{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,30]],"date-time":"2026-01-30T04:24:14Z","timestamp":1769747054971,"version":"3.49.0"},"reference-count":40,"publisher":"Emerald","issue":"6","license":[{"start":{"date-parts":[[2017,11,6]],"date-time":"2017-11-06T00:00:00Z","timestamp":1509926400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.emerald.com\/insight\/site-policies"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["EL"],"published-print":{"date-parts":[[2017,11,6]]},"abstract":"<jats:sec>\n<jats:title content-type=\"abstract-subheading\">Purpose<\/jats:title>\n<jats:p>Understanding user behavior is increasingly critical for information security in the use of smartphones. There is, however, lack of empirical studies about the behavior of smartphone users for information security in China. The purpose of this paper is to present an empirical analysis of the behavior of smartphone users in China in relation to information security.<\/jats:p>\n<\/jats:sec>\n<jats:sec>\n<jats:title content-type=\"abstract-subheading\">Design\/methodology\/approach<\/jats:title>\n<jats:p>A review of the related literature is conducted, leading to the development of a questionnaire for investigating the behavior of smartphone users. An online survey of the smartphone users in China is conducted. The collected data are analyzed with the use of descriptive analysis and Pearson\u2019s chi-square test to better understand the behavior of smartphone users on information security.<\/jats:p>\n<\/jats:sec>\n<jats:sec>\n<jats:title content-type=\"abstract-subheading\">Findings<\/jats:title>\n<jats:p>The paper shows that there are serious concerns about information security in the use of smartphones in China including the ignorance of security information in downloading and using applications, inadequate phone settings, inappropriate enabling of add-on utilities and lack of proper disaster recovery plans. The study also reveals that there is a significant difference between different groups of users on information security in smartphone use.<\/jats:p>\n<\/jats:sec>\n<jats:sec>\n<jats:title content-type=\"abstract-subheading\">Research limitations\/implications<\/jats:title>\n<jats:p>This paper is based on a purposeful sample of smartphone users in China. It is exploratory in nature.<\/jats:p>\n<\/jats:sec>\n<jats:sec>\n<jats:title content-type=\"abstract-subheading\">Practical implications<\/jats:title>\n<jats:p>The paper can lead to a better understanding of the behavior of smartphone users and information security in China and provide relevant government departments and institutions with useful information for developing appropriate strategies and policies and designing specific training programs to improve information security in the smartphone use.<\/jats:p>\n<\/jats:sec>\n<jats:sec>\n<jats:title content-type=\"abstract-subheading\">Originality\/value<\/jats:title>\n<jats:p>This paper is the first of this kind to collect quantitative data from users in China for better understanding the behavior of smartphone users on information security. It provides insight towards the adoption of various measures for information security from the perspective of smartphone users in China.<\/jats:p>\n<\/jats:sec>","DOI":"10.1108\/el-09-2016-0183","type":"journal-article","created":{"date-parts":[[2017,10,24]],"date-time":"2017-10-24T07:11:27Z","timestamp":1508829087000},"page":"1177-1190","source":"Crossref","is-referenced-by-count":20,"title":["Information security behaviors of smartphone users in China: an empirical analysis"],"prefix":"10.1108","volume":"35","author":[{"given":"Xiao Juan","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Zhenzhen","family":"Li","sequence":"additional","affiliation":[]},{"given":"Hepu","family":"Deng","sequence":"additional","affiliation":[]}],"member":"140","reference":[{"key":"key2020120419394755800_ref001","article-title":"Investigating the impact of institutional pressures on information security compliance in organizations","volume-title":"Proceedings of the 27th Australasian Conference on Information Systems","year":"2016"},{"key":"key2020120419394755800_ref002","article-title":"Organizational security culture and information security compliance for e-government development: the moderating effect of social pressure","volume-title":"Proceedings of the 19th Pacific Asia Conference on Information Systems","year":"2015"},{"key":"key2020120419394755800_ref003","unstructured":"Baker, P. (2011), \u201cTop ten smartphone security tips\u201d, available at: www.cioupdate.com\/trends\/article.php\/3924241\/Top-10-Smartphone-Security-Tips.htm (accessed 4 March 2016)."