 4 .968
12. International Journal of Computer Science & Information Technology (IJCSIT) Vol 13, No 2, April 2021
54
Construct Number of Items Cronbach's Alpha
Context of the situation (CS) 4 .953
Expressive need (EN) 2 .955
Self-knowledge (SK) 2 .962
Self-defense (SD) 2 .983
Perceived effectiveness of privacy policy (PP) 3 .988
Perceived effectiveness of industry self-
regulation (SR)
3 .986
Overall alpha value 48 .924
Principal component factor analysis and the Kaiser–Meyer–Olkin (KMO) were used to investigate
the adequacy of the study sample and the validity of the study instrument. As the value of KMO
was 0.786 as in Table3, the study sample was considered adequate and the appropriateness of using
principal component factor analysis on the collected data was assured.
Table 3. KMO and Bartlett's Test
Kaiser-Meyer-Olkin Measure of Sampling
Adequacy. .786
Bartlett's Test of
Sphericity
Approx. Chi-Square 30588.571
df 91
Sig. .000
Construct validity was evaluated by using factor analysis to measure a principal components
analysis with a Varimax rotation. This analysis helped in assessing the convergent and discriminant
validity of items. The convergent validity was evaluated by examining whether items of a variable
converged together on a single construct [36], and whether the factor loading for every item was >
0.45, as suggested by Comrey and Lee [37]. Comrey and Lee [37] indicated that loadings greater
than 0.45 could be considered fair, while loadings greater than 0.55 might be considered good, and
0.63 could be considered as a very good, and those of 0.71 as excellent. The discriminant validity
was assessed by using the cross loading of items on various factors. As the factor pattern shows in
Table 4, loadings on the target factor are in the excellent range (36 out of 48), very good (7 out of
48), and good (5 out of 48). As illustrated in Table 4, no weak loading was discovered
demonstrating the validity of constructs adopted in this study.
Table 4. Factor Analysis of Items Sorted by Construct (Rotated Component Matrix (a))
Component
1 2 3 4 5 Its assessment
SR1 .367 .863 -.144 .076 .057 Excellent > 0.71
SR2 .276 .895 -.177 .130 .122 Excellent > 0.71
SR3 .270 .889 -.163 .140 .155 Excellent > 0.71
PP1 .283 .897 -.171 .034 .182 Excellent > 0.71
PP2 .288 .911 -.167 .032 .073 Excellent > 0.71
PP3 .283 .885 -.184 .028 .138 Excellent > 0.71
SD1 -.289 -.207 .232 -.295 .799 Excellent > 0.71
SD2 -.215 -.254 .171 -.358 .807 Excellent > 0.71
SK1 .764 .282 -.128 -.018 .490 Excellent > 0.71
SK2 .750 .249 -.138 .108 .417 Excellent > 0.71
EN1 .736 .387 -.257 .385 .072 Excellent > 0.71
13. International Journal of Computer Science & Information Technology (IJCSIT) Vol 13, No 2, April 2021
55
Component
1 2 3 4 5 Its assessment
EN2 .609 .556 -.262 .286 .012 Good > 0.55
CS1 -.344 .001 .201 .843 -.125 Excellent > 0.71
CS2 -.220 -.121 .112 .895 -.077 Excellent > 0.71
CS3 -.207 -.229 .045 .875 -.128 Excellent > 0.71
CS4 -.210 -.203 .103 .845 -.178 Excellent > 0.71
CV1 -.239 -.067 .896 -.065 .147 Excellent > 0.71
CV2 -.276 -.073 .903 -.068 .056 Excellent > 0.71
CV3 -.264 -.187 .832 -.140 .062 Excellent > 0.71
CV4 -.208 -.159 .844 -.068 .140 Excellent > 0.71
PC1 -.112 -.131 .935 .065 -.056 Excellent > 0.71
PC2 -.148 -.102 .907 -.132 -.147 Excellent > 0.71
PC3 .088 -.221 .895 -.011 -.160 Excellent > 0.71
PC4 -.007 -.204 .911 -.020 -.149 Excellent > 0.71
PC5 -.007 -.029 .880 -.040 -.167 Excellent > 0.71
