Download presentation
Presentation is loading. Please wait.
Published byLesley Hines Modified over 9 years ago
1
Slide title In CAPITALS 50 pt Slide subtitle 32 pt Consumers’ Awareness of, Attitudes Towards and Adoption of Mobile Phone Security Stewart Kowalski, Ericsson Research Mikael Goldstein, migoli
2
Top right corner for field-mark, customer or partner logotypes. See Best practice for example. Slide title 40 pt Slide subtitle 24 pt Text 24 pt Bullets level 2-5 20 pt © Ericsson AB 20062006-03-172 Technology adoption Theory and Practice Sample N= 97
3
Top right corner for field-mark, customer or partner logotypes. See Best practice for example. Slide title 40 pt Slide subtitle 24 pt Text 24 pt Bullets level 2-5 20 pt © Ericsson AB 20062006-03-173 SIM card Phone lock Enter Phone Lock Code Enter PIN Code
4
Top right corner for field-mark, customer or partner logotypes. See Best practice for example. Slide title 40 pt Slide subtitle 24 pt Text 24 pt Bullets level 2-5 20 pt © Ericsson AB 20062006-03-174 Biometric authentication: Finger print scanner
5
Top right corner for field-mark, customer or partner logotypes. See Best practice for example. Slide title 40 pt Slide subtitle 24 pt Text 24 pt Bullets level 2-5 20 pt © Ericsson AB 20062006-03-175 Adoption of security (PIN and Phone Lock) Pin Phone Lock
6
Top right corner for field-mark, customer or partner logotypes. See Best practice for example. Slide title 40 pt Slide subtitle 24 pt Text 24 pt Bullets level 2-5 20 pt © Ericsson AB 20062006-03-176 Inferential Statistics Gender affects Pin code adoption –Female significantly higher Subscription Type affects security adoption –Subscribers significantly higher protection rate Perceived ease of use affects security adoption –Usability security adoption Age affect perceived usefulness for biometrics –Older user significantly higher
7
Top right corner for field-mark, customer or partner logotypes. See Best practice for example. Slide title 40 pt Slide subtitle 24 pt Text 24 pt Bullets level 2-5 20 pt © Ericsson AB 20062006-03-177 3A is a Prerequisite for 3G Security
8
Top right corner for field-mark, customer or partner logotypes. See Best practice for example. Slide title 40 pt Slide subtitle 24 pt Text 24 pt Bullets level 2-5 20 pt © Ericsson AB 20062006-03-178 Discussion of Findings Security functionality adoptions differs from technology adoption –Early adaptors appear less interest in security than laggards Acceptance and adoption models –Acceptance not equal to believe Service vs product adoptions needs more study –Are security functions perceived as a services in a product ?
9
Top right corner for field-mark, customer or partner logotypes. See Best practice for example. Slide title 40 pt Slide subtitle 24 pt Text 24 pt Bullets level 2-5 20 pt © Ericsson AB 20062006-03-179
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.