946
Views
7
CrossRef citations to date
0
Altmetric
Original Articles

Between privacy and security: the factors that drive intentions to use cyber-security applications

, , &
Pages 1769-1783 | Received 14 Jan 2020, Accepted 05 Jun 2020, Published online: 29 Jun 2020
 

ABSTRACT

Installing security applications is a common way to protect against malicious apps, phishing emails, and other threats in mobile operating systems. While these applications can provide essential security protections, they also tend to access large amounts of people's sensitive information. Therefore, individuals need to evaluate the trade-off between the security features and the privacy invasion when deciding on which protection mechanisms to use. In this paper, we examine factors affecting the willingness to install mobile security applications by taking into account the invasion levels and security features of cyber-security applications. To this end, we propose a visual language that depicts the coverage of different security features as well as privacy intrusiveness levels. Our user study (n=300) shows that users assessing security applications find their trade-off balance in highly secure apps with a medium level of privacy invasion. The results indicate that a low privacy invasion might signal that the security application provides less security. We discuss these findings in the context of understanding the trade-off between privacy and security.

Acknowledgments

The work was supported by the Italian Ministry of Foreign Affairs and Israel's Ministry of Science, Technology and Space project PACS ‘Privacy-Aware Cyber-Security’, grant number 3-12288. We would also like to thank Claudio Bettini and Erez Shmueli for their helpful comments and feedback.

Disclosure statement

No potential conflict of interest was reported by the authors.

Additional information

Funding

The work was supported by the Italian Ministry of Foreign Affairs and Israel's Ministry of Science, Technology and Space project PACS ‘Privacy-Aware Cyber-Security’ [grant number 3-12288] and by Blavatnik Interdisciplinary Cyber Research Center (ICRC) [grant number 590713].

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.