{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,30]],"date-time":"2026-04-30T00:12:15Z","timestamp":1777507935081,"version":"3.51.4"},"reference-count":89,"publisher":"Emerald","issue":"2","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020,6,8]]},"abstract":"<jats:sec>\n                  <jats:title>Purpose<\/jats:title>\n                  <jats:p>For a good number of Indians, their smartphone is their first digital computing device. They have less experience in dealing with the Internet-enabled device and hence less experience in handling security threats like malware as compared to users of other countries who have gone through the learning curve of handling such security threats using other Internet-enabled devices such as laptop and desktop. Because of this, the inexperienced Indian smartphone user may be vulnerable to Internet-related security breaches, as compared to the citizens of developed economies. Hence, it is essential to understand the attitude, behaviour and security practices of smartphone users in India. Limited research is available about the security behaviour of smartphone users in India as the majority of research in this domain is done outside India.<\/jats:p>\n               <\/jats:sec>\n               <jats:sec>\n                  <jats:title>Design\/methodology\/approach<\/jats:title>\n                  <jats:p>In this empirical study, the researchers identified 28 cybersecurity behaviours and practices through a survey of relevant literature. An online survey of identified cybersecurity behaviours and practices was administered to 300 smartphone users. Frequency analysis of the respondent data was done to understand the adoption of recommended cybersecurity behaviours and practices. Pearson\u2019s chi-square with 5% level of significance has been used to test the hypotheses. Post hoc analysis with Bonferroni correction was conducted for statistically significant associations.<\/jats:p>\n               <\/jats:sec>\n               <jats:sec>\n                  <jats:title>Findings<\/jats:title>\n                  <jats:p>Overall, the respondents did not exhibit good cybersecurity behaviour. Respondents have adopted some of the most popular security features of the smartphone such as the use of screen lock. However, respondents have not adopted or are not aware of the technical security controls such as encryption and remote wipe. Statistically significant differences were found between the cybersecurity behaviour and practices and independent variables such as gender, age, mobile operating system (OS) and mother tongue. Respondents reported high level of motivation to protect their device and data, whereas they reported moderate level of threat awareness and the ability to protect to their device and data. Results of the comparative analysis with a similar study in China and the USA are also reported in this study.<\/jats:p>\n               <\/jats:sec>\n               <jats:sec>\n                  <jats:title>Research limitations\/implications<\/jats:title>\n                  <jats:p>The main limitations of this study are as follows: the respondents' perceptions about their cybersecurity behaviours and practices were measured as opposed to their actual behaviours and practices and the generalizability of the study is limited because the sample size is small as compared to the total number of smartphone users in India.<\/jats:p>\n               <\/jats:sec>\n               <jats:sec>\n                  <jats:title>Practical implications<\/jats:title>\n                  <jats:p>The findings of this study may be useful for the design of effective cybersecurity prevention and intervention programs for general smartphone users of India.