Mobile application installation influences: Have mobile device users become desensitized to excessive permission requests?

Mark A. Harris, Robert Brookshire, Karen P. Patten, Elizabeth A. Regan

Research output: Chapter in Book/Report/Conference proceedingConference contribution

11 Scopus citations

Abstract

The purpose of this study was to investigate constructs that influence consumers before deciding to download and install mobile device applications. These constructs include market trust, risk perceptions, privacy concerns, and precautions. Through a survey, a prediction model was created that attempts to predict whether respondents would download applications asking for excessive permissions. The model results indicate those that take more precautions are less likely to download apps requesting excessive permissions. But the precautions taken by participants may be inadequate and may leave consumers with a false since of security. Another key finding is that some consumers may have become desensitized to excessive permissions. These consumers knowingly install apps requesting excessive permissions for reasons such as nothing bad has happened to them before or the app usually has a good reason for requesting questionable permissions. The security implications of permission desensitization and inadequate precautions are discussed.

Original languageEnglish (US)
Title of host publication2015 Americas Conference on Information Systems, AMCIS 2015
PublisherAmericas Conference on Information Systems
ISBN (Electronic)9780996683104
StatePublished - Jan 1 2015
Externally publishedYes
Event21st Americas Conference on Information Systems, AMCIS 2015 - Fajardo, Puerto Rico
Duration: Aug 13 2015Aug 15 2015

Publication series

Name2015 Americas Conference on Information Systems, AMCIS 2015

Other

Other21st Americas Conference on Information Systems, AMCIS 2015
Country/TerritoryPuerto Rico
CityFajardo
Period8/13/158/15/15

Keywords

  • Application installation
  • Mobile apps
  • Mobile device security
  • Permission requests
  • Security precautions

ASJC Scopus subject areas

  • Computer Science Applications
  • Information Systems

Fingerprint

Dive into the research topics of 'Mobile application installation influences: Have mobile device users become desensitized to excessive permission requests?'. Together they form a unique fingerprint.

Cite this