{"id":"https://openalex.org/W3033137374","doi":"https://doi.org/10.1108/ics-01-2020-0016","title":"A systematic literature review of the factors affecting smartphone user threat avoidance behaviour","display_name":"A systematic literature review of the factors affecting smartphone user threat avoidance behaviour","publication_year":2020,"publication_date":"2020-06-03","ids":{"openalex":"https://openalex.org/W3033137374","doi":"https://doi.org/10.1108/ics-01-2020-0016","mag":"3033137374"},"language":"en","primary_location":{"id":"doi:10.1108/ics-01-2020-0016","is_oa":false,"landing_page_url":"https://doi.org/10.1108/ics-01-2020-0016","pdf_url":null,"source":{"id":"https://openalex.org/S4210195545","display_name":"Information and Computer Security","issn_l":"2056-4961","issn":["2056-4961","2056-497X"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319811","host_organization_name":"Emerald Publishing Limited","host_organization_lineage":["https://openalex.org/P4310319811"],"host_organization_lineage_names":["Emerald Publishing Limited"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Information &amp; Computer Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5004187650","display_name":"Rika Butler","orcid":"https://orcid.org/0000-0001-9148-1281"},"institutions":[{"id":"https://openalex.org/I26092322","display_name":"Stellenbosch University","ror":"https://ror.org/05bk57929","country_code":"ZA","type":"education","lineage":["https://openalex.org/I26092322"]}],"countries":["ZA"],"is_corresponding":true,"raw_author_name":"Rika Butler","raw_affiliation_strings":["School of Accountancy, Stellenbosch University, Stellenbosch, South Africa"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"School of Accountancy, Stellenbosch University, Stellenbosch, South Africa","institution_ids":["https://openalex.org/I26092322"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5004187650"],"corresponding_institution_ids":["https://openalex.org/I26092322"],"apc_list":null,"apc_paid":null,"fwci":2.784,"has_fulltext":false,"cited_by_count":16,"citation_normalized_percentile":{"value":0.92272506,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":94,"max":98},"biblio":{"volume":"28","issue":"4","first_page":"555","last_page":"574"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11045","display_name":"Privacy, Security, and Data Protection","score":0.9976000189781189,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T10355","display_name":"Impact of Technology on Adolescents","score":0.9811000227928162,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/carelessness","display_name":"Carelessness","score":0.7129154205322266},{"id":"https://openalex.org/keywords/context","display_name":"Context (archaeology)","score":0.5628061890602112},{"id":"https://openalex.org/keywords/originality","display_name":"Originality","score":0.5133244395256042},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.49712780117988586},{"id":"https://openalex.org/keywords/usable","display_name":"USable","score":0.49637776613235474},{"id":"https://openalex.org/keywords/affect","display_name":"Affect (linguistics)","score":0.49025848507881165},{"id":"https://openalex.org/keywords/psychological-intervention","display_name":"Psychological intervention","score":0.4318586587905884},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.3730122745037079},{"id":"https://openalex.org/keywords/knowledge-management","display_name":"Knowledge management","score":0.35638847947120667},{"id":"https://openalex.org/keywords/psychology","display_name":"Psychology","score":0.32572054862976074},{"id":"https://openalex.org/keywords/social-psychology","display_name":"Social psychology","score":0.14478319883346558},{"id":"https://openalex.org/keywords/multimedia","display_name":"Multimedia","score":0.13343465328216553}],"concepts":[{"id":"https://openalex.org/C2779837783","wikidata":"https://www.wikidata.org/wiki/Q691101","display_name":"Carelessness","level":2,"score":0.7129154205322266},{"id":"https://openalex.org/C2779343474","wikidata":"https://www.wikidata.org/wiki/Q3109175","display_name":"Context (archaeology)","level":2,"score":0.5628061890602112},{"id":"https://openalex.org/C2776950860","wikidata":"https://www.wikidata.org/wiki/Q2914681","display_name":"Originality","level":3,"score":0.5133244395256042},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.49712780117988586},{"id":"https://openalex.org/C2780615836","wikidata":"https://www.wikidata.org/wiki/Q2471869","display_name":"USable","level":2,"score":0.49637776613235474},{"id":"https://openalex.org/C2776035688","wikidata":"https://www.wikidata.org/wiki/Q1606558","display_name":"Affect (linguistics)","level":2,"score":0.49025848507881165},{"id":"https://openalex.org/C27415008","wikidata":"https://www.wikidata.org/wiki/Q7256382","display_name":"Psychological intervention","level":2,"score":0.4318586587905884},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.3730122745037079},{"id":"https://openalex.org/C56739046","wikidata":"https://www.wikidata.org/wiki/Q192060","display_name":"Knowledge management","level":1,"score":0.35638847947120667},{"id":"https://openalex.org/C15744967","wikidata":"https://www.wikidata.org/wiki/Q9418","display_name":"Psychology","level":0,"score":0.32572054862976074},{"id":"https://openalex.org/C77805123","wikidata":"https://www.wikidata.org/wiki/Q161272","display_name":"Social psychology","level":1,"score":0.14478319883346558},{"id":"https://openalex.org/C49774154","wikidata":"https://www.wikidata.org/wiki/Q131765","display_name":"Multimedia","level":1,"score":0.13343465328216553},{"id":"https://openalex.org/C11012388","wikidata":"https://www.wikidata.org/wiki/Q170658","display_name":"Creativity","level":2,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C118552586","wikidata":"https://www.wikidata.org/wiki/Q7867","display_name":"Psychiatry","level":1,"score":0.0},{"id":"https://openalex.org/C151730666","wikidata":"https://www.wikidata.org/wiki/Q7205","display_name":"Paleontology","level":1,"score":0.0},{"id":"https://openalex.org/C46312422","wikidata":"https://www.wikidata.org/wiki/Q11024","display_name":"Communication","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1108/ics-01-2020-0016","is_oa":false,"landing_page_url":"https://doi.org/10.1108/ics-01-2020-0016","pdf_url":null,"source":{"id":"https://openalex.org/S4210195545","display_name":"Information and Computer Security","issn_l":"2056-4961","issn":["2056-4961","2056-497X"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319811","host_organization_name":"Emerald Publishing Limited","host_organization_lineage":["https://openalex.org/P4310319811"],"host_organization_lineage_names":["Emerald Publishing Limited"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Information &amp; Computer Security","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":55,"referenced_works":["https://openalex.org/W959671250","https://openalex.org/W1539987097","https://openalex.org/W1763578379","https://openalex.org/W1979973568","https://openalex.org/W2011392916","https://openalex.org/W2027596144","https://openalex.org/W2061716669","https://openalex.org/W2066565675","https://openalex.org/W2069101457","https://openalex.org/W2081526168","https://openalex.org/W2124975206","https://openalex.org/W2144502588","https://openalex.org/W2167476007","https://openalex.org/W2277281035","https://openalex.org/W2291908370","https://openalex.org/W2293122547","https://openalex.org/W2397181947","https://openalex.org/W2410690178","https://openalex.org/W2416719919","https://openalex.org/W2549515637","https://openalex.org/W2601607297","https://openalex.org/W2606757332","https://openalex.org/W2612123163","https://openalex.org/W2613315625","https://openalex.org/W2616583918","https://openalex.org/W2617336958","https://openalex.org/W2620827594","https://openalex.org/W2726734512","https://openalex.org/W2731871799","https://openalex.org/W2732350692","https://openalex.org/W2736213052","https://openalex.org/W2737603360","https://openalex.org/W2756014520","https://openalex.org/W2762048627","https://openalex.org/W2766927947","https://openalex.org/W2767487258","https://openalex.org/W2783001468","https://openalex.org/W2785605040","https://openalex.org/W2786878536","https://openalex.org/W2789244800","https://openalex.org/W2793789619","https://openalex.org/W2794130283","https