Advertisement

A Multinational Survey on Users’ Practices, Perceptions, and Awareness Regarding Mobile Phone Security

  • Iosif I. Androulidakis
Chapter

Abstract

In this chapter, we will present some interesting findings from a large-scale empirical study. It was conducted in a sample of 7172 students studying in 17 Universities of 10 European countries, in order to assess users’ levels of security feeling and awareness in regard to mobile phone communications. As this study revealed, there are categories of users who face increased security risks due to their self-reassuring feeling that mobile phones are per se secure. These users feel that mobile phone communication is secure and tend to be less cautious in their security practices. There was also a statistically backed correlation of an array of demographics and usage characteristics and practices to the overall security level of the user. As such, specific profiles of users were extracted according to their mobile phone objective and subjective security level.

Keywords

Empirical study Security survey User awareness Security awareness Security perceptions Mobile phone security Security practices User profiling Mobile downloading Ciphering indicator 

References

  1. 1.
    Lenhart A (2010) Cell phones and American adults. Pew Research Center, http://www.pewinternet.org. Accessed 10 Feb 2011
  2. 2.
    Androulidakis I, Kandus G (2011) A survey on saving personal data in the mobile phone. In: Proceedings of sixth international conference on availability, reliability and security (ARES 2011), pp 633–638, Sept 2011Google Scholar
  3. 3.
    Androulidakis I, Kandus G. Feeling secure vs. being secure, the mobile phone user case. In: Proceedings of 7th International Conference in Global Security, Safety and Sustainability (ICGS3), Lecture Notes of the Institute for Computer Sciences 2012Google Scholar
  4. 4.
    Androulidakis I, Kandus G (2011) Correlation of mobile phone usage characteristics, security awareness and feeling to the monthly bill. In: Proceedings of the 11th International Conference on Telecommunications, June 2011, pp 257–263Google Scholar
  5. 5.
    Androulidakis I, Kandus G (2011) Mobile phone downloading among students: The status and its effect on security. In: Proceedings of 10th International Conference on Mobile Business (ICMB2011), June 2011, pp 235–242Google Scholar
  6. 6.
    Androulidakis I, Kandus G (2011) differences in users’ state of awareness and practices regarding mobile phones security among EU Countries. In: Proceedings of 15th WSEAS international conference on communications, pp 296-300Google Scholar
  7. 7.
    Androulidakis I, Kandus G (2011) Ramifications of mobile phone advanced O/S on security perceptions and practices. In: Proceedings of the 3rd International Workshop on Cyberspace Safety and Security (CSS2011), pp 33–38Google Scholar
  8. 8.
    Dillman DA (1999) Mail and Internet surveys: the tailored design method, 2nd edn. Wiley, New YorkGoogle Scholar
  9. 9.
    Pfleeger SL, Kitchenham BA (2001) Principles of survey research Part 1: turning lemons into lemonade. ACM SIGSOFT Software Engineering Notes 26(6):16–18CrossRefGoogle Scholar
  10. 10.
    Boynton PM (2004) Hands-on guide to questionnaire research: Administering, analyzing, and reporting your questionnaire. BMJ 328:1372–1375CrossRefGoogle Scholar
  11. 11.
    Androulidakis I, Androulidakis N (2005) On a versatile and costless OMR system. WSEAS Trans Comput 2(4):160–165zbMATHGoogle Scholar
  12. 12.
    Androulidakis I (2011) Intercepting mobile phone calls and short messages using a GSM Tester. In: Proceedings of CN2011, vol 160, CCIS. Springer, Berlin, pp 281–288Google Scholar
  13. 13.
    Synovate (2009) Global mobile phone survey shows the mobile is a ‘remote control’ for life, Synovate survey. http://www.synovate.com. Accessed 9 Oct 2010
  14. 14.
    Siau K, Shen Z (2003) Building customer trust in mobile commerce. Comm ACM 46(4):91–94CrossRefGoogle Scholar
  15. 15.
