Responsive image
博碩士論文 etd-0711114-042645 詳細資訊
Title page for etd-0711114-042645
論文名稱
Title
瞭解權限要求對於採用手機APP之影響
Understanding the Impacts of Permission Requested on Mobile App Adoption
系所名稱
Department
畢業學年期
Year, semester
語文別
Language
學位類別
Degree
頁數
Number of pages
100
研究生
Author
指導教授
Advisor
召集委員
Convenor
口試委員
Advisory Committee
口試日期
Date of Exam
2014-07-16
繳交日期
Date of Submission
2014-08-11
關鍵字
Keywords
科技接受模型、權限、Android、認知隱私風險、社會交換理論
permission, Android, technology acceptance model, perceived privacy risk, social exchange theory
統計
Statistics
本論文已被瀏覽 5976 次,被下載 65
The thesis/dissertation has been browsed 5976 times, has been downloaded 65 times.
中文摘要
隨著智慧型手機的普及,智慧型手機上的應用程式-App已經成為熱門的議題。 在Android平台中,App為了使用者各式各樣的功能必須各種取得權限;然而,App也有可能要求為了提供功能外的權限,使用者必須先同意App的權限要求才能下載App。 本研究旨在了解權限對於使用者採用App的影響,提出了權限-功能適配度的概念,並以科技接受模型為基礎結合認知隱私風險及社會交換理論來做深入的探討。
本研究結果包含: (1) 使用者對於App的態度會正向影響其下載意圖。 (2) 使用者對App的認知有用性及App得到的評分會正向影響使用者對於App的態度;認知隱私風險會負向影響使用者對於App的態度;當App要求的權限超過它所提供的功能時,使用者對於App的態度會較為負面。 其中以認知有用性的影響最大 (3) App要求權限的隱私程度會正向影響使用者認知的隱私風險;App要求的權限超過它提供的功能時,使用者會認知更多隱私風險。
Abstract
Because of the expanding of smartphones, the applications on smartphones, Apps, are widely discussed. In Android platform, Apps have to acquire permissions in order to provide various functions for users. However, Apps might request more permissions than they need. Users have to grant permissions requested by Apps before downloading Apps. The purpose of this study is understanding the impacts of permissions on users' intention to download mobile Apps. We proposed the concept of "permission-function fit (PFF)", and included perceived privacy risk and social exchange theory into TAM to explore the research purpose.
The results of this study are: (1) users' attitude toward the App positively influences their download intention. (2) Users' perceived usefulness and the ranking of the App positively influence users' attitude toward the App; perceived privacy risk negatively affect users' attitude; when App requests more permissions than it needs, users have negative attitude toward it. Perceived usefulness has the strongest effect on attitude. (3)The privacy level of permissions positively affects users' perception of privacy risk; when Apps request more permissions than they need, users perceive higher privacy risk.
目次 Table of Contents
論文審定書 i
中文摘要 ii
Abstract iii
Table of Content iv
List of Figures vi
List of Tables vii
Chapter 1 Introduction 1
1.1 Research Background 1
1.2 Motivation 3
1.3 Research Purpose 6
Chapter 2 Literature Review 8
2.1 Technology Acceptance Model (TAM) 8
2.2 Perceived Risk 10
2.3 Download Process of Different App Stores 13
2.4 Privacy Level of Permissions and Privacy Concern 17
2.5 Permission-Function Fit (PFF) and Social Exchange Theory (SET) 20
2.6 Ranking and Electronic Word-of-Mouth (eWOM) 21
Chapter 3 Research Model and Hypotheses 24
3.1 Research Model 24
3.2 Hypotheses 27
3.2.1 Perceived Usefulness, Attitude and Download Intention 27
3.2.2 Perceived Privacy Risk and Attitude 28
3.2.3 Privacy Level of Permissions and Perceived Privacy Risk 30
3.2.4 Permission-Function Fit, Perceive Privacy Risk and Attitude 31
3.2.5 Ranking and Attitude 33
3.3 Operational Definitions 34
Chapter 4 Research Methodology 36
4.1 Experiment Design 36
4.2 Scenario Design 37
4.3 Experiment System and Experiment Process 45
4.3.1 Experiment System 45
4.3.2 Experiment Process 45
4.4 Questionnaire Design 47
4.5 Pilot Test and Pretest 49