://openalex.org/W2794347712","https://openalex.org/W2795032667","https://openalex.org/W2795266628","https://openalex.org/W2806693293","https://openalex.org/W2808322505","https://openalex.org/W2809790149","https://openalex.org/W2885123473","https://openalex.org/W2889287994","https://openalex.org/W2900131811","https://openalex.org/W2901789937","https://openalex.org/W2910327677","https://openalex.org/W2921968294","https://openalex.org/W2924742241"],"related_works":["https://openalex.org/W2399184342","https://openalex.org/W4312036100","https://openalex.org/W2242671641","https://openalex.org/W2972810112","https://openalex.org/W4239046495","https://openalex.org/W2381946989","https://openalex.org/W4250478380","https://openalex.org/W2003234342","https://openalex.org/W4285677906","https://openalex.org/W2398507928"],"abstract_inverted_index":{"Purpose":[0],"There":[1],"is":[2,19,152,243],"a":[3,120,275,277],"need":[4,254],"for":[5,24,123,255],"behavioural":[6,256],"research":[7,56,125,257,278],"within":[8],"the":[9,22,25,35,55,106,174,219,237,246,253,260,272],"smartphone":[10,40,85,131,155,184,198,226,264],"context":[11],"to":[12,33,53,129,172,182,191,208,258],"better":[13],"understand":[14],"users\u2019":[15,41,86,185,193],"behaviour,":[16,89],"as":[17,80],"it":[18,268],"one":[20],"of":[21,27,60,84,212,221,274],"reasons":[23],"proliferation":[26],"mobile":[28,137,149,249],"threats.":[29,230,250],"This":[30,232],"study":[31,181,233],"aims":[32],"identify":[34],"human":[36,127,241],"factors":[37,77,175,261],"that":[38,151,176,239,262],"affect":[39,183],"threat":[42,87,186],"avoidance":[43,88,187],"behaviour.":[44,133,188,266],"Design/methodology/approach":[45],"A":[46,58],"structured":[47],"literature":[48],"review":[49],"(SLR)":[50],"was":[51],"applied":[52],"answer":[54],"question.":[57],"total":[59],"27":[61],"sources":[62],"were":[63,78,177],"analysed,":[64],"from":[65],"which":[66],"16":[67],"codes":[68],"emerged.":[69],"After":[70],"synthesis,":[71],"six":[72],"themes":[73],"transpired.":[74],"Findings":[75],"Six":[76],"identified":[79,178],"drivers":[81],"and/or":[82],"challenges":[83],"namely,":[90],"knowledge":[91,195,203],"and":[92,95,98,105,110,118,145,157,161,166,200,228,235,270],"awareness,":[93],"misconceptions":[94,144],"trust,":[96],"cost":[97,159],"benefit":[99],"considerations,":[100],"carelessness,":[101],"perceived":[102,108],"measure":[103],"effectiveness":[104],"user\u2019s":[107],"skills":[109],"efficacy.":[111],"Research":[112],"limitations/implications":[113],"The":[114,136],"results":[115],"can":[116],"encourage":[117],"provide":[119],"starting":[121],"point":[122],"further":[124],"on":[126,141],"behaviour":[128,242],"improve":[130],"user":[132,265],"Practical":[134],"implications":[135],"industry":[138],"should":[139,169,204,217],"focus":[140],"eradicating":[142],"common":[143],"undue":[146],"trust":[147],"in":[148,179,245],"security":[150,284],"prevalent":[153],"among":[154,282],"users":[156],"make":[158],"effective":[160],"usable":[162],"interventions":[163],"available.":[164],"Training":[165],"awareness":[167],"programs":[168],"be":[170,206],"updated":[171,223],"include":[173],"this":[180],"In":[189],"addition":[190],"improving":[192],"declarative":[194],"concerning":[196],"available":[197,213],"measures":[199],"tools,":[201],"procedural":[202],"also":[205],"improved":[207],"ensure":[209],"proper":[210],"use":[211,273],"protective":[214],"measures.":[215],"Users":[216],"realise":[218],"importance":[220],"staying":[222],"with":[224],"evolving":[225],"technology":[227],"associated":[229],"Originality/value":[231],"acknowledges":[234],"supports":[236],"notion":[238],"addressing":[240],"crucial":[244],"fight":[247],"against":[248],"It":[251],"addresses":[252],"analyse":[259],"drive":[263],"Furthermore,":[267],"uses":[269],"documents":[271],"SLR,":[276],"technique":[279],"often":[280],"unfamiliar":[281],"information":[283],"researchers.":[285]},"counts_by_year":[{"year":2025,"cited_by_count":4},{"year":2024,"cited_by_count":2},{"year":2023,"cited_by_count":3},{"year":2022,"cited_by_count":4},{"year":2021,"cited_by_count":3}],"updated_date":"2026-05-08T15:41:06.802602","created_date":"2025-10-10T00:00:00"}
