Effects of the Design of Mobile Security Notifications and Mobile App Usability on Users’ Security Perceptions and Continued-Use Intention Article Swipe
YOU?
·
· 2020
· Open Access
·
· DOI: https://doi.org/10.1016/j.im.2019.103235">https://doi.org/10.1016/j.im.2019.103235</a></p
The explosive global adoption of mobile applications (i.e., apps) has been fraught with security and privacy issues. App users typically have a poor understanding of information security; worse, they routinely ignore security notifications designed to increase security on apps. By considering both mobile app interface usability and mobile security notification (MSN) design, we investigate how security perceptions of apps are formed and how these perceptions influence users’ intentions to continue using apps. Accordingly, we designed and conducted a set of controlled survey experiments with 317 participants in different MSN interface scenarios by manipulating the types of MSN interfaces (i.e., high vs. low disruption), the context (hedonic vs. utilitarian scenarios), and the degree of MSN intrusiveness (high vs. low intrusiveness). We found that both app interface usability and the design of MSNs significantly impacted users’ perceived security, which, in turn, has a positive influence on users’ intention to continue using the app. In addition, we identified an important conundrum: disruptive MSNs—a common approach to delivering MSNs—irritate users and negatively influence their perceptions of app security. Thus, our results directly challenge current practice. If these results hold, current practice should shift away from MSNs that interrupt task performance.
Related Topics
- Type
- article
- Language
- en
- Landing Page
- https://papers.ssrn.com/sol3/Delivery.cfm/SSRN_ID3493996_code446262.pdf?abstractid=3493996&mirid=1
- OA Status
- green
- Related Works
- 20
- OpenAlex ID
- https://openalex.org/W3137551277
Raw OpenAlex JSON
- OpenAlex ID
-
https://openalex.org/W3137551277Canonical identifier for this work in OpenAlex
- DOI
-
https://doi.org/10.1016/j.im.2019.103235">https://doi.org/10.1016/j.im.2019.103235Digital Object Identifier
- Title
Effects of the Design of Mobile Security Notifications and Mobile App Usability on Users’ Security Perceptions and Continued-Use IntentionWork title- Type
articleOpenAlex work type- Language
enPrimary language- Publication year
2020Year of publication- Publication date
2020-07-01Full publication date if available- Authors
Dezhi Wu, Gregory D. Moody, Jun Zhang, Paul Benjamin LowryList of authors in order- Landing page
https://papers.ssrn.com/sol3/Delivery.cfm/SSRN_ID3493996_code446262.pdf?abstractid=3493996&mirid=1Publisher landing page- Open access
YesWhether a free full text is available- OA status
greenOpen access status per OpenAlex- OA URL
https://papers.ssrn.com/sol3/Delivery.cfm/SSRN_ID3493996_code446262.pdf?abstractid=3493996&mirid=1Direct OA link when available- Concepts
Usability, Intrusiveness, Mobile apps, Internet privacy, Computer science, Computer security, Interface (matter), Context (archaeology), Human-computer interaction in information security, Interrupt, Perception, Information security, Human–computer interaction, World Wide Web, Psychology, Software security assurance, Security service, Social psychology, Maximum bubble pressure method, Bubble, Parallel computing, Biology, Paleontology, Neuroscience, Transmission (telecommunications), TelecommunicationsTop concepts (fields/topics) attached by OpenAlex- Cited by
0Total citation count in OpenAlex- Related works (count)
20Other works algorithmically related by OpenAlexFull payload