<\/jats:p>\n               <\/jats:sec>\n               <jats:sec>\n                  <jats:title>Originality\/value<\/jats:title>\n                  <jats:p>This study provides an insight about cybersecurity behaviour of smartphone users in India. To the knowledge of the researchers, this is the first study to collect such quantitative data of smartphone users in India for a better understanding of the cybersecurity behaviours and practices. This study identified 28 cybersecurity behaviours and practices, which smartphone users should follow to improve cybersecurity.<\/jats:p>\n               <\/jats:sec>","DOI":"10.1108\/ics-04-2019-0041","type":"journal-article","created":{"date-parts":[[2020,1,20]],"date-time":"2020-01-20T09:40:25Z","timestamp":1579513225000},"page":"293-318","source":"Crossref","is-referenced-by-count":35,"title":["Cybersecurity behaviour of smartphone users in India: an empirical analysis"],"prefix":"10.1108","volume":"28","author":[{"given":"Pintu","family":"Shah","sequence":"first","affiliation":[{"name":"SVKM\u2019s NMIMS Mukesh Patel School of Technology Management and Engineering , Mumbai,","place":["India"]}]},{"given":"Anuja","family":"Agarwal","sequence":"additional","affiliation":[{"name":"SVKM\u2019s NMIMS Mukesh Patel School of Technology Management and Engineering , Mumbai,","place":["India"]}]}],"member":"140","published-online":{"date-parts":[[2020,1,2]]},"reference":[{"key":"2025081309504647600_ref001","volume-title":"A Review of the Compliance Behaviour Studies in Information Systems Security Field: current Trends and Future Directions","author":"Abed","year":"2016"},{"key":"2025081309504647600_ref002","volume-title":"India Connected: How the Smartphone is Transforming the World's Largest Democracy","author":"Agrawal","year":"2018"},{"key":"2025081309504647600_ref003","first-page":"136","article-title":"The young and the restless of mobile phone security (how security awareness and feeling lessen with age in students)","author":"Androulidakis","year":"2013"},{"key":"2025081309504647600_ref004","unstructured":"ANZMTG (2018), \u201cPower calculator \u2013 chitest\u201d, [Online], available at: www.anzmtg.org\/stats\/PowerCalculator\/PowerChiSquare"},{"key":"2025081309504647600_ref005","doi-asserted-by":"crossref","first-page":"304","DOI":"10.1016\/j.chb.2014.05.046","article-title":"Security awareness of computer users: a phishing threat avoidance perspective","volume":"38","author":"Arachchilage","year":"2014","journal-title":"Computers in Human Behavior"},{"key":"2025081309504647600_ref006","doi-asserted-by":"crossref","first-page":"266","DOI":"10.1016\/j.cose.2017.10.015","article-title":"Taxonomy of mobile users\u2019 security awareness","author":"Bitton","year":"2018","journal-title":"Computers and Security"},{"key":"2025081309504647600_ref007","doi-asserted-by":"crossref","DOI":"10.2139\/ssrn.2479938","article-title":"A new privacy paradox: young people and privacy on social network sites","author":"Blank","year":"2014","journal-title":"SSRN Electronic Journal"},{"key":"2025081309504647600_ref008","doi-asserted-by":"crossref","first-page":"62","DOI":"10.1016\/j.jebo.2018.03.011","article-title":"Culture and financial literacy: evidence from a within-country language border","volume":"150","author":"Brown","year":"2018","journal-title":"Journal of Economic Behavior and Organization"},{"key":"2025081309504647600_ref009","unstructured":"CERT-In (2018), \u201cAnnual report (2017)\u201d, New Delhi: Ministry of Electronics and Information Technology, Government of India."},{"key":"2025081309504647600_ref010","unstructured":"Cert-In (2018), \u201cMobile_phone_security.pdf\u201d, [Online], available at: www.cert-in.org.in\/PDF\/Mobile_phone_Security.pdf (accessed 16 October 2018)."},{"key":"2025081309504647600_ref011","doi-asserted-by":"crossref","first-page":"50","DOI":"10.1016\/j.jebo.2011.06.007","article-title":"Strong evidence for gender differences in risk taking","author":"Charness","year":"2012","journal-title":"Journal of Economic Behavior and Organization"},{"key":"2025081309504647600_ref012","volume-title":"An Investigation of Decision Making and the Tradeoffs Involving Computer Security Risks","author":"Chen","year":"2009"},{"key":"2025081309504647600_ref013","doi-asserted-by":"crossref","DOI":"10.1145\/2335356.2335358","volume-title":"Measuring User Confidence in Smartphone Security and Privacy","author":"Chin","year":"2012"},{"key":"2025081309504647600_ref014","unstructured":"Chipurici, C.