Users’ perceptions about mobile security breaches
Emmanouil Stiakakis (),
Christos K. Georgiadis () and
Anna Andronoudi ()
Additional contact information
Emmanouil Stiakakis: University of Macedonia
Christos K. Georgiadis: University of Macedonia
Anna Andronoudi: University of Exeter
Information Systems and e-Business Management, 2016, vol. 14, issue 4, No 7, 857-882
Abstract:
Abstract Apart from the technological perspective of security in mobile devices and applications, the economic perspective has been increasingly attracting the academic and business interest. This paper aims to investigate the perceptions of mobile users about the economic importance of security breaches. Instead of considering mobile users as a whole, they were examined as distinct user types based on Brandtzæg’s mobile user typology. These types are: (1) sporadic users, (2) socializers, (3) entertainment type users, (4) instrumental users, and (5) advanced users. In the context of the research part of this study, a survey was conducted in a sample of smartphone and tablet owners. The five user types were identified in our sample by setting specific classification rules, based on the frequency and the variety of mobile services used. Mobile users’ perceptions were assessed in terms of ten different kinds of security breaches. The findings indicated that the user types perceive differently the economic importance of security breaches, implying that the design of security policies and/or the development of tools totally for the community of users are not the appropriate practices. Our research could contribute to the knowledge considering mobile users and their perceptions about security breaches. Mobile content providers and developers could use the findings of this study to evaluate and redesign, if needed, their current strategies so as to meet users’ needs regarding security.
Keywords: Mobile security economics; Mobile security; Mobile security breaches; Mobile user typology; Mobile user perceptions; Mobile Internet (search for similar items in EconPapers)
Date: 2016
References: View references in EconPapers View complete reference list from CitEc
Citations:
Downloads: (external link)
http://link.springer.com/10.1007/s10257-015-0302-7 Abstract (text/html)
Access to the full text of the articles in this series is restricted.
Related works:
This item may be available elsewhere in EconPapers: Search for items with the same title.
Export reference: BibTeX
RIS (EndNote, ProCite, RefMan)
HTML/Text
Persistent link: https://EconPapers.repec.org/RePEc:spr:infsem:v:14:y:2016:i:4:d:10.1007_s10257-015-0302-7
Ordering information: This journal article can be ordered from
http://www.springer. ... ystems/journal/10257
DOI: 10.1007/s10257-015-0302-7
Access Statistics for this article
Information Systems and e-Business Management is currently edited by Jörg Becker and Michael J. Shaw
More articles in Information Systems and e-Business Management from Springer
Bibliographic data for series maintained by Sonal Shukla () and Springer Nature Abstracting and Indexing ().