107,937 Hits in 4.2 sec

A Fine-Grained Analysis of User Activity on Mobile Applications: The Sensitivity Level Perception

Saud Alotaibi, Steven Furnell, Nathan Clarke
2015 International Journal for Information Security Research  
The main aim of this research is to investigate when to authenticate the mobile user by focusing on the sensitivity level of each intra-process (within the application) and understanding whether a certain  ...  Mobile devices contain different levels of data and applications such as photos, text messages, emails and mobile banking applications.  ...  In particular, mobile application misconfigurations will be the most common mobile security breaches, accounting for approximately 75% of all breaches [1] .  ... 
doi:10.20533/ijisr.2042.4639.2015.0068 fatcat:qqorfhxknvbpfcffjmd33zz5fe

Detecting Mobile Application Spoofing Attacks by Leveraging User Visual Similarity Perception

Luka Malisa, Kari Kostiainen, Srdjan Capkun
2017 Proceedings of the Seventh ACM on Conference on Data and Application Security and Privacy - CODASPY '17  
A common example of mobile application spoofing is a phishing attack where the adversary tricks the user into revealing her password to a malicious application that resembles the legitimate one.  ...  Mobile application spoofing is an attack where a malicious mobile application mimics the visual appearance of another one.  ...  To the best of our knowledge, no previous studies on the user perception of visual changes in mobile application user interfaces exist.  ... 
doi:10.1145/3029806.3029819 dblp:conf/codaspy/MalisaKC17 fatcat:lradysiosjcltaqdl77fzry7ce

Mobile Applications Security: Role of Privacy

Hamid Reza Nikkhah, Ali Balapour, Rajiv Sabherwal
2018 Americas Conference on Information Systems  
Mobile applications developers constantly provide new solutions to enhance security of mobile applications, but mobile users' security concerns are not diminished as long as the associated behavioral factors  ...  Mobile users still express their concerns about security of mobile applications because these applications have access to personal information stored on mobile devices.  ...  The security issue is still a concern for technology users including users of mobile applications (apps) that are growing at a rapid pace.  ... 
dblp:conf/amcis/NikkhahBS18 fatcat:qxgpuu527vcnxbt7k7c4pualxu

Improving mobile application security via bridging user expectations and application behaviors

Wei Yang, Xusheng Xiao, Rahul Pandita, William Enck, Tao Xie
2014 Proceedings of the 2014 Symposium and Bootcamp on the Science of Security - HotSoS '14  
To keep malware out of mobile application markets, existing techniques analyze the security aspects of application behaviors and summarize patterns of these security aspects to determine what applications  ...  This poster presents our recent work on bridging the semantic gap between user perceptions of the application behaviors and the actual application behaviors.  ...  The increasing popularity of mobile applications spurs the occurrences of security attacks and privacy leakage on the applications.  ... 
doi:10.1145/2600176.2600208 dblp:conf/hotsos/YangXPEX14 fatcat:nkko5qahmrchvhhded4u3jmhoe

Users" Perceptions of Mobile Phone Security: A Survey Study in the Kingdom of Saudi Arabia

Thamer Alhussain, Rayed AlGhamdi, Salem Alkhalaf, Osama Alfarraj
2013 Journal of clean energy technologies  
This paper explores the perceptions of mobile phone users in the Kingdom of Saudi Arabia (KSA) regarding the security of mobile phone devices.  ...  With the rapid growth of mobile phone devices, there is a growing need for user authentication for the protection of data and services, and to promote public trust.  ...  " perceptions of the security in their mobile devices.  ... 
doi:10.7763/ijcte.2013.v5.798 fatcat:dvzotpmyobgr7iwcmpjhockqua

Developing a Theoretical Framework for the Adoption of Biometrics in M-Government Applications Using Grounded Theory [chapter]

Thamer Alhussain, Steve Drew
2012 Security Enhanced Applications for Information Systems  
The negative security perception is a serious issue that citizens have regarding the use of mobile services which may affect their adoption of the technology for critical applications (Chang and Kannan  ...  providers', and network operators' perceptions regarding the application of biometrics in m-government security.  ...  This may have an impact on both the users' trust as well as the reputation of the system's stakeholders. Designing and implementing security enhanced systems is of vital importance.  ... 
doi:10.5772/36881 fatcat:pc5unrvazzfullgjwwgp7a3w64

Smartphone users: Understanding how security mechanisms are perceived and new persuasive methods

Mansour Alsaleh, Noura Alomar, Abdulrahman Alarifi, Kim-Kwang Raymond Choo
2017 PLoS ONE  
In this work, we seek to provide quantified insights into smartphone users' behavior toward multiple key security features including locking mechanisms, application repositories, mobile instant messaging  ...  This study investigates how smartphone users' securityand privacy-related decisions are influenced by their attitudes, perceptions, and understanding of various security threats.  ...  Acknowledgments The authors would like to thank the anonymous reviewers for their valuable comments which helped us improve the paper to reach its present form.  ... 
doi:10.1371/journal.pone.0173284 pmid:28297719 pmcid:PMC5352308 fatcat:prpensvnsvhxlaslf2mjjm2vum

A Study on Users Perception and Awareness towards Digital Payment Security Threats among Youngsters in Chennai, Tamil Nadu, India

