Professional Documents
Culture Documents
Research Proposal
Research Proposal
In the digital age, absolute privacy is difficult to attain. Previous research has suggested several
driving factors of the benefits and risks in various research contexts, including traditional
transactions, online transactions, government surveillance and location-aware marketing. The
perceived benefits of information sharing via mobile devices and applications appeal to various
customers. Customers who use m-banking, for example, may quickly obtain information based on
their most recent transactions and discover how each purchase may affect their monthly spending
budget. Passengers obtain customized auxiliary services via their mobile phones to enhance their
trip experience (Morosan, 2015). Supermarket shoppers may speed up the checkout process and
easily acquire coupons via their mobile phones to save time and money (Danaher, Smith,
Ranasinghe, & Danaher, 2015).
Consumers are more inclined to provide personal information using mobile devices if the perceived
benefits are substantial. These tailored mobile services' success is strongly reliant on the acquisition
and analysis of precise personal information. Customers who receive tailored services run the
danger of having their personal information (such as location, purchasing preferences, medical
history, and social networks) hacked due to a lack of security management across servers and/or
client sites. As a result, perceived advantages and hazards must be examined concurrently in order
to comprehend consumers' decision to share personal information via mobile devices. Based on
privacy calculus theory, previous research has found numerous elements that influence risk
perception. Li (2012), for example, did a literature analysis and identified the elements that either
prohibit or stimulate personal information dissemination. According to the study, the bulk of
studies on this issue examine risks and rewards independently, and just a few studies have
examined the relative effect of privacy concerns on the intention to disclose personal information
in an e-commerce scenario (Dinev & Hart, 2003, 2006). This study seeks to address a research
vacuum by proposing a balanced method to assessing both the relative and combined advantages
and dangers of sharing personal information through mobile applications.
In modern digital media ecosystem, mobile media devices have evolved into individualized,
transportable, and customizable "services hub[s]" (Hjorth, 2009). This disclosure will be seen as
frequent observing, "check-in" (Turkel, 2008), swiping, geo-tagging, and other growing behaviors
centered around mobile phones.
The ownership and close relationship between user and object has been highlighted in literature
on mobile media (Ling and Campbell, 2011; Thornham, 2014; Turkle, 2008); the experience of the
place is constantly changing and how that affects communication (Moores, 2012; Hine, 2015); the
social environment is changing (Ling and Campbell, 2011; Hjorth, Wilken and Gu, 2013); and the
changing patterns of communication and interaction (Hjorth, Burgess, and Richardson, 2012). The
prior research, in contrast, would have missed the owner's behaviors and how they had evolved
around the mobile phone. By analyzing the users' object immersion, physical presence, and
everyday routine activities, my research will investigate the mobilized practices and experiences.
As people and connections are incorporated into mobile software, the availability of mobile
technology has increased the significance of mobile apps even more. Technologies that bind us
to real people are being replaced by those that bind us to avatars of real people (Turkle, 2008).
Researchers have observed a shift towards mobile devices with applications, including the
acceleration of "co-presence", an increase in personal production and consumption activities,
as well as the expansion of identity and improved intimacy. My research will expand on this to
include the owner's revised perceptions of the device, their comprehension of usage in this
novel social context, and the contribution that mobile phones, along with social media and
other technologies, make to the transformation of connectivity experiences and the emergence
of new kinds of practices.
Technical Part
Mobile applications have a significant influence on how people live today, making it easier for
us to do the bulk of our chores on a daily basis. Self-disclosure will be seen as the interaction
and interplay between the users and the platform in order to show how activities and habits
are created, defined, and molded by technology.
Platform designs are designed to entice but also constrain users into specific roles and
behavioral patterns. Affordances and features (Treem and Leonardi, 2012), algorithms,
formatted protocols, and strategic interfaces with default settings of coding technologies that
social media platforms employ to influence users' behavior have all been the subject of prior
studies. By contrast, page layout and graphic design receive less consideration. My research will
fill in this gap by examining how the digital self is calibrated based on the technology offered
and how these components might serve as a vehicle for the online community that offers
participants' practices and experiences structure and coherence.
