{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,30]],"date-time":"2026-03-30T18:16:02Z","timestamp":1774894562282,"version":"3.50.1"},"reference-count":66,"publisher":"MDPI AG","issue":"11","license":[{"start":{"date-parts":[[2024,11,18]],"date-time":"2024-11-18T00:00:00Z","timestamp":1731888000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["BDCC"],"abstract":"<jats:p>Privacy and security is very critical for mobile users and in-depth research into the area highlights a need for more scientific literature on the perception and challenges of end users to better align the design of privacy and security controls with user expectations. In this paper, we have explored the perceptions of the usability of privacy and security settings in mobile applications from mobile users in Saudi Arabia. The findings highlight that gender, age, and education level of users do not have any positive correlation with the privacy and security usability perceptions of mobile users. On the other hand, user concerns about privacy and security and the trustworthiness levels of end users regarding mobile phone privacy and security have a positive impact on end users\u2019 perception of privacy and security usability. Furthermore, privacy usability perception has a positive impact on users\u2019 feelings about their control over the privacy and security of their mobile phones. Based on the results of this empirical study, we propose that user-centric design of privacy and security controls, transparent data handling policies, periodic data management status preview and validation by end users, user education guidelines, strict governmental policies, and automated security settings recommendations can enhance the usability of the privacy and security of mobile phone applications. Our study did not take the geographical location of respondents into account, nor were the respondents balanced based on age and gender. In future work, these weaknesses need to be taken into account, and more qualitative studies can help to extract design guidelines for usable and secure mobile applications.<\/jats:p>","DOI":"10.3390\/bdcc8110162","type":"journal-article","created":{"date-parts":[[2024,11,18]],"date-time":"2024-11-18T13:03:14Z","timestamp":1731934994000},"page":"162","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":9,"title":["Usable Privacy and Security in Mobile Applications: Perception of Mobile End Users in Saudi Arabia"],"prefix":"10.3390","volume":"8","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-7136-3480","authenticated-orcid":false,"given":"Saqib","family":"Saeed","sequence":"first","affiliation":[{"name":"Department of Computer Information Systems, College of Computer Science and Information Technology, Imam Abdulrahman Bin Faisal University, P.O. Box 1982, Dammam 31441, Saudi Arabia"}]}],"member":"1968","published-online":{"date-parts":[[2024,11,18]]},"reference":[{"key":"ref_1","unstructured":"(2024, September 05). Available online: https:\/\/www.statista.com\/statistics\/558821\/number-of-mobile-internet-user-in-saudi-arabia\/."},{"key":"ref_2","doi-asserted-by":"crossref","first-page":"e1365","DOI":"10.1002\/widm.1365","article-title":"Continuous authentication using biometrics: An advanced review","volume":"10","author":"Dahia","year":"2020","journal-title":"Wiley Interdiscip. Rev. Data Min. Knowl. Discov."},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"101745","DOI":"10.1016\/j.cose.2020.101745","article-title":"A survey on multi-factor authentication for online banking in the wild","volume":"95","author":"Sinigaglia","year":"2020","journal-title":"Comput. Secur."