id https://openalex.org/W3137551277 doi https://doi.org/10.1016/j.im.2019.103235">https://doi.org/10.1016/j.im.2019.103235 ids.mag 3137551277 ids.openalex https://openalex.org/W3137551277 fwci 0.0 type article title Effects of the Design of Mobile Security Notifications and Mobile App Usability on Users’ Security Perceptions and Continued-Use Intention biblio.issue biblio.volume biblio.last_page biblio.first_page topics[0].id https://openalex.org/T11045 topics[0].field.id https://openalex.org/fields/33 topics[0].field.display_name Social Sciences topics[0].score 0.9973000288009644 topics[0].domain.id https://openalex.org/domains/2 topics[0].domain.display_name Social Sciences topics[0].subfield.id https://openalex.org/subfields/3312 topics[0].subfield.display_name Sociology and Political Science topics[0].display_name Privacy, Security, and Data Protection topics[1].id https://openalex.org/T10355 topics[1].field.id https://openalex.org/fields/33 topics[1].field.display_name Social Sciences topics[1].score 0.9879999756813049 topics[1].domain.id https://openalex.org/domains/2 topics[1].domain.display_name Social Sciences topics[1].subfield.id https://openalex.org/subfields/3312 topics[1].subfield.display_name Sociology and Political Science topics[1].display_name Impact of Technology on Adolescents topics[2].id https://openalex.org/T10734 topics[2].field.id https://openalex.org/fields/17 topics[2].field.display_name Computer Science topics[2].score 0.9822999835014343 topics[2].domain.id https://openalex.org/domains/3 topics[2].domain.display_name Physical Sciences topics[2].subfield.id https://openalex.org/subfields/1710 topics[2].subfield.display_name Information Systems topics[2].display_name Information and Cyber Security is_xpac False apc_list apc_paid concepts[0].id https://openalex.org/C170130773 concepts[0].level 2 concepts[0].score 0.7841857671737671 concepts[0].wikidata https://www.wikidata.org/wiki/Q216378 concepts[0].display_name Usability concepts[1].id https://openalex.org/C2781390367 concepts[1].level 2 concepts[1].score 0.6050823330879211 concepts[1].wikidata https://www.wikidata.org/wiki/Q17098321 concepts[1].display_name Intrusiveness concepts[2].id https://openalex.org/C2988145974 concepts[2].level 2 concepts[2].score 0.5641181468963623 concepts[2].wikidata https://www.wikidata.org/wiki/Q620615 concepts[2].display_name Mobile apps concepts[3].id https://openalex.org/C108827166 concepts[3].level 1 concepts[3].score 0.5621609687805176 concepts[3].wikidata https://www.wikidata.org/wiki/Q175975 concepts[3].display_name Internet privacy concepts[4].id https://openalex.org/C41008148 concepts[4].level 0 concepts[4].score 0.5541552305221558 concepts[4].wikidata https://www.wikidata.org/wiki/Q21198 concepts[4].display_name Computer science concepts[5].id https://openalex.org/C38652104 concepts[5].level 1 concepts[5].score 0.46535947918891907 concepts[5].wikidata https://www.wikidata.org/wiki/Q3510521 concepts[5].display_name Computer security concepts[6].id https://openalex.org/C113843644 concepts[6].level 4 concepts[6].score 0.46163344383239746 concepts[6].wikidata https://www.wikidata.org/wiki/Q901882 concepts[6].display_name Interface (matter) concepts[7].id https://openalex.org/C2779343474 concepts[7].level 2 concepts[7].score 0.45543038845062256 concepts[7].wikidata https://www.wikidata.org/wiki/Q3109175 concepts[7].display_name Context (archaeology) concepts[8].id https://openalex.org/C6353995 concepts[8].level 5 concepts[8].score 0.44178307056427 concepts[8].wikidata https://www.wikidata.org/wiki/Q17027910 concepts[8].display_name Human-computer interaction in information security concepts[9].id https://openalex.org/C41661131 concepts[9].level 3 concepts[9].score 0.42796045541763306 concepts[9].wikidata https://www.wikidata.org/wiki/Q220764 concepts[9].display_name Interrupt concepts[10].id https://openalex.org/C26760741 concepts[10].level 2 concepts[10].score 0.42388254404067993 concepts[10].wikidata https://www.wikidata.org/wiki/Q160402 concepts[10].display_name Perception concepts[11].id https://openalex.org/C527648132 concepts[11].level 2 concepts[11].score 0.3333118259906769 concepts[11].wikidata https://www.wikidata.org/wiki/Q189900 concepts[11].display_name Information security concepts[12].id https://openalex.org/C107457646 concepts[12].level 1 concepts[12].score 0.32166576385498047 concepts[12].wikidata https://www.wikidata.org/wiki/Q207434 