\n           (2017), \u201cSmartphone security guide\u201d, [Online], available at: https:\/\/heimdalsecurity.com\/blog\/smartphone-security-guide-keep-your-phone-data-safe\/ (accessed 16 October 2018)."},{"issue":"3","key":"2025081309504647600_ref015","doi-asserted-by":"crossref","first-page":"790","DOI":"10.1093\/poq\/nfv027","article-title":"Do attempts to improve respondent attention increase social desirability bias?","volume":"79","author":"Clifford","year":"2015","journal-title":"Public Opinion Quarterly"},{"key":"2025081309504647600_ref016","volume-title":"Statistical Power Analysis for the Behavioural Science","author":"Cohen","year":"1988"},{"issue":"5","key":"2025081309504647600_ref017","doi-asserted-by":"crossref","first-page":"320","DOI":"10.1111\/j.1365-2729.2006.00185.x","article-title":"The digital divide: the special case of gender","volume":"22","author":"Cooper","year":"2006","journal-title":"Journal of Computer Assisted Learning"},{"issue":"1","key":"2025081309504647600_ref018","doi-asserted-by":"crossref","first-page":"116","DOI":"10.1108\/ICS-04-2015-0018","article-title":"Security behaviors of smartphone users","volume":"24","author":"Das","year":"2016","journal-title":"Information and Computer Security"},{"key":"2025081309504647600_ref019","doi-asserted-by":"crossref","first-page":"63","DOI":"10.1016\/j.cose.2015.10.001","article-title":"Interpreting information security culture: an organizational transformation case study","volume":"56","author":"Dhillon","year":"2016","journal-title":"Computers and Security"},{"key":"2025081309504647600_ref020","first-page":"209","volume-title":"A User Study about Security Practices of Less-Literate Smartphone Users","author":"Doke","year":"2016"},{"key":"2025081309504647600_ref021","doi-asserted-by":"crossref","first-page":"1061","DOI":"10.1016\/S1574-0722(07)00113-8","article-title":"Men, women and risk aversion: experimental evidence","volume-title":"Handbook of Experimental Economics Results","author":"Eckel","year":"2008","edition":"1st ed"},{"issue":"17","key":"2025081309504647600_ref022","doi-asserted-by":"crossref","first-page":"4667","DOI":"10.1002\/sec.1657","article-title":"Human behaviour as an aspect of cyber security assurance","volume":"9","author":"Evans","year":"2016","journal-title":"Security and Communication Networks"},{"key":"2025081309504647600_ref023","unstructured":"Experian (2016), \u201cIdentity theft\u201d, [Online], available at: www.experian.in\/identity-theft-is-the-largest-contributor-to-fraud-in-india (accessed 24 October 2018)."},{"issue":"2","key":"2025081309504647600_ref024","doi-asserted-by":"crossref","first-page":"60","DOI":"10.4018\/IJISP.2015040104","article-title":"Observations on genderwise differences among university students in information security awareness","volume":"9","author":"Farooq","year":"2015","journal-title":"International Journal of Information Security and Privacy"},{"key":"2025081309504647600_ref025","unstructured":"FCC (2015), \u201cFCC smartphone security checker\u201d, [Online], available at: www.fcc.gov\/sites\/default\/files\/smartphone_master_document.pdf (accessed 16 October 2018)."},{"key":"2025081309504647600_ref026","doi-asserted-by":"crossref","first-page":"2019","DOI":"10.1109\/COMST.2014.2321628","article-title":"Online social networks: threats and solutions","author":"Fire","year":"2014","journal-title":"IEEE Communications Surveys and Tutorials"},{"key":"2025081309504647600_ref027","first-page":"325","volume-title":"A Study of Challenges and Solutions for Smart Phone Security","author":"Gajjar","year":"2016"},{"key":"2025081309504647600_ref028","volume-title":"The Weakest Link","author":"Green","year":"2016"},{"key":"2025081309504647600_ref029","first-page":"318","volume-title":"Cultural