|
| Mean | SD |
|
Being aware of developers of the applications and their repositories | 3.60 | 1.30 |
I check the developers of the applications I install | 3.23 | 1.37 |
I install applications only from official repositories such as App Store and Play Store | 3.97 | 1.22 |
|
Being aware of EULA and resources that an application can access | 3.16 | 1.36 |
I read the end-user license agreement (EULA) of my applications | 2.65 | 1.42 |
I pay attention to what my applications can access, run, and activate on my mobile | 3.66 | 1.31 |
|
Being aware of smartphone user responsibilities | 3.29 | 1.28 |
In case of an unpermitted use, it is enough to say “someone else has done it” | 2.67 | 1.26 |
The government protects me, I do not have to take any additional precaution | 2.58 | 1.21 |
The service provider is responsible for cybersecurity | 2.88 | 1.37 |
|
Being aware of risks of uncontrolled Internet connections | 2.82 | 1.48 |
My GSM data connection is not always on | 2.66 | 1.45 |
I do not use open Wi-Fi connections in public places | 2.97 | 1.51 |
|
Being aware of risks of storing credentials on smartphones | 3.08 | 1.49 |
I do not store my credentials on the smartphone for financial applications (I have to enter my credentials each time I use the application) | 3.55 | 1.47 |
My social media accounts are not always on (I have to enter my PW each time I get connected) | 2.61 | 1.51 |
|
Being aware of technical measures | 3.07 | 1.42 |
I encrypt my files stored on smartphones | 2.88 | 1.34 |
I use antivirus programs | 3.27 | 1.49 |
|