{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,8]],"date-time":"2026-02-08T06:34:01Z","timestamp":1770532441569,"version":"3.49.0"},"reference-count":91,"publisher":"Association for Computing Machinery (ACM)","issue":"1","license":[{"start":{"date-parts":[[2021,1,22]],"date-time":"2021-01-22T00:00:00Z","timestamp":1611273600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["SIGMIS Database"],"published-print":{"date-parts":[[2021,1,22]]},"abstract":"<jats:p>Android access notifications are presented to users to obtain permission to access data and services on smartphones. The number of 'unsafe' apps in the Android marketplaces underscores the importance of understanding what factors influence whether users engage in more effortful systematic processing of access notifications. We propose a multiple-motive heuristic-systematic model to examine how different motives impact users' processing modes. We find that the need to be accurate in making decisions (accuracy), the desire to defend preferred positions (defense), and social pressure from others (impression) influence how users process Android access notifications, and they do so in different ways.<\/jats:p>","DOI":"10.1145\/3447934.3447941","type":"journal-article","created":{"date-parts":[[2021,1,23]],"date-time":"2021-01-23T05:04:25Z","timestamp":1611378265000},"page":"91-122","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":8,"title":["A Multiple-Motive Heuristic-Systematic Model for Examining How Users Process Android Data and Service Access Notifications"],"prefix":"10.1145","volume":"52","author":[{"given":"Tabitha L.","family":"James","sequence":"first","affiliation":[{"name":"Virginia Tech"}]},{"given":"Jennifer L.","family":"Ziegelmayer","sequence":"additional","affiliation":[{"name":"IESEG School of Management"}]},{"given":"Arianna","family":"Schuler Scott","sequence":"additional","affiliation":[{"name":"University of Oxford"}]},{"given":"Grace","family":"Fox","sequence":"additional","affiliation":[{"name":"Dublin City University"}]}],"member":"320","published-online":{"date-parts":[[2021,1,22]]},"reference":[{"key":"e_1_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1037\/0033-2909.103.3.411"},{"key":"e_1_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.5555\/2017424.2017430"},{"key":"e_1_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1111\/jcom.12276"},{"key":"e_1_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2017.07.002"},{"key":"e_1_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/3052973.3053004"},{"key":"e_1_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1177\/1745691610393980"},{"key":"e_1_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1037\/0022-3514.39.5.752"},{"key":"e_1_2_1_8_1","first-page":"3","volume-title":"Social Influence: The Ontario Symposium (Vol. 5","author":"Chaiken S.","year":"1987","unstructured":"Chaiken , S. ( 1987 ). The heuristic model of persuasion. In M. P. Zanna, J. Olson, M. & C. P. Herman (Eds.) , Social Influence: The Ontario Symposium (Vol. 5 , pp. 3 -- 39 ). New York, NY: Psychology Press. Chaiken, S. (1987). The heuristic model of persuasion. In M. P. Zanna, J. Olson, M. & C. P. Herman (Eds.), Social Influence: The Ontario Symposium (Vol. 5, pp. 3--39). New York, NY: Psychology Press."},{"key":"e_1_2_1_9_1","volume-title":"P. M. Gollwitzer & J","author":"Chaiken S.","year":"1996","unstructured":"Chaiken , S. , Giner-Sorolla , R. , and Chen , S . ( 1996 ). Beyond accuracy: Defense and impression motive in heuristic and systematic information processing . In P. M. Gollwitzer & J . A. Bargh (Eds.), The Psychology of Action: Linking Cognition and Motivation to Behavior . New York, NY : The Guilford Press . Chaiken, S., Giner-Sorolla, R., and Chen, S. (1996). Beyond accuracy: Defense and impression motive in heuristic and systematic information processing. In P. M. Gollwitzer & J. A. Bargh (Eds.), The Psychology of Action: Linking Cognition and Motivation to Behavior. New York, NY: The Guilford Press."