By capturing and utilizing user data, computer output may also be directly molded by human
input. This piqued my curiosity in exploring big data. Researchers have looked at its different
components at the techno-cultural level, such as data collection and organization (Kitchin,
2014; Schönberger and Cukier, 2013), patterns and correlations in data (Kitchin, 2014), and
forecasts for developing services (Ellison, 2013). My research will look into how the platform
interprets participants' online behaviors and steers specific needs through data quantification
and measurement, as well as shift its focus from sites to mobile apps—devices that accompany
individuals that generate data that can track and trace movement and construct meta maps
across time and space. The usage of digital media has peaks and troughs; regrettably, existing
study only focuses on one specific aspect or time period. In contrast, my research will look at
practices holistically and over a longer period of time, allowing for a more in-depth
understanding of what is going on.
Methodology
Questionnaire design
This study seeks to identify the types of personal information that customers are prepared to
provide, as well as the precise aspects and circumstances that impact consumers' readiness to
disclose personal information. This section explains how the systematic approach was chosen
and how the fieldwork would be carried out in order to answer portions of the research
questions.
The respondents will be solicited to an online survey by paid advertising on internet portals and
researcher networks, and the poll will be used to gather data for hypothesis testing. Because
mobile applications are so significant in our lives, my research will reach out various user
groups ranging from 16 to 60 years old who have a strong interest in mobile apps, social media,
social networking, and so on. It is feasible to examine if the various usage patterns,
interpersonal relationships, personal, age, and gender identities that impact the readiness to
give personal information through applications by enrolling both young and elderly, male and
female respondents. To attract additional possible participants, the research information will
also disseminate on the university's student networks and on the researcher’s own fan pages.
The questionnaire will consist of three parts. The goal and setting of the research will describe
in the first section. The respondents will ask to express their views on each of the measurement
items in the second part. To prevent responder weariness and to generate a psychological
break, it will be tried to balance the order of the questions of various constructs (Podsakoff,
MacKenzie, Lee, & Podsakoff, 2003). The demographic questions will be found in the third part.
All responders' identities and confidentiality will be upheld. Seven components will be included
in the research model: desire to use mobile applications for disconnection, self-presentation,
individualized services, perceived severity, perceived control, perceived advantages, and
perceived hazards. To meet the current study environment, all questionnaire items will be
modified from the available literature, and they will be evaluated using a seven-point Likert
scale ranging from 1 (“strongly disagree”) to 7 (strongly agree”). Demographic details including
gender and education level will be included as the control variables. Prior research suggested
that earlier mobile app usage experiences might affect the desire to provide personal
information (Bansal, Zahedi, & Gefen 2010). Three control variables—the years of smartphone
ownership, the number of hours per week spent using mobile applications, and the number of
apps used each week—will be included to the analysis to help mitigate the possible impact of
earlier experiences.
Interview and Observation
Because mobile applications are so significant in our lives, my research will reach out various
user groups ranging from 16 to 60 years old who have a strong interest in mobile apps, social
media, social networking, and so on. It is feasible to examine if the various usage patterns,
interpersonal relationships, personal, age, and gender identities that impact the readiness to
give personal information through applications by enrolling both young and elderly, male and
female respondents. The project will select typical applications from different fields (social
networking, banking, shopping, healthcare, etc.) to research. This can help researchers better
understand why people are ready to provide personal information with mobile applications.
The study begins with quantitative survey-based methodologies, which are augmented with
content analysis. In the online survey, participants are requested to give information on which
apps they reveal their information to and why in order to map the general landscape of their
behaviors. A large sample content analysis gave measurable assessments of how individuals
depict themselves, as well as recognizing commonalities and variances in the kind of personal
information they disclose. The phase will define and forecast usage patterns across various
categories of individuals, as well as similar statistical results and general trends.