4.6 Incentives 49
4.7 Data Collection 51
Chapter 5 Data Analysis 52
5.1 Demographic Statistics 52
5.2 Reliability and Validity 55
5.3 Analysis Results 59
5.3.1 Relationships among Privacy Level of Requested Permissions, Permission-Function Fit and Perceived Privacy Risk 60
5.3.2 Relationships among Permission-Function Fit, Ranking and Attitude 62
5.4 Mediator 63
5.4.1 Perceived Privacy Risk 65
5.4.2 Attitude as a Mediator 66
5.5 Discussion 68
5.5.1 Analysis Results 68
5.5.2 Discussion of PFF 69
5.6 Theoretial Implication 73
5.6.1 Practical Implication 74
Chapter 6 Conclusions 76
6.1 Summary 76
6.2 Limitations 77
6.3 Future Research 78
Reference 79
Appendix 85
參考文獻 References
iThome (2013, Aug 13) Google:台灣智慧型手機普及率已達51%. Retrieved May 22, 2014, http://www.ithome.com.tw/node/82029
Business Insider (2013, Jun 5) CHART OF THE DAY: Smartphone Sales Are On The Verge Of Overtaking Feature Phone Sales. Retrieved November 12, 2013, from http://www.businessinsider.com/chart-of-the-day-smartphones-to-beat-feature-phone-sales-2013-6
Engadget (2012, Jun 11) App Store hits 650,000 apps, 30 billion downloads, $5 billion doled out to developers. Retrieved November 12, 2013, http://www.engadget.com/2012/06/11/app-store-hits-650-000-apps-30-billion-
downloads-5-billion-do/
Engadget (2012, Jun 27) Google Play hits 600,000 apps, 20 billion total installs. Retrieved November 12, 2013, http://www.engadget.com/2012/06/27/google-play-hits-600000-apps/
Gartner Symposium/ITxpo (2013, Sep 19) Gartner Says Mobile App Stores Will See Annual Downloads Reach 102 Billion in 2013. Retrieved November 12, 2013, http://www.gartner.com/newsroom/id/2592315
The Register (2013, Jun 26) Report: Android malware up 614% as smartphone scams go industrial. Retrieved May 22, 2014, http://www.theregister.co.uk/2013/06/26/android_malware_bloom_security_updates/
Agarwal, R., & Karahanna, E. (2000). Time Flies When You're Having Fun: Cognitive Absorption and Beliefs about Information Technology Usage. MIS Quarterly, 24(4), 665-694.
Akaah, I. P., & Korgaonkar, P. K. (1988). A conjoint investigation of the relative importance of risk relievers in direct marketing. Journal of Advertising Research, 28(4), 38-44.
Akturan, U., & Tezcan, N. (2012). Mobile banking adoption of the youth market: Perceptions and intentions. Marketing Intelligence & Planning, 30(4), 444-459.
Albarq, A. N. (2013). Measuring the Impacts of Online Word-of-Mouth on Tourists’ Attitude and Intentions to Visit Jordan: An Empirical Study. International Business Research, 7(1), 14-22.
Aldás-Manzano, J., Lassala-Navarré, C., Ruiz-Mafé, C., & Sanz-Blas, S. (2009). The role of consumer innovativeness and perceived risk in online banking usage. International Journal of Bank Marketing, 27(1), 53-75.
Arndt, J. (1967). Role of Product-Related Conversations in the Diffusion of a New Product. Journal of Marketing Research, 4(3), 291-295.
Baron, R. M., & Kenny, D. A. (1986). The moderator–mediator variable distinction in social psychological research: Conceptual, strategic, and statistical considerations. Journal of personality and social psychology, 51(6), 1173-1182.
Bauer, R. A. (1960). Consumer behavior as risk taking. Dynamic marketing for a changing world, 398.
Biyalogorsky, E., Gerstner, E., & Libai, B. (2001). Customer referral management: Optimal reward programs. Marketing Science, 20(1), 82-95.
Blau, P. M. (1964). Exchange and power in social life: Transaction Publishers.
