2022
Investigating Installers of Security Software in 20 Countries: Individual-and Country-Level Differences
ŠMAHEL, David; Lenka DĚDKOVÁ; Lydia KRAUS; Václav MATYÁŠ; Vlasta BUKAČOVÁ et. al.Základní údaje
Originální název
Investigating Installers of Security Software in 20 Countries: Individual-and Country-Level Differences
Autoři
ŠMAHEL, David (203 Česká republika, garant, domácí); Lenka DĚDKOVÁ (203 Česká republika, domácí); Lydia KRAUS (276 Německo, domácí); Václav MATYÁŠ ORCID (203 Česká republika, domácí) a Vlasta BUKAČOVÁ (203 Česká republika, domácí)
Vydání
Human Behavior and Emerging Technologies, 2022, 2578-1863
Další údaje
Jazyk
angličtina
Typ výsledku
Článek v odborném periodiku
Obor
10200 1.2 Computer and information sciences
Stát vydavatele
Spojené státy
Utajení
není předmětem státního či obchodního tajemství
Odkazy
Impakt faktor
Impact factor: 10.300
Kód RIV
RIV/00216224:14330/22:00128915
Organizační jednotka
Fakulta informatiky
UT WoS
000811251900001
EID Scopus
2-s2.0-85132322446
Klíčová slova česky
bezpečnost; ICT bezpečnost; instalující
Klíčová slova anglicky
security ICT security; installer; SW installer
Změněno: 28. 3. 2023 12:12, RNDr. Pavel Šmerk, Ph.D.
Anotace
V originále
This article provides detailed evidence about the installers of online security software on personal computers according to differences among clusters of countries and various other country characteristics. The study presents unique data based on real installations around the world. The data are based on a large-scale quantitative study () which was prepared in cooperation with an international security company. The cluster analyses revealed four distinct clusters of software installers: those who install the software for a different user, those who are IT technicians and mostly install the software for other users, those who install the software for themselves and others on a shared computer, and those who install the software only for themselves. A second cluster analysis revealed four different country clusters. Within these clusters, countries handle online security software installation similarly; however, there are differences for the clusters according to industrialized, English-speaking countries and the cluster of developing countries. This study presents unique cluster analyses of the countries to shed light on the cross-culture differences in security software adoption and installation. The results implicate that software companies should consider providing different versions of the security software to match the country characteristics.