BYOD Security Use Behavior

No introduction required, this is a section within the literature review
Topic to cover:
why people do not use common best practices to protect data on their smart phones and tablets.
what influences people to use common security measures on their mobile devices, such as changing the pin or password every 3 months, turning off wifi and bluetooth when not in use, etc..
How does this relate to the constructs of the Unified Theory of Acceptance and Use of Technology (Extended)

This question has been answered.

Get Answer