{"id":"https://openalex.org/W3002248194","doi":"https://doi.org/10.1108/ics-04-2019-0041","title":"Cybersecurity behaviour of smartphone users in India: an empirical analysis","display_name":"Cybersecurity behaviour of smartphone users in India: an empirical analysis","publication_year":2020,"publication_date":"2020-01-02","ids":{"openalex":"https://openalex.org/W3002248194","doi":"https://doi.org/10.1108/ics-04-2019-0041","mag":"3002248194"},"language":"en","primary_location":{"id":"doi:10.1108/ics-04-2019-0041","is_oa":false,"landing_page_url":"https://doi.org/10.1108/ics-04-2019-0041","pdf_url":null,"source":{"id":"https://openalex.org/S4210195545","display_name":"Information and Computer Security","issn_l":"2056-4961","issn":["2056-4961","2056-497X"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319811","host_organization_name":"Emerald Publishing Limited","host_organization_lineage":["https://openalex.org/P4310319811"],"host_organization_lineage_names":["Emerald Publishing Limited"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Information &amp; Computer Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5054965223","display_name":"Pintu R. Shah","orcid":"https://orcid.org/0000-0003-1122-0618"},"institutions":[{"id":"https://openalex.org/I226983648","display_name":"Narsee Monjee Institute of Management Studies","ror":"https://ror.org/04qksbm30","country_code":"IN","type":"education","lineage":["https://openalex.org/I226983648"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"Pintu Shah","raw_affiliation_strings":["SVKM\u2019s NMIMS Mukesh Patel School of Technology Management and Engineering , Mumbai,","SVKM\u2019s NMIMS Mukesh Patel School of Technology Management and Engineering, Mumbai, India"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"SVKM\u2019s NMIMS Mukesh Patel School of Technology Management and Engineering , Mumbai,","institution_ids":["https://openalex.org/I226983648"]},{"raw_affiliation_string":"SVKM\u2019s NMIMS Mukesh Patel School of Technology Management and Engineering, Mumbai, India","institution_ids":["https://openalex.org/I226983648"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5045898700","display_name":"Anuja Agarwal","orcid":"https://orcid.org/0000-0003-0735-5587"},"institutions":[{"id":"https://openalex.org/I226983648","display_name":"Narsee Monjee Institute of Management Studies","ror":"https://ror.org/04qksbm30","country_code":"IN","type":"education","lineage":["https://openalex.org/I226983648"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Anuja Agarwal","raw_affiliation_strings":["SVKM\u2019s NMIMS Mukesh Patel School of Technology Management and Engineering , Mumbai,","SVKM\u2019s NMIMS Mukesh Patel School of Technology Management and Engineering, Mumbai, India"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"SVKM\u2019s NMIMS Mukesh Patel School of Technology Management and Engineering , Mumbai,","institution_ids":["https://openalex.org/I226983648"]},{"raw_affiliation_string":"SVKM\u2019s NMIMS Mukesh Patel School of Technology Management and Engineering, Mumbai, India","institution_ids":["https://openalex.org/I226983648"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5054965223"],"corresponding_institution_ids":["https://openalex.org/I226983648"],"apc_list":null,"apc_paid":null,"fwci":11.0108,"has_fulltext":false,"cited_by_count":47,"citation_normalized_percentile":{"value":0.98227316,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":96,"max":100},"biblio":{"volume":"28","issue":"2","first_page":"293","last_page":"318"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11045","display_name":"Privacy, Security, and Data Protection","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T11045","display_name":"Privacy, Security, and Data Protection","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.996999979019165,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/laptop","display_name":"Laptop","score":0.7502301931381226},{"id":"https://openalex.org/keywords/respondent","display_name":"Respondent","score":0.7138570547103882},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6523727178573608},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.542800784111023},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.5360280275344849},{"id":"https://openalex.org/keywords/empirical-research","display_name":"Empirical research","score":0.4894672632217407},{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.47629204392433167},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.46724700927734375},{"id":"https://openalex.org/keywords/test","display_name":"Test (biology)","score":0.43532076478004456},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.20336386561393738},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.08094236254692078}],"concepts":[{"id":"https://openalex.org/C2780008327","wikidata":"https://www.wikidata.org/wiki/Q3962","display_name":"Laptop","level":2,"score":0.7502301931381226},{"id":"https://openalex.org/C2776640315","wikidata":"https://www.wikidata.org/wiki/Q7315941","display_name":"Respondent","level":2,"score":0.7138570547103882},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6523727178573608},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.542800784111023},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.5360280275344849},{"id":"https://openalex.org/C120936955","wikidata":"https://www.wikidata.org/wiki/Q2155640","display_name":"Empirical research","level":2,"score":0.4894672632217407},{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.47629204392433167},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.46724700927734375},{"id":"https://openalex.org/C2777267654","wikidata":"https://www.wikidata.org/wiki/Q3519023","display_name":"Test (biology)","level":2,"score":0.43532076478004456},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.20336386561393738},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.08094236254692078},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0},{"id":"https://openalex.org/C151730666","wikidata":"https://www.wikidata.org/wiki/Q7205","display_name":"Paleontology","level":1,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C105795698","wikidata":"https://www.wikidata.org/wiki/Q12483","display_name":"Statistics","level":1,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1108/ics-04-2019-0041","is_oa":false,"landing_page_url":"https://doi.org/10.1108/ics-04-2019-0041","pdf_url":null,"source":{"id":"https://openalex.org/S4210195545","display_name":"Information and Computer Security","issn_l":"2056-4961","issn":["2056-4961","2056-497X"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319811","host_organization_name":"Emerald Publishing Limited","host_organization_lineage":["https://openalex.org/P4310319811"],"host_organization_lineage_names":["Emerald Publishing Limited"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Information &amp; Computer Security","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Gender equality","score":0.5099999904632568,"id":"https://metadata.un.org/sdg/5"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":48,"referenced_works":["https://openalex.org/W20182383","https://openalex.org/W23134535","https://openalex.org/W194527685","https://openalex.org/W1856642343","https://openalex.org/W1964451859","https://openalex.org/W1970174926","https://openalex.org/W1977353849","https://openalex.org/W1993966938","https://openalex.org/W2009661351","https://openalex.org/W2010902645","https://openalex.org/W2017836055","https://openalex.org/W2021124779","https://openalex.org/W2021647714","https://openalex.org/W2046622454","https://openalex.org/W2048584594","https://openalex.org/W2061935394","https://openalex.org/W2066565675","https://openalex.org/W2079313953","https://openalex.org/W2080940090","https://openalex.org/W2086040578","https://openalex.org/W2106086187","https://openalex.org/W2111210326","https://openalex.org/W2139876174","https://openalex.org/W2152400487","https://openalex.org/W2175678614","https://openalex.org/W2226744499","https://openalex.org/W2258098469","https://openalex.org/W2291908370","https://openalex.org/W2296016106","https://openalex.org/W2296826588","https://openalex.org/W2344362591","https://openalex.org/W2474818065","https://openalex.org/W2533763009","https://openalex.org/W2547074824","https://openalex.org/W2610939075","https://openalex.org/W2754034122","https://openalex.org/W2766927947","https://openalex.org/W2767487258","https://openalex.org/W2800634617","https://openalex.org/W3122318885","https://openalex.org/W4232964083","https://openalex.org/W6603866626","https://openalex.org/W6607834695","https://openalex.org/W6674559729","https://openalex.org/W6675297653","https://openalex.org/W6718397491","https://openalex.org/W6744157848","https://openalex.org/W6939595394"],"related_works":["https://openalex.org/W2323028880","https://openalex.org/W2149928749","https://openalex.org/W4255382767","https://openalex.org/W2125567354","https://openalex.org/W2787177649","https://openalex.org/W2785012844","https://openalex.org/W2397135192","https://openalex.org/W2627064428","https://openalex.org/W2415288834","https://openalex.org/W2886600579"],"abstract_inverted_index":{"Purpose":[0],"For":[1],"a":[2,142,317,448],"good":[3,213],"number":[4,380],"of":[5,39,49,64,83,98,111,119,144,150,164,174,185,220,226,233,245,285,298