{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,20]],"date-time":"2025-12-20T22:04:15Z","timestamp":1766268255304,"version":"3.37.3"},"reference-count":40,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2024,4,22]],"date-time":"2024-04-22T00:00:00Z","timestamp":1713744000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2024,4,22]],"date-time":"2024-04-22T00:00:00Z","timestamp":1713744000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"name":"Ionian University"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int. J. Inf. Secur."],"published-print":{"date-parts":[[2024,6]]},"abstract":"<jats:title>Abstract<\/jats:title><jats:p>The purpose of this paper is to validate two domain-specific information privacy competency models (IPCMs); the first for online consumers and the second for users of mobile applications (apps). For the validation of the competency models, we conducted qualitative research, using interviews to collect feedback by a group of nine information privacy experts. Regarding the evaluation, the experts commented largely positively for the structure and content of the IPCMs, as well as for the extent to which they achieve the intended goals. They also provided several points for improvements, which resulted in enhancing the quality of both IPCMs. The validation of the domain-specific demonstrated that this is the first study to empirically examine the privacy competencies that users of specific technological contexts should hold. The IPCMs can be used not only by educators and privacy policy makers for the design of privacy interventions, but also by e-commerce and mobile-apps providers, who could gain important insights into the way that they can be more reliable for their users. Both consumers and users of mobile-apps could benefit from IPCMs by acquiring the necessary privacy competencies through training programs for the protection of their information privacy.<\/jats:p>","DOI":"10.1007\/s10207-024-00843-x","type":"journal-article","created":{"date-parts":[[2024,4,22]],"date-time":"2024-04-22T12:02:13Z","timestamp":1713787333000},"page":"2437-2455","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Validation and extension of two domain-specific information privacy competency models"],"prefix":"10.1007","volume":"23","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-3033-0954","authenticated-orcid":false,"given":"Aikaterini","family":"Soumelidou","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2200-3651","authenticated-orcid":false,"given":"Aggeliki","family":"Tsohou","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,4,22]]},"reference":[{"key":"843_CR1","first-page":"1621","volume":"1","author":"V Kumar","year":"2022","unstructured":"Kumar, V., Prasad, C.: E-commerce: problems and prospects. Spec. Educ. 1, 1621\u20131628 (2022)","journal-title":"Spec. Educ."},{"key":"843_CR2","first-page":"1449","volume":"13","author":"A Bhatti","year":"2020","unstructured":"Bhatti, A., Akram, H., Basit, M., Khan, A.U.: E-commerce trends during COVID-19 pandemic. Int. J. Future Gen. Commun. Netw. 13, 1449\u20131452 (2020)","journal-title":"Int. J. Future Gen. Commun. Netw."},{"key":"843_CR3","doi-asserted-by":"publisher","first-page":"18","DOI":"10.5296\/jmr.v11i3.14776","volume":"11","author":"TS Yee","year":"2019","unstructured":"Yee, T.S., Seong, L.C., Chin, W.S.: Patient\u2019s intention to use mobile health app. J. Manag. Res. 11, 18\u201335 (2019). https:\/\/doi.org\/10.5296\/jmr.v11i3.14776","journal-title":"J. Manag. Res."