Table 4: Awareness levels.


Being aware of developers of the applications and their repositories3.601.30
I check the developers of the applications I install3.231.37
I install applications only from official repositories such as App Store and Play Store3.971.22

Being aware of EULA and resources that an application can access3.161.36
I read the end-user license agreement (EULA) of my applications2.651.42
I pay attention to what my applications can access, run, and activate on my mobile3.661.31

Being aware of smartphone user responsibilities3.291.28
In case of an unpermitted use, it is enough to say “someone else has done it”2.671.26
The government protects me, I do not have to take any additional precaution2.581.21
The service provider is responsible for cybersecurity2.881.37

Being aware of risks of uncontrolled Internet connections2.821.48
My GSM data connection is not always on2.661.45
I do not use open Wi-Fi connections in public places2.971.51

Being aware of risks of storing credentials on smartphones3.081.49
I do not store my credentials on the smartphone for financial applications (I have to enter my credentials each time I use the application)3.551.47
My social media accounts are not always on (I have to enter my PW each time I get connected)2.611.51

Being aware of technical measures3.071.42
I encrypt my files stored on smartphones2.881.34
I use antivirus programs3.271.49