Privacy concerns for mobile app download: An elaboration likelihood model perspective Jie Gu, Yunjie (Calvin) Xu, Heng Xu, Cheng Zhang, Hong Ling PII: DOI: Reference:
S0167-9236(16)30178-6 doi:10.1016/j.dss.2016.10.002 DECSUP 12779
To appear in:
Decision Support Systems
Received date: Revised date: Accepted date:
20 November 2014 20 October 2016 24 October 2016
Please cite this article as: Jie Gu, Yunjie (Calvin) Xu, Heng Xu, Cheng Zhang, Hong Ling, Privacy concerns for mobile app download: An elaboration likelihood model perspective, Decision Support Systems (2016), doi:10.1016/j.dss.2016.10.002
This is a PDF file of an unedited manuscript that has been accepted for publication. As a service to our customers we are providing this early version of the manuscript. The manuscript will undergo copyediting, typesetting, and review of the resulting proof before it is published in its final form. Please note that during the production process errors may be discovered which could affect the content, and all legal disclaimers that apply to the journal pertain.
ACCEPTED MANUSCRIPT
Privacy Concerns for Mobile App Download: An Elaboration Likelihood Model
IP
T
Perspective
SC R
ABSTRACT
In the mobile age, protecting users’ information from privacy-invasive apps becomes increasingly critical. To precaution users against possible privacy risks, a
NU
few Android app stores prominently disclose app permission requests on app
MA
download pages. Focusing on this emerging practice, this study investigates the effects of contextual cues (perceived permission sensitivity, permission justification
D
and perceived app popularity) on Android users’ privacy concerns, download
TE
intention, and their contingent effects dependent on users’ mobile privacy victim
CE P
experience. Drawing on Elaboration Likelihood Model, our empirical results suggest that perceived permission sensitivity makes users more concerned about privacy, while permission justification and perceived app popularity make them less concerned.
AC
Interestingly, users’ mobile privacy victim experience negatively moderates the effect of permission justification. In particular, the provision of permission justification makes users less concerned about their privacy only for those with less mobile privacy victim experience. Results also reveal a positive effect of perceived app popularity and a negative effect of privacy concerns on download intention. This study provides a better understanding of Android users’ information processing and the formation of their privacy concerns in the app download stage, and proposes and tests emerging privacy protection mechanisms including the prominent disclosure of app permission
1
ACCEPTED MANUSCRIPT
T
requests and the provision of permission justifications.
AC
CE P
TE
D
MA
NU
SC R
permission request, Elaboration Likelihood Model.
IP
Keywords: Privacy concerns, mobile applications, download intention, app
2
ACCEPTED MANUSCRIPT
1. INTRODUCTION
T
Mobile app market has undergone tremendous growth in recent years. Gartner
IP
reported that the worldwide downloads of mobile apps will reach 179 billion in 2015,
SC R
up from 63 billion in 2012 [23]. Many mobile apps provide localized and personalized services anytime and anywhere, such as real-time navigation, mobile social networking, mobile banking services, and etc. Despite the attractiveness of mobile
NU
apps, their unprecedented access to personal information opens a new door to mobile
MA
privacy invasion [44, 45]. Privacy-invasive apps are apps that collect personal information unnecessary for the functionality of the app, use information for
D
unauthorized purposes, or perform unauthorized information transmission [18, 21]. An
TE
investigation in 2012 revealed that more than 100,000 Android apps collected users’
CE P
location and contact information that was far beyond their stated functions [45]. It has also been reported that the number of Android apps which could potentially leak users’
AC
financial information increased by 500% in the second half of 2013 [44]. Privacy-invasive apps may not be easy to detect. Both technical tools and user precautions are needed. Not surprisingly, more and more Android users expressed concerns about information privacy [20]. A growing body of research has focused on mobile privacy issues pertaining to Android apps. Android Operating System follows a permission-based model which asks for users’ authorization to the permissions requested by an app at installation time [9]. A permission request is a demand of an app to control the mobile device and use personal information stored in the device, such as a request to vibrate the device, to
3
ACCEPTED MANUSCRIPT
access a user’s precise location through GPS, or to read a user’s contact information.
T
A few studies have found that the Android installation-time permission requests failed
IP
to attract users’ attention [20, 21]. Researchers also developed technical tools to better
SC R
detect privacy-invasive apps at app runtime – a stage when apps could bring substantial harms to users’ information privacy [17, 18]. Although prior research explored mobile privacy in app installation stage [20, 21] and runtime stage [17, 18],
NU
there has been little research examining mobile users’ privacy concerns in app
MA
download stage.
This study addresses Android users’ privacy concerns in app download stage.
D
Taking a context-specific perspective, this study defines privacy concerns as the
TE
extent to which Android users concern about the possible loss of privacy when they
CE P
are deciding whether to download an app. App download stage is critical for two reasons. First, for users, the download stage can be the first layer of defense against
AC
privacy-invasive apps. Recently, some Android app stores prominently disclose app permission requests on app download pages. The disclosed permission requests inform users of the personal information that an app will have access to. This practice gives users an opportunity to evaluate privacy concerns in download stage. Secondly, the profits of both app stores and developers are largely based on app downloads. To better understand users’ download decision-making, it is imperative for practitioners to learn the formation and the effect of users’ privacy concerns in app download stage. Focusing on the emerging practice of permission request disclosure in app download stage, this study seeks to answer the following research questions: How do contextual
4
ACCEPTED MANUSCRIPT
cues influence users’ privacy concerns when permission requests are prominently
T
disclosed in the app download stage? How are the effects of these contextual cues
IP
dependent on users’ past experience?
SC R
To answer these questions, perceived app popularity, perceived permission sensitivity and permission justification are identified as contextual cues that influence users’ privacy concerns and download intention. Perceived app popularity is
NU
identified based on the prevailing practice of reporting downloads of an app. It is a
MA
perception of how popular an app is adopted by other users. Perceived permission sensitivity is identified based on the emerging practice to prominently disclose all
D
permission requests of an app early in download stage. The disclosed permission
TE
requests can be of high or low sensitivity. This study defines perceived permission
CE P
sensitivity as the levels of discomfort users perceive when an app requests certain permissions to control their mobile devices and use their personal information. While
AC
privacy concerns of an app refer to a user’s overall evaluation of the app, perceived permission sensitivity pertains to only one aspect of the practice of the app, i.e. the permission requests. Permission justification is defined as the presence of a statement that declares the purpose of a permission request and the subsequent handling of collected information. A justification statement aims to justify an app’s request for permission. Although justification of information collection is not new in commercial websites [27, 50], no app store that adopts the permission request disclosure practice has provided justifications for such requests on app download pages. This study proposes permission justification as a new contextual cue, and investigates its effect
5
ACCEPTED MANUSCRIPT
on Android users’ privacy concerns.
T
Elaboration Likelihood Model (ELM) is employed as the theoretical foundation
IP
for this study. ELM posits that information processing occurs through two cognitive
SC R
routes, the central route and the peripheral route, which differ in the amount of cognitive elaboration [41, 43]. Drawing on ELM, we conceptualize perceived permission sensitivity and permission justification as two central cues and perceived
NU
app popularity as a peripheral cue to affect users’ privacy concerns. We further
MA
consider a user’s mobile privacy victim experience as a contingent determinant of privacy elaboration, i.e. the amount of thinking users devote to the consideration of
D
app privacy. Our results show that perceived permission sensitivity makes users more
TE
concerned about privacy while perceived app popularity makes users less concerned.
CE P
More interestingly, we found that the effect of permission justification on privacy concerns highly depends on users’ mobile privacy victim experience. This study contributes to existing privacy research by systematically examining
AC
users’ information processing and the formation of privacy concerns in app download stage. This study explains how perceived permission sensitivity, permission justification and perceived app popularity take their effects through users’ elaboration process. In particular, we provide a contingent explanation of how the effects of these contextual cues vary with users’ past privacy experiences. The rest of the paper proceeds as follows. In section 2, we review literature on information privacy and context-specific privacy concerns, privacy studies pertaining to mobile apps, and ELM research. In section 3, we develop the logic underlying our
6
ACCEPTED MANUSCRIPT
research hypotheses. This is followed by section 4 with a description of the research
T
method. Section 5 provides details of data analysis and our findings. This paper
IP
concludes with a discussion of the results and the implications of findings in section 6.
SC R
2. LITERATURE REVIEW
Three streams of research form the theoretical foundation of this study. We first present a brief overview of information privacy research and identify the
NU
context-specific perspective of privacy concerns for this study. Then we focus on
MA
privacy studies pertaining to mobile apps that are most relevant to our research context. We further review ELM that guides the development of our research model.
