Factors Influencing Smartphone Application Downloads

  • Wiehan Janse Van Rensburg
  • Kerry-Lynn ThomsonEmail author
  • Lynn Futcher
Conference paper
Part of the IFIP Advances in Information and Communication Technology book series (IFIPAICT, volume 531)


Mobile applications are increasingly being downloaded in modern society. Despite providing many benefits to potential users, many such applications pose security risks to their users including the leaking of personal information. When applications provide features that fulfil the users’ needs, smartphone users often neglect to consider security when downloading applications. This paper explores whether students consider relevant Security Factors when selecting an application to download. A Smartphone Simulation Exercise and related questions were used to determine students’ reported behaviour regarding smartphone application downloads. The findings suggest that many students do not consider relevant Security Factors important when downloading applications and, therefore, need to be educated in this regard.


Mobile applications Smartphone behaviour Secure application downloads Security Factors 



The financial assistance of the National Research Foundation (NRF) towards this research is hereby acknowledged. Opinions expressed, and conclusions arrived at, are those of the authors, and cannot necessarily be attributed to the NRF.


  1. 1.
    Statista, Smartphone users worldwide 2014–2020. Accessed 15 Apr 2018
  2. 2.
    Statista, Share of global population that uses a smartphone 2014–2021. Accessed 15 Apr 2018
  3. 3.
  4. 4.
    Allam, S., Flowerday, S.V., Flowerday, E.: Smartphone information security awareness: a victim of operational pressures. Comput. Secur. 42, 56–65 (2014). Scholar
  5. 5.
    Google Play, Developer Policy Center. Accessed 18 Apr 2018
  6. 6.
    Shaw, C.M.: Designing and using simulations and role-play exercises. The International Studies Encyclopedia. Robert A. Blackwell Publishing, Denemark (2010)Google Scholar
  7. 7.
    Smith, E.T., Boyer, M.A.: Designing in-class simulations. Polit. Sci. Polit. 29(6), 690–694 (1997)Google Scholar
  8. 8.
    Awad, N., Krishnan, M.: The personalization privacy paradox: an empirical evaluation of information transparency and the willingness to be profiled online for personalization. MIS Q. 30(1), 13–28 (2006). Scholar
  9. 9.
    Negash, S., Shahriar, H.: Mobile app permissions awareness. In: 2015 5th International Conference on Information & Communication Technology and Accessibility (ICTA), pp. 1–4. IEEE (2015)Google Scholar
  10. 10.
    Theoharidou, M., Mylonas, A., Gritzalis, D.: A risk assessment method for smartphones. In: Gritzalis, D., Furnell, S., Theoharidou, M. (eds.) SEC 2012. IAICT, vol. 376, pp. 443–456. Springer, Heidelberg (2012). Scholar
  11. 11.
    Furnell, S., Clarke, N.: Power to the people? The evolving recognition of human aspects of security. Comput. Secur. 31(8), 983–988 (2012)CrossRefGoogle Scholar
  12. 12.
    Privacy Shield Framework, WhatsApp Inc. Accessed 30 Jun 2018
  13. 13.
    Cluley, G.: Android malware poses as Angry Bird Space game (2012). Accessed 30 Jun 2018

Copyright information

© IFIP International Federation for Information Processing 2018

Authors and Affiliations

  1. 1.Nelson Mandela UniversityPort ElizabethSouth Africa

Personalised recommendations