Description

The purpose of this study was to investigate constructs that influence consumers before deciding to download and install mobile device applications. These constructs include market trust, risk perceptions, privacy concerns, and precautions. Through a survey, a prediction model was created that attempts to predict whether respondents would download applications asking for excessive permissions. The model results indicate those that take more precautions are less likely to download apps requesting excessive permissions. But the precautions taken by participants may be inadequate and may leave consumers with a false since of security. Another key finding is that some consumers may have become desensitized to excessive permissions. These consumers knowingly install apps requesting excessive permissions for reasons such as nothing bad has happened to them before or the app usually has a good reason for requesting questionable permissions. The security implications of permission desensitization and inadequate precautions are discussed.

Share

COinS
 

Mobile Application Installation Influences: Have Mobile Device Users Become Desensitized to Excessive Permission Requests?

The purpose of this study was to investigate constructs that influence consumers before deciding to download and install mobile device applications. These constructs include market trust, risk perceptions, privacy concerns, and precautions. Through a survey, a prediction model was created that attempts to predict whether respondents would download applications asking for excessive permissions. The model results indicate those that take more precautions are less likely to download apps requesting excessive permissions. But the precautions taken by participants may be inadequate and may leave consumers with a false since of security. Another key finding is that some consumers may have become desensitized to excessive permissions. These consumers knowingly install apps requesting excessive permissions for reasons such as nothing bad has happened to them before or the app usually has a good reason for requesting questionable permissions. The security implications of permission desensitization and inadequate precautions are discussed.