Preferences and behaviors for privacy management with mobile applications are difficult to capture. Previous measures are mostly based on self-report data, which often does not accurately predict actual user behavior. A deeper understanding was sought, gleaned from observing actual practices. This thesis analyzes 11,777 applications from the Google Play marketplace in order to determine the impact of privacy settings on purchase behavior. This was done by looking at the effect of the number of privacy concessions as well as the effect of individual concessions and category on number of downloads. It was found that users of paid applications do not have a preference for fewer privacy concessions. This study further reinforces the disconnect ...
Personal data from mobile apps are increasingly impacting users’ lives and privacy perceptions. Howe...
Also known as the privacy paradox, recent research on online behavior has revealed discrepancies bet...
This research examines how various factors, such as the degree of e-privacy concerns and control ove...
Preferences and behaviors for privacy management with mobile applications are difficult to capture. ...
Mobile apps are increasingly jeopardizing consumer privacy by collecting, storing, and sharing perso...
To provide high quality, on demand localized and personalized services, mobile apps collect data abo...
In this research in progress, we investigated the effects of mobile applications’ permission request...
by Google in the form of an unrestricted grant to the Mobile Commerce Laboratory. The authors would ...
Recent privacy-related incidents of mobile services have shown that app stores and providers face th...
This research examines how various factors, such as the degree of e-privacy concerns and control ove...
It is commonly assumed that “free” mobile apps come at the cost of consumer privacy and that paying ...
Research shows that people's use of computers and mobile phones is often characterized by a privacy ...
The real value of mobile applications is heavily dependent on consumers' trust in the privacy of the...
The diffusion of smart mobile devices and therewith apps into everyday life comes along with the per...
Smartphones contain a myriad of personal information and, due to their ubiquity and the possibility ...
Personal data from mobile apps are increasingly impacting users’ lives and privacy perceptions. Howe...
Also known as the privacy paradox, recent research on online behavior has revealed discrepancies bet...
This research examines how various factors, such as the degree of e-privacy concerns and control ove...
Preferences and behaviors for privacy management with mobile applications are difficult to capture. ...
Mobile apps are increasingly jeopardizing consumer privacy by collecting, storing, and sharing perso...
To provide high quality, on demand localized and personalized services, mobile apps collect data abo...
In this research in progress, we investigated the effects of mobile applications’ permission request...
by Google in the form of an unrestricted grant to the Mobile Commerce Laboratory. The authors would ...
Recent privacy-related incidents of mobile services have shown that app stores and providers face th...
This research examines how various factors, such as the degree of e-privacy concerns and control ove...
It is commonly assumed that “free” mobile apps come at the cost of consumer privacy and that paying ...
Research shows that people's use of computers and mobile phones is often characterized by a privacy ...
The real value of mobile applications is heavily dependent on consumers' trust in the privacy of the...
The diffusion of smart mobile devices and therewith apps into everyday life comes along with the per...
Smartphones contain a myriad of personal information and, due to their ubiquity and the possibility ...
Personal data from mobile apps are increasingly impacting users’ lives and privacy perceptions. Howe...
Also known as the privacy paradox, recent research on online behavior has revealed discrepancies bet...
This research examines how various factors, such as the degree of e-privacy concerns and control ove...