PC6 -.108 -.100 .878 -.198 -.177 Excellent > 0.71
PC7 -.198 -.148 .835 -.213 -.143 Excellent > 0.71
PB1 .543 .584 -.234 .355 .041 Good > 0.55
PB2 .650 .550 -.248 .234 .084 Very good > 0.63
PB3 .620 .531 -.293 .340 .162 Very good > 0.63
PB4 .677 .434 -.122 .452 .176 Very good > 0.63
PB5 .598 .553 -.192 .316 .191 Good > 0.55
AT1 .677 .539 -.132 .240 .125 Very good > 0.63
AT2 .640 .458 -.162 .514 .046 Very good > 0.63
AT3 .595 .553 -.119 .409 .050 Good > 0.55
SN1 .899 .161 -.079 .088 -.074 Excellent > 0.71
SN2 .902 .248 -.102 .137 .061 Excellent > 0.71
SN3 .878 .194 -.153 .169 .053 Excellent > 0.71
BC1 .803 .049 -.164 .048 .216 Excellent > 0.71
BC2 .801 .236 -.177 .021 .322 Excellent > 0.71
BI1 .772 .485 -.146 .306 -.014 Excellent > 0.71
BI2 .721 .565 -.163 .297 .091 Excellent > 0.71
US1 .735 .527 -.135 .281 -.088 Excellent > 0.71
US2 .613 .663 -.159 .317 .051 Very good > 0.63
US3 .679 .568 -.139 .283 -.033 Very good > 0.63
US4 .594 .576 -.049 .268 -.051 Good > 0.55
US5 .740 .522 -.108 .239 -.003 Excellent > 0.71
US6 .714 .539 -.137 .300 -.006 Excellent > 0.71
Extraction Method: Principal Component Analysis.
Rotation Method: Varimax with Kaiser Normalization.
a Rotation converged in 9 iterations.
4.2. Hypotheses testing
This study proposes an integrated theoretical model brings together concepts from the Theory of
Planned Behaviour (TPB) and Communication Privacy Management (CPM) theory. This model is
applied to determine significant factors that influence adoption of mobile apps in Saudi Arabia.
14. International Journal of Computer Science & Information Technology (IJCSIT) Vol 13, No 2, April 2021
56
This model can be constituted through the examination of 14 hypotheses. The relationship between
factors as independent variables and adoption behavior is identified by these hypotheses. Each
accepted hypothesis shows an interpretation of adoption’s behaviour as dependent variables.
Explanations are nomothetic and advance via deductive reasoning. The correlation analysis
amongst all the study variables was conducted using Pearson's correlation analysis as illustrated in
Table 5. As variables represented significant relationships (p≤0.01), the study then used the
regression model to inspect multicollinearity by testing collinearity statistics; i.e. Variance Inflation
Factor (VIF) and tolerance.
Table 5. Correlation analysis amongst the variables.
US BI BC SN AT PB PC CV CS EN SK SD PP
BI .923*
B
C
.681* .759*
S
N
.800* .854* .777*
A
T
.916* .887* .751* .715*
P
B
.850* .907* .634* .773* .844*
P
C
-
.280*
-
.348*
-
.327*
-
.225*
-
.283*
-
.368*
C
V
-
.351*
-
.404*
-
.366*
-
.330*
-
.327*
-
.402*
.869*
C
S
-
.532*
-
.647*
-
.411*
-
.477*
-
.596*
-
.603*
.280* .245*
E
N
.891* .930* .705* .813* .831* .906* -
.369*
-
.426*
-
.631*
S
K
.644* .738* .802* .789* .705* .619* -
.245*
-
.245*
-
.404*
.676*
S
D
-
.418*
-
.498*
-
.548*
-
.399*
-
.540*
-
.490*
.430* .240* .514* -
.502*
-
.617*
PP .712* .732* .444* .469* .737* .759* -
.334*
-
.303*
-
.334*
.669* .582* -
.429*
S
R
.764* .726* .501* .436* .834* .710* -
.322*
-
.320*
-
.356*
.631* .478* -
.439*
-.829*
US: Usage, BI: Behavioural intention, BC: Perceived behavioural control, SN: Subjective Norm, AT: Attitude,
PB: Perceived benefits, PC: Perceived privacy concerns, CV: Cultural values, CS: Context of the situation,
EN: Expressive need, SK: Self-knowledge, SD: Self-defense, PP: Perceived effectiveness of privacy policy,
SR: Perceived effectiveness of industry self-regulation.
