Understanding users' perceptions of security in mobile devices using the two-step cluster analysis.
Nelson Tochukwu AguJoshua Ebere ChukwuereTlhalitshi Volition MontshiwaPublished in: Int. J. Bus. Inf. Syst. (2023)
Keyphrases
- cluster analysis
- mobile devices
- categorical data
- smart phones
- mobile computing environment
- clustering method
- clustering algorithm
- mobile internet
- factor analysis
- k means
- data clustering
- mobile applications
- mobile services
- hierarchical latent class models
- user interface
- data mining
- unsupervised learning
- data analysis
- fuzzy clustering
- mobile users
- data mining techniques
- clustering analysis
- context aware
- collaborative filtering
- recommender systems
- user experience
- desktop computers
- mobile phone
- correlation analysis
- cluster validity
- partitional clustering
- hierarchical clustering
- access control