},{"key":"843_CR4","doi-asserted-by":"publisher","DOI":"10.1016\/j.jretconser.2022.103228","author":"R Meena","year":"2023","unstructured":"Meena, R., Sarabhai, S.: Extrinsic and intrinsic motivators for usage continuance of hedonic mobile apps. J. Retail. Consum. Serv. (2023). https:\/\/doi.org\/10.1016\/j.jretconser.2022.103228","journal-title":"J. Retail. Consum. Serv."},{"key":"843_CR5","unstructured":"Ceci, L.: Annual number of global mobile app downloads 2016\u20132022. Statista. https:\/\/www.statista.com\/statistics\/271644\/worldwide-free-and-paid-mobile-app-store-downloads\/ (2023). Accessed 8 August 2023"},{"key":"843_CR6","doi-asserted-by":"publisher","first-page":"572","DOI":"10.1002\/cb.1947","volume":"21","author":"X Chen","year":"2022","unstructured":"Chen, X., Sun, J., Liu, H.: Balancing web personalization and consumer privacy concerns: mechanisms of consumer trust and reactance. J. Consum. Behav. 21, 572\u2013582 (2022). https:\/\/doi.org\/10.1002\/cb.1947","journal-title":"J. Consum. Behav."},{"key":"843_CR7","doi-asserted-by":"publisher","first-page":"112","DOI":"10.1145\/3510003.3510079","volume":"2022","author":"P Nema","year":"2022","unstructured":"Nema, P., Anthonysamy, P., Taft, N., Peddinti, S.T.: Analyzing user perspectives on mobile app privacy at scale. Proc. Int. Conf. Softw. Eng. 2022, 112\u2013124 (2022). https:\/\/doi.org\/10.1145\/3510003.3510079","journal-title":"Proc. Int. Conf. Softw. Eng."},{"key":"843_CR8","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1016\/j.dss.2016.10.002","volume":"94","author":"J Gu","year":"2017","unstructured":"Gu, J., Xu, Y., Xu, H., Zhang, C., Ling, H.: Privacy concerns for mobile app download: an elaboration likelihood model perspective. Decis. Support. Syst. 94, 19\u201328 (2017). https:\/\/doi.org\/10.1016\/j.dss.2016.10.002","journal-title":"Decis. Support. Syst."},{"key":"843_CR9","doi-asserted-by":"publisher","first-page":"787","DOI":"10.1108\/MIP-02-2022-0065","volume":"40","author":"J Kang","year":"2022","unstructured":"Kang, J., Lan, J., Yan, H., Li, W., Shi, X.: Antecedents of information sensitivity and willingness to provide marketing intelligence and planning. Emerald Group Holdings Ltd. 40, 787\u2013803 (2022). https:\/\/doi.org\/10.1108\/MIP-02-2022-0065","journal-title":"Emerald Group Holdings Ltd."},{"key":"843_CR10","doi-asserted-by":"publisher","first-page":"44","DOI":"10.1016\/j.dss.2017.12.003","volume":"106","author":"VM Wottrich","year":"2018","unstructured":"Wottrich, V.M., van Reijmersdal, E.A., Smit, E.G.: The privacy trade-off for mobile app downloads: the roles of app value, intrusiveness, and privacy concerns. Decis. Support. Syst. 106, 44\u201352 (2018). https:\/\/doi.org\/10.1016\/j.dss.2017.12.003","journal-title":"Decis. Support. Syst."},{"key":"843_CR11","doi-asserted-by":"publisher","DOI":"10.2791\/838886","author":"B Bre\u010dko","year":"2016","unstructured":"Bre\u010dko, B., Ferrari, A.: The digital competence framework for consumers (2016). https:\/\/doi.org\/10.2791\/838886","journal-title":"The digital competence framework for consumers"},{"key":"843_CR12","doi-asserted-by":"publisher","unstructured":"Lavranou, R., Tsohou, A.: Developing and validating a common body of knowledge for information privacy. Inf. Comp. Sec., 26, 668\u2013686, (2019). https:\/\/doi.org\/10.1108\/ICS-08-2018-0099","DOI":"10.1108\/ICS-08-2018-0099"},{"key":"843_CR13","doi-asserted-by":"publisher","unstructured":"Papaioannou, T., Tsohou, A., Bounias, G.,Karagiannis, S.: A constructive approach for raising information privacy competences: the case of escape room games, Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), Vol. 