},{"key":"e_1_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.4135\/9781446249215.n13"},{"key":"e_1_2_1_11_1","volume-title":"J. S. Uleman & J","author":"Chaiken S.","year":"1989","unstructured":"Chaiken , S. , Liberman , A. , & Eagly , A. H. ( 1989 ). Heuristic and systematic information processing within and beyond the persuasion context . In J. S. Uleman & J . A. Bargh (Eds.), Unintended Thought . New York, NY : Guilford Press . Chaiken, S., Liberman, A., & Eagly, A. H. (1989). Heuristic and systematic information processing within and beyond the persuasion context. In J. S. Uleman & J. A. Bargh (Eds.), Unintended Thought. New York, NY: Guilford Press."},{"key":"e_1_2_1_12_1","volume-title":"S.","author":"Chen S.","year":"1999","unstructured":"Chen , S. , & Chaiken , S. ( 1999 ). The heuristicsystematic model in its broader context . In S. Chen, S., & Chaiken, S. (1999). The heuristicsystematic model in its broader context. In S."},{"key":"e_1_2_1_13_1","volume-title":"Dual-Process Theories in Social Psychology (pp. 73--96)","author":"Chaiken Y.","unstructured":"Chaiken & Y. Trope (Eds.), Dual-Process Theories in Social Psychology (pp. 73--96) . New York, NY : Guilford Press . Chaiken & Y. Trope (Eds.), Dual-Process Theories in Social Psychology (pp. 73--96). New York, NY: Guilford Press."},{"key":"e_1_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1207\/s15327965pli1001_6"},{"key":"e_1_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1037\/0022-3514.71.2.262"},{"key":"e_1_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1287\/isre.14.2.189.16018"},{"key":"e_1_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2010.02.012"},{"key":"e_1_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.im.2008.06.007"},{"key":"e_1_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1177\/002224377901600110"},{"key":"e_1_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/1644953.1644958"},{"key":"e_1_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.im.2012.09.004"},{"key":"e_1_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1287\/isre.1060.0080"},{"key":"e_1_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1287\/isre.2015.0600"},{"key":"e_1_2_1_24_1","volume-title":"Retrieved","author":"Doffman Z.","year":"2019","unstructured":"Doffman , Z. ( 2019 ). New Android warning: 500M+ users have installed apps hiding nasty malware? uninstall now . Retrieved September 23, 2019, from https:\/\/www.forbes.com\/sites\/zakdoffman\/2019\/0 9\/20\/new-android-warning-500m-users-haveinstalled- apps-hiding-nasty-malwareuninstallnow\/# 42de602112be Doffman, Z. (2019). New Android warning: 500M+ users have installed apps hiding nasty malware? uninstall now. Retrieved September 23, 2019, from https:\/\/www.forbes.com\/sites\/zakdoffman\/2019\/0 9\/20\/new-android-warning-500m-users-haveinstalled- apps-hiding-nasty-malwareuninstallnow\/# 42de602112be"},{"key":"e_1_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.4135\/9781483387918.n14"},{"key":"e_1_2_1_26_1","volume-title":"The psychology of attitudes","author":"Eagly A. H.","year":"1993","unstructured":"Eagly , A. H. , & Chaiken , S. ( 1993 ). The psychology of attitudes . Orlando, FL : Harcourt Brace Jovanovich College Publishers . Eagly, A. H., & Chaiken, S. (1993). The psychology of attitudes. Orlando, FL: Harcourt Brace Jovanovich College Publishers."},{"key":"e_1_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1287\/mnsc.1080.0879"},{"key":"e_1_2_1_28_1","volume-title":"Belief, attitude, intention, and behavior: An introduction to theory and research","author":"Fishbein M.","year":"1975","unstructured":"Fishbein , M. , & Ajzen , I. ( 1975 ). Belief, attitude, intention, and behavior: An introduction to theory and research . Reading, MA : Addison-Wesley . Fishbein, M., & Ajzen, I. (1975). Belief, attitude, intention, and behavior: An introduction to theory and research. Reading, MA: Addison-Wesley."