{"id":"https://openalex.org/W2617336958","doi":"https://doi.org/10.1108/ics-04-2016-0027","title":"Mobile device users\u2019 privacy security assurance behavior","display_name":"Mobile device users\u2019 privacy security assurance behavior","publication_year":2017,"publication_date":"2017-05-24","ids":{"openalex":"https://openalex.org/W2617336958","doi":"https://doi.org/10.1108/ics-04-2016-0027","mag":"2617336958"},"language":"en","primary_location":{"id":"doi:10.1108/ics-04-2016-0027","is_oa":false,"landing_page_url":"https://doi.org/10.1108/ics-04-2016-0027","pdf_url":null,"source":{"id":"https://openalex.org/S4210195545","display_name":"Information and Computer Security","issn_l":"2056-4961","issn":["2056-4961","2056-497X"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319811","host_organization_name":"Emerald Publishing Limited","host_organization_lineage":["https://openalex.org/P4310319811"],"host_organization_lineage_names":["Emerald Publishing Limited"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Information &amp; Computer Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5017505188","display_name":"Hao Chen","orcid":"https://orcid.org/0000-0002-0615-9261"},"institutions":[{"id":"https://openalex.org/I27357992","display_name":"Dalian University of Technology","ror":"https://ror.org/023hj5876","country_code":"CN","type":"education","lineage":["https://openalex.org/I27357992"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Hao Chen","raw_affiliation_strings":["Management College, Dalian University of Technology, Dalian, China"],"affiliations":[{"raw_affiliation_string":"Management College, Dalian University of Technology, Dalian, China","institution_ids":["https://openalex.org/I27357992"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100625299","display_name":"Wenli Li","orcid":"https://orcid.org/0000-0001-8711-5094"},"institutions":[{"id":"https://openalex.org/I27357992","display_name":"Dalian University of Technology","ror":"https://ror.org/023hj5876","country_code":"CN","type":"education","lineage":["https://openalex.org/I27357992"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Wenli Li","raw_affiliation_strings":["Management College, Dalian University of Technology, Dalian, China"],"affiliations":[{"raw_affiliation_string":"Management College, Dalian University of Technology, Dalian, China","institution_ids":["https://openalex.org/I27357992"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5017505188"],"corresponding_institution_ids":["https://openalex.org/I27357992"],"apc_list":null,"apc_paid":null,"fwci":5.5557,"has_fulltext":false,"cited_by_count":51,"citation_normalized_percentile":{"value":0.9611544,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":99},"biblio":{"volume":"25","issue":"3","first_page":"330","last_page":"344"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11045","display_name":"Privacy, Security, and Data Protection","score":0.9878000020980835,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T12519","display_name":"Cybercrime and Law Enforcement Studies","score":0.972000002861023,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/coping","display_name":"Coping (psychology)","score":0.5084606409072876},{"id":"https://openalex.org/keywords/information-security","display_name":"Information security","score":0.482401967048645},{"id":"https://openalex.org/keywords/regret","display_name":"Regret","score":0.4796077013015747},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.4732896685600281},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.461407333612442},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.4499446451663971},{"id":"https://openalex.org/keywords/software-security-assurance","display_name":"Software security assurance","score":0.4391454756259918},{"id":"https://openalex.org/keywords/mobile-device","display_name":"Mobile device","score":0.4387727379798889},{"id":"https://openalex.org/keywords/personally-identifiable-information","display_name":"Personally identifiable information","score":0.4262789189815521},{"id":"https://openalex.org/keywords/threat-model","display_name":"Threat model","score":0.42007237672805786},{"id":"https://openalex.org/keywords/information-privacy","display_name":"Information privacy","score":0.41098713874816895},{"id":"https://openalex.org/keywords/knowledge-management","display_name":"Knowledge