13582 LNCS, Springer Science and Business Media Deutschland GmbH, pp. 33\u201349, (2022), doi: https:\/\/doi.org\/10.1007\/978-3-031-17926-6_3.","DOI":"10.1007\/978-3-031-17926-6_3"},{"key":"843_CR14","doi-asserted-by":"publisher","unstructured":"Tsohou, A.: Towards an information privacy and personal data protection competency model for citizens. In: Fischer-H\u00fcbner, S., Lambrinoudakis, C., Kotsis, G., Tjoa, A.M., Khalil, I. (eds) Trust, Privacy and Security in Digital Business. TrustBus 2021. Lecture Notes in Computer Science, vol 12927. Springer, Cham (2021). https:\/\/doi.org\/10.1007\/978-3-030-86586-3_8","DOI":"10.1007\/978-3-030-86586-3_8"},{"key":"843_CR15","doi-asserted-by":"publisher","first-page":"32","DOI":"10.1518\/001872095779049543","volume":"37","author":"MR Endsley","year":"1995","unstructured":"Endsley, M.R.: Toward a theory of situation awareness in dynamic systems. Hum. Factors J. Hum. Fact Erg. Soc. 37, 32\u201364 (1995)","journal-title":"Hum. Factors J. Hum. Fact Erg. Soc."},{"key":"843_CR16","doi-asserted-by":"publisher","first-page":"1315","DOI":"10.11118\/actaun201462061315","volume":"62","author":"G Kolib\u00e1cov\u00e1","year":"2014","unstructured":"Kolib\u00e1cov\u00e1, G.: The relationship between competency and performance. Mendel Univ. Agric. For. Brno 62, 1315\u20131327 (2014). https:\/\/doi.org\/10.11118\/actaun201462061315","journal-title":"Mendel Univ. Agric. For. Brno"},{"key":"843_CR17","doi-asserted-by":"crossref","unstructured":"Mcclelland, D.C. Testing for Competence Rather Than for \u201cIntelligence\u201d (1973)","DOI":"10.1037\/h0034092"},{"key":"843_CR18","unstructured":"Spencer, L.M., Spencer, S.M. Competence at work\u202f: models for superior performance, Wiley (1993)"},{"key":"843_CR19","doi-asserted-by":"crossref","unstructured":"Athey, T.R., Orth, M.S.: Emerging Competency Methods for the Future,Human Resource Management, Fall 38 (1999)","DOI":"10.1002\/(SICI)1099-050X(199923)38:3<215::AID-HRM4>3.0.CO;2-W"},{"key":"843_CR20","doi-asserted-by":"publisher","first-page":"50","DOI":"10.1002\/smr.1701","volume":"27","author":"P Holtkamp","year":"2015","unstructured":"Holtkamp, P., Lau, I., Pawlowski, J.M.: How software development competences change in global settings-an explorative study. J. Softw. Evol. Process 27, 50\u201372 (2015). https:\/\/doi.org\/10.1002\/smr.1701","journal-title":"J. Softw. Evol. Process"},{"key":"843_CR21","first-page":"121","volume":"7","author":"N Vazirani","year":"2010","unstructured":"Vazirani, N.: Competencies and competency model-a brief overview of its development and application. SIES J. Manag. 7, 121\u2013131 (2010)","journal-title":"SIES J. Manag."},{"key":"843_CR22","unstructured":"Ibrahim, I., Hasnan, N.: Development and application of competency model in manufacturing operations: an overview (2014)"},{"key":"843_CR23","doi-asserted-by":"publisher","DOI":"10.1108\/02621710810840730","author":"RE Boyatzis","year":"2008","unstructured":"Boyatzis, R.E.: Competencies in the 21st century. J. Manag. Dev. (2008). https:\/\/doi.org\/10.1108\/02621710810840730","journal-title":"J. Manag. Dev."},{"key":"843_CR24","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-74155-8_9","author":"D Sampson","year":"2008","unstructured":"Sampson, D., Fytros, D.: Competence models in technology-enhanced competence-based learning. Handb. Inf. Technol. Educ. Train. (2008). https:\/\/doi.org\/10.1007\/978-3-540-74155-8_9","journal-title":"Handb. Inf. Technol. Educ. Train."