},{"key":"e_1_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1177\/002224378101800104"},{"key":"e_1_2_1_30_1","volume-title":"Retrieved","author":"Forrest C.","year":"2014","unstructured":"Forrest , C. ( 2014 ). Google Play v Apple App Store: The battle for the mobile app market . Retrieved April 13, 2015, from http:\/\/www.techrepublic.com\/article\/google-playv- apple-app-store-the-battle-for-the-mobile-appmarket\/ Forrest, C. (2014). Google Play v Apple App Store: The battle for the mobile app market. Retrieved April 13, 2015, from http:\/\/www.techrepublic.com\/article\/google-playv- apple-app-store-the-battle-for-the-mobile-appmarket\/"},{"issue":"1","key":"e_1_2_1_31_1","first-page":"2","article-title":"Structural equation modeling and regression: Guidelines for research practice","volume":"4","author":"Gefen D.","year":"2000","unstructured":"Gefen , D. , Straub , D. , & Boudreau , M.-C. ( 2000 ). Structural equation modeling and regression: Guidelines for research practice . Communications of the Association for Information Systems , 4 ( 1 ), 2 -- 77 . Gefen, D., Straub, D., & Boudreau, M.-C. (2000). Structural equation modeling and regression: Guidelines for research practice. Communications of the Association for Information Systems, 4(1), 2--77.","journal-title":"Communications of the Association for Information Systems"},{"key":"e_1_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1177\/0146167297231009"},{"key":"e_1_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1006\/enrs.1998.3940"},{"key":"e_1_2_1_34_1","volume-title":"The relationship of information sufficiency to seeking and processing risk information. Paper presented at the International Communication Association","author":"Griffin R. J.","year":"1999","unstructured":"Griffin , R. J. , Dunwoody , S. , Neuwirth , K. , & Giese , J. ( 1999 b). The relationship of information sufficiency to seeking and processing risk information. Paper presented at the International Communication Association , San Francisco, CA . Griffin, R. J., Yang, Z., Boerner, F., Bourassa, S. , Griffin, R. J., Dunwoody, S., Neuwirth, K., & Giese, J. (1999b). The relationship of information sufficiency to seeking and processing risk information. Paper presented at the International Communication Association, San Francisco, CA. Griffin, R. J., Yang, Z., Boerner, F., Bourassa, S.,"},{"key":"e_1_2_1_35_1","volume-title":"Applying an information seeking and processing model to a study of communication about energy. Paper presented at the Association for Education in Journalism and Mass Communication Annual Conference","author":"Darrah T.","year":"2005","unstructured":"Darrah , T. , Knurek , S. , ( 2005 ). Applying an information seeking and processing model to a study of communication about energy. Paper presented at the Association for Education in Journalism and Mass Communication Annual Conference , San Antonio , Texas . Darrah, T., Knurek, S., et al. (2005). Applying an information seeking and processing model to a study of communication about energy. Paper presented at the Association for Education in Journalism and Mass Communication Annual Conference, San Antonio, Texas."},{"key":"e_1_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1177\/1075547007312309"},{"key":"e_1_2_1_37_1","article-title":"Communication behaviors and attitudes of environmental publics: Two studies","author":"Grunig J. E.","year":"1983","unstructured":"Grunig , J. E. ( 1983 ). Communication behaviors and attitudes of environmental publics: Two studies . Journalism and Communication Monographs, 81. Grunig, J. E. (1983). Communication behaviors and attitudes of environmental publics: Two studies. Journalism and Communication Monographs, 81.","journal-title":"Journalism and Communication Monographs, 81."