This research examines how various factors, such as the degree of e-privacy concerns and control over data access permissions, can influence a user’s intention to install a smartphone app. We conducted two survey-based experiments with 441 participants. In each experiment, we manipulated the degree of control over the number and type of data access permissions granted to dierent fictional apps. In Study 1, participants were informed about the set of permissions the apps required. In Study 2, participants indicated which individual permissions they were willing to grant to the apps. In both experiments, we assessed the level of e-privacy concerns, perceived app importance, and the intention to install the apps. The results suggest that the t...
Preferences and behaviors for privacy management with mobile applications are difficult to capture. ...
Smartphones have unprecedented access to sensitive personal information. While users report having p...
<p>Smartphones have unprecedented access to sensitive personal information. While users report havin...
This research examines how various factors, such as the degree of e-privacy concerns and control ove...
This research examines how various factors, such as the degree of e-privacy concerns and control ove...
Recent privacy-related incidents of mobile services have shown that app stores and providers face th...
Due to the popularity of smartphones, the number of apps has been growing up rapidly. Users have to ...
App permission requests are a control mechanism meant to help users oversee and safeguard access to ...
The diffusion of smart mobile devices and therewith apps into everyday life comes along with the per...
Our smartphone is full of applications and data that analytically organize, facilitate and describe ...
In this research in progress, we investigated the effects of mobile applications’ permission request...
This proposed study aims to understand users’ mobile app choices when their awareness of control is ...
To provide high quality, on demand localized and personalized services, mobile apps collect data abo...
by Google in the form of an unrestricted grant to the Mobile Commerce Laboratory. The authors would ...
As they compete for developers, mobile app ecosystems have been exposing a growing number of APIs th...
Preferences and behaviors for privacy management with mobile applications are difficult to capture. ...
Smartphones have unprecedented access to sensitive personal information. While users report having p...
<p>Smartphones have unprecedented access to sensitive personal information. While users report havin...
This research examines how various factors, such as the degree of e-privacy concerns and control ove...
This research examines how various factors, such as the degree of e-privacy concerns and control ove...
Recent privacy-related incidents of mobile services have shown that app stores and providers face th...
Due to the popularity of smartphones, the number of apps has been growing up rapidly. Users have to ...
App permission requests are a control mechanism meant to help users oversee and safeguard access to ...
The diffusion of smart mobile devices and therewith apps into everyday life comes along with the per...
Our smartphone is full of applications and data that analytically organize, facilitate and describe ...
In this research in progress, we investigated the effects of mobile applications’ permission request...
This proposed study aims to understand users’ mobile app choices when their awareness of control is ...
To provide high quality, on demand localized and personalized services, mobile apps collect data abo...
by Google in the form of an unrestricted grant to the Mobile Commerce Laboratory. The authors would ...
As they compete for developers, mobile app ecosystems have been exposing a growing number of APIs th...
Preferences and behaviors for privacy management with mobile applications are difficult to capture. ...
Smartphones have unprecedented access to sensitive personal information. While users report having p...
<p>Smartphones have unprecedented access to sensitive personal information. While users report havin...