    Leung A, Sheng Y, Cruickshank H (2007) The security challenges for mobile ubiquitous services. Inf Sec Tech Rep 12(3):162–171CrossRefGoogle Scholar
  16. 16.
    Androulidakis I, Basios C, Androulidakis N (2007) Survey findings towards mobile services usage and M-Commerce Adoption. In: Proceedings of 18th European Regional ITS Conference, International Telecommunications Society, CD-ROM, SeptemberGoogle Scholar
  17. 17.
    Androulidakis I, Basios C, Androulidakis I (2008) Surveying users’ opinions and trends towards mobile payment issues. Front Art Intell Appl. 169: 9–19 (Techniques and Applications for Mobile Commerce—Proceedings of TAMoCo 2008Google Scholar
  18. 18.
    McAfee (2008) Mobile security report 2008Google Scholar
  19. 19.
    Trend Micro (2009) Smartphone users oblivious to security. Trend Micro surveyGoogle Scholar
  20. 20.
    CPP (2010) Mobile phone theft hotspots. CPP surveyGoogle Scholar
  21. 21.
    ITwire (2010) One-third of Aussies lose mobile phones: survey. ITwire articleGoogle Scholar
  22. 22.
    Rahman M, Imai H (2002) Security in wireless communication. Wireless Personal Comm 22(2):218–228 [Online]CrossRefGoogle Scholar
  23. 23.
    Androulidakis I, Papapetros D (2008) Survey Findings towards awareness of mobile phones’ security issues, recent advances in data networks, communications, computers. In: Proceedings of 7th WSEas international conference on data networks, communications, computers (DNCOCO ‘08), Nov. 2008, pp 130–135Google Scholar
  24. 24.
     Vrechopoulos AP, Constantiou ID, Sideris I (2002) Strategic marketing planning for mobile commerce diffusion and consumer adoption. In: Proceedings of MBusiness 2002, July 8–9Google Scholar
  25. 25.
    comScore M:Metrics (2008) Smarter phones bring security risks: Study. http://www.comscore.com. Accessed 9 Oct 2010
  26. 26.
    Allam SA (2009) Model to measure the maturity of smart-phone security at software consultancies, Thesis, University of Fort Hare. http://hdl.handle.net/10353/281
  27. 27.
    National Cyber Security Alliance (NCSA) (2009) Schools lacking cyber security and safety educationGoogle Scholar
  28. 28.
    Cable & Wireless (2009) Workers lack mobile phone etiquetteGoogle Scholar
  29. 29.
    De Keukelaere F, Yoshihama S, Trent S, Yu Z, Luo L, Zurko ME (2009) Adaptive security dialogs for improved security behavior of users, human-computer interaction—INTERACT 2009, LNCS 2009, Vol 5726. Springer, Heidelberg, pp 510-523Google Scholar
  30. 30.
    Langheinrich M (2002) A privacy awareness system for ubiquitous computing environments. In: Proceedings of UbiComp, pp 237–245Google Scholar
  31. 31.
    Cornwell J, Fette I, Hsieh G, Prabaker M, Rao J, Tang K, Vaniea K, Bauer L, Cranor L, Hong J, McLaren B, Reiter M, Sadeh N (2007) User-controllable security and privacy for pervasive computing. In: Eighth IEEE workshop on mobile computing systems and applications, HotMobile 2007Google Scholar
  32. 32.
    Nancy J. King NJ, Jessen PW (2010) Profiling the mobile customer—Privacy concerns when behavioral advertisers target mobile phones. Computer Law Security Rev 26(5):455–478Google Scholar
  33. 33.
    ABI Research (2009) Study: enterprises need to address cell phone securityGoogle Scholar
  34. 34.
    TechRepublic (2007) Survey respondents say companies are lax on mobile security. TechRepublic articleGoogle Scholar
  35. 35.
    Darkreading (2010) Survey: 54 percent of organizations plan to add smartphone antivirus this year. Darkreading articleGoogle Scholar
  36. 36.
    Goode Intelligence (2009) Mobile security the next battleground. http://www.goodeintelligence
  37. 37.
    Androulidakis I, Kandus G (2012) PINEPULSE: A System to PINpoint and Educate Mobile Phone Users with Low Security. In: Proceedings of 7th International conference in global security, safety and sustainability (ICGS3), Lecture notes of the institute for computer sciences, vol 99, pp 62–66Google Scholar

Copyright information

© Springer International Publishing Switzerland 2016

Authors and Affiliations

  • Iosif I. Androulidakis
    • 1
  1. 1.Pedini IoanninaGreece

Personalised recommendations