D
2.1 Information privacy and context-specific privacy concerns
TE
Information privacy is an important research topic in Information System (IS). A
CE P
rich stream of privacy research has examined the effect of privacy concerns on individuals’ privacy-related responses. A general conclusion of these studies is that
AC
individuals’ privacy concerns can hinder their willingness to accept new technologies [2], engage in e-commerce [14] or disclose personal information [34]. Recently, researchers have taken a context-specific approach to study privacy concerns. According to Xu et al. [54], context-specific privacy concerns “tie the individuals’ assessments of privacy concerns to a specific context with a specific external agent (p.1344)”. Compared with the notion of general privacy concerns which is defined as individuals’ inherent propensity toward privacy protection, the context-specific conceptualization suggests that privacy concerns not only vary across individuals, but also depend on situational factors in a particular context [54]. The
7
ACCEPTED MANUSCRIPT
notion of context-specific privacy concerns extends privacy research from focusing on
T
the consequences of general privacy concerns to investigating the effects of
IP
context-specific antecedents. For example, researchers have examined how certain
SC R
contextual cues, such as privacy icons, can be leveraged to influence subsequent privacy behaviors [28]. Malhotra et al. [37] suggested that a complete understanding of privacy-related reactions can only be achieved by examining privacy concerns in a
NU
specific context.
MA
2.2 Privacy studies pertaining to Android apps
A growing body of literature has focused on privacy issues in Android system due
D
to its large market share and its vulnerabilities to privacy-invasive apps [21]. An
TE
Android user typically goes through three stages of app-related decision-making:
CE P
download stage, installation stage and runtime stage. A few studies have investigated users’ perceptions of permission requests in app installation stage. Kelley et al. found that the jargon-filled description of permission requests at installation time is hard for
AC
users to understand [28]. Felt et al. indicated that users’ overriding desire to complete the primary task of app installation reduces their attention to the installation-time permission requests [19]. Other studies have examined users’ responses to apps’ information requests during the runtime. Particularly, a few studies examined users’ willingness to share their location when they run location-sensitive apps in pursuit of personalized and localized services [52, 55]. Technical work on Android privacy protection mainly focused on tracking the information flow during the runtime in order to detect privacy-invasive apps [17, 18].
8
ACCEPTED MANUSCRIPT
While prior studies have investigated mobile app privacy issues in the stages of
T
app installation and runtime, users’ privacy concerns in app download stage has not
IP
been systematically examined. Unlike iOS, mobile apps published to Android are not
SC R
pre-screened for potential privacy threats and security attacks [9]. The openness of Android system attracts a large number of privacy-invasive apps. Therefore, it is desirable for users to be informed of app permission requests before downloading, so
NU
that they can add the potential privacy risks of an app into download decision-making.
MA
However, app stores vary in their disclosure of app permission requests. For example, some app stores (e.g., app.baidu.com) do not disclose app permission
D
requests. Although Google Play does disclose app permission requests, the link of
TE
“permission detail” is buried deeply at the bottom of the app download page. A few
CE P
other app stores, such as mumayi.com, disclose permission requests at a prominent place on app download page.
AC
This study focuses on an Android app download context where app permission requests are prominently disclosed. Specifically, we study users’ elaboration of contextual cues in relation to their privacy concerns and download intention. This study identifies the main contextual cues and explains their effects on privacy concerns based on ELM. 2.3 Elaboration likelihood model (ELM) ELM provides a useful framework to understand how individuals process persuasive information. ELM is suitable for this study for two reasons. First, users’ app download decision-making often involves their processing of app-related
9
ACCEPTED MANUSCRIPT
information. Second, developers often make their best effort to present their apps on
T
download page in order to promote the app and to attract users. Therefore, the overall
IP
presentation of apps is a persuasive message.
SC R
ELM takes a process-oriented approach to explain how persuasion occurs via two distinct routes: central route and peripheral route [42, 43]. The central route of information processing involves extensive cognitive efforts, through which
NU
individuals think deliberately in an attempt to uncover all pros and cons of an issue. In
MA
the peripheral route of information processing, however, individuals tend to devote a limited cognitive effort. Their attitude is primarily formed by the association and
D
inference of contextual shortcuts such as the endorser of an issue, rather than the
TE
indigenous quality of the issue.
CE P
The route taken by an individual is contingent on the elaboration likelihood [42]. Elaboration refers to the amount of thinking individuals put forth in scrutinizing an
AC
issue. The extent of elaboration is determined by one’s motivation and ability to process available information. When individuals are motivated and able to evaluate information content, they are high in elaboration and tend to take the central route to assess messages. In contrast, those with no motivation or ability to process central messages are often low in elaboration and rely mostly on peripheral cues to form an attitude. Motivational factors identified in prior ELM studies include perceived relevance of information [2, 10], personal involvement [41, 42] and need for cognition [3, 47]. Ability factors in prior ELM studies include topic-relevant experience and knowledge that enhance individuals’ cognitive ability to process persuasive
10
ACCEPTED MANUSCRIPT
information [2, 10].
T
Recently, ELM has been extended to privacy research. The study by Yang et al.
IP
[56] is one of the first to use ELM to examine the effect of third-party seals in an
SC R
Internet shopping context. They found that the presence of third-party seals is a peripheral cue which positively influenced customers’ initial trust toward an e-tailer. They also suggested that the effect of product information quality outweighs the
NU
presence of third-party seals for customers with high product involvement. Bansal et
MA
al. [6] found that individuals with high general privacy concerns base their website trust on the central cue such as quality of privacy statement, whereas those with low
D
general privacy concerns are more influenced by the peripheral cue such as the
TE
presence of a privacy seal. In the context of mobile banking, Zhou [57] found that
CE P
self-efficacy moderated the effect of central variables such as information quality and service quality, and the effect of peripheral cues such as system quality, structural
AC
assurance and reputation on customers’ initial trust in mobile banking. 3. RESEARCH MODEL AND HYPOTHESES While typical ELM research takes a general measure of attitudinal evaluation as its main outcome, this research extends ELM to examine the formation of users’ privacy concerns as an outcome of contextual information processing. Drawing on ELM, we propose two central factors, perceived permission sensitivity and permission justification, and a peripheral factor, perceived app popularity, as contextual cues to privacy concerns. According to ELM, an individual’s route of information processing is contingent on the extent of elaboration. This study identifies users’ mobile privacy
11
ACCEPTED MANUSCRIPT
victim experience as a key determinant of privacy elaboration and proposes that the
T
effects of contextual cues are contingent on the level of users’ mobile privacy victim
IP
experience. Furthermore, based on the logic of privacy calculus, we study the effect of
SC R
privacy concerns and perceived app popularity on users’ download intention. 3.1 Central-route processing in app privacy evaluation
When individuals process information through the central route, their attitude is
NU
determined by information that is directly relevant to the communicated topic [56].
MA
Argument quality is considered a central cue in ELM literature [10, 41]. In an advertising context, the central cues include arguments that focus on the functional
D
attributes of a product [35] or address the competitive advantages of the product [32].
TE
In the app download stage, perceived permission sensitivity is central to users’
CE P
privacy concerns. Literature on information privacy has shown that privacy concerns are highly dependent on collected information which can induce different levels of
AC
sensitivity perceptions [7, 13, 37]. Bansal et al. [7] suggested that when individuals use web-based healthcare services, they concern about revealing health information when they perceive the information to be sensitive. Since the perception of information sensitivity is directly related to privacy concerns, it is expected to be central in individuals’ privacy consideration. Following this perspective, perceived permission sensitivity is likely to invoke the central route of information processing in forming privacy concerns: when app permission requests are prominently disclosed, users are likely to be engaged in the evaluation of the sensitivity of requested permissions. Users who perceive a higher level of permission sensitivity will be more
12
ACCEPTED MANUSCRIPT
concerned about the potential damage of unintended information leak and misuse. Thus we hypothesize:
IP
T
Hypothesis 1: Perceived permission sensitivity is positively related to users’
SC R
privacy concerns for mobile app download.