},{"key":"e_1_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2016.10.002"},{"key":"e_1_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.5555\/3158980"},{"key":"e_1_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1057\/ejis.2009.6"},{"key":"e_1_2_1_41_1","volume-title":"Wired. Retrieved","author":"Honan M.","year":"2013","unstructured":"Honan , M. ( 2013 ). Break out a hammer: You'll never believe the data 'wiped' smartphones store . Wired. Retrieved June 26, 2018, from https:\/\/www.wired.com\/2013\/04\/smartphonedata- trail\/ Honan, M. (2013). Break out a hammer: You'll never believe the data 'wiped' smartphones store. Wired. Retrieved June 26, 2018, from https:\/\/www.wired.com\/2013\/04\/smartphonedata- trail\/"},{"key":"e_1_2_1_42_1","volume-title":"Retrieved","author":"International Data Corporation","year":"2018","unstructured":"International Data Corporation ( 2018 ). Smartphone OS . Retrieved June 26, 2018, from https:\/\/www.idc.com\/promo\/smartphone-marketshare\/ os International Data Corporation (2018). Smartphone OS. Retrieved June 26, 2018, from https:\/\/www.idc.com\/promo\/smartphone-marketshare\/ os"},{"key":"e_1_2_1_43_1","volume-title":"Survey finds smartphone apps store too much personal data. Wired. Retrieved","author":"Isaac M.","year":"2011","unstructured":"Isaac , M. ( 2011 ). Survey finds smartphone apps store too much personal data. Wired. Retrieved November 1, 2019, from https:\/\/www.wired.com\/2011\/08\/smartphonelocal- data-storage\/ Isaac, M. (2011). Survey finds smartphone apps store too much personal data. Wired. Retrieved November 1, 2019, from https:\/\/www.wired.com\/2011\/08\/smartphonelocal- data-storage\/"},{"key":"e_1_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.im.2015.07.010"},{"issue":"2","key":"e_1_2_1_45_1","first-page":"61","article-title":"Chronic issuespecific fear inhibits systematic processing of persuasive communications","volume":"5","author":"Jepson C.","year":"1990","unstructured":"Jepson , C. , & Chaiken , S. ( 1990 ). Chronic issuespecific fear inhibits systematic processing of persuasive communications . Journal of Social Behavior and Personality , 5 ( 2 ), 61 -- 84 . Jepson, C., & Chaiken, S. (1990). Chronic issuespecific fear inhibits systematic processing of persuasive communications. Journal of Social Behavior and Personality, 5(2), 61--84.","journal-title":"Journal of Social Behavior and Personality"},{"key":"e_1_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1539-6924.2005.00609.x"},{"key":"e_1_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1080\/15213260701532971"},{"key":"e_1_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1177\/1075547006293916"},{"key":"e_1_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijhcs.2013.08.016"},{"key":"e_1_2_1_50_1","volume-title":"The informed society: An analysis of the public's information-seeking behavior regarding coastal flood risks. Risk analysis, 32(8), 1369--1381","author":"Kellens W.","year":"2012","unstructured":"Kellens , W. , Zaalberg , R. , & De Maeyer , P. ( 2012 ). The informed society: An analysis of the public's information-seeking behavior regarding coastal flood risks. Risk analysis, 32(8), 1369--1381 . Kellens, W., Zaalberg, R., & De Maeyer, P. (2012). The informed society: An analysis of the public's information-seeking behavior regarding coastal flood risks. Risk analysis, 32(8), 1369--1381."},{"key":"e_1_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.2753\/MIS0742-1222260306"},{"key":"e_1_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1539-6924.2009.01324.x"},{"key":"e_1_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1108\/09593840810919671"},{"issue":"28","key":"e_1_2_1_54_1","first-page":"453","article-title":"Empirical studies on online information privacy concerns: Literature review and an integrative framework","volume":"28","author":"Li Y.","year":"2011","unstructured":"Li , Y. ( 2011 ). Empirical studies on online information privacy concerns: Literature review and an integrative framework . Communications of the Association for Information Systems , 28 ( 28 ), 453 - 496 . Li, Y. (2011). Empirical studies on online information privacy concerns: Literature review and an integrative framework. Communications of the Association for Information Systems, 28(28), 453- 496.","journal-title":"Communications of the Association for Information