2017
DOI: 10.1016/j.jisa.2016.10.002
|View full text |Cite
|
Sign up to set email alerts
|

Psychological needs as motivators for security and privacy actions on smartphones

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
13
0

Year Published

2020
2020
2022
2022

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 19 publications
(15 citation statements)
references
References 13 publications
0
13
0
Order By: Relevance
“…In contrast, resistance to cyber security measures can compromise the effectiveness of the security level ( Gcaza et al, 2017 ) and as such the psychological aspects should be considered in a true human centric cyber security design. Kraus et al (2017) show that there is a relationship between personality traits and information security. They investigated the psychological need fulfillment of humans as motivators for security and privacy actions, specifically with smartphone usage.…”
Section: Usermentioning
confidence: 98%
See 4 more Smart Citations
“…In contrast, resistance to cyber security measures can compromise the effectiveness of the security level ( Gcaza et al, 2017 ) and as such the psychological aspects should be considered in a true human centric cyber security design. Kraus et al (2017) show that there is a relationship between personality traits and information security. They investigated the psychological need fulfillment of humans as motivators for security and privacy actions, specifically with smartphone usage.…”
Section: Usermentioning
confidence: 98%
“…The diverse range of these users, all with different levels of cyber security awareness due to personal influences, demography and past experiences, as well as the user psychology and behavior toward cyber security risks are considered in the user component of cyber security. Usage components are mainly concerned with the functional aspects of technological and non-technological measures that are put in place to protect users against known security threats ( Kraus et al, 2017 ). It focuses on the intended use of a cyber security system and mechanisms such as antivirus programs, spam detection algorithms, password based authorizations, organizational policies and cyber security laws.…”
Section: Human Centric Cyber Security Contextmentioning
confidence: 99%
See 3 more Smart Citations