Permission justification informs users how collected information will be used and who can have an access to their information. Permission justification invokes
NU
central-route processing because it is a direct explanation of an app’s practice of
MA
information privacy. The Fair Information Practice Principles suggest that the information collector shall inform users with the purpose of information collection
D
and subsequent handling of collected information [12]. The justification for app
TE
permission request is aimed at providing such information. Previous studies have
CE P
proposed that the provision of privacy justification for information collection can alleviate online customers’ privacy concerns [27, 50]. For example, Kelley et al. found
AC
that explaining the purpose of information collection is an effective way to ease customers’ privacy concerns [27]. Spears found that online customers tend to perceive a higher level of privacy assurance when they are notified with a collector’s information practices [50]. In current Android market, app stores have not yet provided permission justification on app download pages. This study introduces permission justification as a new contextual cue in app download stage. We hypothesize: Hypothesis 2: The presence of a permission justification is negatively related to users’ privacy concerns for mobile app download.
13
ACCEPTED MANUSCRIPT
3.2 Peripheral-route processing in app privacy evaluation
T
Individuals taking the peripheral-route processing rely on mental shortcuts and
IP
simple cues to form their attitude. For example, consumers may form a favorable
SC R
attitude of a product just because they like the advertising endorser [42]. In this case, individuals accept an argument because of their belief in the source [2, 46]. Drawing on ELM, we argue that users’ privacy concerns can be influenced by
NU
heuristic processing of perceived app popularity. App popularity is usually represented
MA
as the number of prior adopters [15]. It has been proposed as a peripheral cue in persuasion [10, 40]. Perceived app popularity is not an indigenous attribute of
D
information privacy because it does not reveal any practice of the collection and usage
TE
of users’ personal information. However, users may follow a heuristic thinking that
CE P
“popular app can be trusted”. Users trust a popular product because they believe that earlier adopters should have carefully evaluated the product [15]. In this sense,
AC
although perceived popularity is not a central factor related to privacy concerns, we argue that it alleviates privacy concerns via the peripheral route. Hypothesis 3: Perceived app popularity is negatively related to users’ privacy concerns for mobile app download. 3.3 Moderating effects of privacy victim experience ELM posits elaboration as a contingent factor for information processing [42]. ELM identifies motivation and ability as two antecedents of the extent of elaboration [10]. In our context, we posit that a user’s mobile privacy victim experience represents a key determinant of privacy elaboration for two reasons. First, mobile privacy victim
14
ACCEPTED MANUSCRIPT
experience boosts users’ motivation to deliberate on privacy-related messages. Users
T
who have suffered from mobile privacy invasion would be more concerned for
IP
information privacy [49]. Consequently, they are motivated to attend to and scrutinize
SC R
privacy-related cues in order to make an informed decision. In contrast, those who have little negative experience tend to underestimate the likelihood of mobile privacy invasion [29]. As a result, they lack the motivation to process privacy-related cues.
NU
Second, victim experience increases elaboration by enhancing users’ ability to
MA
evaluate messages related to privacy invasion. If users have suffered from mobile privacy invasion, it is easier for them to recognize privacy-related circumstances and
D
evaluate the possible negative consequences. To summarize, mobile privacy victim
TE
experience influences privacy elaboration by enhancing both users’ motivation and
CE P
ability to process app permission requests and corresponding justifications. Users who have experienced mobile privacy invasion not only have high
AC
elaboration likelihood, but also develop a strong negative attitude toward unfamiliar apps in fear of privacy invasion. According to ELM, biased processing occurs when high-elaboration individuals possess a strong prior attitude. Individuals tend to draw on previous experiences to assess the presented information [42]. Under biased processing, individuals are more inclined to messages that are consistent with their prior experience and established attitude, while take a defensive response to counter-attitudinal messages [46]. Petty and Cacioppo proposed that under the high elaboration condition, the probability of rejecting counter-attitudinal messages and accepting pro-attitudinal messages are both higher than what should be if messages
15
ACCEPTED MANUSCRIPT
are processed objectively [43]. According to the biased information processing
T
argument, we expect that perceived permission sensitivity represents a pro-attitudinal
IP
message for those with more mobile privacy victim experience, while a permission
SC R
justification is likely to be regarded as a counter-attitudinal message. Therefore, the effect of perceived permission sensitivity on privacy concerns is strengthened for users with more mobile privacy victim experience. Meanwhile, permission
NU
justification has a weaker alleviating effect on privacy concerns for these users.
MA
Hypothesis 4: Mobile privacy victim experience positively moderates the effect of perceived permission sensitivity on users’ privacy concerns for mobile app
D
download.
TE
Hypothesis 5: Mobile privacy victim experience negatively moderates the effect
CE P
of permission justification on users’ privacy concerns for mobile app download. Previous research has suggested that the influence of peripheral cues has a greater
AC
impact under low rather than high elaboration condition [42]. When elaboration likelihood is low, individuals do not scrutinize the content of central messages. Instead, they make simple inferences based on peripheral cues [42]. Maheswaran and Chaiken proposed group opinion as a typical peripheral cue to influence a customer’s decision-making [36]. Their study suggested that the influence of group opinion is only significant under low-elaboration condition. In accordance with their findings, we expect that the effect of perceived app popularity to alleviate privacy concerns decreases with users’ mobile privacy victim experience. For users who have less mobile privacy victim experience, they lack motivation and ability to deliberate on
16
ACCEPTED MANUSCRIPT
central privacy-related information such as permission requests. Instead, they rely on
T
easy-to-process cue, such as perceived app popularity, to form their privacy concerns.
IP
In contrast, users with mobile privacy victim experience are motivated to evaluate the
SC R
privacy-related practices of an app. They are less likely to rely on peripheral cues. Hypothesis 6: Mobile privacy victim experience negatively moderates the effect
NU
of perceived app popularity on users’ privacy concerns for mobile app download. 3.4 Privacy calculus in app download intention more comprehensive
picture
of
users’
app download
MA
To provide a
decision-making, we also proposed two hypotheses to account for the effect of
D
perceived app popularity and privacy concerns on download intention based on
TE
privacy calculus theory (PCT). PCT has been considered as “the most useful
CE P
framework for understanding privacy concerns” [55]. Recently, this calculus perspective has been extended to examine users’ mobile app acceptance intention [16,
AC
26]. According to PCT, individuals perform a cost-benefit analysis that accounts for their behavioral decisions in face of privacy concerns. Privacy concerns have been considered as the main cost in information disclosure behavior [33, 54]. If individuals have high context-specific privacy concerns, they would have a low intention to accept a system or interact with a website [33, 54]. In app download stage, it is reasonable to assume that users with high privacy concerns are less likely to download an app. Hypothesis 7: Users’ privacy concerns for mobile app download are negatively related to download intention.
17
ACCEPTED MANUSCRIPT
PCT also posits that benefits can counterbalance privacy concerns in individuals’
T
behavioral decisions. Benefits associated with information disclosure include
IP
economic compensations [30], product attractiveness [30], personalized services [55]
SC R
and social benefits [34]. In our context, perceived app popularity is a benefit sign. It indicates not only the number of choices made by early adopters, but also the product attractiveness [15]. Users are more likely to download an app which they perceive as
NU
popular because popularity signals quality [15]. In particular, if an app that contains
MA
social functions, popularity also signals a network externality effect. The network externality effect suggests that as the number of users increases, so does its value and
D
usefulness. Therefore, potential users are more willing to download the app.
TE
Hypothesis 8: Perceived app popularity is positively related to download
CE P
intention.
Prior studies pointed to a number of additional factors that could influence
AC
individuals’ privacy concerns. To control for the variance explained by these variables, we include them as control variables in our research model: 1. Age [37, 39] and gender [37, 38]. The effects of these two variables on privacy concerns and related privacy behaviors have been widely studied in prior research. For example, Milne and Rohm have found that younger users are more reluctant to disclose their personal information to firms [39]. Midha pointed out that females are more concerned about privacy threat than males. Hence, we control the effects of age and gender in our research model [38]. 2. General privacy concerns [4, 37]. Prior research has recognized general privacy
18
ACCEPTED MANUSCRIPT
concerns as a critical determinant of privacy-related behaviors [4, 37]. For
T
example, Awad and Krishnan found that individuals who are generally more
IP
concerned about information privacy pay more attention to information
SC R
transparency, consequently are less willing to be profiled online [4]. Therefore, we expect that users who have higher general privacy concerns have a lower level of download intention. We also expect that users who concern for privacy in general
NU
are more concerned about mobile privacy in the specific context of app download.
