To read this content please select one of the options below:

Security behaviors of smartphone users

Amit Das (College of Business and Economics, Qatar University, Doha, Qatar)
Habib Ullah Khan (College of Business and Economics, Qatar University, Doha, Qatar)

Information and Computer Security

ISSN: 2056-4961

Article publication date: 14 March 2016

3675

Abstract

Purpose

This paper aims to report on the information security behaviors of smartphone users in an affluent economy of the Middle East.

Design/methodology/approach

A model based on prior research, synthesized from a thorough literature review, is tested using survey data from 500 smartphone users representing three major mobile operating systems.

Findings

The overall level of security behaviors is low. Regression coefficients indicate that the efficacy of security measures and the cost of adopting them are the main factors influencing smartphone security behaviors. At present, smartphone users are more worried about malware and data leakage than targeted information theft.

Research limitations/implications

Threats and counter-measures co-evolve over time, and our findings, which describe the state of smartphone security at the current time, will need to be updated in the future.

Practical implications

Measures to improve security practices of smartphone users are needed urgently. The findings indicate that such measures should be broadly effective and relatively costless for users to implement.

Social implications

Personal smartphones are joining enterprise networks through the acceptance of Bring-Your-Own-Device computing. Users’ laxity about smartphone security thus puts organizations at risk.

Originality/value

The paper highlights the key factors influencing smartphone security and compares the situation for the three leading operating systems in the smartphone market.

Keywords

Citation

Das, A. and Khan, H.U. (2016), "Security behaviors of smartphone users", Information and Computer Security, Vol. 24 No. 1, pp. 116-134. https://doi.org/10.1108/ICS-04-2015-0018

Publisher

:

Emerald Group Publishing Limited

Copyright © 2016, Emerald Group Publishing Limited

Related articles