The reliance on recognition and majority vote heuristics over privacy concerns when selecting smartphone apps among German and US consumers

ABSTRACT The smartphone app market is a prime example of a digital market where consumers are tasked with selecting one option among a plethora of alternatives, at times indistinguishable from one another. Building upon findings on information processing and decision-making, we postulate that consumers follow simple (rather than complex) heuristic rules to navigate the app market. In particular, we focus on two such strategies: the recognition heuristic and the majority vote heuristic. App privacy information was also considered as a potentially salient cue in the decision-making process, given the personal data stored on smartphones. Results of a mixed-method design (behavioral analysis and think-aloud protocols) study with German (N = 18) and US (N = 25) students find a dominance of the recognition heuristic. Decisions are further supported by majority vote heuristics. Privacy information is largely disregarded, particularly by US participants. Implications for app market design and engagement are discussed.

[1]  Nicholas David Bowman,et al.  "The app market has been candy crushed": Observed and rationalized processes for selecting smartphone games , 2015, Entertain. Comput..

[2]  Hyun-Hwa Lee,et al.  Moderating effect of privacy self-efficacy on location-based mobile marketing , 2013, Int. J. Mob. Commun..

[3]  K. Taylor,et al.  Accessing Problem-Solving Strategy Knowledge: The Complementary Use of Concurrent Verbal Protocols and Retrospective Debriefing. , 2000 .

[4]  Ming H. Hsieh,et al.  Identifying Brand Image Dimensionality and Measuring the Degree of Brand Globalization: A Cross-National Study , 2002 .

[5]  Marc Fischer,et al.  How Important Are Brands? A Cross-Category, Cross-Country Study , 2010 .

[6]  W. Wayne Fu,et al.  Aggregate bandwagon effect on online videos' viewership: Value uncertainty, popularity cues, and heuristics , 2011, J. Assoc. Inf. Sci. Technol..

[7]  Adam Arvidsson,et al.  A critical perspective , 2005 .

[8]  Jen-Hung Huang,et al.  Herding in online product choice , 2006 .

[9]  David A. Wagner,et al.  Choice Architecture and Smartphone Privacy: There's a Price for That , 2012, WEIS.

[10]  Kai H. Lim,et al.  Effects of conflicting aggregated rating on eWOM review credibility and diagnosticity: The moderating role of review valence , 2012, Decis. Support Syst..

[11]  Jaemin Jung,et al.  Measuring usage concentration of smartphone applications: Selective repertoire in a marketplace of choices , 2014 .

[12]  Werner Wirth,et al.  Heuristic and Systematic Use of Search Engines , 2007, J. Comput. Mediat. Commun..

[13]  Hichang Cho,et al.  A multinational study on online privacy: global concerns and local responses , 2009, New Media Soc..

[14]  Gianfranco Walsh,et al.  Electronic Word-of-Mouth: Motives for and Consequences of Reading Customer Articulations on the Internet , 2003, Int. J. Electron. Commer..

[15]  Gerd Gigerenzer,et al.  The recognition heuristic: How ignorance makes us smart , 1999 .

[16]  Miriam J. Metzger,et al.  Social and Heuristic Approaches to Credibility Evaluation Online , 2010 .

[17]  Xiaoming Hao,et al.  An Information-Processing Model for Audiences' Selections of Movies , 2016, J. Media Psychol. Theor. Methods Appl..

[18]  Henry H. Emurian,et al.  An overview of online trust: Concepts, elements, and implications , 2005, Comput. Hum. Behav..

[19]  M.D.T. de Jong,et al.  Exploring two methods of usability testing: concurrent versus retrospective think-aloud protocols , 2003 .

[20]  S. Shyam Sundar,et al.  News cues: Information scent and cognitive heuristics , 2007, J. Assoc. Inf. Sci. Technol..

[21]  H. Simon,et al.  American Association for Public Opinion Research Bandwagon and Underdog Effects and the Possibility of Election Predictions , 2009 .

[22]  W. Wayne Fu,et al.  The bandwagon effect on participation in and use of a social networking site , 2012, First Monday.

[23]  John Leubsdorf,et al.  Privacy and Freedom , 1968 .

[24]  K. A. Ericsson,et al.  Protocol analysis: Verbal reports as data, Rev. ed. , 1993 .

[25]  Glenn J. Browne,et al.  Cognitive Stopping Rules for Terminating Information Search in Online Tasks , 2007, MIS Q..

[26]  Saraswathi Bellur,et al.  How Can We Tell When a Heuristic Has Been Used? Design and Analysis Strategies for Capturing the Operation of Heuristics , 2014 .

[27]  Malcolm R. Parks,et al.  Cues Filtered Out, Cues Filtered In: Computer-Mediated Communication and Relationships , 2002 .

[28]  Gerd Gigerenzer,et al.  Fast and frugal media choices , 2009 .

[29]  M. Hill,et al.  Consumer privacy and the Internet in Europe: a view from Germany , 2003 .

[30]  Miriam J. Metzger,et al.  Trusting expert- versus user-generated ratings online: The role of information volume, valence, and consumer characteristics , 2013, Comput. Hum. Behav..

[31]  Vyas Sekar,et al.  Measuring user confidence in smartphone security and privacy , 2012, SOUPS.

[32]  Xuxian Jiang,et al.  Unsafe exposure analysis of mobile in-app advertisements , 2012, WISEC '12.

[33]  Cledwyn Fernandez,et al.  The Paradox of Choice: Why More Is Less , 2017 .

[34]  Lorrie Faith Cranor,et al.  Privacy as part of the app decision-making process , 2013, CHI.

[35]  David A. Wagner,et al.  Android permissions: user attention, comprehension, and behavior , 2012, SOUPS.

[36]  Nicholas David Bowman,et al.  Choosing the right app: An exploratory perspective on heuristic decision processes for smartphone app selection , 2015 .

[37]  Walid Maalej,et al.  Us and them: a study of privacy requirements across north america, asia, and europe , 2014, Software Engineering & Management.

[38]  Venkatesh Shankar,et al.  Online trust: a stakeholder perspective, concepts, implications, and future directions , 2002, J. Strateg. Inf. Syst..

[39]  Gerald L. Lohse,et al.  International Differences in Information Privacy Concerns: A Global Survey of Consumers , 2004, Inf. Soc..

[40]  Lee Rainie,et al.  Privacy and information sharing , 2016 .

[41]  S. Sundar The MAIN Model : A Heuristic Approach to Understanding Technology Effects on Credibility , 2007 .

[42]  Gerd Gigerenzer,et al.  Heuristic decision making. , 2011, Annual review of psychology.

[43]  Jean-Paul Dionne,et al.  Accessing Problem-Solving Strategy Knowledge: The Complementary Use of Concurrent Verbal Protocols and Retrospective Debriefing. , 2000 .

[44]  Michelle Salmona,et al.  Online Social Networking across Cultures: An Exploration of Divergent and Common Practices , 2013 .

[45]  Glen L. Urban,et al.  Online Trust: State of the Art, New Frontiers, and Research Potential , 2009 .

[46]  Sophie Cockcroft,et al.  The relationship between culture and information privacy policy , 2015, Electronic Markets.

[47]  Alice H. Eagly,et al.  Heuristic and systematic information processing within and beyond the persuasion context. , 1989 .

[48]  Joseph Gray Jackson,et al.  Privacy and Freedom , 1968 .

[49]  S. Rosen The Economics of Superstars , 1981 .