},{"issue":"4","key":"key2020120419394755800_ref004","doi-asserted-by":"crossref","first-page":"1307","DOI":"10.5194\/nhess-9-1307-2009","article-title":"The use of questionnaires for acquiring information on public perception of natural hazards and risk mitigation: a review of current knowledge and practice","volume":"9","year":"2009","journal-title":"Natural Hazards and Earth System Science"},{"issue":"3\/4","key":"key2020120419394755800_ref005","first-page":"130","article-title":"From desktop to mobile: examining the security experience","volume":"28","year":"2009","journal-title":"Computers and Security"},{"issue":"12","key":"key2020120419394755800_ref006","first-page":"74","article-title":"Smartphone information security problems in the mobile internet times and countermeasures analysis","year":"2012","journal-title":"Netinfo Security"},{"key":"key2020120419394755800_ref007","doi-asserted-by":"crossref","first-page":"81","DOI":"10.1007\/978-1-4899-7439-6_6","article-title":"A conceptual interdisciplinary plug-and-play cyber security framework","volume-title":"ICTs and the Millennium Development Goals","year":"2014"},{"issue":"1","key":"key2020120419394755800_ref008","doi-asserted-by":"crossref","first-page":"116","DOI":"10.1108\/ICS-04-2015-0018","article-title":"Security behaviours of smartphone users","volume":"24","year":"2016","journal-title":"Information and Computer Security"},{"key":"key2020120419394755800_ref009","unstructured":"Esmaeili, M. (2014), \u201cAssessment of users\u2019 information security behavior in smartphone networks\u201d, Doctoral dissertation, Eastern Michigan University, Ypsilanti, MI."},{"key":"key2020120419394755800_ref010","unstructured":"European Network and Information Security Agency (ENISA) (2010), Smartphone Security: Information Security Risks, Opportunities and Recommendations for Users, available at: www.enisa.europa.eu\/publications\/smartphones-information-security-risks-opportunities-and-recommendations-for-users (accessed 24 March 2016)."},{"key":"key2020120419394755800_ref011","first-page":"325","article-title":"A study of challenges and solutions for smart phone security","volume-title":"Emerging Research in Computing, Information, Communication and Applications","year":"2015"},{"issue":"1","key":"key2020120419394755800_ref012","doi-asserted-by":"crossref","first-page":"97","DOI":"10.1108\/IMCS-03-2013-0019","article-title":"Mobile device security considerations for small- and medium-sized enterprise business mobility","volume":"22","year":"2014","journal-title":"Information Management and Computer Security"},{"issue":"4","key":"key2020120419394755800_ref013","first-page":"186","article-title":"Comparing the mobile device security behavior of college students and information technology professionals","volume":"10","year":"2015","journal-title":"Journal of Information Privacy and Security"},{"issue":"4","key":"key2020120419394755800_ref014","doi-asserted-by":"crossref","first-page":"651","DOI":"10.1108\/EL-07-2015-0112","article-title":"Academic use of smartphones by university students: a developing country perspective","volume":"34","year":"2016","journal-title":"The Electronic Library"},{"key":"key2020120419394755800_ref015","unstructured":"IC3 (2012), Smartphone Users Should Be Aware of Malware Targeting Mobile Devices and Safety Measures to Help Avoid Compromise, available at: www.ic3.gov\/media\/2012\/121012.aspx (accessed 25 March 2016)."},{"issue":"12","key":"key2020120419394755800_ref016","doi-asserted-by":"crossref","first-page":"1347","DOI":"10.1080\/0144929X.2014.934286","article-title":"Always connected, but are smart mobile users getting more security savvy? A survey of smart mobile device users","volume":"33","year":"2014","journal-title":"Behaviour and Information Technology"},{"key":"key2020120419394755800_ref017","first-page":"311","article-title":"A practical analysis of smartphone security","volume-title":"Human Interface and the Management of Information: Interacting with Information","year":"2011"},{"issue":"5","key":"key2020120419394755800_ref018","doi-asserted-by":"crossref","first-page":"561","DOI":"10.1016\/j.ijinfomgt.2015.06.003","article-title":"On the efficacy of smartphone security: a critical analysis of modifications in business students\u2019 practices over time","volume":"35","year":"2015","journal-title":"International Journal of Information Management"},{"issue":"6","key":"key2020120419394755800_ref019","first-page":"73","article-title":"Risky business: students and smartphones","volume":"58","year":"2014","journal-title":"Techtrends Linking Research & Practice to Improve Learning"},{"issue":"2","key":"key2020120419394755800_ref020","first-page":"22","article-title":"Do business students practice smartphone security?","volume":"53","year":"2012","journal-title":"Journal of Computer Information Systems"},{"key":"key2020120419394755800_ref021","volume-title":"Glossary of Key Information Security Terms","year":"2013"},{"issue":"1","key":"key2020120419394755800_ref022","doi-asserted-by":"crossref","first-page":"446","DOI":"10.1109\/SURV.2012.013012.00028","article-title":"A survey on security for mobile devices","volume":"15","year":"2013","journal-title":"IEEE Communications Surveys and Tutorials"},{"key":"key2020120419394755800_ref023","first-page":"289","article-title":"Smartphone: security and privacy protection","volume-title":"Joint International Conference on Pervasive Computing and the Networked World","year":"2014"},{"key":"key2020120419394755800_ref024","first-page":"25","article-title":"Smartphone security evaluation: the malware attack case","volume-title":"Proceeding of the International Conference on Security and Cryptography","year":"2011"},{"key":"key2020120419394755800_ref025","doi-asserted-by":"crossref","first-page":"47","DOI":"10.1016\/j.cose.2012.11.004","article-title":"Delegate