IDEAS home Printed from https://ideas.repec.org/a/spr/infsem/v14y2016i4d10.1007_s10257-015-0302-7.html
   My bibliography  Save this article

Users’ perceptions about mobile security breaches

Author

Listed:
  • Emmanouil Stiakakis

    (University of Macedonia)

  • Christos K. Georgiadis

    (University of Macedonia)

  • Anna Andronoudi

    (University of Exeter)

Abstract

Apart from the technological perspective of security in mobile devices and applications, the economic perspective has been increasingly attracting the academic and business interest. This paper aims to investigate the perceptions of mobile users about the economic importance of security breaches. Instead of considering mobile users as a whole, they were examined as distinct user types based on Brandtzæg’s mobile user typology. These types are: (1) sporadic users, (2) socializers, (3) entertainment type users, (4) instrumental users, and (5) advanced users. In the context of the research part of this study, a survey was conducted in a sample of smartphone and tablet owners. The five user types were identified in our sample by setting specific classification rules, based on the frequency and the variety of mobile services used. Mobile users’ perceptions were assessed in terms of ten different kinds of security breaches. The findings indicated that the user types perceive differently the economic importance of security breaches, implying that the design of security policies and/or the development of tools totally for the community of users are not the appropriate practices. Our research could contribute to the knowledge considering mobile users and their perceptions about security breaches. Mobile content providers and developers could use the findings of this study to evaluate and redesign, if needed, their current strategies so as to meet users’ needs regarding security.

Suggested Citation

  • Emmanouil Stiakakis & Christos K. Georgiadis & Anna Andronoudi, 2016. "Users’ perceptions about mobile security breaches," Information Systems and e-Business Management, Springer, vol. 14(4), pages 857-882, November.
  • Handle: RePEc:spr:infsem:v:14:y:2016:i:4:d:10.1007_s10257-015-0302-7
    DOI: 10.1007/s10257-015-0302-7
    as

    Download full text from publisher

    File URL: http://link.springer.com/10.1007/s10257-015-0302-7
    File Function: Abstract
    Download Restriction: Access to the full text of the articles in this series is restricted.

    File URL: https://libkey.io/10.1007/s10257-015-0302-7?utm_source=ideas
    LibKey link: if access is restricted and if your library uses this service, LibKey will redirect you to where you can use your library subscription to access this item
    ---><---

    As the access to this document is restricted, you may want to search for a different version of it.

    References listed on IDEAS

    as
    1. Paul POCATILU, 2011. "Android Applications Security," Informatica Economica, Academy of Economic Studies - Bucharest, Romania, vol. 15(3), pages 163-171.
    Full references (including those not matched with items on IDEAS)

    Most related items

    These are the items that most often cite the same works as this one and are cited by the same works as this one.

      Corrections

      All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:spr:infsem:v:14:y:2016:i:4:d:10.1007_s10257-015-0302-7. See general information about how to correct material in RePEc.

      If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

      If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .

      If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

      For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Sonal Shukla or Springer Nature Abstracting and Indexing (email available below). General contact details of provider: http://www.springer.com .

      Please note that corrections may take a couple of weeks to filter through the various RePEc services.

      IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.