Skip to main content

PINEPULSE: A System to PINpoint and Educate Mobile Phone Users with Low Security

  • Conference paper

Abstract

The threats mobile phone users face, are about to increase due to the rapid penetration of advanced smartphone devices and the growing Internet access using them. As such, reinforcing users’ security has become a critical imperative. This paper refers to a system that pinpoints and informs mobile phone users that have a low security level, thus helping them protect themselves. The system consists of software-application, installed in mobile phones as well as of software and data bases, installed in the mobile telephony operators’ servers. Mobile telephony providers (by adopting this application), as well as manufacturers (by pre-installing it in their phones), could help mitigate the increased security threats effectively protecting the end users.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. comScore M: Metrics: Smarter phones bring security risks: Study (2008)

    Google Scholar 

  2. Leung, A., Sheng, Y., Cruickshank, H.: The security challenges for mobile ubiquitous services. Information Security Technical Report 12(3), 162–171 (2007)

    Article  Google Scholar 

  3. Androulidakis, I., Kandus, G.: A Survey on Saving Personal Data in the Mobile Phone. Proceedings of Sixth International Conference on Availability, Reliability and Security (ARES 2011), pp. 633–638 (2011)

    Google Scholar 

  4. Allam, S.: Model to measure the maturity of smartphone security at software consultancies. Thesis. University of Fort Hare (2009)

    Google Scholar 

  5. McAfee: Mobile Security Report 2008 (2008)

    Google Scholar 

  6. Trend Micro: Smartphone Users Oblivious to Security. Trend Micro survey (2009)

    Google Scholar 

  7. CPP: Mobile phone theft hotspots. CPP survey (2010)

    Google Scholar 

  8. ITwire: One-third of Aussies lose mobile phones: survey. ITwire article (2010)

    Google Scholar 

  9. ABI Research, Study: Enterprises Need to Address Cell Phone Security (2009)

    Google Scholar 

  10. TechRepublic: Survey respondents say companies are lax on mobile security. TechRepublic article (2007)

    Google Scholar 

  11. Darkreading: Survey: 54 Percent Of Organizations Plan To Add Smartphone Antivirus This Year. Darkreading article (2010)

    Google Scholar 

  12. Langheinrich, M.: A Privacy Awareness System for Ubiquitous Computing Environments. In: Borriello, G., Holmquist, L.E. (eds.) UbiComp 2002. LNCS, vol. 2498, pp. 237–245. Springer, Heidelberg (2002)

    Chapter  Google Scholar 

  13. Cornwell, J., Fette, I., Hsieh, G., Prabaker, M., Rao, J., Tang, K., Vaniea, K., Bauer, L., Cranor, L., Hong, J., McLaren, B., Reiter, M., Sadeh, N.: User-Controllable Security and Privacy for Pervasive Computing. In: Eighth IEEE Workshop on Mobile Computing Systems and Applications, HotMobile 2007 (2007)

    Google Scholar 

  14. King, N.J., Jessen, P.W.: Profiling the mobile customer – Privacy concerns when behavioral advertisers target mobile phones. Computer Law & Security Review 26(5), 455–478 (2010)

    Article  Google Scholar 

  15. Goode Intelligence: Mobile security the next battleground (2009)

    Google Scholar 

  16. National Cyber Security Alliance (NCSA): Schools Lacking Cyber Security and Safety Education (2009)

    Google Scholar 

  17. Cable & Wireless: Workers lack mobile phone etiquette (2009)

    Google Scholar 

  18. De Keukelaere, F., Yoshihama, S., Trent, S., Zhang, Y., Luo, L., Zurko, M.E.: Adaptive Security Dialogs for Improved Security Behavior of Users. In: Gross, T., Gulliksen, J., Kotzé, P., Oestreicher, L., Palanque, P., Prates, R.O., Winckler, M. (eds.) INTERACT 2009. LNCS, vol. 5726, pp. 510–523. Springer, Heidelberg (2009)

    Chapter  Google Scholar 

  19. Androulidakis, I., Kandus, G.: Feeling Secure vs. Being Secure the Mobile Phone User Case. In: Jahankhani, H., et al. (eds.) ICGS3/e-Democracy 2011. LNICST, vol. 99, pp. 212–219. Springer, Heidelberg (2012)

    Google Scholar 

  20. Hakila, J., Chatfield, C.: Personal customization of mobile phones: a case study. In: Proceedings of NordiCHI, pp. 409–412 (2006)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 ICST Institute for Computer Science, Social Informatics and Telecommunications Engineering

About this paper

Cite this paper

Androulidakis, I., Kandus, G. (2012). PINEPULSE: A System to PINpoint and Educate Mobile Phone Users with Low Security. In: Georgiadis, C.K., Jahankhani, H., Pimenidis, E., Bashroush, R., Al-Nemrat, A. (eds) Global Security, Safety and Sustainability & e-Democracy. e-Democracy ICGS3 2011 2011. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 99. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-33448-1_9

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-33448-1_9

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-33447-4

  • Online ISBN: 978-3-642-33448-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics