Abstract
Research on the behavioral-based security of information systems within organizations and for personal use has been common over the last decade, however little is known regarding how individuals perceive the security of their mobile devices. This study seeks to explore how the security notifications within a mobile application environment alter adoption and security-related beliefs concerning their device. We propose a theoretical model based on the technology adoption and psychological theories, and propose an experiment to test the model. Contributions and implications of the work are then proposed.
Chapter PDF
Similar content being viewed by others
Keywords
References
Alba, J.W., Hutchinson, J.W.: Dimensions of Consumer Expertise. Journal of Consumer Research 19(4), 411–454 (1987)
Cyr, D., Head, M., Ivanov, A.: Design Aesthetics Leading to m-Loyalty in Mobile Commerce. Information & Management 43(8), 950–963 (2006)
Dagon, D., Martin, T., Starner, T.: Mobile Phones as Computing Devices: The Viruses are Coming. IEEE Pervasive Computing 3(4), 11–15 (2004)
Davis, F.: Perceived Usefulness, Perceived Ease of Use, and User Acceptance of Information Technology. MIS Quarterly 13(3), 319–340 (1989)
Distefano, A., Grillo, A., Lentini, A., Italiano, G.F.: SecureMyDroid: Enforcing Security in the Mobile Devices Lifecycle. In: CSIIRW 2010 Proceedings of the Sixth Annual Workshop on Cyber Security and Information Intelligence Research, vol. 27, pp. 1–4 (2010)
Furnell, S.: Handheld Hazards: The Rise of Malware on Mobile Devices. Computer Fraud & Security 10(5), 4–8 (2005)
Halpert, B.: Mobile Device Security. In: Proceedings of InfoSecCD Conference, Kennesaw, GA (2004)
Josang, A., Sanderud, G.: Security in Mobile Communications: Challenges and Opportunities. In: Proceedings of the First Australian Information Security Workshop (AISW 2003), vol. 21, pp. 43–48. CRPIT, Adelaide (2003)
McCoy, S., Everard, A., Polak, P., Galletta, D.F.: An Experimental Study of Antecedents and Consequences of Online Ad Intrusiveness. International Journal of Human-Computer Interaction 24(7), 672–699 (2008)
Oberheide, J., Jahanian, F.: When Mobile is Harder Than Fixed (and Vice Versa): Demystifying Security Challenges in Mobile Environments. In: Proceedings of the Eleventh International Workshop on Mobile Computing Systems and Applications, Annapolis, MD, USA, February 22 (2010)
Petty, R.E., Wegener, D.T.: Attitude Change: Multiple Roles for Persuasion Variables. In: Gilbert, D.T., Fiske, E., Lindzey, G. (eds.) The Handbook of Social Psychology, vol. 1, pp. 323–390. McGraw-Hill, New York (1998)
Thompson, M.M., Zanna, M.P.: The Conflicted Individual: Personality-Based and Domain-Specific Antecedents of Ambivalent Social Attitudes. Journal of Personality 63(2), 259–288 (1995)
Xie, L., Zhang, X., Chaugule, A., Jaeger, T., Zhu, S.: Designing System-level Defenses against Cellphone Malware. In: Proceedings ofthe 28th IEEE International Symposium on Reliable Distributed Systems, pp. 83–90 (2009)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2013 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Moody, G.D., Wu, D. (2013). Security, But at What Cost?. In: Yamamoto, S. (eds) Human Interface and the Management of Information. Information and Interaction for Health, Safety, Mobility and Complex Environments. HIMI 2013. Lecture Notes in Computer Science, vol 8017. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-39215-3_46
Download citation
DOI: https://doi.org/10.1007/978-3-642-39215-3_46
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-39214-6
Online ISBN: 978-3-642-39215-3
eBook Packages: Computer ScienceComputer Science (R0)