},{"key":"ref_4","doi-asserted-by":"crossref","first-page":"3454","DOI":"10.1109\/TIFS.2020.2988575","article-title":"Federated learning with differential privacy: Algorithms and performance analysis","volume":"15","author":"Wei","year":"2020","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"ref_5","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3394658","article-title":"Homomorphic encryption for machine learning in medicine and bioinformatics","volume":"53","author":"Wood","year":"2020","journal-title":"ACM Comput. Surv. (CSUR)"},{"key":"ref_6","doi-asserted-by":"crossref","first-page":"102063","DOI":"10.1016\/j.ijinfomgt.2019.102063","article-title":"Mobile application security: Role of perceived privacy as the predictor of security perceptions","volume":"52","author":"Balapour","year":"2020","journal-title":"Int. J. Inf. Manag."},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"12","DOI":"10.1504\/IJESDF.2007.013589","article-title":"Integrating security and usability into the requirements and design process","volume":"1","author":"Flechais","year":"2007","journal-title":"Int. J. Electron. Secur. Digit. Forensics"},{"key":"ref_8","doi-asserted-by":"crossref","unstructured":"Riyadh HT, M.A., Bhardwaj, D., Dabrowski, A., and Krombholz, K. (2024). Usable Authentication in Virtual Reality: Exploring the Usability of PINs and Gestures. Applied Cryptography and Network Security, Proceedings of the 22nd International Conference, Abu Dhabi, United Arab Emirates, 5\u20138 March 2024, Springer Nature.","DOI":"10.1007\/978-3-031-54776-8_16"},{"key":"ref_9","unstructured":"Saker, R., and Abu Issa, O. (2024, September 05). Case Study: Assessing the Security of a ZigBee Smart HomeNetwork. Available online: https:\/\/lnu.diva-portal.org\/smash\/get\/diva2:1837833\/FULLTEXT01.pdf."},{"key":"ref_10","doi-asserted-by":"crossref","unstructured":"Saeed, S. (2023). A customer-centric view of E-commerce security and privacy. Appl. Sci., 13.","DOI":"10.3390\/app13021020"},{"key":"ref_11","doi-asserted-by":"crossref","unstructured":"Saeed, S. (2023). Digital Workplaces and Information Security Behavior of Business Employees: An Empirical Study of Saudi Arabia. Sustainability, 15.","DOI":"10.3390\/su15076019"},{"key":"ref_12","doi-asserted-by":"crossref","unstructured":"Saeed, S. (2023). Education, Online Presence and Cybersecurity Implications: A Study of Information Security Practices for Computing Students in Saudi Arabia. Sustainability, 15.","DOI":"10.3390\/su15129426"},{"key":"ref_13","doi-asserted-by":"crossref","first-page":"193","DOI":"10.1108\/JCM-03-2021-4526","article-title":"Usage of smartphones for financial transactions: From the consumer privacy perspective","volume":"40","author":"Chatterjee","year":"2023","journal-title":"J. Consum. Mark."},{"key":"ref_14","doi-asserted-by":"crossref","first-page":"267","DOI":"10.1177\/19389655211066834","article-title":"Privacy or security: Does it matter for continued use intention of travel applications?","volume":"64","author":"Choi","year":"2023","journal-title":"Cornell Hosp. Q."},{"key":"ref_15","doi-asserted-by":"crossref","unstructured":"Almaiah, M.A., Al-Otaibi, S., Shishakly, R., Hassan, L., Lutfi, A., Alrawad, M., Qatawneh, M., and Alghanam, O.A. (2023). Investigating the role of perceived risk, perceived security and perceived trust on smart m-banking application using SEM. Sustainability, 15.","DOI":"10.3390\/su15139908"},{"key":"ref_16","doi-asserted-by":"crossref","first-page":"185","DOI":"10.5267\/j.ijdns.2022.11.004","article-title":"The effect of quality, security and privacy factors on trust and intention to use e-government services","volume":"7","author":"Kanaan","year":"2023","journal-title":"Int. J. Data Netw. Sci."},{"key":"ref_17","doi-asserted-by":"crossref","first-page":"781","DOI":"10.1007\/s11365-023-00839-4","article-title":"Does privacy and ease of use influence user trust in digital banking applications in Spain and Portugal?","volume":"19","author":"Alberto","year":"2023","journal-title":"Int. Entrep. Manag. J."},{"key":"ref_18","doi-asserted-by":"crossref","first-page":"e275","DOI":"10.1002\/spy2.275","article-title":"A comprehensive survey on online social networks security and privacy issues: Threats, machine learning\u2014based solutions, and open challenges","volume":"6","author":"Bhattacharya","year":"2023","journal-title":"Secur. Priv."