Abstract
Apart from the technological perspective of security in mobile devices and applications, the economic perspective has been increasingly attracting the academic and business interest. This paper aims to investigate the perceptions of mobile users about the economic importance of security breaches. Instead of considering mobile users as a whole, they were examined as distinct user types based on Brandtzæg’s mobile user typology. These types are: (1) sporadic users, (2) socializers, (3) entertainment type users, (4) instrumental users, and (5) advanced users. In the context of the research part of this study, a survey was conducted in a sample of smartphone and tablet owners. The five user types were identified in our sample by setting specific classification rules, based on the frequency and the variety of mobile services used. Mobile users’ perceptions were assessed in terms of ten different kinds of security breaches. The findings indicated that the user types perceive differently the economic importance of security breaches, implying that the design of security policies and/or the development of tools totally for the community of users are not the appropriate practices. Our research could contribute to the knowledge considering mobile users and their perceptions about security breaches. Mobile content providers and developers could use the findings of this study to evaluate and redesign, if needed, their current strategies so as to meet users’ needs regarding security.



Similar content being viewed by others
References
Asokan N, Dmitrienko A, Nagy M, Reshetova E, Sadeghi A-R, Schneider T, Stelle S (2013) CrowdShare: secure mobile resource sharing. In: Jacobson M, Locasto M, Mohassel P, Safavi-Naini R (eds) Applied cryptography and network security. Lecture Notes in Computer Science, vol 7954. Springer, Berlin, pp 432–440
Bouwman H, Carlsson C, Walden P, Molina-Castillo FJ (2009) Reconsidering the actual and future use of mobile services. Inf Syst E-Bus Manag 7(3):301–317
Brandtzæg PB (2010) Towards a unified media-user typology (MUT): a meta-analysis and review of the research literature on media-user typologies. Comput Hum Behav 26(5):940–956
Brandtzæg PB (2012) MUT and the mobile Internet: applying the approach to other domains. University of Oslo, Norway. http://www.slideshare.net/PetterB/user-types-of-the-mobile-internet. Accessed 27 Dec 2013
Calder A (2013) Is the BYOD movement worth the risks? Credit Control J 34(3):65–70
Cate FH (2008) Information security breaches. Faculty Publications. http://www.repository.law.indiana.edu/facpub/233. Accessed 29 Dec 2013
Chun SH (2011) Smart mobile banking and its security issues: from the perspectives of the legal liability and security investment. Proceedings of the 6th international conference in future information technology. Loutraki, Greece, pp 190–195
Clarke N, Furnell S (2005) Authentication of users on mobile telephones—a survey of attitudes and practices. Comput Secur 24(7):519–527
Collier R (2012) Medical privacy breaches rising. Can Med Assoc J 184(4):E215–E216
Dimensional Research (2012) The generation gap in computer security: a security use survey from GEN Y to baby boomers. http://www.zonealarm.com/products/downloads/whitepapers/generation_gap_research_2012.pdf. Accessed 2 Mar 2014
Dini G, Martinelli F, Matteucci I, Saracino A, Sgandurra D (2014) Introducing probabilities in contract-based approaches for mobile application security. In: Garcia-Alfaro J, Lioudakis G, Cuppens-Boulahia N, Foley S, Fitzgerald WM (eds) Data privacy management and autonomous spontaneous security. Lecture Notes in Computer Science, vol 8247. Springer, Berlin, pp 284–299
Dmitrienko A, Liebchen C, Rossow C, Sadeghi A-R (2014) On the (in)security of mobile two-factor authentication. Technical Report TUD-CS-2014-0029. Technische Universität Darmstadt, Germany. https://www.informatik.tu-darmstadt.de/fileadmin/user_upload/Group_TRUST/PubsPDF/TR-Dmitrienko-2FA-analysis-v2.pdf. Accessed 31 March 2014
Gao X, Zhong W, Mei S (2013) Security investment and information sharing under an alternative security breach probability function. Inf Syst Front 17(2):423–438
Gest J (2013) Managing BYOD: how to mitigate the risks of using personal devices in the workplace. http://www.smartbusinessemag.com/may2013/Houston/10/0#&pageSet=10&contentItem=0. Accessed 10 Jan 2014
