2020 3rd International Conference on Communication System, Computing and IT Applications (CSCITA) 2020
DOI: 10.1109/cscita47329.2020.9137773
|View full text |Cite
|
Sign up to set email alerts
|

Cybersecurity Behaviour of Smartphone Users Through the Lens of Fogg Behaviour Model

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
7
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
5

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(7 citation statements)
references
References 21 publications
0
7
0
Order By: Relevance
“…This finding is consistent with a previous study conducted by Shah and Agarwal [20] on smartphone users in India, which revealed that motivation, ability, and threat awareness were not correlated with users' adoption of security behaviors. Based on the evaluation of the results mentioned above regarding the behavior of smartphone users, it is necessary to consider designing a special security education, training and awareness (SETA) program to improve information security for smartphone users [37].…”
Section: B Post Hoc Resultsmentioning
confidence: 99%
See 1 more Smart Citation
“…This finding is consistent with a previous study conducted by Shah and Agarwal [20] on smartphone users in India, which revealed that motivation, ability, and threat awareness were not correlated with users' adoption of security behaviors. Based on the evaluation of the results mentioned above regarding the behavior of smartphone users, it is necessary to consider designing a special security education, training and awareness (SETA) program to improve information security for smartphone users [37].…”
Section: B Post Hoc Resultsmentioning
confidence: 99%
“…Arend et al [36] stated that intent and actual behavior in cybersecurity behavior are significantly correlated with selfreported individual differences in passive risk behavior but not in proactive risk behavior. In research conducted by Shah and Agarwal [37], they also asked respondents to self-report. They found that the chances of safe behavior and practices by respondents with high motivation and high ability are 4.64 times higher than respondents with low motivation and low ability.…”
Section: B Related Workmentioning
confidence: 99%
“…Around 54% of companies that had experienced a mobile-related security breach attributed it, at least in part, to user behaviour (Verizon, 2021). A previous study by Shah and Agarwal (2020a, 2020b) reported lax cybersecurity behaviour by Indian smartphone users. Hence, there is a need to focus on improving the cybersecurity behaviour of smartphone users in India.…”
Section: Introductionmentioning
confidence: 90%
“…FBM is useful in persuasive design (Fogg, 2009). FBM has been used in the cybersecurity domain as well (Jordan et al , 2014; Bawazir et al , 2016; Liljestrand et al , 2019; Parkin et al , 2019; Shah and Agarwal, 2020a, 2020b). FBM posits that three elements, namely, motivation, ability and prompt, should be present simultaneously for behaviour to occur.…”
Section: Theoretical Frameworkmentioning
confidence: 99%
See 1 more Smart Citation