* p ≤ 0.01
To determine whether any multicollinearity effects existed, we checked whether there was any
warning message produced by the AMOS output that signalled a problem of multicollinearity. The
findings showed that there was no evidence of multicollinearity. The potential issue of
multicollinearity can be further studied formally in the context of regression analysis.
In Table 6, the tolerance values ranged from 0.875 to 0.302. One way to measure collinearity is
with variance inflation factors (VIF). The (VIF) is generally recommended to be less than or equal
to 10 (i.e. tolerance >0.1) [38, 39]. In this study, a variance inflation factor (VIF) greater than 4 is
considered to indicate a serious problem of multicollinearity. However, as shown in Table 3, there
were no VIF values over 4 in the model; since the VIFs values ranged from 1.143 to 3.313. Thus
there was no evidence of multicollinearity.
15. International Journal of Computer Science & Information Technology (IJCSIT) Vol 13, No 2, April 2021
57
Table 6. Multicollinearity test
Dependent
variable
Path
direction
Independent variables
(predictors)
Collinearity Statistics
Tolerance VIF
Usage Intention .424 2.357
Usage
Perceived behavioural
control
.424 2.357
Intention Attitude .392 2.551
Intention Subjective Norm .357 2.802
Intention
Perceived behavioural
control
.318 3.143
Attitude Perceived benefits .865 1.157
Attitude
Perceived privacy
concerns
.865 1.157
Perceived
privacy
concerns
Cultural values
.875 1.143
Perceived
privacy
concerns
Context of the situation
.850 1.176
Perceived
privacy
concerns
Perceived effectiveness
of privacy policy (PP) .310 3.229
Perceived
privacy
concerns
Perceived effectiveness
of industry self-
regulation (SR)
.302 3.313
Perceived
benefits
Expressive need
.531 1.883
Perceived
benefits
Self-knowledge
.439 2.276
Perceived
benefits
Self-defense
.606 1.650
After assuring that necessary requirements are all adequately met, multiple regression analysis was
used to evaluate the study hypotheses.
First, “Intention” and “Perceived behavioural control” were regressed on “Usage”. As in Fig. 5, it
was found that “Intention” (β = 0.958, Standardized path coefficient, p < 0.05), and “Perceived
behavioural control” (β = 0.046, Standardized path coefficient, p < 0.05) are significantly and
positively related to “Usage” (adjusted R²=0.85) (see Table 7, Table 8 and Fig. 5). Thus, H1 and
H2 are supported.
Table 7. Coefficients for Proposed model
Depend
ent
variable
Path
directi
on
Independent
variables
(predictors)
Unstandardize
d Coefficients
Standardized
Coefficients t Sig.
B Std. Error Beta
Usage Intention .893 .014 .958 63.395 .000
Usage
Perceived
behavioural
control
.055 .018 .046 3.076 .002
Intention Attitude .555 .013 .585 42.432 .000
16. International Journal of Computer Science & Information Technology (IJCSIT) Vol 13, No 2, April 2021
58
Depend
ent
variable
Path
directi
on
Independent
variables
(predictors)
Unstandardize
d Coefficients
Standardized
Coefficients t Sig.
B Std. Error Beta
Intention
Subjective
Norm
.595 .018 .474 32.787 .000
Intention
Perceived
behavioural
control
.062 .019 .049 3.175 .002
Attitude
Perceived
benefits
1.042 .018 .856 57.937 .000
Attitude
Perceived
privacy concerns
-.036 .017 -.032 -2.159 .031
Perceived
privacy
concerns
Cultural values
.977 .016 .840 62.934 .000
Perceived
privacy
concerns
Context of the
situation .077 .018 .058 4.288 .000
Perceived
privacy
concerns
Perceived
effectiveness of
privacy policy
-.159 .033 -.107 -4.763 .000
Perceived
privacy
concerns
Perceived
effectiveness of
industry self-
regulation
-.126 .026 -.098 -4.811 .000
Perceived
benefits
Expressive need .873 .014 .899 61.068 .000
Perceived
benefits
Self-knowledge .011 .014 .011 .772 .440
Perceived
privacy
concerns
Self-defense .382 .019 .271 19.623 .000
P values less than 0.05 were considered statistically significant
Table 8. Standardized Regression Weights
Criterion variable
Path
direction
Criterion variable
predictors
Estimate (Significance)
Usage Intention .958 Significant
Usage
Perceived behavioural
control
.046 Significant
Intention Attitude .585 Significant
Intention Subjective Norm .474 Significant
Intention
Perceived behavioural
control
.049 Significant
Attitude Perceived benefits .856 Significant
Attitude
Perceived privacy
concerns
-.032 Significant
Perceived privacy
concerns
Cultural values
.827
Significant
