Mobile Phone Brand Categorization vs. Users' Security Practices
Abstract
In the present paper, we correlated the brand of mobile phone to users’ security practices, statistically processing a large pool of the responses of 7172 students in 17 Universities of 10 Eastern and Southern Europe countries. Users show different behavior in an array of characteristics, according to the brand of the mobile phone they are using. As such, there is a categorization of areas, different for each brand, where users are clearly lacking security mind, possibly due to lack of awareness. Such a categorization can help phone manufacturers enhance their mobile phones in regards to security, preferably transparently for the user.
Keywords:
mobile phone security, brand profiling, security practices, survey,Downloads
References
Synovate, “Global mobile phone survey shows the mobile is a 'remote control' for life”, Synovate survey, http://www.synovate.com, 2009 [accessed: 09/10/2010]
M. Rahman, H. Imai, “Security in wireless communication”, Wireless Personal Communications, Vol. 22, No. 2, pp. 218-228, 2002 DOI: https://doi.org/10.1023/A:1019968506856
I. Androulidakis, “Intercepting mobile phones”, IT Security Professional Magazine, No. 8, pp. 42-28, 2009
comScore M:Metrics, “Smarter phones bring security risks: study”, http://www.comscore.com, 2008 [accessed 09/10/2010]
Trend Micro, “Smartphone users oblivious to security”, Trend Micro survey, http://www.esecurityplanet.com, 2009, [accessed: 09/10/2010]
Goode Intelligence, “Mobile security the next battleground”, http://www.goodeintelligence, 2009, [accessed: 09/10/2010]
A.P. Vrechopoulos, I.D. Constantiou, I. Sideris, “Strategic marketing planning for mobile commerce diffusion and consumer adoption”, Proceedings of the First International Conference on Mobile Business: Evolution Scenarios for Emerging Mobile Commerce Services, M-BUSINESS, 2002
I. Androulidakis, C. Basios, N. Androulidakis, “Surveying users' opinions and trends towards mobile payment issues”, Frontiers in Artificial Intelligence and Applications, Vol. 169, (Techniques and Applications for Mobile Commerce - Proceedings of TAMoCo 2008), pp. 9-19, 2008
I. Androulidakis, D. Papapetros, “Survey findings towards awareness of mobile phones’ security issues, recent advances in data networks, communications, computers”, Proceedings of 7th WSEAS International Conference on Data Networks, Communications, Computers (DNCOCO '08), pp 130-135, Nov. 2008
National Cyber Security Alliance (NCSA), “Schools lacking cyber security and safety education”, http://www. staysafeonline.org, 2009 [accessed: 09/10/2010]
McAfee, “Most mobile users don't know if they have security”, McAfee-sponsored research, http://www. esecurityplanet.com, 2008 [accessed: 09/10/2010]
D. A. Dillman, “Mail and internet surveys: the tailored design method”, John Wiley & Sons, 2nd edition, 1999
S. L. Pfleeger, B. A. Kitchenham, “Principles of survey research part 1: turning lemons into lemonade”, ACM SIGSOFT Software Engineering Notes, Vol. 26, No. 6, pp 16-18, 2001 DOI: https://doi.org/10.1145/505532.505535
I. Androulidakis, N. Androulidakis, “On a versatile and costless OMR system”, WSEAS Transactions on Computers, Vol. 4, No. 2, pp. 160-165, 2005
CPP, “Mobile phone theft hotspots”, CPP survey, http://www.cpp.co.uk, 2010 [accessed: 09/10/2010]
ITwire, “One-third of aussies lose mobile phones: survey”, ITwire article, http://www.itwire.com, 2010 [accessed: 09/10/2010]
Darkreading, “Survey: 54 percent of organizations plan to add smartphone antivirus this year”, Darkreading article, http://www.darkreading.com, 2010[accessed: 09/10/2010]
Downloads
How to Cite
License
Authors who publish with this journal agree to the following terms:
- Authors retain the copyright and grant the journal the right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) after its publication in ETASR with an acknowledgement of its initial publication in this journal.