A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2012; you can also visit the original URL.
The file type is application/pdf
.
Filters
Motivational Needs-Driven Mobile Phone Design
[chapter]
2007
Lecture Notes in Computer Science
Drawing on motivational human and usage space research, the findings of interviews and surveys, this paper proposes the Mobile phone Usage Space Model (MUSM). ...
This paper provides support for the use of motivational needs in identifying mobile phone uses and related features. ...
Integrating the findings from our survey with those from the interviews and literature survey, we propose the MUSM (Mobile phone Usage Spaces Model) consisting of a set of core spaces and additional spaces ...
doi:10.1007/978-3-540-74796-3_52
fatcat:qa53q7al7zaqrhfpt64vmsh5ky
Modifying smartphone user locking behavior
2013
Proceedings of the Ninth Symposium on Usable Privacy and Security - SOUPS '13
In this paper, we establish a baseline for user security behavior from a population of over one hundred fifty smart phone users. ...
As a result, a critical part of organizational security is the ability to drive user security behavior through either on-device mechanisms or security awareness programs. ...
The first awareness survey asked users about their usage of screen locks on the mobile devices and served two main purposes. ...
doi:10.1145/2501604.2501614
dblp:conf/soups/BruggenLKSCD13
fatcat:2zijblmcwrhebe3coed7rie2a4
Protecting Smartphones Based on Usage Patterns
2017
International Journal of Computer & Software Engineering
With all these applications, people tend to access their smartphones frequently and instantly, i.e., they want to use the phone right away. ...
On the other hand, more and more sensitive information is now stored or accessible on smartphones such as Visa Signature or Paypal apps. Smartphones need to be protected more than ever before. ...
Section 2 describes a survey on mobile users thatsupports the assumption of usage patterns on smartphones. The survey questions are presented and the survey results are analyzed. ...
doi:10.15344/2456-4451/2017/113
fatcat:a7cggsnf5jgnrel2rwi5olpziq
On the need for different security methods on mobile phones
2011
Proceedings of the 13th International Conference on Human Computer Interaction with Mobile Devices and Services - MobileHCI '11
This paper presents a survey on users' security needs, awareness and concerns in the context of mobile phones. ...
The responses from 465 participants reveal that users are interested in increased security and data protection. ...
The survey collected data on the respondents' usage of their mobile phones in general and specific questions regarding the usage of PIN. ...
doi:10.1145/2037373.2037442
dblp:conf/mhci/Ben-AsherKSMBM11
fatcat:sc5mifukirbgzbbbgabgpoygwu
Feeling Secure vs. Being Secure the Mobile Phone User Case
[chapter]
2012
Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
Users, exhibit different values of a metric that we named "mean security feeling value" according to their age, field of study, brand and operating system of phone, connection type, monthly bill and backup ...
Users that feel that mobile phone communication is secure, tend to be less cautious in their security practices. ...
More surveys [7] [8] focused on mobile phones security issues and in which degree these issues concern the users. ...
doi:10.1007/978-3-642-33448-1_29
fatcat:dvsjvzfimrebthg6n3nhe6z6cu
Personal customisation of mobile phones
2006
Proceedings of the 4th Nordic conference on Human-computer interaction changing roles - NordiCHI '06
We present a user case study of how 60 mobile phone users personalised their mobile phones during the first few weeks of ownership, and how they perceived different personalisation methods. ...
Mobile phones are highly personal, customisable mobile computing devices that allow users to precisely control how they interact with the device and their environment. ...
A few users also suggested biometric phone security to reduce reliance on passcodes and to improve usability. ...
doi:10.1145/1182475.1182524
dblp:conf/nordichi/HakkilaC06
fatcat:ke6ii7jb4reczm5ukfwdnqbray
What University Students Do (or Don't) Know about Security in their Mobile Phones
2011
Telfor Journal
We further present the results about users' security practices regarding mobile phone usage. ...
We surveyed a pool of 433 students at the University of Banja Luka in Bosnia and Herzegovina during April 2010, examining users' perceptions about mobile phones security. ...
A recent survey [7] published in November 2008 focused on mobile phones security issues and to the degree to which these issues concern the users. ...
doaj:c74ac1f49e52496fa29909a8133553b1
fatcat:f4qjvyrdqfcrxj6idn2y62nbay
Information Technology Usage: Quantitative Analysis Of Smartphone Security Awareness And Practices Among Undergraduate Students In The United States
2018
Zenodo
users, and establish the relationship between CFC level and the levels of smart-phone security measures among college students. ...