and Psychological Factors in Cyber-Security","author":"Halevi","year":"2016"},{"key":"2025081309504647600_ref030","first-page":"4823","volume-title":"Keep on Lockin\u2019 in the Free World: A Multi-National Comparison of Smartphone Locking","author":"Harbach","year":"2016"},{"issue":"4","key":"2025081309504647600_ref031","doi-asserted-by":"crossref","first-page":"186","DOI":"10.1080\/15536548.2014.974429","article-title":"Comparing the mobile device security behavior of college students and information technology professionals","volume":"10","author":"Harris","year":"2014","journal-title":"Journal of Information Privacy and Security"},{"key":"2025081309504647600_ref032","first-page":"48","article-title":"Gender differences in risk assessment: why do women take fewer risks than men","volume-title":"Judgment and Decision Making","author":"Harris","year":"2006"},{"key":"2025081309504647600_ref033","doi-asserted-by":"crossref","first-page":"97","DOI":"10.1108\/IMCS-03-2013-0019","article-title":"Mobile device security considerations for small- and medium-sized enterprise business mobility","author":"Harris","year":"2014","journal-title":"Information Management and Computer Security"},{"issue":"2","key":"2025081309504647600_ref034","doi-asserted-by":"crossref","first-page":"106","DOI":"10.1057\/ejis.2009.6","article-title":"Protection motivation and deterrence: a framework for security policy compliance in organisations","volume":"18","author":"Herath","year":"2009","journal-title":"European Journal of Information Systems"},{"key":"2025081309504647600_ref035","unstructured":"Hofstede, G.\n           (2018), \u201cThe 6 dimensions model of national culture\u201d, [Online], available at: https:\/\/geerthofstede.com\/culture-geert-hofstede-gert-jan-hofstede\/6d-model-of-national-culture\/"},{"key":"2025081309504647600_ref036","unstructured":"Holmes, M.\n           (2013), \u201c12 Ways to protect your smartphone from cyber attacks\u201d, [Online], available at: https:\/\/smallbiztrends.com\/2013\/01\/protect-smartphone-cyber-attack.html (accessed 16 October 2018)."},{"key":"2025081309504647600_ref037","volume-title":"WILLINGNESS aND ABILITY tO PERFORM INFORMATION SECURITY Compliance Behaviour: Psychological Ownership and Self-Efficacy Perspective","author":"Huang","year":"2016"},{"key":"2025081309504647600_ref038","doi-asserted-by":"crossref","DOI":"10.1080\/0144929X.2014.934286","article-title":"Always connected, but are smart mobile users getting more security savvy? A survey of smart mobile device users","author":"Imgraben","year":"2014","journal-title":"Behaviour and Information Technology"},{"key":"2025081309504647600_ref039","volume-title":"Survey Scales a Guide to Development, Analysis, and Reporting","author":"Johnson","year":"2016"},{"issue":"5","key":"2025081309504647600_ref040","doi-asserted-by":"crossref","first-page":"561","DOI":"10.1016\/j.ijinfomgt.2015.06.003","article-title":"On the efficacy of smartphone security: a critical analysis of modification in business students' practice over time","volume":"35","author":"Jones","year":"2015","journal-title":"International Journal of Information Management"},{"key":"2025081309504647600_ref041","first-page":"22","article-title":"Do business students practice smartphone security?","author":"Jones","year":"2012","journal-title":"Journal of Computer Information Systems"},{"key":"2025081309504647600_ref042","volume-title":"Learning from \u201cShadow Security\u201d: Why Understanding Non-Compliance Provides the Basis for Effective Security","author":"Kirlappos","year":"2014"},{"key":"2025081309504647600_ref043","first-page":"1","volume-title":"An Assessment of the Role of Cultural Factors in Information Security Awareness","author":"Kruger","year":"2011"},{"key":"2025081309504647600_ref044","unstructured":"Kumar, C.