Perceived privacy
concerns
Context of the situation
.058
Significant
17. International Journal of Computer Science & Information Technology (IJCSIT) Vol 13, No 2, April 2021
59
Criterion variable
Path
direction
Criterion variable
predictors
Estimate (Significance)
Perceived privacy
concerns
Perceived effectiveness
of privacy policy -.107
Significant
Perceived privacy
concerns
Perceived effectiveness
of industry self-
regulation
-.098
Significant
Perceived benefits Expressive need .899 Significant
Perceived benefits Self-knowledge .011 Insignificant
Perceived privacy
concerns
Self-defense .271 Significant
Thereafter, the three independent variables (i.e. “Attitude”, “Subjective norms” and “Perceived
behavioural control”) were regressed on “Behavioral Intention”. Results, as in Fig. 5, indicate that
all three variables are significantly and positively related to “Behavioral Intention” (adjusted
R²=0.89): “Attitude” (β = 0.585, Standardized path coefficient, p < 0.05), “Subjective norms” (β =
0.474, Standardized path coefficient, p < 0.05) and “Perceived behavioural control” (β = 0.049,
Standardized path coefficient, p < 0.05) (see Table 7, Table 8 and Fig. 5). Thus, H3, H4 and H5
are supported.
“Perceived benefits” and “Perceived privacy concerns” were regressed on “Attitude”. As in Fig. 5,
it was found that “Perceived benefits” (β = 0.856, Standardized path coefficient, p < 0.05), and
“Perceived privacy concerns” (β = 0.032, Standardized path coefficient, p < 0.05) are significantly
and positively related to “Attitude” (adjusted R²=0.71) (see Table 7, Table 8 and Fig. 5). Thus, H6
and H7 are supported.
Then, the five independent variables: (1) Self-defense, (2) Perceived effectiveness of industry self-
regulation, (3) Cultural values, (4) Perceived effectiveness of privacy policy and (5) Context of the
situation were regressed on “Perceived privacy concerns”. Results, as in Fig. 5, indicate that all
five variables are significantly and positively related to “Perceived privacy concerns” (adjusted
R²=0.81): “Cultural values” (β = 0.827, Standardized path coefficient, p < 0.05), “Context of the
situation” (β = 0.058, Standardized path coefficient, p < 0.05), “Self-defense” (β = 0.271,
Standardized path coefficient, p < 0.05), “Perceived effectiveness of privacy policy” (β = -0.107,
Standardized path coefficient, p < 0.05) and “Perceived effectiveness of industry self-regulation”
(β = -0.098, Standardized path coefficient, p < 0.05) (see Table 7, Table 8 and Fig. 5). Thus, H8,
H9, H12, H13 and H14 are supported.
Finally, the two antecedents of “Perceived benefits” construct were tested using multiple regression
analysis which showed that “Expressive need” (β = 0.899, Standardized path coefficient, p < 0.05)
has a significant and positive effect on “Perceived benefits” (adjusted R²=0.821)(see Table 7, Table
8 and Fig. 5). Thus, H10 is supported. Whereas, “Self-knowledge” (β = 0.011, Standardized path
coefficient, p < 0.05) has no effect on “Perceived benefits”, Therefore, H11 is not supported.
18. International Journal of Computer Science & Information Technology (IJCSIT) Vol 13, No 2, April 2021
60
Figure 5. The study model.
5. DISCUSSION
The results of this study are practically and theoretically relevant and showing an accurate and deep
understanding of factors that might lessening level of mobile apps usage. In the context of mobile
apps usage, there is no detailed theoretical model to describe individuals' attitudes and their two
main antecedents (privacy concerns and perceived benefits) toward using apps on mobile. This
study develops a new model to identify the root causes of privacy concerns and perceived benefits
through using theoretical framework brings together concepts from the Theory of Planned
Behaviour (TPB) and Communication Privacy Management (CPM) theory.
The study proposed model includes three major parts; the first part identifies the root causes of
privacy concerns and perceived benefits based on our understanding and interpretation for
information boundary theory and Communication Privacy Management (CPM) theory, the second
part explores attitude towards using mobile apps and influences of its two main antecedents
(privacy concerns and perceived benefits) toward using apps on mobile. The third part addresses
the usage behavior and behavioral intention toward using mobile apps.
