Mobile Phone Brand Categorization vs. Users' Security Practices

I. Androulidakis, G. Kandus

Abstract


In the present paper, we correlated the brand of mobile phone to users’ security practices, statistically processing a large pool of the responses of 7172 students in 17 Universities of 10 Eastern and Southern Europe countries. Users show different behavior in an array of characteristics, according to the brand of the mobile phone they are using. As such, there is a categorization of areas, different for each brand, where users are clearly lacking security mind, possibly due to lack of awareness. Such a categorization can help phone manufacturers enhance their mobile phones in regards to security, preferably transparently for the user.


Keywords


mobile phone security; brand profiling, security practices; survey;

Full Text:

PDF

References


Synovate, “Global mobile phone survey shows the mobile is a 'remote control' for life”, Synovate survey, http://www.synovate.com, 2009 [accessed: 09/10/2010]

M. Rahman, H. Imai, “Security in wireless communication”, Wireless Personal Communications, Vol. 22, No. 2, pp. 218-228, 2002

I. Androulidakis, “Intercepting mobile phones”, IT Security Professional Magazine, No. 8, pp. 42-28, 2009

comScore M:Metrics, “Smarter phones bring security risks: study”, http://www.comscore.com, 2008 [accessed 09/10/2010]

Trend Micro, “Smartphone users oblivious to security”, Trend Micro survey, http://www.esecurityplanet.com, 2009, [accessed: 09/10/2010]

Goode Intelligence, “Mobile security the next battleground”, http://www.goodeintelligence, 2009, [accessed: 09/10/2010]

A.P. Vrechopoulos, I.D. Constantiou, I. Sideris, “Strategic marketing planning for mobile commerce diffusion and consumer adoption”, Proceedings of the First International Conference on Mobile Business: Evolution Scenarios for Emerging Mobile Commerce Services, M-BUSINESS, 2002

I. Androulidakis, C. Basios, N. Androulidakis, “Surveying users' opinions and trends towards mobile payment issues”, Frontiers in Artificial Intelligence and Applications, Vol. 169, (Techniques and Applications for Mobile Commerce - Proceedings of TAMoCo 2008), pp. 9-19, 2008

I. Androulidakis, D. Papapetros, “Survey findings towards awareness of mobile phones’ security issues, recent advances in data networks, communications, computers”, Proceedings of 7th WSEAS International Conference on Data Networks, Communications, Computers (DNCOCO '08), pp 130-135, Nov. 2008

National Cyber Security Alliance (NCSA), “Schools lacking cyber security and safety education”, http://www. staysafeonline.org, 2009 [accessed: 09/10/2010]

McAfee, “Most mobile users don't know if they have security”, McAfee-sponsored research, http://www. esecurityplanet.com, 2008 [accessed: 09/10/2010]

D. A. Dillman, “Mail and internet surveys: the tailored design method”, John Wiley & Sons, 2nd edition, 1999

S. L. Pfleeger, B. A. Kitchenham, “Principles of survey research part 1: turning lemons into lemonade”, ACM SIGSOFT Software Engineering Notes, Vol. 26, No. 6, pp 16-18, 2001

I. Androulidakis, N. Androulidakis, “On a versatile and costless OMR system”, WSEAS Transactions on Computers, Vol. 4, No. 2, pp. 160-165, 2005

CPP, “Mobile phone theft hotspots”, CPP survey, http://www.cpp.co.uk, 2010 [accessed: 09/10/2010]

ITwire, “One-third of aussies lose mobile phones: survey”, ITwire article, http://www.itwire.com, 2010 [accessed: 09/10/2010]

Darkreading, “Survey: 54 percent of organizations plan to add smartphone antivirus this year”, Darkreading article, http://www.darkreading.com, 2010[accessed: 09/10/2010]




eISSN: 1792-8036     pISSN: 2241-4487