{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,19]],"date-time":"2024-09-19T15:38:27Z","timestamp":1726760307867},"reference-count":124,"publisher":"Wiley","issue":"6","license":[{"start":{"date-parts":[[2015,6,19]],"date-time":"2015-06-19T00:00:00Z","timestamp":1434672000000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/onlinelibrary.wiley.com\/termsAndConditions#vor"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Information Systems Journal"],"published-print":{"date-parts":[[2015,11]]},"abstract":"Abstract<\/jats:title>Smartphones are increasingly penetrating business and consumer markets, and mobile applications (apps) have engendered a large and innovative market. Whereas apps are useful, they also present new forms of privacy risk associated with users' personal and location data. However, these dangers do not appear to increase the perceived risk or reduce the trust consumers demonstrate when using apps. Many information technology (IT) trust indicators are well documented such as the quality of the IT, trust assurances, brand recognition and social influences. However, these traditional indicators appear to have a lesser impact on the adoption of mobile commerce via apps because of the nature of mobile\u2010app adoption and subsequent information disclosure. As a result, we draw from social cognitive theory and its construct of self\u2010efficacy in particular to explain perceived mobile\u2010app risk and provider trust. Through two controlled experiments, we demonstrate the strong direct effect of mobile\u2010computing self\u2010efficacy on users' initial trust in location\u2010based app vendors as well as their perceived risk of disclosing information \u2013 regardless of the actual trustworthiness of the app vendor. The results imply that being skilled in the latest smartphones and apps can cause users to place greater trust in app providers and perceive less risk in the app itself, even when the intentions of the app providers cannot be verified.<\/jats:p>","DOI":"10.1111\/isj.12082","type":"journal-article","created":{"date-parts":[[2015,6,20]],"date-time":"2015-06-20T08:04:17Z","timestamp":1434787457000},"page":"637-667","source":"Crossref","is-referenced-by-count":99,"title":["The role of mobile\u2010computing self\u2010efficacy in consumer information disclosure"],"prefix":"10.1111","volume":"25","author":[{"ORCID":"http:\/\/orcid.org\/0000-0002-2588-8590","authenticated-orcid":false,"given":"Mark J.","family":"Keith","sequence":"first","affiliation":[{"name":"Brigham Young University Provo UT USA"}]},{"given":"Jeffry S.","family":"Babb","sequence":"additional","affiliation":[{"name":"West Texas A&M University Canyon TX USA"}]},{"given":"Paul Benjamin","family":"Lowry","sequence":"additional","affiliation":[{"name":"City University of Hong Kong Kowloon Tong Hong Kong"}]},{"given":"Christopher P.","family":"Furner","sequence":"additional","affiliation":[{"name":"East Carolina University Greenville NC USA"}]},{"given":"Amjad","family":"Abdullat","sequence":"additional","affiliation":[{"name":"West Texas A&M University Canyon TX USA"}]}],"member":"311","published-online":{"date-parts":[[2015,6,19]]},"reference":[{"key":"e_1_2_8_2_1","unstructured":"148apps(2012)App store metrics. Retrieved date: October 4 2012 URL:http:\/\/148apps.biz\/app\u2010store\u2010metrics\/?mpage=appprice"},{"key":"e_1_2_8_3_1","unstructured":"Acquisti A.&Grossklags J.(2003)Losses gains and hyperbolic discounting: an experimental approach to information security attitudes and behavior. In:UC Berkeley 2nd Annual Workshop on Economics and Information Security pp.1\u201327.Berkeley CA."