565
Views
11
CrossRef citations to date
0
Altmetric
Articles

The reliance on recognition and majority vote heuristics over privacy concerns when selecting smartphone apps among German and US consumers

, &
Pages 621-636 | Received 17 Sep 2015, Accepted 16 May 2016, Published online: 28 Jun 2016

References

  • Arvidsson, A. (2005). Brands: A critical perspective. Journal of Consumer Culture, 5(2), 235–258. doi:10.1177/1469540505053093
  • Bellman, S., Johnson, E. J., Kobrin, S. J., & Lohse, G. L. (2004). International differences in information privacy concerns: A global survey of consumers. The Information Society: An International Journal, 20(5), 313–324. Retrieved from SSRN: http://ssrn.com/abstract=1324721 doi: 10.1080/01972240490507956
  • Bellur, S., & Sundar, S. S. (2014). How can we tell when a heuristic has been used? Design and analysis strategies for capturing the operation of heuristics. Communication Methods and Measures, 8(2), 116–137. doi:10.1080/19312458.2014.903390
  • Bowman, N. D., Jöckel, S., & Dogruel, L. (2015). “The app market has been candy crushed”: Observed and rationalized processes for selecting smartphone games. Entertainment Computing, 8, 1–9. doi:10.1016/j.entcom.2015.04.001
  • Browne, G. J., Pitts, M. G., & Wetherbe, J. C. (2007). Cognitive stopping rules for terminating information search in online tasks. MIS Quarterly, 31(1), 89–104.
  • Chaiken, S., Liberman, A., & Eagly, A. H. (1989). Heuristic and systematic information processing within and beyond the persuasion context. In J. S. Uleman & J. A. Bargh (Eds.), Unintended thought (pp. 212–252). New York, NY: Guilford Press.
  • Chevalier, J. A., & Mayzlin, D. (2006). The effect of word of mouth on sales: Online book reviews. Journal of Marketing Research, 43(3), 345–354. doi:10.1509/jmkr.43.3.345
  • Chin, E., Porter Felt, A., Sekar, V., & Wagner, D. (2012). Measuring user confidence in smartphone security and privacy. In L. F. Cranor (Ed.), SOUPS proceedings of the eighth symposium on usable privacy and security (Article 1). Retrieved from https://cups.cs.cmu.edu/soups/2012/proceedings/a1_Chin.pdf
  • Cho, H., Rivera-Sanchez, M., & Lim, S. S. (2009). A multinational study on online privacy: Global concerns and local responses. New Media & Society, 11(3), 395–416. doi:10.1177/1461444808101618
  • Cockcroft, S., & Rekker, S. (2016). The relationship between culture and information privacy policy. Electronic Markets, 26(1), 55–72. doi:10.1007/s12525-015-0195-9
  • Dogruel, L., Joeckel, S., & Bowman, N. D. (2015). Choosing the right app: An exploratory perspective on heuristic decision processes for smartphone app selection. Mobile Media & Communication, 3 (1), 125–144. doi:10.1177/2050157914557509
  • Egelman, S., Porter Felt, A., & Wagner, D. (2013). Choice architecture and smartphone privacy: There’s a price for that. In R. Böhme (Ed.), The economics of information security and privacy (pp. 211–236). Berlin, Heidelberg: Springer Berlin Heidelberg.
  • Ericsson, K. A., & Simon, H. A. (1993). Protocol analysis: Verbal reports as data (Rev. ed.). Cambridge, MA: MIT Press.