\n           (2018), \u201cCyber crime\u201d, [Online], available at: https:\/\/timesofindia.indiatimes.com\/india\/one-cybercrime-in-india-every-10-minutes\/articleshow\/59707605.cms"},{"key":"2025081309504647600_ref045","first-page":"10","article-title":"Linguistics across cultures: the impact of culture on second language learning","author":"Kuo","year":"2006","journal-title":"Journal of Foreign Language Instruction"},{"issue":"2","key":"2025081309504647600_ref046","doi-asserted-by":"crossref","first-page":"140","DOI":"10.1108\/IJCTHR-02-2014-0010","article-title":"Different native languages as proxy for cultural differences in travel behaviour: insights from multilingual Switzerland","volume":"8","author":"Laesser","year":"2014","journal-title":"International Journal of Culture, Tourism and Hospitality Research"},{"key":"2025081309504647600_ref047","volume-title":"Employees' Information Security Awareness and Behavior: A Literature Review","author":"Lebek","year":"2013"},{"key":"2025081309504647600_ref048","volume-title":"A Call for Research on Home Users\u2019 Information Security Behavior","author":"Li","year":"2011"},{"issue":"5","key":"2025081309504647600_ref049","first-page":"44","article-title":"The human element: the weakest link in information security","volume":"204","author":"Lineberry","year":"2007","journal-title":"Journal of Accountancy"},{"key":"2025081309504647600_ref050","doi-asserted-by":"crossref","first-page":"84","DOI":"10.1016\/j.jisa.2014.11.001","article-title":"Safe use of mobile devices arises from knowing the threats","volume":"20","author":"Markelj","year":"2015","journal-title":"Journal of Information Security and Applications"},{"issue":"3","key":"2025081309504647600_ref051","doi-asserted-by":"crossref","DOI":"10.1145\/3130947","article-title":"Moving beyond market research: demystifying smartphone user behavior in India","volume":"1","author":"Mathur","year":"2017","journal-title":"Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies"},{"key":"2025081309504647600_ref052","unstructured":"MeitY (2018), \u201cDigital India programme\u201d, [Online], available at: http:\/\/digitalindia.gov.in\/"},{"key":"2025081309504647600_ref053","first-page":"18","volume-title":"Information Systems Security Governance Research: A Behavioral Perspective","author":"Mishra","year":"2006"},{"issue":"3","key":"2025081309504647600_ref054","doi-asserted-by":"crossref","first-page":"263","DOI":"10.1002\/ejsp.2420150303","article-title":"Methods of coping with social desirability bias: a review","volume":"15","author":"Nederhof","year":"1985","journal-title":"European Journal of Social Psychology"},{"issue":"4","key":"2025081309504647600_ref055","doi-asserted-by":"crossref","first-page":"406","DOI":"10.1108\/ICS-10-2014-0072","article-title":"Exploring the relationship between student mobile information security awareness and behavioural intent","volume":"23","author":"Ngoqo","year":"2015","journal-title":"Information and Computer Security"},{"key":"2025081309504647600_ref056","doi-asserted-by":"crossref","first-page":"476","DOI":"10.1016\/j.cose.2009.10.005","article-title":"Information security culture: a management perspective","author":"Niekerk","year":"2010","journal-title":"Computer and Security"},{"key":"2025081309504647600_ref057","unstructured":"Nokia (2018), \u201cMBIT index 2018\u201d, [Online], available at: https:\/\/networks.nokia.com\/in\/mbit-index"},{"key":"2025081309504647600_ref058","unstructured":"Norton (2018), \u201cKeep your smartphone safe when using it with connected device hub\u201d, [Online], available at: https:\/\/in.norton.com\/internetsecurity-iot-how-to-protect-your-smartphone-when-using-it-as-a-connected-device-hub.html"},{"key":"2025081309504647600_ref059","first-page":"1","volume-title":"Exploring End-User Smartphone Security Awareness within a South African Context","author":"Ophoff","year":"2014"},{"key":"2025081309504647600_ref060","doi-asserted-by":"crossref","DOI":"10.1109\/InfoSec.2015.7435513","volume-title":"Security Awareness and Adoption of Security Controls by Smartphone