The impact of security and privacy perceptions on cryptocurrency app evaluations by users: A text mining study
-
DOIhttp://dx.doi.org/10.21511/imfi.22(1).2025.14
-
Article InfoVolume 22 2025, Issue #1, pp. 173-187
- 51 Views
-
18 Downloads
This work is licensed under a
Creative Commons Attribution 4.0 International License
This study examines how perceived security and privacy influence user ratings of cryptocurrency applications, which are critical for adoption and satisfaction amid the growing popularity of blockchain technologies and rising concerns over information security in online platforms and mobile apps. The study focuses on mobile applications from the Android app market. It used text mining methods to investigate over 64 thousand text-based user reviews and star ratings of over 140 cryptocurrency-related mobile applications available in the Google Play store. Using a partially supervised machine learning approach, this study first identified reviewer sentiment related to privacy and security, then employed ordinal regression analysis to examine the data to reveal the relationship between perceived security threats, privacy concerns, and app ratings. This study found that crypto apps average 3.84 out of 55 stars, which is higher than Productivity apps (3.46) but lower than FinTech (4.29) and Banking (4.25) apps. Ordinal regression analysis revealed security and privacy threats negatively impact ratings, while robust security measures improve them, with a model Pseudo R² of 0.25. These results have implications for both cryptocurrency app developers and platform managers, offering insights for enhancing user experiences and informing future research endeavors in this domain. It contributes to the literature by integrating the Protection Motivation Theory with sentiment analysis and provides a structured framework for developing an understanding of user behavior in the context of cryptocurrency apps.
- Keywords
-
JEL Classification (Paper profile tab)G00, G40, O30, O33
-
References85
-
Tables5
-
Figures1
-
- Figure 1. Data collection, preparation, and analysis process
-
- Table 1. Key variable statistics
- Table A1. Summary of studies related to NLP techniques and customer intention to use based on user reviews
- Table A2. Variables and concept definitions
- Table A3. Pairwise correlation of the variables used
- Table A4. Results of ordinal regression models (star rating)
-
- Abramova, S., & Böhme, R. (2016). Perceived Benefit and Risk as Multidimensional Determinants of Bitcoin Use: A Quantitative Exploratory Study (2016). ICIS 2016 Proceedings, 19.
- Ahmed, H., Traore, I., & Saad, S. (2018). Detecting opinion spams and fake news using text classification. Security and Privacy, 1(1), e9.
- Albizri, A. (2020). Theory-based Taxonomy of Feedback Application Design for Electricity Conservation: A User-centric Approach. Communications of the Association for Information Systems, 46.
- Al-Natour, S., & Turetken, O. (2020). A comparative assessment of sentiment analysis and star ratings for consumer reviews. International Journal of Information Management, 54, 102132.
- Alnsour, Y., & Juma’h, A. H. (2024). The effect of political environment on security and privacy of contact tracing apps evaluation. International Journal of Public Sector Management.
- Alnsour, Y., & Juma’h, A. H. (2023). The Effects of Reviewers Security and Privacy Perceptions on Fin Apps’ Performance: A Textual Analysis.
- Arruda-Filho, E. J., Cabusas, J. A., & Dholakia, N. (2010). Social behavior and brand devotion among iPhone innovators. International Journal of Information Management, 30(6), 475-480.
- Azfar, A., Choo, K.-K. R., & Liu, L. (2016). Android mobile VoIP apps: a survey and examination of their security and privacy. Electronic Commerce Research, 16(1), 73-111.
- Banerjee, S., & Chua, A. Y. (2019). Trust in online hotel reviews across review polarity and hotel category. Computers in Human Behavior, 90, 265-275.
- Banfield, A. (2014). Unspeakable Sentences (Routledge Revivals): Narration and Representation in the Language of Fiction. Routledge.
- Bauer, M., Glenn, T., Geddes, J., Gitlin, M., Grof, P., Kessing, L. V., Monteith, S., Faurholt-Jepsen, M., Severus, E., & Whybrow, P. C. (2020). Smartphones in mental health: a critical review of background issues, current status and future concerns. International Journal of Bipolar Disorders, 8(1), 1-19.
- Berger, J., Humphreys, A., Ludwig, S., Moe, W. W., Netzer, O., & Schweidel, D. A. (2020). Uniting the tribes: Using text for marketing insight. Journal of Marketing, 84(1), 1-25.
- Bitrián, P., Buil, I., & Catalán, S. (2021). Making finance fun: the gamification of personal financial management apps. International Journal of Bank Marketing, 39(7), 1310-1332.
- Çelik, A., & Yıldırım, B. (2020). Turkish Profanity Detection Enhanced by Artificial Intelligence. 2020 28th Signal Processing and Communications Applications Conference (SIU).