For the first part, “Cultural values”, “Context of the situation”, “Self-defense”, “Perceived
effectiveness of privacy policy” and “Perceived effectiveness of industry self-regulation” are the
antecedents of individuals “Perceived privacy concerns” towards using apps on mobile, which
explain the 81% of the “Perceived privacy concerns” variance. Whereas, “Expressive need” and
“Self-knowledge” are able to explain the 82% of individuals “Perceived benefits”. All of the
hypotheses relating to “Perceived privacy concerns” are endorsed. Whereas, from the two
antecedents of “Perceived benefits” construct (i.e. “Expressive need”, and “Self-knowledge”)
“Expressive need” (β = 0.899, Standardized path coefficient, p < 0.05) only has a significant and
positive effect on “Perceived benefits”.
In his research, Waleed Al-ghaith developed an equation to quantify the contribution of each
model's variable or factor to the explanatory power of the model [11].
19. International Journal of Computer Science & Information Technology (IJCSIT) Vol 13, No 2, April 2021
61
𝐴𝑥 =
𝛽𝑥
2
∑ 𝛽𝑥
2
𝑛
𝑘=1
× 𝑅𝑃𝐶
2
Where:
𝐴𝑥 = Participation of variable Ax in a model' explanatory power
𝛽𝑥
2
= Square of beta coefficients or standardized coefficients of variable
RPC
2
= Model' explanatory power (perceived privacy concerns)
∑ 𝛽𝑥
2
𝑛
𝑘=1 = Total of causal effects for the model’s constructs
This equation has been adopted in this study to calculate the participation of each constructs and
their antecedents in the model’s explanatory power and to calculate rate of participation of every
antecedents in their constructs’ explanatory power. The equation has been applied on the
antecedents of the “Perceived privacy concerns”, the results have been summarised in Table 9. The
result shows that “Cultural values” alone explains 70% of “Perceived privacy concerns” followed
by “Self-defense” which explains around 23% of “Perceived privacy concerns”, and then “Context
of the situation” with 5%. Whereas, the findings show that “Perceived effectiveness of privacy
policy” and “Perceived effectiveness of industry self-regulation” both are factors which have the
ability to reduce individuals “Perceived privacy concerns” by 9% and 8% respectively.
Table 9. Participation of Perceived privacy concerns 's variables in its explanatory power
Antecedents Perceived privacy concerns
Cultural values 70%
Self-defense 23%
Context of the situation 5%
Perceived effectiveness of privacy policy -9%
Perceived effectiveness of industry self-regulation -8%
Total 81%
The study findings show that, in Saudi Arabia, “Cultural values” alone explains 70% of individuals
“Perceived privacy concerns”. The conservative nature of Saudi Arabian society which take its
values from the Islamic religion rules, Arab traditions and tribal norms formed the Saudi culture
[40]. In such culture, conservative values are the basis for judging levels of disclosure or privacy,
thus, people tend to protect their information boundaries motivated by their concerns of shame or
scandal. For instance in Saudi Arabia women are not welcomed to be highly observable and audible
for anyone. As this example shows, for the Saudi culture, the conservative nature of Saudi Arabian
society maintains the boundaries around sharing personal photos and private information and
abides by rules set by the Islamic religion, Arab traditions and tribal norms that are influenced by
the cultural norms for privacy. “Obviously, reducing exposure means more privacy and more
boundary control” [26].
The study findings also show that, in Saudi Arabia, “Self-defense” explains around 23% of
“Perceived privacy concerns”. Self-defense is a function or motivator for keeping information
private [26]. Self-defense can be seen when some people avoid engaging in self-disclosure due to
their feeling that there is a great potential risk might be happened if they engage in such act. People
may not want to reveal their personal information due to their belief that there is a great risk may
20. International Journal of Computer Science & Information Technology (IJCSIT) Vol 13, No 2, April 2021
62
cause loss of face, relation, or role. Loss of face can be seen when disclose personal photos or
private information leads to sort of embarrassment to individuals or to their relative or friends
which also may pose a threat to the relationships. Due to face risks people in Saudi Arabia are more
likely to anticipate the need for a defense if private information becomes public.