},{"key":"ref_19","doi-asserted-by":"crossref","unstructured":"Kulyk, O., Gerber, P., Marky, K., Beckmann, C., and Volkamer, M. (2019, January 24). Does this app respect my privacy? Design and evaluation of information materials supporting privacy-related decisions of smartphone users. Proceedings of the Workshop on Usable Security (USEC\u201919), San Diego, CA, USA.","DOI":"10.14722\/usec.2019.23029"},{"key":"ref_20","doi-asserted-by":"crossref","first-page":"1939896","DOI":"10.1080\/17517575.2021.1939896","article-title":"Privacy, security and resilience in mobile healthcare applications","volume":"17","author":"Lin","year":"2023","journal-title":"Enterp. Inf. Syst."},{"key":"ref_21","doi-asserted-by":"crossref","first-page":"103008","DOI":"10.1016\/j.cose.2022.103008","article-title":"Perspectives of non-expert users on cyber security and privacy: An analysis of online discussions on twitter","volume":"125","author":"Pattnaik","year":"2023","journal-title":"Comput. Secur."},{"key":"ref_22","doi-asserted-by":"crossref","unstructured":"Alsyouf, A., Lutfi, A., Alsubahi, N., Alhazmi, F.N., Al-Mugheed, K., Anshasi, R.J., Alharbi, N.I., and Albugami, M. (2023). The use of a technology acceptance model (TAM) to predict patients\u2019 usage of a personal health record system: The role of security, privacy, and usability. Int. J. Environ. Res. Public Health, 20.","DOI":"10.3390\/ijerph20021347"},{"key":"ref_23","doi-asserted-by":"crossref","unstructured":"Du, X., Yang, Z., Lin, J., Cao, Y., and Yang, M. (2024, January 20\u201323). Withdrawing is believing? detecting inconsistencies between withdrawal choices and third-party data collections in mobile apps. Proceedings of the 2024 IEEE Symposium on Security and Privacy (SP), San Francisco, CA, USA.","DOI":"10.1109\/SP54263.2024.00014"},{"key":"ref_24","doi-asserted-by":"crossref","first-page":"12","DOI":"10.1016\/j.future.2023.02.009","article-title":"Analysis of security and data control in smart personal assistants from the user\u2019s perspective","volume":"144","author":"Valero","year":"2023","journal-title":"Future Gener. Comput. Syst."},{"key":"ref_25","doi-asserted-by":"crossref","unstructured":"Groen, E.C., Feth, D., Polst, S., Tolsdorf, J., Wiefling, S., Iacono, L.L., and Schmitt, H. (2023). Achieving usable security and privacy through Human-Centered Design. Human Factors in Privacy Research. In Human Factors in Privacy Research, Springer International Publishing.","DOI":"10.1007\/978-3-031-28643-8_5"},{"key":"ref_26","doi-asserted-by":"crossref","first-page":"111519","DOI":"10.1016\/j.jss.2022.111519","article-title":"End-users\u2019 knowledge and perception about security of clinical mobile health apps: A case study with two Saudi Arabian mHealth providers","volume":"195","author":"Aljedaani","year":"2023","journal-title":"J. Syst. Softw."},{"key":"ref_27","doi-asserted-by":"crossref","first-page":"105456","DOI":"10.1016\/j.conengprac.2023.105456","article-title":"Privacy protection control for mobile apps users","volume":"134","author":"Cerf","year":"2023","journal-title":"Control Eng. Pract."},{"key":"ref_28","doi-asserted-by":"crossref","first-page":"2011","DOI":"10.1080\/0144929X.2022.2106307","article-title":"The privacy protection behaviours of the mobile app users: Exploring the role of neuroticism and protection motivation theory","volume":"42","author":"Chennamaneni","year":"2023","journal-title":"Behav. Inf. Technol."},{"key":"ref_29","unstructured":"Akter, M., Tabassum, M., Miazi, N.S., Alghamdi, L., Kropczynski, J., Wisniewski, P.J., and Lipford, H. (2023, January 6\u20138). Evaluating the impact of community oversight for managing mobile privacy and security. Proceedings of the Nineteenth Symposium on Usable Privacy and Security (SOUPS 2023), Anaheim, CA, USA."},{"key":"ref_30","doi-asserted-by":"crossref","first-page":"111545","DOI":"10.1016\/j.jss.2022.111545","article-title":"Privacy explanations\u2013a means to end-user trust","volume":"195","author":"Brunotte","year":"2023","journal-title":"J. Syst. Softw."