2015
DOI: 10.1007/978-3-319-16486-1_33
|View full text |Cite
|
Sign up to set email alerts
|

Influence of Users’ Privacy Risks Literacy on the Intention to Install a Mobile Application

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2015
2015
2023
2023

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 9 publications
(4 citation statements)
references
References 17 publications
0
4
0
Order By: Relevance
“…The PCM (r) and its ACM (V) were the inputs for Stage 2, which adopted a weighted least squares (WLS) estimation to fit the proposed models [142]. To fit the hypothesized model, Stage 2 of TSSEM analysis uses a covariance matrix generated by weighting the elements in the PCM using the ACM.…”
Section: Inputs and Outputs Of Stagementioning
confidence: 99%
See 1 more Smart Citation
“…The PCM (r) and its ACM (V) were the inputs for Stage 2, which adopted a weighted least squares (WLS) estimation to fit the proposed models [142]. To fit the hypothesized model, Stage 2 of TSSEM analysis uses a covariance matrix generated by weighting the elements in the PCM using the ACM.…”
Section: Inputs and Outputs Of Stagementioning
confidence: 99%
“…Producing Model-Fit Statistics. TSSEM Stage 2 produces the standard fit indices and parameter estimates [142]. Table 4 (PMT models) and Table 5 (EPPM models) detail the results of the analyses by reporting the estimated path coefficients and their significance as well as the R 2 values for each dependent variable and the fit indices for assessing model fit, using the generally accepted thresholds for CFI, TLI, RMSEA, and SRMR.…”
Section: Inputs and Outputs Of Stagementioning
confidence: 99%
“…Imgraben et al (2014) found that users lack awareness of potential negative consequences associated with risky behaviour such as jailbreaking phones and then loading unverified apps on phones. A lack of knowledge and awareness concerning threats and consequences related to data protection, app downloading, backups and network connectivity were also indicated (Alsaleh et al, 2017;Barth et al, 2019;Egelman et al, 2014;Etaher and Weir, 2016;Gkioulos et al, 2017;Imgraben et al, 2014;De Santo and Gaspoz, 2015;Serrano-Tellería, 2018;Watson and Zheng, 2017).…”
Section: Knowledge and Awarenessmentioning
confidence: 99%
“…So too does the attention people tend to pay to specific transfer settings. In digital contexts, consumers have become used to pressing install without paying attention to notices and permissions (De Santo and Gaspoz 2015; Jensen, Potts, and Jensen 2005; see cases 2 and 14). Notably, lack of salience is characteristic of information but can also happen for goods, such as in case 16, where the good is hidden among other goods.…”
Section: The 3r Interdependent Privacy Protection Frameworkmentioning
confidence: 99%