Research Article
BibTex RIS Cite

Üniversite Öğrencilerinin Akıllı Telefon Güvenlik Önlemleri Davranışlarının İncelenmesi

Year 2025, Volume: 33 Issue: 3, 535 - 546, 25.07.2025
https://doi.org/10.24106/kefdergi.1748618

Abstract

Çalışmanın amacı: Bu çalışmanın amacı akıllı telefon kullanıcılarının önemli yüzdesini oluşturan 18-24 yaş grubunun akıllı telefon kullanırken gösterdikleri güvenlik önlemleri davranışlarını ortaya çıkarmaktır. Bu çalışmada diğer çalışmalardan farklı olarak güvenlik önlemleri davranışları akıllı telefon ayarları ve eklenti yardımcı programları ile koruma, zararlı davranış ve uygulamalardan kaçınarak koruma ve önleyici davranış ve uygulamalar ile koruma olmak üzere üç yaklaşımla incelenmiştir.
Materyal ve Yöntem: Bu araştırmanın yöntemi nicel araştırmadır. Tarama modellerinden biri olan betimsel tarama modeli kullanılmıştır. Araştırmanın verileri Ankara’daki dört devlet üniversitesinde (Ankara Üniversitesi, Ankara Yıldırım Beyazıt Üniversitesi, Gazi Üniversitesi ve Orta Doğu Teknik Üniversitesi) 2024-2025 öğretim yılı güz döneminde öğrenim gören 320 üniversite öğrencisinden toplanmıştır. Bu çalışmanın veri toplama aracı üç bölümden oluşan ankettir. Ankette demografik bilgileri toplamaya yönelik sorular ile üç yaklaşım ile düzenlenmiş 17 akıllı telefon güvenlik davranışı için maddeler bulunmaktadır. Verilerin analizi için IBM SPSS 30.0 programı kullanılmıştır. Bu çalışmada elde edilen verilerin analizinde betimsel istatistiklerden sıklık (frekans) ve yüzde (%) kullanılmıştır.
Bulgular: Bu çalışma sonucunda Android’in, kullanıcıların akıllı telefonlarında kullandıkları en popüler işletim sistemi olduğu görülmüştür. Çalışmada kullanıcıların akıllı telefonunlarının kaybolması veya çalınması durumunda uzaktan veri silme işlemine ayarlı olmadığı ve kullanmadıkları zamanlarda kablosuz bağlantı alanlarının açık olduğu görülmüştür. Kullanıcılar akıllı telefonlarında kullanıcı adlarını ve şifrelerini akıllı telefonlarında saklamaktadır. Ayrıca antivirüs ya da güvenlik yazılımları telefonlarında yüklü olmayıp telefonlarının yedek kopyasını da almadıklarını belirtmişlerdir. Kullanıcıların akıllı telefonlarına yeni bir uygulama yüklerken veya kullanırken lisans sözleşmelerini ve güvenlik mesajlarını okumadıkları da görülmüştür. Diğer taraftan kullanıcılar telefonlarındaki verileri korumak için şifreleme ve ekran kilidi kullanmaktadırlar. Kullanıcılar akıllı telefonlarına yasadışı veya izinsiz yazılım yüklememekte ve akıllı telefonları ile bilinmeyen e-postalardaki ekleri de indirmemektedirler.
Önemli Vurgular: Kullanıcıların önleyici davranış ve uygulamalar ile akıllı telefonlarını nasıl koruyacakları konusunda eğitim ve desteğe ihtiyaçları olduğu görülmüştür. Aynı şekilde telefon ayarları ve eklenti yardımcı programları hakkında da bilgilendirilmeleri gerekmektedir. Diğer taraftan kullanıcılar zararlı davranış ve uygulamalardan kaçınarak akıllı telefonlarını korumaya yönelik güvenlik davranışları uygun biçimdedir.