},{"key":"ref_31","doi-asserted-by":"crossref","unstructured":"Assal, H., Hurtado, S., Imran, A., and Chiasson, S. (2015\u20132, January 30). What\u2019s the deal with privacy apps? A comprehensive exploration of user perception and usability. Proceedings of the 14th International Conference on Mobile and Ubiquitous Multimedia, Linz, Austria.","DOI":"10.1145\/2836041.2836044"},{"key":"ref_32","doi-asserted-by":"crossref","unstructured":"Feth, D., Maier, A., and Polst, S. (2017). A user-centered model for usable security and privacy. Human Aspects of Information Security, Privacy and Trust, Proceedings of the 5th International Conference, HAS 2017, Held as Part of HCI International 2017, Vancouver, BC, Canada, 9\u201314 July 2017, Springer International Publishing. Proceedings 5.","DOI":"10.1007\/978-3-319-58460-7_6"},{"key":"ref_33","doi-asserted-by":"crossref","unstructured":"Liu, B., Lin, J., and Sadeh, N. (2014, January 7\u201311). Reconciling mobile app privacy and usability on smartphones: Could user privacy profiles help?. Proceedings of the 23rd International Conference on World Wide Web, Seoul, Republic of Korea.","DOI":"10.1145\/2566486.2568035"},{"key":"ref_34","doi-asserted-by":"crossref","first-page":"103235","DOI":"10.1016\/j.im.2019.103235","article-title":"Effects of the design of mobile security notifications and mobile app usability on users\u2019 security perceptions and continued use intention","volume":"57","author":"Wu","year":"2020","journal-title":"Inf. Manag."},{"key":"ref_35","doi-asserted-by":"crossref","unstructured":"Acar, Y., Fahl, S., and Mazurek, M.L. (2016, January 3\u20134). You are not your developer, either: A research agenda for usable security and privacy research beyond end users. Proceedings of the 2016 IEEE Cybersecurity Development (SecDev), Boston, MA, USA.","DOI":"10.1109\/SecDev.2016.013"},{"key":"ref_36","doi-asserted-by":"crossref","unstructured":"Di Nocera, F., Tempestini, G., and Orsini, M. (2023). Usable Security: A Systematic Literature Review. Information, 14.","DOI":"10.3390\/info14120641"},{"key":"ref_37","unstructured":"Pattan, N., and Madamanchi, D. (2009). Study of usability of security and privacy in context aware mobile applications. Mobile Computing, Applications, and Services, Proceedings of the First International ICST Conference, MobiCASE 2009, San Diego, CA, USA, 26\u201329 October 2009, Springer. Revised Selected Papers 1."},{"key":"ref_38","doi-asserted-by":"crossref","unstructured":"Christin, D., Engelmann, F., and Hollick, M. (2014). Usable privacy for mobile sensing applications. Information Security Theory and Practice. Securing the Internet of Things, Proceedings of the 8th IFIP WG 11.2 International Workshop, WISTP 2014, Heraklion, Greece, 2\u201330 July 2014, Springer. Proceedings 8.","DOI":"10.1007\/978-3-662-43826-8_7"},{"key":"ref_39","doi-asserted-by":"crossref","unstructured":"Gutfleisch, M., Klemmer, J.H., Busch, N., Acar, Y., Sasse, M.A., and Fahl, S. (2022, January 22\u201326). How does usable security (not) end up in software products? Results from a qualitative interview study. Proceedings of the 2022 IEEE Symposium on Security and Privacy (SP), San Francisco, CA, USA.","DOI":"10.1109\/SP46214.2022.9833756"},{"key":"ref_40","doi-asserted-by":"crossref","first-page":"468","DOI":"10.1080\/10447318.2021.1949134","article-title":"Prototyping usable privacy and security systems: Insights from experts","volume":"38","author":"Mathis","year":"2022","journal-title":"Int. J. Hum. Comput. Interact."},{"key":"ref_41","doi-asserted-by":"crossref","unstructured":"Chin, E., Felt, A.P., Sekar, V., and Wagner, D. (2012, January 11\u201313). Measuring user confidence in smartphone security and privacy. Proceedings of the Eighth Symposium on Usable Privacy and Security, Washington, DC, USA.","DOI":"10.1145\/2335356.2335358"},{"key":"ref_42","doi-asserted-by":"crossref","unstructured":"Zhang, Z. (2021, January 6\u20138). On the usability (in) security of in-app browsing interfaces in mobile apps. Proceedings of the 24th International Symposium on Research in Attacks, Intrusions and Defenses, San Sebastian, Spain.","DOI":"10.1145\/3471621.3471625"},{"key":"ref_43","doi-asserted-by":"crossref","first-page":"2035","DOI":"10.1080\/0144929X.2022.2080908","article-title":"A quarter century of usable security and privacy research: Transparency, tailorability, and the road ahead","volume":"41","author":"Reuter","year":"2022","journal-title":"Behav. Inf. Technol."},{"key":"ref_44","doi-asserted-by":"crossref","unstructured":"Musa, H.S., Krichen, M., Altun, A.A., and Ammi, M. (2023). Survey on blockchain-based data storage security for Android mobile applications. Sensors, 23.","DOI":"10.3390\/s23218749"},{"key":"ref_45","unstructured":"Khan, H., Hengartner, U., and Vogel, D. (2015, January 22\u201324). Usability and security perceptions of implicit authentication: Convenient, secure, sometimes annoying. Proceedings of the Eleventh Symposium on Usable Privacy and Security (SOUPS 2015), Ottawa, Canada."},{"key":"ref_46","first-page":"864","article-title":"When privacy meets usability: Unobtrusive privacy permission recommendation system for mobile apps based on crowdsourcing","volume":"11","author":"Liu","year":"2016","journal-title":"IEEE Trans. Serv. Comput."},{"key":"ref_47","doi-asserted-by":"crossref","unstructured":"Frik, A., Kim, J., Sanchez, J.R., and Ma, J. (2022\u20135, January 29). Users\u2019 expectations about and use of smartphone privacy and security settings. Proceedings of the 2022 CHI Conference on Human Factors in Computing Systems, New Orleans, LA, USA.","DOI":"10.1145\/3491102.3517504"},{"key":"ref_48","doi-asserted-by":"crossref","first-page":"189","DOI":"10.1515\/icom-2019-0019","article-title":"Emerging trends in usable security and privacy","volume":"18","author":"Alt","year":"2019","journal-title":"I-COM"},{"key":"ref_49","doi-asserted-by":"crossref","unstructured":"Ferreira, D., Kostakos, V., Beresford, A.R., Lindqvist, J., and Dey, A.K. (2015, January 22\u201326). Securacy: An empirical investigation of Android applications\u2019 network usage, privacy and security. Proceedings of the 8th ACM Conference on Security & Privacy in Wireless and Mobile Networks, New York, NY, USA.","DOI":"10.1145\/2766498.2766506"},{"key":"ref_50","doi-asserted-by":"crossref","unstructured":"Chen, Y., Zha, M., Zhang, N., Xu, D., Zhao, Q., Feng, X., Yuan, K., Suya, F., Tian, Y., and Chen, K. (2019, January 19\u201323). Demystifying hidden privacy settings in mobile apps. Proceedings of the 2019 IEEE Symposium on Security and Privacy (SP), San Francisco, CA, USA.","DOI":"10.1109\/SP.2019.00054"},{"key":"ref_51","doi-asserted-by":"crossref","unstructured":"Lin, J., Amini, S., Hong, J.I., Sadeh, N., Lindqvist, J., and Zhang, J. (2012, January 5\u20138). Expectation and purpose: Understanding users\u2019 mental models of mobile app privacy through crowdsourcing. Proceedings of the 2012 ACM Conference on Ubiquitous Computing, Pittsburgh, PA, USA.","DOI":"10.1145\/2370216.2370290"},{"key":"ref_52","doi-asserted-by":"crossref","unstructured":"Nema, P., Anthonysamy, P., Taft, N., and Peddinti, S.T. (2022, January 21\u201329). Analyzing user perspectives on mobile app privacy at scale. Proceedings of the 44th International Conference on Software Engineering, Pittsburgh, PA, USA.","DOI":"10.1145\/3510003.3510079"},{"key":"ref_53","unstructured":"Jacobs, D., and McDaniel, T. A survey of user experience in usable security and privacy research. HCI for Cybersecurity, Privacy and Trust, Proceedings of the 4th International Conference, HCI-CPT 2022, Held as Part of the 24th HCI International Conference, HCII 2022, Virtual Event, 1\u201326 July 2022, Springer International Publishing."},{"key":"ref_54","doi-asserted-by":"crossref","first-page":"119","DOI":"10.1515\/popets-2017-0041","article-title":"To permit or not to permit, that is the usability question: Crowdsourcing mobile apps\u2019 privacy permission settings","volume":"4","author":"Ismail","year":"2017","journal-title":"Proc. Priv. Enhancing Technol."