Table of Contents Author Guidelines Submit a Manuscript
Mobile Information Systems
Volume 2019, Article ID 2786913, 11 pages
https://doi.org/10.1155/2019/2786913
Research Article

Security Awareness Level of Smartphone Users: An Exploratory Case Study

1Information System Engineering, Atilim University, Ankara, Turkey
2Department of Mathematics, Cankaya University, Ankara, Turkey

Correspondence should be addressed to Murat Koyuncu; rt.ude.milita@ucnuyokm

Received 5 December 2018; Accepted 23 April 2019; Published 13 May 2019

Academic Editor: Marco Picone

Copyright © 2019 Murat Koyuncu and Tolga Pusatli. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. C. Chen, K. Z. K. Zhang, X. Gong, S. J. Zhao, M. K. O. Lee, and L. Liang, “Understanding compulsive smartphone use: an empirical test of a flow-based model,” International Journal of Information Management, vol. 37, no. 5, pp. 438–454, 2017. View at Publisher · View at Google Scholar · View at Scopus
  2. Statista, “Number of apps available in leading app stores as of 1st quarter 2018,” July 2018, https://www.statista.com/statistics/276623/number-of-apps-available-in-leading-app-stores. View at Google Scholar
  3. Statista, “Number of mobile app downloads worldwide in 2017, 2018 and 2022,” July 2018, https://www.statista.com/statistics/271644/worldwide-free-and-paid-mobile-app-store-downloads. View at Google Scholar
  4. StatCounter, “Desktop vs. mobile vs. tablet market share worldwide,” July 2018, http://gs.statcounter.com/platform-market-share/desktop-mobile-tablet/worldwide. View at Google Scholar
  5. W. He, “A survey of security risks of mobile social media through blog mining and an extensive literature search,” Information Management and Computer Security, vol. 21, no. 5, pp. 381–400, 2013. View at Publisher · View at Google Scholar · View at Scopus
  6. W. Jeon, J. Kim, Y. Lee, and D. Won, “A practical analysis of smartphone security,” in Human Interface, Part I, HCII 2011, LNCS 6771, M. J. Smith and G. Salvendy, Eds., pp. 311–320, 2011. View at Publisher · View at Google Scholar · View at Scopus
  7. M. Theoharidou, A. Mylonas, and D. Gritzalis, “A risk assessment method for smartphones,” in Proceedings of the Information Security and Privacy Research (SEC), IFIP AICT, Heraklion, Greece, June 2012.
  8. Symantec Corporation, Internet Security Threat Report (ISTR), vol. 22, Symantec Corporation, Mountain View, CA, USA, 2017.
  9. B. Snell, Mobile Threat Report: What’s on the Horizon for 2016, Intel, Santa Clara, CA, USA, 2016.
  10. McAfee, McAfee Mobile Threat Report Q1, 2018, McAfee, Santa Clara, CA, USA, 2018.
  11. T. McGill and N. Thompson, “Old risks, new challenges: exploring differences in security between home computer and mobile device use,” Behaviour and Information Technology, vol. 36, no. 11, pp. 1111–1124, 2017. View at Publisher · View at Google Scholar · View at Scopus
  12. P. Baillette, Y. Barlette, and A. Leclercq-Vandelannoitte, “Bring your own device in organizations: extending the reversed IT adoption logic to security paradoxes for CEOs and end users,” International Journal of Information Management, vol. 43, pp. 76–84, 2018. View at Publisher · View at Google Scholar · View at Scopus
  13. G. Hogben and M. Dekker, Smartphones: Information security risks, opportunities and recommendations for users, ENISA, Heraklion, Greece, 2010.
  14. B. Watson and J. Zheng, “On the user awareness of mobile security recommendations,” in Proceedings of ACM SE ’17, Kennesaw, GA, USA, April 2017. View at Publisher · View at Google Scholar
  15. F. Parker, J. Ophoff, J. P. Van Belle, and R. Karia, “Security awareness and adoption of security controls by smartphone users,” in Proceedings of Second International Conference on Information Security and Cyber Forensics (InfoSec), pp. 99–104, Cape Town, South Africa, November 2015.
  16. T. Dinev and Q. Hu, “The centrality of awareness in the formation of user behavioral intention toward protective information technologies,” Journal of the Association for Information Systems, vol. 8, no. 7, pp. 386–408, 2007. View at Publisher · View at Google Scholar
  17. R. Bitton, A. Finkelshtein, L. Sidi, R. Puzis, L. Rokach, and A. Shabtai, “Taxonomy of mobile users' security awareness,” Computers and Security, vol. 73, pp. 266–293, 2018. View at Publisher · View at Google Scholar · View at Scopus