The results showed 69.8% of college students set PIN, password and screen lock on their smart phones while 74.8% were cautious with smart phone applications and 6.2% practiced on setting of security software ...
best practices on smartphone security and usage and the reasons behind the lack of practice of security measures on smartphone usage. ...
doi:10.5281/zenodo.1218518
fatcat:qi3lu6kgr5bmxhawkaqjlu7zti
The Privacy Calculus: Mobile Apps and User Perceptions of Privacy and Security
2012
International Journal of Engineering Business Management
The average person as well as the "tech-savvy" mobile phone user may not yet be fully aware of the extent to which their privacy and security are being affected through their mobile activities and how ...
Our annual survey of smartphone users in the U.S. and Japan is presented from 2011. ...
Figure 4 . 4 Income breakdown on survey responses for privacy/security (1) on related mobile activities for Japan
Figure 5 . 5 High (daily or more) usage of mobile Internet services for privacy/security ...
doi:10.5772/51645
fatcat:rtuyvgj35vb7zad4fzthzgodta
Mobile Phone Brand Categorization vs. Users' Security Practices
2011
Engineering, Technology & Applied Science Research
In the present paper, we correlated the brand of mobile phone to users' security practices, statistically processing a large pool of the responses of 7172 students in 17 Universities of 10 Eastern and ...
Such a categorization can help phone manufacturers enhance their mobile phones in regards to security, preferably transparently for the user. ...
A survey [8] published in November 2008 focused on mobile phones security issues and in which degree these issues concern the users. ...
doi:10.48084/etasr.19
fatcat:shokchd6dncx7i2uum46btwevm
Mobile Phone Brand Categorization Vs. Users' Security Practices
2011
Zenodo
In the present paper, we correlated the brand of mobile phone to users' security practices, statistically processing a large pool of the responses of 7172 students in 17 Universities of 10 Eastern and ...
Such a categorization can help phone manufacturers enhance their mobile phones in regards to security, preferably transparently for the user ...
A survey [8] published in November 2008 focused on mobile phones security issues and in which degree these issues concern the users. ...
doi:10.5281/zenodo.14020
fatcat:jvmhmdkqf5dfbdevki6sy7qv5e
INFORMATION TECHNOLOGY USAGE: QUANTITATIVE ANALYSIS OF SMARTPHONE SECURITY AWARENESS AND PRACTICES AMONG UNDERGRADUATE STUDENTS IN THE UNITED STATES
2020
International Journal of Engineering Technologies and Management Research
users, and establish the relationship between CFC level and the levels of smart-phone security measures among college students. ...
The results showed 69.8% of college students set PIN, password and screen lock on their smart phones while 74.8% were cautious with smart phone applications and 6.2% practiced on setting of security software ...
best practices on smartphone security and usage and the reasons behind the lack of practice of security measures on smartphone usage. ...
doi:10.29121/ijetmr.v5.i3.2018.201
fatcat:3ytssc45hvdwhgspimnym77u3m
Digital natives and mobile phones: A survey of practices and attitudes about privacy and security
2010
2010 IEEE International Symposium on Technology and Society
mobile phones, as well as their perceptions of different ways how security and privacy could be improved in future mobile devices. ...
This paper presents the results of a survey of over 330 young people aged 18 to 25, which attempts to evaluate their use of mobile technology, their attitudes about security and privacy as it relates to ...
This survey examined the attitudes of users towards security on mobile phones, their usage patterns, as well as attitudes using biometric technologies as security enablers on mobile phones. ...
doi:10.1109/istas.2010.5514610
dblp:conf/istas/KurkovskyS10
fatcat:gwaofsasyjhohldqfjoconbxhq
PermissionWatcher: Creating User Awareness of Application Permissions in Mobile Systems
[chapter]
2012
Lecture Notes in Computer Science
In a field study with 1000+ Android users, we collected data that provides evidence that users are willing to follow security principles if security awareness is created and information is presented in ...
Both from a technical and a social point of view, they are based on the assumption that users actually understand these permissions and hence they can make an informed decision about which permission to ...
Acknowledgements This work has been conducted within the Emmy Noether research groups Long Term Security and Mobile Interaction with Pervasive User Interfaces, both funded by the German Research Foundation ...
doi:10.1007/978-3-642-34898-3_5
fatcat:4qfmse47hjhqjmtafsncgmc2vq
A Comparative Study Of Smartphone Users Perception And Preference Towards Mobile Payment Methods In The U.S. And Korea
2014
Journal of Applied Business Research
Security, cost, and convenience are three main factors Smartphone users keep in mind when making a mobile payment. ...
Among the three factors, mobile security is the factor of strongest influence on mobile payment frequency in both countries. ...
Another factor that is studied with this survey is how Smartphone users value cost, convenience, and security for mobile transactions. The online survey site was opened for two months in 2012. ...
doi:10.19030/jabr.v30i5.8793
fatcat:hiawpmckzzektgp4fd5gy55n7y
« Previous
Showing results 1 — 15 out of 50,438 results