Abstract
The threats mobile phone users face, are about to increase due to the rapid penetration of advanced smartphone devices and the growing Internet access using them. As such, reinforcing users’ security has become a critical imperative. This paper refers to a system that pinpoints and informs mobile phone users that have a low security level, thus helping them protect themselves. The system consists of software-application, installed in mobile phones as well as of software and data bases, installed in the mobile telephony operators’ servers. Mobile telephony providers (by adopting this application), as well as manufacturers (by pre-installing it in their phones), could help mitigate the increased security threats effectively protecting the end users.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
comScore M: Metrics: Smarter phones bring security risks: Study (2008)
Leung, A., Sheng, Y., Cruickshank, H.: The security challenges for mobile ubiquitous services. Information Security Technical Report 12(3), 162–171 (2007)
Androulidakis, I., Kandus, G.: A Survey on Saving Personal Data in the Mobile Phone. Proceedings of Sixth International Conference on Availability, Reliability and Security (ARES 2011), pp. 633–638 (2011)
Allam, S.: Model to measure the maturity of smartphone security at software consultancies. Thesis. University of Fort Hare (2009)
McAfee: Mobile Security Report 2008 (2008)
Trend Micro: Smartphone Users Oblivious to Security. Trend Micro survey (2009)
CPP: Mobile phone theft hotspots. CPP survey (2010)
ITwire: One-third of Aussies lose mobile phones: survey. ITwire article (2010)
ABI Research, Study: Enterprises Need to Address Cell Phone Security (2009)
TechRepublic: Survey respondents say companies are lax on mobile security. TechRepublic article (2007)
Darkreading: Survey: 54 Percent Of Organizations Plan To Add Smartphone Antivirus This Year. Darkreading article (2010)
Langheinrich, M.: A Privacy Awareness System for Ubiquitous Computing Environments. In: Borriello, G., Holmquist, L.E. (eds.) UbiComp 2002. LNCS, vol. 2498, pp. 237–245. Springer, Heidelberg (2002)
Cornwell, J., Fette, I., Hsieh, G., Prabaker, M., Rao, J., Tang, K., Vaniea, K., Bauer, L., Cranor, L., Hong, J., McLaren, B., Reiter, M., Sadeh, N.: User-Controllable Security and Privacy for Pervasive Computing. In: Eighth IEEE Workshop on Mobile Computing Systems and Applications, HotMobile 2007 (2007)
King, N.J., Jessen, P.W.: Profiling the mobile customer – Privacy concerns when behavioral advertisers target mobile phones. Computer Law & Security Review 26(5), 455–478 (2010)
Goode Intelligence: Mobile security the next battleground (2009)
National Cyber Security Alliance (NCSA): Schools Lacking Cyber Security and Safety Education (2009)
Cable & Wireless: Workers lack mobile phone etiquette (2009)
De Keukelaere, F., Yoshihama, S., Trent, S., Zhang, Y., Luo, L., Zurko, M.E.: Adaptive Security Dialogs for Improved Security Behavior of Users. In: Gross, T., Gulliksen, J., Kotzé, P., Oestreicher, L., Palanque, P., Prates, R.O., Winckler, M. (eds.) INTERACT 2009. LNCS, vol. 5726, pp. 510–523. Springer, Heidelberg (2009)
Androulidakis, I., Kandus, G.: Feeling Secure vs. Being Secure the Mobile Phone User Case. In: Jahankhani, H., et al. (eds.) ICGS3/e-Democracy 2011. LNICST, vol. 99, pp. 212–219. Springer, Heidelberg (2012)
Hakila, J., Chatfield, C.: Personal customization of mobile phones: a case study. In: Proceedings of NordiCHI, pp. 409–412 (2006)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 ICST Institute for Computer Science, Social Informatics and Telecommunications Engineering
About this paper
Cite this paper
Androulidakis, I., Kandus, G. (2012). PINEPULSE: A System to PINpoint and Educate Mobile Phone Users with Low Security. In: Georgiadis, C.K., Jahankhani, H., Pimenidis, E., Bashroush, R., Al-Nemrat, A. (eds) Global Security, Safety and Sustainability & e-Democracy. e-Democracy ICGS3 2011 2011. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 99. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-33448-1_9
Download citation
DOI: https://doi.org/10.1007/978-3-642-33448-1_9
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-33447-4
Online ISBN: 978-3-642-33448-1
eBook Packages: Computer ScienceComputer Science (R0)