Author:
Das Amit,Khan Habib Ullah
Abstract
Purpose
– This paper aims to report on the information security behaviors of smartphone users in an affluent economy of the Middle East.
Design/methodology/approach
– A model based on prior research, synthesized from a thorough literature review, is tested using survey data from 500 smartphone users representing three major mobile operating systems.
Findings
– The overall level of security behaviors is low. Regression coefficients indicate that the efficacy of security measures and the cost of adopting them are the main factors influencing smartphone security behaviors. At present, smartphone users are more worried about malware and data leakage than targeted information theft.
Research limitations/implications
– Threats and counter-measures co-evolve over time, and our findings, which describe the state of smartphone security at the current time, will need to be updated in the future.
Practical implications
– Measures to improve security practices of smartphone users are needed urgently. The findings indicate that such measures should be broadly effective and relatively costless for users to implement.
Social implications
– Personal smartphones are joining enterprise networks through the acceptance of Bring-Your-Own-Device computing. Users’ laxity about smartphone security thus puts organizations at risk.
Originality/value
– The paper highlights the key factors influencing smartphone security and compares the situation for the three leading operating systems in the smartphone market.
Subject
Management of Technology and Innovation,Information Systems and Management,Computer Networks and Communications,Information Systems,Software,Management Information Systems
Reference70 articles.
1. Aiken, L.S.
and
West, S.G.
(1991),
Multiple Regression: Testing and Interpreting Interactions
, Sage, Newbury Park.
2. Allam, S.
,
Flowerday, S.V.
and
Flowerday, E.
(2014), “Smartphone information security awareness: a victim of operational pressures”,
Computers & Security
, Vol. 42 (May), pp. 56-65.
3. Al-Omari, A.
,
El-Gayar, O.
and
Deokar, A.
(2012), “Security policy compliance: user acceptance perspective”, Proceedings of the 45th Hawaii International Conference on System Sciences, Maui, HI, pp. 3317-3326.
4. Android Official Blog
(2014), “Expanding Google’s security services for Android”, available at: http://officialandroid.blogspot.com/2014/04/expanding-googles-security-services-for.html (accessed 17 August 2015).
5. Barrera, D.
,
Kayacik, H.G.
,
Van Oorschot, P.C.
and
Somayaji, A.
(2010), “A methodology for empirical analysis of permission-based security models and its application to Android”, 17th ACM Conference on Computer and Communications Security, Chicago, IL.
Cited by
39 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献