slide title in capitals 50 pt slide subtitle 32 pt consumers’ awareness of, attitudes towards and...
TRANSCRIPT
Slide titleIn CAPITALS
50 pt
Slide subtitle 32 pt
Consumers’ Awareness of, Attitudes Towards and Adoption of Mobile
Phone Security
Stewart Kowalski, Ericsson Research Mikael Goldstein, migoli
Top right corner for field-mark, customer or partner logotypes. See Best practice for example.
Slide title 40 pt
Slide subtitle 24 pt
Text 24 pt
Bullets level 2-520 pt
© Ericsson AB 2006 2006-03-172
Technology adoption Theory and Practice
LaggardsMajorityEarly adopters
Pe
rce
nt
100
90
80
70
60
50
40
30
20
10
0
46
37
16
Sample N= 97
Top right corner for field-mark, customer or partner logotypes. See Best practice for example.
Slide title 40 pt
Slide subtitle 24 pt
Text 24 pt
Bullets level 2-520 pt
© Ericsson AB 2006 2006-03-173
SIM card
Phone lock
Enter Phone Lock Code
EnterPIN Code
Top right corner for field-mark, customer or partner logotypes. See Best practice for example.
Slide title 40 pt
Slide subtitle 24 pt
Text 24 pt
Bullets level 2-520 pt
© Ericsson AB 2006 2006-03-174
Biometric authentication:Finger print scanner
Top right corner for field-mark, customer or partner logotypes. See Best practice for example.
Slide title 40 pt
Slide subtitle 24 pt
Text 24 pt
Bullets level 2-520 pt
© Ericsson AB 2006 2006-03-175
Adoption of security (PIN and Phone Lock)
NoYes
Pe
rce
nt
100
90
80
70
60
50
40
30
20
10
0
33
15
NoYes
Pe
rce
nt
100
90
80
70
60
50
40
30
20
10
0
14
82
Pin Phone Lock
Top right corner for field-mark, customer or partner logotypes. See Best practice for example.
Slide title 40 pt
Slide subtitle 24 pt
Text 24 pt
Bullets level 2-520 pt
© Ericsson AB 2006 2006-03-176
Inferential Statistics
Gender affects Pin code adoption– Female significantly higher
Subscription Type affects security adoption– Subscribers significantly higher protection rate
Perceived ease of use affects security adoption– Usability security adoption
Age affect perceived usefulness for biometrics– Older user significantly higher
Top right corner for field-mark, customer or partner logotypes. See Best practice for example.
Slide title 40 pt
Slide subtitle 24 pt
Text 24 pt
Bullets level 2-520 pt
© Ericsson AB 2006 2006-03-177
3A is a Prerequisite for 3G Security
Top right corner for field-mark, customer or partner logotypes. See Best practice for example.
Slide title 40 pt
Slide subtitle 24 pt
Text 24 pt
Bullets level 2-520 pt
© Ericsson AB 2006 2006-03-178
Discussion of Findings
Security functionality adoptions differs from technology adoption
– Early adaptors appear less interest in security than laggards
Acceptance and adoption models – Acceptance not equal to believe
Service vs product adoptions needs more study– Are security functions perceived as a services in a product ?
Top right corner for field-mark, customer or partner logotypes. See Best practice for example.
Slide title 40 pt
Slide subtitle 24 pt
Text 24 pt
Bullets level 2-520 pt
© Ericsson AB 2006 2006-03-179