Skip to main content
Top

2016 | OriginalPaper | Chapter

2. A Multinational Survey on Users’ Practices, Perceptions, and Awareness Regarding Mobile Phone Security

Author : Iosif I. Androulidakis

Published in: Mobile Phone Security and Forensics

Publisher: Springer International Publishing

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

In this chapter, we will present some interesting findings from a large-scale empirical study. It was conducted in a sample of 7172 students studying in 17 Universities of 10 European countries, in order to assess users’ levels of security feeling and awareness in regard to mobile phone communications. As this study revealed, there are categories of users who face increased security risks due to their self-reassuring feeling that mobile phones are per se secure. These users feel that mobile phone communication is secure and tend to be less cautious in their security practices. There was also a statistically backed correlation of an array of demographics and usage characteristics and practices to the overall security level of the user. As such, specific profiles of users were extracted according to their mobile phone objective and subjective security level.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
2.
go back to reference Androulidakis I, Kandus G (2011) A survey on saving personal data in the mobile phone. In: Proceedings of sixth international conference on availability, reliability and security (ARES 2011), pp 633–638, Sept 2011 Androulidakis I, Kandus G (2011) A survey on saving personal data in the mobile phone. In: Proceedings of sixth international conference on availability, reliability and security (ARES 2011), pp 633–638, Sept 2011
3.
go back to reference Androulidakis I, Kandus G. Feeling secure vs. being secure, the mobile phone user case. In: Proceedings of 7th International Conference in Global Security, Safety and Sustainability (ICGS3), Lecture Notes of the Institute for Computer Sciences 2012 Androulidakis I, Kandus G. Feeling secure vs. being secure, the mobile phone user case. In: Proceedings of 7th International Conference in Global Security, Safety and Sustainability (ICGS3), Lecture Notes of the Institute for Computer Sciences 2012
4.
go back to reference Androulidakis I, Kandus G (2011) Correlation of mobile phone usage characteristics, security awareness and feeling to the monthly bill. In: Proceedings of the 11th International Conference on Telecommunications, June 2011, pp 257–263 Androulidakis I, Kandus G (2011) Correlation of mobile phone usage characteristics, security awareness and feeling to the monthly bill. In: Proceedings of the 11th International Conference on Telecommunications, June 2011, pp 257–263
5.
go back to reference Androulidakis I, Kandus G (2011) Mobile phone downloading among students: The status and its effect on security. In: Proceedings of 10th International Conference on Mobile Business (ICMB2011), June 2011, pp 235–242 Androulidakis I, Kandus G (2011) Mobile phone downloading among students: The status and its effect on security. In: Proceedings of 10th International Conference on Mobile Business (ICMB2011), June 2011, pp 235–242
6.
go back to reference Androulidakis I, Kandus G (2011) differences in users’ state of awareness and practices regarding mobile phones security among EU Countries. In: Proceedings of 15th WSEAS international conference on communications, pp 296-300 Androulidakis I, Kandus G (2011) differences in users’ state of awareness and practices regarding mobile phones security among EU Countries. In: Proceedings of 15th WSEAS international conference on communications, pp 296-300
7.
go back to reference Androulidakis I, Kandus G (2011) Ramifications of mobile phone advanced O/S on security perceptions and practices. In: Proceedings of the 3rd International Workshop on Cyberspace Safety and Security (CSS2011), pp 33–38 Androulidakis I, Kandus G (2011) Ramifications of mobile phone advanced O/S on security perceptions and practices. In: Proceedings of the 3rd International Workshop on Cyberspace Safety and Security (CSS2011), pp 33–38
8.