MA
3. The number of installed apps. The number of installed apps is an indicator of mobile users’ app download experience: the more apps one has installed, the more
D
experienced one is with the process of app download. In examining individuals’
TE
privacy concerns toward Internet usage, researchers have found that prior Internet
CE P
experience reduces individuals’ privacy risk beliefs [37]. Likewise, users who have more prior experience with app download tend to have a lower level of privacy
AC
concerns. The full research model is illustrated in Figure 1. INSERT FIGURE 1 HERE
4. RESEARCH METHOD 4.1 Research design A vignette-based survey was used to collect data. A vignette is a manipulated scenario presented to subjects before they answer a questionnaire [1, 51]. Instead of asking subjects to recall their past experience, we designed manipulated vignettes to better put subjects in a new app download scenario and to avoid subjects’ biased recall of only trusted apps. These vignettes represented different combinations of three main
19
ACCEPTED MANUSCRIPT
contextual cues (perceived app popularity, perceived permission sensitivity and the
T
presence or absence of permission justification). Except for the three manipulated
IP
variables, extraneous factors were controlled as constant in vignettes. Subjects were
SC R
randomly assigned to each vignette. The purpose of this experiment-like design was to better establish relationship between manipulated contextual cues and users’ privacy concerns and download intention, while minimizing alternative explanations caused
NU
by extraneous factors.
MA
In each design of vignette, subjects were instructed to download an app named “Delicacy” from an Android app store named “Android App World”. The core function
D
of “Delicacy” was to provide restaurant descriptions and customer reviews. The name
TE
of the app and the name of the app store were both coined to avoid influence from
CE P
extraneous factors such as subjects’ prior knowledge or friends’ recommendations. Subjects were presented with two pages. The first page was an app ranking page
AC
which ranked apps in a descending order of monthly downloads. “Delicacy” was highlighted on this page. The second page was an app download page with app details. The download page was adapted from an actual app store for mundane reality. Users’ comments, app version and developer’s information were omitted. After reading app information, subjects were asked to fill a questionnaire. We created 8 designs of app download vignettes based on 222 combinations of app popularity, permission sensitivity and permission justification. This design was to increase the variance of subjects’ perception of permission sensitivity and app popularity, and to manipulate the presence or absence of permission justification. In
20
ACCEPTED MANUSCRIPT
this way, both subjective perceptions and the presence or absence of permission
T
justification can be considered as exogenous variables, because they were manipulated
IP
by researchers.
SC R
App popularity was manipulated by the position of Delicacy in the ranking list on app ranking page. High popularity was manipulated as the 1st with more than 220,000 downloads, whereas low popularity was manipulated as the 40th with only 300
NU
downloads.
MA
Permission sensitivity was manipulated by both the number of requested permissions and the risk level of permission requests on app download page [16].
D
Android Operating System classifies app permissions into different types according to
TE
risk levels [9]. For example, the permission requests “access to the vibrator” and
CE P
“keeping device screen awake” are considered as of low risk. “Access to location information” and “access to contact information” are considered as of high risk.
AC
Subjects in the low-sensitivity group were presented with only the first two permission requests while those in the high-sensitivity group were presented with all four permission requests. Permission justification was manipulated by the presence or absence of justification statement for each permission request on app download page. In the group with justification, the purpose of each permission request was related to an app function, and subjects were assured that the information collected (if any) will not be transferred to any unauthorized third party. Regarding four permission requests used in our design, their corresponding justifications were as follows. The justification for
21
ACCEPTED MANUSCRIPT
“access to the vibrator” was to “remind users when there is a new announcement”.
T
The justification for “keeping device screen awake” was to “prevent the running
IP
application from being interrupted when the device turns into sleeping mode”. The
SC R
justification for “access to GPS location” was to “provide personalized recommendations of local restaurants; location information will not be disclosed to any unauthorized third party”. The justification for “access to contact list” was to
NU
“enable Delicacy’s social network function (share consumption experiences with
MA
friends anytime, anywhere); user’s contact list will not be disclosed to any unauthorized third party”.
D
4.2 Operationalization of variables
TE
In the research model, permission justification was defined as the presence or
CE P
absence of justifications. Hence it was measured as a binary variable (0 = absence, 1 = presence). Mobile privacy victim experience was measured by a 7-point scale asking
AC
about the frequency of a subject’s prior mobile privacy invasion experience (1 = very infrequently, 7 = very frequently). This one-item question was adapted from online privacy victim scale developed by Malhotra et al. [37]. Items for general privacy concerns were based on the scale of global information privacy concerns from Malhotra et al. [37]. Download intention, perceived app popularity, perceived permission sensitivity and privacy concerns were measured by 7-point multiple-item scales developed for this study. All four subjective constructs were reflective constructs.
22
ACCEPTED MANUSCRIPT
4.3 Pilot study and formal study
T
The instrument was tested in two phases: (1) face-to-face interviews and (2) an
IP
online pilot study of university students recruited from a university mailing list. In the
SC R
first phase, 20 doctoral students were recruited to evaluate the vignette designs. According to their feedbacks, the manipulation of popularity was changed from an initial design of only presenting the number of app downloads to highlighting the app
NU
in a ranking list. In the second phase, 94 valid responses of Android users were
MA
collected to examine the convergent and discriminant validity of survey instruments. According to exploratory factor analysis, our instruments had satisfactory discriminant
D
validity. However, one item for general privacy concerns was dropped as it failed the
TE
convergent validity test1. The online survey also recorded time subjects spent on the
CE P
app download page. We expected that users with more mobile privacy victim experience to spend more time on the elaboration of app information. We regressed the time spent on the download pages on users’ mobile privacy victim experience. The
AC
significant coefficient (β=6.67, p<0.001, R2=0.384) confirmed our prediction. Procedure for the formal study was as follows. We first recruited subjects from a major university in China. University students are representative of smartphone users. In China, university students account for the largest portion of Android usage with highest daily downloads [5]. Meanwhile, university students are common subjects in privacy literatures [24, 53]. We first asked subjects about the Operating System of their phone and the number of apps they have installed. The purpose of the two 1
The item is: “All things considered, mobile app ______ (1=completely won’t, 7=surely will) cause privacy problems.” This item was dropped because it did not load well (factor loading <0.5) on the intended construct. 23
ACCEPTED MANUSCRIPT
questions was to select subjects who were Android users and used apps. Next, subjects
T
were randomly assigned to one of the 8 manipulated vignettes. They read the app
SC R
material and questionnaire were originally in Chinese.
IP
ranking page and download page, and then answered the questionnaire. The vignette
In the formal study, 286 student subjects were recruited. None of them participated in the pilot study. To motivate subjects to complete the vignette-based survey, a small
NU
gift was offered for all subjects regardless of their mobile Operating System. 260
MA
subjects completed the study. According to their answers, 165 were identified as Android users and all of them used mobile apps.
D
We restricted our data analysis to 165 Android users. Among the 165 respondents,
TE
there were 68 males (41.2%) and 97 females (58.8%). The average age of subjects
CE P
was 20. The average number of installed apps was 33. Mann-Whitney tests showed that gender ratio, age and the number of installed apps did not differ significantly
AC
across vignettes. ANOVA revealed that subjects in different vignettes did not differ significantly in terms of their mobile privacy victim experience and general privacy concerns. Hence, the random assignment process was effective. ANOVA also indicated subjects in the high-popularity group perceived a higher level of app popularity (p<0.001) and subjects in the high-sensitivity group perceived a higher level of permission sensitivity (p<0.001). These results suggested that the manipulation of the two subjective constructs were effective in producing perceptual variance between vignettes. In the questionnaire, a single question (i.e. Does the app explain its purpose of requesting access to phone resources and users’ information?
24
ACCEPTED MANUSCRIPT
Yes or No) was developed to check subjects’ awareness of the manipulation on
T
permission justification. Logistic regression showed a significant effect (p<0.01) of
IP
the manipulation on the answer, suggesting that the manipulation of justification was
SC R
successful. 5. DATA ANALYSIS 5.1 Measurement model
NU
We used Partial Least Square (PLS) for data analysis. PLS estimates model
MA
parameters by maximizing the explained variance of endogenous variables in an iterative sequence of ordinary least squares regressions [48]. The estimating procedure
D
of PLS does not require constructs to follow multivariate normality. PLS is also a
TE
suitable tool to test moderating effects [25].
CE P
Before proceeding to hypotheses testing, a confirmatory factor analysis (CFA) was conducted to test the convergent and discriminative validity of the measurement
AC
model for all perceptual constructs. Researchers have proposed three criteria for convergent validity [22]: (1) item loadings on each factor should be significant and greater than 0.7, (2) the average variance extracted (AVE) for each factor should be greater than 0.5, and (3) the composite factor reliability (CFR) and Cronbach’s alpha (α) should be greater than 0.7. According to results in Table 1, the standardized item loadings for items were all significant. The smallest item loading was 0.802 (>0.7). The smallest AVE of construct was 0.732 (>0.5). Further, the smallest value for CFR was 0.857 and the smallest value for α was 0.82; both were greater than 0.7. Hence, the measurement model was satisfactory for convergent validity.
