Research Article
Security Awareness Level of Smartphone Users: An Exploratory Case Study
Table 7
Awareness levels according to cybersecurity knowledge.
| IT security knowledge level | Have training | Have some knowledge | Have no knowledge |
| Being aware of developers of the applications and their repositories | 3.72 | 3.67 | 3.54 | Being aware of EULA and resources that an application can access | 3.49 | 3.14 | 2.95 | Being aware of smartphone user responsibilities | 3.40 | 3.35 | 3.24 | Being aware of risks of uncontrolled Internet connections | 3.38 | 2.65 | 2.60 | Being aware of risks of storing credentials on smartphones | 3.21 | 3.09 | 2.89 | Being aware of technical measures | 3.04 | 3.24 | 3.02 | Averages | 3.37 | 3.19 | 3.04 |
|
|