Factors Influencing Smartphone Application Downloads
Mobile applications are increasingly being downloaded in modern society. Despite providing many benefits to potential users, many such applications pose security risks to their users including the leaking of personal information. When applications provide features that fulfil the users’ needs, smartphone users often neglect to consider security when downloading applications. This paper explores whether students consider relevant Security Factors when selecting an application to download. A Smartphone Simulation Exercise and related questions were used to determine students’ reported behaviour regarding smartphone application downloads. The findings suggest that many students do not consider relevant Security Factors important when downloading applications and, therefore, need to be educated in this regard.
KeywordsMobile applications Smartphone behaviour Secure application downloads Security Factors
The financial assistance of the National Research Foundation (NRF) towards this research is hereby acknowledged. Opinions expressed, and conclusions arrived at, are those of the authors, and cannot necessarily be attributed to the NRF.
- 1.Statista, Smartphone users worldwide 2014–2020. https://www.statista.com/statistics/330695/number-of-smartphone-users-worldwide/. Accessed 15 Apr 2018
- 2.Statista, Share of global population that uses a smartphone 2014–2021. https://www.statista.com/statistics/203734/global-smartphone-penetration-per-capita-since-2005/. Accessed 15 Apr 2018
- 3.Chaffey, D.: Percent time spent on mobile apps (2016). http://www.smartinsights.com/mobile-marketing/mobile-marketing-analytics/mobile-marketing-statistics/attachment/percent-time-spent-on-mobile-apps-2016/. Accessed 8 Aug 2017
- 5.Google Play, Developer Policy Center. https://play.google.com/about/developer-content-policy-print/. Accessed 18 Apr 2018
- 6.Shaw, C.M.: Designing and using simulations and role-play exercises. The International Studies Encyclopedia. Robert A. Blackwell Publishing, Denemark (2010)Google Scholar
- 7.Smith, E.T., Boyer, M.A.: Designing in-class simulations. Polit. Sci. Polit. 29(6), 690–694 (1997)Google Scholar
- 9.Negash, S., Shahriar, H.: Mobile app permissions awareness. In: 2015 5th International Conference on Information & Communication Technology and Accessibility (ICTA), pp. 1–4. IEEE (2015)Google Scholar
- 12.Privacy Shield Framework, WhatsApp Inc. https://www.privacyshield.gov/participant?id=a2zt0000000TSnwAAG. Accessed 30 Jun 2018
- 13.Cluley, G.: Android malware poses as Angry Bird Space game (2012). https://nakedsecurity.sophos.com/2012/04/12/android-malware-angry-birds-space-game/. Accessed 30 Jun 2018