V. Parvathy, D. Durairaj
2021 Asian Review of Social Sciences  
Since it is time saving and easy of doing transaction, users also slowly adopting the digital culture, But on the other side security related issues also faced by users.  ...  This study focused on Chennai users perception and awareness towards digital payment security threats among youngster in Chennai area  ...  by the digital payment apps are used to frequently update their mobile application.  ... 
doi:10.51983/arss-2021.10.2.2988 fatcat:zmcn253srvf3fpnahfctxcf6me

Measuring user confidence in smartphone security and privacy

Erika Chin, Adrienne Porter Felt, Vyas Sekar, David Wagner
2012 Proceedings of the Eighth Symposium on Usable Privacy and Security - SOUPS '12  
What are users' comfort levels in performing different tasks? How do users select applications? What are their overall perceptions of the platform?  ...  This understanding will help inform the design of more secure smartphones that will enable users to safely and confidently benefit from the potential and convenience offered by mobile platforms.  ...  Any opinions, findings, conclusions, or recommendations expressed in this publication are those of the authors and do not necessarily reflect the views of the National Science Foundation.  ... 
doi:10.1145/2335356.2335358 dblp:conf/soups/ChinFSW12 fatcat:bpla6sp3dfaddoh5ewffgjmrqy

An Empirical Study of Mobile Commerce and Customers Security Perception in Saudi Arabia

Hina Gull, Saqib Saeed, Sardar Zafar Iqbal, Yasser A. Bamarouf, Mohammed A. Alqahtani, Dina A. Alabbad, Madeeha Saqib, Saeed Hussein Al Qahtani, Albandary Alamer
2022 Electronics  
In this paper, customers' security perception regarding some leading mobile commerce applications in Saudi Arabia is explored.  ...  The results highlight that consumers perceive that mobile commerce applications in Saudi Arabia need further improvement in security.  ...  Conflicts of Interest: The authors declare no conflict of interest.  ... 
doi:10.3390/electronics11030293 fatcat:t4gxmc6ie5azhfipb4hv4nd7uy


2020 Issues in Information Systems  
The research analyzes the users' perceptions of IoT Medical security in terms of the fundamental issues such as confidentiality, integrity, availability, authentication, authorization, and audit.  ...  In addition to the proposed taxonomy of IoT Medical security, we summarize the key security factors influencing the users making the decision to use IoT.  ...  Additionally, for mobile devices used in healthcare the attacks aim to confiscate and control user data, control device resources and control applications.  ... 
doi:10.48009/3_iis_2020_227-235 fatcat:3g236tq42ja3viwpk3enlidqvm

Behavioral Analysis of Students' Login Credentials Management in Mobile Environment

Norliza Katuk, Mohamad Subri Halim, Hatim Mohd. Tahir, Amran Ahmad, Sharmila Mat Yusof
2013 Journal of Industrial and Intelligent Information  
The number of password-protected Internetbased applications is increasing significantly compared to a decade ago.  ...  Consequently, it causes an increase in the number of login credentials that users have to manage, for both Internet ad mobile environments.  ...  Security of Login Credentials Authentication of users' identity in mobile and internet applications plays two important roles.  ... 
doi:10.12720/jiii.1.3.132-138 fatcat:hojyzrp2ajacdfhkail3tdudm4

A Meta-Analysis of User Perception and Use of Online Digital Platforms in Kenya: Evidence from E-citizen Platform, Kenya

Morrisson Kaunda Mutuku (PhD)
of the government to guarantee users of these online platforms of their security and privacy to increase adoption and use.  ...  The findings further showed that in various ways that user perceptions especially on digital platforms security and privacy, usefulness, ease of use, complexity, speed, efficiency, and affordability among  ...  Security is considered a significant barrier for online users and can have a great influence on the use of online applications.  ... 
doi:10.24297/ijmit.v15i.8721 fatcat:k7bzfu4qc5fmvfmb3yur642mdi

Mobile User Perception Factors for Express Bus Safety Journey Management System: A Survey Analysis

Rosilah Hassan, Samreen Salek, Mohammad Khatim Hasan, Meng Chun Lam, Wan Mohd Hirwani Wan Hussain
2018 International Journal on Advanced Science, Engineering and Information Technology  
This is important to understand the mobile user perceptions and provides safety to the passengers.  ...  A 4IR mobile technology app for express bus safety and security system in Malaysia for bus user is suggested and required.  ...  ACKNOWLEDGMENT This is to acknowledge the support given by Research Project Code No: DCP-2017-020/2 towards the writing of this paper.  ... 
doi:10.18517/ijaseit.8.4-2.6814 fatcat:tmti5foszjb2ro7253mvf4gbzq

The Impact of Security and Payment Method On Consumers' Perception of Marketplace in Saudi Arabia

Mdawi Alqahtani, Marwan Ali Albahar
2022 International Journal of Advanced Computer Science and Applications  
In this paper, customers' security perceptions regarding the most popular e-commerce applications in Saudi Arabia are explored.  ...  Finally, this study recommends various actions for practitioners and policymakers to take in order to improve customer perceptions of payment methods and security in Saudi Arabia.  ...  Due to the importance of user motivation and perception in technological adoption, there is a knowledge gap regarding how Saudi consumers perceive the security aspects of e-commerce applications.  ... 
doi:10.14569/ijacsa.2022.0130511 fatcat:vvd4ggqvnvckznz5l7a4xjp6mm
« Previous Showing results 1 — 15 out of 107,937 results