{"id":"https://openalex.org/W2140085936","doi":"https://doi.org/10.1109/css.2011.6058568","title":"Ramifications of mobile phone advanced O/S on security perceptions and practices","display_name":"Ramifications of mobile phone advanced O/S on security perceptions and practices","publication_year":2011,"publication_date":"2011-09-01","ids":{"openalex":"https://openalex.org/W2140085936","doi":"https://doi.org/10.1109/css.2011.6058568","mag":"2140085936"},"language":"en","primary_location":{"id":"doi:10.1109/css.2011.6058568","is_oa":false,"landing_page_url":"https://doi.org/10.1109/css.2011.6058568","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2011 Third International Workshop on Cyberspace Safety and Security (CSS)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5058590187","display_name":"Iosif Androulidakis","orcid":"https://orcid.org/0000-0002-4241-0812"},"institutions":[{"id":"https://openalex.org/I4210113529","display_name":"Jo\u017eef Stefan International Postgraduate School","ror":"https://ror.org/01hdkb925","country_code":"SI","type":"education","lineage":["https://openalex.org/I4210113529"]}],"countries":["SI"],"is_corresponding":true,"raw_author_name":"Iosif Androulidakis","raw_affiliation_strings":["Jo\u017eef Stefan International Postgraduate School, Ljubljana, Slovenia"],"affiliations":[{"raw_affiliation_string":"Jo\u017eef Stefan International Postgraduate School, Ljubljana, Slovenia","institution_ids":["https://openalex.org/I4210113529"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5076909376","display_name":"Gorazd Kandus","orcid":null},"institutions":[{"id":"https://openalex.org/I3006985408","display_name":"Jo\u017eef Stefan Institute","ror":"https://ror.org/05060sz93","country_code":"SI","type":"facility","lineage":["https://openalex.org/I3006985408"]}],"countries":["SI"],"is_corresponding":false,"raw_author_name":"Gorazd Kandus","raw_affiliation_strings":["Department of Communication Systems, Jo\u017eef Stefan Institute, Ljubljana, Slovenia#TAB#"],"affiliations":[{"raw_affiliation_string":"Department of Communication Systems, Jo\u017eef Stefan Institute, Ljubljana, Slovenia#TAB#","institution_ids":["https://openalex.org/I3006985408"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5058590187"],"corresponding_institution_ids":["https://openalex.org/I4210113529"],"apc_list":null,"apc_paid":null,"fwci":2.7545,"has_fulltext":false,"cited_by_count":4,"citation_normalized_percentile":{"value":0.92573657,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":"26","issue":null,"first_page":"33","last_page":"38"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11045","display_name":"Privacy, Security, and Data Protection","score":0.995199978351593,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T11045","display_name":"Privacy, Security, and Data Protection","score":0.995199978351593,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9933000206947327,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9684000015258789,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/security-awareness","display_name":"Security awareness","score":0.8303991556167603},{"id":"https://openalex.org/keywords/feeling","display_name":"Feeling","score":0.7389947772026062},{"id":"https://openalex.org/keywords/mobile-phone","display_name":"Mobile phone","score":0.6819003224372864},{"id":"https://openalex.org/keywords/perception","display_name":"Perception","score":0.6698802709579468},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.61972975730896},{"id":"https://openalex.org/keywords/phone","display_name":"Phone","score":0.6176099181175232},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5065304040908813},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.4418785572052002},{"id":"https://openalex.org/keywords/psychology","display_name":"Psychology","score":0.4033251702785492},{"id":"https://openalex.org/keywords/information-security","display_name":"Information security","score":0.35944849252700806},{"id":"https://openalex.org/keywords/social-psychology","display_name":"Social psychology","score":0.2157905101776123},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.08315908908843994}],"concepts":[{"id":"https://openalex.org/C2778652015","wikidata":"https://www.wikidata.org/wiki/Q7445019","display_name":"Security awareness","level":3,"score":0.8303991556167603},{"id":"https://openalex.org/C122980154","wikidata":"https://www.wikidata.org/wiki/Q205555","display_name":"Feeling","level":2,"score":0.7389947772026062},{"id":"https://openalex.org/C2777421447","wikidata":"https://www.wikidata.org/wiki/Q17517","display_name":"Mobile