go back to reference Dillman DA (1999) Mail and Internet surveys: the tailored design method, 2nd edn. Wiley, New York Dillman DA (1999) Mail and Internet surveys: the tailored design method, 2nd edn. Wiley, New York
9.
go back to reference Pfleeger SL, Kitchenham BA (2001) Principles of survey research Part 1: turning lemons into lemonade. ACM SIGSOFT Software Engineering Notes 26(6):16–18CrossRef Pfleeger SL, Kitchenham BA (2001) Principles of survey research Part 1: turning lemons into lemonade. ACM SIGSOFT Software Engineering Notes 26(6):16–18CrossRef
10.
go back to reference Boynton PM (2004) Hands-on guide to questionnaire research: Administering, analyzing, and reporting your questionnaire. BMJ 328:1372–1375CrossRef Boynton PM (2004) Hands-on guide to questionnaire research: Administering, analyzing, and reporting your questionnaire. BMJ 328:1372–1375CrossRef
11.
go back to reference Androulidakis I, Androulidakis N (2005) On a versatile and costless OMR system. WSEAS Trans Comput 2(4):160–165MATH Androulidakis I, Androulidakis N (2005) On a versatile and costless OMR system. WSEAS Trans Comput 2(4):160–165MATH
12.
go back to reference Androulidakis I (2011) Intercepting mobile phone calls and short messages using a GSM Tester. In: Proceedings of CN2011, vol 160, CCIS. Springer, Berlin, pp 281–288 Androulidakis I (2011) Intercepting mobile phone calls and short messages using a GSM Tester. In: Proceedings of CN2011, vol 160, CCIS. Springer, Berlin, pp 281–288
14.
go back to reference Siau K, Shen Z (2003) Building customer trust in mobile commerce. Comm ACM 46(4):91–94CrossRef Siau K, Shen Z (2003) Building customer trust in mobile commerce. Comm ACM 46(4):91–94CrossRef
15.
go back to reference Leung A, Sheng Y, Cruickshank H (2007) The security challenges for mobile ubiquitous services. Inf Sec Tech Rep 12(3):162–171CrossRef Leung A, Sheng Y, Cruickshank H (2007) The security challenges for mobile ubiquitous services. Inf Sec Tech Rep 12(3):162–171CrossRef
16.
go back to reference Androulidakis I, Basios C, Androulidakis N (2007) Survey findings towards mobile services usage and M-Commerce Adoption. In: Proceedings of 18th European Regional ITS Conference, International Telecommunications Society, CD-ROM, September Androulidakis I, Basios C, Androulidakis N (2007) Survey findings towards mobile services usage and M-Commerce Adoption. In: Proceedings of 18th European Regional ITS Conference, International Telecommunications Society, CD-ROM, September
17.
go back to reference Androulidakis I, Basios C, Androulidakis I (2008) Surveying users’ opinions and trends towards mobile payment issues. Front Art Intell Appl. 169: 9–19 (Techniques and Applications for Mobile Commerce—Proceedings of TAMoCo 2008 Androulidakis I, Basios C, Androulidakis I (2008) Surveying users’ opinions and trends towards mobile payment issues. Front Art Intell Appl. 169: 9–19 (Techniques and Applications for Mobile Commerce—Proceedings of TAMoCo 2008
18.
19.
go back to reference Trend Micro (2009) Smartphone users oblivious to security. Trend Micro survey Trend Micro (2009) Smartphone users oblivious to security. Trend Micro survey
20.
go back to reference CPP (2010) Mobile phone theft hotspots. CPP survey CPP (2010) Mobile phone theft hotspots. CPP survey
21.
go back to reference ITwire (2010) One-third of Aussies lose mobile phones: survey. ITwire article ITwire (2010) One-third of Aussies lose mobile phones: survey. ITwire article
22.
go back to reference Rahman M, Imai H (2002) Security in wireless communication. Wireless Personal Comm 22(2):218–228 [Online]CrossRef Rahman M, Imai H (2002) Security in wireless communication. Wireless Personal Comm 22(2):218–228 [Online]CrossRef
23.
go back to reference Androulidakis I, Papapetros D (2008) Survey Findings towards awareness of mobile phones’ security issues, recent advances in data networks, communications, computers. In: Proceedings of 7th WSEas international conference on data networks, communications, computers (DNCOCO ‘08), Nov. 2008, pp 130–135 Androulidakis I, Papapetros D (2008) Survey Findings towards awareness of mobile phones’ security issues, recent advances in data networks, communications, computers. In: Proceedings of 7th WSEas international conference on data networks, communications, computers (DNCOCO ‘08), Nov. 2008, pp 130–135
