PINEPULSE: A System to PINpoint and Educate Mobile Phone Users with Low Security

Conference paper
Part of the Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering book series (LNICST, volume 99)


The threats mobile phone users face, are about to increase due to the rapid penetration of advanced smartphone devices and the growing Internet access using them. As such, reinforcing users’ security has become a critical imperative. This paper refers to a system that pinpoints and informs mobile phone users that have a low security level, thus helping them protect themselves. The system consists of software-application, installed in mobile phones as well as of software and data bases, installed in the mobile telephony operators’ servers. Mobile telephony providers (by adopting this application), as well as manufacturers (by pre-installing it in their phones), could help mitigate the increased security threats effectively protecting the end users.


Mobile phones security User Education Security Enhancing Application User Profiling Behavior Modeling 


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    comScore M: Metrics: Smarter phones bring security risks: Study (2008)Google Scholar
  2. 2.
    Leung, A., Sheng, Y., Cruickshank, H.: The security challenges for mobile ubiquitous services. Information Security Technical Report 12(3), 162–171 (2007)CrossRefGoogle Scholar
  3. 3.
    Androulidakis, I., Kandus, G.: A Survey on Saving Personal Data in the Mobile Phone. Proceedings of Sixth International Conference on Availability, Reliability and Security (ARES 2011), pp. 633–638 (2011) Google Scholar
  4. 4.
    Allam, S.: Model to measure the maturity of smartphone security at software consultancies. Thesis. University of Fort Hare (2009)Google Scholar
  5. 5.
    McAfee: Mobile Security Report 2008 (2008)Google Scholar
  6. 6.
    Trend Micro: Smartphone Users Oblivious to Security. Trend Micro survey (2009)Google Scholar
  7. 7.
    CPP: Mobile phone theft hotspots. CPP survey (2010) Google Scholar
  8. 8.
    ITwire: One-third of Aussies lose mobile phones: survey. ITwire article (2010)Google Scholar
  9. 9.
    ABI Research, Study: Enterprises Need to Address Cell Phone Security (2009)Google Scholar
  10. 10.
    TechRepublic: Survey respondents say companies are lax on mobile security. TechRepublic article (2007)Google Scholar
  11. 11.
    Darkreading: Survey: 54 Percent Of Organizations Plan To Add Smartphone Antivirus This Year. Darkreading article (2010)Google Scholar
  12. 12.
    Langheinrich, M.: A Privacy Awareness System for Ubiquitous Computing Environments. In: Borriello, G., Holmquist, L.E. (eds.) UbiComp 2002. LNCS, vol. 2498, pp. 237–245. Springer, Heidelberg (2002)CrossRefGoogle Scholar
  13. 13.
    Cornwell, J., Fette, I., Hsieh, G., Prabaker, M., Rao, J., Tang, K., Vaniea, K., Bauer, L., Cranor, L., Hong, J., McLaren, B., Reiter, M., Sadeh, N.: User-Controllable Security and Privacy for Pervasive Computing. In: Eighth IEEE Workshop on Mobile Computing Systems and Applications, HotMobile 2007 (2007)Google Scholar
  14. 14.
    King, N.J., Jessen, P.W.: Profiling the mobile customer – Privacy concerns when behavioral advertisers target mobile phones. Computer Law & Security Review 26(5), 455–478 (2010)CrossRefGoogle Scholar
  15. 15.
    Goode Intelligence: Mobile security the next battleground (2009)Google Scholar
  16. 16.
    National Cyber Security Alliance (NCSA): Schools Lacking Cyber Security and Safety Education (2009)Google Scholar
  17. 17.
    Cable & Wireless: Workers lack mobile phone etiquette (2009)Google Scholar
  18. 18.
    De Keukelaere, F., Yoshihama, S., Trent, S., Zhang, Y., Luo, L., Zurko, M.E.: Adaptive Security Dialogs for Improved Security Behavior of Users. In: Gross, T., Gulliksen, J., Kotzé, P., Oestreicher, L., Palanque, P., Prates, R.O., Winckler, M. (eds.) INTERACT 2009. LNCS, vol. 5726, pp. 510–523. Springer, Heidelberg (2009)CrossRefGoogle Scholar
  19. 19.
    Androulidakis, I., Kandus, G.: Feeling Secure vs. Being Secure the Mobile Phone User Case. In: Jahankhani, H., et al. (eds.) ICGS3/e-Democracy 2011. LNICST, vol. 99, pp. 212–219. Springer, Heidelberg (2012)Google Scholar
  20. 20.
    Hakila, J., Chatfield, C.: Personal customization of mobile phones: a case study. In: Proceedings of NordiCHI, pp. 409–412 (2006)Google Scholar

Copyright information

© ICST Institute for Computer Science, Social Informatics and Telecommunications Engineering 2012

Authors and Affiliations

  1. 1.Jožef Stefan International Postgraduate SchoolLjubljanaSlovenia
  2. 2.Department of Communication SystemsJožef Stefan InstituteLjubljanaSlovenia

Personalised recommendations