Skip to main content

A Multinational Survey on Users’ Practices, Perceptions, and Awareness Regarding Mobile Phone Security

  • Chapter
  • First Online:
  • 1398 Accesses

Part of the book series: SpringerBriefs in Electrical and Computer Engineering ((BRIEFSELECTRIC))

Abstract

In this chapter, we will present some interesting findings from a large-scale empirical study. It was conducted in a sample of 7,172 students studying in 17 universities of ten European countries, in order to assess users’ levels of security feeling and awareness in regards to mobile phone communications. As this study revealed, there are categories of users who face increased security risks due to their self-reassuring feeling that mobile phones are per se secure. These users feel that mobile phone communication is secure and tend to be less cautious in their security practices. There was also a statistically backed correlation of an array of demographics and usage characteristics and practices to the overall security level of the user. As such, specific profiles of users were extracted according to their mobile phone objective and subjective security level.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   34.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Lenhart A (2010) Cell phones and American adults. Pew Research Center. http://www.pewinternet.org. Accessed Dec 2011

  2. Androulidakis I, Kandus G (2011) A survey on saving personal data in the mobile phone. In: Proceedings of sixth international conference on availability, reliability and security (ARES 2011), pp 633–638, Sept 2011

    Google Scholar 

  3. Androulidakis I, Kandus G. Feeling secure vs. being secure, the mobile phone user case. In: Proceedings of 7th international conference in global security, safety and sustainability (ICGS3), proceedings pending

    Google Scholar 

  4. Androulidakis I, Kandus G (2011) Correlation of mobile phone usage characteristics, security awareness and feeling to the monthly bill. In: proceedings of the 11th international conference on telecommunications, pp 257–263, June 2011

    Google Scholar 

  5. Androulidakis I, Kandus G (2011) Mobile phone downloading among students: the status and its effect on security. In: Proceedings of 10th international conference on mobile business (ICMB2011), pp 235–242, June 2011

    Google Scholar 

  6. Androulidakis I, Kandus G (2011) Differences in users’ state of awareness and practices regarding mobile phones security among EU countries. In: Proceedings of 15th WSEAS international conference on communications, pp 296–300, July 2011

    Google Scholar 

  7. Androulidakis I, Kandus G (2011) Ramifications of mobile phone advanced O/S on security perceptions and practices. In: Proceedings of the 3rd international workshop on cyberspace safety and security (CSS2011), pp 33–38, Sep 2011

    Google Scholar 

  8. Dillman DA (1999) Mail and internet surveys: the tailored design method, 2nd edn. Wiley, New York

    Google Scholar 

  9. Pfleeger SL, Kitchenham BA (2001) Principles of survey research part 1: turning lemons into lemonade. ACM SIGSOFT Software Eng Notes 26(6):16–18

    Google Scholar 

  10. Boynton PM (2004) Hands-on guide to questionnaire research: administering, analyzing, and reporting your questionnaire. BMJ 328:1372–1375

    Article  Google Scholar 

  11. Androulidakis I, Androulidakis N (2005) On a versatile and costless OMR system. Wseas Trans Comput 4(2):160–165

    Google Scholar 

  12. Androulidakis I (2011) Intercepting mobile phone calls and short messages using a GSM tester. In: Proceedings of CN2011, Springer Verlag CCIS 160, pp 281–288

    Google Scholar 

  13. Synovate (2009) Global mobile phone survey shows the mobile is a ‘remote control’ for life. Synovate survey. http://www.synovate.com. Accessed Dec 2011

  14. Siau K, Shen Z (2003) Building customer trust in mobile commerce. Commun ACM 46(4):91–94

    Article  Google Scholar 

  15. Leung A, Sheng Y, Cruickshank H (2007) The security challenges for mobile ubiquitous services. Inform Secur Tech Rep 12(3):162–171

    Article  Google Scholar 

  16. Androulidakis I, Basios C, Androulidakis N (2007) Survey findings towards mobile services usage and M-commerce adoption. In: Proceedings of 18th European regional ITS conference. International Telecommunications Society, CD-ROM, Sep 2007

