A Multinational Survey on Users’ Practices, Perceptions, and Awareness Regarding Mobile Phone Security

  • Iosif I. Androulidakis
Part of the SpringerBriefs in Electrical and Computer Engineering book series (BRIEFSELECTRIC)


In this chapter, we will present some interesting findings from a large-scale empirical study. It was conducted in a sample of 7,172 students studying in 17 universities of ten European countries, in order to assess users’ levels of security feeling and awareness in regards to mobile phone communications. As this study revealed, there are categories of users who face increased security risks due to their self-reassuring feeling that mobile phones are per se secure. These users feel that mobile phone communication is secure and tend to be less cautious in their security practices. There was also a statistically backed correlation of an array of demographics and usage characteristics and practices to the overall security level of the user. As such, specific profiles of users were extracted according to their mobile phone objective and subjective security level.


Empirical study Security survey User awareness Security awareness Security perceptions Mobile phone security Security practices User profiling Mobile downloading Ciphering indicator 


  1. 1.
    Lenhart A (2010) Cell phones and American adults. Pew Research Center. http://www.pewinternet.org. Accessed Dec 2011
  2. 2.
    Androulidakis I, Kandus G (2011) A survey on saving personal data in the mobile phone. In: Proceedings of sixth international conference on availability, reliability and security (ARES 2011), pp 633–638, Sept 2011Google Scholar
  3. 3.
    Androulidakis I, Kandus G. Feeling secure vs. being secure, the mobile phone user case. In: Proceedings of 7th international conference in global security, safety and sustainability (ICGS3), proceedings pendingGoogle Scholar
  4. 4.
    Androulidakis I, Kandus G (2011) Correlation of mobile phone usage characteristics, security awareness and feeling to the monthly bill. In: proceedings of the 11th international conference on telecommunications, pp 257–263, June 2011Google Scholar
  5. 5.
    Androulidakis I, Kandus G (2011) Mobile phone downloading among students: the status and its effect on security. In: Proceedings of 10th international conference on mobile business (ICMB2011), pp 235–242, June 2011Google Scholar
  6. 6.
    Androulidakis I, Kandus G (2011) Differences in users’ state of awareness and practices regarding mobile phones security among EU countries. In: Proceedings of 15th WSEAS international conference on communications, pp 296–300, July 2011Google Scholar
  7. 7.
    Androulidakis I, Kandus G (2011) Ramifications of mobile phone advanced O/S on security perceptions and practices. In: Proceedings of the 3rd international workshop on cyberspace safety and security (CSS2011), pp 33–38, Sep 2011Google Scholar
  8. 8.
    Dillman DA (1999) Mail and internet surveys: the tailored design method, 2nd edn. Wiley, New YorkGoogle Scholar
  9. 9.
    Pfleeger SL, Kitchenham BA (2001) Principles of survey research part 1: turning lemons into lemonade. ACM SIGSOFT Software Eng Notes 26(6):16–18Google Scholar
  10. 10.
    Boynton PM (2004) Hands-on guide to questionnaire research: administering, analyzing, and reporting your questionnaire. BMJ 328:1372–1375CrossRefGoogle Scholar
  11. 11.
    Androulidakis I, Androulidakis N (2005) On a versatile and costless OMR system. Wseas Trans Comput 4(2):160–165Google Scholar
  12. 12.
    Androulidakis I (2011) Intercepting mobile phone calls and short messages using a GSM tester. In: Proceedings of CN2011, Springer Verlag CCIS 160, pp 281–288Google Scholar
  13. 13.
    Synovate (2009) Global mobile phone survey shows the mobile is a ‘remote control’ for life. Synovate survey. http://www.synovate.com. Accessed Dec 2011
  14. 14.