24.
go back to reference  Vrechopoulos AP, Constantiou ID, Sideris I (2002) Strategic marketing planning for mobile commerce diffusion and consumer adoption. In: Proceedings of MBusiness 2002, July 8–9  Vrechopoulos AP, Constantiou ID, Sideris I (2002) Strategic marketing planning for mobile commerce diffusion and consumer adoption. In: Proceedings of MBusiness 2002, July 8–9
27.
go back to reference National Cyber Security Alliance (NCSA) (2009) Schools lacking cyber security and safety education National Cyber Security Alliance (NCSA) (2009) Schools lacking cyber security and safety education
28.
go back to reference Cable & Wireless (2009) Workers lack mobile phone etiquette Cable & Wireless (2009) Workers lack mobile phone etiquette
29.
go back to reference De Keukelaere F, Yoshihama S, Trent S, Yu Z, Luo L, Zurko ME (2009) Adaptive security dialogs for improved security behavior of users, human-computer interaction—INTERACT 2009, LNCS 2009, Vol 5726. Springer, Heidelberg, pp 510-523 De Keukelaere F, Yoshihama S, Trent S, Yu Z, Luo L, Zurko ME (2009) Adaptive security dialogs for improved security behavior of users, human-computer interaction—INTERACT 2009, LNCS 2009, Vol 5726. Springer, Heidelberg, pp 510-523
30.
go back to reference Langheinrich M (2002) A privacy awareness system for ubiquitous computing environments. In: Proceedings of UbiComp, pp 237–245 Langheinrich M (2002) A privacy awareness system for ubiquitous computing environments. In: Proceedings of UbiComp, pp 237–245
31.
go back to reference Cornwell J, Fette I, Hsieh G, Prabaker M, Rao J, Tang K, Vaniea K, Bauer L, Cranor L, Hong J, McLaren B, Reiter M, Sadeh N (2007) User-controllable security and privacy for pervasive computing. In: Eighth IEEE workshop on mobile computing systems and applications, HotMobile 2007 Cornwell J, Fette I, Hsieh G, Prabaker M, Rao J, Tang K, Vaniea K, Bauer L, Cranor L, Hong J, McLaren B, Reiter M, Sadeh N (2007) User-controllable security and privacy for pervasive computing. In: Eighth IEEE workshop on mobile computing systems and applications, HotMobile 2007
32.
go back to reference Nancy J. King NJ, Jessen PW (2010) Profiling the mobile customer—Privacy concerns when behavioral advertisers target mobile phones. Computer Law Security Rev 26(5):455–478 Nancy J. King NJ, Jessen PW (2010) Profiling the mobile customer—Privacy concerns when behavioral advertisers target mobile phones. Computer Law Security Rev 26(5):455–478
33.
go back to reference ABI Research (2009) Study: enterprises need to address cell phone security ABI Research (2009) Study: enterprises need to address cell phone security
34.
go back to reference TechRepublic (2007) Survey respondents say companies are lax on mobile security. TechRepublic article TechRepublic (2007) Survey respondents say companies are lax on mobile security. TechRepublic article
35.
go back to reference Darkreading (2010) Survey: 54 percent of organizations plan to add smartphone antivirus this year. Darkreading article Darkreading (2010) Survey: 54 percent of organizations plan to add smartphone antivirus this year. Darkreading article
37.
go back to reference Androulidakis I, Kandus G (2012) PINEPULSE: A System to PINpoint and Educate Mobile Phone Users with Low Security. In: Proceedings of 7th International conference in global security, safety and sustainability (ICGS3), Lecture notes of the institute for computer sciences, vol 99, pp 62–66 Androulidakis I, Kandus G (2012) PINEPULSE: A System to PINpoint and Educate Mobile Phone Users with Low Security. In: Proceedings of 7th International conference in global security, safety and sustainability (ICGS3), Lecture notes of the institute for computer sciences, vol 99, pp 62–66
Metadata
Title
A Multinational Survey on Users’ Practices, Perceptions, and Awareness Regarding Mobile Phone Security
Author
Iosif I. Androulidakis
Copyright Year
2016
DOI
https://doi.org/10.1007/978-3-319-29742-2_2