Systems"},{"key":"e_1_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2012.06.010"},{"key":"e_1_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jsis.2016.06.002"},{"key":"e_1_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPC.2014.2312452"},{"key":"e_1_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1002\/asi.21705"},{"key":"e_1_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1287\/isre.2016.0671"},{"key":"e_1_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jsis.2005.07.003"},{"key":"e_1_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2012.12.003"},{"key":"e_1_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.5555\/2017507.2017510"},{"key":"e_1_2_1_63_1","doi-asserted-by":"publisher","DOI":"10.1287\/isre.1040.0032"},{"key":"e_1_2_1_64_1","doi-asserted-by":"publisher","DOI":"10.3758\/s13428-011-0124-6"},{"key":"e_1_2_1_65_1","volume-title":"Retrieved June 25th","author":"Mearian L.","year":"2017","unstructured":"Mearian , L. ( 2017 ). Android vs iOS security: Which is better? . Retrieved June 25th , 2018, from https:\/\/www.computerworld.com\/article\/3213388\/ mobile-wireless\/android-vs-ios-security-which-isbetter. html Mearian, L. (2017). Android vs iOS security: Which is better?. Retrieved June 25th, 2018, from https:\/\/www.computerworld.com\/article\/3213388\/ mobile-wireless\/android-vs-ios-security-which-isbetter. html"},{"key":"e_1_2_1_66_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jesp.2009.03.009"},{"key":"e_1_2_1_67_1","doi-asserted-by":"publisher","DOI":"10.5555\/2208940.2208949"},{"key":"e_1_2_1_68_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jom.2012.06.002"},{"key":"e_1_2_1_69_1","volume-title":"Retrieved","author":"Perez S.","year":"2017","unstructured":"Perez , S. ( 2017 ). U.S. consumers now spend 5 hours per day on mobile devices . Retrieved June 26, 2018, from https:\/\/techcrunch.com\/2017\/03\/03\/us- consumers-now-spend-5-hours-per-day-onmobile- devices\/ Perez, S. (2017). U.S. consumers now spend 5 hours per day on mobile devices. Retrieved June 26, 2018, from https:\/\/techcrunch.com\/2017\/03\/03\/us- consumers-now-spend-5-hours-per-day-onmobile- devices\/"},{"key":"e_1_2_1_70_1","volume-title":"Retrieved","author":"Pew Research Center","year":"2018","unstructured":"Pew Research Center ( 2018 ). Mobile fact sheet . Retrieved June 21, 2018, from http:\/\/www.pewinternet.org\/fact-sheet\/mobile\/ Pew Research Center (2018). Mobile fact sheet. Retrieved June 21, 2018, from http:\/\/www.pewinternet.org\/fact-sheet\/mobile\/"},{"key":"e_1_2_1_71_1","doi-asserted-by":"publisher","DOI":"10.1037\/0021-9010.88.5.879"},{"key":"e_1_2_1_72_1","doi-asserted-by":"publisher","DOI":"10.5555\/2017496.2017502"},{"key":"e_1_2_1_73_1","volume-title":"Retrieved","author":"Ringle C. M.","year":"2014","unstructured":"Ringle , C. M. , Wende , S. , & Becker , J.-M. ( 2014 ). SmartPLS 2 . Retrieved June 18, 2015, from http:\/\/www.smartpls.com Ringle, C. M., Wende, S., & Becker, J.-M. (2014). SmartPLS 2. Retrieved June 18, 2015, from http:\/\/www.smartpls.com"},{"key":"e_1_2_1_74_1","doi-asserted-by":"publisher","DOI":"10.5555\/2208940.2208950"},{"key":"e_1_2_1_75_1","doi-asserted-by":"publisher","DOI":"10.5555\/2017388.2017392"},{"key":"e_1_2_1_76_1","volume-title":"Retrieved","author":"Sophos","year":"2017","unstructured":"Sophos ( 2017 ). 2018 malware forecast: The onward march of Android malware . Retrieved June 26, 2018, from https:\/\/nakedsecurity.sophos.com\/2017\/11\/07\/201 8-malware-forecast-the-onward-march-ofandroid- malware\/ Sophos (2017). 