Detailed Information on Publication Record
2022
Investigating Installers of Security Software in 20 Countries: Individual-and Country-Level Differences
ŠMAHEL, David, Lenka DĚDKOVÁ, Lydia KRAUS, Václav MATYÁŠ, Vlasta BUKAČOVÁ et. al.Basic information
Original name
Investigating Installers of Security Software in 20 Countries: Individual-and Country-Level Differences
Authors
ŠMAHEL, David (203 Czech Republic, guarantor, belonging to the institution), Lenka DĚDKOVÁ (203 Czech Republic, belonging to the institution), Lydia KRAUS (276 Germany, belonging to the institution), Václav MATYÁŠ (203 Czech Republic, belonging to the institution) and Vlasta BUKAČOVÁ (203 Czech Republic, belonging to the institution)
Edition
Human Behavior and Emerging Technologies, 2022, 2578-1863
Other information
Language
English
Type of outcome
Článek v odborném periodiku
Field of Study
10200 1.2 Computer and information sciences
Country of publisher
United States of America
Confidentiality degree
není předmětem státního či obchodního tajemství
References:
Impact factor
Impact factor: 10.300
RIV identification code
RIV/00216224:14330/22:00128915
Organization unit
Faculty of Informatics
UT WoS
000811251900001
Keywords (in Czech)
bezpečnost; ICT bezpečnost; instalující
Keywords in English
security ICT security; installer; SW installer
Změněno: 28/3/2023 12:12, RNDr. Pavel Šmerk, Ph.D.
Abstract
V originále
This article provides detailed evidence about the installers of online security software on personal computers according to differences among clusters of countries and various other country characteristics. The study presents unique data based on real installations around the world. The data are based on a large-scale quantitative study () which was prepared in cooperation with an international security company. The cluster analyses revealed four distinct clusters of software installers: those who install the software for a different user, those who are IT technicians and mostly install the software for other users, those who install the software for themselves and others on a shared computer, and those who install the software only for themselves. A second cluster analysis revealed four different country clusters. Within these clusters, countries handle online security software installation similarly; however, there are differences for the clusters according to industrialized, English-speaking countries and the cluster of developing countries. This study presents unique cluster analyses of the countries to shed light on the cross-culture differences in security software adoption and installation. The results implicate that software companies should consider providing different versions of the security software to match the country characteristics.