concepts[12].display_name Human–computer interaction concepts[13].id https://openalex.org/C136764020 concepts[13].level 1 concepts[13].score 0.2535446584224701 concepts[13].wikidata https://www.wikidata.org/wiki/Q466 concepts[13].display_name World Wide Web concepts[14].id https://openalex.org/C15744967 concepts[14].level 0 concepts[14].score 0.16725370287895203 concepts[14].wikidata https://www.wikidata.org/wiki/Q9418 concepts[14].display_name Psychology concepts[15].id https://openalex.org/C62913178 concepts[15].level 4 concepts[15].score 0.16431128978729248 concepts[15].wikidata https://www.wikidata.org/wiki/Q7554361 concepts[15].display_name Software security assurance concepts[16].id https://openalex.org/C29983905 concepts[16].level 3 concepts[16].score 0.10681352019309998 concepts[16].wikidata https://www.wikidata.org/wiki/Q7445066 concepts[16].display_name Security service concepts[17].id https://openalex.org/C77805123 concepts[17].level 1 concepts[17].score 0.07187309861183167 concepts[17].wikidata https://www.wikidata.org/wiki/Q161272 concepts[17].display_name Social psychology concepts[18].id https://openalex.org/C129307140 concepts[18].level 3 concepts[18].score 0.0 concepts[18].wikidata https://www.wikidata.org/wiki/Q6795880 concepts[18].display_name Maximum bubble pressure method concepts[19].id https://openalex.org/C157915830 concepts[19].level 2 concepts[19].score 0.0 concepts[19].wikidata https://www.wikidata.org/wiki/Q2928001 concepts[19].display_name Bubble concepts[20].id https://openalex.org/C173608175 concepts[20].level 1 concepts[20].score 0.0 concepts[20].wikidata https://www.wikidata.org/wiki/Q232661 concepts[20].display_name Parallel computing concepts[21].id https://openalex.org/C86803240 concepts[21].level 0 concepts[21].score 0.0 concepts[21].wikidata https://www.wikidata.org/wiki/Q420 concepts[21].display_name Biology concepts[22].id https://openalex.org/C151730666 concepts[22].level 1 concepts[22].score 0.0 concepts[22].wikidata https://www.wikidata.org/wiki/Q7205 concepts[22].display_name Paleontology concepts[23].id https://openalex.org/C169760540 concepts[23].level 1 concepts[23].score 0.0 concepts[23].wikidata https://www.wikidata.org/wiki/Q207011 concepts[23].display_name Neuroscience concepts[24].id https://openalex.org/C761482 concepts[24].level 2 concepts[24].score 0.0 concepts[24].wikidata https://www.wikidata.org/wiki/Q118093 concepts[24].display_name Transmission (telecommunications) concepts[25].id https://openalex.org/C76155785 concepts[25].level 1 concepts[25].score 0.0 concepts[25].wikidata https://www.wikidata.org/wiki/Q418 concepts[25].display_name Telecommunications keywords[0].id https://openalex.org/keywords/usability keywords[0].score 0.7841857671737671 keywords[0].display_name Usability keywords[1].id https://openalex.org/keywords/intrusiveness keywords[1].score 0.6050823330879211 keywords[1].display_name Intrusiveness keywords[2].id https://openalex.org/keywords/mobile-apps keywords[2].score 0.5641181468963623 keywords[2].display_name Mobile apps keywords[3].id https://openalex.org/keywords/internet-privacy keywords[3].score 0.5621609687805176 keywords[3].display_name Internet privacy keywords[4].id https://openalex.org/keywords/computer-science keywords[4].score 0.5541552305221558 keywords[4].display_name Computer science keywords[5].id https://openalex.org/keywords/computer-security keywords[5].score 0.46535947918891907 keywords[5].display_name Computer security keywords[6].id https://openalex.org/keywords/interface keywords[6].score 0.46163344383239746 keywords[6].display_name Interface (matter) keywords[7].id https://openalex.org/keywords/context keywords[7].score 0.45543038845062256 keywords[7].display_name Context (archaeology) keywords[8].id https://openalex.org/keywords/human-computer-interaction-in-information-security keywords[8].score 0.44178307056427 keywords[8].display_name Human-computer interaction in information security keywords[9].id https://openalex.org/keywords/interrupt