    Google Scholar 

  17. Androulidakis I, Basios C, Androulidakis N (2008) Surveying users’ opinions and trends towards mobile payment issues. Frontiers in Artificial Intelligence and Applications, vol 169, pp 9–19 (Techniques and applications for mobile commerce—Proceedings of TAMoCo 2008)

    Google Scholar 

  18. McAfee (2008) Mobile security report 2008

    Google Scholar 

  19. Trend Micro (2009) Smartphone users oblivious to security. Trend Micro survey

    Google Scholar 

  20. CPP (2010) Mobile phone theft hotspots. CPP survey

    Google Scholar 

  21. ITwire (2010) One-third of Aussies lose mobile phones: survey. ITwire article

    Google Scholar 

  22. Rahman M, Imai H (2002) Security in wireless communication. Wireless Personal Communications (Online) 22(2):218–228

    Google Scholar 

  23. Androulidakis I, Papapetros D (2008) Survey findings towards awareness of mobile phones’ security issues. Recent advances in data networks, communications, computers. In: Proceedings of 7th WSEAS international conference on data networks, communications, computers (DNCOCO ‘08), pp 130–135, Nov 2008

    Google Scholar 

  24. Vrechopoulos AP, Constantiou ID, Sideris I (2002) Strategic marketing planning for mobile commerce diffusion and consumer adoption. In: Proceedings of MBusiness 2002, 8–9 July 2002

    Google Scholar 

  25. comScore M:Metrics (2008) Smarter phones bring security risks: study. http://www.comscore.com. Accessed Dec 2011

  26. Allam SA (2009) Model to measure the maturity of smart-phone security at software consultancies. Thesis, University of Fort Hare. http://hdl.handle.net/10353/281

  27. National Cyber Security Alliance (NCSA) (2009) Schools lacking cyber security and safety education

    Google Scholar 

  28. Cable & Wireless (2009) Workers lack mobile phone etiquette

    Google Scholar 

  29. De Keukelaere F, Yoshihama S, Trent S, Zhang Y, Luo L, Zurko ME (2009) Adaptive security dialogs for improved security behavior of users, Human–computer interaction—INTERACT 2009. LNCS 2009, vol 5726/2009, pp 510–523

    Google Scholar 

  30. Langheinrich M (2002) A privacy awareness system for ubiquitous computing environments. In: Proceedings of UbiComp 2002, pp 237–245

    Google Scholar 

  31. Cornwell J, Fette I, Hsieh G, Prabaker M, Rao J, Tang K, Vaniea K, Bauer L, Cranor L, Hong J, McLaren B, Reiter M, Sadeh N (2007) User-controllable security and privacy for pervasive computing. In: Eighth IEEE workshop on mobile computing systems and applications, HotMobile 2007

    Google Scholar 

  32. King NJ, Jessen PW (2010) Profiling the mobile customer—privacy concerns when behavioral advertisers target mobile phones. Comput Law Security Rev 26(5):455–478

    Article  Google Scholar 

  33. ABI Research (2009) Study: enterprises need to address cell phone security

    Google Scholar 

  34. TechRepublic (2007) Survey respondents say companies are lax on mobile security. TechRepublic article

    Google Scholar 

  35. Darkreading (2010) Survey: 54 percent of organizations plan to add smartphone antivirus this year. Darkreading article

    Google Scholar 

  36. Goode Intelligence (2009) Mobile security the next battleground

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer Science+Business Media New York

About this chapter

Cite this chapter

Androulidakis, I.I. (2012). A Multinational Survey on Users’ Practices, Perceptions, and Awareness Regarding Mobile Phone Security. In: Mobile Phone Security and Forensics. SpringerBriefs in Electrical and Computer Engineering(). Springer, Boston, MA. https://doi.org/10.1007/978-1-4614-1650-0_2

Download citation

  • DOI: https://doi.org/10.1007/978-1-4614-1650-0_2

  • Published:

  • Publisher Name: Springer, Boston, MA

  • Print ISBN: 978-1-4614-1649-4

  • Online ISBN: 978-1-4614-1650-0

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics