Always connected, but are smart mobile users getting more security savvy? A survey of smart mobile device users

被引:67
作者
Imgraben, James [1 ]
Engelbrecht, Alewyn [1 ]
Choo, Kim-Kwang Raymond [1 ]
机构
[1] Univ S Australia, Adv Comp Res Ctr, Informat Assurance Res Grp, Adelaide, SA 5095, Australia
关键词
cyber crime; smart mobile devices; security survey; mobile security; phishing; malware; unauthorised access;
D O I
10.1080/0144929X.2014.934286
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Smart mobile devices are a potential attack vector for cyber criminal activities. Two hundred and fifty smart mobile device owners from the University of South Australia were surveyed. Not surprisingly, it was found that smart mobile device users in the survey generally underestimated the value that their collective identities have to criminals and how these can be sold. For example, participants who reported jail-breaking/rooting their devices were also more likely to exhibit risky behaviour (e.g. downloading and installing applications from unknown providers), and the participants generally had no idea of the value of their collective identities to criminals which can be sold to the highest bidder. In general, the participants did not understand the risks and may not have perceived cyber crime to be a real threat. Findings from the survey and the escalating complexities of the end-user mobile and online environment underscore the need for regular ongoing training programs for basic online security and the promotion of a culture of security among smart mobile device users. For example, targeted education and awareness programmes could be developed to inform or educate smart mobile device users and correct misconceptions or myths in order to bring about changes in attitudes and usage behaviour (e.g. not taking preventative measures such as strong passwords to protect their devices). Such initiatives would enable all end users (including senior University management who use such devices to access privileged corporate data and accounts) to maintain current knowledge of the latest cyber crime activities and the best cyber security protection measures available.
引用
收藏
页码:1347 / 1360
页数:14
相关论文
共 36 条
  • [1] ACMA, 2012, EM MOB TEL SERV MARK
  • [2] [Anonymous], 2011, REGISTER
  • [3] [Anonymous], 1998, CRIME EVERYDAY LIFE
  • [4] [Anonymous], 2012, INT SEC THREAT REP 2
  • [5] Australian Government House of Representatives Standing Committee on Communications, 2010, HACK FRAUDST BOTN TA
  • [6] AVG, 2012, AVG COMM POW THREAT
  • [7] Rogue-Access-Point Detection Challenges, Solutions, and Future Directions
    Beyah, Raheem
    Venkataraman, Aravind
    [J]. IEEE SECURITY & PRIVACY, 2011, 9 (05) : 56 - 61
  • [8] Open Sesame: Design Guidelines for Invisible Passwords
    Bianchi, Andrea
    Oakley, Ian
    Kwon, Dong-Soo
    [J]. COMPUTER, 2012, 45 (04) : 58 - 65
  • [9] Broadhurst R., 2011, ROUTLEDGE HDB INT CR, P153
  • [10] Choo K.K. R., 2014, ICTs and the Millennium Development Goals, P81, DOI DOI 10.1007/978-1-4899-7439-6_6