- Chahuneau, V., Gimpel, K., Routledge, B. R., Scherlis, L., & Smith, N. A. (2012). Word salad: Relating food prices and descriptions. Proceedings of the 2012 Joint Conference on Empirical Methods in Natural Language Processing and Computational Natural Language Learning.
- Chatterjee, S. (2020). Drivers of helpfulness of online hotel reviews: A sentiment and emotion mining approach. International Journal of Hospitality Management, 85, 102356.
- Chen, Y., & Bellavitis, C. (2020). Blockchain disruption and decentralized finance: The rise of decentralized business models. Journal of Business Venturing Insights, 13, e00151.
- Chennamaneni, A., & Gupta, B. (2023). The privacy protection behaviours of the mobile app users: exploring the role of neuroticism and protection motivation theory. Behaviour & Information Technology, 42(12), 2011-2029.
- Chopdar, P. K., Korfiatis, N., Sivakumar, V., & Lytras, M. D. (2018). Mobile shopping apps adoption and perceived risks: A cross-country perspective utilizing the Unified Theory of Acceptance and Use of Technology. Computers in Human Behavior, 86, 109-128.
- Dahlberg, T., Guo, J., & Ondrus, J. (2015). A critical review of mobile payment research. Electronic Commerce Research and Applications, 14(5), 265-284.
- Daradkeh, M. K. (2019). Determinants of visual analytics adoption in organizations: Knowledge discovery through content analysis of online evaluation reviews. Information Technology & People, 32(3), 668-695.
- Dehzad, F., Hilhorst, C., de Bie, C., & Claassen, E. (2014). Adopting Health Apps, What’s Hindering Doctors and Patients? Health.
- DeLone, W. H., & McLean, E. R. (1992). Information systems success: The quest for the dependent variable. Information Systems Research, 3(1), 60-95.
- DeLone, W. H., & McLean, E. R. (2003). The DeLone and McLean model of information systems success: a ten-year update. Journal of Management Information Systems, 19(4), 9-30.
- Dou, M., Gu, Y., & Gong, J. (2024). How do people perceive the quality of urban transport service? New insights from online reviews of Shanghai metro system. Journal of Urban Management.
- El Amri, M. C., Mohammed, M. O., & Bakr, A. M. (2021). Enhancing financial inclusion using fintech-based payment system. Islamic FinTech: Insights and Solutions, 191-207.
- Fabian, B., Ermakova, T., & Sander, U. (2016). Anonymity in Bitcoin? – The Users’ Perspective. ICIS 2016 Proceedings, 10.
- Fagernäs, S., Hamilton, W., Espinoza, N., Miloff, A., Carlbring, P., Lindneret, Ph. (2021). What do users think about Virtual Reality relaxation applications? A mixed methods study of online user reviews using natural language processing. Internet Interventions, 24, 100370.
- Fu, H., McMahon, S. K., Gross, C. R., Adam, T. J., & Wyman, J. F. (2017). Usability and clinical efficacy of diabetes mobile applications for adults with type 2 diabetes: a systematic review. Diabetes Research and Clinical Practice, 131, 70-81.
- Gan, Q., & Lau, R. Y. K. (2024). Trust in a ‘trust-free’system: Blockchain acceptance in the banking and finance sector. Technological Forecasting and Social Change, 199, 123050.
- Greene, W. (2024). Models for ordered choices. In Handbook of choice modelling (pp. 393-425).
- Gu, J., Xu, Y. C., Xu, H., Zhang, C., & Ling, H. (2017). Privacy concerns for mobile app download: An elaboration likelihood model perspective. Decision Support Systems, 94, 19-28.
- Gunasekara, I., & Nejadgholi, I. (2018). A review of standard text classification practices for multi-label toxicity identification of online content. Proceedings of the 2nd workshop on abusive language online (ALW2).
- Hande, A., Puranik, K., Yasaswini, K., Priyadharshini, R., Thavareesan, S., Sampath, A., Shanmugavadivel, K., Thenmozhi, D., & Chakravarthi, B. R. (2021). Offensive Language Identification in Low-resourced Code-mixed Dravidian languages using Pseudo-labeling. arXiv preprint arXiv:2108.12177.
- Herskind, L., Katsikouli, P., & Dragoni, N. (2020). Privacy and cryptocurrencies – A systematic literature review. IEEE Access, 8, 54044-54059.
- Ho-Dac, N. N., Carson, S. J., & Moore, W. L. (2013). The effects of positive and negative online customer reviews: do brand strength and category maturity matter? Journal of Marketing, 77(6), 37-53.
