Interpreting Users’ Perceptions of Mobile Security Methods and Their Effectiveness

Richmond Adebiaye

Abstract

The increasing adoption of open source operating system (OS) platforms, such as Android and iOS, have opened up new security vulnerabilities and threats to mobile devices and other wireless access technologies. Recent statistics show that mobile networks around the globe “generate exceedingly over 86 exabytes of traffic annually”. Thus, mobile security vulnerabilities and threats such as SMS spam, rogue apps, adware, malware, cyber-attacks and unlawful eavesdropping have become an ever-increasing problem for mobile users around the world. This paper proposes a quantitative research survey to investigate mobile device security and the implications of security application recommendations for its users. The objective is to identify increased security risks, and recommend best security practices for mobile users. To obtain quantitative values, web-based questionnaires using the Likert scale were used, and data processed by factor analysis, ANOVA and multiple regression analysis tabulated along a continuum in numerical form. The study thus identifies and reveals the impacts of smartphone security threats such as mobile adware, rogue application downloads, and considers the suitability of smartphone security solutions offered by various vendors. This paper provided insights into users’ problems of malware, attack channels, black industry ‘chain of smartphone security’, and accessibility to smartphone security solutions introduced by mobile vendors. As this study adds to the available body of knowledge, it is anticipated that future research will continue to advance the available information regarding rogue applications, adware, malware, and other security threats related to mobile technology.

References

Christian, M. (2014). Integrating Cloud Computing and Mobile Applications: A Comparative Study Based on Cloud and Sanscode, Journal of Cloud Computing. 2(14) 1-9.

Gao, C, and Liu J. (2013). Modeling and Restraining Mobile Virus Propagation. IEEE Transactions on Mobile Computing, 12(3): 529-541.

Greenberg, A. (2010). Google Pulls App that Revealed Android Flaw, Issues Fix, http://news.cnet.com/8301-270803-20022545-245.html.

Harris, M, and Patten, K. (2013). Mobile Device Security Considerations for Small- and Medium-Sized Enterprise Business Mobility Integrated Information Technology, Information Management and Computer Science, 22(1): 97-144

Liu, D, Zhang, and Hu, K. (2013). A Survey on Smartphone Security, Applied Mechanics and Materials, (Vol 347-350): 3861-3865.

Mavridis, I., & Pangalos, G. (2012). Security Issues in a Mobile Computing Paradigm. In I. Mavridis, & G. Pangalos, Communications and Multimedia Security (pp. 61-76). Springer US.

Park, J., Yi, K and Jeong, Y. (2014). An Enhanced Smartphone Security Model based on Information Security Management Systems, Electronic Commerce Research, 14(3): 321-348.

Patten, K and Passerini, K. (2007). Next Generation Small and Medium Enterprises Mobility Strategy Roadmap, Proceedings of ISOneWorldConference, Las Vegas, NV, 11-13 April.

Waltz, M. (2011). Mobility Threats, Mobile Enterprise, 7 March, Accessed 9 Februrary 2013, http://mobileenterp rise.edgl.com/top-stories/Mobility-Threats71022

Wei, J and Ozok, A. (2009). Development of a Mobile Commerce Security Analysis Method. Journal of Information Privacy & Security 5: 1; 28.

Yaseen, B, and Tariq, M. (2012). Technical Comparison Between Android And IOS With Respect to Their Architecture. Technical Report Documentation Page, Punjab University College of Information Technology, University (PUCIT), Report No:BCSF09A: 1- 16.

Lookout, 2013. “2013 Mobile Threat Predictions”, Accessed 11 Februrary 2013,https://blog.lookout.com/blog/2012/12/13/2013-mobile-threat-predictions/

Stat counter, 2013. “Top 8 Mobile Operating Systems in the United States from Jan 2012 to Jan 2013”, Stat Counter Global Stats, accessed 12 February 2013

Check out our ecommerce solutions

next
prev