On the User Awareness of Mobile Security Recommendations

被引:18
作者
Watson, Bryan [1 ]
Zheng, Jun [1 ]
机构
[1] New Mexico Inst Min & Technol, 801 Leroy Pl, Socorro, NM 87801 USA
来源
PROCEEDINGS OF THE SOUTHEAST CONFERENCE ACM SE'17 | 2017年
关键词
Mobile security; security awareness; security configuration; security behavior;
D O I
10.1145/3077286.3077563
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Modern mobile devices face a number of security threats that put users and their data at risk. Although many different security options exist to protect against these threats, the selection of such options is often up to the user. In this paper, we review the current literature on mobile security and provide a comprehensive list of recommendations for user safety. We also conduct a user study to ascertain awareness concerning these recommendations. Our results show that users, especially those without strong information technology familiarity, tend to ignore or be unaware of many critical security options. Further work must develop methods to improve awareness and adoption of mobile security. The list of recommendations provided in this paper and the knowledge gained from the user study could be helpful in this regard. We suggest building educational tools to improve user awareness of security vulnerabilities and increase their protection against known mobile threats.
引用
收藏
页码:120 / 127
页数:8
相关论文
共 26 条
[1]  
Ben-Asher N., P 13 INT C HUMAN COM, P465, DOI DOI 10.1145/2037373.2037442
[2]  
Chin E., 2012, Proceedings of the Eighth Symposium on Usable Privacy and Security, P1
[3]   Android Security: A Survey of Issues, Malware Penetration, and Defenses [J].
Faruki, Parvez ;
Bharmal, Ammar ;
Laxmi, Vijay ;
Ganmoor, Vijay ;
Gaur, Manoj Singh ;
Conti, Mauro ;
Rajarajan, Muttukrishnan .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2015, 17 (02) :998-1022
[4]  
Felt AdriennePorter., 2012, P 8 S USABLE PRIVACY, p3:1
[5]  
Harris M.A., 2014, Journal of Information Privacy and Security, V10, P186, DOI [10.1080/15536548.2014.974429, DOI 10.1080/15536548.2014.974429]
[6]  
Hasan Basel, 2016, PROPOSED MODEL USER, P97
[7]  
Kovelamudi G., 2016, 2016 IEEECIC INT C C, P1, DOI [10.1109/ICCChina.2016.7636862, DOI 10.1109/ICCCHINA.2016.7636862]
[8]   A Survey on Security for Mobile Devices [J].
La Polla, Mariantonietta ;
Martinelli, Fabio ;
Sgandurra, Daniele .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2013, 15 (01) :446-471
[9]   Mobile Security: A Look Ahead [J].
Li, Qing ;
Clark, Greg .
IEEE SECURITY & PRIVACY, 2013, 11 (01) :78-81
[10]   Safe use of mobile devices arises from knowing the threats [J].
Markelj, Blaz ;
Bernik, Igor .
JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2015, 20 :84-89