,312,336,364,381,390,399,410,421,429,442,451],"Indians,":[6],"their":[7,10,289,307,346,356],"smartphone":[8,69,99,112,160,228,382,408,422,443,466],"is":[9,88,105,124,367,373,433],"first":[11,435],"digital":[12],"computing":[13],"device.":[14],"They":[15],"have":[16,43,217,238],"less":[17,27],"experience":[18,28],"in":[19,29,101,114,121,320,328,384,424,445],"dealing":[20],"with":[21,182,197,316],"the":[22,46,66,81,92,108,117,133,165,172,192,208,221,227,231,246,262,302,313,323,342,362,365,370,378,397,427,430,434,452],"Internet-enabled":[23,56],"device":[24,290,308],"and":[25,61,95,139,154,178,253,265,267,278,291,301,309,322,349,359,361,403,455,463],"hence":[26],"handling":[30,50],"security":[31,52,76,96,109,224,248],"threats":[32,53],"like":[33],"malware":[34],"as":[35,59,78,116,230,251,271,340,353,375],"compared":[36,79,376],"to":[37,74,80,90,158,170,190,287,304,306,355,377,437,470],"users":[38,100,113,383,409,423,444,467],"other":[40,55],"countries":[41],"who":[42],"gone":[44],"through":[45,141],"learning":[47],"curve":[48],"such":[51,58,229,250,270,439],"using":[54],"devices":[57],"laptop":[60],"desktop.":[62],"Because":[63],"this,":[65],"inexperienced":[67],"Indian":[68],"user":[70],"may":[71,393],"be":[72,394],"vulnerable":[73],"Internet-related":[75],"breaches,":[77],"citizens":[82],"developed":[84],"economies.":[85],"Hence,":[86],"it":[87],"essential":[89],"understand":[91,171],"attitude,":[93],"behaviour":[94,110,264,420],"practices":[97,140,155,266,350,360],"India.":[102,127,385,411,425],"Limited":[103],"research":[104,120],"available":[106],"about":[107,345,418],"India":[115,446],"majority":[118],"this":[122,130,329,337,391,432],"domain":[123],"done":[125,169],"outside":[126],"Design/methodology/approach":[128],"In":[129],"empirical":[131],"study,":[132],"researchers":[134],"identified":[135,151,459],"28":[136,460],"cybersecurity":[137,152,176,214,263,347,401,419,453,461],"behaviours":[138,153,177,348,358,454,462],"survey":[143,149],"relevant":[145],"literature.":[146],"An":[147],"online":[148],"was":[156,168,200],"administered":[157],"300":[159],"users.":[161],"Frequency":[162],"analysis":[163,196,315],"respondent":[166],"data":[167,441],"adoption":[173],"recommended":[175],"practices.":[179,456],"Pearson\u2019s":[180],"chi-square":[181],"5%":[183],"level":[184,284,297],"significance":[186],"has":[187],"been":[188],"used":[189],"test":[191],"hypotheses.":[193],"Post":[194],"hoc":[195],"Bonferroni":[198],"correction":[199],"conducted":[201],"for":[202,396,406,447],"statistically":[203],"significant":[204,257],"associations.":[205],"Findings":[206],"Overall,":[207],"respondents":[209,237],"did":[210],"not":[211,239,243],"exhibit":[212],"behaviour.":[215],"Respondents":[216,281],"adopted":[218,240],"some":[219],"most":[222],"popular":[223],"features":[225],"use":[232],"screen":[234],"lock.":[235],"However,":[236],"or":[241],"are":[242,325,339],"aware":[244],"technical":[247],"controls":[249],"encryption":[252],"remote":[254],"wipe.":[255],"Statistically":[256],"differences":[258],"were":[259,351],"found":[260],"between":[261],"independent":[268],"variables":[269],"gender,":[272],"age,":[273],"mobile":[274],"operating":[275],"system":[276],"(OS)":[277],"mother":[279],"tongue.":[280],"reported":[282,295,327],"high":[283],"motivation":[286],"protect":[288,305],"data,":[292],"whereas":[293],"they":[294],"moderate":[296],"threat":[299],"awareness":[300],"ability":[303],"data.":[310],"Results":[311],"comparative":[314],"similar":[318],"study":[319,338,366,392,414,436,458],"China":[321],"USA":[324],"also":[326],"study.":[330],"Research":[331],"limitations/implications":[332],"The":[333,388],"main":[334],"limitations":[335],"follows:":[341],"respondents'":[343],"perceptions":[344],"measured":[352],"opposed":[354],"actual":[357],"generalizability":[363],"limited":[368],"because":[369],"sample":[371],"size":[372],"small":[374],"total":[379],"Practical":[386],"implications":[387],"findings":[389],"useful":[395],"design":[398],"effective":[400],"prevention":[402],"intervention":[404],"programs":[405],"general":[407],"Originality/value":[412],"This":[413,457],"provides":[415],"an":[416],"insight":[417],"To":[426],"knowledge":[428],"researchers,":[431],"collect":[438],"quantitative":[440],"better":[449],"understanding":[450],"practices,":[464],"which":[465],"should":[468],"follow":[469],"improve":[471],"cybersecurity.":[472]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":7},{"year":2024,"cited_by_count":9},{"year":2023,"cited_by_count":16},{"year":2022,"cited_by_count":3},{"year":2021,"cited_by_count":8},{"year":2020,"cited_by_count":3}],"updated_date":"2026-05-05T08:41:31.759640","created_date":"2025-10-10T00:00:00"}