- Hsu, C.-L., & Lin, J. C.-C. (2016). Effect of perceived value and social influences on mobile app stickiness and in-app purchase intention. Technological Forecasting and Social Change, 108, 42-53.
- Hünermund, P., & Louw, B. (2020). On the nuisance of control variables in regression analysis.
- Jain, A. K., & Shanbhag, D. (2012). Addressing security and privacy risks in mobile applications. IT Professional, 14(5), 28-33.
- Joshi, M., Das, D., Gimpel, K., & Smith, N. A. (2010). Movie reviews and revenues: An experiment in text regression. Human Language Technologies: The 2010 Annual Conference of the North American Chapter of the Association for Computational Linguistics.
- Juma’h, A. H., & Li, Y. (2023). The effects of auditors’ knowledge, professional skepticism, and perceived adequacy of accounting standards on their intention to use blockchain. International Journal of Accounting Information Systems, 51, 100650.
- Jumah, A., & Li, Y. (2020). Auditors’ adoption of Blockchain technology: A study on antecedents. AMCIS 2020 Proceedings.
- Jumah, A. (2023). Factors Influencing Managers’ Adoption of Artificial Intelligence and Data Analytics. Proceedings of the 2023 Pre-ICIS SIGDSA Symposium, 10.
- Kesgin, M., Murthy, R., & Lagiewski, R. (2022). Profiling food festivals by type, name and descriptive content: a population level study. British Food Journal, 124(2), 530-549.
- Korfiatis, N., Stamolampros, P., Kourouthanassis, P., Sagiadinos, V. (2019). Measuring service quality from unstructured data: A topic modeling application on airline passengers’ online reviews. Expert Systems with Applications, 116, 472-486.
- Krebs, P., & Duncan, D. T. (2015). Health app use among US mobile phone owners: a national survey. JMIR mHealth and uHealth, 3(4), e101.
- Kshetri, N. (2023). The nature and sources of international variation in formal institutions related to initial coin offerings: preliminary findings and a research agenda. Financial Innovation, 9(1), 9.
- Lee, S. (2017). Evaluation of mobile application in user’s perspective: case of P2P lending Apps in FinTech industry. KSII Transactions on Internet and Information Systems (TIIS), 11(2), 1105-1117.
- Li, H., Baucom, B., & Georgiou, P. (2020). Linking emotions to behaviors through deep transfer learning. PeerJ Computer Science, 6, e246.
- Li, Y., & Juma’h, A. H. (2022). The Effect of Technological and Task Considerations on Auditors’ Acceptance of Blockchain Technology. Journal of Information Systems, 36(3), 129-151.
- Liang, T.-P., Li, X., Yang, C.-T., & Wang, M. (2015). What in consumer reviews affects the sales of mobile apps: A multifacet sentiment analysis approach. International Journal of Electronic Commerce, 20(2), 236-260.
- Lu, L., Xu, P., Wang, Y. Y., & Wang, Y. (2023). Measuring service quality with text analytics: Considering both importance and performance of consumer opinions on social and non-social online platforms. Journal of Business Research, 169, 114298.
- MacKay, R. J., & Oldford, R. W. (2000). Scientific Method, Statistical Method and the Speed of Light. Statist. Sci., 15(3), 254-278.
- Menon, S., & Sarkar, S. (2016). Privacy and Big Data: Scalable Approaches to Sanitize Large Transactional Databases for Sharing. MIS Quarterly, 40(4).
- Mittal, R., & Bhatia, M. P. S. (2021). Detection of Suspicious or Un-Trusted Users in Crypto-Currency Financial Trading Applications. International Journal of Digital Crime and Forensics (IJDCF), 13(1), 79-93.
- Nguyen, L. T., Hoang, T. G., Do, L. H., Ngo, X. T., Nguyen, P. H. T., Nguyen, G. D. L., & Nguyen, G. N. T. (2021). The role of blockchain technology-based social crowdfunding in advancing social value creation. Technological Forecasting and Social Change, 170, 120898.
- Nikkel, B. (2020). Fintech forensics: Criminal investigation and digital evidence in financial technologies. Forensic Science International: Digital Investigation, 33, 200908.
- Noei, E., Zhang, F., & Zou, Y. (2019). Too many user-reviews, what should app developers look at first? IEEE Transactions on Software Engineering.
- O’brien, R. M. (2007). A caution regarding rules of thumb for variance inflation factors. Quality & Quantity, 41(5), 673-690.
- Ouali, Y., Hudelot, C., & Tami, M. (2020). An overview of deep semi-supervised learning.
- Palomba, F., Linares-Vásquez, M., Bavota, G., Oliveto, R., Di Penta, M., Poshyvanyk, D., & De Lucia, A. (2018). Crowdsourcing user reviews to support the evolution of mobile apps. Journal of Systems and Software, 137, 143-162.