the smartphone user? Security awareness in smartphone platforms","volume":"34","year":"2013","journal-title":"Computers and Security"},{"issue":"4","key":"key2020120419394755800_ref026","doi-asserted-by":"crossref","first-page":"815","DOI":"10.1016\/j.dss.2008.11.010","article-title":"Studying users\u2019 computer security behavior: a health belief perspective","volume":"46","year":"2009","journal-title":"Decision Support Systems"},{"issue":"4","key":"key2020120419394755800_ref027","doi-asserted-by":"crossref","first-page":"406","DOI":"10.1108\/ICS-10-2014-0072","article-title":"Exploring the relationship between student mobile information security awareness and behavioral intent","volume":"23","year":"2015","journal-title":"Information and Computer Security"},{"key":"key2020120419394755800_ref028","first-page":"1","article-title":"Exploring end-user smartphone security awareness within a South African context","volume-title":"Proceedings of the Conference on Information Security for South Africa, IEEE","year":"2014"},{"issue":"3","key":"key2020120419394755800_ref029","doi-asserted-by":"crossref","first-page":"321","DOI":"10.1007\/s10660-014-9146-3","article-title":"An enhanced smartphone security model based on information security management system (ISMS)","volume":"14","year":"2014","journal-title":"Electronic Commerce Research"},{"issue":"8","key":"key2020120419394755800_ref030","doi-asserted-by":"crossref","first-page":"816","DOI":"10.1016\/j.cose.2009.05.008","article-title":"Self-efficacy in information security: its influence on end users\u2019 information security practice behavior","volume":"28","year":"2009","journal-title":"Computers and Security"},{"key":"key2020120419394755800_ref031","article-title":"A concept of information security management for higher education","volume-title":"Proceedings of the 3rd International Conference on Technology and Operation Management, Bandung","year":"2012"},{"key":"key2020120419394755800_ref032","first-page":"320","article-title":"Individual information security, user behavior and cyber victimisation: an empirical study of social networking users","volume":"102","year":"2015","journal-title":"Technological Forecasting and Social Change"},{"issue":"3","key":"key2020120419394755800_ref033","doi-asserted-by":"crossref","first-page":"1","DOI":"10.4018\/IJSSOE.2016070101","article-title":"Exploring the impact of learning styles on the acceptance of open learner models in collaborative learning","volume":"6","year":"2016","journal-title":"International Journal of Systems and Service-Oriented Engineering"},{"key":"key2020120419394755800_ref034","doi-asserted-by":"crossref","unstructured":"Souppaya, M. and Scarfone, K. (2013), Guidelines for Managing the Security of Mobile Devices in the Enterprise, available at: http:\/\/nvlpubs.nist.gov\/nistpubs\/specialpublications\/nist.sp.800-124r1.pdf (accessed 8 January 2016).","DOI":"10.6028\/NIST.SP.800-124r1"},{"issue":"12","key":"key2020120419394755800_ref035","doi-asserted-by":"crossref","first-page":"52","DOI":"10.1109\/MC.2012.288","article-title":"Smartphone security challenges","volume":"45","year":"2012","journal-title":"Computer"},{"key":"key2020120419394755800_ref036","first-page":"pp. 50","article-title":"Discussion on information security of smartphone","volume":"11","year":"2015","journal-title":"Science Mosaic"},{"key":"key2020120419394755800_ref037","unstructured":"Worgotter, N. (2012), \u201cMeasurement model to assess market-driving ability in corporate entrepreneurship\u201d, Doctoral dissertation, University of Pretoria, Pretoria."},{"issue":"12","key":"key2020120419394755800_ref038","first-page":"1122","article-title":"Research on information security risk and protection measures of smart phone","volume":"2","year":"2016","journal-title":"Journal of Information Security Research"},{"key":"key2020120419394755800_ref039","unstructured":"Xinhua.net (2016), The Number of Chinese Mobile Phone Users is Up to 780 Million, available at: http:\/\/news.xinhuanet.com\/politics\/2016-05\/19\/c_128995231.htm (accessed 6 February 2017)."},{"issue":"2","key":"key2020120419394755800_ref040","doi-asserted-by":"crossref","first-page":"239","DOI":"10.1016\/j.giq.2010.05.010","article-title":"Securing e-government and e-voting with an open cloud computing architecture","volume":"28","year":"2011","journal-title":"Government Information Quarterly"}],"container-title":["The Electronic Library"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/EL-09-2016-0183\/full\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/EL-09-2016-0183\/full\/html","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,25]],"date-time":"2025-07-25T01:08:00Z","timestamp":1753405680000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.emerald.com\/el\/article\/35\/6\/1177-1190\/82969"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,11,6]]},"references-count":40,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2017,11,6]]}},"alternative-id":["10.1108\/EL-09-2016-0183"],"URL":"https:\/\/doi.org\/10.1108\/el-09-2016-0183","relation":{},"ISSN":["0264-0473"],"issn-type":[{"value":"0264-0473","type":"print"}],"subject":[],"published":{"date-parts":[[2017,11,6]]}}}