The results also show that “Perceived effectiveness of privacy policy” and “Perceived effectiveness
of industry self-regulation” both are factors which have the ability to reduce individuals “Perceived
privacy concerns” by 9% and 8% respectively. This show how Saudi individuals perceive the
global regulations as a custodian who has responsibility for taking care of or protecting discloser
personal information.
For the second part, “Perceived benefits” and “Perceived privacy concerns” are the antecedents of
individuals “Attitude” towards using mobile apps, which explain the 71% of the variance. All of
the hypotheses regarding “Attitude” are supported.
The Al-ghaith’s equation [11] has been used again to calculate the participation of the antecedents
of the “Attitude” on its explanatory power, the results have been summarized in Table 10. The
result shows that “Perceived benefits” alone explains 73.75% of individuals “Attitude” towards
using mobile apps, whereas, the findings show that “Perceived privacy concerns” reduce
individuals “Attitude” by 2.75%.
Table 10: Participation of Attitude 's variables in its explanatory power
Antecedents Attitude
Perceived benefits 73.75%
Perceived privacy concerns -2.75%
Total 71%
The results show that Saudi people attitude toward using mobile apps is determined by perceived
benefits and perceived privacy concerns, whereas the relative strengths of one of the two beliefs in
a given context determine the individual's overall attitude within that context. The condition of
very strong attitude toward using mobile apps is characterized by strength of perceived benefits
and low perceived privacy concerns. Benefits of mobile apps such as convenience, accessibility,
interactivity, socialization, expressive need, self-knowledge and personalized service are highly
perceived by Saudi people rather than any risks might be occurred as a result of use of mobile apps
such as privacy issues. As a result, number of mobile subscribers in 2013 reached 53 million,
reflecting 181.6 percent of population diffusion rate [41].
For the third part, “Attitude”, “Subjective norms” and “Perceived behavioural control” are the
antecedents of individuals “Behavioral Intention” towards using apps on mobile, which explain the
89% of the variance. Whereas, “Behavioral Intention” with its antecedents and “Perceived
behavioral control” are able to explain the 85% of the of individuals “Usage” behavior. All of the
hypotheses regarding “Behavioral Intention” and individuals “Usage” behavior are supported.
The Al-ghaith’s equation [11] has been used again to calculate the participation of the antecedents
of the “Behavioral Intention” on its explanatory power, the results have been summarized in Table
11. The result shows that “Attitude” alone explains 74% of individuals “Behavioral Intention”
towards using mobile apps, followed by “Subjective norms” which explains around 38% of
“Behavioral Intention”, and then “Perceived behavioural control” with 4%.
21. International Journal of Computer Science & Information Technology (IJCSIT) Vol 13, No 2, April 2021
63
Table 11: Participation of Behavioral Intention 's variables in its explanatory power
Antecedents Behavioral Intention
Attitude 47%
Subjective norms 38%
Perceived behavioural control 4%
Total 89%
6. IMPLICATIONS FOR THEORY AND PRACTICE
6.1. Implications for theory and research
The current research utilizes TPB model to examine the behaviour and intenion to berform
behaviour, and CPM theory to understand determinates of privacy concerns. This study contributes
to the body of the information systems literature by exploring the behavioural and social factors
affecting users' decisions to adopt mobile apps as new technology. Importantly, the study shows
that privacy concern is not the only factor that influences negatively on attitude, perceived benefits
which represents the need for use should be considered also as a second factor however with a
positive impact on individual’s attitude.
Theoretically, drawing on CPM theory, this research is important because it developed a research
model suggesting that “Cultural values”, “Context of the situation”, “Self-defense”, “Perceived
effectiveness of privacy policy” and “Perceived effectiveness of industry self-regulation” are the
antecedents of individuals “Perceived privacy concerns” towards using apps on mobile, which
explain the 81% of the “Perceived privacy concerns” variance. Whereas, “Expressive need” and
“Self-knowledge” are able to explain the 82% of individuals “Perceived benefits”.
6.2. Implications for Practice
For mobile apps developers who face growing pressure to determine information privacy issues
[2], this research offers practical recommendations on developing mobile apps. Mobile apps can
be personalized through asking individuals to provide their favorites rather than gathering their
personal information.
This study also suggests the need to invent a new operating systems and mobile hardware which
ensure strong protection of individuals’ information and prevent unauthorized access to the users’
information. Moreover, the new operating systems and mobile hardware must also prevent mobile
apps from accessing to the users’ information.
