专注论文查重修改6年+经验

了解权限要求对于採用手机APP之影响

【中文摘要】:随着智慧型手机的普及,智慧型手机上的应用程式-App已经成为热门的议题。 在Android平台中,App为了使用者各式各样的功能必须各种取得权限;然而,App也有可能要求为了提供功能外的权限,使用者必须先同意App的权限要求才能下载App。 本研究旨在了解权限对于使用者採用App的影响,提出了权限-功能适配度的概念,并以科技接受模型为基础结合认知隐私风险及社会交换理论来做深入的探讨。
本研究结果包含: (1) 使用者对于App的态度会正向影响其下载意图。 (2) 使用者对App的认知有用性及[custom_frame_

文懂论文网,论文查重网站5年品牌,论文检测结果准确,安全快速,值得信赖

center]szwox.com_116[/custom_frame_center]App得到的评分会正向影响使用者对于App的态度;认知隐私风险会负向影响使用者对于App的态度;当App要求的权限超过它所提供的功能时,使用者对于App的态度会较为负面。 其中以认知有用性的影响最大 (3) App要求权限的隐私程度会正向影响使用者认知的隐私风险;App要求的权限超过它提供的功能时,使用者会认知更多隐私风险。
【英文摘要】:Because of the expanding of smartphones

文懂论文网,论文查重最佳选择,立即论文查重,马上防止抄袭,提高论文品质

, the applications on smartphones, Apps, are widely discussed. In Android platform, Apps have to acquire permissions in order to provide various functions for users. However, Apps might request more permissions than they need. Users have to grant permissions requested by Apps before downloading Apps. The purpose of this study is understanding the impacts of permissions on users'' intention to download mobile Apps. We proposed the concept of "permission-function fit (PFF)", and included perceived privacy risk and social exchange theory into TAM to explore the research purpose.
The results of this study are: (1) users'' attitude toward the App positively influences their download intention. (2) Users'' perceived usefulness and the ranking of the App positively influence users'' attitude toward the App; perceived privacy risk negatively affect users'' attitude; when App requests more permissions than it needs, users have negative attitude toward it. Perceived usefulness has the strongest effect on attitude. (3)The privacy level of permissions positively affects users'' perception of privacy risk; when Apps request more permissions than they need, users perceive higher privacy risk.
【参考文献】:

  • iThome (2013, Aug 13) Google:台湾智慧型手机普及率已达51%. Retrieved May 22, 2014, http://www.ithome.com.tw/node/82029
  • Business Insider (2013, Jun 5) CHART OF THE DAY: Smartphone Sales Are On The Verge Of Overtaking Feature Phone Sales. Retrieved November 12, 2013, from http://www.businessinsider.com/chart-of-the-day-smartphones-to-beat-feature-phone-sales-2013-6
  • Engadget (2012, Jun 11) App Store hits 650,000 apps, 30 billion downloads, $5 billion doled out to developers. Retrieved November 12, 2013, http://www.engadget.com/2012/06/11/app-store-hits-650-000-apps-30-billion-
  • downloads-5-billion-do/
  • Engadget (2012, Jun 27) Google Play hits 600,000 apps, 20 billion total installs. Retrieved November 12, 2013, http://www.engadget.com/2012/06/27/google-play-hits-600000-apps/
  • Gartner Symposium/ITxpo (2013, Sep 19) Gartner Says Mobile App Stores Will See Annual Downloads Reach 102 Billion in 2013. Retrieved November 12, 2013, http://www.gartner.com/newsroom/id/2592315
  • The Register (2013, Jun 26) Report: Android malware up 614% as smartphone scams go industrial. Retrieved May 22, 2014, http://www.theregister.co.uk/2013/06/26/android_malware_bloom_security_updates/
  • Agarwal, R., & Karahanna, E. (2000). Time Flies When You”re Having Fun: Cognitive Absorption and Beliefs about Information Technology Usage. MIS Quarterly, 24(4), 665-694.
  • Akaah, I. P., & Korgaonkar, P. K. (1988). A conjoint investigation of the relative importance of risk relievers in direct marketing. Journal of Advertising Research, 28(4), 38-44.
  • Akturan, U., & Tezcan, N. (2012). Mobile banking adoption of the youth market: Perceptions and intentions. Marketing Intelligence & Planning, 30(4), 444-459.
  • Albarq, A. N. (2013). Measuring the Impacts of Online Word-of-Mouth on Tourists’ Attitude and Intentions to Visit Jordan: An Empirical Study. International Business Research, 7(1), 14-22.
  • Aldás-Manzano, J., Lassala-Navarré, C., Ruiz-Mafé, C., & Sanz-Blas, S. (2009). The role of consumer innovativeness and perceived risk in online banking usage. International Journal of Bank Marketing, 27(1), 53-75.
  • Arndt, J. (1967). Role of Product-Related Conversations in the Diffusion of a New Product. Journal of Marketing Research, 4(3), 291-295.
  • Baron, R. M., & Kenny, D. A. (1986). The moderator–mediator variable distinction in social psychological research: Conceptual, strategic, and statistical considerations. Journal of personality and social psychology, 51(6), 1173-1182.
  • Bauer, R. A. (1960). Consumer behavior as risk taking. Dynamic marketing for a changing world, 398.
  • Biyalogorsky, E., Gerstner, E., & Libai, B. (2001). Customer referral management: Optimal reward programs. Marketing Science, 20(1), 82-95.
  • Blau, P. M. (1964). Exchange and power in social life: Transaction Publishers.
  • Chen, Y., & Xie, J. (2008). Online consumer review: Word-of-mouth as a new element of marketing communication mix. Management Science, 54(3), 477-491.
  • Cheng, F.-F., Liu, T.-Y., & Wu, C.-S. (2013). Perceived Risks and Risk Reduction Strategies in Online Group-Buying. Paper presented at the Diversity, Technology, and Innovation for Operational Competitiveness: Proceedings of the 2013 International Conference on Technology Innovation and Industrial Management.
  • Chiu, C.-M., Hsu, M.-H., Lai, H., & Chang, C.-M. (2012). Re-examining the influence of trust on online repeat purchase intention: The moderating role of habit and its antecedents. Decision Support Systems, 53(4), 835-845.
  • Chiu, C.-M., Lin, H.-Y., Sun, S.-Y., & Hsu, M.-H. (2009). Understanding customers” loyalty intentions towards online shopping: an integration of technology acceptance model and fairness theory. Behaviour & Information Technology, 28(4), 347-360.
  • Chou, C.-H., Chiu, C.-H., Ho, C.-Y., & Lee, J.-C. (2013). Understanding Mobile Apps Continuance Usage Behavior and Habit: An Expectance-Confirmation Theory. PACIS 2013 Proceedings.
  • Culnan, M. J., & Armstrong, P. K. (1999). Information Privacy Concerns, Procedural Fairness, and Impersonal Trust: An Empirical Investigation. Organization Science, 10(1), 104-115.
  • Davis, F. D. (1989). Perceived Usefulness, Perceived Ease of Use, and User Acceptance of Information Technology. MIS Quarterly, 13(3), 319-340.
  • Dellarocas, C. (2003). The digitization of word of mouth: Promise and challenges of online feedback mechanisms. Management Science, 49(10), 1407-1424.
  • Dinev, T., & Hart, P. (2006). An extended privacy calculus model for e-commerce transactions. Information Systems Research, 17(1), 61-80.
  • Featherman, M. S., & Pavlou, P. A. (2003). Predicting e-services adoption: a perceived risk facets perspective. International Journal of Human-Computer Studies, 59(4), 451-474.
