Mobile Phone Usage Patterns, Security Concerns, and Security Practices of Digital Generation

Mobile Phone Usage Patterns, Security Concerns, and Security Practices of Digital Generation

Sonya Zhang (College of Business Administration, California State Polytechnic University, Pomona, CA, USA) and Saree Costa (College of Business Administration, California State Polytechnic University, Pomona, CA, USA)
Copyright: © 2018 |Pages: 17
DOI: 10.4018/IJMHCI.2018010102
OnDemand PDF Download:
$30.00
List Price: $37.50

Abstract

As the digital generations have grown up with high-tech gadgets and become avid users of mobile phones and apps, they are also exposed to increasing mobile security threats and vulnerability. In this paper the authors discuss the impact of recent mobile technology advancements on mobile threat environment and mobile security practices. They also conducted a survey to 262 college students to examine their mobile phone usage patterns, security concerns and practices. The results show that students use their mobile phone frequently for various productivity and entertainment purposes. They are generally aware of and concerned about mobile security, not only on losing the phone physically but also on data theft, web threat, and mobile malware. Students also practice security to some extend - most change PIN and passwords regularly, download their apps mostly from official app stores, and generally keep their OS and apps up-to-date. The authors also found significant correlations between mobile security practices and personal attributes, including major, gender, and technology aptitude.
Article Preview

2. Mobile Threat Environment

Mobile threat can come from multiple sources. Couture (2010) broadly classified mobile threats into three categories: 1) threats resulting from the physical nature of small and highly portable mobile devices, 2) threats stemming from their ubiquitous connectivity and 3) threats originating with the prevalence of mobile software applications and malware.

Complete Article List

Search this Journal:
Reset
Open Access Articles
Volume 10: 4 Issues (2018): 1 Released, 3 Forthcoming
Volume 9: 4 Issues (2017)
Volume 8: 4 Issues (2016)
Volume 7: 4 Issues (2015)
Volume 6: 4 Issues (2014)
Volume 5: 4 Issues (2013)
Volume 4: 4 Issues (2012)
Volume 3: 4 Issues (2011)
Volume 2: 4 Issues (2010)
Volume 1: 4 Issues (2009)
View Complete Journal Contents Listing