J 2022

Investigating Installers of Security Software in 20 Countries: Individual-and Country-Level Differences

ŠMAHEL, David, Lenka DĚDKOVÁ, Lydia KRAUS, Václav MATYÁŠ, Vlasta BUKAČOVÁ et. al.

Basic information

Original name

Investigating Installers of Security Software in 20 Countries: Individual-and Country-Level Differences

Authors

ŠMAHEL, David (203 Czech Republic, guarantor, belonging to the institution), Lenka DĚDKOVÁ (203 Czech Republic, belonging to the institution), Lydia KRAUS (276 Germany, belonging to the institution), Václav MATYÁŠ (203 Czech Republic, belonging to the institution) and Vlasta BUKAČOVÁ (203 Czech Republic, belonging to the institution)

Edition

Human Behavior and Emerging Technologies, 2022, 2578-1863

Other information

Language

English

Type of outcome

Článek v odborném periodiku

Field of Study

10200 1.2 Computer and information sciences

Country of publisher

United States of America

Confidentiality degree

není předmětem státního či obchodního tajemství

References:

Impact factor

Impact factor: 10.300

RIV identification code

RIV/00216224:14330/22:00128915

Organization unit

Faculty of Informatics

UT WoS

000811251900001

Keywords (in Czech)

bezpečnost; ICT bezpečnost; instalující

Keywords in English

security ICT security; installer; SW installer
Změněno: 28/3/2023 12:12, RNDr. Pavel Šmerk, Ph.D.

Abstract

V originále

This article provides detailed evidence about the installers of online security software on personal computers according to differences among clusters of countries and various other country characteristics. The study presents unique data based on real installations around the world. The data are based on a large-scale quantitative study () which was prepared in cooperation with an international security company. The cluster analyses revealed four distinct clusters of software installers: those who install the software for a different user, those who are IT technicians and mostly install the software for other users, those who install the software for themselves and others on a shared computer, and those who install the software only for themselves. A second cluster analysis revealed four different country clusters. Within these clusters, countries handle online security software installation similarly; however, there are differences for the clusters according to industrialized, English-speaking countries and the cluster of developing countries. This study presents unique cluster analyses of the countries to shed light on the cross-culture differences in security software adoption and installation. The results implicate that software companies should consider providing different versions of the security software to match the country characteristics.