Skip to main content
Log in

Users’ perceptions about mobile security breaches

  • Original Article
  • Published:
Information Systems and e-Business Management Aims and scope Submit manuscript

Abstract

Apart from the technological perspective of security in mobile devices and applications, the economic perspective has been increasingly attracting the academic and business interest. This paper aims to investigate the perceptions of mobile users about the economic importance of security breaches. Instead of considering mobile users as a whole, they were examined as distinct user types based on Brandtzæg’s mobile user typology. These types are: (1) sporadic users, (2) socializers, (3) entertainment type users, (4) instrumental users, and (5) advanced users. In the context of the research part of this study, a survey was conducted in a sample of smartphone and tablet owners. The five user types were identified in our sample by setting specific classification rules, based on the frequency and the variety of mobile services used. Mobile users’ perceptions were assessed in terms of ten different kinds of security breaches. The findings indicated that the user types perceive differently the economic importance of security breaches, implying that the design of security policies and/or the development of tools totally for the community of users are not the appropriate practices. Our research could contribute to the knowledge considering mobile users and their perceptions about security breaches. Mobile content providers and developers could use the findings of this study to evaluate and redesign, if needed, their current strategies so as to meet users’ needs regarding security.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Fig. 1
Fig. 2
Fig. 3

Similar content being viewed by others

References

  • Asokan N, Dmitrienko A, Nagy M, Reshetova E, Sadeghi A-R, Schneider T, Stelle S (2013) CrowdShare: secure mobile resource sharing. In: Jacobson M, Locasto M, Mohassel P, Safavi-Naini R (eds) Applied cryptography and network security. Lecture Notes in Computer Science, vol 7954. Springer, Berlin, pp 432–440

    Chapter  Google Scholar 

  • Bouwman H, Carlsson C, Walden P, Molina-Castillo FJ (2009) Reconsidering the actual and future use of mobile services. Inf Syst E-Bus Manag 7(3):301–317

    Article  Google Scholar 

  • Brandtzæg PB (2010) Towards a unified media-user typology (MUT): a meta-analysis and review of the research literature on media-user typologies. Comput Hum Behav 26(5):940–956

    Article  Google Scholar 

  • Brandtzæg PB (2012) MUT and the mobile Internet: applying the approach to other domains. University of Oslo, Norway. http://www.slideshare.net/PetterB/user-types-of-the-mobile-internet. Accessed 27 Dec 2013

  • Calder A (2013) Is the BYOD movement worth the risks? Credit Control J 34(3):65–70

    Google Scholar 

  • Cate FH (2008) Information security breaches. Faculty Publications. http://www.repository.law.indiana.edu/facpub/233. Accessed 29 Dec 2013

  • Chun SH (2011) Smart mobile banking and its security issues: from the perspectives of the legal liability and security investment. Proceedings of the 6th international conference in future information technology. Loutraki, Greece, pp 190–195

    Chapter  Google Scholar 

  • Clarke N, Furnell S (2005) Authentication of users on mobile telephones—a survey of attitudes and practices. Comput Secur 24(7):519–527

    Article  Google Scholar 

  • Collier R (2012) Medical privacy breaches rising. Can Med Assoc J 184(4):E215–E216

    Article  Google Scholar 

  • Dimensional Research (2012) The generation gap in computer security: a security use survey from GEN Y to baby boomers. http://www.zonealarm.com/products/downloads/whitepapers/generation_gap_research_2012.pdf. Accessed 2 Mar 2014

  • Dini G, Martinelli F, Matteucci I, Saracino A, Sgandurra D (2014) Introducing probabilities in contract-based approaches for mobile application security. In: Garcia-Alfaro J, Lioudakis G, Cuppens-Boulahia N, Foley S, Fitzgerald WM (eds) Data privacy management and autonomous spontaneous security. Lecture Notes in Computer Science, vol 8247. Springer, Berlin, pp 284–299

    Chapter  Google Scholar 

  • Dmitrienko A, Liebchen C, Rossow C, Sadeghi A-R (2014) On the (in)security of mobile two-factor authentication. Technical Report TUD-CS-2014-0029. Technische Universität Darmstadt, Germany. https://www.informatik.tu-darmstadt.de/fileadmin/user_upload/Group_TRUST/PubsPDF/TR-Dmitrienko-2FA-analysis-v2.pdf. Accessed 31 March 2014

  • Gao X, Zhong W, Mei S (2013) Security investment and information sharing under an alternative security breach probability function. Inf Syst Front 17(2):423–438

    Article  Google Scholar 

  • Gest J (2013) Managing BYOD: how to mitigate the risks of using personal devices in the workplace. http://www.smartbusinessemag.com/may2013/Houston/10/0#&pageSet=10&contentItem=0. Accessed 10 Jan 2014

  • Huang Z, Benyoucef M (2013) From e-commerce to social commerce: a close look at design features. Electron Commer Res Appl 12(4):246–259

    Article  Google Scholar 

  • Jech V (2012) Smart mobile devices in corporate and business practice. In: Proceedings of IMEA, University of Hradec Králové, Czech Republic, pp 30–35. http://is.muni.cz/repo/977628/IMEA_2012_Sbornik.pdf#page=34. Accessed 27 Mar 2014