REFERENCES
[1] CISCO. (2020). Cisco Annual Internet Report (2018–2023). Retrieved from CISCO Website
https://www.cisco.com/c/en/us/solutions/collateral/executive-perspectives/annual-internet-
report/white-paper-c11-741490.pdf.
[2] Sutanto, J., Palme, E., Chuan-Hoo, T., & Chee Wei, P. (2013). ADDRESSING THE
PERSONALIZATION-PRIVACY PARADOX: AN EMPIRICAL ASSESSMENT FROM A FIELD
EXPERIMENT ON SMARTPHONE USERS. MIS Quarterly, 37(4), 1141-A5.
[3] Angwin, J., & Valentino-DeVries, J. (2011, April 22). Apple, Google Collect User Data. The Wall
Street Journal, U.S. Edition. Retrieved from
http://www.wsj.com/articles/SB10001424052748703983704576277101723453610
[4] Hutchinson, R. (2011, January 26). 50 Percent of iPhone Apps Can Track User Data. Applie News.
Retrieved from http://www.geeky-gadgets.com/50-percent-of-iphone-apps-can-track-user-data-26-01-
2011/
22. International Journal of Computer Science & Information Technology (IJCSIT) Vol 13, No 2, April 2021
64
[5] Federal Trade Commission. (2015). Internet of things: Privacy & Security in a Connected World.
Preliminary FTC Staff Report. Retrieved from Federal Trade Commission Website:
(https://www.ftc.gov/system/files/documents/reports/federal-trade-commission-staff-report-
november-2013-workshop-entitled-internet-things-privacy/150127iotrpt.pdf).
[6] Banisar, D. (2014, December 8). National Comprehensive Data Protection/Privacy Laws and Bills 2014
Map. Retrieved from SSRN Website: http://ssrn.com/abstract=1951416
[7] Conger, S., Pratt, J. H. & Loch, K. D. (2013). Personal information privacy and emerging technologies.
Info Systems J, 23, 401–417.
[8] DLA Piper. (2015). DLA Piper's Data Protection Laws of the World Handbook. Retrieved from DLA
Piper Website: http://dlapiperdataprotection.com/#handbook/world-map-section
[9] Arab Social Media Report. (2014). Citizen Engagement and Public Services in the Arab World: The
Potential of Social Media. Mohammed bin Rashid School of government, 1(6). Retrieved from Arab
Social Media Report Website: http://www.arabsocialmediareport.com/
[10] Phelps, J., Nowak, G., & Ferrell, E. (2000). Privacy concerns and consumer willingness to provide
personal information. Journal of Public Policy and Marketing, 19(1), 27-41.
[11] Al-ghaith, W. (2015). Understanding Social Network Usage: impact of co-presence, intimacy, and
immediacy. International Journal of Advanced Computer Science and Applications (IJACSA), 6(8),
99-111.
[12] RFID World Canada. (2015). Billion Dollar Mobile Payment Industry Using Secure NFC Technology
Projected to Continue Strong Growth. Retrieved from RFID World Canada Website:
http://www.rfidworld.ca/billion-dollar-mobile-payment-industry-using-secure-nfc-technology-
projected-to-continue-strong-growth/2418
[13] Giorgia, G., Teunissena, P., Verhagena, S. & Buista, P. (2010). GNSS remote sensing: testing a new
multivariate GNSS carrier phase attitude determination method for remote sensing platforms. Advances
in Space Research, 46, 118–129.
[14] Daniel, O. (2007). Security and privacy on the semantic web. In Milan Petkovic and Willem Jonker,
editors, Security, Privacy and Trust in Modern Data Management, Data-Centric Systems and
Applications. Berlin Heidelberg: Springer.
[15] Ajzen, I., & Fishbein, M. (1980). Understanding Attitudes and Predicting Social Behaviour. Englewood
Cliffs, NJ: Prentice-Hall.
[16] Ajzen, I. (1991). The theory of planned behaviour. Organizational Behaviour and Human Decision
Processes, 50(2), 179-211.
[17] Pavlou, P. & Fygenson, M. (2006). Understanding and Predicting Electronic Commerce Adoption: An
Extension of the Theory of Planned Behavior. MIS Quarterly, 30(1), 115-143.
[18] Hernandez M., & Mazzon J. (2007). Adoption of internet banking: proposition and implementation of
an integrated methodology approach. The International Journal of Bank Marketing, 25(2), 72-88.
