Abstract
In this work, we are comparing the subjective security feeling of mobile phone users to the (objectively agreed) best security practices. This was possible by statistically processing a large pool of 7172 students in 17 Universities of 10 European countries. We introduced a “mean actual security value”, comparing their security practices to best practices. There was a clear negative connection between feeling secure and actually being secure. Users that feel that mobile phone communication is secure, tend to be less cautious in their security practices. Moreover, we extracted profiles of students according to their mobile phone communication security feeling. These profiles belong to well defined categories. Users, exhibit different values of a metric that we named “mean security feeling value” according to their age, field of study, brand and operating system of phone, connection type, monthly bill and backup frequency. These results can help both academia and industry focus their security awareness campaigns and efforts to specific subsets of users that mostly need them. Finally, as there are not available any already validated questionnaires in regards to this specific research topic, our research, apart from revealing the situation, aims at providing a basis for the formulation of similar questionnaires for future use.
Keywords
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Lenhart, A.: Cell phones and American adults. Pew Research Center (2010), http://www.pewinternet.org (accessed: February 10, 2011)
Synovate: Global mobile phone survey shows the mobile is a ’remote control’ for life. Synovate survey (2009), http://www.synovate.com (accessed: October 09, 2010)
comScore M:Metrics: Smarter phones bring security risks: Study (2008), http://www.comscore.com (accessed October 09, 2010)
Trend Micro: Smartphone Users Oblivious to Security. Trend Micro survey (2009), http://www.esecurityplanet.com (accessed October 09, 2010)
Goode Intelligence: Mobile security the next battleground (2009), http://www.goode/intelligence (accessed October 09, 2010)
Vrechopoulos, A.P., Constantiou, I.D., Sideris, I.: Strategic Marketing Planning for Mobile Commerce Diffusion and Consumer Adoption. In: Proceedings of M-Business 2002, CD (2002)
Androulidakis, I., Papapetros, D.: Survey Findings towards Awareness of Mobile Phones’ Security Issues, Recent Advances in Data Networks, Communications, Computers. In: Proceedings of 7th WSEAS International Conference on Data Networks, Communications, Computers (DNCOCO 2008), pp. 130–135 (2008)
NCSA: 2010 NCSA/Norton by Symantec Online Safety Study (2010), http://www.staysafeonline.org (accessed: February 10, 2011)
Androulidakis, I., Basios, C., Androulidakis, N.: Surveying Users’ Opinions and Trends towards Mobile Payment Issues. In: Techniques and Applications for Mobile Commerce - Proceedings of TAMoCo 2008. Frontiers in Artificial Intelligence and Applications, vol. 169, pp. 9–19 (2008)
National Cyber Security Alliance (NCSA): Schools Lacking Cyber Security and Safety Education (2009), http://www.staysafeonline.org (accessed October 09, 2010)
McAfee: Most Mobile Users Don’t Know if They Have Security, McAfee-sponsored research (2008), http://www.esecurityplanet.com (accessed October 09, 2010)
Dillman, D.A.: Mail and Internet Surveys: The Tailored Design Method, 2nd edn. John Wiley & Sons (1999)
Pfleeger, S.L., Kitchenham, B.A.: Principles of Survey Research Part 1: Turning Lemons into Lemonade. ACM SIGSOFT Software Engineering Notes 26(6), 16–18 (2001)
Androulidakis, I., Androulidakis, N.: On a versatile and costless OMR system. WSEAS Transactions on Computers 4(2), 160–165 (2005)
Androulidakis, I.: Intercepting Mobile Phone Calls and Short Messages Using a GSM Tester. In: Kwiecień, A., Gaj, P., Stera, P. (eds.) CN 2011. CCIS, vol. 160, pp. 281–288. Springer, Heidelberg (2011)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 ICST Institute for Computer Science, Social Informatics and Telecommunications Engineering
About this paper
Cite this paper
Androulidakis, I., Kandus, G. (2012). Feeling Secure vs. Being Secure the Mobile Phone User Case. In: Georgiadis, C.K., Jahankhani, H., Pimenidis, E., Bashroush, R., Al-Nemrat, A. (eds) Global Security, Safety and Sustainability & e-Democracy. e-Democracy ICGS3 2011 2011. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 99. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-33448-1_29
Download citation
DOI: https://doi.org/10.1007/978-3-642-33448-1_29
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-33447-4
Online ISBN: 978-3-642-33448-1
eBook Packages: Computer ScienceComputer Science (R0)