References

  • Allam, S., Flowerday, S. V., & Flowerday, E. (2014). Smartphone information security awareness: A victim of operational pressures. Computers & Security, 42, 56-65.
  • Androulidakis, I., & Kandus, G. (2011). Mobile phone brand categorization vs. users' security practices. Engineering, Technology & Applied Science Research, 1(2), 30-35.
  • Alkindi, Z.R., Sarrab, M. and Alzeidi, N. (2021). User privacy and data flow control for android apps: a systematic literature review. Journal of Cyber Security and Mobility, 10, 261-304. https://doi.org/10.13052/jcsm2245-1439.1019.
  • Bagga, T., Sodhi, J., Shukla, B., & Qazi, M. (2017). Smartphone security behaviour of the Indian smartphone user. Man In India, 97(24), 333-344.
  • Breitinger, F., Tully-Doyle, R., & Hassenfeldt, C. (2020). A survey on smartphone user’s security choices, awareness and education. Computers & Security, 88, 101647.
  • Chin, A., Jones, B., & Little, P. (2021). A comparative analysis of smartphone security behaviours and practices. International Journal of Education and Development using Information and Communication Technology, 17(3), 57-80.
  • Das, A., & Khan, H. U. (2016). Security behaviours of smartphone users. Information & Computer Security, 24(1), 116-134.
  • Dierks, Z. (2023). Forecast of the smartphone user penetration rate in Turkey 2018-2024. https://www.statista.com/statistics/568281/predicted-smartphone-user-penetration-rate-in-turkey/#:~:text=Smartphone%20usage%20in%20Turkey,million%20smartphone%20users%20in%20Turkey, Erişim Tarihi: 07.11.2024.
  • Egan, G., Haley, K., Mckinney, D., Millington, T., Mulcahy, J., Parsons, T., … Hittel, S. (2012). Internet security threat report. Technical Report. April.
  • ENISA: European Union Agency for Network and Information Security (2010). Smartphone security: information security risks, opportunities and recommendations for users. http://www.enisa.europa.eu/activities/identity-and-trust/risks-and-data-breaches/smartphones-information-security-risks-opportunities-and-recommendations-for-users/at_download/fullReport, Erişim Tarihi: 10.11.2024.
  • Erdoğan, E., & Coşar, M. (2024). Akıllı telefon uygulamalarının kullanıcı bazlı siber güvenlik farkındalığı. Journal of Management Theory and Practices Research, 5(1), 15-33.
  • Farshidfar, N., & Hamedani, S. (2020). The potential role of smartphone-based microfluidic systems for rapid detection of COVID-19 using saliva specimen. Molecular Diagnosis & Therapy, 24(4), 371-373.
  • FCC: Federal Communications Commission (2015). FCC Smartphone security checker. https://www.fcc.gov/smartphone-security, Erişim Tarihi: 15.11.2024.
  • Fidan, M. (2019), Development of a scale for university students Facebook use purposes and an examination in terms of their Facebook use profiles. International Journal of Education and Development using Information and Communication Technology, 15(4), 132-150.
  • Ganesh, A., Sahu, P., Nair, S., & Chand, P. (2020). A smartphone-based e-consult in addiction medicine: An initiative in COVID lockdown. Asian Journal of Psychiatry, 51, 102120.
  • Goni, I., Gumpy, J.M., Maigari, T.U. & Mohammad, M. (2020). Cybersecurity and cyber forensics: machine learning approach systematic review. Semiconductor Science and Information Devices, 2, 25-29. https://doi.org/10.30564/ssid.v2i2.2495.
  • Harris, M. A., Patten, K., & Regan, E. (2013). The need for BYOD mobile device security awareness and training. Proceedings of the Nineteenth Americas Conference on Information Systems, Chicago, Illinois, USA.
  • He, W. (2013). A survey of security risks of mobile social media through blog mining and an extensive literature search. Information Management & Computer Security, 21(5), 381-400.
  • Howarth, J. (2024). How Many People Own Smartphones? (2024-2029). https://explodingtopics.com/blog/smartphone-stats, Erişim Tarihi: 10.11.2024.
  • InfoSecurity, 2012. Most users have not installed security software on their smartphones, survey finds. https://www.infosecurity-magazine.com/news/most-users-have-not-installed-security-software/, Erişim Tarihi: 15.11.2024.
  • Jones, B. H., & Chin, A. G. (2015). On the efficacy of smartphone security: A critical analysis of modifications in business students’ practices over time. International Journal of Information Management, 35(5), 561-571.
  • Jones, B. H., & Heinrichs, L. R. (2012). Do business students practice smartphone security? Journal of Computer Information Systems, 53, (2), 22-30.
  • Kanali, N. (2016). 63% of consumers globally don’t license agreement when installing new apps on their devices. https://techtrendske.co.ke/2016/05/05/63-of-consumers-globally-dont-license-agreement-when-installing-new-apps-on-their-devices/, Erişim Tarihi: 20.11.2024.