keywords[9].score 0.42796045541763306 keywords[9].display_name Interrupt keywords[10].id https://openalex.org/keywords/perception keywords[10].score 0.42388254404067993 keywords[10].display_name Perception keywords[11].id https://openalex.org/keywords/information-security keywords[11].score 0.3333118259906769 keywords[11].display_name Information security keywords[12].id https://openalex.org/keywords/human–computer-interaction keywords[12].score 0.32166576385498047 keywords[12].display_name Human–computer interaction keywords[13].id https://openalex.org/keywords/world-wide-web keywords[13].score 0.2535446584224701 keywords[13].display_name World Wide Web keywords[14].id https://openalex.org/keywords/psychology keywords[14].score 0.16725370287895203 keywords[14].display_name Psychology keywords[15].id https://openalex.org/keywords/software-security-assurance keywords[15].score 0.16431128978729248 keywords[15].display_name Software security assurance keywords[16].id https://openalex.org/keywords/security-service keywords[16].score 0.10681352019309998 keywords[16].display_name Security service keywords[17].id https://openalex.org/keywords/social-psychology keywords[17].score 0.07187309861183167 keywords[17].display_name Social psychology language en locations[0].id mag:3137551277 locations[0].is_oa True locations[0].source.id https://openalex.org/S4210172589 locations[0].source.issn 1556-5068 locations[0].source.type repository locations[0].source.is_oa True locations[0].source.issn_l 1556-5068 locations[0].source.is_core False locations[0].source.is_in_doaj False locations[0].source.display_name SSRN Electronic Journal locations[0].source.host_organization https://openalex.org/I1318003438 locations[0].source.host_organization_name RELX Group (Netherlands) locations[0].source.host_organization_lineage https://openalex.org/I1318003438 locations[0].license locations[0].pdf_url locations[0].version submittedVersion locations[0].raw_type locations[0].license_id locations[0].is_accepted False locations[0].is_published False locations[0].raw_source_name SSRN Electronic Journal locations[0].landing_page_url https://papers.ssrn.com/sol3/Delivery.cfm/SSRN_ID3493996_code446262.pdf?abstractid=3493996&mirid=1 locations[1].id pmh:oai:scholarcommons.sc.edu:acorn_pub-1701 locations[1].is_oa False locations[1].source.id https://openalex.org/S4306401386 locations[1].source.issn locations[1].source.type repository locations[1].source.is_oa False locations[1].source.issn_l locations[1].source.is_core False locations[1].source.is_in_doaj False locations[1].source.display_name Scholar Commons (University of South Carolina) locations[1].source.host_organization https://openalex.org/I155781252 locations[1].source.host_organization_name University of South Carolina locations[1].source.host_organization_lineage https://openalex.org/I155781252 locations[1].license locations[1].pdf_url locations[1].version submittedVersion locations[1].raw_type text locations[1].license_id locations[1].is_accepted False locations[1].is_published False locations[1].raw_source_name Publications locations[1].landing_page_url https://scholarcommons.sc.edu/acorn_pub/697 authorships[0].author.id https://openalex.org/A5080246841 authorships[0].author.orcid https://orcid.org/0000-0002-3554-1136 authorships[0].author.display_name Dezhi Wu authorships[0].countries US authorships[0].affiliations[0].institution_ids https://openalex.org/I155781252 authorships[0].affiliations[0].raw_affiliation_string UNIVERSITY OF SOUTH CAROLINA authorships[0].institutions[0].id https://openalex.org/I155781252 authorships[0].institutions[0].ror https://ror.org/02b6qw903 authorships[0].institutions[0].type education authorships[0].institutions[0].lineage https://openalex.org/I155781252 authorships[0].institutions[0].country_code US authorships[0].institutions[0].display_name University of South Carolina authorships[0].author_position first authorships[0].raw_author_name Dezhi Wu authorships[0].is_corresponding False authorships[0].raw_affiliation_strings