Privacy concerns for mobile app download: An elaboration likelihood model perspective

In the mobile age, protecting users' information from privacy-invasive apps becomes increasingly critical. To precaution users against possible privacy risks, a few Android app stores prominently disclose app permission requests on app download pages. Focusing on this emerging practice, this study investigates the effects of contextual cues (perceived permission sensitivity, permission justification and perceived app popularity) on Android users' privacy concerns, download intention, and their contingent effects dependent on users' mobile privacy victim experience. Drawing on Elaboration Likelihood Model, our empirical results suggest that perceived permission sensitivity makes users more concerned about privacy, while permission justification and perceived app popularity make them less concerned. Interestingly, users' mobile privacy victim experience negatively moderates the effect of permission justification. In particular, the provision of permission justification makes users less concerned about their privacy only for those with less mobile privacy victim experience. Results also reveal a positive effect of perceived app popularity and a negative effect of privacy concerns on download intention. This study provides a better understanding of Android users' information processing and the formation of their privacy concerns in the app download stage, and proposes and tests emerging privacy protection mechanisms including the prominent disclosure of app permission requests and the provision of permission justifications. We focus on Android users' privacy decision-making in app download stage.Perceived permission sensitivity makes users more concerned for privacy.Permission justification makes users less concerned for privacy.Perceived app popularity make users less concerned for privacy.Mobile privacy victim experience reduces the alleviating effect of permission justification on privacy concerns.

[1]  David A. Wagner,et al.  I've got 99 problems, but vibration ain't one: a survey of smartphone users' concerns , 2012, SPSM '12.

[2]  Tao Zhou,et al.  Understanding users' initial trust in mobile banking: An elaboration likelihood perspective , 2012, Comput. Hum. Behav..

[3]  Yunjie Calvin Xu,et al.  Relevance judgments of mobile commercial information , 2014, J. Assoc. Inf. Sci. Technol..

[4]  Matthew L. Jensen,et al.  Using an elaboration likelihood approach to better understand the persuasiveness of website privacy assurance cues for online consumers , 2012, J. Assoc. Inf. Sci. Technol..

[5]  Byung-Gon Chun,et al.  TaintDroid: An Information-Flow Tracking System for Realtime Privacy Monitoring on Smartphones , 2010, OSDI.

[6]  Mayuram S. Krishnan,et al.  The Personalization Privacy Paradox: An Empirical Evaluation of Information Transparency and the Willingness to be Profiled Online for Personalization , 2006, MIS Q..

[7]  Paul C. van Oorschot,et al.  A methodology for empirical analysis of permission-based security models and its application to android , 2010, CCS '10.

[8]  Jeremy Clark,et al.  Understanding and improving app installation security mechanisms through empirical analysis of android , 2012, SPSM '12.

[9]  Anol Bhattacherjee,et al.  Influence Processes for Information Technology Acceptance: An Elaboration Likelihood Model , 2006, MIS Q..

[10]  C. Farn,et al.  Investigating Initial Trust Toward E-tailers from the Elaboration Likelihood Model Perspective , 2006 .

[11]  James B. Wilcox,et al.  The persuasive impact of reported group opinions on individuals low vs. high in need for cognition: Rationalization vs. biased elaboration? , 2000 .

[12]  Hock-Hai Teo,et al.  The Role of Push-Pull Technology in Privacy Calculus: The Case of Location-Based Services , 2009, J. Manag. Inf. Syst..

[13]  Rebeca San José-Cabezudo,et al.  The Combined Influence of Central and Peripheral Routes in the Online Persuasion Process , 2009, Cyberpsychology Behav. Soc. Netw..

[14]  Deborah J. MacInnis,et al.  Focal and emotional integration: Constructs, measures, and preliminary evidence , 1993 .

[15]  Rathindra Sarathy,et al.  Understanding Situational Online Information Disclosure as a Privacy Calculus , 2010, J. Comput. Inf. Syst..

[16]  Andrew J. Rohm,et al.  Consumer Privacy and Name Removal across Direct Marketing Channels: Exploring Opt-In and Opt-Out Alternatives , 2000 .

[17]  J. Cacioppo,et al.  Central and Peripheral Routes to Advertising Effectiveness: The Moderating Role of Involvement , 1983 .

[18]  Heng Xu,et al.  Information privacy and correlates: an empirical attempt to bridge and distinguish privacy-related concepts , 2013, Eur. J. Inf. Syst..

[19]  Kai Lung Hui,et al.  Inducing Customers to Disclose Personal Information to Internet Businesses with Social Adjustment Benefits , 2004, ICIS.

[20]  Rathindra Sarathy,et al.  The role of affect and cognition on online consumers' decision to disclose personal information to unfamiliar online vendors , 2011, Decis. Support Syst..

[21]  Steve Hanna,et al.  Android permissions demystified , 2011, CCS '11.

[22]  Bin Gu,et al.  Informational Cascades and Software Adoption on the Internet: An Empirical Investigation , 2008, MIS Q..

