Mobile Phone Brand Categorization vs. Users' Security Practices

Authors

  • I. Androulidakis MPS Jozef Stefan, Slovenia, University of Ioannina, Greece
  • G. Kandus Department of Communication Systems, Jozef Stefan Institute, Slovenia

Abstract

In the present paper, we correlated the brand of mobile phone to users’ security practices, statistically processing a large pool of the responses of 7172 students in 17 Universities of 10 Eastern and Southern Europe countries. Users show different behavior in an array of characteristics, according to the brand of the mobile phone they are using. As such, there is a categorization of areas, different for each brand, where users are clearly lacking security mind, possibly due to lack of awareness. Such a categorization can help phone manufacturers enhance their mobile phones in regards to security, preferably transparently for the user.

Keywords:

mobile phone security, brand profiling, security practices, survey,

Downloads

Download data is not yet available.

References

Synovate, “Global mobile phone survey shows the mobile is a 'remote control' for life”, Synovate survey, http://www.synovate.com, 2009 [accessed: 09/10/2010]

M. Rahman, H. Imai, “Security in wireless communication”, Wireless Personal Communications, Vol. 22, No. 2, pp. 218-228, 2002 DOI: https://doi.org/10.1023/A:1019968506856

I. Androulidakis, “Intercepting mobile phones”, IT Security Professional Magazine, No. 8, pp. 42-28, 2009

comScore M:Metrics, “Smarter phones bring security risks: study”, http://www.comscore.com, 2008 [accessed 09/10/2010]

Trend Micro, “Smartphone users oblivious to security”, Trend Micro survey, http://www.esecurityplanet.com, 2009, [accessed: 09/10/2010]

Goode Intelligence, “Mobile security the next battleground”, http://www.goodeintelligence, 2009, [accessed: 09/10/2010]

A.P. Vrechopoulos, I.D. Constantiou, I. Sideris, “Strategic marketing planning for mobile commerce diffusion and consumer adoption”, Proceedings of the First International Conference on Mobile Business: Evolution Scenarios for Emerging Mobile Commerce Services, M-BUSINESS, 2002

I. Androulidakis, C. Basios, N. Androulidakis, “Surveying users' opinions and trends towards mobile payment issues”, Frontiers in Artificial Intelligence and Applications, Vol. 169, (Techniques and Applications for Mobile Commerce - Proceedings of TAMoCo 2008), pp. 9-19, 2008

I. Androulidakis, D. Papapetros, “Survey findings towards awareness of mobile phones’ security issues, recent advances in data networks, communications, computers”, Proceedings of 7th WSEAS International Conference on Data Networks, Communications, Computers (DNCOCO '08), pp 130-135, Nov. 2008

National Cyber Security Alliance (NCSA), “Schools lacking cyber security and safety education”, http://www. staysafeonline.org, 2009 [accessed: 09/10/2010]

McAfee, “Most mobile users don't know if they have security”, McAfee-sponsored research, http://www. esecurityplanet.com, 2008 [accessed: 09/10/2010]

D. A. Dillman, “Mail and internet surveys: the tailored design method”, John Wiley & Sons, 2nd edition, 1999

S. L. Pfleeger, B. A. Kitchenham, “Principles of survey research part 1: turning lemons into lemonade”, ACM SIGSOFT Software Engineering Notes, Vol. 26, No. 6, pp 16-18, 2001 DOI: https://doi.org/10.1145/505532.505535

I. Androulidakis, N. Androulidakis, “On a versatile and costless OMR system”, WSEAS Transactions on Computers, Vol. 4, No. 2, pp. 160-165, 2005

CPP, “Mobile phone theft hotspots”, CPP survey, http://www.cpp.co.uk, 2010 [accessed: 09/10/2010]

ITwire, “One-third of aussies lose mobile phones: survey”, ITwire article, http://www.itwire.com, 2010 [accessed: 09/10/2010]

Darkreading, “Survey: 54 percent of organizations plan to add smartphone antivirus this year”, Darkreading article, http://www.darkreading.com, 2010[accessed: 09/10/2010]

Downloads

How to Cite

[1]
I. Androulidakis and G. Kandus, “Mobile Phone Brand Categorization vs. Users’ Security Practices”, Eng. Technol. Appl. Sci. Res., vol. 1, no. 2, pp. 30–35, Apr. 2011.

Metrics

Abstract Views: 1709
PDF Downloads: 482

Metrics Information

Most read articles by the same author(s)