Users","author":"Parker","year":"2015"},{"issue":"6","key":"2025081309504647600_ref061","doi-asserted-by":"crossref","first-page":"16","DOI":"10.1145\/505532.505535","article-title":"Principles of survey research part 1: turning lemons into lemonade","volume":"26","author":"Pfleeger","year":"2001","journal-title":"ACM SIGSOFT Software Engineering Notes"},{"issue":"6","key":"2025081309504647600_ref062","doi-asserted-by":"crossref","first-page":"16","DOI":"10.1145\/505532.505535","article-title":"Principles of survey research part 1:turning lemons into lemonade","volume":"26","author":"Pfleeger","year":"2001","journal-title":"Acm Sigsoft Software Engineering Notes"},{"issue":"4","key":"2025081309504647600_ref063","doi-asserted-by":"crossref","first-page":"489","DOI":"10.1515\/jhsem-2014-0035","article-title":"From weakest link to security hero: transforming staff security behaviour","volume":"11","author":"Pfleeger","year":"2014","journal-title":"Homeland Security and Emergency Management"},{"key":"2025081309504647600_ref064","volume-title":"2018 Cost of a Data Breach Study: Global Overview","author":"Ponemon Institute","year":"2018"},{"key":"2025081309504647600_ref065","first-page":"1","article-title":"Digital natives, digital immigrants part 1","author":"Prensky","year":"2001","journal-title":"On the Horizon"},{"key":"2025081309504647600_ref066","unstructured":"RBI (2018), \u201cRBI bulletin\u201d, [Online], available at: https:\/\/rbidocs.rbi.org.in\/rdocs\/Bulletin\/PDFs\/43T10032018BD9C4CDD1050B489B94AF71C911936395.PDF"},{"key":"2025081309504647600_ref067","first-page":"817","volume-title":"Android and iOS Users' Differences concerning Security and Privacy","author":"Reinfelder","year":"2013"},{"key":"2025081309504647600_ref068","unstructured":"RSA (2018), \u201cRSA Quarterly Fraud Report\u201d, RSA, Bedford, MA."},{"key":"2025081309504647600_ref069","doi-asserted-by":"crossref","DOI":"10.1145\/3025453.3025926","volume-title":"Self-Confidence Trumps Knowledge: A Cross-Cultural Study of Security Behavior","author":"Sawaya","year":"2017"},{"key":"2025081309504647600_ref070","volume-title":"Secrets and Lies, Digital Security in a Networked World","author":"Schneier","year":"2000"},{"key":"2025081309504647600_ref071","volume-title":"In 2017, the Insider Threat Epidemic Begins","author":"Scott","year":"2017"},{"key":"2025081309504647600_ref072","first-page":"65","volume-title":"Cyber Insecure Behaviour among Smartphone Users in India: A Qualitative Analysis","author":"Shah","year":"2019"},{"key":"2025081309504647600_ref073","first-page":"1","article-title":"Your chi-square test is statistically significant: now what?","volume":"20","author":"Sharpe","year":"2015","journal-title":"Practical Assessment, Research and Evaluation"},{"key":"2025081309504647600_ref074","doi-asserted-by":"crossref","first-page":"177","DOI":"10.1016\/j.cose.2015.01.002","article-title":"Personality, attitudes, and intentions: predicting initial adoption of information security behaviour","volume":"49","author":"Shropshire","year":"2015","journal-title":"Computers and Security"},{"key":"2025081309504647600_ref075","article-title":"The theory of planned behavior and information security policy compliance","author":"Sommestad","year":"2017","journal-title":"Journal of Computer Information Systems"},{"key":"2025081309504647600_ref076","doi-asserted-by":"crossref","first-page":"124","DOI":"10.1016\/j.cose.2004.07.001","article-title":"Analysis of end user security behaviours","author":"Stanton","year":"2005","journal-title":"Computers and Security"},{"key":"2025081309504647600_ref077","unstructured":"Statistica (2018), \u201cNumber of smartphone users in India\u201d, [Online], available at: www.statista.com\/statistics\/467163\/forecast-of-smartphone-users-in-india\/"},{"key":"2025081309504647600_ref078","volume-title":"Users\u2019 Attitudes on Mobile Devices: Can Users\u2019 Practices Protect Their Sensitive Data?","author":"Stylios","year":"2016"},{"key":"2025081309504647600_ref079","volume-title":"Internet Security Threat Report