[23]  David A. Wagner,et al.  Android permissions: user attention, comprehension, and behavior , 2012, SOUPS.

[24]  Jörg Henseler,et al.  Testing Moderating Effects in PLS Path Models. An Illustration of Available Procedures , 2005 .

[25]  Naresh K. Malhotra,et al.  Internet Users' Information Privacy Concerns (IUIPC): The Construct, the Scale, and a Causal Model , 2004, Inf. Syst. Res..

[26]  Ingoo Han,et al.  The Effect of On-Line Consumer Reviews on Consumer Purchasing Intention: The Moderating Role of Involvement , 2007, Int. J. Electron. Commer..

[27]  David Gefen,et al.  The Moderating Influence of Privacy Concern on the Efficacy of Privacy Assurance Mechanisms for Building Trust: A Multiple-Context Investigation , 2008, ICIS.

[28]  David A. Wagner,et al.  How to Ask for Permission , 2012, HotSec.

[29]  Lorrie Faith Cranor,et al.  A "nutrition label" for privacy , 2009, SOUPS.

[30]  Peter Buxmann,et al.  Will You Accept an App? Empirical Investigation of the Decisional Calculus Behind the Adoption of Applications on Facebook , 2013, ICIS.

[31]  Ritu Agarwal,et al.  Adoption of Electronic Health Records in the Presence of Privacy Concerns: The Elaboration Likelihood Model and Individual Persuasion , 2009, MIS Q..

[32]  David J. Ketchen,et al.  AN ASSESSMENT OF THE USE OF STRUCTURAL EQUATION MODELING IN STRATEGIC MANAGEMENT RESEARCH , 2004 .

[33]  Heng Xu,et al.  Information Privacy Research: An Interdisciplinary Review , 2011, MIS Q..

[34]  Lorrie Faith Cranor,et al.  A Conundrum of Permissions: Installing Applications on an Android Smartphone , 2012, Financial Cryptography Workshops.

[35]  Heng Xu,et al.  Information Privacy Concerns: Linking Individual Perceptions with Institutional Privacy Assurances , 2011, J. Assoc. Inf. Syst..

[36]  J. Cacioppo,et al.  Personal involvement as a determinant of argument based persuasion , 1981 .

[37]  Vishal Midha,et al.  Impact of consumer empowerment on online trust: An examination across genders , 2012, Decis. Support Syst..

[38]  S. Chaiken,et al.  Promoting systematic processing in low-motivation settings: effect of incongruent information on processing and judgment. , 1991, Journal of personality and social psychology.

[39]  Richard E. Petty,et al.  Increasing the Effectiveness of Communications to Consumers: Recommendations Based on Elaboration Likelihood and Attitude Certainty Perspectives , 2006 .

[40]  Elena Kolesnikova,et al.  "It Won't Happen To Me!": Self-Disclosure in Online Social Networks , 2009, AMCIS.

[41]  M. Culnan,et al.  Information Privacy Concerns, Procedural Fairness, and Impersonal Trust: An Empirical Investigation , 1999 .

[42]  Janine L. Spears The Effects of Notice versus Awareness: An Empirical Examination of an Online Consumer's Privacy Risk Treatment , 2013, 2013 46th Hawaii International Conference on System Sciences.

[43]  Paul L. Sauer,et al.  The combined influence hypothesis: Central and peripheral antecedents of attitude toward the ad , 1995 .

[44]  Hock-Hai Teo,et al.  Research Note - Effects of Individual Self-Protection, Industry Self-Regulation, and Government Regulation on Privacy Concerns: A Study of Location-Based Services , 2012, Inf. Syst. Res..

[45]  Paul Benjamin Lowry,et al.  Information Disclosure on Mobile Devices: Re-Examining Privacy Calculus with Actual User Behavior , 2013, Int. J. Hum. Comput. Stud..

[46]  John Zimmerman,et al.  Are you close with me? are you nearby?: investigating social groups, closeness, and willingness to share , 2011, UbiComp '11.

[47]  Alessandro Acquisti,et al.  Information revelation and privacy in online social networks , 2005, WPES '05.

[48]  C. Fornell,et al.  Evaluating structural equation models with unobservable variables and measurement error. , 1981 .

[49]  David Gefen,et al.  The impact of personal dispositions on information sensitivity, privacy concern and trust in disclosing health information online , 2010, Decis. Support Syst..

[50]  Traci Carte,et al.  In Pursuit of Moderation: Nine Common Errors and Their Solutions , 2003, MIS Q..

[51]  J. Cacioppo,et al.  Issue involvement can increase or decrease persuasion by enhancing message-relevant cognitive responses. , 1979 .

[52]  Tamara Dinev,et al.  An Extended Privacy Calculus Model for E-Commerce Transactions , 2006, Inf. Syst. Res..

[53]  H. Becker,et al.  The Use of Vignettes in Survey Research , 1978 .