Mobile application installation influences

Have mobile device users become desensitized to excessive permission requests?

Mark Alan Harris, Robert Brookshire, Karen P. Patten, Elizabeth A. Regan

Research output: Chapter in Book/Report/Conference proceedingConference contribution

5 Citations (Scopus)

Abstract

The purpose of this study was to investigate constructs that influence consumers before deciding to download and install mobile device applications. These constructs include market trust, risk perceptions, privacy concerns, and precautions. Through a survey, a prediction model was created that attempts to predict whether respondents would download applications asking for excessive permissions. The model results indicate those that take more precautions are less likely to download apps requesting excessive permissions. But the precautions taken by participants may be inadequate and may leave consumers with a false since of security. Another key finding is that some consumers may have become desensitized to excessive permissions. These consumers knowingly install apps requesting excessive permissions for reasons such as nothing bad has happened to them before or the app usually has a good reason for requesting questionable permissions. The security implications of permission desensitization and inadequate precautions are discussed.

Original languageEnglish (US)
Title of host publication2015 Americas Conference on Information Systems, AMCIS 2015
PublisherAmericas Conference on Information Systems
ISBN (Electronic)9780996683104
StatePublished - Jan 1 2015
Event21st Americas Conference on Information Systems, AMCIS 2015 - Fajardo, Puerto Rico
Duration: Aug 13 2015Aug 15 2015

Publication series

Name2015 Americas Conference on Information Systems, AMCIS 2015

Other

Other21st Americas Conference on Information Systems, AMCIS 2015
CountryPuerto Rico
CityFajardo
Period8/13/158/15/15

Fingerprint

Application programs
Mobile devices
Risk perception

Keywords

  • Application installation
  • Mobile apps
  • Mobile device security
  • Permission requests
  • Security precautions

ASJC Scopus subject areas

  • Computer Science Applications
  • Information Systems

Cite this

Harris, M. A., Brookshire, R., Patten, K. P., & Regan, E. A. (2015). Mobile application installation influences: Have mobile device users become desensitized to excessive permission requests? In 2015 Americas Conference on Information Systems, AMCIS 2015 (2015 Americas Conference on Information Systems, AMCIS 2015). Americas Conference on Information Systems.

Mobile application installation influences : Have mobile device users become desensitized to excessive permission requests? / Harris, Mark Alan; Brookshire, Robert; Patten, Karen P.; Regan, Elizabeth A.

2015 Americas Conference on Information Systems, AMCIS 2015. Americas Conference on Information Systems, 2015. (2015 Americas Conference on Information Systems, AMCIS 2015).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Harris, MA, Brookshire, R, Patten, KP & Regan, EA 2015, Mobile application installation influences: Have mobile device users become desensitized to excessive permission requests? in 2015 Americas Conference on Information Systems, AMCIS 2015. 2015 Americas Conference on Information Systems, AMCIS 2015, Americas Conference on Information Systems, 21st Americas Conference on Information Systems, AMCIS 2015, Fajardo, Puerto Rico, 8/13/15.
Harris MA, Brookshire R, Patten KP, Regan EA. Mobile application installation influences: Have mobile device users become desensitized to excessive permission requests? In 2015 Americas Conference on Information Systems, AMCIS 2015. Americas Conference on Information Systems. 2015. (2015 Americas Conference on Information Systems, AMCIS 2015).
Harris, Mark Alan ; Brookshire, Robert ; Patten, Karen P. ; Regan, Elizabeth A. / Mobile application installation influences : Have mobile device users become desensitized to excessive permission requests?. 2015 Americas Conference on Information Systems, AMCIS 2015. Americas Conference on Information Systems, 2015. (2015 Americas Conference on Information Systems, AMCIS 2015).
@inproceedings{801e03bc64394ebd9912edcd40be44fc,
title = "Mobile application installation influences: Have mobile device users become desensitized to excessive permission requests?",
abstract = "The purpose of this study was to investigate constructs that influence consumers before deciding to download and install mobile device applications. These constructs include market trust, risk perceptions, privacy concerns, and precautions. Through a survey, a prediction model was created that attempts to predict whether respondents would download applications asking for excessive permissions. The model results indicate those that take more precautions are less likely to download apps requesting excessive permissions. But the precautions taken by participants may be inadequate and may leave consumers with a false since of security. Another key finding is that some consumers may have become desensitized to excessive permissions. These consumers knowingly install apps requesting excessive permissions for reasons such as nothing bad has happened to them before or the app usually has a good reason for requesting questionable permissions. The security implications of permission desensitization and inadequate precautions are discussed.",
keywords = "Application installation, Mobile apps, Mobile device security, Permission requests, Security precautions",
author = "Harris, {Mark Alan} and Robert Brookshire and Patten, {Karen P.} and Regan, {Elizabeth A.}",
year = "2015",
month = "1",
day = "1",
language = "English (US)",
series = "2015 Americas Conference on Information Systems, AMCIS 2015",
publisher = "Americas Conference on Information Systems",
booktitle = "2015 Americas Conference on Information Systems, AMCIS 2015",

}

TY - GEN

T1 - Mobile application installation influences

T2 - Have mobile device users become desensitized to excessive permission requests?

AU - Harris, Mark Alan

AU - Brookshire, Robert

AU - Patten, Karen P.

AU - Regan, Elizabeth A.

PY - 2015/1/1

Y1 - 2015/1/1

N2 - The purpose of this study was to investigate constructs that influence consumers before deciding to download and install mobile device applications. These constructs include market trust, risk perceptions, privacy concerns, and precautions. Through a survey, a prediction model was created that attempts to predict whether respondents would download applications asking for excessive permissions. The model results indicate those that take more precautions are less likely to download apps requesting excessive permissions. But the precautions taken by participants may be inadequate and may leave consumers with a false since of security. Another key finding is that some consumers may have become desensitized to excessive permissions. These consumers knowingly install apps requesting excessive permissions for reasons such as nothing bad has happened to them before or the app usually has a good reason for requesting questionable permissions. The security implications of permission desensitization and inadequate precautions are discussed.

AB - The purpose of this study was to investigate constructs that influence consumers before deciding to download and install mobile device applications. These constructs include market trust, risk perceptions, privacy concerns, and precautions. Through a survey, a prediction model was created that attempts to predict whether respondents would download applications asking for excessive permissions. The model results indicate those that take more precautions are less likely to download apps requesting excessive permissions. But the precautions taken by participants may be inadequate and may leave consumers with a false since of security. Another key finding is that some consumers may have become desensitized to excessive permissions. These consumers knowingly install apps requesting excessive permissions for reasons such as nothing bad has happened to them before or the app usually has a good reason for requesting questionable permissions. The security implications of permission desensitization and inadequate precautions are discussed.

KW - Application installation

KW - Mobile apps

KW - Mobile device security

KW - Permission requests

KW - Security precautions

UR - http://www.scopus.com/inward/record.url?scp=84963631768&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=84963631768&partnerID=8YFLogxK

M3 - Conference contribution

T3 - 2015 Americas Conference on Information Systems, AMCIS 2015

BT - 2015 Americas Conference on Information Systems, AMCIS 2015

PB - Americas Conference on Information Systems

ER -