How smartphone users assess the value/risk trade-off of apps: An observational study

The rapid and worldwide diffusion of applications for smartphones (apps hereafter) has produced a complex ecosystem composed by users, apps, developers and vendors with sometimes contrasting and sometimes matching interests. In the literature, this ecosystem has been investigated from multiple perspectives with different kinds of empirical approaches, however some crucial dimensions are still unexplored. In this paper we adopt the perspective of Requirements Engineering. We are interested in collecting empirical observations on users' perception of the risks associated to apps when they decide about which app to select and install on their smartphone. Which apps' requirements do users consider? How do they evaluate them with respect to benefits, security and privacy risks? How users decide about this is still unclear. We think that relevant variables and underlying dynamics must be identified before we can successfully conduct large-scale controlled experiments, as it is already done in other fields of software engineering. This paper presents the design of an observational study proposed to explore how users assess features and costs/risks when installing apps. The experimental design is then validated and adopted in a feasibility study with a limited set of participants. Preliminary findings are summarised in a set of observations and then discussed in terms of their potential impacts on the app ecosystem.

[1]  Norbert Seyff,et al.  iRequire: Gathering end-user requirements for new apps , 2011, 2011 IEEE 19th International Requirements Engineering Conference.

[2]  K. Perreault,et al.  Research Design: Qualitative, Quantitative, and Mixed Methods Approaches , 2011 .

[3]  Mariano Ceccato,et al.  An empirical study about the effectiveness of debugging when random test cases are used , 2012, 2012 34th International Conference on Software Engineering (ICSE).

[4]  Vyas Sekar,et al.  Measuring user confidence in smartphone security and privacy , 2012, SOUPS.

[5]  Harry Bouwman,et al.  Consumer lifestyles: alternative adoption patterns for advanced mobile services , 2012, Int. J. Mob. Commun..

[6]  Anol Bhattacherjee Social Science Research: Principles, Methods, and Practices , 2012 .

[7]  Claes Wohlin,et al.  Experimentation in software engineering: an introduction , 2000 .

[8]  William Enck,et al.  Defending Users against Smartphone Apps: Techniques and Future Directions , 2011, ICISS.

[9]  Mikio Aoyama,et al.  Persona-and-scenario based requirements engineering for software embedded in digital consumer products , 2005, 13th IEEE International Conference on Requirements Engineering (RE'05).

[10]  Andreas Herrmann,et al.  Conjoint Measurement: Methods and Applications , 2000 .

[11]  Earl R. Babbie,et al.  The practice of social research , 1969 .

[12]  Rainer Koschke,et al.  How do professional developers comprehend software? , 2012, 2012 34th International Conference on Software Engineering (ICSE).

[13]  Alan Cooper,et al.  The Inmates are Running the Asylum , 1999, Software-Ergonomie.

[14]  Jan Bosch,et al.  Bridging Software Communities through Social Networking , 2013, IEEE Softw..

[15]  Alistair Sutcliffe,et al.  Requirements elicitation: Towards the unknown unknowns , 2013, 2013 21st IEEE International Requirements Engineering Conference (RE).

[16]  Harry Bouwman,et al.  Analysis of users and non-users of smartphone applications , 2010, Telematics Informatics.

[17]  Anna Perini,et al.  Mobile Technologies to Enable Users' Informed Decisions , 2018, ICSOFT.