• English
    • العربية
  • العربية 
  • Login
  • QU
  • QU Library
  •  Home
  • Communities & Collections
  • Help
    • Item Submission
    • Publisher policies
    • User guides
    • FAQs
  • About QSpace
    • Vision & Mission
    • QSpace policies
Advanced Search
Advanced Search
View Item 
  •   Qatar University QSpace
  • Academic
  • Faculty Contributions
  • College of Business and Economics
  • Accounting & Information Systems
  • View Item
  • Qatar University QSpace
  • Academic
  • Faculty Contributions
  • College of Business and Economics
  • Accounting & Information Systems
  • View Item
  •      
  •  
    JavaScript is disabled for your browser. Some features of this site may not work without it.

    Security behaviors of smartphone users

    Thumbnail
    Date
    2016
    Author
    Das, Amit
    Khan, Habib Ullah
    Metadata
    Show full item record
    Abstract
    Purpose: - This paper aims to report on the information security behaviors of smartphone users in an affuent economy of the Middle East. Design/methodology/approach: - A model based on prior research, synthesized from a thorough literature review, is tested using survey data from 500 smartphone users representing three major mobile operating systems. Findings: - The overall level of security behaviors is low. Regression coefficients indicate that the efficacy of security measures and the cost ofadopting them are the main factors infuencing smartphone security behaviors. At present, smartphone users are more worried about malware and data leakage than targeted information theft. Research limitations/implications: - Threats and counter-measures co-evolve over time, and our findings, which describe the state of smartphone security at the current time, will need to be updated in the future. Practical implications: - Measures to improve security practices of smartphone users are needed urgently. The findings indicate that such measures should be broadly effective and relatively costless for users to implement. Social implications: - Personal smartphones are joining enterprise networks through the acceptance of Bring-Your-Own-Device computing. Users' laxity about smartphone security thus puts organizations at risk. Originality/value:- The paper highlights the key factors infuencing smartphone security and compares the situation for the three leading operating systems in the smartphone market. Emerald Group Publishing Limited.

    DOI/handle
    http://dx.doi.org/10.1108/ICS-04-2015-0018
    http://hdl.handle.net/10576/18109
    Collections
    • Accounting & Information Systems [‎129 ‎ items ]

    entitlement


    QSpace is a digital collection operated and maintained by the Qatar University Library and supported by the ITS department

    Contact Us | Send Feedback
    Contact Us | Send Feedback | QU

     

     

    Home

    Submit your QU affiliated work

    Browse

    All of QSpace
      Communities & Collections Publication Date Author Title Subject Type Language
    This Collection
      Publication Date Author Title Subject Type Language

    My Account

    Login

    Statistics

    View Usage Statistics

    About QSpace

    Vision & Mission QSpace policies

    Help

    Item Submission Publisher policiesUser guides FAQs

    QSpace is a digital collection operated and maintained by the Qatar University Library and supported by the ITS department

    Contact Us | Send Feedback
    Contact Us | Send Feedback | QU

     

     

    Video