Abstract
In this chapter, we will present some interesting findings from a large-scale empirical study. It was conducted in a sample of 7,172 students studying in 17 universities of ten European countries, in order to assess users’ levels of security feeling and awareness in regards to mobile phone communications. As this study revealed, there are categories of users who face increased security risks due to their self-reassuring feeling that mobile phones are per se secure. These users feel that mobile phone communication is secure and tend to be less cautious in their security practices. There was also a statistically backed correlation of an array of demographics and usage characteristics and practices to the overall security level of the user. As such, specific profiles of users were extracted according to their mobile phone objective and subjective security level.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Lenhart A (2010) Cell phones and American adults. Pew Research Center. http://www.pewinternet.org. Accessed Dec 2011
Androulidakis I, Kandus G (2011) A survey on saving personal data in the mobile phone. In: Proceedings of sixth international conference on availability, reliability and security (ARES 2011), pp 633–638, Sept 2011
Androulidakis I, Kandus G. Feeling secure vs. being secure, the mobile phone user case. In: Proceedings of 7th international conference in global security, safety and sustainability (ICGS3), proceedings pending
Androulidakis I, Kandus G (2011) Correlation of mobile phone usage characteristics, security awareness and feeling to the monthly bill. In: proceedings of the 11th international conference on telecommunications, pp 257–263, June 2011
Androulidakis I, Kandus G (2011) Mobile phone downloading among students: the status and its effect on security. In: Proceedings of 10th international conference on mobile business (ICMB2011), pp 235–242, June 2011
Androulidakis I, Kandus G (2011) Differences in users’ state of awareness and practices regarding mobile phones security among EU countries. In: Proceedings of 15th WSEAS international conference on communications, pp 296–300, July 2011
Androulidakis I, Kandus G (2011) Ramifications of mobile phone advanced O/S on security perceptions and practices. In: Proceedings of the 3rd international workshop on cyberspace safety and security (CSS2011), pp 33–38, Sep 2011
Dillman DA (1999) Mail and internet surveys: the tailored design method, 2nd edn. Wiley, New York
Pfleeger SL, Kitchenham BA (2001) Principles of survey research part 1: turning lemons into lemonade. ACM SIGSOFT Software Eng Notes 26(6):16–18
Boynton PM (2004) Hands-on guide to questionnaire research: administering, analyzing, and reporting your questionnaire. BMJ 328:1372–1375
Androulidakis I, Androulidakis N (2005) On a versatile and costless OMR system. Wseas Trans Comput 4(2):160–165
Androulidakis I (2011) Intercepting mobile phone calls and short messages using a GSM tester. In: Proceedings of CN2011, Springer Verlag CCIS 160, pp 281–288
Synovate (2009) Global mobile phone survey shows the mobile is a ‘remote control’ for life. Synovate survey. http://www.synovate.com. Accessed Dec 2011
Siau K, Shen Z (2003) Building customer trust in mobile commerce. Commun ACM 46(4):91–94
Leung A, Sheng Y, Cruickshank H (2007) The security challenges for mobile ubiquitous services. Inform Secur Tech Rep 12(3):162–171
Androulidakis I, Basios C, Androulidakis N (2007) Survey findings towards mobile services usage and M-commerce adoption. In: Proceedings of 18th European regional ITS conference. International Telecommunications Society, CD-ROM, Sep 2007
Androulidakis I, Basios C, Androulidakis N (2008) Surveying users’ opinions and trends towards mobile payment issues. Frontiers in Artificial Intelligence and Applications, vol 169, pp 9–19 (Techniques and applications for mobile commerce—Proceedings of TAMoCo 2008)
McAfee (2008) Mobile security report 2008
Trend Micro (2009) Smartphone users oblivious to security. Trend Micro survey
CPP (2010) Mobile phone theft hotspots. CPP survey
ITwire (2010) One-third of Aussies lose mobile phones: survey. ITwire article
Rahman M, Imai H (2002) Security in wireless communication. Wireless Personal Communications (Online) 22(2):218–228
Androulidakis I, Papapetros D (2008) Survey findings towards awareness of mobile phones’ security issues. Recent advances in data networks, communications, computers. In: Proceedings of 7th WSEAS international conference on data networks, communications, computers (DNCOCO ‘08), pp 130–135, Nov 2008
Vrechopoulos AP, Constantiou ID, Sideris I (2002) Strategic marketing planning for mobile commerce diffusion and consumer adoption. In: Proceedings of MBusiness 2002, 8–9 July 2002
comScore M:Metrics (2008) Smarter phones bring security risks: study. http://www.comscore.com. Accessed Dec 2011
Allam SA (2009) Model to measure the maturity of smart-phone security at software consultancies. Thesis, University of Fort Hare. http://hdl.handle.net/10353/281
National Cyber Security Alliance (NCSA) (2009) Schools lacking cyber security and safety education
Cable & Wireless (2009) Workers lack mobile phone etiquette
De Keukelaere F, Yoshihama S, Trent S, Zhang Y, Luo L, Zurko ME (2009) Adaptive security dialogs for improved security behavior of users, Human–computer interaction—INTERACT 2009. LNCS 2009, vol 5726/2009, pp 510–523
Langheinrich M (2002) A privacy awareness system for ubiquitous computing environments. In: Proceedings of UbiComp 2002, pp 237–245
Cornwell J, Fette I, Hsieh G, Prabaker M, Rao J, Tang K, Vaniea K, Bauer L, Cranor L, Hong J, McLaren B, Reiter M, Sadeh N (2007) User-controllable security and privacy for pervasive computing. In: Eighth IEEE workshop on mobile computing systems and applications, HotMobile 2007
King NJ, Jessen PW (2010) Profiling the mobile customer—privacy concerns when behavioral advertisers target mobile phones. Comput Law Security Rev 26(5):455–478
ABI Research (2009) Study: enterprises need to address cell phone security
TechRepublic (2007) Survey respondents say companies are lax on mobile security. TechRepublic article
Darkreading (2010) Survey: 54 percent of organizations plan to add smartphone antivirus this year. Darkreading article
Goode Intelligence (2009) Mobile security the next battleground
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2012 Springer Science+Business Media New York
About this chapter
Cite this chapter
Androulidakis, I.I. (2012). A Multinational Survey on Users’ Practices, Perceptions, and Awareness Regarding Mobile Phone Security. In: Mobile Phone Security and Forensics. SpringerBriefs in Electrical and Computer Engineering(). Springer, Boston, MA. https://doi.org/10.1007/978-1-4614-1650-0_2
Download citation
DOI: https://doi.org/10.1007/978-1-4614-1650-0_2
Published:
Publisher Name: Springer, Boston, MA
Print ISBN: 978-1-4614-1649-4
Online ISBN: 978-1-4614-1650-0
eBook Packages: EngineeringEngineering (R0)