Skip to main content

Feeling Secure vs. Being Secure the Mobile Phone User Case

  • Conference paper
Global Security, Safety and Sustainability & e-Democracy (e-Democracy 2011, ICGS3 2011)

Abstract

In this work, we are comparing the subjective security feeling of mobile phone users to the (objectively agreed) best security practices. This was possible by statistically processing a large pool of 7172 students in 17 Universities of 10 European countries. We introduced a “mean actual security value”, comparing their security practices to best practices. There was a clear negative connection between feeling secure and actually being secure. Users that feel that mobile phone communication is secure, tend to be less cautious in their security practices. Moreover, we extracted profiles of students according to their mobile phone communication security feeling. These profiles belong to well defined categories. Users, exhibit different values of a metric that we named “mean security feeling value” according to their age, field of study, brand and operating system of phone, connection type, monthly bill and backup frequency. These results can help both academia and industry focus their security awareness campaigns and efforts to specific subsets of users that mostly need them. Finally, as there are not available any already validated questionnaires in regards to this specific research topic, our research, apart from revealing the situation, aims at providing a basis for the formulation of similar questionnaires for future use.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Lenhart, A.: Cell phones and American adults. Pew Research Center (2010), http://www.pewinternet.org (accessed: February 10, 2011)

  2. Synovate: Global mobile phone survey shows the mobile is a ’remote control’ for life. Synovate survey (2009), http://www.synovate.com (accessed: October 09, 2010)

  3. comScore M:Metrics: Smarter phones bring security risks: Study (2008), http://www.comscore.com (accessed October 09, 2010)

  4. Trend Micro: Smartphone Users Oblivious to Security. Trend Micro survey (2009), http://www.esecurityplanet.com (accessed October 09, 2010)

  5. Goode Intelligence: Mobile security the next battleground (2009), http://www.goode/intelligence (accessed October 09, 2010)

  6. Vrechopoulos, A.P., Constantiou, I.D., Sideris, I.: Strategic Marketing Planning for Mobile Commerce Diffusion and Consumer Adoption. In: Proceedings of M-Business 2002, CD (2002)

    Google Scholar 

  7. Androulidakis, I., Papapetros, D.: Survey Findings towards Awareness of Mobile Phones’ Security Issues, Recent Advances in Data Networks, Communications, Computers. In: Proceedings of 7th WSEAS International Conference on Data Networks, Communications, Computers (DNCOCO 2008), pp. 130–135 (2008)

    Google Scholar 

  8. NCSA: 2010 NCSA/Norton by Symantec Online Safety Study (2010), http://www.staysafeonline.org (accessed: February 10, 2011)

  9. Androulidakis, I., Basios, C., Androulidakis, N.: Surveying Users’ Opinions and Trends towards Mobile Payment Issues. In: Techniques and Applications for Mobile Commerce - Proceedings of TAMoCo 2008. Frontiers in Artificial Intelligence and Applications, vol. 169, pp. 9–19 (2008)

    Google Scholar 

  10. National Cyber Security Alliance (NCSA): Schools Lacking Cyber Security and Safety Education (2009), http://www.staysafeonline.org (accessed October 09, 2010)

  11. McAfee: Most Mobile Users Don’t Know if They Have Security, McAfee-sponsored research (2008), http://www.esecurityplanet.com (accessed October 09, 2010)

  12. Dillman, D.A.: Mail and Internet Surveys: The Tailored Design Method, 2nd edn. John Wiley & Sons (1999)

    Google Scholar 

  13. Pfleeger, S.L., Kitchenham, B.A.: Principles of Survey Research Part 1: Turning Lemons into Lemonade. ACM SIGSOFT Software Engineering Notes 26(6), 16–18 (2001)

    Article  Google Scholar 

  14. Androulidakis, I., Androulidakis, N.: On a versatile and costless OMR system. WSEAS Transactions on Computers 4(2), 160–165 (2005)

    MATH  Google Scholar 

  15. Androulidakis, I.: Intercepting Mobile Phone Calls and Short Messages Using a GSM Tester. In: Kwiecień, A., Gaj, P., Stera, P. (eds.) CN 2011. CCIS, vol. 160, pp. 281–288. Springer, Heidelberg (2011)

    Chapter  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 ICST Institute for Computer Science, Social Informatics and Telecommunications Engineering

About this paper

Cite this paper

Androulidakis, I., Kandus, G. (2012). Feeling Secure vs. Being Secure the Mobile Phone User Case. In: Georgiadis, C.K., Jahankhani, H., Pimenidis, E., Bashroush, R., Al-Nemrat, A. (eds) Global Security, Safety and Sustainability & e-Democracy. e-Democracy ICGS3 2011 2011. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 99. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-33448-1_29

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-33448-1_29

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-33447-4

  • Online ISBN: 978-3-642-33448-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics