Mobile Cyber Information Leakage: Users' Attitudes and Information Protection Strategies

Mobile Cyber Information Leakage: Users' Attitudes and Information Protection Strategies

Hongbo Lv, Zhiying Zhou
DOI: 10.4018/978-1-5225-5393-9.ch009
OnDemand:
(Individual Chapters)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

With the wide use of smartphones, mobile cyber has become an indispensable part of our lives. While smartphones are used almost every aspect of our lives, awareness of personal information protection is underdeveloped, and information leak has become one particular problem on mobile cyber. At the same time, personal information resources have become more valuable than ever. This chapter investigates users' attitudes toward cyber information leakage and methods to protect personal information. The software SPSS 19 was used to analysis the relationship among cyber environment, applicability and practicability of protection methods, economic cost, and overall evaluation (satisfaction). A suggestion that may promote personal information awareness and promote cyber security from technical, legal, and social aspects is also provided.
Chapter Preview
Top

2. Categories Of Mobile Information Leakage

Smartphone has become an indispensable part of modern life. With the growing maturity of mobile cyber technology, the use of mobile network is ever increasing. A series of O2O business apps, such as Baidu Takeout1, Didi Kuaidi2, and Uber allow phone users to do what they want to do without leaving their homes. Feng (2016) mentioned that social apps, such as QQ and WeChat3 are must-have SNS(Social Networking Services) apps in almost every smartphone in China. Watching videos on phones is also getting easier. The Statistical Report on Internet Development in China (2017) showed that the utilization rates of mobile network were 67.1% and 70.8% for watching video and listening to music online, respectively.

Complete Chapter List

Search this Book:
Reset