skip to main content
research-article
Free access

Wireless insecurity: examining user security behavior on public networks

Published: 01 February 2010 Publication History
First page of PDF

References

[1]
Berghel, H. and Hoelzer, D. Pernicious Ports. Comm. ACM 48, 12 (Dec. 2005), 23--30.
[2]
CA Security Advisor; http://www3.ca.com/securityadvisor
[3]
Chenoweth, T., Minch, R. and Tabor, S. User security behavior on wireless networks: An empirical study. In Proceedings of the 40th Annual Hawaii International Conference on System Sciences (IEEE Computer Society, Jan. 2007).
[4]
Duffy, J. Wi-Fi hot spots multiply around the world. Network World; http://www.networkworld.com/news/2006/110206-hotspots.html.
[5]
Housley, R., Arbaugh, W. Security Problems In 802.11-Based Networks. Comm. ACM 46, 5, (May 2003), 31--34.
[6]
Lee, A.J., Koenig, G.A., Meng, X and Yurcik, W. Searching for open windows and unlocked doors: Port scanning in large-scale commodity clusters. IEEE International Symposium on Cluster Computing and the Grid, May 2005.
[7]
PANDA Software International. Security in wireless networks; http://vocuspr.vocus.com/VocusPR30/Temp/Sites/2631/28d2f2c9bfeb4c808531a849e150d810/WP%20Wifi.pdf
[8]
Poole, C. Wireless information security. In Information Technology Security, Advice from Experts, Lawrence Oliva, Ed. CyberTech Publishing, London, 2004, 110--143.
[9]
Potter, B. Wireless hotspots: Petri dish of wireless security. Comm. ACM 49, 6, (June 2006), 51--56.
[10]
Schmidt, T. and Townsend, A. Why Wi-Fi wants to be free. Comm. ACM 46, 5, (May 2003), 47--52.
[11]
Yu, J., Liu, C., and Ku, C. Wireless trust: conceptual and operational definition. International Journal of Mobile Communication 2, 1, (2004), 38--49

Cited By

View all
  • (2016)Information systems control alignmentInformation and Management10.1016/j.im.2015.09.01253:2(183-196)Online publication date: 1-Mar-2016
  • (2015)The Ethics of Social Media and Network SecurityBusiness Ethics and Diversity in the Modern Workplace10.4018/978-1-4666-7254-3.ch006(79-90)Online publication date: 2015
  • (2014)Socio-technical Security Analysis of Wireless HotspotsProceedings of the Second International Conference on Human Aspects of Information Security, Privacy, and Trust - Volume 853310.1007/978-3-319-07620-1_27(306-317)Online publication date: 22-Jun-2014
  • Show More Cited By

Index Terms

  1. Wireless insecurity: examining user security behavior on public networks

        Recommendations

        Comments

        Information & Contributors

        Information

        Published In

        cover image Communications of the ACM
        Communications of the ACM  Volume 53, Issue 2
        February 2010
        147 pages
        ISSN:0001-0782
        EISSN:1557-7317
        DOI:10.1145/1646353
        Issue’s Table of Contents
        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        Published: 01 February 2010
        Published in CACM Volume 53, Issue 2

        Permissions

        Request permissions for this article.

        Check for updates

        Qualifiers

        • Research-article
        • Popular
        • Refereed

        Contributors

        Other Metrics

        Bibliometrics & Citations

        Bibliometrics

        Article Metrics

        • Downloads (Last 12 months)209
        • Downloads (Last 6 weeks)48
        Reflects downloads up to 25 Feb 2025

        Other Metrics

        Citations

        Cited By

        View all
        • (2016)Information systems control alignmentInformation and Management10.1016/j.im.2015.09.01253:2(183-196)Online publication date: 1-Mar-2016
        • (2015)The Ethics of Social Media and Network SecurityBusiness Ethics and Diversity in the Modern Workplace10.4018/978-1-4666-7254-3.ch006(79-90)Online publication date: 2015
        • (2014)Socio-technical Security Analysis of Wireless HotspotsProceedings of the Second International Conference on Human Aspects of Information Security, Privacy, and Trust - Volume 853310.1007/978-3-319-07620-1_27(306-317)Online publication date: 22-Jun-2014
        • (2010)The weak and the strong password preferencesProceedings of the 3rd international conference on Security of information and networks10.1145/1854099.1854113(56-61)Online publication date: 7-Sep-2010

        View Options

        View options

        PDF

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader

        Magazine Site

        View this article on the magazine site (external)

        Magazine Site

        Login options

        Full Access

        Figures

        Tables

        Media

        Share

        Share

        Share this Publication link

        Share on social media