},{"key":"e_1_2_8_4_1","doi-asserted-by":"publisher","DOI":"10.1007\/1-4020-8090-5_13"},{"key":"e_1_2_8_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2005.22"},{"key":"e_1_2_8_6_1","doi-asserted-by":"publisher","DOI":"10.1287\/isre.11.4.418.11876"},{"key":"e_1_2_8_7_1","doi-asserted-by":"publisher","DOI":"10.1016\/0749-5978(91)90020-T"},{"key":"e_1_2_8_8_1","unstructured":"Angwin J.&Valentino\u2010Devries J.(2011)Apple Google collect user data. Retrieved date: May 31 2011 url:http:\/\/online.wsj.com\/article\/SB10001424052748703983704576277101723453610.html"},{"key":"e_1_2_8_9_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11031-006-9008-y"},{"key":"e_1_2_8_10_1","doi-asserted-by":"publisher","DOI":"10.2753\/MIS0742-1222240404"},{"key":"e_1_2_8_11_1","doi-asserted-by":"publisher","DOI":"10.2307\/4132332"},{"key":"e_1_2_8_12_1","doi-asserted-by":"publisher","DOI":"10.1037\/0033-295X.84.2.191"},{"key":"e_1_2_8_13_1","volume-title":"Social Learning Theory","author":"Bandura A.","year":"1977"},{"key":"e_1_2_8_14_1","doi-asserted-by":"publisher","DOI":"10.1037\/0033-295X.84.2.191"},{"key":"e_1_2_8_15_1","doi-asserted-by":"publisher","DOI":"10.1037\/0003-066X.37.2.122"},{"key":"e_1_2_8_16_1","volume-title":"Social Foundations of Thought and Action","author":"Bandura A.","year":"1986"},{"key":"e_1_2_8_17_1","doi-asserted-by":"publisher","DOI":"10.1016\/0749-5978(91)90022-L"},{"key":"e_1_2_8_18_1","doi-asserted-by":"publisher","DOI":"10.1111\/1464-0597.00092"},{"key":"e_1_2_8_19_1","doi-asserted-by":"publisher","DOI":"10.2307\/41409971"},{"key":"e_1_2_8_20_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0963-8687(02)00018-5"},{"key":"e_1_2_8_21_1","volume-title":"Dexterity and Its Development","author":"Bernstein N.A.","year":"1996"},{"key":"e_1_2_8_22_1","doi-asserted-by":"publisher","DOI":"10.1177\/1948550612455931"},{"key":"e_1_2_8_23_1","unstructured":"Brandimarte L. Acquisti A. Loewenstein G.&Babcock L.(2009)Privacy concerns and information disclosure: an illusion of control hypothesis."},{"key":"e_1_2_8_24_1","doi-asserted-by":"publisher","DOI":"10.1037\/0022-3514.56.2.267"},{"key":"e_1_2_8_25_1","doi-asserted-by":"publisher","DOI":"10.1080\/01449290410001669923"},{"key":"e_1_2_8_26_1","doi-asserted-by":"publisher","DOI":"10.1287\/isre.14.2.189.16018"},{"key":"e_1_2_8_27_1","doi-asserted-by":"publisher","DOI":"10.2307\/249749"},{"key":"e_1_2_8_28_1","doi-asserted-by":"publisher","DOI":"10.1287\/isre.6.2.118"},{"key":"e_1_2_8_29_1","doi-asserted-by":"publisher","DOI":"10.2307\/249688"},{"key":"e_1_2_8_30_1","volume-title":"Beyond Boredom and Anxiety","author":"Csikszentmihalyi M.","year":"1977"},{"key":"e_1_2_8_31_1","doi-asserted-by":"publisher","DOI":"10.2307\/249775"},{"key":"e_1_2_8_32_1","unstructured":"Dediu H.(2014) Late late majority. Retrieved date: July 8 2014 URL:http:\/\/www.asymco.com\/2014\/07\/08\/late\u2010late\u2010majority\/"},{"key":"e_1_2_8_33_1","doi-asserted-by":"publisher","DOI":"10.1057\/palgrave.ejis.3000590"},{"key":"e_1_2_8_34_1","doi-asserted-by":"publisher","DOI":"10.1287\/isre.1060.0080"},{"key":"e_1_2_8_35_1","doi-asserted-by":"publisher","DOI":"10.1057\/ejis.2012.23"},{"key":"e_1_2_8_36_1","unstructured":"Enck W. Gilbert P. Chun B.\u2010G. Cox L. Jung J. McDaniel P.&Sheth A.(2010a)TaintDroid: an information\u2010flow tracking system for realtime privacy monitoring on smartphones. Proceedings of OSDI 2010 pp. Vancouver BC Canada."},{"key":"e_1_2_8_37_1","unstructured":"Enck W. Gilbert P. Chun B.\u2010G. Cox L. Jung J. McDaniel P.&Sheth A.(2010b)TaintDroid: an information\u2010flow tracking system for realtime privacy monitoring on smartphones. Proceedings of OSDI 2010 pp.1\u201315.Vancouver BC Canada."