Why do people adopt, or reject, smartphone security tools?

N. Alkaldi, K. Renaud, Nathan L. Clarke (Editor), Steven M. Furnell (Editor)

Research output: Contribution to conferencePaperpeer-review

3 Citations (Scopus)
26 Downloads (Pure)

Abstract

A large variety of security tools exist for Smartphones, to help their owners to secure the phones and prevent unauthorised others from accessing their data and services. These range from screen locks to antivirus software to password managers. Yet many Smartphone owners do not use these tools despite their being free and easy to use. We were interested in exploring this apparent anomaly. A number of researchers have applied existing models of behaviour from other disciplines to try to understand these kinds of behaviours in a security context, and a great deal of research has examined adoption of screen locking mechanisms. We review the proposed models and consider how they might fail to describe adoption behaviours. We then present the Integrated Model of Behaviour Prediction (IMBP), a richer model than the ones tested thus far. We consider the kinds of factors that could be incorporated into this model in order to understand Smartphone owner adoption, or rejection, of security tools. The model seems promising, based on existing literature, and we plan to test its efficacy in future studies.
Original languageEnglish
Pages135-144
Number of pages10
Publication statusPublished - 12 Jul 2016
Event10th International Symposium on Human Aspects of Information Security and Assurance, HAISA 2016 - Frankfurt, Germany
Duration: 19 Jul 201621 Jul 2016

Conference

Conference10th International Symposium on Human Aspects of Information Security and Assurance, HAISA 2016
Abbreviated titleHAISA 2016
Country/TerritoryGermany
CityFrankfurt
Period19/07/1621/07/16

Keywords

  • smartphone security
  • models of behavour
  • Integrated Model of Behaviour Prediction
  • security tool adoption

Fingerprint

Dive into the research topics of 'Why do people adopt, or reject, smartphone security tools?'. Together they form a unique fingerprint.

Cite this