},{"key":"ref_55","doi-asserted-by":"crossref","first-page":"200","DOI":"10.1080\/01972243.2016.1153012","article-title":"Putting mobile application privacy in context: An empirical study of user privacy expectations for mobile devices","volume":"32","author":"Martin","year":"2016","journal-title":"Inf. Soc."},{"key":"ref_56","unstructured":"Holton, E.F., and Burnett, M.F. (2024, November 09). Research in Organizations. Foundations and Methods of Inquiry. The Basics of Quantitative Research. Available online: http:\/\/www.kharazmi-statistics.ir\/Uploads\/Public\/book\/research%20in%20organization.pdf."},{"key":"ref_57","doi-asserted-by":"crossref","first-page":"249","DOI":"10.2501\/S147078530920120X","article-title":"Research into questionnaire design: A summary of the literature","volume":"52","author":"Lietz","year":"2010","journal-title":"Int. J. Mark. Res."},{"key":"ref_58","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1108\/ICS-02-2023-0015","article-title":"Post hoc security and privacy concerns in mobile apps: The moderating roles of mobile apps\u2019 features and providers","volume":"32","author":"Nikkhah","year":"2024","journal-title":"Inf. Comput. Secur."},{"key":"ref_59","unstructured":"(2024, November 09). Available online: https:\/\/www.smartpls.com\/."},{"key":"ref_60","doi-asserted-by":"crossref","first-page":"106","DOI":"10.1108\/EBR-10-2013-0128","article-title":"Partial least squares structural equation modeling (PLS-SEM): An emerging tool in business research","volume":"26","author":"Hair","year":"2014","journal-title":"Eur. Bus. Rev."},{"key":"ref_61","doi-asserted-by":"crossref","first-page":"122","DOI":"10.1037\/0021-9010.80.1.122","article-title":"Confirmatory factor analysis of the styles of handling interpersonal conflict: First-order factor model and its invariance across groups","volume":"80","author":"Rahim","year":"1995","journal-title":"J. Appl. Psychol."},{"key":"ref_62","doi-asserted-by":"crossref","first-page":"115","DOI":"10.1007\/s11747-014-0403-8","article-title":"A new criterion for assessing discriminant validity in variance-based structural equation modeling","volume":"43","author":"Henseler","year":"2015","journal-title":"J. Acad. Mark. Sci."},{"key":"ref_63","doi-asserted-by":"crossref","unstructured":"Hair, J.F., Hult GT, M., Ringle, C.M., and Sarstedt, M. (2022). A Primer on Partial Least Squares Structural Equation Modeling (PLS-SEM), Sage. [3rd ed.].","DOI":"10.1007\/978-3-030-80519-7"},{"key":"ref_64","doi-asserted-by":"crossref","unstructured":"Saeed, S., Bajwa, I.S., and Mahmood, Z. (2015). Human Factors in Software Development and Design, IGI Global.","DOI":"10.4018\/978-1-4666-6485-2"},{"key":"ref_65","doi-asserted-by":"crossref","unstructured":"Saeed, S., Bamarouf, Y.A., Ramayah, T., and Iqbal, S.Z. (2016). Design Solutions for User-Centric Information Systems, IGI Global.","DOI":"10.4018\/978-1-5225-1944-7"},{"key":"ref_66","doi-asserted-by":"crossref","unstructured":"Gull, H., Saeed, S., Iqbal, S.Z., Bamarouf, Y.A., Alqahtani, M.A., Alabbad, D.A., Saqib, M., Al Qahtani, S.H., and Alamer, A. (2022). An empirical study of mobile commerce and customers security perception in Saudi Arabia. Electronics, 11.","DOI":"10.3390\/electronics11030293"}],"container-title":["Big Data and Cognitive Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/2504-2289\/8\/11\/162\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,10]],"date-time":"2025-10-10T16:34:44Z","timestamp":1760114084000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/2504-2289\/8\/11\/162"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,11,18]]},"references-count":66,"journal-issue":{"issue":"11","published-online":{"date-parts":[[2024,11]]}},"alternative-id":["bdcc8110162"],"URL":"https:\/\/doi.org\/10.3390\/bdcc8110162","relation":{},"ISSN":["2504-2289"],"issn-type":[{"value":"2504-2289","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,11,18]]}}}