Chen, Y., & Xie, J. (2008). Online consumer review: Word-of-mouth as a new element of marketing communication mix. Management Science, 54(3), 477-491.
Cheng, F.-F., Liu, T.-Y., & Wu, C.-S. (2013). Perceived Risks and Risk Reduction Strategies in Online Group-Buying. Paper presented at the Diversity, Technology, and Innovation for Operational Competitiveness: Proceedings of the 2013 International Conference on Technology Innovation and Industrial Management.
Chiu, C.-M., Hsu, M.-H., Lai, H., & Chang, C.-M. (2012). Re-examining the influence of trust on online repeat purchase intention: The moderating role of habit and its antecedents. Decision Support Systems, 53(4), 835-845.
Chiu, C.-M., Lin, H.-Y., Sun, S.-Y., & Hsu, M.-H. (2009). Understanding customers' loyalty intentions towards online shopping: an integration of technology acceptance model and fairness theory. Behaviour & Information Technology, 28(4), 347-360.
Chou, C.-H., Chiu, C.-H., Ho, C.-Y., & Lee, J.-C. (2013). Understanding Mobile Apps Continuance Usage Behavior and Habit: An Expectance-Confirmation Theory. PACIS 2013 Proceedings.
Culnan, M. J., & Armstrong, P. K. (1999). Information Privacy Concerns, Procedural Fairness, and Impersonal Trust: An Empirical Investigation. Organization Science, 10(1), 104-115.
Davis, F. D. (1989). Perceived Usefulness, Perceived Ease of Use, and User Acceptance of Information Technology. MIS Quarterly, 13(3), 319-340.
Dellarocas, C. (2003). The digitization of word of mouth: Promise and challenges of online feedback mechanisms. Management Science, 49(10), 1407-1424.
Dinev, T., & Hart, P. (2006). An extended privacy calculus model for e-commerce transactions. Information Systems Research, 17(1), 61-80.
Featherman, M. S., & Pavlou, P. A. (2003). Predicting e-services adoption: a perceived risk facets perspective. International Journal of Human-Computer Studies, 59(4), 451-474.
Felt, A. P., Chin, E., Hanna, S., Song, D., & Wagner, D. (2011). Android permissions demystified. Paper presented at the Proceedings of the 18th ACM conference on Computer and communications security, Chicago, Illinois, USA.
Fornell, C., & Larcker, D. F. (1981). Evaluating structural equation models with unobservable variables and measurement error. Journal of Marketing Research, 18(1), 39-50.
Gefen, D., Karahanna, E., & Straub, D. W. (2003). Trust and TAM in online shopping: an integrated model. MIS Quarterly, 27(1), 51-90.
Grewal, D., Gotlieb, J., & Marmorstein, H. (1994). The Moderating Effects of Message Framing and Source Credibility on the Price-Perceived Risk Relationship. Journal of Consumer Research, 21(1), 145-153.
Gruen, T. W., Osmonbekov, T., & Czaplewski, A. J. (2006). eWOM: The impact of customer-to-customer online know-how exchange on customer value and loyalty. Journal of Business Research, 59(4), 449-456.
Ha, S., & Stoel, L. (2009). Consumer e-shopping acceptance: Antecedents in a technology acceptance model. Journal of Business Research, 62(5), 565-571.
Heijden, H. (2004). User acceptance of hedonic information systems. MIS Q., 28(4), 695-704.
Homans, G. C. (1958). Social Behavior as Exchange. American journal of sociology, 63(6), 597-606.
Hsu, C.-L., & Lin, J. C.-C. (2008). Acceptance of blog usage: The roles of technology acceptance, social influence and knowledge sharing motivation. Information & Management, 45(1), 65-74.
Hsu, C.-L., & Lu, H.-P. (2004). Why do people play on-line games? An extended TAM with social influences and flow experience. Information & Management, 41(7), 853-868.
Jarvenpaa, S. L., Tractinsky, N., & Saarinen, L. (1999). Consumer Trust in an Internet Store: A Cross-Cultural Validation. Journal of Computer-Mediated Communication, 5(2), 0-0.