UNIVERSITY OF SOUTH CAROLINA authorships[1].author.id https://openalex.org/A5073948873 authorships[1].author.orcid https://orcid.org/0000-0001-7287-7336 authorships[1].author.display_name Gregory D. Moody authorships[1].countries US authorships[1].affiliations[0].institution_ids https://openalex.org/I133999245 authorships[1].affiliations[0].raw_affiliation_string University of Nevada, Las Vegas - College of Business authorships[1].institutions[0].id https://openalex.org/I133999245 authorships[1].institutions[0].ror https://ror.org/0406gha72 authorships[1].institutions[0].type education authorships[1].institutions[0].lineage https://openalex.org/I133999245 authorships[1].institutions[0].country_code US authorships[1].institutions[0].display_name University of Nevada, Las Vegas authorships[1].author_position middle authorships[1].raw_author_name Gregory D Moody authorships[1].is_corresponding False authorships[1].raw_affiliation_strings University of Nevada, Las Vegas - College of Business authorships[2].author.id https://openalex.org/A5100433048 authorships[2].author.orcid https://orcid.org/0000-0001-6275-9387 authorships[2].author.display_name Jun Zhang authorships[2].countries HK authorships[2].affiliations[0].institution_ids https://openalex.org/I168719708 authorships[2].affiliations[0].raw_affiliation_string City Univ. of Hong Kong#TAB# authorships[2].institutions[0].id https://openalex.org/I168719708 authorships[2].institutions[0].ror https://ror.org/03q8dnn23 authorships[2].institutions[0].type education authorships[2].institutions[0].lineage https://openalex.org/I168719708 authorships[2].institutions[0].country_code HK authorships[2].institutions[0].display_name City University of Hong Kong authorships[2].author_position middle authorships[2].raw_author_name Jun Zhang authorships[2].is_corresponding False authorships[2].raw_affiliation_strings City Univ. of Hong Kong#TAB# authorships[3].author.id https://openalex.org/A5009502121 authorships[3].author.orcid https://orcid.org/0000-0002-0187-5808 authorships[3].author.display_name Paul Benjamin Lowry authorships[3].countries US authorships[3].affiliations[0].institution_ids https://openalex.org/I859038795 authorships[3].affiliations[0].raw_affiliation_string Virginia Polytechnic Institute and State University - Pamplin College of Business authorships[3].institutions[0].id https://openalex.org/I859038795 authorships[3].institutions[0].ror https://ror.org/02smfhw86 authorships[3].institutions[0].type education authorships[3].institutions[0].lineage https://openalex.org/I859038795 authorships[3].institutions[0].country_code US authorships[3].institutions[0].display_name Virginia Tech authorships[3].author_position last authorships[3].raw_author_name Paul Benjamin Lowry authorships[3].is_corresponding False authorships[3].raw_affiliation_strings Virginia Polytechnic Institute and State University - Pamplin College of Business has_content.pdf False has_content.grobid_xml False is_paratext False open_access.is_oa True open_access.oa_url https://papers.ssrn.com/sol3/Delivery.cfm/SSRN_ID3493996_code446262.pdf?abstractid=3493996&mirid=1 open_access.oa_status green open_access.any_repository_has_fulltext False created_date 2025-10-10T00:00:00 display_name Effects of the Design of Mobile Security Notifications and Mobile App Usability on Users’ Security Perceptions and Continued-Use Intention has_fulltext False is_retracted False updated_date 2025-10-10T17:16:08.811792 primary_topic.id https://openalex.org/T11045 primary_topic.field.id https://openalex.org/fields/33 primary_topic.field.display_name Social Sciences primary_topic.score 0.9973000288009644 primary_topic.domain.id https://openalex.org/domains/2 primary_topic.domain.display_name Social Sciences primary_topic.subfield.id https://openalex.org/subfields/3312 primary_topic.subfield.display_name Sociology and Political Science primary_topic.display_name Privacy, Security, and Data Protection related_works