phone","level":2,"score":0.6819003224372864},{"id":"https://openalex.org/C26760741","wikidata":"https://www.wikidata.org/wiki/Q160402","display_name":"Perception","level":2,"score":0.6698802709579468},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.61972975730896},{"id":"https://openalex.org/C2778707766","wikidata":"https://www.wikidata.org/wiki/Q202064","display_name":"Phone","level":2,"score":0.6176099181175232},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5065304040908813},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.4418785572052002},{"id":"https://openalex.org/C15744967","wikidata":"https://www.wikidata.org/wiki/Q9418","display_name":"Psychology","level":0,"score":0.4033251702785492},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.35944849252700806},{"id":"https://openalex.org/C77805123","wikidata":"https://www.wikidata.org/wiki/Q161272","display_name":"Social psychology","level":1,"score":0.2157905101776123},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.08315908908843994},{"id":"https://openalex.org/C169760540","wikidata":"https://www.wikidata.org/wiki/Q207011","display_name":"Neuroscience","level":1,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/css.2011.6058568","is_oa":false,"landing_page_url":"https://doi.org/10.1109/css.2011.6058568","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2011 Third International Workshop on Cyberspace Safety and Security (CSS)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":13,"referenced_works":["https://openalex.org/W24340373","https://openalex.org/W1489537150","https://openalex.org/W1507004422","https://openalex.org/W1605389154","https://openalex.org/W1995349596","https://openalex.org/W2000918345","https://openalex.org/W2006407062","https://openalex.org/W2139876174","https://openalex.org/W2171820049","https://openalex.org/W2277302656","https://openalex.org/W4229602251","https://openalex.org/W6630440915","https://openalex.org/W6694489533"],"related_works":["https://openalex.org/W185442532","https://openalex.org/W2966027630","https://openalex.org/W2086515904","https://openalex.org/W4313261984","https://openalex.org/W4304943319","https://openalex.org/W2166222264","https://openalex.org/W2968709340","https://openalex.org/W2544387082","https://openalex.org/W2099222119","https://openalex.org/W2888935944"],"abstract_inverted_index":{"The":[0],"present":[1],"paper":[2],"correlates":[3],"advanced":[4,79,115],"operating":[5],"systems":[6],"(O/S)":[7],"in":[8,31,104,179,185],"mobile":[9],"phones":[10,181],"to":[11,106,159,187],"the":[12,23,48,59,62,69,148,169,180,205,213],"security":[13,70,121,136,160,172,177],"perceptions":[14],"and":[15,37,45,68,73,86,137,156],"practices":[16,74],"of":[17,25,34,61,75,78,113,129,135,154,215],"users.":[18,76,131],"It":[19],"is":[20,53,109,123,182],"based":[21],"upon":[22],"results":[24,49],"a":[26,54,210],"survey":[27],"that":[28,51,112,128],"took":[29],"place":[30],"17":[32],"Universities":[33],"10":[35],"Eastern":[36],"Southern":[38],"Europe":[39],"countries.":[40],"7172":[41],"questionnaires":[42,217],"were":[43],"gathered":[44],"processed":[46],"with":[47,162,175],"showing":[50],"there":[52,192],"statistically":[55,91],"significant":[56],"connection":[57],"between":[58],"type":[60],"phone's":[63],"O/S":[64,80,116],"(advanced":[65],"or":[66],"not)":[67],"feeling,":[71],"awareness":[72,107,138,155],"Users":[77],"believe":[81],"they":[82,96],"are":[83,193],"more":[84,88,141],"informed":[85],"feel":[87,98],"secure":[89],"(both":[90],"proved).":[92],"Unfortunately,":[93],"even":[94,164],"though":[95],"subjectively":[97],"informed,":[99],"their":[100,119],"actual":[101,120],"objective":[102],"score":[103],"regards":[105,186],"questions":[108],"lower":[110],"than":[111,127,143],"non":[114],"users,":[117],"while":[118],"behavior,":[122],"just":[124],"slightly":[125],"better":[126],"other":[130],"This":[132],"false":[133],"sense":[134],"renders":[139],"them":[140],"vulnerable":[142],"others.":[144],"In":[145],"any":[146,196],"case,":[147],"overall":[149],"percentages":[150],"reveal":[151],"general":[152],"lack":[153],"moderate":[157],"attention":[158],"issues,":[161],"some":[163],"alarming":[165],"findings.":[166],"As":[167],"such,":[168],"need":[170],"for":[171,212,218],"education,":[173],"combined":[174],"transparent":[176],"features":[178],"apparent.":[183],"Furthermore,":[184],"this":[188],"specific":[189],"research":[190],"topic,":[191],"not":[194],"available":[195],"already":[197],"validated":[198],"questionnaires.":[199],"Our":[200],"research,":[201],"apart":[202],"from":[203],"revealing":[204],"situation,":[206],"aims":[207],"at":[208],"providing":[209],"basis":[211],"formulation":[214],"similar":[216],"future":[219],"use.":[220]},"counts_by_year":[{"year":2016,"cited_by_count":1},{"year":2014,"cited_by_count":1},{"year":2012,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