Kim, B., Choi, M., & Han, I. (2009). User behaviors toward mobile data services: The role of perceived fee and prior experience. Expert Systems with Applications, 36(4), 8528-8536.
Kuo, Y.-F., & Yen, S.-N. (2009). Towards an understanding of the behavioral intention to use 3G mobile value-added services. Computers in Human Behavior, 25(1), 103-110.
López-Nicolás, C., Molina-Castillo, F. J., & Bouwman, H. (2008). An assessment of advanced mobile services acceptance: Contributions from TAM and diffusion theory models. Information & Management, 45(6), 359-364.
Lederer, A. L., Maupin, D. J., Sena, M. P., & Zhuang, Y. (2000). The technology acceptance model and the World Wide Web. Decision Support Systems, 29(3), 269-282.
Lee, J., Park, D.-H., & Han, I. (2008). The effect of negative online consumer reviews on product attitude: An information processing view. Electronic Commerce Research and Applications, 7(3), 341-352.
Lee, M.-C. (2009). Factors influencing the adoption of internet banking: An integration of TAM and TPB with perceived risk and perceived benefit. Electronic Commerce Research and Applications, 8(3), 130-141.
Lim, N. (2003). Consumers’ perceived risk: sources versus consequences. Electronic Commerce Research and Applications, 2(3), 216-228.
Lin, H.-F. (2011). An empirical investigation of mobile banking adoption: The effect of innovation attributes and knowledge-based trust. International Journal of Information Management, 31(3), 252-260.
Lu, Y., Zhou, T., & Wang, B. (2009). Exploring Chinese users’ acceptance of instant messaging using the theory of planned behavior, the technology acceptance model, and the flow theory. Computers in Human Behavior, 25(1), 29-39.
Luarn, P., & Lin, H.-H. (2005). Toward an understanding of the behavioral intention to use mobile banking. Computers in Human Behavior, 21(6), 873-891.
Luo, X., Li, H., Zhang, J., & Shim, J. P. (2010). Examining multi-dimensional trust and multi-faceted risk in initial acceptance of emerging technologies: An empirical study of mobile banking services. Decision Support Systems, 49(2), 222-234.
Malhotra, N. K., Kim, S. S., & Agarwal, J. (2004). Internet Users' Information Privacy Concerns (IUIPC): The Construct, the Scale, and a Causal Model. Information Systems Research, 15(4), 336-355.
Malhotra, N. K., Kim, S. S., & Patil, A. (2006). Common method variance in IS research: a comparison of alternative approaches and a reanalysis of past research. Management Science, 52(12), 1865-1883.
Milne, G. R., & Gordon, M. E. (1993). Direct Mail Privacy-Efficiency Trade-offs Within an Implied Social Contract Framework. Journal of Public Policy & Marketing, 12(2), 206-215.
Mitchell, V.-W. (1992). Understanding consumers’ behaviour: can perceived risk theory help? Management Decision, 30(3), 26-31.
Miyazaki, A. D., & Fernandez, A. (2001). Consumer Perceptions of Privacy and Security Risks for Online Shopping. Journal of Consumer Affairs, 35(1), 27-44.
Nepomuceno, M. V., Laroche, M., & Richard, M.-O. (2014). How to reduce perceived risk when buying online: The interactions between intangibility, product knowledge, brand familiarity, privacy and security concerns. Journal of Retailing and Consumer Services, 21(4), 619-629.
Nysveen, H., Pedersen, P. E., & Thorbjørnsen, H. (2005). Explaining intention to use mobile chat services: moderating effects of gender. Journal of Consumer Marketing, 22(5), 247-256.
Peter, J. P., & Ryan, M. J. (1976). An Investigation of Perceived Risk at the Brand Level. Journal of Marketing Research, 13(2), 184-188.
Reza Jalilvand, M., Samiei, N., Dini, B., & Yaghoubi Manzari, P. (2012). Examining the structural relationships of electronic word of mouth, destination image, tourist attitude toward destination and travel intention: An integrated approach. Journal of Destination Marketing & Management, 1(1–2), 134-143.
Richins, M. L., & Root-Shaffer, T. (1988). The role of evolvement and opinion leadership in consumer word-of-mouth: An implicit model made explicit. Advances in Consumer Research, 15(1), 32-36.