management","score":0.32382678985595703},{"id":"https://openalex.org/keywords/psychology","display_name":"Psychology","score":0.2265893816947937},{"id":"https://openalex.org/keywords/security-service","display_name":"Security service","score":0.20438534021377563},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.11616060137748718}],"concepts":[{"id":"https://openalex.org/C73282008","wikidata":"https://www.wikidata.org/wiki/Q1759895","display_name":"Coping (psychology)","level":2,"score":0.5084606409072876},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.482401967048645},{"id":"https://openalex.org/C50817715","wikidata":"https://www.wikidata.org/wiki/Q79895177","display_name":"Regret","level":2,"score":0.4796077013015747},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.4732896685600281},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.461407333612442},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.4499446451663971},{"id":"https://openalex.org/C62913178","wikidata":"https://www.wikidata.org/wiki/Q7554361","display_name":"Software security assurance","level":4,"score":0.4391454756259918},{"id":"https://openalex.org/C186967261","wikidata":"https://www.wikidata.org/wiki/Q5082128","display_name":"Mobile device","level":2,"score":0.4387727379798889},{"id":"https://openalex.org/C169093310","wikidata":"https://www.wikidata.org/wiki/Q3702971","display_name":"Personally identifiable information","level":2,"score":0.4262789189815521},{"id":"https://openalex.org/C140547941","wikidata":"https://www.wikidata.org/wiki/Q7797194","display_name":"Threat model","level":2,"score":0.42007237672805786},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.41098713874816895},{"id":"https://openalex.org/C56739046","wikidata":"https://www.wikidata.org/wiki/Q192060","display_name":"Knowledge management","level":1,"score":0.32382678985595703},{"id":"https://openalex.org/C15744967","wikidata":"https://www.wikidata.org/wiki/Q9418","display_name":"Psychology","level":0,"score":0.2265893816947937},{"id":"https://openalex.org/C29983905","wikidata":"https://www.wikidata.org/wiki/Q7445066","display_name":"Security service","level":3,"score":0.20438534021377563},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.11616060137748718},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.0},{"id":"https://openalex.org/C118552586","wikidata":"https://www.wikidata.org/wiki/Q7867","display_name":"Psychiatry","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1108/ics-04-2016-0027","is_oa":false,"landing_page_url":"https://doi.org/10.1108/ics-04-2016-0027","pdf_url":null,"source":{"id":"https://openalex.org/S4210195545","display_name":"Information and Computer Security","issn_l":"2056-4961","issn":["2056-4961","2056-497X"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319811","host_organization_name":"Emerald Publishing Limited","host_organization_lineage":["https://openalex.org/P4310319811"],"host_organization_lineage_names":["Emerald Publishing Limited"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Information &amp; Computer Security","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320321630","display_name":"Dalian University of Technology","ror":"https://ror.org/023hj5876"},{"id":"https://openalex.org/F4320321851","display_name":"Fudan University","ror":"https://ror.org/013q1eq08"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":53,"referenced_works":["https://openalex.org/W130442676","https://openalex.org/W1489771250","https://openalex.org/W1525940261","https://openalex.org/W1545612752","https://openalex.org/W1602619638","https://openalex.org/W1607499614","https://openalex.org/W1756431552","https://openalex.org/W1863383349","https://openalex.org/W1963803712","https://openalex.org/W1964088509","https://openalex.org/W1969785126","https://openalex.org/W1970778069","https://openalex.org/W1970809283","https://openalex.org/W1977353849","https://openalex.org/W1987381312","https://openalex.org/W2008068229","https://openalex.org/W2016368325","https://openalex.org/W2022122406","https://openalex.org/W2024488177","https://openalex.org/W2025829466","https://openalex.org/W2033213440","https://openalex.org/W2038785677","https://openalex.org/W2041032079","https://openalex.org/W2043299220","https://openalex.org/W2046274577","https://openalex.org/W2062429640","https://openalex.org/W2065942229","https://openalex.org/W2080025282","https://openalex.org/W2080575891","https://openalex.org/W2098589680","https://openalex.org/W2099647042","https://openalex.org