[19] Marler, Janet H., Fisher, Sandra L., & Ke, Weiling. (2009). employee self-service technology
acceptance: a comparison of pre-implementation and post-implementation relationships. Personnel
Psychology, 62(2), 327-358.
[20] Warren, S., & Brandeis, L. (1890). The Right to Privacy. Harvard Law Review. IV (5).
[21] Li, Y. (2014). The impact of disposition to privacy, website reputation and website familiarity on
information privacy concerns. Decision Support Systems, 57(1), 343–354.
[22] Li, H., Sarathy, R., & Xu, H. (2010). Understanding situational online information disclosure as a
privacy calculus. The Journal of Computer Information Systems, 62–71.
[23] Koohikamali, M., Gerhart, N. & Mousavizadeh, M. (2015). Location disclosure on LB-SNAs: The role
of incentives on sharing behavior. Decision Support Systems, 71(1), 78–87.
[24] Alghaith, W., Sanzogni, L., & Sandhu, K. (2010). Factors Influencing the Adoption and Usage of
Online Services in Saudi Arabia. Electronic Journal of Information Systems in Developing Countries
(EJISDC), 40(1), 1-32.
[25] Petronio, S. (1991). Communication boundary management: a theoretical model of managing
disclosure of private information between marital couples. Communication Theory, 311-335.
[26] Petronio, S. (2002). Boundaries of privacy: Dialectics of disclosure (xix,pp. 268). Albany, NY: State
University of New York Press.
[27] Chen, J., Ping, W., Xu, Y., & Tan, B.C.Y. (2009). Am i afraid of my peers? Understanding the
antecedents of information privacy concerns in the online social context. In: Proceedings of the
Thirtieth International Conference on Information Systems.
23. International Journal of Computer Science & Information Technology (IJCSIT) Vol 13, No 2, April 2021
65
[28] Metzger, M.J. (2007). Communication privacy management in electronic commerce. Journal of
Computer-Mediated Communication, 12(2), 335–361.
[29] Ji, P. & Lieber, P. S. (2010). Am I safe? Exploring relationships between primary territories and online
privacy. Journal of Internet Commerce, 9(1), 3–22.
[30] Zikmund, W. G. (2003). Business research methods (7th ed.). Cincinnati, OH: Thomson.
[31] Xu, C., Ryan, S., Prybutok, V., & Wen, C. (2012). It is not for fun: An examination of social network
site usage. Information and Management, 49(5), 210–217.
[32] Taylor, S., & Todd, P.A. (1995). Understanding information technology usage: A test of competing
models. Information Systems Research, 6(2), 144-176.
[33] Moore, C., & Benbasat, I. (2001). Development of an instrument to measure the perception of adopting
an information technology innovation. Information Systems Research, 2, 192-222.
[34] Al-Debei, M., Al-Lozi, E., & Papazafeiropoulou, A. (2013). Why people keep coming back to
Facebook: Explaining and predicting continuance participation from an extended theory of planned
behaviour perspective. Decision Support Systems, 55(1), 43-54.
[35] Chellappa, R. K., & Sin, R. G. (2005). Personalization versus privacy: An empirical examination of the
online consumer's dilemma. Information Technology and Management, 6(2-3), 181-202.
[36] Premkumar, G., & Ramamurthy, K. (1995). The role of Interorganizational and organizational factors
of the decision mode for adoption of interorganizational systems. Decision Science, 26(3), 303-336.
[37] Comrey, A.L., & Lee, H.B. (1992). A first course in factor analysis. N.J.: L. Erlbaum Associates.
[38] Asher, H.B. (1983). Causal modeling. Newbury Park: Sage University Press.
[39] Lee, M. (2009). Factors influencing the adoption of internet banking: An integration of TAM and TPB
with perceived risk and perceived benefit. Electronic Commerce Research and Applications, 8(3), 130-
141.
[40] Alsharif, A. (2014). Teaching the customs, traditions and culture of Saudi Arabia through the arts in
high school to promote cultural understanding and appreciation (Order No. 1589365). Available from
ProQuest Dissertations & Theses Global. (1691800000).
[41] Alotaibi, M. (2015). Mobile Computing Trends in Saudi Arabia: An Exploratory Study. I.J. Information
Technology and Computer Science, 01, 21-32.