Reference Hub2
Users' Perception of Security for Mobile Communication Technology

Users' Perception of Security for Mobile Communication Technology

Mohanad Halaweh
Copyright: © 2014 |Volume: 8 |Issue: 3 |Pages: 12
ISSN: 1930-1650|EISSN: 1930-1669|EISBN13: 9781466655010|DOI: 10.4018/IJISP.2014070101
Cite Article Cite Article

MLA

Halaweh, Mohanad. "Users' Perception of Security for Mobile Communication Technology." IJISP vol.8, no.3 2014: pp.1-12. http://doi.org/10.4018/IJISP.2014070101

APA

Halaweh, M. (2014). Users' Perception of Security for Mobile Communication Technology. International Journal of Information Security and Privacy (IJISP), 8(3), 1-12. http://doi.org/10.4018/IJISP.2014070101

Chicago

Halaweh, Mohanad. "Users' Perception of Security for Mobile Communication Technology," International Journal of Information Security and Privacy (IJISP) 8, no.3: 1-12. http://doi.org/10.4018/IJISP.2014070101

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

Security perception has been investigated by much research within the e-commerce and e-banking context. However, very little research has investigated this issue within the general mobile context without limiting this to particular applications such as payment, marketing, banking and commerce. Therefore, this paper aims to explore the users' perception of security towards mobile phones from a wide perspective. An interpretive-qualitative research was adopted to investigate the users' perceptions. The research results provided evidence for extending the meaning of the security perception concept to include human security as a relevant issue to mobile phone usage. It also showed that mobile phones can be used as an instrument to commit fraud and crimes. Furthermore, the results showed that the development of mobile technology raises new security and privacy concerns. For practical implications, this research provides recommendations for mobile technology designers to improve mobile usability- related issues in order to improve users' feeling of security

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.