25
ACCEPTED MANUSCRIPT
INSERT TABLE 1 HERE
T
To satisfy discriminant validity of constructs, the square root of AVE for each
IP
construct should exceed the correlations between that construct and all other
SC R
constructs. Results in Table 2 met the discriminant validity criterion. INSERT TABLE 2 HERE 5.2 Structural model
NU
Figure 2 reported the results of model fitting. The results indicated that perceived
MA
permission sensitivity exacerbated privacy concerns (b=0.512, p<0.01), supporting Hypothesis 1. In contrast, the provision of permission justification alleviated privacy
D
concerns (b=-0.510, p<0.01), supporting Hypothesis 2. Perceived app popularity
TE
significantly alleviated privacy concerns (b=-0.148, p<0.01), supporting Hypothesis 3.
CE P
We also hypothesized the interactions between mobile privacy victim experience and contextual cues (H4-6). Following the moderation testing procedure of PLS [25],
AC
however, the moderating effects of past experience on perceived permission sensitivity and perceived app popularity were not significant. Hence Hypothesis 4 and Hypothesis 6 were not supported. This result suggested that perceived permission sensitivity and perceived app popularity had a consistent effect on privacy concerns for all users, regardless of their prior privacy victim experience. Interestingly, mobile privacy victim experience had a significant moderating effect with permission justification on privacy concerns (b=0.539, p<0.05), supporting Hypothesis 5. It suggested that the alleviating effect of justification on privacy concerns was weaker for individuals who had more mobile privacy victim experience. Compared to a
26
ACCEPTED MANUSCRIPT
reduced model without interaction effects, the R2 for privacy concerns increased from 40.5% to 51%. Following Carte and Russell [11], an F-statistic was calculated to test
IP
T
the overall significance of interaction terms. The F-statistic was F(4,152) = 8.143
SC R
(p<0.01), suggesting that the variance explained by the full research model with interaction terms was significantly better than the reduced model with only main
NU
effects.
Results also indicated a significantly negative effect of privacy concerns on
MA
download intention (b=-0.160, p<0.05). This confirmed the importance of privacy concerns in app download and supported Hypothesis 7. Perceived app popularity was
TE
Hypothesis 8 was supported.
D
found to significantly increase download intention (b=0.367, p<0.01), hence
CE P
INSERT FIGURE 2 HERE
Examining control variables in the research model also offered some insights.
AC
Among the control variables, age and the number of installed apps were insignificant to either privacy concerns or download intention. General privacy concerns had a positive effect on privacy concerns for app download (b=0.131, p<0.01). It indicated that those who were more concerned about information privacy in general were also more concerned about privacy in a specific context. However, the effect of general privacy concerns on download intention was not significant. This result implies that in a specific context, it is context-specific privacy concerns rather than general privacy concerns that shape individuals’ behavioral intention. In fact, Li et al. [31] pointed out that the effect of general privacy concerns can be overridden by context-specific
27
ACCEPTED MANUSCRIPT
privacy concerns because individuals are highly influenced by their assessment of
T
contextual cues. Finally, women were more likely to download the app than men (1 =
IP
female, 0 = male; b=0.263, p<0.01).
SC R
6. DISCUSSION AND IMPLICATIONS 6.1 Discussion
This study seeks to uncover the effects of contextual cues on privacy concerns for
NU
mobile app download and to examine how their effects are dependent upon privacy
MA
elaboration. Drawing on ELM, we propose that perceived permission sensitivity and permission justification affect privacy concerns via the central route of information
D
processing. Perceived app popularity is proposed as a peripheral cue to alleviate
TE
privacy concerns. Users’ mobile privacy victim experience serves as a major driver for
CE P
privacy elaboration. Particularly, due to biased information processing, users with more mobile privacy victim experience tend to downplay the counter-attitudinal justification. Our results also suggest that both privacy concerns and perceived app
AC
popularity influence users’ download intention. Overall, this study provides a comprehensive understanding for mobile users’ privacy decision-making in the app download stage in light of these contextual cues. While most of our hypotheses were supported, a few were not. For Hypothesis 4, the interaction between perceived permission sensitivity and mobile privacy victim experience was insignificant. This implies that perceived permission sensitivity is so vital in information privacy that all individuals, regardless of their elaboration level, are influenced by it.
28
ACCEPTED MANUSCRIPT
The hypothesized interaction between perceived app popularity and mobile
T
privacy victim experience (H6) was not significant. A plausible explanation is the
IP
multiple roles of peripheral cues in information processing [10]. Areni et al. [3] found
SC R
high-elaboration individuals not only scrutinize central arguments but also deliberate on peripheral cues of group opinion in a “central” way. From this perspective, a peripheral cue could take its effect through peripheral route for low-elaboration
NU
individuals but acts as a central message for high-elaboration individuals. In this study,
MA
perceived app popularity might have undergone careful elaboration by the group with more mobile privacy victim experience. As a result, regardless of users’ elaboration
D
level, perceived app popularity helped alleviate their privacy concerns.
TE
To generate further insights into the significant interaction between mobile
CE P
privacy victim experience and permission justification, we conducted a follow-up analysis. We first divided the entire sample into two groups based on whether their
AC
mobile privacy victim experience was above or below the sample median. Then we conducted PLS analysis separately for each group. Results confirmed a significant difference in the effect of permission justification on privacy concerns. The path coefficient was -0.263 (p=0.023) for the low-elaboration group, and 0.150 (p>0.1) for the high elaboration group. This additional analysis suggests that although the provision of permission justification generally alleviates privacy concerns as postulated in Hypothesis 2, it is ineffective to alleviate privacy concerns for users with high privacy elaboration as suggested by biased information processing.
29
ACCEPTED MANUSCRIPT
6.2 Implications
T
The contribution of this study to privacy research is multifold. First, this study
IP
provides a better understanding of users’ privacy concerns in app download stage.
SC R
Although a few studies have studied mobile privacy [8, 18, 21], this study identifies the contextual cues and examines their effects on privacy concerns particularly for mobile app download.
NU
Second, this study examines the emerging practice of prominent permission
MA
request disclosure in Android app market. The current practice of most app stores has sadly overlooked the importance of prominent disclosure of app permission requests.
D
This is understandable given their business model which is to attract more app
TE
downloads. However, the prevailing practice does not provide the best privacy
CE P
protection for users. Recently, some app stores prominently disclose app permission requests as a way to precaution users against privacy-invasive apps that over-request permissions. Although the prominent disclosure practice may potentially reduce app
AC
downloads, it indicates app stores’ respect for users’ privacy and thus may benefit developers and app stores in a long term. We investigate this emerging practice and incorporate perceived permission sensitivity as an important contextual cue of privacy concerns. Furthermore, we study another mechanism, permission justification, as a means to enhance the communication between developers and users, so that the welfare of both developers and users are improved. Our results indicate that permission justification does help to alleviate users’ privacy concerns. Third, drawing on ELM, this study takes an information processing perspective in
30
ACCEPTED MANUSCRIPT
examining privacy concerns. In particular, this study proposes the contingent effect of
T
mobile privacy victim experience on privacy concerns. Although mobile privacy
IP
victim experience has been included in a few research models, it was often treated as a
SC R
control variable with no significant effect [33, 37]. Our findings suggest that the effect of permission justification varies to the mobile privacy victim experience of users. If users have experienced more mobile privacy invasion, they would discount the
NU
efficacy of permission justification. This result suggests that there is a spill-over effect
MA
of privacy experience: when users encounter negative privacy experiences from some apps, they tend to doubt about more apps.
D
Our findings also provide practical implications for app developers, app stores and
TE
mobile users. Because the profits for both Android developers and app stores hinge on
CE P
app downloads, it is imperative for them to understand users’ privacy concerns in this stage. First, since perceived permission sensitivity significantly increases privacy
AC
concerns and subsequently discourages download intention, developers shall be careful in requesting app permissions. This includes both the number of permissions and the sensitivity of permissions. Second, if a permission request is necessary for the functionality of an app, it is important for developers to explain the purpose and data protection practice to users, although the provision of justification may not work equally effective for all users. In order to protect users, it is important for app stores to disclose permission requests of apps. The disclosed permission requests and justifications are the two major determinants of privacy concerns in app download. While app stores might be
31
ACCEPTED MANUSCRIPT
concerned about the negative impact of the prominent permission disclosure practice on their revenue, we offer a solution, i.e. permission justification, to achieve a better
IP
T
“win-win” outcome.