  • Fischer, M., Völckner, F., & Sattler, H. (2010). How important are brands? A cross-category, cross-country study. Journal of Marketing Research, 47(5), 823–839. doi: 10.1509/jmkr.47.5.823
  • Flanagin, A. J., & Metzger, M. J. (2013). Trusting expert- versus user-generated ratings online: The role of information volume, valence, and consumer characteristics. Computers in Human Behavior, 29(4), 1626–1634. doi: 10.1016/j.chb.2013.02.001
  • Fu, W. W., & Sim, C. C. (2011). Aggregate bandwagon effect on online videos’ viewership: Value uncertainty, popularity cues, and heuristics. Journal of the American Society for Information Science and Technology, 62(12), 2382–2395. doi:10.1002/asi.21641
  • Fu, W. W., Teo, J., & Seng, S. (2012). The bandwagon effect on participation in and use of a social networking site. First Monday. Retrieved from http://firstmonday.org/ojs/index.php/fm/article/view/3971
  • Gage Kelley, P., Cranor, L., & Sadeh, N. (2013). Privacy as part of the app decision-making process. Proceedings of the SIGCHI conference on human factors in computing systems, 3393–3402. doi:10.1145/2470654.2466466
  • Gigerenzer, G., & Gaissmaier, W. (2011). Heuristic decision making. Annual Review of Psychology, 62, 451–482. doi:10.1146/annurev-psych-120709-145346
  • Goldstein, D. G., & Gigerenzer, G. (1999). The recognition heuristic. How ignorance makes us smart. In G. Gigerenzer, P. M. Todd, & The ABC Research Group (Eds.), Simple heuristics that make us smart (pp. 37–58). New York: Oxford University Press.
  • Grace, M. C., Zhou, W., Jiang, X., & Sadeghi, A.-R. (2012). Unsafe exposure analysis of mobile in-app advertisements. In M. Krunz, L. Lazos, R. Di Pietro, & W. Trappe (Eds.), The fifth ACM conference (p. 101–112). New York: ACM. doi:10.1145/2185448.2185464
  • van den Haak, M. J., & de Jong, M. (2003). Exploring two methods of usability testing: Concurrent versus retrospecntive think-aloud protocols. Proceedings of the IEEE international professional communication conference, 2003. IPCC 2003 (p. 3). doi:10.1109/IPCC.2003.1245501
  • Hennig-Thurau, T., & Walsh, G. (2004). Electronic word-of-mouth: Motives for and consequences of reading customer articulations on the internet. International Journal of Electronic Commerce, 8(2), 51–74.
  • Hsieh, M. H. (2002). Identifying brand image dimensionality and measuring the degree of brand globalization: A cross-national study. Journal of International Marketing, 10(2), 46–67. doi: 10.1509/jimk.10.2.46.19538
  • Huang, J.-H., & Chen, Y.-F. (2006). Herding in online product choice. Psychology and Marketing, 23(5), 413–428. doi: 10.1002/mar.20119
  • Joeckel, S., Dogruel, L., & Bowman, N. D. (2015a). Information removed for anonymity.
  • Joeckel, S., Dogruel, L., & Bowman, N. D. (2015b). Information removed for anonymity.
  • Jung, J., Kim, Y., & Chan-Olmsted, S. (2014). Measuring usage concentration of smartphone applications: Selective repertoire in a marketplace of choices. Mobile Media & Communication, 2(3), 352–368. doi:10.1177/2050157914542172
  • Lee, H. H., & Hill, J. T. (2013). Moderating effect of privacy self-efficacy on location-based mobile marketing. International Journal of Mobile Communications, 11(4), 330. doi:10.1504/IJMC.2013.055747
  • Marewski, J. N., Galesic, M., & Gigerenzer, G. (2009). Fast and frugal media choices. In T. Hartmann (Ed.), Media choice (pp. 102–127). New York: Routledge.
  • Metzger, M. J., Flanagin, A. J., & Medders, R. B. (2010). Social and heuristic approaches to credibility evaluation online. Journal of Communication, 60(3), 413–439. doi:10.1111/j.1460-2466.2010.01488.x
  • Morse, J. M. (2003). Principles of mixed-methods and multimethod research design. In A. Tashakkori & C. Teddlie (Eds.), Handbook of mixed methods in social & behavioral research (pp. 189–208). London: Sage.
  • Porter Felt, A., Hay, E., Egelman, S., Haney, A., Chin, E., & Wagner, D. (2012, July). Android permissions: User attention, comprehension, and behavior. Symposium on usable privacy and security, Washington, DC, USA. Retrieved April 18, 2014, from http://www.cs.berkeley.edu/~afelt/felt-androidpermissions-soups.pdf
  • Qiu, L., Pang, J., & Lim, K. H. (2012). Effects of conflicting aggregated rating on eWOM review credibility and diagnosticity: The moderating role of review valence. Decision Support Systems, 54 (1), 631–643. doi: 10.1016/j.dss.2012.08.020
  • Rainie, L., & Duggan, M. (2015). Privacy and information sharing. Pew research center, December 2015. Retrieved from http://www.pewinternet.org/2016/01/14/2016/Privacy-and-Information-Sharing/
  • Rosen, S. (1981). The economics of Superstars. The American Economic Review, 71(5), 845–858.