},{"key":"e_1_2_8_38_1","volume-title":"China Now Leads the World in New iOS and Android Device Activations","author":"Farago P.","year":"2012"},{"key":"e_1_2_8_39_1","first-page":"7","article-title":"The privacy calculus: mobile apps and user perceptions of privacy and security","volume":"5","author":"Fife E.","year":"2012","journal-title":"International Journal of Engineering Business Management"},{"key":"e_1_2_8_40_1","doi-asserted-by":"publisher","DOI":"10.1287\/isre.1080.0193"},{"key":"e_1_2_8_41_1","doi-asserted-by":"publisher","DOI":"10.1177\/002224378201900406"},{"key":"e_1_2_8_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/355112.355120"},{"key":"e_1_2_8_43_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1745-6606.1998.tb00397.x"},{"key":"e_1_2_8_44_1","doi-asserted-by":"publisher","DOI":"10.2307\/30036519"},{"key":"e_1_2_8_45_1","first-page":"1","article-title":"Structural equation modeling and regression: guidelines for research practice","volume":"4","author":"Gefen D.","year":"2000","journal-title":"Communications of the AIS"},{"key":"e_1_2_8_46_1","first-page":"91","article-title":"A practical guide to factorial validity using PLS\u2010graph: tutorial and annotated example","volume":"16","author":"Gefen D.","year":"2005","journal-title":"Communications of the AIS"},{"key":"e_1_2_8_47_1","unstructured":"Gingrich A.(2011)The mother of all Android malware has arrived: stolen apps released to the market that root your phone steal your data open backdoor. Retrieved date: May 20 2011 URL:http:\/\/www.androidpolice.com\/2011\/03\/01\/the\u2010mother\u2010of\u2010all\u2010android\u2010malware\u2010has\u2010arrived\u2010stolen\u2010apps\u2010released\u2010to\u2010the\u2010market\u2010that\u2010root\u2010your\u2010phone\u2010steal\u2010your\u2010data\u2010and\u2010open\u2010backdoor\/"},{"key":"e_1_2_8_48_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1540-6520.2006.00131.x"},{"key":"e_1_2_8_49_1","doi-asserted-by":"publisher","DOI":"10.2466\/pr0.1986.59.2.584"},{"key":"e_1_2_8_50_1","doi-asserted-by":"publisher","DOI":"10.1080\/10864415.2003.11044283"},{"key":"e_1_2_8_51_1","doi-asserted-by":"publisher","DOI":"10.1037\/0735-7044.118.5.916"},{"key":"e_1_2_8_52_1","first-page":"519","article-title":"Formative vs. reflective measurement: comment on Marakas, Johnson, and Clay","volume":"9","author":"Hardin A. M.","year":"2008","journal-title":"Information Systems"},{"key":"e_1_2_8_53_1","doi-asserted-by":"crossref","first-page":"141","DOI":"10.28945\/1633","article-title":"Computer self\u2010efficacy, anxiety, and learning in online versus face to face medium","volume":"11","author":"Hauser R.","year":"2012","journal-title":"Journal of Information Technology Education: Research"},{"key":"e_1_2_8_54_1","doi-asserted-by":"publisher","DOI":"10.1007\/BF00057884"},{"key":"e_1_2_8_55_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1365-2575.2012.00420.x"},{"key":"e_1_2_8_56_1","doi-asserted-by":"publisher","DOI":"10.1287\/mnsc.1050.0485"},{"key":"e_1_2_8_57_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2003.08.001"},{"key":"e_1_2_8_58_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijhcs.2006.09.003"},{"key":"e_1_2_8_59_1","doi-asserted-by":"publisher","DOI":"10.2307\/25148779"},{"key":"e_1_2_8_60_1","unstructured":"IDG(2010)Worldwide and U.S. mobile applications storefronts and developer 2010\u20132014 forecasts and year\u2010end 2010 vendor market shares: the \u2018appification\u2019 of everything. Retrieved date: URL:http:\/\/www.idg.com\/www\/pr.nsf\/0\/1280307E4BE966E8852577F8004FA500"},{"key":"e_1_2_8_61_1","doi-asserted-by":"publisher","DOI":"10.1057\/ejis.2008.29"},{"key":"e_1_2_8_62_1","doi-asserted-by":"publisher","DOI":"10.1037\/0278-6133.18.3.281"},{"key":"e_1_2_8_63_1","first-page":"237","volume-title":"Proceedings of the International Conference on Information Systems (ICIS 2010)","author":"Keith M. J.","year":"2010"},{"key":"e_1_2_8_64_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijhcs.2013.08.016"},{"key":"e_1_2_8_65_1","doi-asserted-by":"publisher","DOI":"10.2753\/MIS0742-1222240401"},{"key":"e_1_2_8_66_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2007.07.001"},{"key":"e_1_2_8_67_1","unstructured":"Kim Y. H.