  • Kaspersky. (2024). Attacks on mobile devices significantly increase in 2023. https://www.kaspersky.com/about/press-releases/attacks-on-mobile-devices-significantly-increase-in-2023, Erişim Tarihi: 20.11.2024.
  • Kim, H. (2017). Statistical notes for clinical researchers: Chi-squared test and Fisher’s exact test. Restorative Dentistry & Endodontics, 42, 152-155.
  • Koyuncu, M., & Pusatli, T. (2019). Security awareness level of smartphone users: An exploratory case study. Mobile Information Systems, 1-11.
  • Knapova, L., Kruzikova, A., Dedkova, L., & Smahel, D. (2021). Who Is smart with their smartphones? Determinants of smartphone security behaviour. Cyberpsychology, Behaviour, and Social Networking, 24(9), 584-592.
  • Laricchia, F. (2024). Smartphones - statistics & facts. https://www.statista.com/topics/840/smartphones/#topicOverview, Erişim Tarihi: 20.11.2024.
  • Lawton, G. (2008). Is it finally time to worry about mobile malware? Computer, 41(5):1214.
  • Lazou, A., & Weir, G. R. (2011). Perceived risk and sensitive data on mobile devices. Cyberforensics: Issue and Perspectives, 183–196.
  • Mansfield-Devine, S. (2012). Paranoid Android: just how insecure is the most popular mobile platform? Network Security, 2012(9), 5-10.
  • Markelj, B., & Bernik, I. (2015). Safe use of mobile devices arises from knowing the threats. Journal Of Information Security And Applications, 20, 84-89.
  • Muhammad, Z., Anwar, Z., Javed, A. R., Saleem, B., Abbas, S., & Gadekallu, T. R. (2023). Smartphone security and privacy: a survey on apts, sensor-based attacks, side-channel attacks, Google Play attacks, and defenses. Technologies, 11(3), 76.
  • Mylonas, A., Kastania, A., & Gritzalis, D. (2013). Delegate the smartphone user? Security awareness in smartphone platforms. Computers & Security, 34, 47-66.
  • Ophoff, J., & Robinson, M. (2014, August). Exploring end-user smartphone security awareness within a South African context. In 2014 Information Security for South Africa, South Africa.
  • Park, M. J. (2016). Mobile device security: Young people’s awareness and perceptions [Doctoral Dissertation Potchefstroom Campus of the North-West University South Africa]. Boloka, the open-access Institutional Repository. https://repository.nwu.ac.za/handle/10394/19863.
  • Park, M. & Drevin, L. (2016). An investigation into the security behaviour of tertiary students regarding mobile device security. CONF-IRM 2016 Proceedings, 63. https://aisel.aisnet.org/confirm2016/63
  • Parker, F., Ophoff, J., Van Belle, J. P., & Karia, R. (2015, November). Security awareness and adoption of security controls by smartphone users. In 2015 Second International Conference on information security and Cyber Forensics (InfoSec), Cape Town, South Africa.
  • Pew Research Center (2022). Internet, smartphone and social media use, https://www.pewresearch.org/global/2022/12/06/internet-smartphone-and-social-media-use-in-advanced-economies-2022/, Erişim Tarihi: 24.11.2024.
  • Sansom‐Daly, U. M., & Bradford, N. (2020). Grappling with the “human” problem hiding behind the technology: Telehealth during and beyond COVID‐19. Psycho-Oncology, 29(9), 1404.
  • Shah, P., & Agarwal, A. (2020). Cybersecurity behaviour of smartphone users in India: an empirical analysis. Information & Computer Security, 28(2), 293-318.
  • Stylios, I., Kokolakis, S., Thanou, O., & Chatzis, S. (2016). Users’ attitudes on mobile devices: can users’ practices protect their sensitive data? 2016 Mediterranean Conference on Information Systems (MCIS), Cyrus, Greece.
  • Symantec (2015). Internet Security Threat Report. https://dig.watch/resource/symantec-2015-internet-security-threat-report, Erişim Tarihi: 20.11.2024.
  • Talan, T., Aktürk, C., Korkmaz, A., & Gülseçen, S. (2015). Üniversite öğrencilerinin akıllı telefon kullanımında güvenlik farkındalığı. Istanbul Journal of Open and Distance Education, 1(2).
  • Truong, H. T. T., Lagerspetz, E., Nurmi, P., Oliner, A. J., Tarkoma, S., Asokan, N., & Bhattacharya, S. (2014, April). The company you keep: Mobile malware infection rates and inexpensive risk indicators. In Proceedings of the 23rd international conference on World wide web, 39-50. Seoul, Republic of Korea.
  • Wasserman, R. (2022). The Most Common Mobile Security Threats in 2022, https://www.pingidentity.com/en/resources/blog/post/common-mobile-security-threats.html#Common-Mobile-Security-Threats, Erişim Tarihi: 25.11.2024.
  • Worgotter, N. (2011). Measurement model to assess market-driving ability in corporate entrepreneurship.[Doctoral dissertation], University of Pretoria, Pretoria.
  • Zhang, X. J., Li, Z., & Deng, H. (2017). Information security behaviours of smartphone users in China: an empirical analysis. The Electronic Library, 35(6), 1177-1190.