  • Salmona, M., Melton, J., & Miller, R. (2013). Online social networking across cultures: An exploration of divergent and common practices. Journal of Technical Writing and Communication, 43(3), 317–331. doi:10.2190/TW.43.3.e
  • Schwartz, B. (2009). The paradox of choice: Why more is less (19th printing). New York, NY: HarperCollins.
  • Shankar, V., Urban, G. L., & Sultan, F. (2002). Online trust: A stakeholder perspective, concepts, implications, and future directions. The Journal of Strategic Information Systems, 11(3–4), 325–344. doi:10.1016/S0963-8687(02)00022-7
  • Sheth, S., Kaiser, G., & Maalej, W. (2014). US and them: A study of privacy requirements across North America, Asia, and Europe. In P. Jalote, L. Briand, & A. van der Hoek (Eds.), The 36th International Conference on Software Engineering (pp. 859–870). New York: ACM. doi:10.1145/2568225.2568244
  • Simon, H. A. (1954). Bandwagon and underdog effects and the possibility of election predictions. The Public Opinion Quarterly, 18(3), 245–253. doi: 10.1086/266513
  • Singh, T., & Hill, M. E. (2003). Consumer privacy and the internet in Europe: A view from Germany. Journal of Consumer Marketing, 20(7), 634–651. doi:10.1108/07363760310506175
  • Sundar, S. S. (2008). The MAIN model: A heuristic approach to understanding technology effects on credibility. In M. J. Metzger & A. J. Flanagin (Eds.), Digital media, youth, and credibility (pp. 73–100). Cambridge, MA: The MIT Press.
  • Sundar, S. S., Knobloch-Westerwick, S., & Hastall, M. R. (2007). News cues: Information scent and cognitive heuristics. Journal of the American Society for Information Science and Technology, 58(3), 366–378. doi:10.1002/asi.20511
  • Taylor, K. L., & Dionne, J.-P. (2000). Accessing problem-solving strategy knowledge: The complementary use of concurrent verbal protocols and retrospective debriefing. Journal of Educational Psychology, 92(3), 413–425. doi:10.1037/0022-0663.92.3.413
  • Urban, G. L., Amyx, C., & Lorenzon, A. (2009). Online trust: State of the art, new frontiers, and research potential. Journal of Interactive Marketing, 23(2), 179–190. doi:10.1016/j.intmar.2009.03.001
  • Walther, J. B., & Parks, M. R. (2002). Cues filtered out, cues filtered in: Computer mediated communication and relationships. In M. L. Knapp & J. A. Daly (Eds.), Handbook of interpersonal communication (3rd ed., pp. 529–563). Thousand Oaks, CA: Sage.
  • Wang, Y. D., & Emurian, H. H. (2005). An overview of online trust: Concepts, elements, and implications. Computers in Human Behavior, 21(1), 105–125. doi:10.1016/j.chb.2003.11.008
  • Warren, T. (2013, December 6). Millions of Android users ‘deceived’ by flashlight app that shares location with advertisers. The Verge. Retrieved May 3, 2016, from http://www.theverge.com/2013/12/6/5181472/brightest-flashlight-free-ftc-location-data-settlement
  • Westin, A. F. (1967). Privacy and freedom. New York: Atheneum.
  • Wirth, W., Böcking, T., Karnowski, V., & von Pape, T. (2007). Heuristic and systematic use of search engines. Journal of Computer-Mediated Communication, 12(3), 778–800. doi:10.1111/j.1083-6101.2007.00350.x
  • Xu, X., Xiaoming, H., & Jung, Y. (2014). An information-processing model for audiences’ selections of online movies: Quantitative versus qualitative bandwagon effects. Paper presented at annual conference of International Communication Association, Seattle.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.