Smart Phone Security Practices: Item Analysis of Mobile Security Behaviors of College Students

Smart Phone Security Practices: Item Analysis of Mobile Security Behaviors of College Students

Scott E. Mensch (Indiana University of Pennsylvania, USA) and LeAnn Wilkie (Indiana University of Pennsylvania, USA)
Copyright: © 2019 |Pages: 14
DOI: 10.4018/IJCBPL.2019070101
OnDemand PDF Download:
No Current Special Offers


Hand-held cell phone technology has been around for quite some time, however when Apple introduced the iPhone in 2007, the widespread adoption of smartphones took off. Smartphones allow users to communicate via talk, text and video; access personal and work e-mail and the Internet; run applications; make purchases; manage bank accounts; take pictures - and for many of us are an integral part of our everyday (The Privacy Rights Clearinghouse, 2018). Smartphones are “essentially tiny computers, we reach for these devices when we first wake up, bring them with us into the car, and often keep them with us during our most private moments (The Privacy Rights Clearinghouse, 2018). Many users rarely turn off their smart phones.
Article Preview

Literature Review

Studies show that U.S. smart phone usage has increased dramatically in the past half-decade; the volume of cellular data related to Internet searches and e-commerce has also increased. Smith (2015) found that 64% of American adults owned a smartphone, and smart phone usage is expected to increase by 38 million users in 2018. Also, 87% of Americans ages 30-50+ and 91% of 18-28-year-olds check email via their cell phone (Smith, 2015). The reliance on cell phones and the necessity to feel continually linked are evidence, as 46% of users say they can’t live without their smart phone (Anderson, 2015); “…their mobile phone is the first and last thing they look at each day;” 84% keep their mobile phone next to their bed or in the same room while they sleep (Statistic Brain Research Institute, 2017). Generations Y and Z (born 1997 to present) want instant gratification and have “…less patience for delay of any kind” (Tapscott, 1998, p. 109; Tari, 2011).

Perceptions about mobile device security from both physical and digital security breaches seems to have lagged per Pew Research Center’s study, finding that 28% of all smart phone owners took no measures to secure their devices (Anderson & Olmstead, 2017); see Table 1 for additional findings about users and smart phone security.

Table 1.
How Smart Phone users secure their phones (Anderson & Olmstead, 2017)
How Smart Phone Users Secure Their PhonesPercentage
Set a screen lock with a PIN25%
Thumbprint Scanner23%
Pattern Dots9%
No Screen Lock28%

Complete Article List

Search this Journal:
Open Access Articles: Forthcoming
Volume 12: 4 Issues (2022): 1 Released, 3 Forthcoming
Volume 11: 4 Issues (2021)
Volume 10: 4 Issues (2020)
Volume 9: 4 Issues (2019)
Volume 8: 4 Issues (2018)
Volume 7: 4 Issues (2017)
Volume 6: 4 Issues (2016)
Volume 5: 4 Issues (2015)
Volume 4: 4 Issues (2014)
Volume 3: 4 Issues (2013)
Volume 2: 4 Issues (2012)
Volume 1: 4 Issues (2011)
View Complete Journal Contents Listing