Investigation of University Students' Smartphone Security Measures Behaviors

Year 2025, Volume: 33 Issue: 3, 535 - 546, 25.07.2025
https://doi.org/10.24106/kefdergi.1748618

Abstract

Purpose: This study aims to investigate the security measure behaviours of the 18-24 age group, which constitutes the majority of smartphone users, while using smartphones. In this study, in contrast to other studies, security measures and behaviours were examined through three approaches: protection by smartphone settings and add-on utilities, protection by avoiding harmful behaviours and applications, and protection by preventive behaviours and applications.
Design/Methodology/Approach: This research employs a quantitative methodology. One of the survey models used was the descriptive survey model. The data for this study were collected from 320 university students enrolled at four state universities in Ankara (Ankara University, Ankara Yıldırım Beyazıt University, Gazi University, and Middle East Technical University) during the fall term of the 2024-2025 academic year. The data collection tool for this study is a questionnaire comprising three sections. The questionnaire includes questions to collect demographic information and items for 17 smartphone security behaviours, presented in three categories. IBM SPSS 30.0 was used for data analysis. Data analysis obtained in this study, frequency, and percentage (%) from descriptive statistics were used.
Findings: The study’s findings indicate that the Android operating system is the most dominant among smartphone users. The study revealed that users don’t set their smartphones to remote data wipe in case of loss or theft, and that wireless connection areas are turned on when not in use. It was observed that users retain their usernames and passwords on their smartphones. Furthermore, the respondents indicated that they don’t utilize antivirus or security software on their phones and create backup copies of their data. It was noted that users don’t review license agreements or security messages when installing or using a new application. Conversely, users employ encryption and screen locks to safeguard the data on their devices. Users refrain from installing illegal or unauthorized software on their smartphones and don’t download attachments from unknown email addresses using their smartphones.
Highlights: Users need training and support on how to protect their smartphones with preventive behaviours and applications. They also need to be informed about phone settings and add-on utilities. On the other hand, users have appropriate security behaviours to protect their smartphones by avoiding harmful behaviours and applications.