Huang Z, Benyoucef M (2013) From e-commerce to social commerce: a close look at design features. Electron Commer Res Appl 12(4):246–259
Jech V (2012) Smart mobile devices in corporate and business practice. In: Proceedings of IMEA, University of Hradec Králové, Czech Republic, pp 30–35. http://is.muni.cz/repo/977628/IMEA_2012_Sbornik.pdf#page=34. Accessed 27 Mar 2014
Kietzmann J, Plangger K, Eaton B, Heilgenberg K, Pitt L, Berthon P (2013) Mobility at work: a typology of mobile communities of practice and contextual ambidexterity. J Strateg Inf Syst 22(4):282–297
Kim C, Tao W, Shin N, Kim KS (2010) An empirical study of customers’ perceptions of security and trust in e-payment systems. Electron Commer Res Appl 9(1):84–95
Kourouthanassis PE, Georgiadis CK (2014) Analyzing m-commerce research: technology, applications and research themes. Int J Mob Commun 12(1):1–11
La Polla M, Martinelli F, Sgandurra D (2013) A survey on security for mobile devices. Commun Surv Tutor 15(1):446–471
Li Q, Clark G (2013) Mobile security: a look ahead. IEEE Secur Priv 11(1):78–81
Liu AX, Wang Y, Chen X, Jiang X (2014) Understanding the diffusion of mobile digital content: a growth curve modelling approach. Inf Syst E-Bus Manag 12(2):239–258
Lumsden E (2012) Securing mobile technology & financial transactions in the United States. Berkeley Bus Law J 9(1):139–185
Microsoft Corporation (2013) Survey shows people need more help controlling personal info online. http://www.microsoft.com/en-us/news/press/2013/jan13/01-23dpdpr.aspx. Accessed 10 Apr 2014
Milligan PM, Hutcheson D (2008) Business risks and security assessment for mobile devices. Inf Syst Control J 1:1–6
Morrow B (2012) BYOD security challenges: control and protect your most sensitive data. Netw Secur 12:5–8
Mort GS, Drennan J (2005) Marketing m-services: establishing a usage benefit typology related to mobile user characteristics. J Database Mark Cust Strategy Manag 12(4):327–341
Noh MJ, Lee KT (2015) An analysis of the relationship between quality and user acceptance in smartphone apps. Inf Syst E-Bus Manag. doi:10.1007/s10257-015-0283-6
Oh T, Choi YB, Ryoo J, Stokes K (2011) Security management in wireless sensor networks for healthcare. Int J Mob Commun 9(2):187–207
Ondrus J, Pigneur Y (2009) Near field communication: an assessment for future payment systems. Inf Syst E-Bus Manag 7(3):347–361
Pillay A, Diaki H, Nham E, Senanayake S, Tan G, Deshpande S (2013) Does BYOD increase risks or drive benefits?. http://sitic.org/wp-content/uploads/Does-BYOD-increase-risks-or-drive-benefits.pdf. Accessed 23 Feb 2014
Pocatilu P (2011) Android applications security. Inform. Economica 15(3):163–171
Ponemon Institute (2012) Confidential documents at risk study. Ponemon Institute Research Report. http://www.ponemon.org/local/upload/file/WatchDoxWhite_Paper_FINAL.pdf. Accessed 12 March 2014
Ramu S (2012) Mobile malware evolution, detection and defense. EECE 571B, Term Survey Paper. http://blogs.ubc.ca/computersecurity/files/2012/04/SRamu_EECE572_SurveyPaper-SrikanthRamu.pdf. Accessed 19 April 2014
Rhee K, Won D, Jang S-W, Chae S, Park S (2013) Threat modeling of a mobile device management system for secure smart work. Electron Commerce Res 13(3):243–256
Scott JE (2004) Measuring dimensions of perceived e-business risks. Inf Syst E-Bus Manag 2(1):31–55
Sharma A (2008) Bluetooth security issues, threats and consequences. Proceedings of the 2nd national conference on challenges & opportunities in information technology. Mandi Gobindgarh, India, pp 78–80
Shih DH, Lin B, Chiang HS, Shih MH (2008) Security aspects of mobile phone virus: a critical survey. Ind Manag Data Syst 108(4):478–494
Tu Z, Yuan Y, Archer N (2014) Understanding user behaviour in coping with security threats of mobile device loss and theft. Int J Mob Commun 12(6):603–623
Wang T, Oh LB, Wang K, Yuan Y (2013) User adoption and purchasing intention after free trial: an empirical study of mobile newspapers. Inf Syst E-Bus Manag 11(2):189–210
Webliquid (2012) The surge: from communication to context. House of Kaizen. http://www.slideshare.net/Webliquid/the-surge-summary-of-mobile-in-europe. Accessed 27 Mar 2014
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Stiakakis, E., Georgiadis, C.K. & Andronoudi, A. Users’ perceptions about mobile security breaches. Inf Syst E-Bus Manage 14, 857–882 (2016). https://doi.org/10.1007/s10257-015-0302-7
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s10257-015-0302-7