    Siau K, Shen Z (2003) Building customer trust in mobile commerce. Commun ACM 46(4):91–94CrossRefGoogle Scholar
  15. 15.
    Leung A, Sheng Y, Cruickshank H (2007) The security challenges for mobile ubiquitous services. Inform Secur Tech Rep 12(3):162–171CrossRefGoogle Scholar
  16. 16.
    Androulidakis I, Basios C, Androulidakis N (2007) Survey findings towards mobile services usage and M-commerce adoption. In: Proceedings of 18th European regional ITS conference. International Telecommunications Society, CD-ROM, Sep 2007Google Scholar
  17. 17.
    Androulidakis I, Basios C, Androulidakis N (2008) Surveying users’ opinions and trends towards mobile payment issues. Frontiers in Artificial Intelligence and Applications, vol 169, pp 9–19 (Techniques and applications for mobile commerce—Proceedings of TAMoCo 2008)Google Scholar
  18. 18.
    McAfee (2008) Mobile security report 2008Google Scholar
  19. 19.
    Trend Micro (2009) Smartphone users oblivious to security. Trend Micro surveyGoogle Scholar
  20. 20.
    CPP (2010) Mobile phone theft hotspots. CPP surveyGoogle Scholar
  21. 21.
    ITwire (2010) One-third of Aussies lose mobile phones: survey. ITwire articleGoogle Scholar
  22. 22.
    Rahman M, Imai H (2002) Security in wireless communication. Wireless Personal Communications (Online) 22(2):218–228Google Scholar
  23. 23.
    Androulidakis I, Papapetros D (2008) Survey findings towards awareness of mobile phones’ security issues. Recent advances in data networks, communications, computers. In: Proceedings of 7th WSEAS international conference on data networks, communications, computers (DNCOCO ‘08), pp 130–135, Nov 2008Google Scholar
  24. 24.
    Vrechopoulos AP, Constantiou ID, Sideris I (2002) Strategic marketing planning for mobile commerce diffusion and consumer adoption. In: Proceedings of MBusiness 2002, 8–9 July 2002Google Scholar
  25. 25.
    comScore M:Metrics (2008) Smarter phones bring security risks: study. http://www.comscore.com. Accessed Dec 2011
  26. 26.
    Allam SA (2009) Model to measure the maturity of smart-phone security at software consultancies. Thesis, University of Fort Hare. http://hdl.handle.net/10353/281
  27. 27.
    National Cyber Security Alliance (NCSA) (2009) Schools lacking cyber security and safety educationGoogle Scholar
  28. 28.
    Cable & Wireless (2009) Workers lack mobile phone etiquetteGoogle Scholar
  29. 29.
    De Keukelaere F, Yoshihama S, Trent S, Zhang Y, Luo L, Zurko ME (2009) Adaptive security dialogs for improved security behavior of users, Human–computer interaction—INTERACT 2009. LNCS 2009, vol 5726/2009, pp 510–523Google Scholar
  30. 30.
    Langheinrich M (2002) A privacy awareness system for ubiquitous computing environments. In: Proceedings of UbiComp 2002, pp 237–245Google Scholar
  31. 31.
    Cornwell J, Fette I, Hsieh G, Prabaker M, Rao J, Tang K, Vaniea K, Bauer L, Cranor L, Hong J, McLaren B, Reiter M, Sadeh N (2007) User-controllable security and privacy for pervasive computing. In: Eighth IEEE workshop on mobile computing systems and applications, HotMobile 2007Google Scholar
  32. 32.
    King NJ, Jessen PW (2010) Profiling the mobile customer—privacy concerns when behavioral advertisers target mobile phones. Comput Law Security Rev 26(5):455–478CrossRefGoogle Scholar
  33. 33.
    ABI Research (2009) Study: enterprises need to address cell phone securityGoogle Scholar
  34. 34.
    TechRepublic (2007) Survey respondents say companies are lax on mobile security. TechRepublic articleGoogle Scholar
  35. 35.
    Darkreading (2010) Survey: 54 percent of organizations plan to add smartphone antivirus this year. Darkreading articleGoogle Scholar
  36. 36.
    Goode Intelligence (2009) Mobile security the next battlegroundGoogle Scholar

Copyright information

© Springer Science+Business Media New York 2012

Authors and Affiliations

  • Iosif I. Androulidakis
    • 1
  1. 1.PapagouGreece

Personalised recommendations