  18. V. Gkioulos, G. Wangen, S. Katsikas, G. Kavallieratos, and P. Kotzanikolaou, “Security awareness of the digital natives,” Information, vol. 8, no. 2, p. 42, 2017. View at Publisher · View at Google Scholar · View at Scopus
  19. M. A. Harris, A. G. Chin, and R. Brookshire, “Mobile app installation: the role of precautions and desensitization,” Journal of International Technology and Information Management, vol. 24, no. 4, pp. 47–62, 2015. View at Google Scholar
  20. B. H. Jones and A. G. Chin, “On the efficacy of smartphone security: a critical analysis of modifications in business students’ practices over time,” International Journal of Information Management, vol. 35, no. 5, pp. 561–571, 2015. View at Publisher · View at Google Scholar · View at Scopus
  21. B. Markelj and I. Bernik, “Safe use of mobile devices arises from knowing the threats,” Journal of Information Security and Applications, vol. 20, pp. 84–89, 2015. View at Publisher · View at Google Scholar · View at Scopus
  22. I. I. Androulidakis, Mobile Phone Security and Forensics: A Practical Approach, Springer, Berlin, Germay, 2012.
  23. A. Mylonas, A. Kastania, and D. Gritzalis, “Delegate the smartphone user? Security awareness in smartphone platforms,” Computers & Security, vol. 34, pp. 47–66, 2013. View at Publisher · View at Google Scholar · View at Scopus
  24. A. McIlwraith, Information Security and Employee Behaviour: How to Reduce Risk through Employee Education, Training and Awareness, Routledge, New York, NY, USA, 2016.
  25. M. A. Harris, R. Brookshire, and A. G. Chin, “Identifying factors influencing consumers' intent to install mobile applications,” International Journal of Information Management, vol. 36, no. 3, pp. 441–450, 2016. View at Publisher · View at Google Scholar · View at Scopus
  26. A. P. Felt, E. Ha, S. Egelman, A. Haney, E. Chin, and D. Wagner, “Android permissions: user attention, comprehension, and behavior,” in Proceedings of the Eighth Symposium on Usable Privacy and Security, Washington, DC, USA, July 2012.
  27. E. Chin, A. P. Felt, V. Sekary, and D. Wagner, “Measuring user confidence in smartphone security and privacy,” in Proceedings of the Symposium on Usable Privacy and Security (SOUPS), Washington, DC, USA, July 2012.
  28. Z. Benenson, O. Kroll-Peters, and M. Krupp, “Attitudes to IT security when using a smartphone,” in Proceedings of the Federated Conference on Computer Science and Information Systems (FedCSIS), Wrocław, Poland, September 2012.
  29. E. Lie, R. Macmillan, and R. Keck, “Cybersecurity: the role and responsibilities of an effective regulator,” in Proceedings of the 9th ITU Global Symposium for Regulators (GSR), Beirut, Lebanon, November 2009.
  30. A. Palmer, “Cyber security: the road to security begins with personal responsibility,” Symantec Official Blog, 2010. View at Google Scholar
  31. M. Bada, S. Creese, M. Goldsmi, C. Mitchell, and E. Phillips, Computer Security Incident Response Teams (CSIRTs): An Overview, Oxford Martin School, University of Oxford: Global Cyber Security Capacity Centre, Oxford, UK, 2014.
  32. S. K. Sood, “A combined approach to ensure data security in cloud computing,” Journal of Network and Computer Applications, vol. 35, no. 6, pp. 1831–1838, 2012. View at Publisher · View at Google Scholar · View at Scopus
  33. Z. F. Zaaba, S. M. Furnell, and P. S. Dowland, “End-user perception and usability of information security,” in Proceedings of the Fifth International Symposium on Human Aspects of Information Security and Assurance (HAISA 2011), London, UK, July 2011.
  34. Q. Li and G. Clark, “Mobile security: a look ahead,” IEEE Security and Privacy, vol. 11, no. 1, pp. 78–81, 2013. View at Publisher · View at Google Scholar · View at Scopus
  35. C. Wang, X. Zheng, Y. J. Chen, and J. Yang, “Locating rogue access point using fine-grained channel information,” IEEE Transactions on Mobile Computing, vol. 16, no. 9, pp. 2560–2573, 2017. View at Publisher · View at Google Scholar · View at Scopus
  36. G. Öğütçü, Ö. M. Testik, and O. Chouseinoglou, “Analysis of personal information security behavior and awareness,” Computers and Security, vol. 56, pp. 83–93, 2016. View at Publisher · View at Google Scholar · View at Scopus
  37. R. Kang, L. Dabbish, N. Fruchter, and S. Kiesler, “My data just goes everywhere: user mental models of the Internet and implications for privacy and security,” in Proceedings of the Eleventh Symposium on Usable Privacy and Security, pp. 39–52, Ottawa, Canada, July 2015.