&Kim D. J.(2005)A study of online transaction self\u2010efficacy consumer trust and uncertainty reduction in electronic commerce transaction. System Sciences 2005. HICSS'05. Proceedings of the 38th Annual Hawaii International Conference on pp.170c\u2013170c. IEEE."},{"key":"e_1_2_8_68_1","doi-asserted-by":"publisher","DOI":"10.2307\/25148760"},{"key":"e_1_2_8_69_1","doi-asserted-by":"publisher","DOI":"10.1057\/jit.2010.6"},{"key":"e_1_2_8_70_1","doi-asserted-by":"publisher","DOI":"10.1016\/0146-6402(89)90027-1"},{"key":"e_1_2_8_71_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1540-5915.1994.tb00810.x"},{"key":"e_1_2_8_72_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1540-4560.1977.tb01880.x"},{"key":"e_1_2_8_73_1","doi-asserted-by":"publisher","DOI":"10.4018\/jhisi.2007070105"},{"key":"e_1_2_8_74_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jsis.2008.01.001"},{"key":"e_1_2_8_75_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2012.06.010"},{"key":"e_1_2_8_76_1","doi-asserted-by":"publisher","DOI":"10.2753\/MIS0742-1222270406"},{"key":"e_1_2_8_77_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPC.2014.2312452"},{"key":"e_1_2_8_78_1","doi-asserted-by":"publisher","DOI":"10.1002\/asi.21705"},{"key":"e_1_2_8_79_1","doi-asserted-by":"publisher","DOI":"10.2753\/MIS0742-1222260107"},{"key":"e_1_2_8_80_1","doi-asserted-by":"publisher","DOI":"10.2753\/MIS0742-1222240408"},{"key":"e_1_2_8_81_1","doi-asserted-by":"publisher","DOI":"10.1080\/10447318.2013.839899"},{"key":"e_1_2_8_82_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2010.02.008"},{"key":"e_1_2_8_83_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2009.10.005"},{"key":"e_1_2_8_84_1","doi-asserted-by":"publisher","DOI":"10.17705\/1jais.00112"},{"key":"e_1_2_8_85_1","doi-asserted-by":"publisher","DOI":"10.1287\/isre.9.2.126"},{"key":"e_1_2_8_86_1","doi-asserted-by":"publisher","DOI":"10.1287\/isre.2.3.173"},{"key":"e_1_2_8_87_1","doi-asserted-by":"publisher","DOI":"10.1287\/isre.13.3.334.81"},{"key":"e_1_2_8_88_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1745-6606.2009.01148.x"},{"key":"e_1_2_8_89_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.brat.2008.02.011"},{"key":"e_1_2_8_90_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.elerap.2014.05.001"},{"key":"e_1_2_8_91_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.im.2008.11.006"},{"key":"e_1_2_8_92_1","doi-asserted-by":"publisher","DOI":"10.1037\/0033-295X.84.3.231"},{"key":"e_1_2_8_93_1","doi-asserted-by":"publisher","DOI":"10.1086\/500488"},{"key":"e_1_2_8_94_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0963-8687(02)00017-3"},{"key":"e_1_2_8_95_1","doi-asserted-by":"publisher","DOI":"10.2307\/25148720"},{"key":"e_1_2_8_96_1","doi-asserted-by":"publisher","DOI":"10.1287\/isre.1040.0015"},{"key":"e_1_2_8_97_1","doi-asserted-by":"publisher","DOI":"10.1207\/s15327744joce1503_2"},{"key":"e_1_2_8_98_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jsis.2010.09.005"},{"key":"e_1_2_8_99_1","volume-title":"Internet, Broadband, and Cell Phone Statistics","author":"Rainie L.","year":"2010"},{"key":"e_1_2_8_100_1","unstructured":"Reed M.(2011)The surprise behind the mobile app numbers. Huffington Post Retrieved date: July 15 2011 URL:http:\/\/www.huffingtonpost.com\/morgan\u2010reed\/the\u2010surprise\u2010behind\u2010the\u2010m_b_895397.html"},{"key":"e_1_2_8_101_1","unstructured":"Ringle C. M. Wende S.