  • Felt, A. P., Chin, E., Hanna, S., Song, D., & Wagner, D. (2011). Android permissions demystified. Paper presented at the Proceedings of the 18th ACM conference on Computer and communications security, Chicago, Illinois, USA.
  • Fornell, C., & Larcker, D. F. (1981). Evaluating structural equation models with unobservable variables and measurement error. Journal of Marketing Research, 18(1), 39-50.
  • Gefen, D., Karahanna, E., & Straub, D. W. (2003). Trust and TAM in online shopping: an integrated model. MIS Quarterly, 27(1), 51-90.
  • Grewal, D., Gotlieb, J., & Marmorstein, H. (1994). The Moderating Effects of Message Framing and Source Credibility on the Price-Perceived Risk Relationship. Journal of Consumer Research, 21(1), 145-153.
  • Gruen, T. W., Osmonbekov, T., & Czaplewski, A. J. (2006). eWOM: The impact of customer-to-customer online know-how exchange on customer value and loyalty. Journal of Business Research, 59(4), 449-456.
  • Ha, S., & Stoel, L. (2009). Consumer e-shopping acceptance: Antecedents in a technology acceptance model. Journal of Business Research, 62(5), 565-571.
  • Heijden, H. (2004). User acceptance of hedonic information systems. MIS Q., 28(4), 695-704.
  • Homans, G. C. (1958). Social Behavior as Exchange. American journal of sociology, 63(6), 597-606.
  • Hsu, C.-L., & Lin, J. C.-C. (2008). Acceptance of blog usage: The roles of technology acceptance, social influence and knowledge sharing motivation. Information & Management, 45(1), 65-74.
  • Hsu, C.-L., & Lu, H.-P. (2004). Why do people play on-line games? An extended TAM with social influences and flow experience. Information & Management, 41(7), 853-868.
  • Jarvenpaa, S. L., Tractinsky, N., & Saarinen, L. (1999). Consumer Trust in an Internet Store: A Cross-Cultural Validation. Journal of Computer-Mediated Communication, 5(2), 0-0.
  • Kim, B., Choi, M., & Han, I. (2009). User behaviors toward mobile data services: The role of perceived fee and prior experience. Expert Systems with Applications, 36(4), 8528-8536.
  • Kuo, Y.-F., & Yen, S.-N. (2009). Towards an understanding of the behavioral intention to use 3G mobile value-added services. Computers in Human Behavior, 25(1), 103-110.
  • López-Nicolás, C., Molina-Castillo, F. J., & Bouwman, H. (2008). An assessment of advanced mobile services acceptance: Contributions from TAM and diffusion theory models. Information & Management, 45(6), 359-364.
  • Lederer, A. L., Maupin, D. J., Sena, M. P., & Zhuang, Y. (2000). The technology acceptance model and the World Wide Web. Decision Support Systems, 29(3), 269-282.
  • Lee, J., Park, D.-H., & Han, I. (2008). The effect of negative online consumer reviews on product attitude: An information processing view. Electronic Commerce Research and Applications, 7(3), 341-352.
  • Lee, M.-C. (2009). Factors influencing the adoption of internet banking: An integration of TAM and TPB with perceived risk and perceived benefit. Electronic Commerce Research and Applications, 8(3), 130-141.
  • Lim, N. (2003). Consumers’ perceived risk: sources versus consequences. Electronic Commerce Research and Applications, 2(3), 216-228.
  • Lin, H.-F. (2011). An empirical investigation of mobile banking adoption: The effect of innovation attributes and knowledge-based trust. International Journal of Information Management, 31(3), 252-260.
  • Lu, Y., Zhou, T., & Wang, B. (2009). Exploring Chinese users’ acceptance of instant messaging using the theory of planned behavior, the technology acceptance model, and the flow theory. Computers in Human Behavior, 25(1), 29-39.
  • Luarn, P., & Lin, H.-H. (2005). Toward an understanding of the behavioral intention to use mobile banking. Computers in Human Behavior, 21(6), 873-891.
  • Luo, X., Li, H., Zhang, J., & Shim, J. P. (2010). Examining multi-dimensional trust and multi-faceted risk in initial acceptance of emerging technologies: An empirical study of mobile banking services. Decision Support Systems, 49(2), 222-234.
  • Malhotra, N. K., Kim, S. S., & Agarwal, J. (2004). Internet Users” Information Privacy Concerns (IUIPC): The Construct, the Scale, and a Causal Model. Information Systems Research, 15(4), 336-355.
  • Malhotra, N. K., Kim, S. S., & Patil, A. (2006). Common method variance in IS research: a comparison of alternative approaches and a reanalysis of past research. Management Science, 52(12), 1865-1883.
  • Milne, G. R., & Gordon, M. E. (1993). Direct Mail Privacy-Efficiency Trade-offs Within an Implied Social Contract Framework. Journal of Public Policy & Marketing, 12(2), 206-215.
  • Mitchell, V.-W. (1992). Understanding consumers’ behaviour: can perceived risk theory help? Management Decision, 30(3), 26-31.
  • Miyazaki, A. D., & Fernandez, A. (2001). Consumer Perceptions of Privacy and Security Risks for Online Shopping. Journal of Consumer Affairs, 35(1), 27-44.