SC R
Third, considering the significant effect of perceived app popularity on privacy decision-making, we suggest app stores to highlight the popularity cues on the app download pages. From a user’s perspective, however, we suggest that individual users
NU
should avoid over-relying on app popularity. The insignificant interaction between
MA
perceived app popularity and mobile privacy victim experience implies that even users who have prior privacy victim experience still rely heavily on this cue. The heavy
D
reliance on popularity in privacy decision-making may lead to a herding consequence
TE
that the diffusion of a privacy-invasive app is hard to stop once a critical mass has
CE P
been reached. Thus, individual users should treat app popularity with caution. 6.3 Limitation and future direction
AC
There are several limitations in this study which also suggest opportunities for future research. First, as our vignette design employed only one app, the application of our findings to other types of apps should be treated with caution. Because perceived app popularity, perceived permission sensitivity, and users’ prior privacy experience are constructs general to most apps, we expect these results to be generalizable to other apps. Permission justification operationalized in this study is found to be useful in alleviating users’ privacy concerns. However, in order to facilitate communication between developers and users, future research may explore better mechanisms of permission justification to ease users’ privacy concerns. Second, besides the proposed
32
ACCEPTED MANUSCRIPT
contextual cues, there are other contextual cues, such as other users’ comments of the
T
app and developer’s information, could influence users’ privacy concerns. This study
IP
can serve as a theoretical basis for future examination of other contextual cues. Third,
SC R
our sample consisted of only university students. While they are typical app users, future research may extend to different populations. Fourth, we used a vignette-based survey to avoid biased recall of apps. While this research methodology has its
NU
advantages, subjects’ interactions with the hypothetical app and app store may not
MA
represent actual experience in real world. A field experiment may offer better external validity. Finally, privacy regulation and privacy-related culture in China could be
TE
differences in mobile privacy.
D
different from other countries. Future research may examine the cross-country
CE P
6.4 Conclusion
Mobile privacy is an increasingly important issue with the wide adoption of various smart devices. Because app download stage is the first stage in users’ privacy
AC
consideration, it is important to investigate users’ privacy decision-making in this stage. This study theoretically develops and empirically tests a research model in the Android app download stage. Our findings indicate that perceived permission sensitivity exacerbates privacy concerns while permission justification and perceived app popularity alleviate privacy concerns. More interestingly, we found our operationalization of permission justification alleviates privacy concerns only for users with less mobile privacy victim experience. Results also suggest a positive effect of perceived app popularity and a negative effect of privacy concerns on users’
33
ACCEPTED MANUSCRIPT
download intention. These findings help to enrich the understanding of Android users’
T
information processing and the formation of privacy concerns in app download stage.
IP
This study also offers a practical guidance for developers to communicate permission
SC R
requests using permission justifications, so as to alleviate users’ privacy concerns
AC
CE P
TE
D
MA
NU
induced by the practice of permission request disclosure.
34
ACCEPTED MANUSCRIPT
T
7. REFERENCES
IP
[1] Alexander, C. S., & Becker, H. J. (1978). The use of vignettes in survey research.
SC R
Public Opinion Quarterly. 42(1), p. 93-104.
[2] Angst, C. M., & Agarwal, R. (2009). Adoption of electronic health records in the
NU
presence of privacy concerns: The elaboration likelihood model and individual persuasion. MIS Quarterly. 33(2), p. 339-370.
MA
[3] Areni, C. S., Ferrell, M. E., & Wilcox, J. B. (2000). The persuasive impact of reported group opinions on individuals low vs. high in need for cognition:
D
Rationalization vs. biased elaboration? Psychology and Marketing. 17(10), p. 855 -
TE
875.
CE P
[4] Awad, N. F., & Krishnan, M. S. (2006). The personalization privacy paradox: An empirical evaluation of information transparency and the willingness to be profiled
AC
online for personalization. MIS Quarterly. 30(1), p. 13-28. [5] Baidu (2014). Mobile app distribution report. Retrieved on July 30, 2016, from http://developer.baidu.com/static/assets/reportpdf/%E7%99%BE%E5%BA%A6%E7 %A7%BB%E5%8A%A8%E5%88%86%E5%8F%91%E6%8A%A5%E5%91%8A20 14H1.pdf. [6] Bansal, G., Zahedi, F., & Gefen, D. (2008). The moderating influence of privacy concern on the efficacy of privacy assurance mechanisms for building trust: A multiple-context investigation. In Proceedings of the 29th AIS International Conference on Information Systems. Paris, France. December 14-17.
35
ACCEPTED MANUSCRIPT
[7] Bansal, G., Zahedi, F., & Gefen, D. (2010). The impact of personal dispositions on
T
information sensitivity, privacy concern and trust in disclosing health information
IP
online. Decision Support Systems. 49(2), p. 138-150.
SC R
[8] Barrera, D., Clark, J., McCarney, D., & Van Oorschot, P. C. (2012). Understanding and improving app installation security mechanisms through empirical analysis of Android. In Proceedings of the second ACM Workshop on Security and
NU
Privacy in Smartphones and Mobile Devices. Raleigh, NC, USA. October 16-18. p.
MA
81-92.
[9] Barrera, D., Kayacik, H. G., van Oorschot, P. C., & Somayaji, A. (2010). A
D
methodology for empirical analysis of permission-based security models and its
TE
application to Android. In Proceedings of the 17th ACM Conference on Computer and
CE P
Communications Security. Chicago, IL, USA. October 04-08. p. 73-84. [10] Bhattacherjee, A., & Sanford, C. (2006). Influence processes for information
805-825.
AC
technology acceptance: An elaboration likelihood model. MIS Quarterly. 30(4), p.
[11] Carte, T. A., & Russell, C. J. (2003). In pursuit of moderation: Nine common errors and their solutions. MIS Quarterly. 27(3), p. 479-501. [12] Culnan, M. J., & Armstrong, P. K. (1999). Information privacy concerns, procedural fairness, and impersonal trust: An empirical investigation. Organization Science. 10(1), p. 104-115. [13] Dinev, T., Xu, H., Smith, J. H., & Hart, P. (2013). Information privacy and correlates: An empirical attempt to bridge and distinguish privacy-related concepts.
36
ACCEPTED MANUSCRIPT
European Journal of Information Systems. 22(3), p. 295-316.
T
[14] Dinev, T., & Hart, P. (2006). An extended privacy calculus model for
IP
e-commerce transactions. Information Systems Research. 17(1), p. 61-80.
SC R
[15] Duan, W., Gu, B., & Whinston, A. B. (2009). Informational cascades and software adoption on the internet: An empirical investigation. Management Information Systems Quarterly. 33(1), p. 23-48.
NU
[16] Eling, N., Krasnova, H., Widjaja, T., & Buxmann, P. (2013). Will you accept an
MA
app? Empirical investigation of the decisional calculus behind the adoption of applications on Facebook. In Proceedings of the 34th International Conference on
D
Information Systems. Milano, Italy. December 15-18.
TE
[17] Enck, W., Gilbert, P., Chun, B., Cox, L. P., Jung, J., McDaniel, P., & Sheth, A. N.
CE P
(2014). TaintDroid: An information flow tracking system for real-time privacy monitoring on smartphones. ACM Transactions on Computer Systems. 57(3), p.
AC
99-106.
[18] Felt, A. P., Chin, E., Hanna, S., Song, D., & Wagner, D. (2011). Android permissions demystified. In Proceedings of the 18th ACM Conference on Computer and Communications Security. Chicago, IL, USA. October 17-21. p. 627-638. [19] Felt, A. P., Egelman, S., Finifter, M., Akhawe, D., & Wagner, D. (2012). How to Ask for Permission. In Proceedings of the USENIX Conference on Hot Topics in Security (HotSec). Bellevue, WA, USA. August 8-10. p. 7. [20] Felt, A. P., Egelman, S., & Wagner, D. (2012). I've got 99 problems, but vibration ain't one: A survey of smartphone users' concerns. In Proceedings of the
37
ACCEPTED MANUSCRIPT
second ACM Workshop on Security and Privacy in Smartphones and Mobile Devices.
T
Raleigh, NC, USA. October 16-18. p. 33-44.
IP
[21] Felt, A. P., Ha, E., Egelman, S., Haney, A., Chin, E., & Wagner, D. (2012).
SC R
Android permissions: User attention, comprehension, and behavior. In Proceedings of the 8th Symposium on Usable Privacy and Security. Washington, DC, USA. July 11-13.