Ross, I. (1975). Perceived risk and consumer behavior: a critical review. Advances in Consumer Research, 2(1), 1-19.
Salam, A., Rao, R., & Pegels, C. (1998). An investigation of consumer-perceived risk on electronic commerce transactions: The role of institutional trust and economic incentive in a social exchange framework. AMCIS 1998 Proceedings, 114.
Sarma, B. P., Li, N., Gates, C., Potharaju, R., Nita-Rotaru, C., & Molloy, I. (2012). Android permissions: a perspective combining risks and benefits. Paper presented at the Proceedings of the 17th ACM symposium on Access Control Models and Technologies, Newark, New Jersey, USA.
Schierz, P. G., Schilke, O., & Wirtz, B. W. (2010). Understanding consumer acceptance of mobile payment services: An empirical analysis. Electronic Commerce Research and Applications, 9(3), 209-216.
Shi, M. (2003). Social network-based discriminatory pricing strategy. Marketing Letters, 14(4), 239-256.
Smith, H. J., & Milberg, S. J. (1996). Information privacy: measuring individuals' concerns about organizational practices. MIS Q., 20(2), 167-196.
Sobel, M. E. (1982). Asymptotic confidence intervals for indirect effects in structural equation models. Sociological methodology, 13(1982), 290-312.
Tan, S. J. (1999). Strategies for reducing consumers’ risk aversion in Internet shopping. Journal of Consumer Marketing, 16(2), 163-180.
Taylor, J. W. (1974). The Role of Risk in Consumer Behavior. Journal of Marketing, 38(2), 54-60.
van der Heijden, H. (2003). Factors influencing the usage of websites: the case of a generic portal in The Netherlands. Information & Management, 40(6), 541-549.
Venkatesh, V., Thong, J. Y., & Xu, X. (2012). Consumer acceptance and use of information technology: extending the unified theory of acceptance and use of technology. MIS Quarterly, 36(1), 157-178.
Weinberger, M. G., Allen, C. T., & Dillon, W. R. (1981). Negative information: Perspectives and research directions. Advances in Consumer Research, 8(1), 398-404.
Wu, S., Lin, C. S., & Lin, T.-C. (2006). Exploring knowledge sharing in virtual teams: A social exchange theory perspective. Paper presented at the System Sciences, 2006. HICSS'06. Proceedings of the 39th Annual Hawaii International Conference on.
Xu, H., Teo, H.-H., & Tan, B. C. Y. (2005). Predicting the Adoption of Location-Based Services: The Role of Trust and Perceived Privacy Risk. Paper presented at the ICIS.
Yang, B., Kim, Y., & Yoo, C. (2013). The integrated mobile advertising model: The effects of technology- and emotion-based evaluations. Journal of Business Research, 66(9), 1345-1352.
Yang, K., & Jolly, L. D. (2009). The effects of consumer perceived value and subjective norm on mobile data service adoption between American and Korean consumers. Journal of Retailing and Consumer Services, 16(6), 502-508.
Zhou, T. (2012). Examining location-based services usage from the perspectives of unified theory of acceptance and use of technology and privacy risk. Journal of Electronic Commerce Research, 13(2), 135-144.
Zhou, Y., Zhang, X., Jiang, X., & Freeh, V. (2011). Taming Information-Stealing Smartphone Applications (on Android) Trust and Trustworthy Computing (Vol. 6740, pp. 93-107): Springer Berlin Heidelberg.
電子全文 Fulltext
本電子全文僅授權使用者為學術研究之目的,進行個人非營利性質之檢索、閱讀、列印。請遵守中華民國著作權法之相關規定,切勿任意重製、散佈、改作、轉貼、播送,以免觸法。
論文使用權限 Thesis access permission:自定論文開放時間 user define
開放時間 Available:
校內 Campus: 已公開 available
校外 Off-campus: 已公開 available


紙本論文 Printed copies
紙本論文的公開資訊在102學年度以後相對較為完整。如果需要查詢101學年度以前的紙本論文公開資訊,請聯繫圖資處紙本論文服務櫃台。如有不便之處敬請見諒。
開放時間 available 已公開 available

QR Code