&Will S.(2005) SmartPLS 2.0 (M3) Beta. Retrieved date: October 30 2010 url:http:\/\/www.smartpls.de."},{"key":"e_1_2_8_102_1","volume-title":"Diffusion of Innovations","author":"Rogers E.M.","year":"1962"},{"key":"e_1_2_8_103_1","doi-asserted-by":"publisher","DOI":"10.1093\/aler\/ahl012"},{"key":"e_1_2_8_104_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.obhdp.2006.05.005"},{"key":"e_1_2_8_105_1","unstructured":"Security L. M.(2011) App genome report. In: App Genome Report \u2013 February 2011 Vol. 2011 pp. Lookout Mobile Security."},{"key":"e_1_2_8_106_1","unstructured":"Serino C. M. Furner C. P.&Smatt C.(2005) Making it personal: how personalization affects trust over time. Hawaiian International Conference on System Sciences pp. IEEE Waikaloa HI."},{"key":"e_1_2_8_107_1","unstructured":"Seriot N.(2010)iPhone privacy. Black Hat DC 2010 pp. 30. Black Hat January 3 Arlington VA USA."},{"key":"e_1_2_8_108_1","unstructured":"Smith A.(2012)Nearly half of American adults are smartphone owners. Pew Research Retrieved date: url:"},{"key":"e_1_2_8_109_1","doi-asserted-by":"publisher","DOI":"10.2307\/249477"},{"key":"e_1_2_8_110_1","first-page":"380","article-title":"Validation guidelines for IS positivist research","volume":"14","author":"Straub D.W.","year":"2004","journal-title":"Communications of the AIS"},{"key":"e_1_2_8_111_1","doi-asserted-by":"publisher","DOI":"10.1080\/13669870701875750"},{"key":"e_1_2_8_112_1","doi-asserted-by":"publisher","DOI":"10.1080\/13669870902726091"},{"key":"e_1_2_8_113_1","doi-asserted-by":"publisher","DOI":"10.4018\/joeuc.2006070102"},{"key":"e_1_2_8_114_1","doi-asserted-by":"publisher","DOI":"10.2753\/MIS0742-1222240403"},{"key":"e_1_2_8_115_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1540-5915.2008.00192.x"},{"key":"e_1_2_8_116_1","doi-asserted-by":"publisher","DOI":"10.1287\/mnsc.46.2.186.11926"},{"key":"e_1_2_8_117_1","doi-asserted-by":"publisher","DOI":"10.2307\/30036540"},{"key":"e_1_2_8_118_1","doi-asserted-by":"publisher","DOI":"10.1108\/01409170410784167"},{"key":"e_1_2_8_119_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.im.2008.05.003"},{"key":"e_1_2_8_120_1","doi-asserted-by":"publisher","DOI":"10.17705\/1jais.00065"},{"key":"e_1_2_8_121_1","doi-asserted-by":"publisher","DOI":"10.2753\/MIS0742-1222230410"},{"key":"e_1_2_8_122_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1365-2575.2006.00213.x"},{"key":"e_1_2_8_123_1","doi-asserted-by":"publisher","DOI":"10.1037\/0022-0167.52.4.602"},{"key":"e_1_2_8_124_1","doi-asserted-by":"publisher","DOI":"10.1080\/1097198X.2010.10856520"},{"key":"e_1_2_8_125_1","doi-asserted-by":"publisher","DOI":"10.2753\/MIS0742-1222260305"}],"container-title":["Information Systems Journal"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.wiley.com\/onlinelibrary\/tdm\/v1\/articles\/10.1111%2Fisj.12082","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1111\/isj.12082","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,9,12]],"date-time":"2023-09-12T06:54:50Z","timestamp":1694501690000},"score":1,"resource":{"primary":{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/10.1111\/isj.12082"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,6,19]]},"references-count":124,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2015,11]]}},"alternative-id":["10.1111\/isj.12082"],"URL":"https:\/\/doi.org\/10.1111\/isj.12082","archive":["Portico"],"relation":{},"ISSN":["1350-1917","1365-2575"],"issn-type":[{"value":"1350-1917","type":"print"},{"value":"1365-2575","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015,6,19]]}}}