The Impact of using Mobile Phones on Privacy of Students in the Kingdom of Saudi Arabia

被引:0
作者
Alenizi, Alanood [1 ]
Khan, Esam [2 ]
机构
[1] Umm Al Qura Univ, Comp Engn Dept, Mecca, Saudi Arabia
[2] Umm Qura Univ, Custodian Holy Mosques Inst Hajj & Omrah Res 2, Mecca, Saudi Arabia
来源
INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY | 2020年 / 20卷 / 09期
关键词
personal data privacy breach; suspicious URLs; blacklisting; phishing; Phish tank;
D O I
10.22937/IJCSNS.2020.20.09.18
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this study, we aimed at exploring the current practices of using mobile phones by students in Saudi Arabia and identifying the potential data privacy risks that they are exposed to. The key findings from the study was that although a majority of students are aware of data privacy, many of the respondents were willing to chat with unknown people online and a considerable number of those participants opened URLs sent from strangers. This is a huge data privacy risk since it may result in the disclosure of their personal information without the knowledge that the websites were deceptive sites that posed a threat to their personal data, which led to several risks to their personal data, such as theft of personal accounts, identity cards, information, and personal photos. Based on the finding and due to the lack of research and commercial efforts of detecting malicious URLs on mobile devices, we developed a system, Suspicious URL Detector, which is targeted to support mobile users to seamlessly verify URLs before they can be opened. Our system is composed of a mobile app and a URL verification server that is backed by PhishTank [1], a user-contributed blacklist of suspicious URLs. The mobile app is also designed to be user-friendly and lightweight to ensure it performs well on mobile devices with limited resources.
引用
收藏
页码:143 / 157
页数:15
相关论文
共 22 条
  • [1] Acquisti A., 2005, Proceedings of WPES05, P71
  • [2] Aldhafferi N., 2013, INT J SECURITY PRIVA, V2
  • [3] [Anonymous], 2019, COMPUT FRAUD SECUR, P4
  • [4] [Anonymous], 2006, P SIGCHI C HUM FACT
  • [5] Ad hoc Privacy Management in Ubiquitous Computing Environments
    Buennig, Christian
    Cap, Clemens H.
    [J]. 2009 SECOND INTERNATIONAL CONFERENCE ON ADVANCES IN HUMAN-ORIENTED AND PERSONALIZED MECHANISM, TECHNOLOGIES, AND SERVICES, 2009, : 85 - 90
  • [6] Use of mobile phones by male and female Greek students
    Economides, Anastasios A.
    Grousopoulou, Amalia
    [J]. INTERNATIONAL JOURNAL OF MOBILE COMMUNICATIONS, 2008, 6 (06) : 729 - 749
  • [7] Fette I., 2007, P 16 INT C WORLD WID, P649, DOI DOI 10.1145/1242572.1242660
  • [8] Iqbal Z., 2010, GENDER DIFFERENCES M
  • [9] Le A., 2011, P IEEE INFOCOM
  • [10] WarningBird: A Near Real-Time Detection System for Suspicious URLs in Twitter Stream
    Lee, Sangho
    Kim, Jong
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2013, 10 (03) : 183 - 195