- Pinochet, L. H. C., de Souza, C. A., Viana, A. B. N., & Rodrıguez-Abitia, G. (2024). Smart technologies in supermarket retail and their influence on citizens’ quality of life during theCOVID-19 pandemic. REGE Revista de Gestão, 31(1).
- Rath, D. K., & Kumar, A. (2021). Information privacy concern at individual, group, organization and societal level-a literature review. Vilakshan-XIMB Journal of Management.
- Ren, G., & Hong, T. (2019). Examining the relationship between specific negative emotions and the perceived helpfulness of online reviews. Information Processing & Management, 56(4), 1425-1438.
- Rippetoe, P. A., & Rogers, R. W. (1987). Effects of components of protection-motivation theory on adaptive and maladaptive coping with a health threat. Journal of Personality and Social Psychology, 52(3), 596.
- Rogers, R. W. (1975). A protection motivation theory of fear appeals and attitude change1. The Journal of Psychology, 91(1), 93-114.
- Salehan, M., & Kim, D. J. (2016). Predicting the performance of online consumer reviews: A sentiment mining approach to big data analytics. Decision Support Systems, 81, 30-40.
- Salminen, J., Hopf, M., Chowdhury, S. A., Jung, S., Almerekhi, H., & Jansen, B. J. (2020). Developing an online hate classifier for multiple social media platforms. Human-centric Computing and Information Sciences, 10(1), 1-34.
- Sefferman, A. (2016). The Average Mobile Apps’ Ratings and Reviews, by Category.
- Sefferman, A. (2021). Finance Apps: Benchmarks for Success in 2021.
- Sentana, I. W. B., Ikram, M., & Kaafar, M. A. (2023). An Empirical Analysis of Security and Privacy Risks in Android Cryptocurrency Wallet Apps. In Tibouchi, M. & Wang, X. (Eds.), Applied Cryptography and Network Security. ACNS 2023. Lecture Notes in Computer Science (Vol. 13906). Cham: Springer.
- Sheeran, P., & Webb, T. L. (2016). The intention-behaviour gap. Social and Personality Psychology Compass, 10, 503-518.
- Tam, C., Santos, D., & Oliveira, T. (2020). Exploring the influential factors of continuance intention to use mobile Apps: Extending the expectation confirmation model. Information Systems Frontiers, 22(1), 243-257.
- Tan, M. L., Prasanna, R., Stock, K., Hudson-Doyle, E., Leonard, G., & Johnston, D. (2017). Mobile applications in crisis informatics literature: A systematic review. International Journal of Disaster Risk Reduction, 24, 297-311.
- Taylor, V. F., & Martinovic, I. (2017). To update or not to update: Insights from a two-year study of android app evolution. In Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, 45-57.
- Tronnier, F., & Biker, P., (2022). A Framework and Qualitative Evaluation of Privacy Concerns in the Digital Euro. PACIS 2022 Proceedings, 63.
- Tuch, A. N., Presslaber, E. E., Stöcklin, M., Opwis, K., A., & Bargas-Avila, J. (2012). The role of visual complexity and prototypicality regarding first impression of websites: Working towards understanding aesthetic judgments. International Journal of Human-Computer Studies, 70(11), 794-811.
- van der Schyff, K., & Flowerday, S. (2021). Mediating effects of information security awareness. Computers & Security, 106, 102313.
- Van Looy, A. (2022). Sentiment analysis and opinion mining (business intelligence 1). In Social Media Management (pp. 147-163). Cham: Springer.
- Westin, A. F. (2003). Social and political dimensions of privacy. Journal of Social Issues, 59(2), 431-453.
- Wilson, T., Wiebe, J., & Hoffmann, P. (2009). Recognizing contextual polarity: An exploration of features for phrase-level sentiment analysis. Computational linguistics, 35(3), 399-433.
- Wu, D., Moody, G. D., Zhang, J., & Lowry, P. B. (2020). Effects of the design of mobile security notifications and mobile app usability on users’ security perceptions and continued use intention. Information & Management, 57(5), 103235.
- Yang, Z., Cai, S., Zhou, Z., & Zhou, N. (2005). Development and validation of an instrument to measure user perceived service quality of information presenting web portals. Information & Management, 42(4), 575-589.
- Yen, Y. S., & Wu, F. S. (2016). Predicting the adoption of mobile financial services: The impacts of perceived mobility and personal habit. Computers in Human Behavior, 65, 31-42.
- Zhang, Y., Xu, S., Zhang, L., & Yang, M. (2021). Big data and human resource management research: An integrative review and new directions for future research. Journal of Business Research, 133, 34-50.