References

  • Allam, S., Flowerday, S. V., & Flowerday, E. (2014). Smartphone information security awareness: A victim of operational pressures. Computers & Security, 42, 56-65.
  • Androulidakis, I., & Kandus, G. (2011). Mobile phone brand categorization vs. users' security practices. Engineering, Technology & Applied Science Research, 1(2), 30-35.
  • Alkindi, Z.R., Sarrab, M. and Alzeidi, N. (2021). User privacy and data flow control for android apps: a systematic literature review. Journal of Cyber Security and Mobility, 10, 261-304. https://doi.org/10.13052/jcsm2245-1439.1019.
  • Bagga, T., Sodhi, J., Shukla, B., & Qazi, M. (2017). Smartphone security behaviour of the Indian smartphone user. Man In India, 97(24), 333-344.
  • Breitinger, F., Tully-Doyle, R., & Hassenfeldt, C. (2020). A survey on smartphone user’s security choices, awareness and education. Computers & Security, 88, 101647.
  • Chin, A., Jones, B., & Little, P. (2021). A comparative analysis of smartphone security behaviours and practices. International Journal of Education and Development using Information and Communication Technology, 17(3), 57-80.
  • Das, A., & Khan, H. U. (2016). Security behaviours of smartphone users. Information & Computer Security, 24(1), 116-134.
  • Dierks, Z. (2023). Forecast of the smartphone user penetration rate in Turkey 2018-2024. https://www.statista.com/statistics/568281/predicted-smartphone-user-penetration-rate-in-turkey/#:~:text=Smartphone%20usage%20in%20Turkey,million%20smartphone%20users%20in%20Turkey, Erişim Tarihi: 07.11.2024.
  • Egan, G., Haley, K., Mckinney, D., Millington, T., Mulcahy, J., Parsons, T., … Hittel, S. (2012). Internet security threat report. Technical Report. April.
  • ENISA: European Union Agency for Network and Information Security (2010). Smartphone security: information security risks, opportunities and recommendations for users. http://www.enisa.europa.eu/activities/identity-and-trust/risks-and-data-breaches/smartphones-information-security-risks-opportunities-and-recommendations-for-users/at_download/fullReport, Erişim Tarihi: 10.11.2024.
  • Erdoğan, E., & Coşar, M. (2024). Akıllı telefon uygulamalarının kullanıcı bazlı siber güvenlik farkındalığı. Journal of Management Theory and Practices Research, 5(1), 15-33.
  • Farshidfar, N., & Hamedani, S. (2020). The potential role of smartphone-based microfluidic systems for rapid detection of COVID-19 using saliva specimen. Molecular Diagnosis & Therapy, 24(4), 371-373.
  • FCC: Federal Communications Commission (2015). FCC Smartphone security checker. https://www.fcc.gov/smartphone-security, Erişim Tarihi: 15.11.2024.
  • Fidan, M. (2019), Development of a scale for university students Facebook use purposes and an examination in terms of their Facebook use profiles. International Journal of Education and Development using Information and Communication Technology, 15(4), 132-150.
  • Ganesh, A., Sahu, P., Nair, S., & Chand, P. (2020). A smartphone-based e-consult in addiction medicine: An initiative in COVID lockdown. Asian Journal of Psychiatry, 51, 102120.
  • Goni, I., Gumpy, J.M., Maigari, T.U. & Mohammad, M. (2020). Cybersecurity and cyber forensics: machine learning approach systematic review. Semiconductor Science and Information Devices, 2, 25-29. https://doi.org/10.30564/ssid.v2i2.2495.
  • Harris, M. A., Patten, K., & Regan, E. (2013). The need for BYOD mobile device security awareness and training. Proceedings of the Nineteenth Americas Conference on Information Systems, Chicago, Illinois, USA.
  • He, W. (2013). A survey of security risks of mobile social media through blog mining and an extensive literature search. Information Management & Computer Security, 21(5), 381-400.
  • Howarth, J. (2024). How Many People Own Smartphones? (2024-2029). https://explodingtopics.com/blog/smartphone-stats, Erişim Tarihi: 10.11.2024.
  • InfoSecurity, 2012. Most users have not installed security software on their smartphones, survey finds. https://www.infosecurity-magazine.com/news/most-users-have-not-installed-security-software/, Erişim Tarihi: 15.11.2024.
  • Jones, B. H., & Chin, A. G. (2015). On the efficacy of smartphone security: A critical analysis of modifications in business students’ practices over time. International Journal of Information Management, 35(5), 561-571.
  • Jones, B. H., & Heinrichs, L. R. (2012). Do business students practice smartphone security? Journal of Computer Information Systems, 53, (2), 22-30.
  • Kanali, N. (2016). 63% of consumers globally don’t license agreement when installing new apps on their devices. https://techtrendske.co.ke/2016/05/05/63-of-consumers-globally-dont-license-agreement-when-installing-new-apps-on-their-devices/, Erişim Tarihi: 20.11.2024.
  • Kaspersky. (2024). Attacks on mobile devices significantly increase in 2023. https://www.kaspersky.com/about/press-releases/attacks-on-mobile-devices-significantly-increase-in-2023, Erişim Tarihi: 20.11.2024.
