Abstract
Companies demand Mobile Enterprise Applications (MEAs) due to many advantages concerning their employees’ flexibility and productivity. However, adopting MEAs can be risky without applying suitable security measures and policies on mobile devices, namely smartphones and tablets. On the other hand, applying these on mobile devices can restrict their usage. In this paper, we argue that potential restrictions affect the user acceptance of using mobile devices for working purposes. Hence, mobile security measures were researched along with their possible consequences on mobile users. Based on that consequences, a questionnaire was designed and conducted to collect data needed to measure user acceptance. Furthermore, an extension of Technology Acceptance Model (TAM) was proposed taking the “perceived restrictions” as an important construct that affects the user acceptance of applying security measures on their mobile devices. The extended model will help companies by giving an indicator of the user acceptance keeping a balance between security and usability when adopting MEAs.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Giessmann, A., Stanoevska Slabeva, K., Visser, B. de: Mobile Enterprise Applications–Current State and Future Directions. 45th Hawaii International Conference on System Science (HICSS), (2012) 1363–1372
Souppaya, M. and Scarfone, K.: Guidelines for Managing the Security of Mobile Devices in the Enterprise, DOI: 10.6028/NIST.SP.800-124r1, (2013)
Disterer, G., Kleiner, C.: Mobile Endgeraete Im Unternehmen. Technische Ansaetze, Compliance-anforderungen, Management. Vieweg + Teubner Verlag (2014)
Mylonas, A., Kastania, A., Gritzalis, D.: Delegate the smartphone user? Security awareness in smartphone platforms. Computers & Security 34, (2013) 47–66
Basole, R.: Strategic Planning for Enterprise Mobility: A Readiness-Centric Approach. AMCIS 2007 Proceedings. (2007)
Beckett, P.: The business risks of using smartphones. Network Security 2015, (2015) 16–17
Daojing He, Chan, S., Guizani, M.: Mobile application security: malware threats and defenses. Wireless Communications, IEEE 22 (1), (2015) 138–144
Copeland, W., Chiang, C.C.: Securing Enterprise Mobile Information. Consumer and Control (IS3C) Computer, (2012) 80–83
Qing, L., Clark, G.: Mobile Security: A Look Ahead. Security & Privacy, IEEE 11 (1), (2013) 78–81
Jaramillo, D., Furht, B., Agarwal, A.: Mobile Virtualization Technologies. In: Virtualization Techniques for Mobile Systems. Springer International Publishing, Cham (2014) 5–20
Vignesh, U., Asha, S.: Modifying Security Policies Towards BYOD. Procedia Computer Science 50, (2015) 511–516
Davis, F.D.: Perceived Usefulness, Perceived Ease of Use, and User Acceptance of Information Technology. MIS Quarterly 13 (3), DOI: 10.2307/249008, (1989)
Park, J.H., Yi, K.J., Jeong, Y.-S.: An enhanced smartphone security model based on information security management system (ISMS). Electron Commer Res 14, (2014) 321–348
Hasan, B., Mahmoud, T., Marx Gómez, J., Pramod, R., Kurzhöfer, J.: User Acceptance Identification of Restrictions Caused by Mobile Security Countermeasures. In: MOBILITY 2015, The Fifth International Conference on Mobile Services, Resources, and Users, (2015) 31–37
Davis, F.D.: A technology acceptance model for empirically testing new end-user information systems : theory and results. Diss, http://hdl.handle.net/1721.1/15192, (1986)
Venkatesh, V., Davis, F.D.: A Theoretical Extension of the Technology Acceptance Model. Four Longitudinal Field Studies. Management Science 46, (2000) 186–204
Osman, N.B.: Extending the Technology Acceptance Model for Mobile Government Systems. development 5, (2013)
Arpaci, I., Yardimci Cetin, Y., Turetken, O.: Impact of Perceived Security on Organizational Adoption of Smartphones. Cyberpsychology, behavior and social networking 18, (2015) 602–608
Benenson, Z., Girard, A., Krontiris, I., Liagkou, V., Rannenberg, K., Stamatiou, Y.: User Acceptance of Privacy-ABCs: An Exploratory Study. In: Human Aspects of Information Security, Privacy, and Trust, 8533. Springer International Publishing (2014) 375–386
Kashi, K., Zheng, C.: Extending Technology Acceptance Model to the E-recruitment Context in Iran. Int J Select Assess 21, (2013) 121–129
Rogowski, M., Saeed, K., Rybnik, M., Tabedzki, M., Adamski, M.: User Authentication for Mobile Devices. In: Computer Information Systems and Industrial Management, 8104. Springer Berlin Heidelberg, Berlin, Heidelberg (2013) 47–58
Knopper, K.: Mobile Security. In: App4U. Springer Fachmedien Wiesbaden, Wiesbaden (2014) 217–249
Grudzien, W.: Biometrie im Banking — Ein Pläydoyer gegen Vorurteile. Datenschutz Datensich (2015) 39, 7–11
Kambourakis, G., Damopoulos, D., Papamartzivanos, D., Pavlidakis, E.: Introducing touchstroke. Keystroke-based authentication system for smartphones. Security Comm. Networks, DOI: 10.1002/sec.1061, (2014)
Feng, T., Liu, Z., Kwon, K.-A., Shi, W., Carbunar, B., Jiang, Y., Nguyen, N.: Continuous mobile authentication using touchscreen gestures. In: 2012 IEEE International Conference on Technologies for Homeland Security (HST), (2012) 451–456
Muller, T., Freiling, F.C.: A Systematic Assessment of the Security of Full Disk Encryption. IEEE Trans. Dependable and Secure Comput. 12, (2015) 491–503
Turban, E., King, D., Lee, J.K., Liang, T.-P., Turban, D.C.: E-Commerce Security and Fraud Issues and Protections. In: Electronic Commerce. Springer International Publishing, Cham (2015) 457–518
Good Technology Corporation: Evaluating Approaches to Mobile Security. [White Paper], https://media.good.com/documents/wp-evaluting-approaches-to-mobile-security.pdf (2015)
v Do, T., Lyche, F.B., Lytskjold, J.H., van Thuan, D.: Threat assessment model for mobile malware. In: Kim, K.J. (ed.) Information Science and Applications, 339. Springer Berlin Heidelberg, Berlin, Heidelberg (2015) 467–474
Kizza, J.M.: Mobile Systems and Corresponding Intractable Security Issues. In: Kizza, J.M. (ed.) Guide to Computer Network Security. Springer London, London (2015) 491–507
Cronbach, L.J.: Coefficient alpha and the internal structure of tests. Psychometrika 16, (1951) 297–334
Sekaran, U.: Research methods for business. A skill-building approach. New York, Great Britain: Wiley (2003)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2016 Springer Science+Business Media Singapore
About this paper
Cite this paper
Hasan, B., Rajski, E., Gómez, J.M., Kurzhöfer, J. (2016). A Proposed Model for User Acceptance of Mobile Security Measures – Business Context. In: Kim, K., Wattanapongsakorn, N., Joukov, N. (eds) Mobile and Wireless Technologies 2016. Lecture Notes in Electrical Engineering, vol 391. Springer, Singapore. https://doi.org/10.1007/978-981-10-1409-3_11
Download citation
DOI: https://doi.org/10.1007/978-981-10-1409-3_11
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-10-1408-6
Online ISBN: 978-981-10-1409-3
eBook Packages: EngineeringEngineering (R0)