https://openalex.org/W2052602449, https://openalex.org/W2110213347, https://openalex.org/W2972982378, https://openalex.org/W2913037077, https://openalex.org/W2271538313, https://openalex.org/W2465712103, https://openalex.org/W2620981570, https://openalex.org/W2521152100, https://openalex.org/W174887237, https://openalex.org/W2950084974, https://openalex.org/W2050557001, https://openalex.org/W2626181894, https://openalex.org/W2731871799, https://openalex.org/W1520171739, https://openalex.org/W2769745330, https://openalex.org/W3033824638, https://openalex.org/W1991750733, https://openalex.org/W3082657157, https://openalex.org/W2046274577, https://openalex.org/W2347354554 cited_by_count 0 locations_count 2 best_oa_location.id mag:3137551277 best_oa_location.is_oa True best_oa_location.source.id https://openalex.org/S4210172589 best_oa_location.source.issn 1556-5068 best_oa_location.source.type repository best_oa_location.source.is_oa True best_oa_location.source.issn_l 1556-5068 best_oa_location.source.is_core False best_oa_location.source.is_in_doaj False best_oa_location.source.display_name SSRN Electronic Journal best_oa_location.source.host_organization https://openalex.org/I1318003438 best_oa_location.source.host_organization_name RELX Group (Netherlands) best_oa_location.source.host_organization_lineage https://openalex.org/I1318003438 best_oa_location.license best_oa_location.pdf_url best_oa_location.version submittedVersion best_oa_location.raw_type best_oa_location.license_id best_oa_location.is_accepted False best_oa_location.is_published False best_oa_location.raw_source_name SSRN Electronic Journal best_oa_location.landing_page_url https://papers.ssrn.com/sol3/Delivery.cfm/SSRN_ID3493996_code446262.pdf?abstractid=3493996&mirid=1 primary_location.id mag:3137551277 primary_location.is_oa True primary_location.source.id https://openalex.org/S4210172589 primary_location.source.issn 1556-5068 primary_location.source.type repository primary_location.source.is_oa True primary_location.source.issn_l 1556-5068 primary_location.source.is_core False primary_location.source.is_in_doaj False primary_location.source.display_name SSRN Electronic Journal primary_location.source.host_organization https://openalex.org/I1318003438 primary_location.source.host_organization_name RELX Group (Netherlands) primary_location.source.host_organization_lineage https://openalex.org/I1318003438 primary_location.license primary_location.pdf_url primary_location.version submittedVersion primary_location.raw_type primary_location.license_id primary_location.is_accepted False primary_location.is_published False primary_location.raw_source_name SSRN Electronic Journal primary_location.landing_page_url https://papers.ssrn.com/sol3/Delivery.cfm/SSRN_ID3493996_code446262.pdf?abstractid=3493996&mirid=1 publication_date 2020-07-01 publication_year 2020 referenced_works_count 0 abstract_inverted_index.a 21, 77, 140 abstract_inverted_index.By 39 abstract_inverted_index.If 181 abstract_inverted_index.In 151 abstract_inverted_index.We 119 abstract_inverted_index.an 155 abstract_inverted_index.by 91 abstract_inverted_index.in 86, 137 abstract_inverted_index.of 4, 24, 57, 79, 95, 112, 129, 171 abstract_inverted_index.on 37, 143 abstract_inverted_index.to 34, 68, 146, 162 abstract_inverted_index.we 52, 73, 153 abstract_inverted_index.317 84 abstract_inverted_index.App 17 abstract_inverted_index.MSN 88, 96, 113 abstract_inverted_index.The 0 abstract_inverted_index.and 14, 46, 61, 75, 109, 126, 166 abstract_inverted_index.app 43, 123, 172 abstract_inverted_index.are 59 abstract_inverted_index.has 9, 139 abstract_inverted_index.how 54, 62 abstract_inverted_index.low 101, 117 abstract_inverted_index.our 175 abstract_inverted_index.set 78 abstract_inverted_index.the 93, 103, 110, 127, 149 abstract_inverted_index.vs. 100, 106, 116 abstract_inverted_index.MSNs 130, 191 abstract_inverted_index.app. 150 abstract_inverted_index.apps 58 abstract_inverted_index.away 189 abstract_inverted_index.been 10 abstract_inverted_index.both 41, 122 abstract_inverted_index.from 190 abstract_inverted_index.have 20 abstract_inverted_index.high 99 abstract_inverted_index.poor 22 abstract_inverted_index.task 194 abstract_inverted_index.that 121, 192 abstract_inverted_index.they 28 abstract_inverted_index.with 12, 83 abstract_inverted_index.