2018
DOI: 10.1016/j.cose.2018.06.005
|View full text |Cite
|
Sign up to set email alerts
|

Influence of privacy priming and security framing on mobile app selection

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

4
39
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 24 publications
(43 citation statements)
references
References 20 publications
4
39
0
Order By: Relevance
“…At this stage, app stores present app descriptions and their permission requirements to potential app users. These users are supposed to read and understand the descriptions of an app and review its permission requirements to decide whether to select and install a particular app or not [64]. Users install an app only when its perceived benefits exceed perceived risks [65].…”
Section: Designmentioning
confidence: 99%
See 2 more Smart Citations
“…At this stage, app stores present app descriptions and their permission requirements to potential app users. These users are supposed to read and understand the descriptions of an app and review its permission requirements to decide whether to select and install a particular app or not [64]. Users install an app only when its perceived benefits exceed perceived risks [65].…”
Section: Designmentioning
confidence: 99%
“…For example, the authors of [39,[44][45][46] used app permissions to determine its access to sensitive user data and critical device features for calculating app risks. As Android uses a privacy self-management model and users grant or deny different permissions to an app after evaluating the costs and benefits of a function that the app is offering, users are supposed to be familiar with the sensitivity of different permissions [64].…”
Section: Designmentioning
confidence: 99%
See 1 more Smart Citation
“…Then, the rightmost column, PII class was filled by the user choice. Therefore, based on user 'X"s opinion (1) biometric ID was given with legal consent as a result of permitting camera, record_audio, body_sensors and use_fingerprint; (2) location was given with legal consent as a result of permitting read_ext_storage, read_calendar, access_network and access_coarse_location and (3) contact number was given with legal consent as a result of permitting call_phone, send_sms, get_account and read_call_log. The dataset used by this study contained similar information like Table 6.…”
Section: Appl Sci 2019 9 X For Peer Review 11 Of 26mentioning
confidence: 99%
“…Since the media content consumption trend is concentrated on mobile devices, the risk of personal data leakage in this environment is getting higher. Once, a company receives personal data, it not only just analyzes data but also trades to other companies as a business policy [1]. Once compromised, invaders can use the data to regain personally identifiable information (PII) and potential personally identifiable information (PPII) or partial identity to harm the users by social engineering attacks.…”
Section: Introductionmentioning
confidence: 99%