Filters








50,438 Hits in 3.7 sec

Motivational Needs-Driven Mobile Phone Design [chapter]

Judy van Biljon, Paula Kotzé, Gary Marsden
2007 Lecture Notes in Computer Science  
Drawing on motivational human and usage space research, the findings of interviews and surveys, this paper proposes the Mobile phone Usage Space Model (MUSM).  ...  This paper provides support for the use of motivational needs in identifying mobile phone uses and related features.  ...  Integrating the findings from our survey with those from the interviews and literature survey, we propose the MUSM (Mobile phone Usage Spaces Model) consisting of a set of core spaces and additional spaces  ... 
doi:10.1007/978-3-540-74796-3_52 fatcat:qa53q7al7zaqrhfpt64vmsh5ky

Modifying smartphone user locking behavior

Dirk Van Bruggen, Shu Liu, Mitch Kajzer, Aaron Striegel, Charles R. Crowell, John D'Arcy
2013 Proceedings of the Ninth Symposium on Usable Privacy and Security - SOUPS '13  
In this paper, we establish a baseline for user security behavior from a population of over one hundred fifty smart phone users.  ...  As a result, a critical part of organizational security is the ability to drive user security behavior through either on-device mechanisms or security awareness programs.  ...  The first awareness survey asked users about their usage of screen locks on the mobile devices and served two main purposes.  ... 
doi:10.1145/2501604.2501614 dblp:conf/soups/BruggenLKSCD13 fatcat:2zijblmcwrhebe3coed7rie2a4

Protecting Smartphones Based on Usage Patterns

Weifeng Chen
2017 International Journal of Computer & Software Engineering  
With all these applications, people tend to access their smartphones frequently and instantly, i.e., they want to use the phone right away.  ...  On the other hand, more and more sensitive information is now stored or accessible on smartphones such as Visa Signature or Paypal apps. Smartphones need to be protected more than ever before.  ...  Section 2 describes a survey on mobile users thatsupports the assumption of usage patterns on smartphones. The survey questions are presented and the survey results are analyzed.  ... 
doi:10.15344/2456-4451/2017/113 fatcat:a7cggsnf5jgnrel2rwi5olpziq

On the need for different security methods on mobile phones

Noam Ben-Asher, Niklas Kirschnick, Hanul Sieger, Joachim Meyer, Asaf Ben-Oved, Sebastian Möller
2011 Proceedings of the 13th International Conference on Human Computer Interaction with Mobile Devices and Services - MobileHCI '11  
This paper presents a survey on users' security needs, awareness and concerns in the context of mobile phones.  ...  The responses from 465 participants reveal that users are interested in increased security and data protection.  ...  The survey collected data on the respondents' usage of their mobile phones in general and specific questions regarding the usage of PIN.  ... 
doi:10.1145/2037373.2037442 dblp:conf/mhci/Ben-AsherKSMBM11 fatcat:sc5mifukirbgzbbbgabgpoygwu

Feeling Secure vs. Being Secure the Mobile Phone User Case [chapter]

Iosif Androulidakis, Gorazd Kandus
2012 Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering  
Users, exhibit different values of a metric that we named "mean security feeling value" according to their age, field of study, brand and operating system of phone, connection type, monthly bill and backup  ...  Users that feel that mobile phone communication is secure, tend to be less cautious in their security practices.  ...  More surveys [7] [8] focused on mobile phones security issues and in which degree these issues concern the users.  ... 
doi:10.1007/978-3-642-33448-1_29 fatcat:dvsjvzfimrebthg6n3nhe6z6cu

Personal customisation of mobile phones

Jonna Häkkilä, Craig Chatfield
2006 Proceedings of the 4th Nordic conference on Human-computer interaction changing roles - NordiCHI '06  
We present a user case study of how 60 mobile phone users personalised their mobile phones during the first few weeks of ownership, and how they perceived different personalisation methods.  ...  Mobile phones are highly personal, customisable mobile computing devices that allow users to precisely control how they interact with the device and their environment.  ...  A few users also suggested biometric phone security to reduce reliance on passcodes and to improve usability.  ... 
doi:10.1145/1182475.1182524 dblp:conf/nordichi/HakkilaC06 fatcat:ke6ii7jb4reczm5ukfwdnqbray

What University Students Do (or Don't) Know about Security in their Mobile Phones

I. Androulidakis, G. Kandus
2011 Telfor Journal  
We further present the results about users' security practices regarding mobile phone usage.  ...  We surveyed a pool of 433 students at the University of Banja Luka in Bosnia and Herzegovina during April 2010, examining users' perceptions about mobile phones security.  ...  A recent survey [7] published in November 2008 focused on mobile phones security issues and to the degree to which these issues concern the users.  ... 
doaj:c74ac1f49e52496fa29909a8133553b1 fatcat:f4qjvyrdqfcrxj6idn2y62nbay

Information Technology Usage: Quantitative Analysis Of Smartphone Security Awareness And Practices Among Undergraduate Students In The United States

Dr.Richmond Adebiaye, Taiwo Ajani
2018 Zenodo  
users, and establish the relationship between CFC level and the levels of smart-phone security measures among college students.  ...  The results showed 69.8% of college students set PIN, password and screen lock on their smart phones while 74.8% were cautious with smart phone applications and 6.2% practiced on setting of security software  ...  best practices on smartphone security and usage and the reasons behind the lack of practice of security measures on smartphone usage.  ... 
doi:10.5281/zenodo.1218518 fatcat:qi3lu6kgr5bmxhawkaqjlu7zti