  • Nepomuceno, M. V., Laroche, M., & Richard, M.-O. (2014). How to reduce perceived risk when buying online: The interactions between intangibility, product knowledge, brand familiarity, privacy and security concerns. Journal of Retailing and Consumer Services, 21(4), 619-629.
  • Nysveen, H., Pedersen, P. E., & Thorbjørnsen, H. (2005). Explaining intention to use mobile chat services: moderating effects of gender. Journal of Consumer Marketing, 22(5), 247-256.
  • Peter, J. P., & Ryan, M. J. (1976). An Investigation of Perceived Risk at the Brand Level. Journal of Marketing Research, 13(2), 184-188.
  • Reza Jalilvand, M., Samiei, N., Dini, B., & Yaghoubi Manzari, P. (2012). Examining the structural relationships of electronic word of mouth, destination image, tourist attitude toward destination and travel intention: An integrated approach. Journal of Destination Marketing & Management, 1(1–2), 134-143.
  • Richins, M. L., & Root-Shaffer, T. (1988). The role of evolvement and opinion leadership in consumer word-of-mouth: An implicit model made explicit. Advances in Consumer Research, 15(1), 32-36.
  • Ross, I. (1975). Perceived risk and consumer behavior: a critical review. Advances in Consumer Research, 2(1), 1-19.
  • Salam, A., Rao, R., & Pegels, C. (1998). An investigation of consumer-perceived risk on electronic commerce transactions: The role of institutional trust and economic incentive in a social exchange framework. AMCIS 1998 Proceedings, 114.
  • Sarma, B. P., Li, N., Gates, C., Potharaju, R., Nita-Rotaru, C., & Molloy, I. (2012). Android permissions: a perspective combining risks and benefits. Paper presented at the Proceedings of the 17th ACM symposium on Access Control Models and Technologies, Newark, New Jersey, USA.
  • Schierz, P. G., Schilke, O., & Wirtz, B. W. (2010). Understanding consumer acceptance of mobile payment services: An empirical analysis. Electronic Commerce Research and Applications, 9(3), 209-216.
  • Shi, M. (2003). Social network-based discriminatory pricing strategy. Marketing Letters, 14(4), 239-256.
  • Smith, H. J., & Milberg, S. J. (1996). Information privacy: measuring individuals” concerns about organizational practices. MIS Q., 20(2), 167-196.
  • Sobel, M. E. (1982). Asymptotic confidence intervals for indirect effects in structural equation models. Sociological methodology, 13(1982), 290-312.
  • Tan, S. J. (1999). Strategies for reducing consumers’ risk aversion in Internet shopping. Journal of Consumer Marketing, 16(2), 163-180.
  • Taylor, J. W. (1974). The Role of Risk in Consumer Behavior. Journal of Marketing, 38(2), 54-60.
  • van der Heijden, H. (2003). Factors influencing the usage of websites: the case of a generic portal in The Netherlands. Information & Management, 40(6), 541-549.
  • Venkatesh, V., Thong, J. Y., & Xu, X. (2012). Consumer acceptance and use of information technology: extending the unified theory of acceptance and use of technology. MIS Quarterly, 36(1), 157-178.
  • Weinberger, M. G., Allen, C. T., & Dillon, W. R. (1981). Negative information: Perspectives and research directions. Advances in Consumer Research, 8(1), 398-404.
  • Wu, S., Lin, C. S., & Lin, T.-C. (2006). Exploring knowledge sharing in virtual teams: A social exchange theory perspective. Paper presented at the System Sciences, 2006. HICSS”06. Proceedings of the 39th Annual Hawaii International Conference on.
  • Xu, H., Teo, H.-H., & Tan, B. C. Y. (2005). Predicting the Adoption of Location-Based Services: The Role of Trust and Perceived Privacy Risk. Paper presented at the ICIS.
  • Yang, B., Kim, Y., & Yoo, C. (2013). The integrated mobile advertising model: The effects of technology- and emotion-based evaluations. Journal of Business Research, 66(9), 1345-1352.
  • Yang, K., & Jolly, L. D. (2009). The effects of consumer perceived value and subjective norm on mobile data service adoption between American and Korean consumers. Journal of Retailing and Consumer Services, 16(6), 502-508.
  • Zhou, T. (2012). Examining location-based services usage from the perspectives of unified theory of acceptance and use of technology and privacy risk. Journal of Electronic Commerce Research, 13(2), 135-144.
  • Zhou, Y., Zhang, X., Jiang, X., & Freeh, V. (2011). Taming Information-Stealing Smartphone Applications (on Android) Trust and Trustworthy Computing (Vol. 6740, pp. 93-107): Springer Berlin Heidelberg.
  • 来源:中山大学;作者:吴旻训
    文懂论文-重复率修改第一品牌,http://www.szwox.com解决论文查重论文降重复,重复率高等各种论文难题的专家

    最新文章

    • 什么是学术不端行为
      什么是学术不端行为
      什么是学术不端行为 1992 年,由美国国家科学院、国家工程院和国家医学研究院组成的 22 位...
    • 论文降重复服务 1. 本网站及服务 szwox.com提供哪些服务? szwox.com是一个...

    联络我们

    QQ: 767326772
    文懂论文
    网站:http://www.szwox.com/
    E-mail: turuinit@foxmail.com

    我们的服务

    我们提供毕业论文、期刊论文、硕士论文、博士论文、会议论文格式排版,论文查重,重复率修改等服务。强大论文查重系统,一手老师资源,首创安全保密查重修改流程。充分保障客户论文查重安全以及修改后的品质,赢得了老师和同学们的信任和口碑。