In-depth interviews and observation will be conducted throughout the qualitative phase to
better understand the key themes and aspects of people's values and behavior. In semi-
structured interviews, specific questions and subjects are explored in order to anchor the exact
answer of the communicative, explorative, and performative parts of people's information
disclosure, as well as the circumstances in which they behave. Through participating in the
participants' own surroundings, online observation will also be used to communicate
participants' perspectives. In the ethnography tradition, these methods are frequently used to
generate an embedded description and understanding of participants' use of and through
digital technologies and content in the context of individual everyday practices, experience,
relationships, and routines, allowing for a stronger triangulation of data (Pink, Horst, Postill,
Hjorth, Lewis and Tacchi, 2016). This phase will include a longitudinal examination of the
revealed material as well as changes in their practice over time.
Using experimental study, this phase will investigate the function of mobile phones in people's
lives. This may be used to investigate the causal relationship between people's behavior and
communicatively relevant mobile apps. Participants will be randomly allocated to one of three
treatment groups, with some using the mobile application, some using the mobile site version,
and the remainder using the PC online version. To evaluate the responsive practices, a number
of measuring methodologies will be applied (such as the noticing of the object and frequency of
using one app). The data was based on self-reported consumption and observation, and
subjects from each age group were mixed to guarantee similar conditions.
The key ethical and practical issue that has to be addressed is the use of personal information,
which affects individual privacy. Participants will be made fully aware of the nature of the
research and how their personal information will be used; participants' anonymity will be
respected; and any data obtained will be used exclusively for the purposes of the study and
discarded after the study is over. Also, the obtained data should be carefully analyzed because
some of it is self-reported data, which can give helpful information but has limits because
people may (intentionally or inadvertently) falsify their disclosure of personal information
levels.
Progress Plan:
2023: Be ready for empirical work and preliminary writing. This year, I want to study extensively
on the subject, focusing on research topics such as disciplines that require user information,
online personal information disclosure, self-representation, mobile technologies, and research
techniques. Next, I'll refine my study based on past findings and write the literature review.
Following that, I will construct the methodology section, which includes recruiting volunteers
for the research.
2024: I will begin planning the research, developing a timeline, considering ethical
considerations, and resolving any potential difficulties and hurdles. Next, I'll do the research,
from data collection through data analysis. I will reach a conclusion based on the findings of my
investigation and intend to write an essay based on my preliminary findings.
2025 marks the end of the writing process. I'll combine the prior written sections, revise my
theory, and write the methodologies and case study chapters. Lastly, I will proofread all of my
research parts.
References
N.F. Awad and M. S. Krishnan. (2006). The Personalization Privacy Paradox: An Empirical
Evaluation of Information Transparency and the Willingness to Be Profiled Online for Personalization.
Morosan, C., & DeFranco, A. (2015). Disclosing personal information via hotel apps: A privacy
calculus perspective.
Danaher, Smith, Ranasinghe, Danaher. (2015). Where, When, and How Long: Factors That
Influence the Redemption of Mobile Phone Coupons.
Li, Y. (2012). Theories in online information privacy research: a critical review and an integrated
framework. Decision Support Systems, 54(1), 471–481.
Dinev, T., & Hart, P. (2006). An extended privacy calculus model for e-commerce transactions.
Information Systems Research, 17(1), 61–80.
Hjorth, L., Burgess, J. and Richardson, I. (2012). Studying mobile media. New York, NY:
Routledge
Treem, J.W. and Leonardi, P.M. (2012). Social media use in organizations: Exploring the
affordance of visibility, editability, persistence, and association. Communication Yearbook 36,
pp.143-189.
Mayer-Schönberger, V. and Cukier, K. (2013). Big data: a revolution that will transform how we
live, work and think.
Ellison, N. (2013). Future Identities: Changing identities in the UK – the next 10 years. Social
Media and Identity.
Podsakoff, P. M., MacKenzie, S. B., Lee, J. Y., & Podsakoff, N. P. (2003). Common method biases
in behavioral research: a critical review of the literature and recommended remedies. Journal
of Applied Psychology.
Bansal, G., Zahedi, F., & Gefen, D. (2010). The impact of personal dispositions on information
sensitivity, privacy concern and trust in disclosing health information online.
Pink, S., Horst, H., Postill, J., Hjorth, L., Lewis, T. and Tacchi, J. (2016). Digital ethnography.
T. Wang, T.D. Duong, C. C. Chen (2016). Intention to disclose personal information via mobile
applications: A privacy calculus perspective.