2016
DOI: 10.1108/ics-04-2015-0018
|View full text |Cite
|
Sign up to set email alerts
|

Security behaviors of smartphone users

Abstract: Purpose – This paper aims to report on the information security behaviors of smartphone users in an affluent economy of the Middle East. Design/methodology/approach – A model based on prior research, synthesized from a thorough literature review, is tested using survey data from 500 smartphone users representing three major mobile operating systems. Findings – The overall level of… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

7
25
0

Year Published

2016
2016
2023
2023

Publication Types

Select...
4
3
1

Relationship

1
7

Authors

Journals

citations
Cited by 59 publications
(37 citation statements)
references
References 46 publications
7
25
0
Order By: Relevance
“…The findings are consistent with previous work that reported positive associations between self-efficacy and secure behavior (Workman et al, 2008;Das and Khan, 2016;Jansen and Van Schaik, 2017). Also, risk awareness and perceived threat were associated with smartphone security behaviors (Ng et al, 2009) and, in addition, interactions and joint effects of these two factors (Fenz et al, 2014;Das and Khan, 2016).…”
Section: Discussionsupporting
confidence: 91%
See 2 more Smart Citations
“…The findings are consistent with previous work that reported positive associations between self-efficacy and secure behavior (Workman et al, 2008;Das and Khan, 2016;Jansen and Van Schaik, 2017). Also, risk awareness and perceived threat were associated with smartphone security behaviors (Ng et al, 2009) and, in addition, interactions and joint effects of these two factors (Fenz et al, 2014;Das and Khan, 2016).…”
Section: Discussionsupporting
confidence: 91%
“…Numerous prior studies have claimed the significance of complying with smartphone security behaviors to protect information security (Jones and Heinrichs, 2012;Wang et al, 2012;Das and Khan, 2016;van Schaik et al, 2018). Various available security behaviors have been strongly recommended by computer professionals.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…This poor adoption applies to many security tools [6] [7], [8], not only password managers. Poor usability has often been blamed for non-adoption of security measures [9,1].…”
Section: Introductionmentioning
confidence: 99%
“…Performing these tasks has become a big challenge to Magrabi, as aligning the compulsory alterations with the company's objectives and strategies and reengineering the process flows seamlessly is a herculean task (Abraham and Junglas, 2011;Khan et al, 2017b). Though many market partners are adapting the information systems developed by the vendors, Magrabi took pertinent actions by developing own standard operating procedures for ensuring a continuous support for the new systems throughout (Melin and Axelsson, 2014;Das and Khan, 2016;. In spite of the odds that can accrue losses for developing organisation based HIS (Khan et al, 2017b) management put all efforts meticulously by framing apt strategies.…”
Section: Case Study Of Magrabi Hospitals and Centresmentioning
confidence: 99%