(MSN) 50 abstract_inverted_index.(high 115 abstract_inverted_index.Thus, 174 abstract_inverted_index.apps) 8 abstract_inverted_index.apps. 38, 71 abstract_inverted_index.found 120 abstract_inverted_index.hold, 184 abstract_inverted_index.shift 188 abstract_inverted_index.their 169 abstract_inverted_index.these 63, 182 abstract_inverted_index.turn, 138 abstract_inverted_index.types 94 abstract_inverted_index.users 18, 165 abstract_inverted_index.using 70, 148 abstract_inverted_index.(i.e., 7, 98 abstract_inverted_index.common 160 abstract_inverted_index.degree 111 abstract_inverted_index.design 128 abstract_inverted_index.formed 60 abstract_inverted_index.global 2 abstract_inverted_index.ignore 30 abstract_inverted_index.mobile 5, 42, 47 abstract_inverted_index.should 187 abstract_inverted_index.survey 81 abstract_inverted_index.which, 136 abstract_inverted_index.worse, 27 abstract_inverted_index.context 104 abstract_inverted_index.current 179, 185 abstract_inverted_index.design, 51 abstract_inverted_index.fraught 11 abstract_inverted_index.issues. 16 abstract_inverted_index.privacy 15 abstract_inverted_index.results 176, 183 abstract_inverted_index.(hedonic 105 abstract_inverted_index.MSNs—a 159 abstract_inverted_index.adoption 3 abstract_inverted_index.approach 161 abstract_inverted_index.continue 69, 147 abstract_inverted_index.designed 33, 74 abstract_inverted_index.directly 177 abstract_inverted_index.impacted 132 abstract_inverted_index.increase 35 abstract_inverted_index.positive 141 abstract_inverted_index.practice 186 abstract_inverted_index.security 13, 31, 36, 48, 55 abstract_inverted_index.users’ 66, 133, 144 abstract_inverted_index.addition, 152 abstract_inverted_index.challenge 178 abstract_inverted_index.conducted 76 abstract_inverted_index.different 87 abstract_inverted_index.explosive 1 abstract_inverted_index.important 156 abstract_inverted_index.influence 65, 142, 168 abstract_inverted_index.intention 145 abstract_inverted_index.interface 44, 89, 124 abstract_inverted_index.interrupt 193 abstract_inverted_index.perceived 134 abstract_inverted_index.practice. 180 abstract_inverted_index.routinely 29 abstract_inverted_index.scenarios 90 abstract_inverted_index.security, 135 abstract_inverted_index.security. 173 abstract_inverted_index.security; 26 abstract_inverted_index.typically 19 abstract_inverted_index.usability 45, 125 abstract_inverted_index.controlled 80 abstract_inverted_index.conundrum: 157 abstract_inverted_index.delivering 163 abstract_inverted_index.disruptive 158 abstract_inverted_index.identified 154 abstract_inverted_index.intentions 67 abstract_inverted_index.interfaces 97 abstract_inverted_index.negatively 167 abstract_inverted_index.considering 40 abstract_inverted_index.experiments 82 abstract_inverted_index.information 25 abstract_inverted_index.investigate 53 abstract_inverted_index.perceptions 56, 64, 170 abstract_inverted_index.scenarios), 108 abstract_inverted_index.utilitarian 107 abstract_inverted_index.Accordingly, 72 abstract_inverted_index.applications 6 abstract_inverted_index.disruption), 102 abstract_inverted_index.manipulating 92 abstract_inverted_index.notification 49 abstract_inverted_index.participants 85 abstract_inverted_index.performance. 195 abstract_inverted_index.intrusiveness 114 abstract_inverted_index.notifications 32 abstract_inverted_index.significantly 131 abstract_inverted_index.understanding 23 abstract_inverted_index.MSNs—irritate 164 abstract_inverted_index.intrusiveness). 118 cited_by_percentile_year countries_distinct_count 2 institutions_distinct_count 4 citation_normalized_percentile.value 0.3615776 citation_normalized_percentile.is_in_top_1_percent False citation_normalized_percentile.is_in_top_10_percent False