首页> 外文期刊>Telematics and Informatics >Understanding the asymmetric perceptions of smartphone security from security feature perspective: A comparative study
【24h】

Understanding the asymmetric perceptions of smartphone security from security feature perspective: A comparative study

机译:了解安全特征视角的智能手机安全的不对称看法:比较研究

获取原文
获取原文并翻译 | 示例
       

摘要

Smartphones are being used and relied on by people more than ever before. The open connectivity brings with it great convenience and leads to a variety of risks that cannot be overlooked. Smartphone vendors, security policy designers, and security application providers have put a variety of practical efforts to secure smartphones, and researchers have conducted extensive research on threat sources, security techniques, and user security behaviors. Regrettably, smartphone users do not pay enough attention to mobile security, making many efforts futile. This study identifies this gap between technology affordance and user requirements, and attempts to investigate the asymmetric perceptions toward security features between developers and users, between users and users, as well as between different security features. These asymmetric perceptions include perceptions of quality, perceptions of importance, and perceptions of satisfaction. After scoping the range of smartphone security features, this study conducts an improved Kano-based method and exhaustively analyzes the 245 collected samples using correspondence analysis and importance satisfaction analysis. The 14 security features of the smartphone are divided into four Kano quality types and the perceived quality differences between developers and users are compared. Correspondence analysis is utilized to capture the relationship between the perceived importance of security features across different groups of respondents, and results of importance-satisfaction analysis provide the basis for the developmental path and resource reallocation strategy of security features. This article offers new insights for researchers as well as practitioners of smartphone security.
机译:智能手机正在被人们使用并依赖于以往任何时候的人。开放式连接带来了极大的便利性,导致各种无法忽视的风险。智能手机供应商,安全策略设计人员和安全应用程序提供商已经为保护智能手机进行了各种实际努力,研究人员对威胁来源,安全技术和用户安全行为进行了广泛的研究。令人遗憾的是,智能手机用户不足够重视移动安全性,使许多努力徒劳无功。本研究确定了技术可供和用户要求之间的这种差距,并试图调查开发人员和用户之间的安全功能的不对称感知,用户和用户之间的安全功能以及不同的安全功能。这些不对称的感知包括对质量,对重要性的看法以及对满足的看法的看法。在扫描智能手机安全特征范围之后,该研究进行了改进的基于卡诺的方法,并使用对应分析和重要性满意分析彻底分析了245个收集的样本。智能手机的14个安全功能分为四种Kano质量类型,比较了开发人员和用户之间的感知质量差异。对应分析用于捕获不同受访者群体的安全特征的感知重要性之间的关系,并且重要性 - 满意分析结果为安全特征的发展路径和资源重新分配策略提供了基础。本文为研究人员提供了新的洞察,以及智能手机安全的从业者。

著录项

获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号