NU
[22] Fornell, C., & Larcker, D. F. (1981). Evaluating structural equation models with
MA
unobservable variables and measurement error. Journal of Marketing Research. 18(1), p. 39-50.
in
2013.
Retrieved
on
TE
Billion
D
[23] Gartner (2013). Mobile App Stores Will See Annual Downloads Reach 102 July
12,
2014,
from
CE P
http://www.gartner.com/newsroom/id/2592315/. [24] Gross, R., & Acquisti, A. (2005). Information revelation and privacy in online
AC
social networks. In Proceedings of the 12th ACM Workshop on Privacy in the Electronic Society. Alexandria, VA, USA. November 07-10. p. 71-80. [25] Henseler, J., & Fassott, G. (2010). Testing moderating effects in PLS path models: An illustration of available procedures. Handbook of partial least squares. Springer: Berlin Heidelberg. p. 713-735. [26] Keith, M. J., Thompson, S. C., Hale, J., Lowry, P. B., & Greer, C. (2013). Information disclosure on mobile devices: Re-examining privacy calculus with actual user behavior. International Journal of Human-Computer Studies. 71(12), p. 1163-1173.
38
ACCEPTED MANUSCRIPT
[27] Kelley, P. G., Bresee, J., Cranor, L. F., & Reeder, R. W. (2009). A nutrition label
T
for privacy. In Proceedings of the 5th Symposium on Usable Privacy and Security.
IP
Mountain View, CA. July 15-17.
SC R
[28] Kelley, P. G., Consolvo, S., Cranor, L. F., Jung, J., Sadeh, N., & Wetherall, D. (2012). A conundrum of permissions: installing applications on an android smartphone. In International Conference on Financial Cryptography and Data
NU
Security. Kralendijk, Bonaire. Februray 27-March 2. p. 68-79.
MA
[29] Krasnova, H., Kolesnikova, E., & Guenther, O. (2009). "It won't happen to me!": Self-disclosure in online social networks. In Americas Conference on Information
D
Systems (AMCIS): Paper 343. San Francisco, California, USA. August 06-09.
TE
[30] Li, H., Sarathy, R., & Xu, H. (2010). Understanding situational online
CE P
information disclosure as a privacy calculus. Journal of Computer Information Systems. 51(1), p. 62-71.
AC
[31] Li, H., Sarathy, R., & Xu, H. (2011). The role of affect and cognition on online consumers' decision to disclose personal information to unfamiliar online vendors. Decision Support Systems. 51(3), p. 434-445. [32] Lord, K. R., Lee, M., & Sauer, P. L. (1995). The combined influence hypothesis: Central and peripheral antecedents of attitude toward the ad. Journal of Advertising. 24(1), p. 73-85. [33] Lowry, P. B., Moody, G., Vance, A., Jensen, M., Jenkins, J., & Wells, T. (2012). Using an elaboration likelihood approach to better understand the persuasiveness of website privacy assurance cues for online consumers. Journal of the American Society
39
ACCEPTED MANUSCRIPT
for Information Science and Technology. 63(4), p. 755-776.
T
[34] Lu, Y., Tan, B., & Hui, K. (2004). Inducing customers to disclose personal
IP
information to internet businesses with social adjustment benefits. In Proceedings of
SC R
the 25th Annual International Conference on Information Systems. Washington, USA. December 9-12. p. 570-582.
[35] MacInnis, D. J., & Stayman, D. M. (1993). Focal and emotional integration:
NU
Constructs, measures, and preliminary evidence. Journal of Advertising. 22(4), p.
MA
51-66.
[36] Maheswaran, D., & Chaiken, S. (1991). Promoting systematic processing in
D
low-motivation settings: Effect of incongruent information on processing and
TE
judgment. Journal of Personality and Social Psychology. 61(1), p. 13-25.
CE P
[37] Malhotra, N. K., Kim, S. S., & Agarwal, J. (2004). Internet users' information privacy concerns (IUIPC): The construct, the scale, and a causal model. Information
AC
Systems Research. 15(4), p. 336-355. [38] Midha, V. (2012). Impact of consumer empowerment on online trust: An examination across genders. Decision Support Systems. 54(1), p. 198-205. [39] Milne, G. R., & Rohm, A. J. (2000). Consumer privacy and name removal across direct marketing channels: Exploring opt-in and opt-out alternatives. Journal of Public Policy & Marketing. 19(2), p. 238-249. [40] Park, D., Lee, J., & Han, I. (2007). The effect of on-line consumer reviews on consumer purchasing intention: The moderating role of involvement. International Journal of Electronic Commerce. 11(4), p. 125-148.
40
ACCEPTED MANUSCRIPT
[41] Petty, R. E., Cacioppo, J. T., & Goldman, R. (1981). Personal involvement as a
T
determinant of argument-based persuasion. Journal of Personality and Social
IP
Psychology. 41(5), p. 847 - 855.
SC R
[42] Petty, R. E., Cacioppo, J. T., & Schumann, D. (1983). Central and peripheral routes to advertising effectiveness: the moderating role of involvement. Journal of Consumer Research. 10(2), p. 135-146.
NU
[43] Petty, R. E., & Cacioppo, J. T. (1979). Issue involvement can increase or
MA
decrease persuasion by enhancing message-relevant cognitive responses. Journal of Personality and Social Psychology. 37(10), p. 1915-1926.
30,
2016,
TE
July
D
[44] Pichai, S. (2015). Billions of Android apps vulnerable to hackers. Retrieved on from
15-02-27/.
CE P
http://www.marketwatch.com/story/billions-of-android-apps-vulnerable-to-hackers-20
30,
AC
[45] Robertson, J. (2012). Android apps collect too much user data. Retrieved on July 2016,
from
http://www.smh.com.au/digital-life/digital-life-news/android-apps-collect-too-much-u ser-data-researcher-says-20121102-28oie.html/. [46] Rucker, D. D., & Petty, R. E. (2006). Increasing the effectiveness of communications to consumers: Recommendations based on elaboration likelihood and attitude certainty perspectives. Journal of Public Policy & Marketing. 25(1), p. 39-52. [47] SanJose-Cabezudo, R., Gutierrez-Arranz, A. M., & Gutierrez-Cillan, J. (2009). The combined influence of central and peripheral routes in the online persuasion
41
ACCEPTED MANUSCRIPT
process. CyberPsychology & Behavior. 12(3), p. 299-308.
T
[48] Shook, C. L., Ketchen, D. J., Hult, G. T. M., & Kacmar, K. M. (2004). An
IP
assessment of the use of structural equation modeling in strategic management
SC R
research. Strategic Management Journal. 25(4), p. 397-404.
[49] Smith, H. J., Dinev, T., & Xu, H. (2011). Information privacy research: An interdisciplinary review. MIS Quarterly. 35(4), p. 989-1016.
NU
[50] Spears, J. L. (2013). The effects of notice versus awareness: An empirical
MA
examination of an online consumer's privacy risk treatment. In Proceedings of the 46th Hawaii International Conference in System Sciences. Maui, Hawaii. January
D
7-10. p. 3229-3238.
TE
[51] Wang, X., Hong, Z., Xu, Y. C., Zhang, C., & Ling, H. (2014). Relevance
CE P
judgments of mobile commercial information. Journal of the Association for Information Science and Technology. 65(7), p. 1335-1348.
AC
[52] Wiese, J., Kelley, P. G., Cranor, L. F., Dabbish, L., Hong, J. I., & Zimmerman, J. (2011). Are you close with me? Are you nearby?: Investigating social groups, closeness, and willingness to share. In Proceedings of the 13th International Conference on Ubiquitous Computing. Beijing, China. September 17-21. p. 197-206. [53] Xu, H., Dinev, T., Smith, J., & Hart, P. (2011). Information privacy concerns: Linking individual perceptions with institutional privacy assurances. Journal of the Association for Information Systems. 12(12), p. 798-824. [54] Xu, H., Teo, H., Tan, B. C. Y., & Agarwal, R. (2012). Research note-effects of individual self-protection, industry self-regulation, and government regulation on
42
ACCEPTED MANUSCRIPT
privacy concerns: a study of location-based services. Information Systems Research.
T
23(4), p. 1342-1363.
IP
[55] Xu, H., Teo, H., Tan, B. C., & Agarwal, R. (2009). The role of push-pull
SC R
technology in privacy calculus: the case of location-based services. Journal of Management Information Systems. 26(3), p. 135-174.
