Summary: | 碩士 === 國立臺灣科技大學 === 資訊管理系 === 105 === As technology rapidly breaks new limitations, smartphone has become an indispensable device in our daily lives. However, as the popularity of smartphones increased, so did the number of smartphone malwares. SMS phishing, data leakage, Trojan, backdoor, and virus are only some of the malicious events that might occur on smartphones. Lack of security awareness or neglecting the risk might result in devastating consequence. The security of smartphones not only affects the user’s privacy, but also trade secrets of enterprises, or even national security matters.
Different from most smartphone security researches that focus on the defense mechanisms and techniques to safeguard smartphones, this study takes a different approach from the psychological perspective of smartphone users. This study explores how users’ awareness influences the users’ behavior and what other factors might be critical to fill the gap between awareness (Knowing) and behavior (Doing). We integrated the existing psychological knowledge-attitude-behavior model (KAB) with the Fogg’s behavior model, and additional constructs that might affect the users’ behavior. As a result, we developed a new behavior model for explaining the gap between smartphone users’ security knowledge and their actual behavior.
Questionnaires were distributed and received through an online platform targeting Taiwanese, with 320 samples received and 305 valid. Data analysis was conducted via implementing IBM SPSS Windows 22.0 and SmartPLS 2.0. Our study indicates that smartphone users’ behavior are influenced by a combination of multiple factors, such as the users’ smartphone security knowledge, users’ attitude towards smartphone security, users’ privacy concerns, users’ motivation in improving smartphone security, and the herding effect.
The contribution of this research lies in the development of an innovative behavior model, which could be used as a reference or guideline to enterprises, government agencies, or information security departments when drawing security policies regarding smartphones. This research model could also serve as a stepping stone for future academic research in the field of smartphone security or psychology.
|