The Privacy Calculus: Mobile Apps and User Perceptions of Privacy and Security

Elizabeth Fife, Juan Orjuela
2012 International Journal of Engineering Business Management  
The average person as well as the "tech-savvy" mobile phone user may not yet be fully aware of the extent to which their privacy and security are being affected through their mobile activities and how  ...  Our annual survey of smartphone users in the U.S. and Japan is presented from 2011.  ...  Figure 4 . 4 Income breakdown on survey responses for privacy/security (1) on related mobile activities for Japan Figure 5 . 5 High (daily or more) usage of mobile Internet services for privacy/security  ... 
doi:10.5772/51645 fatcat:rtuyvgj35vb7zad4fzthzgodta

Mobile Phone Brand Categorization vs. Users' Security Practices

I. Androulidakis, G. Kandus
2011 Engineering, Technology & Applied Science Research  
In the present paper, we correlated the brand of mobile phone to users' security practices, statistically processing a large pool of the responses of 7172 students in 17 Universities of 10 Eastern and  ...  Such a categorization can help phone manufacturers enhance their mobile phones in regards to security, preferably transparently for the user.  ...  A survey [8] published in November 2008 focused on mobile phones security issues and in which degree these issues concern the users.  ... 
doi:10.48084/etasr.19 fatcat:shokchd6dncx7i2uum46btwevm

Mobile Phone Brand Categorization Vs. Users' Security Practices

I Androulidakis, G Kandus
2011 Zenodo  
In the present paper, we correlated the brand of mobile phone to users' security practices, statistically processing a large pool of the responses of 7172 students in 17 Universities of 10 Eastern and  ...  Such a categorization can help phone manufacturers enhance their mobile phones in regards to security, preferably transparently for the user  ...  A survey [8] published in November 2008 focused on mobile phones security issues and in which degree these issues concern the users.  ... 
doi:10.5281/zenodo.14020 fatcat:jvmhmdkqf5dfbdevki6sy7qv5e

INFORMATION TECHNOLOGY USAGE: QUANTITATIVE ANALYSIS OF SMARTPHONE SECURITY AWARENESS AND PRACTICES AMONG UNDERGRADUATE STUDENTS IN THE UNITED STATES

Richmond Adebiaye, Taiwo Ajani
2020 International Journal of Engineering Technologies and Management Research  
users, and establish the relationship between CFC level and the levels of smart-phone security measures among college students.  ...  The results showed 69.8% of college students set PIN, password and screen lock on their smart phones while 74.8% were cautious with smart phone applications and 6.2% practiced on setting of security software  ...  best practices on smartphone security and usage and the reasons behind the lack of practice of security measures on smartphone usage.  ... 
doi:10.29121/ijetmr.v5.i3.2018.201 fatcat:3ytssc45hvdwhgspimnym77u3m

Digital natives and mobile phones: A survey of practices and attitudes about privacy and security

Stan Kurkovsky, Ewa Syta
2010 2010 IEEE International Symposium on Technology and Society  
mobile phones, as well as their perceptions of different ways how security and privacy could be improved in future mobile devices.  ...  This paper presents the results of a survey of over 330 young people aged 18 to 25, which attempts to evaluate their use of mobile technology, their attitudes about security and privacy as it relates to  ...  This survey examined the attitudes of users towards security on mobile phones, their usage patterns, as well as attitudes using biometric technologies as security enablers on mobile phones.  ... 
doi:10.1109/istas.2010.5514610 dblp:conf/istas/KurkovskyS10 fatcat:gwaofsasyjhohldqfjoconbxhq

PermissionWatcher: Creating User Awareness of Application Permissions in Mobile Systems [chapter]

Eric Struse, Julian Seifert, Sebastian Üllenbeck, Enrico Rukzio, Christopher Wolf
2012 Lecture Notes in Computer Science  
In a field study with 1000+ Android users, we collected data that provides evidence that users are willing to follow security principles if security awareness is created and information is presented in  ...  Both from a technical and a social point of view, they are based on the assumption that users actually understand these permissions and hence they can make an informed decision about which permission to  ...  Acknowledgements This work has been conducted within the Emmy Noether research groups Long Term Security and Mobile Interaction with Pervasive User Interfaces, both funded by the German Research Foundation  ... 
doi:10.1007/978-3-642-34898-3_5 fatcat:4qfmse47hjhqjmtafsncgmc2vq

A Comparative Study Of Smartphone Users Perception And Preference Towards Mobile Payment Methods In The U.S. And Korea

Seungjae Shin, Won-jun Lee, Dustin Odom Odom
2014 Journal of Applied Business Research  
Security, cost, and convenience are three main factors Smartphone users keep in mind when making a mobile payment.  ...  Among the three factors, mobile security is the factor of strongest influence on mobile payment frequency in both countries.  ...  Another factor that is studied with this survey is how Smartphone users value cost, convenience, and security for mobile transactions. The online survey site was opened for two months in 2012.  ... 
doi:10.19030/jabr.v30i5.8793 fatcat:hiawpmckzzektgp4fd5gy55n7y
« Previous Showing results 1 — 15 out of 50,438 results