2018 malware forecast: The onward march of Android malware. Retrieved June 26, 2018, from https:\/\/nakedsecurity.sophos.com\/2017\/11\/07\/201 8-malware-forecast-the-onward-march-ofandroid- malware\/"},{"key":"e_1_2_1_77_1","doi-asserted-by":"publisher","DOI":"10.1177\/1094428105284955"},{"key":"e_1_2_1_78_1","volume-title":"Retrieved","author":"Statista","year":"2018","unstructured":"Statista : The Statistics Portal (2018a). Mobile Internet user penetration rate in selected countries as of 3rd quarter 2017 . Retrieved June 26, 2018 , from https:\/\/www.statista.com\/statistics\/239114\/globalmobile- internet-penetration\/ Statista: The Statistics Portal (2018a). Mobile Internet user penetration rate in selected countries as of 3rd quarter 2017. Retrieved June 26, 2018, from https:\/\/www.statista.com\/statistics\/239114\/globalmobile- internet-penetration\/"},{"key":"e_1_2_1_79_1","volume-title":"Retrieved","author":"Statista","year":"2018","unstructured":"Statista : The Statistics Portal (2018b). Mobile phone internet user penetration worldwide from 2014 to 2019 . Retrieved June 21, 2018 , from https:\/\/www.statista.com\/statistics\/284202\/mobile -phone-internet-user-penetration-worldwide\/ Statista: The Statistics Portal (2018b). Mobile phone internet user penetration worldwide from 2014 to 2019. Retrieved June 21, 2018, from https:\/\/www.statista.com\/statistics\/284202\/mobile -phone-internet-user-penetration-worldwide\/"},{"key":"e_1_2_1_80_1","volume-title":"Retrieved","author":"Statista","year":"2018","unstructured":"Statista : The Statistics Portal (2018c). Number of apps available in leading app stores as of 1st quarter 2018 . Retrieved June 25, 2018 , 2018, from https:\/\/www.statista.com\/statistics\/276623\/numbe r-of-apps-available-in-leading-app-stores\/ Statista: The Statistics Portal (2018c). Number of apps available in leading app stores as of 1st quarter 2018. Retrieved June 25, 2018, 2018, from https:\/\/www.statista.com\/statistics\/276623\/numbe r-of-apps-available-in-leading-app-stores\/"},{"key":"e_1_2_1_81_1","volume-title":"Retrieved","author":"Statista","year":"2018","unstructured":"Statista : The Statistics Portal (2018d). Number of mobile app downloads worldwide in 2017, 2018 and 2022 (in billions) . Retrieved June 26, 2018 , from https:\/\/www.statista.com\/statistics\/271644\/worldw ide-free-and-paid-mobile-app-store-downloads\/ Statista: The Statistics Portal (2018d). Number of mobile app downloads worldwide in 2017, 2018 and 2022 (in billions). Retrieved June 26, 2018, from https:\/\/www.statista.com\/statistics\/271644\/worldw ide-free-and-paid-mobile-app-store-downloads\/"},{"key":"e_1_2_1_82_1","doi-asserted-by":"publisher","DOI":"10.25300\/MISQ\/2014\/38.2.02"},{"key":"e_1_2_1_83_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.omega.2003.08.005"},{"key":"e_1_2_1_84_1","doi-asserted-by":"publisher","DOI":"10.1111\/risa.12181"},{"key":"e_1_2_1_85_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1539-6924.1999.tb00415.x"},{"key":"e_1_2_1_86_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1460-2466.2002.tb02550.x"},{"key":"e_1_2_1_87_1","unstructured":"Understanding mobile apps. Retrieved June 21 2018 from https:\/\/www.consumer.ftc.gov\/articles\/0018- understanding-mobile-apps  Understanding mobile apps. Retrieved June 21 2018 from https:\/\/www.consumer.ftc.gov\/articles\/0018- understanding-mobile-apps"},{"key":"e_1_2_1_88_1","doi-asserted-by":"publisher","DOI":"10.5555\/2786232.2786234"},{"key":"e_1_2_1_89_1","doi-asserted-by":"publisher","DOI":"10.5555\/2017197.2017202"},{"key":"e_1_2_1_90_1","doi-asserted-by":"publisher","DOI":"10.17705\/1jais.00428"},{"key":"e_1_2_1_91_1","doi-asserted-by":"publisher","DOI":"10.5555\/2017245.2017249"}],"container-title":["ACM SIGMIS Database: the DATABASE for Advances in Information Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3447934.3447941","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3447934.3447941","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T21:28:24Z","timestamp":1750195704000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3447934.3447941"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,1,22]]},"references-count":91,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2021,1,22]]}},"alternative-id":["10.1145\/3447934.3447941"],"URL":"https:\/\/doi.org\/10.1145\/3447934.3447941","relation":{},"ISSN":["0095-0033","1532-0936"],"issn-type":[{"value":"0095-0033","type":"print"},{"value":"1532-0936","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,1,22]]},"assertion":[{"value":"2021-01-22","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}