首页 | 官方网站   微博 | 高级检索  
     


Understanding the asymmetric perceptions of smartphone security from security feature perspective: A comparative study
Affiliation:1. Department of Information Engineering & Computer Science (DISI), University of Trento, Italy;2. Department of Information Security, KFUEIT, Rahim Yar Khan, Pakistan;3. Department of Computer Science, imec-DistriNet, KULeuven, Belgium;4. Department of Mathematics, University of Padua, Italy;1. Department Business Administration, Escuela Técnica Superior de Ingenieros Industriales, Universidad Politécnica de Madrid C/José Gutiérrez Abascal 2, Madrid 28006, Spain;2. Department of Electronic Engineering, Intelligent Data Analysis Laboratory (IDAL), University of Valencia, Av de la Universidad, s/n, Burjassot, Valencia 46100, Spain;3. Faculty of Economics and Business Administration, Department Business Organization, University of Open Learning (UNED), Paseo Senda del Rey 11, Madrid 28040, Spain
Abstract:Smartphones are being used and relied on by people more than ever before. The open connectivity brings with it great convenience and leads to a variety of risks that cannot be overlooked. Smartphone vendors, security policy designers, and security application providers have put a variety of practical efforts to secure smartphones, and researchers have conducted extensive research on threat sources, security techniques, and user security behaviors. Regrettably, smartphone users do not pay enough attention to mobile security, making many efforts futile. This study identifies this gap between technology affordance and user requirements, and attempts to investigate the asymmetric perceptions toward security features between developers and users, between users and users, as well as between different security features. These asymmetric perceptions include perceptions of quality, perceptions of importance, and perceptions of satisfaction. After scoping the range of smartphone security features, this study conducts an improved Kano-based method and exhaustively analyzes the 245 collected samples using correspondence analysis and importance satisfaction analysis. The 14 security features of the smartphone are divided into four Kano quality types and the perceived quality differences between developers and users are compared. Correspondence analysis is utilized to capture the relationship between the perceived importance of security features across different groups of respondents, and results of importance-satisfaction analysis provide the basis for the developmental path and resource reallocation strategy of security features. This article offers new insights for researchers as well as practitioners of smartphone security.
Keywords:Smartphone security  Security feature  Developer and user  Android vs iOS  Gender difference  Kano model
本文献已被 ScienceDirect 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号