NU
[56] Yang, S. C., Hung, W. C., Sung, K., & Farn, C. K. (2006). Investigating initial trust toward e‐tailers from the elaboration likelihood model perspective. Psychology
MA
& Marketing. 23(5), p. 429-445.
[57] Zhou, T. (2012). Understanding users' initial trust in mobile banking: an
D
elaboration likelihood perspective. Computers in Human Behavior. 28(4), p.
AC
CE P
TE
1518-1525.
43
ACCEPTED MANUSCRIPT
Biography Jie Gu (
[email protected]) is an assistant researcher in Shanghai Academy of Social
T
Science. She got her PhD in Information Management and Information Systems, School of
SC R
networks, mobile privacy, and electronic commerce.
IP
Management, Fudan University, Shanghai, China. Her research interests include online social
Yunjie (Calvin) Xu* (
[email protected]) is a professor at the School of Management,
NU
Fudan University, Shanghai, China. He got his Ph.D. in Management Information Systems from Syracuse University, New York. His research interests cover electronic commerce,
MA
knowledge management, and online social network analysis. His publications appeared in Journal of Management Information Systems, Journal of Association for Information Systems, Journal of the American Society for Information Science and Technology, IEEE Transactions on
D
Professional Communication, Communication of the ACM, International Journal of Electronic
TE
Commerce, Journal of Retailing, Decision Support Systems, and more.
CE P
Heng Xu (
[email protected]) is an associate professor of Information Sciences and Technology at the Pennsylvania State University. Her current research focus is on the interplay between social and technological issues associated with information privacy. She has authored and
AC
co-authored over 90 research papers on information privacy, security management, human-computer interaction, and technology innovation adoption. Her work has been published in premier outlets across various fields such as Information Systems, Law, Computer Science, and Human-Computer Interaction, including MIS Quarterly, Information Systems Research, University of Pennsylvania Journal of Constitutional Law, Proceedings of the International World Wide Web Conference (WWW), Proceedings of the ACM Conference on Human Factors in Computing Systems (CHI), Proceedings of the ACM Conference on Computer Supported Cooperative Work and Social Computing (CSCW), and many others.
Cheng Zhang (
[email protected]) is a professor at the School of Management, Fudan University, Shanghai, China. He got his Ph.D. in Information Systems from National University of Singapore. His research interests cover electronic commerce, the diffusion of information 44
ACCEPTED MANUSCRIPT
technologies, and online social network analysis. His publications appeared in Journal of Management Information Systems, Journal of the American Society for Information Science
T
and Technology, European Journal of Information Systems, Decision Support Systems, Journal
IP
of Electronic Commerce Research, Journal of International Marketing, Journal of Global
SC R
Information Management.
Hong Ling (
[email protected]) is a professor and the chair of the Department of Information Management and Information Systems, School of Management, Fudan
NU
University, China. He got his Ph.D. degree from Fudan University. He has worked as a Research Fellow at the City University of Hong Kong and as a visiting scholar at Sloan School
MA
of Management, MIT. He has published more than 100 papers in professional journals and conferences such as Journal of Management Information Systems, Communications of the
D
ACM, Knowledge Management Research & Practice, International Journal of Innovative
TE
Computing, Information & Control,ICIC Express Letters, Journal of the Operations Research Society. His research interests include IT strategy and management, business process
AC
CE P
reengineering, electronic business, and knowledge management.
45
ACCEPTED MANUSCRIPT
T
8. FIGURES AND TABLES
H8
IP
Perceived app popularity
H1
H7
Privacy concerns
H2 Permission justification
H6
H4
NU
Perceived permission sensitivity
SC R
H3
H5
MA
Mobile privacy victim experience
Download intention
Control variables -Age, gender -General privacy concerns -number of installed apps
Perceived app popularity
TE
D
Figure 1 Research Model
0.367**
CE P
-0.148**
0.512**
Perceived permission sensitivity
AC
R2=22.8%
R2=51% -0.16*
-0.510**
Privacy concerns
Download intention
0.131** -0.016
0.025
General privacy concerns
Permission justification -0.011
0.263** Gender
0.064 0.539**
Mobile privacy victim experience
*p<0.05, **p<0.01
Figure 2 Results of model fitting
46
ACCEPTED MANUSCRIPT
Item
CR
Construct
IP
T
Table 1 The convergent validity of the measurement model
DI1: I am _____ to download Delicacy. (1=very unwilling, 7=very willing)
Std Loadinga
AVE
CFR
α
0.893
US
DI2: After reading the related information of Delicacy, I am _____ to try Delicacy. (1=very Download
MA N
unwilling, 7=very willing) intention
0.932 0.821 0.919 0.89
DI3: After reading the related information of Delicacy, I am _____ to consider Delicacy as a 0.893
TE D
preferred app to download in the food recommendation category. (1=very unwilling, 7=very willing)
CE P
PC1: I think Delicacy _____ over-collects my personal information. (1=will never, 7=will surely)
0.820
AC
PC2: I _____ worry that Delicacy leaks my personal information to irrelevant third-parties. 0.883
Privacy
(1=completely won’t, 7=surely will)
concerns
PC3: If I were to download and use this app, I _____ be concerned that Delicacy would
0.777 0.915 0.90 0.925
violate my privacy. (1=completely won’ t, 7=surely will) PC4: If I were to download and use this app, I _____ be concern that Delicacy would misuse 0.894 my personal information. (1=completely won’t, 7=surely will)
47
ACCEPTED MANUSCRIPT
POP1: I think Delicacy is _____. (1=very unpopular, 7=very popular)
0.907
App
POP2: The download of Delicacy is _____. (1=very few, 7=numerous)
0.904
popularity
POP3: I think Delicacy is _____ among users. (1=very cold, 7=very hot)
CR
IP
T
Perceived
Perceived
US
SENS1: The permissions requested by Delicacy are _____. (1=very few, 7=a lot)
0.933 0.802
SENS2: The personal information requested by Delicacy is _____. (1=very insensitive,
MA N
permission 7=very sensitive) sensitivity
0.837 0.928 0.90
0.898 0.732 0.857 0.82
SENS3: The potential risk related to the permission requests of the app is _____. (1=very
TE D
low, 7=very high)
0.864
GPC1: I am _____ to privacy-related issues. (1=very insensitive, 7=very sensitive)
0.897
GPC2: To me, it is _____ to protect privacy. (1=very unimportant, 7=very important)
0.872
CE P
General privacy
0.756 0.876 0.84
GPC3: I am_____ concerned about potential privacy threats. (1=very much not , 7=very much) a
0.839
AC
concerns
All item loadings were significant at p<0.001 with t-statistics greater than 14.
48
ACCEPTED MANUSCRIPT
Table 2 Descriptive statistics and construct correlation mean
sd.
DI
POP
SENS
JUS
GPC
MPVE
Gender
Age
DI
3.54
1.08
0.906
PC
4.40
1.20
-.195*
0.881
POP
3.91
1.13
.369**
-0.17*
0.915
SENS
3.97
0.91
-.237**
0.57**
-0.01
0.855
JUS
---
---
-0.10
0.01
-0.00
0.08
1
GPC
5.19
1.03
0.03
.27**
0.16*
0.22**
0.06
0.869
MPVE
3.96
1.56
0.07
.38**
-0.01
0.14
0.02
.25**
1
Gender
---
---
0.22**
0.10
-0.06
0.08
-0.17
0.12
-0.01
1
Age
20.27
2.72
-0.024
0.146
-0.119
0.068
0.019
0.114
0.264*
-0.126
1
Apps
33.15
20.80
-0.052
-0.002
0.068
0.056
0.054
-0.013
0.124
-0.015
-0.154*
Apps
AC
CE P
TE D
MA N
US
CR
IP
PC
T
Construct
1
Note. *p<0.05, **p<0.01. The diagonal cells less than one are the square roots of the average variances extracted (AVEs) for latent constructs. DI=download intention, PC=privacy concerns for mobile app download, POP=perceived app popularity, SENS=perceived permission sensitivity, JUS=permission justification, GPC=general privacy concerns, MPVE=mobile privacy victim experience, Apps=the number of installed apps.
49
ACCEPTED MANUSCRIPT
CE P
TE D
MA N
US
CR
IP
We focus on Android users’ privacy decision making in app download stage. Perceived permission sensitivity makes users more concerned for privacy. Permission justification makes users less concerned for privacy. Perceived app popularity make users less concerned for privacy. Mobile privacy victim experience reduces the alleviating effect of permission justification on privacy concerns.
AC
1. 2. 3. 4. 5.
T
Highlights
50