Slide title In CAPITALS 50 pt Slide subtitle 32 pt Consumers’ Awareness of, Attitudes Towards and Adoption of Mobile Phone Security Stewart Kowalski, Ericsson Research Mikael Goldstein, migoli
Top right corner for field-mark, customer or partner logotypes. See Best practice for example. Slide title 40 pt Slide subtitle 24 pt Text 24 pt Bullets level pt © Ericsson AB Technology adoption Theory and Practice Sample N= 97
Top right corner for field-mark, customer or partner logotypes. See Best practice for example. Slide title 40 pt Slide subtitle 24 pt Text 24 pt Bullets level pt © Ericsson AB SIM card Phone lock Enter Phone Lock Code Enter PIN Code
Top right corner for field-mark, customer or partner logotypes. See Best practice for example. Slide title 40 pt Slide subtitle 24 pt Text 24 pt Bullets level pt © Ericsson AB Biometric authentication: Finger print scanner
Top right corner for field-mark, customer or partner logotypes. See Best practice for example. Slide title 40 pt Slide subtitle 24 pt Text 24 pt Bullets level pt © Ericsson AB Adoption of security (PIN and Phone Lock) Pin Phone Lock
Top right corner for field-mark, customer or partner logotypes. See Best practice for example. Slide title 40 pt Slide subtitle 24 pt Text 24 pt Bullets level pt © Ericsson AB Inferential Statistics Gender affects Pin code adoption –Female significantly higher Subscription Type affects security adoption –Subscribers significantly higher protection rate Perceived ease of use affects security adoption –Usability security adoption Age affect perceived usefulness for biometrics –Older user significantly higher
Top right corner for field-mark, customer or partner logotypes. See Best practice for example. Slide title 40 pt Slide subtitle 24 pt Text 24 pt Bullets level pt © Ericsson AB A is a Prerequisite for 3G Security
Top right corner for field-mark, customer or partner logotypes. See Best practice for example. Slide title 40 pt Slide subtitle 24 pt Text 24 pt Bullets level pt © Ericsson AB Discussion of Findings Security functionality adoptions differs from technology adoption –Early adaptors appear less interest in security than laggards Acceptance and adoption models –Acceptance not equal to believe Service vs product adoptions needs more study –Are security functions perceived as a services in a product ?
Top right corner for field-mark, customer or partner logotypes. See Best practice for example. Slide title 40 pt Slide subtitle 24 pt Text 24 pt Bullets level pt © Ericsson AB