Exploring the effect of permission notice on users' initial trust to an application store: The case of China's Android application market

Jie Gu, Heng Xu, An'An Hu, Lihua Huang

Research output: Chapter in Book/Report/Conference proceedingConference contribution

3 Scopus citations

Abstract

Privacy invasion via mobile applications is a big issue in the mobile age. This study focuses on China's Android market where a few application stores are available to adopt applications. Recognizing that these stores vary in presenting permission notice, this study examines the effect of two features of a permission notice, i.e., permission sensitivity and permission explanation, on Android users' privacy-related perceptions. Results of our scenario-based study suggest that while the disclosure of highly sensitive permissions increases users' privacy concerns to an application, it also boosts users' initial trust to an unfamiliar application store. Moreover, users' trust to the application store is a necessary condition for the efficiency of permission explanation to reduce users' privacy concerns. In addition to enhancing our theoretical understanding of the role of initial trust in Chinese Android users' elaboration of permission notice, these findings have important implications for both China's application stores and application developers.

Original languageEnglish (US)
Title of host publication2015 IEEE International Conference on Intelligence and Security Informatics
Subtitle of host publicationSecuring the World through an Alignment of Technology, Intelligence, Humans and Organizations, ISI 2015
EditorsLina Zhou, G. Alan Wang, Wenji Mao, Lisa Kaati
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages67-72
Number of pages6
ISBN (Electronic)9781479998883
DOIs
StatePublished - Jul 23 2015
Event13th IEEE International Conference on Intelligence and Security Informatics, ISI 2015 - Baltimore, United States
Duration: May 27 2015May 29 2015

Publication series

Name2015 IEEE International Conference on Intelligence and Security Informatics: Securing the World through an Alignment of Technology, Intelligence, Humans and Organizations, ISI 2015

Other

Other13th IEEE International Conference on Intelligence and Security Informatics, ISI 2015
Country/TerritoryUnited States
CityBaltimore
Period5/27/155/29/15

All Science Journal Classification (ASJC) codes

  • Artificial Intelligence
  • Law
  • Computer Networks and Communications
  • Safety, Risk, Reliability and Quality

Fingerprint

Dive into the research topics of 'Exploring the effect of permission notice on users' initial trust to an application store: The case of China's Android application market'. Together they form a unique fingerprint.

Cite this