Vis enkel innførsel

dc.contributor.authorAyres-Pereira, Vanessa
dc.contributor.authorPirrone, Angelo
dc.contributor.authorKorbmacher, Max
dc.contributor.authorTjøstheim, Ingvar
dc.contributor.authorBøhm, Gisela Petra
dc.date.accessioned2022-10-26T11:28:33Z
dc.date.available2022-10-26T11:28:33Z
dc.date.created2022-10-02T14:36:31Z
dc.date.issued2022-09-09
dc.identifier.issn2624-9898
dc.identifier.urihttps://hdl.handle.net/11250/3028416
dc.description.abstractThis research examines how various factors, such as the degree of e-privacy concerns and control over data access permissions, can influence a user's intention to install a smartphone app. We conducted two survey-based experiments with 441 participants. In each experiment, we manipulated the degree of control over the number and type of data access permissions granted to different fictional apps. In Study 1, participants were informed about the set of permissions the apps required. In Study 2, participants indicated which individual permissions they were willing to grant to the apps. In both experiments, we assessed the level of e-privacy concerns, perceived app importance, and the intention to install the apps. The results suggest that the type of app plays a central role in determining both the perceived benefit of installing the app and the level of e-privacy concerns. The intention to install an app is more strongly associated with perceived app importance than with e-privacy concerns (especially when app importance is high, and users have explicit control over which specific data access permissions they want to grant). The implications of these results are discussed regarding psychological factors involved in app installation decision-making process and the importance of promoting data protection by design.en_US
dc.language.isoengen_US
dc.publisherFrontiersen_US
dc.rightsNavngivelse 4.0 Internasjonal*
dc.rights.urihttp://creativecommons.org/licenses/by/4.0/deed.no*
dc.titleThe privacy and control paradoxes in the context of smartphone appsen_US
dc.typeJournal articleen_US
dc.typePeer revieweden_US
dc.description.versionpublishedVersionen_US
dc.rights.holderCopyright 2022 the authorsen_US
dc.source.articlenumber986138en_US
cristin.ispublishedtrue
cristin.fulltextoriginal
cristin.qualitycode1
dc.identifier.doi10.3389/fcomp.2022.986138
dc.identifier.cristin2057481
dc.source.journalFrontiers in Computer Scienceen_US
dc.identifier.citationFrontiers in Computer Science. 2022, 4, 986138.en_US
dc.source.volume4en_US


Tilhørende fil(er)

Thumbnail

Denne innførselen finnes i følgende samling(er)

Vis enkel innførsel

Navngivelse 4.0 Internasjonal
Med mindre annet er angitt, så er denne innførselen lisensiert som Navngivelse 4.0 Internasjonal