/W2101179869","https://openalex.org/W2116305749","https://openalex.org/W2119407118","https://openalex.org/W2119587968","https://openalex.org/W2128620298","https://openalex.org/W2131703669","https://openalex.org/W2132142813","https://openalex.org/W2132323118","https://openalex.org/W2134584038","https://openalex.org/W2134705948","https://openalex.org/W2135342025","https://openalex.org/W2136511435","https://openalex.org/W2140975169","https://openalex.org/W2143002484","https://openalex.org/W2143835575","https://openalex.org/W2151553414","https://openalex.org/W2152542656","https://openalex.org/W2156438052","https://openalex.org/W2163241745","https://openalex.org/W2171149071","https://openalex.org/W2286299045","https://openalex.org/W4251147371"],"related_works":["https://openalex.org/W4360994451","https://openalex.org/W2104846611","https://openalex.org/W3110295089","https://openalex.org/W2187635982","https://openalex.org/W2062313296","https://openalex.org/W2805623533","https://openalex.org/W3026169053","https://openalex.org/W2105179211","https://openalex.org/W2181627506","https://openalex.org/W2072442316"],"abstract_inverted_index":{"Purpose":[0],"Recently,":[1],"the":[2,19,31,77,102,119,123,146,168,221,247,258,266],"spread":[3],"of":[4,22,36,66,83,156,177,194,262],"malicious":[5],"IT":[6],"has":[7],"been":[8],"causing":[9],"serious":[10],"privacy":[11,32,109,128],"threats":[12],"to":[13,43,55,75,100,121,135,162,166,179,196,209,235],"mobile":[14,23,37,61,137,222],"device":[15,38,62,138],"users,":[16,39],"which":[17],"hampers":[18],"efficient":[20],"use":[21],"devices":[24],"for":[25,257],"individual":[26],"and":[27,90,111,141,185,201,240],"business.":[28],"To":[29],"understand":[30],"security":[33,67,124,129,169,182,199,223,242,268],"assurance":[34],"behavior":[35],"this":[40],"study":[41,261],"aims":[42],"develop":[44],"a":[45,115,132,192,253],"theoretical":[46],"model":[47],"based":[48],"on":[49,118],"technology":[50],"threat":[51,140],"avoidance":[52],"theory":[53,219],"(TTAT),":[54],"capture":[56,236],"motivation":[57],"factors":[58],"in":[59,145,191,265],"predicting":[60],"user\u2019s":[63,139],"voluntary":[64,147],"adoption":[65],"defensive":[68,125],"software.":[69,126],"Design/methodology/approach":[70],"A":[71,81],"survey":[72,86],"is":[73,98,131,159,244],"conducted":[74],"validate":[76],"proposed":[78],"research":[79],"model.":[80,103],"total":[82],"284":[84],"valid":[85],"data":[87],"are":[88],"collected":[89],"partial":[91],"least":[92],"square":[93],"(PLS)-based":[94],"structural":[95],"equation":[96],"modeling":[97],"used":[99],"test":[101],"Findings":[104],"Results":[105],"highlight":[106],"that":[107,152],"both":[108],"concern":[110],"coping":[112,142,154,238],"appraisal":[113,143,155],"have":[114],"significant":[116],"impact":[117],"intention":[120,165],"adopt":[122,167],"Meanwhile,":[127],"awareness":[130,183,243],"crucial":[133],"determinant":[134],"stimulate":[136],"processes":[144],"context.":[148,224,269],"The":[149,225,250],"results":[150],"indicate":[151],"emotional-based":[153,237],"anticipated":[157,231],"regret":[158,232],"also":[160],"imperative":[161],"arouse":[163,210],"personal":[164,198],"tool.":[170],"Practical":[171],"implications":[172],"This":[173,215],"result":[174],"should":[175,188],"be":[176,189,207],"interest":[178],"practitioners.":[180],"Information":[181],"training":[184],"education":[186],"programs":[187],"developed":[190],"variety":[193],"forms":[195],"intensify":[197],"knowledge":[200],"skills.":[202],"Besides,":[203],"emotion-based":[204],"warnings":[205],"can":[206],"designed":[208],"users\u2019":[211],"protection":[212],"behavior.":[213],"Originality/value":[214],"paper":[216],"embeds":[217],"TTAT":[218,228],"within":[220],"authors":[226],"extent":[227,251],"by":[229],"taking":[230],"into":[233],"consideration":[234],"appraisal,":[239],"information":[241,267],"employed":[245],"as":[246],"antecedent":[248],"factor.":[249],"offers":[252],"useful":[254],"starting":[255],"point":[256],"further":[259],"empirical":[260],"emotion":[263],"elements":[264]},"counts_by_year":[{"year":2026,"cited_by_count":2},{"year":2025,"cited_by_count":8},{"year":2024,"cited_by_count":7},{"year":2023,"cited_by_count":5},{"year":2022,"cited_by_count":7},{"year":2021,"cited_by_count":11},{"year":2020,"cited_by_count":6},{"year":2019,"cited_by_count":4},{"year":2018,"cited_by_count":1}],"updated_date":"2026-03-27T14:29:43.386196","created_date":"2025-10-10T00:00:00"}