Volume","author":"Symantec","year":"2018"},{"key":"2025081309504647600_ref080","doi-asserted-by":"crossref","first-page":"53","DOI":"10.5116\/ijme.4dfb.8dfd","article-title":"Making sense of Cronbach's alpha","volume":"2","author":"Tavakol","year":"2011","journal-title":"International Journal of Medical Education"},{"key":"2025081309504647600_ref081","doi-asserted-by":"crossref","first-page":"506","DOI":"10.1016\/j.im.2015.03.002","article-title":"Learning to cope with information security risks regarding mobile device loss or theft: an empirical examination","author":"Tu","year":"2015","journal-title":"Information and Management"},{"key":"2025081309504647600_ref082","unstructured":"Unuchek, R.\n           (2018), \u201cMobile malware evolution 2017\u201d, [Online], available at: https:\/\/securelist.com\/mobile-malware-review-2017\/84139\/ (accessed 24 October 2018)."},{"key":"2025081309504647600_ref083","volume-title":"Testing the Effects of Different Types of Attention Interventions on Data Quality in Web Surveys. Experimental Evidence from a 14 Country Study","author":"Vannette","year":"2016"},{"issue":"2","key":"2025081309504647600_ref084","doi-asserted-by":"crossref","first-page":"139","DOI":"10.1108\/ICS-12-2015-0048","article-title":"Comparing the information security culture of employees who had read the information security policy and those who had not: illustrated through an empirical study","volume":"24","author":"Veiga","year":"2016","journal-title":"Information and Computer Security"},{"issue":"1","key":"2025081309504647600_ref085","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1089\/cyber.2014.0179","article-title":"Individual differences in cyber security behaviors: an examination of who is sharing passwords","volume":"18","author":"Whitty","year":"2015","journal-title":"Cyberpsychology, Behavior and Social Networking"},{"issue":"4","key":"2025081309504647600_ref086","first-page":"206","article-title":"A survey on security for smartphone device","volume":"7","author":"Zaidi","year":"2016","journal-title":"International Journal of Advanced Computer Science and Applications"},{"issue":"6","key":"2025081309504647600_ref087","doi-asserted-by":"crossref","first-page":"1177","DOI":"10.1108\/EL-09-2016-0183","article-title":"Information security behaviours of smartphone users in China: an empirical analysis","volume":"35","author":"Zhang","year":"2017","journal-title":"The Electronic Library"},{"issue":"23","key":"2025081309504647600_ref088","doi-asserted-by":"crossref","first-page":"R941","DOI":"10.1016\/j.cub.2011.10.030","article-title":"The optimism bias","volume":"21","author":"Sharot","year":"2011","journal-title":"Current Biology"},{"issue":"2","key":"2025081309504647600_ref089","doi-asserted-by":"crossref","first-page":"311","DOI":"10.1111\/j.0272-4332.2004.00433.x","article-title":"Risk as analysis and risk as feelings: some thoughts about affect, reason, risk, and rationality","volume":"24","author":"Slovic","year":"2004","journal-title":"Risk Analysis"}],"container-title":["Information &amp; Computer Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/ICS-04-2019-0041\/full\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/ics\/article-pdf\/28\/2\/293\/10066824\/ics-04-2019-0041.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/www.emerald.com\/ics\/article-pdf\/28\/2\/293\/10066824\/ics-04-2019-0041.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,13]],"date-time":"2025-08-13T13:51:06Z","timestamp":1755093066000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.emerald.com\/ics\/article\/28\/2\/293\/1274390\/Cybersecurity-behaviour-of-smartphone-users-in"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,1,2]]},"references-count":89,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2020,6,8]]}},"URL":"https:\/\/doi.org\/10.1108\/ics-04-2019-0041","relation":{},"ISSN":["2056-4961","2056-497X"],"issn-type":[{"value":"2056-4961","type":"print"},{"value":"2056-497X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,1,2]]}}}