Skip to main content

A Proposed Model for User Acceptance of Mobile Security Measures – Business Context

  • Conference paper
  • First Online:
Mobile and Wireless Technologies 2016

Part of the book series: Lecture Notes in Electrical Engineering ((LNEE,volume 391))

Abstract

Companies demand Mobile Enterprise Applications (MEAs) due to many advantages concerning their employees’ flexibility and productivity. However, adopting MEAs can be risky without applying suitable security measures and policies on mobile devices, namely smartphones and tablets. On the other hand, applying these on mobile devices can restrict their usage. In this paper, we argue that potential restrictions affect the user acceptance of using mobile devices for working purposes. Hence, mobile security measures were researched along with their possible consequences on mobile users. Based on that consequences, a questionnaire was designed and conducted to collect data needed to measure user acceptance. Furthermore, an extension of Technology Acceptance Model (TAM) was proposed taking the “perceived restrictions” as an important construct that affects the user acceptance of applying security measures on their mobile devices. The extended model will help companies by giving an indicator of the user acceptance keeping a balance between security and usability when adopting MEAs.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 169.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  • Giessmann, A., Stanoevska Slabeva, K., Visser, B. de: Mobile Enterprise Applications–Current State and Future Directions. 45th Hawaii International Conference on System Science (HICSS), (2012) 1363–1372

    Google Scholar 

  • Souppaya, M. and Scarfone, K.: Guidelines for Managing the Security of Mobile Devices in the Enterprise, DOI: 10.6028/NIST.SP.800-124r1, (2013)

    Google Scholar 

  • Disterer, G., Kleiner, C.: Mobile Endgeraete Im Unternehmen. Technische Ansaetze, Compliance-anforderungen, Management. Vieweg + Teubner Verlag (2014)

    Google Scholar 

  • Mylonas, A., Kastania, A., Gritzalis, D.: Delegate the smartphone user? Security awareness in smartphone platforms. Computers & Security 34, (2013) 47–66

    Google Scholar 

  • Basole, R.: Strategic Planning for Enterprise Mobility: A Readiness-Centric Approach. AMCIS 2007 Proceedings. (2007)

    Google Scholar 

  • Beckett, P.: The business risks of using smartphones. Network Security 2015, (2015) 16–17

    Google Scholar 

  • Daojing He, Chan, S., Guizani, M.: Mobile application security: malware threats and defenses. Wireless Communications, IEEE 22 (1), (2015) 138–144

    Google Scholar 

  • Copeland, W., Chiang, C.C.: Securing Enterprise Mobile Information. Consumer and Control (IS3C) Computer, (2012) 80–83

    Google Scholar 

  • Qing, L., Clark, G.: Mobile Security: A Look Ahead. Security & Privacy, IEEE 11 (1), (2013) 78–81

    Google Scholar 

  • Jaramillo, D., Furht, B., Agarwal, A.: Mobile Virtualization Technologies. In: Virtualization Techniques for Mobile Systems. Springer International Publishing, Cham (2014) 5–20

    Google Scholar 

  • Vignesh, U., Asha, S.: Modifying Security Policies Towards BYOD. Procedia Computer Science 50, (2015) 511–516

    Google Scholar 

  • Davis, F.D.: Perceived Usefulness, Perceived Ease of Use, and User Acceptance of Information Technology. MIS Quarterly 13 (3), DOI: 10.2307/249008, (1989)

    Google Scholar 

  • Park, J.H., Yi, K.J., Jeong, Y.-S.: An enhanced smartphone security model based on information security management system (ISMS). Electron Commer Res 14, (2014) 321–348

    Google Scholar 

  • Hasan, B., Mahmoud, T., Marx Gómez, J., Pramod, R., Kurzhöfer, J.: User Acceptance Identification of Restrictions Caused by Mobile Security Countermeasures. In: MOBILITY 2015, The Fifth International Conference on Mobile Services, Resources, and Users, (2015) 31–37

    Google Scholar 

  • Davis, F.D.: A technology acceptance model for empirically testing new end-user information systems : theory and results. Diss, http://hdl.handle.net/1721.1/15192, (1986)

    Google Scholar 

  • Venkatesh, V., Davis, F.D.: A Theoretical Extension of the Technology Acceptance Model. Four Longitudinal Field Studies. Management Science 46, (2000) 186–204