},{"key":"843_CR25","doi-asserted-by":"publisher","unstructured":"Bogoviz, A.V., Suglobov, A.E., Maloletko, A.N., Kaurova, O.V., Lobova, S.V.: Frontier information technology and systems research in cooperative economics, Vol. 316 (2021). https:\/\/doi.org\/10.1007\/978-3-030-57831-2","DOI":"10.1007\/978-3-030-57831-2"},{"key":"843_CR26","doi-asserted-by":"publisher","first-page":"475","DOI":"10.1111\/j.1365-2575.2011.00395.x","volume":"22","author":"R Klendauer","year":"2012","unstructured":"Klendauer, R., Berkovich, M., Gelvin, R., Leimeister, J.M., Krcmar, H.: Towards a competency model for requirements analysts. Inf. Syst. J. 22, 475\u2013503 (2012). https:\/\/doi.org\/10.1111\/j.1365-2575.2011.00395.x","journal-title":"Inf. Syst. J."},{"key":"843_CR27","doi-asserted-by":"publisher","unstructured":"Moustroufas, E., Stamelos, I., Angelis, L.: Competency profiling for software engineers: Literature review and a new model. In: ACM International Conference Proceeding Series, Vol. 01\u201303-October-2015, Association for Computing Machinery, pp. 235\u2013240 (2015). https:\/\/doi.org\/10.1145\/2801948.2801960","DOI":"10.1145\/2801948.2801960"},{"key":"843_CR28","first-page":"5","volume":"27","author":"S Ying Ho","year":"2010","unstructured":"Ying Ho, S., Frampton, K., Ying, S.: A competency model for the information technology workforce: implications for training and selection. Commun. Assoc. Inf. Syst. 27, 5 (2010)","journal-title":"Commun. Assoc. Inf. Syst."},{"key":"843_CR29","unstructured":"Prifti, L., Knigge, M., Kienegger, H., Krcmar, H.: A competency model for \u201cIndustrie 4.0\u201d Employees (2017)"},{"key":"843_CR30","doi-asserted-by":"publisher","first-page":"1363","DOI":"10.17705\/1cais.03480","volume":"34","author":"B Eschenbrenner","year":"2014","unstructured":"Eschenbrenner, B., Nah, F.F.H.: Information systems user competency: a conceptual foundation. Com. Ass. Inf. Syst. 34, 1363\u20131378 (2014). https:\/\/doi.org\/10.17705\/1cais.03480","journal-title":"Com. Ass. Inf. Syst."},{"key":"843_CR31","doi-asserted-by":"publisher","first-page":"1047","DOI":"10.1108\/ITP-02-2017-0052","volume":"31","author":"A Tsohou","year":"2018","unstructured":"Tsohou, A., Holtkamp, P.: Are users competent to comply with information security policies? An analysis of professional competence models. Inf. Techn. People 31, 1047\u20131068 (2018). https:\/\/doi.org\/10.1108\/ITP-02-2017-0052","journal-title":"Inf. Techn. People"},{"key":"843_CR32","doi-asserted-by":"publisher","unstructured":"Soumelidou, A., Papaioannou, T.: An information privacy competency model for online consumers. In: Nurcan, S., Opdahl, A.L., Mouratidis, H., Tsohou, A. (eds) Research Challenges in Information Science: Information Science and the Connected World. RCIS 2023. Lecture Notes in Business Information Processing, vol 476. Springer, Cham. (2023). https:\/\/doi.org\/10.1007\/978-3-031-33080-3_42","DOI":"10.1007\/978-3-031-33080-3_42"},{"key":"843_CR33","doi-asserted-by":"crossref","unstructured":"Soumelidou, A., Tsohou, A.: Towards an information privacy competency model for the usage of mobile applications. In: 38TH International Conference on ICT Systems Security And Privacy Protection IFIP, Poznan Poland. Accepted (2023)","DOI":"10.1007\/978-3-031-56326-3_16"},{"key":"843_CR34","doi-asserted-by":"publisher","DOI":"10.1016\/j.compedu.2020.103989","author":"AR Lauricella","year":"2020","unstructured":"Lauricella, A.R., Herdzina, J., Robb, M.: Early childhood educators\u2019 teaching of digital citizenship competencies. Comput. Educ. (2020). https:\/\/doi.org\/10.1016\/j.compedu.2020.103989","journal-title":"Comput. Educ."},{"key":"843_CR35","unstructured":"James, C., Weinstein, E., Mendoza, K.: Teaching digital citizens\u2019in today's world: research and insights behind the Common Sense K\u201312 Digital Citizenship Curriculum. (Version 2). San Francisco, CA: Common Sense Media (2021)"},{"key":"843_CR36","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2020.106382","author":"L Desimpelaere","year":"2020","unstructured":"Desimpelaere, L., Hudders, L., Van de Sompel, D.: Knowledge as a strategy for privacy protection: how a privacy literacy training affects children\u2019s online disclosure behavior. Comput. Hum. Behav. (2020). https:\/\/doi.org\/10.1016\/j.chb.2020.106382","journal-title":"Comput. Hum. Behav."},{"key":"843_CR37","doi-asserted-by":"publisher","first-page":"69","DOI":"10.1016\/j.cbpra.2020.11.002","volume":"29","author":"SM Schueller","year":"2022","unstructured":"Schueller, S.M., Armstrong, C.M., Neary, M., Ciulla, R.P.: An introduction to core competencies for the use of mobile apps in cognitive and behavioral practice. Cogn. Behav. Pract. 29, 69\u201380 (2022). https:\/\/doi.org\/10.1016\/j.cbpra.2020.11.002","journal-title":"Cogn. Behav. Pract."},{"key":"843_CR38","doi-asserted-by":"publisher","DOI":"10.14742\/ajet.6622","author":"K Cham","year":"2021","unstructured":"Cham, K., Edwards, M.-L., Kruesi, L., Celeste, T., Hennessey, T.: Digital preferences and perceptions of students in health professional courses at a leading Australian university: a baseline for improving digital skills and competencies in health graduates. Austr. J. Educ. Tech. (2021). https:\/\/doi.org\/10.14742\/ajet.6622","journal-title":"Austr. J. Educ. Tech."},{"key":"843_CR39","doi-asserted-by":"publisher","first-page":"212","DOI":"10.1016\/j.chb.2014.09.033","volume":"41","author":"R Moll","year":"2014","unstructured":"Moll, R., Pieschl, S., Bromme, R.: Competent or clueless? Users\u2019 knowledge and misconceptions about their online privacy management. Comp. Hum. Behav. 41, 212\u2013219 (2014). https:\/\/doi.org\/10.1016\/j.chb.2014.09.033","journal-title":"Comp. Hum. Behav."},{"key":"843_CR40","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2004.06.004","author":"S Beecham","year":"2005","unstructured":"Beecham, S., Hall, T., Britton, C., Cottee, M., Rainer, A.: Using an expert panel to validate a requirements process improvement model. J. Syst. Soft (2005). https:\/\/doi.org\/10.1016\/j.jss.2004.06.004","journal-title":"J. Syst. Soft"}],"container-title":["International Journal of Information Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-024-00843-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10207-024-00843-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-024-00843-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,5,27]],"date-time":"2024-05-27T02:18:09Z","timestamp":1716776289000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10207-024-00843-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,4,22]]},"references-count":40,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2024,6]]}},"alternative-id":["843"],"URL":"https:\/\/doi.org\/10.1007\/s10207-024-00843-x","relation":{},"ISSN":["1615-5262","1615-5270"],"issn-type":[{"type":"print","value":"1615-5262"},{"type":"electronic","value":"1615-5270"}],"subject":[],"published":{"date-parts":[[2024,4,22]]},"assertion":[{"value":"19 March 2024","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"22 April 2024","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"The current study involves human participants and informed consent was obtained.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent Informed"}}]}}