  • Kietzmann J, Plangger K, Eaton B, Heilgenberg K, Pitt L, Berthon P (2013) Mobility at work: a typology of mobile communities of practice and contextual ambidexterity. J Strateg Inf Syst 22(4):282–297

    Article  Google Scholar 

  • Kim C, Tao W, Shin N, Kim KS (2010) An empirical study of customers’ perceptions of security and trust in e-payment systems. Electron Commer Res Appl 9(1):84–95

    Article  Google Scholar 

  • Kourouthanassis PE, Georgiadis CK (2014) Analyzing m-commerce research: technology, applications and research themes. Int J Mob Commun 12(1):1–11

    Article  Google Scholar 

  • La Polla M, Martinelli F, Sgandurra D (2013) A survey on security for mobile devices. Commun Surv Tutor 15(1):446–471

    Article  Google Scholar 

  • Li Q, Clark G (2013) Mobile security: a look ahead. IEEE Secur Priv 11(1):78–81

    Article  Google Scholar 

  • Liu AX, Wang Y, Chen X, Jiang X (2014) Understanding the diffusion of mobile digital content: a growth curve modelling approach. Inf Syst E-Bus Manag 12(2):239–258

    Article  Google Scholar 

  • Lumsden E (2012) Securing mobile technology & financial transactions in the United States. Berkeley Bus Law J 9(1):139–185

    Google Scholar 

  • Microsoft Corporation (2013) Survey shows people need more help controlling personal info online. http://www.microsoft.com/en-us/news/press/2013/jan13/01-23dpdpr.aspx. Accessed 10 Apr 2014

  • Milligan PM, Hutcheson D (2008) Business risks and security assessment for mobile devices. Inf Syst Control J 1:1–6

    Google Scholar 

  • Morrow B (2012) BYOD security challenges: control and protect your most sensitive data. Netw Secur 12:5–8

    Article  Google Scholar 

  • Mort GS, Drennan J (2005) Marketing m-services: establishing a usage benefit typology related to mobile user characteristics. J Database Mark Cust Strategy Manag 12(4):327–341

    Article  Google Scholar 

  • Noh MJ, Lee KT (2015) An analysis of the relationship between quality and user acceptance in smartphone apps. Inf Syst E-Bus Manag. doi:10.1007/s10257-015-0283-6

    Google Scholar 

  • Oh T, Choi YB, Ryoo J, Stokes K (2011) Security management in wireless sensor networks for healthcare. Int J Mob Commun 9(2):187–207

    Article  Google Scholar 

  • Ondrus J, Pigneur Y (2009) Near field communication: an assessment for future payment systems. Inf Syst E-Bus Manag 7(3):347–361

    Article  Google Scholar 

  • Pillay A, Diaki H, Nham E, Senanayake S, Tan G, Deshpande S (2013) Does BYOD increase risks or drive benefits?. http://sitic.org/wp-content/uploads/Does-BYOD-increase-risks-or-drive-benefits.pdf. Accessed 23 Feb 2014

  • Pocatilu P (2011) Android applications security. Inform. Economica 15(3):163–171

    Google Scholar 

  • Ponemon Institute (2012) Confidential documents at risk study. Ponemon Institute Research Report. http://www.ponemon.org/local/upload/file/WatchDoxWhite_Paper_FINAL.pdf. Accessed 12 March 2014

  • Ramu S (2012) Mobile malware evolution, detection and defense. EECE 571B, Term Survey Paper. http://blogs.ubc.ca/computersecurity/files/2012/04/SRamu_EECE572_SurveyPaper-SrikanthRamu.pdf. Accessed 19 April 2014

  • Rhee K, Won D, Jang S-W, Chae S, Park S (2013) Threat modeling of a mobile device management system for secure smart work. Electron Commerce Res 13(3):243–256

    Article  Google Scholar 

  • Scott JE (2004) Measuring dimensions of perceived e-business risks. Inf Syst E-Bus Manag 2(1):31–55

    Article  Google Scholar 

  • Sharma A (2008) Bluetooth security issues, threats and consequences. Proceedings of the 2nd national conference on challenges & opportunities in information technology. Mandi Gobindgarh, India, pp 78–80

    Google Scholar 

  • Shih DH, Lin B, Chiang HS, Shih MH (2008) Security aspects of mobile phone virus: a critical survey. Ind Manag Data Syst 108(4):478–494

    Article  Google Scholar 

  • Tu Z, Yuan Y, Archer N (2014) Understanding user behaviour in coping with security threats of mobile device loss and theft. Int J Mob Commun 12(6):603–623

    Article  Google Scholar 

  • Wang T, Oh LB, Wang K, Yuan Y (2013) User adoption and purchasing intention after free trial: an empirical study of mobile newspapers. Inf Syst E-Bus Manag 11(2):189–210

    Article  Google Scholar 

  • Webliquid (2012) The surge: from communication to context. House of Kaizen. http://www.slideshare.net/Webliquid/the-surge-summary-of-mobile-in-europe. Accessed 27 Mar 2014

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Emmanouil Stiakakis.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Stiakakis, E., Georgiadis, C.K. & Andronoudi, A. Users’ perceptions about mobile security breaches. Inf Syst E-Bus Manage 14, 857–882 (2016). https://doi.org/10.1007/s10257-015-0302-7

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10257-015-0302-7

Keywords

Navigation