Between privacy and security: the factors that drive intentions to use cyber-security applications

Installing security applications is a common way to protect against malicious apps, phishing emails, and other threats in mobile operating systems. While these applications can provide essential se...

[1]  Spyros Kokolakis,et al.  Privacy attitudes and privacy behaviour: A review of current research on the privacy paradox phenomenon , 2017, Comput. Secur..

[2]  Edith G. Smit,et al.  The privacy trade-off for mobile app downloads: The roles of app value, intrusiveness, and privacy concerns , 2018, Decis. Support Syst..

[3]  Wenjing Xie,et al.  Revealing the relationship between rational fatalism and the online privacy paradox , 2018, Behav. Inf. Technol..

[4]  Ninghui Li,et al.  Influence of Risk/Safety Information Framing on Android App-Installation Decisions , 2015 .

[5]  Jorge Cadima,et al.  Principal component analysis: a review and recent developments , 2016, Philosophical Transactions of the Royal Society A: Mathematical, Physical and Engineering Sciences.

[6]  Akira Yamada,et al.  Self-Confidence Trumps Knowledge: A Cross-Cultural Study of Security Behavior , 2017, CHI.

[7]  Claudio Bettini,et al.  The Privacy Implications of Cyber Security Systems , 2018, ACM Comput. Surv..

[8]  Adam J. Aviv,et al.  An empirical study examining the perceptions and behaviours of security-conscious users of mobile authentication , 2018, Behav. Inf. Technol..

[9]  César A. Hidalgo,et al.  Unique in the Crowd: The privacy bounds of human mobility , 2013, Scientific Reports.

[10]  I. Ajzen Perceived behavioral control, self-efficacy, locus of control, and the theory of planned behavior. , 2002 .

[11]  H. Kaiser The Application of Electronic Computers to Factor Analysis , 1960 .

[12]  I. Ajzen The theory of planned behavior , 1991 .

[13]  Sven Jöckel,et al.  Processing privacy information and decision-making for smartphone apps among young German smartphone users , 2018, Behav. Inf. Technol..

[14]  Joey F. George,et al.  The theory of planned behavior and Internet purchasing , 2004, Internet Res..

[15]  Anurag Kumar Jain,et al.  Addressing Security and Privacy Risks in Mobile Applications , 2012, IT Professional.

[16]  Colin Potts,et al.  Privacy practices of Internet users: Self-reports versus observed behavior , 2005, Int. J. Hum. Comput. Stud..

[17]  Naresh K. Malhotra,et al.  Internet Users' Information Privacy Concerns (IUIPC): The Construct, the Scale, and a Causal Model , 2004, Inf. Syst. Res..

[18]  Corrado Moiso,et al.  Anonymous or Not? Understanding the Factors Affecting Personal Mobile Data Disclosure , 2017, ACM Trans. Internet Techn..

[19]  Jesse J. Chandler,et al.  Inside the Turk , 2014 .

[20]  KokolakisSpyros Privacy attitudes and privacy behaviour , 2017 .

[21]  E. Ramsey,et al.  Trust considerations on attitudes towards online purchasing: The moderating effect of privacy and security concerns , 2010 .

[22]  Murat Koyuncu,et al.  Security Awareness Level of Smartphone Users: An Exploratory Case Study , 2019, Mob. Inf. Syst..

[23]  Ninghui Li,et al.  Influence of privacy priming and security framing on mobile app selection , 2018, Comput. Secur..

[24]  Steven Furnell,et al.  Awareness of Mobile Device Security: A Survey of User's Attitudes , 2016, Int. J. Mob. Comput. Multim. Commun..

[25]  Gaurav Bansal,et al.  Distinguishing between Privacy and Security Concerns: An Empirical Examination and Scale Validation , 2017, J. Comput. Inf. Syst..

[26]  Ming-Chuen Chuang,et al.  The Kano model analysis of features for mobile security applications , 2018, Comput. Secur..

[27]  Brajendra Panda,et al.  Evaluating damage from cyber attacks: a model and analysis , 2001, IEEE Trans. Syst. Man Cybern. Part A.

[28]  Henry E. Newkirk,et al.  An Empirical Investigation of Factors that Influence Individual Behavior toward Changing Social Networking Security Settings , 2016, J. Theor. Appl. Electron. Commer. Res..

[29]  Carlos Flavián,et al.  The role of security, privacy, usability and reputation in the development of online banking , 2007, Online Inf. Rev..