Understanding the asymmetric perceptions of smartphone security from security feature perspective: A comparative study

被引:17
作者
Xiao, Quan [1 ]
机构
[1] Jiangxi Univ Finance & Econ, Sch Informat Management, Nanchang 330032, Jiangxi, Peoples R China
基金
中国国家自然科学基金; 中国博士后科学基金;
关键词
Smartphone security; Security feature; Developer and user; Android vs iOS; Gender difference; Kano model; KANO MODEL; CUSTOMER SATISFACTION; QUALITY ATTRIBUTES; MANAGEMENT; TECHNOLOGY; FRAMEWORK; ATTACKS; SYSTEMS; SERVICE; USERS;
D O I
10.1016/j.tele.2020.101535
中图分类号
G25 [图书馆学、图书馆事业]; G35 [情报学、情报工作];
学科分类号
1205 ; 120501 ;
摘要
Smartphones are being used and relied on by people more than ever before. The open connectivity brings with it great convenience and leads to a variety of risks that cannot be overlooked. Smartphone vendors, security policy designers, and security application providers have put a variety of practical efforts to secure smartphones, and researchers have conducted extensive research on threat sources, security techniques, and user security behaviors. Regrettably, smartphone users do not pay enough attention to mobile security, making many efforts futile. This study identifies this gap between technology affordance and user requirements, and attempts to investigate the asymmetric perceptions toward security features between developers and users, between users and users, as well as between different security features. These asymmetric perceptions include perceptions of quality, perceptions of importance, and perceptions of satisfaction. After scoping the range of smartphone security features, this study conducts an improved Kano-based method and exhaustively analyzes the 245 collected samples using correspondence analysis and importance satisfaction analysis. The 14 security features of the smartphone are divided into four Kano quality types and the perceived quality differences between developers and users are compared. Correspondence analysis is utilized to capture the relationship between the perceived importance of security features across different groups of respondents, and results of importance-satisfaction analysis provide the basis for the developmental path and resource reallocation strategy of security features. This article offers new insights for researchers as well as practitioners of smartphone security.
引用
收藏
页数:19
相关论文
共 81 条
  • [1] Ahmad R, 2013, ASIA-PAC MANAG ACCOU, V8, P1
  • [2] Alani Mohammed M., 2017, International Journal of Interactive Mobile Technologies, V11, P130, DOI 10.3991/ijim.v11i3.6605
  • [3] An overview of smartphone technology for citizen-centered, real-time and scalable civil infrastructure monitoring
    Alavi, Amir H.
    Buttlar, William G.
    [J]. FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2019, 93 : 651 - 672
  • [4] Intelligent mobile malware detection using permission requests and API calls
    Alazab, Moutaz
    Alazab, Mamoun
    Shalaginov, Andrii
    Mesleh, Abdelwadood
    Awajan, Albara
    [J]. FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2020, 107 : 509 - 521
  • [5] Employees' behavioural intention to smartphone security: A gender-based, cross-national study
    Ameen, Nisreen
    Tarhini, Ali
    Shah, Mahmood Hussain
    Madichie, Nnamdi O.
    [J]. COMPUTERS IN HUMAN BEHAVIOR, 2020, 104
  • [6] [Anonymous], 2015, P USEC
  • [7] [Anonymous], 2012, BUSINESS EXCELLENCE, DOI DOI 10.1080/14783363.2011.637811
  • [8] Quality, satisfaction and behavioral intentions
    Baker, DA
    Crompton, JL
    [J]. ANNALS OF TOURISM RESEARCH, 2000, 27 (03) : 785 - 804
  • [9] Berger C., 1993, CTR QUALITY MANAGEME
  • [10] Bonnington C., 2015, LESS 2 YEARS SMARTPH