The Impact s of Requested Permission on Mobile App Adoption: The Insights Based on an Experiment in Taiwan

Due to the popularity of smartphones, the number of apps has been growing up rapidly. Users have to grant requested permissions before downloading apps. However, some apps may request more permissions than they need. It may cause the concern of security or privacy. The purpose of this study is to investigate the impacts of requested permissions on users' intention to install mobile apps. We developed the proposed proposal by embedding the social exchange theory into technology acceptance model plus the concept of permission-function fit, perceived privacy-level and perceived privacy risk. We validated the proposed hypotheses with data collected from 389 smartphone users by using experimental design approach. The findings include (1) Users' attitude toward the app positively influences their download intention. (2) Users' perceived usefulness and the ranking of the app positively influence users' attitude toward the app while perceived privacy risk negatively affects users' attitude. Further, if the app requests more permissions than it needs, users have a negative attitude toward it. Overall, perceived usefulness has the strongest effect on attitude. (3) The privacy-level of the requested permissions positively affects users' perception of privacy risk. In addition, if there are over-requested permissions, users perceive higher privacy risk.

[1]  H. Jeff Smith,et al.  Information Privacy: Measuring Individuals' Concerns About Organizational Practices , 1996, MIS Q..

[2]  Christopher P. Furner,et al.  The Role of Mobile Self-Efficacy in the Adoption of Location-Based Applications: An iPhone Experiment , 2011, 2011 44th Hawaii International Conference on System Sciences.

[3]  Szu-Yuan Sun,et al.  Understanding customers' loyalty intentions towards online shopping: an integration of technology acceptance model and fairness theory , 2009, Behav. Inf. Technol..

[4]  N. Swapna Goud,et al.  Effective Risk Communication for Android Apps , 2017 .

[5]  Harry Bouwman,et al.  An assessment of advanced mobile services acceptance: Contributions from TAM and diffusion theory models , 2008, Inf. Manag..

[6]  Astrid Schepman,et al.  An observational study of undergraduate students' adoption of (mobile) note-taking software , 2012, Comput. Hum. Behav..

[7]  Jack Shih-Chieh Hsu,et al.  The effect of unexpected features on app users' continuance intention , 2015, Electron. Commer. Res. Appl..

[8]  Anthony D. Miyazaki,et al.  Consumer Perceptions of Privacy and Security Risks for Online Shopping , 2001 .

[9]  Detmar W. Straub,et al.  Trust and TAM in Online Shopping: An Integrated Model , 2003, MIS Q..

[10]  Doyle Yoon,et al.  Antecedents of mobile app usage among smartphone users , 2016 .

[11]  Kai-Yu Tang,et al.  Exploring the influential factors in continuance usage of mobile social Apps: Satisfaction, habit, and customer value perspectives , 2016, Telematics Informatics.

[12]  C. Pegels,et al.  An Investigation of Consumer-perceived Risk on Electronic Commerce Transactions: The Role of Institutional Trust and Economic Incentive in a Social Exchange Framework , 1998 .

[13]  M. Bauer Exchange And Power In Social Life , 2016 .

[14]  Pern Hui Chia,et al.  Is this app safe?: a large scale study on application permissions and risk signals , 2012, WWW.

[15]  Bernd W. Wirtz,et al.  Understanding consumer acceptance of mobile payment services: An empirical analysis , 2010, Electron. Commer. Res. Appl..

[16]  Hock-Hai Teo,et al.  AIS Electronic , 2013 .

[17]  Chao‐Min Chiu,et al.  Determinants of customer repurchase intention in online shopping , 2009, Online Inf. Rev..

[18]  Chin-Lung Hsu,et al.  Why do people play on-line games? An extended TAM with social influences and flow experience , 2004, Inf. Manag..

[19]  Iryna Pentina,et al.  Exploring privacy paradox in information-sensitive mobile app adoption: A cross-cultural comparison , 2016, Comput. Hum. Behav..

[20]  Elena Karahanna,et al.  Time Flies When You're Having Fun: Cognitive Absorption and Beliefs About Information Technology Usage , 2000, MIS Q..

[21]  C. Fornell,et al.  Evaluating structural equation models with unobservable variables and measurement error. , 1981 .

[22]  M. Laroche,et al.  How to reduce perceived risk when buying online: The interactions between intangibility, product knowledge, brand familiarity, privacy and security concerns , 2014 .

[23]  C. Ruiz-Mafé,et al.  The role of consumer innovativeness and perceived risk in online banking usage , 2009 .

[24]  Lorrie Faith Cranor,et al.  Privacy as part of the app decision-making process , 2013, CHI.

[25]  Byunghwa Yang,et al.  The integrated mobile advertising model: The effects of technology- and emotion-based evaluations , 2013 .

[26]  Alireza Sadeghi,et al.  COVERT: Compositional Analysis of Android Inter-App Permission Leakage , 2015, IEEE Transactions on Software Engineering.

[27]  Fred D. Davis Perceived Usefulness, Perceived Ease of Use, and User Acceptance of Information Technology , 1989, MIS Q..

[28]  Jie Gu,et al.  Privacy concerns for mobile app download: An elaboration likelihood model perspective , 2017, Decis. Support Syst..

[29]  G. C. Homans,et al.  Social Behavior as Exchange , 1958, American Journal of Sociology.

[30]  Rolph E. Anderson,et al.  Multivariate Data Analysis (7th ed. , 2009 .