    Google Scholar 

  • Osman, N.B.: Extending the Technology Acceptance Model for Mobile Government Systems. development 5, (2013)

    Google Scholar 

  • Arpaci, I., Yardimci Cetin, Y., Turetken, O.: Impact of Perceived Security on Organizational Adoption of Smartphones. Cyberpsychology, behavior and social networking 18, (2015) 602–608

    Google Scholar 

  • Benenson, Z., Girard, A., Krontiris, I., Liagkou, V., Rannenberg, K., Stamatiou, Y.: User Acceptance of Privacy-ABCs: An Exploratory Study. In: Human Aspects of Information Security, Privacy, and Trust, 8533. Springer International Publishing (2014) 375–386

    Google Scholar 

  • Kashi, K., Zheng, C.: Extending Technology Acceptance Model to the E-recruitment Context in Iran. Int J Select Assess 21, (2013) 121–129

    Google Scholar 

  • Rogowski, M., Saeed, K., Rybnik, M., Tabedzki, M., Adamski, M.: User Authentication for Mobile Devices. In: Computer Information Systems and Industrial Management, 8104. Springer Berlin Heidelberg, Berlin, Heidelberg (2013) 47–58

    Google Scholar 

  • Knopper, K.: Mobile Security. In: App4U. Springer Fachmedien Wiesbaden, Wiesbaden (2014) 217–249

    Google Scholar 

  • Grudzien, W.: Biometrie im Banking — Ein Pläydoyer gegen Vorurteile. Datenschutz Datensich (2015) 39, 7–11

    Google Scholar 

  • Kambourakis, G., Damopoulos, D., Papamartzivanos, D., Pavlidakis, E.: Introducing touchstroke. Keystroke-based authentication system for smartphones. Security Comm. Networks, DOI: 10.1002/sec.1061, (2014)

    Google Scholar 

  • Feng, T., Liu, Z., Kwon, K.-A., Shi, W., Carbunar, B., Jiang, Y., Nguyen, N.: Continuous mobile authentication using touchscreen gestures. In: 2012 IEEE International Conference on Technologies for Homeland Security (HST), (2012) 451–456

    Google Scholar 

  • Muller, T., Freiling, F.C.: A Systematic Assessment of the Security of Full Disk Encryption. IEEE Trans. Dependable and Secure Comput. 12, (2015) 491–503

    Google Scholar 

  • Turban, E., King, D., Lee, J.K., Liang, T.-P., Turban, D.C.: E-Commerce Security and Fraud Issues and Protections. In: Electronic Commerce. Springer International Publishing, Cham (2015) 457–518

    Google Scholar 

  • Good Technology Corporation: Evaluating Approaches to Mobile Security. [White Paper], https://media.good.com/documents/wp-evaluting-approaches-to-mobile-security.pdf (2015)

    Google Scholar 

  • v Do, T., Lyche, F.B., Lytskjold, J.H., van Thuan, D.: Threat assessment model for mobile malware. In: Kim, K.J. (ed.) Information Science and Applications, 339. Springer Berlin Heidelberg, Berlin, Heidelberg (2015) 467–474

    Google Scholar 

  • Kizza, J.M.: Mobile Systems and Corresponding Intractable Security Issues. In: Kizza, J.M. (ed.) Guide to Computer Network Security. Springer London, London (2015) 491–507

    Google Scholar 

  • Cronbach, L.J.: Coefficient alpha and the internal structure of tests. Psychometrika 16, (1951) 297–334

    Google Scholar 

  • Sekaran, U.: Research methods for business. A skill-building approach. New York, Great Britain: Wiley (2003)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Basel Hasan .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer Science+Business Media Singapore

About this paper

Cite this paper

Hasan, B., Rajski, E., Gómez, J.M., Kurzhöfer, J. (2016). A Proposed Model for User Acceptance of Mobile Security Measures – Business Context. In: Kim, K., Wattanapongsakorn, N., Joukov, N. (eds) Mobile and Wireless Technologies 2016. Lecture Notes in Electrical Engineering, vol 391. Springer, Singapore. https://doi.org/10.1007/978-981-10-1409-3_11

Download citation

  • DOI: https://doi.org/10.1007/978-981-10-1409-3_11

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-10-1408-6

  • Online ISBN: 978-981-10-1409-3

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics