865
Views
12
CrossRef citations to date
0
Altmetric
Articles

An empirical study examining the perceptions and behaviours of security-conscious users of mobile authentication

, &
Pages 320-334 | Received 28 Mar 2017, Accepted 29 Jan 2018, Published online: 15 Feb 2018

Keep up to date with the latest research on this topic with citation updates for this article.

Read on this site (2)

Hadas Chassidim, Christos Perentis, Eran Toch & Bruno Lepri. (2021) Between privacy and security: the factors that drive intentions to use cyber-security applications. Behaviour & Information Technology 40:16, pages 1769-1783.
Read now
Jiaxin Zhang & Yan Luximon. (2021) A quantitative diary study of perceptions of security in mobile payment transactions. Behaviour & Information Technology 40:15, pages 1579-1602.
Read now

Articles from other publishers (10)

Stephen Mujeye. (2023) An analysis of differences in behaviors and practices of security-conscious users and regular users on mobile devices. Information & Computer Security 31:5, pages 624-634.
Crossref
Sunil Chaudhary, Vasileios Gkioulos & Sokratis Katsikas. (2023) A quest for research and knowledge gaps in cybersecurity awareness for small and medium-sized enterprises. Computer Science Review 50, pages 100592.
Crossref
Jen-Sheng Wang. (2023) Reconfigure and evaluate consumer satisfaction for Open API in advancing FinTech. Journal of King Saud University - Computer and Information Sciences 35:9, pages 101738.
Crossref
Agata Kruzikova, Vashek Matyas & Milan Broz. 2023. Security Protocols XXVIII. Security Protocols XXVIII 43 56 .
Mapula Elisa Maeko & Dustin van der Haar. 2022. Artificial Intelligence Research. Artificial Intelligence Research 323 334 .
Aleksandr Volosiuk, Semyon Kuznetsov, Svetlana Podkolzina & Evgeniy Lavrov. 2021. Proceedings of the 8th International Ergonomics Conference. Proceedings of the 8th International Ergonomics Conference 233 240 .
Rika Butler. (2020) A systematic literature review of the factors affecting smartphone user threat avoidance behaviour. Information & Computer Security 28:4, pages 555-574.
Crossref
Ruud Jacobs, Joyce Karreman & Jitske Botma. (2019) Beyond Clippy's Counsel: Word Processor Feature Underuse among the Digital Generation. Beyond Clippy's Counsel: Word Processor Feature Underuse among the Digital Generation.
Kanlun Wang, Lina Zhou & Dongsong Zhang. (2019) User Preferences and Situational Needs of Mobile User Authentication Methods. User Preferences and Situational Needs of Mobile User Authentication Methods.
Flynn Wolf, Ravi Kuber & Adam J. Aviv. (2019) "Pretty Close to a Must-Have". "Pretty Close to a Must-Have".

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.