Technology companies can benefit from users’ habitual technology use as a reinforcement of technology continuance. Such habitual behavior can be amplified through personalized service experiences, for which companies need to request their users’ data. However, in the presence of strong habit, users might agree to privacy updates and decide to continue using services without weighing privacy related risks against expected benefits. To date, privacy research has given little attention to technology habit. We aim to fill this research gap by drawing on the privacy calculus theory, contextual privacy awareness (CPA), and prior studies on habit in technology continuance research. We conduct an experiment with mobile app users and find that habit...
Current smartphone operating systems employ permission systems to regulate how apps access sensitive...
Recent privacy-related incidents of mobile services have shown that app stores and providers face th...
Privacy threats in a social media-enabled application (app) can originate from either the institutio...
Technology companies can benefit from users’ habitual technology use as a reinforcement of technolog...
The diffusion of smart mobile devices and therewith apps into everyday life comes along with the per...
Mobile apps are increasingly jeopardizing app users' online privacy by collecting, storing, and shar...
While much of Information Systems literature has investigated the mechanism between privacy concerns...
Research shows that people's use of computers and mobile phones is often characterized by a privacy ...
We suggest that explaining privacy behaviors requires understanding not only individual attitudes, b...
Preferences and behaviors for privacy management with mobile applications are difficult to capture. ...
To provide high quality, on demand localized and personalized services, mobile apps collect data abo...
While users are increasingly embracing smartphones worldwide, these devices, storing our most perso...
Utility that modern smartphone technology provides to individuals is most often enabled by technical...
© 2015 Elsevier Ltd. All rights reserved. We examine how two different underlying mechanisms of beha...
Recent advances in mobile computing technology have led to a proliferation of location-based service...
Current smartphone operating systems employ permission systems to regulate how apps access sensitive...
Recent privacy-related incidents of mobile services have shown that app stores and providers face th...
Privacy threats in a social media-enabled application (app) can originate from either the institutio...
Technology companies can benefit from users’ habitual technology use as a reinforcement of technolog...
The diffusion of smart mobile devices and therewith apps into everyday life comes along with the per...
Mobile apps are increasingly jeopardizing app users' online privacy by collecting, storing, and shar...
While much of Information Systems literature has investigated the mechanism between privacy concerns...
Research shows that people's use of computers and mobile phones is often characterized by a privacy ...
We suggest that explaining privacy behaviors requires understanding not only individual attitudes, b...
Preferences and behaviors for privacy management with mobile applications are difficult to capture. ...
To provide high quality, on demand localized and personalized services, mobile apps collect data abo...
While users are increasingly embracing smartphones worldwide, these devices, storing our most perso...
Utility that modern smartphone technology provides to individuals is most often enabled by technical...
© 2015 Elsevier Ltd. All rights reserved. We examine how two different underlying mechanisms of beha...
Recent advances in mobile computing technology have led to a proliferation of location-based service...
Current smartphone operating systems employ permission systems to regulate how apps access sensitive...
Recent privacy-related incidents of mobile services have shown that app stores and providers face th...
Privacy threats in a social media-enabled application (app) can originate from either the institutio...