  • Kim, H. (2017). Statistical notes for clinical researchers: Chi-squared test and Fisher’s exact test. Restorative Dentistry & Endodontics, 42, 152-155.
  • Koyuncu, M., & Pusatli, T. (2019). Security awareness level of smartphone users: An exploratory case study. Mobile Information Systems, 1-11.
  • Knapova, L., Kruzikova, A., Dedkova, L., & Smahel, D. (2021). Who Is smart with their smartphones? Determinants of smartphone security behaviour. Cyberpsychology, Behaviour, and Social Networking, 24(9), 584-592.
  • Laricchia, F. (2024). Smartphones - statistics & facts. https://www.statista.com/topics/840/smartphones/#topicOverview, Erişim Tarihi: 20.11.2024.
  • Lawton, G. (2008). Is it finally time to worry about mobile malware? Computer, 41(5):1214.
  • Lazou, A., & Weir, G. R. (2011). Perceived risk and sensitive data on mobile devices. Cyberforensics: Issue and Perspectives, 183–196.
  • Mansfield-Devine, S. (2012). Paranoid Android: just how insecure is the most popular mobile platform? Network Security, 2012(9), 5-10.
  • Markelj, B., & Bernik, I. (2015). Safe use of mobile devices arises from knowing the threats. Journal Of Information Security And Applications, 20, 84-89.
  • Muhammad, Z., Anwar, Z., Javed, A. R., Saleem, B., Abbas, S., & Gadekallu, T. R. (2023). Smartphone security and privacy: a survey on apts, sensor-based attacks, side-channel attacks, Google Play attacks, and defenses. Technologies, 11(3), 76.
  • Mylonas, A., Kastania, A., & Gritzalis, D. (2013). Delegate the smartphone user? Security awareness in smartphone platforms. Computers & Security, 34, 47-66.
  • Ophoff, J., & Robinson, M. (2014, August). Exploring end-user smartphone security awareness within a South African context. In 2014 Information Security for South Africa, South Africa.
  • Park, M. J. (2016). Mobile device security: Young people’s awareness and perceptions [Doctoral Dissertation Potchefstroom Campus of the North-West University South Africa]. Boloka, the open-access Institutional Repository. https://repository.nwu.ac.za/handle/10394/19863.
  • Park, M. & Drevin, L. (2016). An investigation into the security behaviour of tertiary students regarding mobile device security. CONF-IRM 2016 Proceedings, 63. https://aisel.aisnet.org/confirm2016/63
  • Parker, F., Ophoff, J., Van Belle, J. P., & Karia, R. (2015, November). Security awareness and adoption of security controls by smartphone users. In 2015 Second International Conference on information security and Cyber Forensics (InfoSec), Cape Town, South Africa.
  • Pew Research Center (2022). Internet, smartphone and social media use, https://www.pewresearch.org/global/2022/12/06/internet-smartphone-and-social-media-use-in-advanced-economies-2022/, Erişim Tarihi: 24.11.2024.
  • Sansom‐Daly, U. M., & Bradford, N. (2020). Grappling with the “human” problem hiding behind the technology: Telehealth during and beyond COVID‐19. Psycho-Oncology, 29(9), 1404.
  • Shah, P., & Agarwal, A. (2020). Cybersecurity behaviour of smartphone users in India: an empirical analysis. Information & Computer Security, 28(2), 293-318.
  • Stylios, I., Kokolakis, S., Thanou, O., & Chatzis, S. (2016). Users’ attitudes on mobile devices: can users’ practices protect their sensitive data? 2016 Mediterranean Conference on Information Systems (MCIS), Cyrus, Greece.
  • Symantec (2015). Internet Security Threat Report. https://dig.watch/resource/symantec-2015-internet-security-threat-report, Erişim Tarihi: 20.11.2024.
  • Talan, T., Aktürk, C., Korkmaz, A., & Gülseçen, S. (2015). Üniversite öğrencilerinin akıllı telefon kullanımında güvenlik farkındalığı. Istanbul Journal of Open and Distance Education, 1(2).
  • Truong, H. T. T., Lagerspetz, E., Nurmi, P., Oliner, A. J., Tarkoma, S., Asokan, N., & Bhattacharya, S. (2014, April). The company you keep: Mobile malware infection rates and inexpensive risk indicators. In Proceedings of the 23rd international conference on World wide web, 39-50. Seoul, Republic of Korea.
  • Wasserman, R. (2022). The Most Common Mobile Security Threats in 2022, https://www.pingidentity.com/en/resources/blog/post/common-mobile-security-threats.html#Common-Mobile-Security-Threats, Erişim Tarihi: 25.11.2024.
  • Worgotter, N. (2011). Measurement model to assess market-driving ability in corporate entrepreneurship.[Doctoral dissertation], University of Pretoria, Pretoria.
  • Zhang, X. J., Li, Z., & Deng, H. (2017). Information security behaviours of smartphone users in China: an empirical analysis. The Electronic Library, 35(6), 1177-1190.
There are 48 citations in total.

Details

Primary Language English
Subjects Other Fields of Education (Other)
Journal Section Research Article
Authors

Vildan Ateş 0000-0002-8855-8556

Publication Date July 25, 2025
Submission Date December 10, 2024
Acceptance Date July 25, 2025
Published in Issue Year 2025 Volume: 33 Issue: 3

Cite

APA Ateş, V. (2025). Investigation of University Students’ Smartphone Security Measures Behaviors. Kastamonu Education Journal, 33(3), 535-546. https://doi.org/10.24106/kefdergi.1748618

10037