Privacy, value and control issues in four mobile business applications

Benjamin D. Renegar, Katina Michael, M. G. Michael

Research output: Chapter in Book/Report/Conference proceedingConference contribution

6 Scopus citations

Abstract

This paper presents four case studies that explore the adoption and acceptance of mobile technologies and services within the context of the privacy-value-control (PVC) trichotomy. The technologies studied include: the mobile phone, electronic toll payment tags, epassports, and loyalty card programs. The study shows that despite the potential barriers to adoption in each of the depicted cases, the applications were embraced with great success soon after their introduction. An understanding of why these mobile innovations succeeded in spite of the concerns surrounding them will serve to help practitioners understand other issues currently plaguing emerging technologies like radiofrequency identification (RFID) tags and transponders. The contribution of this paper is not only in its usage of secondary sources to support case development and subsequent cross-case analysis but on the importance of emphasizing the value proposition to the consumer to ensure the success of an innovation. The PVC trichotomy emphasizes the need to harmonize privacy, value and control.

Original languageEnglish (US)
Title of host publicationProceedings - 7th International Conference on Mobile Business, ICMB 2008, Creativity and Convergence
Pages30-40
Number of pages11
DOIs
StatePublished - 2008
Externally publishedYes
Event7th International Conference on Mobile Business, ICMB 2008, Creativity and Convergence - Barcelona, Spain
Duration: Jul 7 2008Jul 8 2008

Publication series

NameProceedings - 7th International Conference on Mobile Business, ICMB 2008, Creativity and Convergence

Conference

Conference7th International Conference on Mobile Business, ICMB 2008, Creativity and Convergence
Country/TerritorySpain
CityBarcelona
Period7/7/087/8/08

ASJC Scopus subject areas

  • Computer Networks and Communications
  • Computer Vision and Pattern Recognition

Fingerprint

Dive into the research topics of 'Privacy, value and control issues in four mobile business applications'. Together they form a unique fingerprint.

Cite this