Conference PaperPDF Available

Young People and Smart Phones: An Empirical Study on Information Security

Authors:

Abstract and Figures

This paper reports on a study of mobile phone usage by young people in the UK tertiary education sector. Responses from 397 respondents were analysed to explore the attitudes of young people towards data security issues for mobile devices. Results from the comparative analysis found that there were significant differences in data security risk concerns across ethnic groups. Those who reported extrovert personalities tend to take more risk in data security issues. In addition, young people who were 'technology savvy' were less likely to expose themselves to risk to data security issues through the use of free wifi and access of installed applications. The research reported here is part of a wider study looking at the overall communications and mobile phone usage of young people and taken as a whole, the paper contributes to this increasingly important area of Information Technology.
Content may be subject to copyright.
Young People and Smart Phones: An Empirical Study on Information
Security
Balbir S. Barn
Middlesex University
b.barn@mdx.ac.uk
Ravinder Barn
Royal Holloway, University of
London
r.barn@rhul.ac.uk
Jo-Pei Tan
Universiti Putra Malaysia
jopei@putra.upm.edu.my
Abstract
This paper reports on a study of mobile phone
usage by young people in the UK tertiary education
sector. Responses from 397 respondents were
analysed to explore the attitudes of young people
towards data security issues for mobile devices.
Results from the comparative analysis found that
there were significant differences in data security risk
concerns across ethnic groups. Those who reported
extrovert personalities tend to take more risk in data
security issues. In addition, young people who were
’technology savvy’ were less likely to expose
themselves to risk to data security issues through the
use of free wifi and access of installed applications.
The research reported here is part of a wider study
looking at the overall communications and mobile
phone usage of young people and taken as a whole,
the paper contributes to this increasingly important
area of Information Technology.
1. Introduction
In the last decade, there has been a rise in mobile
phone ownership in the United Kingdom, particularly
among young people. In the year 2000, it was found
that 17% primary school children and 58% of
secondary school children have their own mobile
phones (Office of National Statistics, 2002). More
recently the OFCOM Communications Market
Report for 2012 reported 66% of those aged 16-24
possessed a smart phone. The same group also
reported that they are most likely to choose the
mobile phone as the medium they would miss most
(40%).
The value of mobile phones can partly be
explained by how mobile phone based
communication has become embedded in youth
culture bringing out new spaces for social interaction
among young people [1, 2]. Accompanying these
changes, mobile phones have also begun the process
of modifying behaviour towards risk taking, and in
particular the risks associated with a possible lack of
understanding towards data security implications
associated with mobile phones.
This paper reports on a research study that
examined young peoples’ adoption of mobile
technology, particularly smart phones (those with
internet access), to support their communication
needs. The research focuses on the use of mobile
technology in the everyday lives of young people
studying at Universities in the United Kingdom.
While the research had a range of research questions
reflecting the broadness of the original brief, this
paper reports on the following:
To determine linkages between mobile
communications, risk-taking and at-risk
behavior among young people.
In this paper, risk-taking is broadly interpreted as
risk taking concerned with information security. For
the purposes of this paper we define information (and
data) security as: “The safeguarding of an individual's
data from unauthorised access or modification to
ensure its availability, confidentiality and integrity”
(http://ishandbook.bsewall.com/risk/Methodology/IS.
html ). We deliberately narrow this definition of risk
to focus on information security. The wider use of
risk referred to range of risk taking behavior such as
the sending of offensive texts, driving whilst texting
which are not relevant to this paper. Thus the paper
will present findings on the attitudes of young people
towards issues of information security related to their
communications based activities on mobile devices.
Research reporting on mobile phone usage
amongst young people is now widely available.
There have been studies conducted in Australia
exploring models of technology adoption [3], East
Asia [4] and the USA for example [5]. The latter is an
example that specifically explored issues around data
/ information security.
Research that explores behaviour of young people
in their use of mobile technology continues to
increase in importance. Thus this study contributes
current data on the use of the mobile phones in the
context of Internet related activity and presents
findings that note significant differences towards
information security between different demographic
groups. These distinctions have potential marketing,
technical and policy implications to those involved in
2014 47th Hawaii International Conference on System Science
978-1-4799-2504-9/14 $31.00 © 2014 IEEE
DOI 10.1109/HICSS.2014.554
4504
the eco-systems around mobile technology.
The remainder of the paper is organised as
follows. Section 2 briefly reviews previous work that
has explored how young people utilise mobile
technology. In particular, the issue of data or
information security is considered within the context
of established theoretical models such as the
Technology Acceptance Model [6] [7]. Section 3
develops the research methods utilised to explore the
question above. Section 4 presents both our
descriptive statistics and an analysis using
correlations for understanding the relationship of
young people, their behaviours and awareness
towards data security. The paper is concluded with
final remarks.
2. Related Work
The young people surveyed in this research
represent the so-called 'digital natives' [8], that
generation of young people born after 1980 and
possessing sophisticated knowledge of information
technology having grown up surrounded by
electronic gadgets and the Internet. Importantly,
despite the wide availability of a preponderance of
electronic devices, the smart mobile phone providing
access to a range of services (voice, text, email, social
networks, rich media) and ubiquity of network
connectivity means that it has become the device of
choice for young people [5].
The wider literature into the relationship between
technology and society has consistently highlighted
the rapid embedding of mobile phones
communication into youth cultures and its effects on
altering the social and geographical aspects of their
everyday life. Specifically, mobile phone
communications have opened up new spaces for
social interaction among the youth: talk to friends,
arrange to meet and for parents and young people to
stay in touch [1, 2]. The availability of mobile
communications has also expanded young people’s
private spheres and, allowed them to have more
control over their own communication channels and
geographies [9] [10, 11]. Thus, this type of
communication has created a ‘private setting’ for
young people and serve as means for integration in
their peer group.
Mobile phones, due to their physical
characteristics, are more vulnerable to threats of
accidental loss or theft. And while the device itself
may represent the target, the increasing use of the
phone for a range of activities leading to increasing
amounts of personal information stored in the phone
suggests that data/information security will become
increasingly important. In 2005, a study of 297
mobile phone users [12] found that a third did not
use PIN technology, however 83% were willing to
accept some form of biometric authentication. PIN
based security was again the subject of further study
by Kurkovsky and Syta and reported similar results
[5]. However as our results will show, in 2013 young
peoples' awareness to the importance of PINs has
increased.
The phenomena of social network sites (SNS)
dominated the year of 2007 [13] and show no signs
of losing impetus as SNSs have moved to mobile
devices. Their relationship to data security in general
is significant as a typical Facebook user profile
frequently includes large amounts of personal and
sensitive personal data as defined by the European
Data Protection Directive (DPD). When this is
coupled with the inherent vulnerability of mobile
phones the security of personal and sensitive data and
associated risk is further exacerbated.
The rate at which advances in mobile technology
are being made requires that a young person’s
willingness in risking an adoption of new technology
may depend upon their disposition to engaging with
innovation and their general technology savviness.
Although psychological and personality metrics
exist for measurement of domain-specific individual
innovativeness in the adoption of IT in general such
as that by Agarwal [14], as our research was broader
than the topic addressed in this paper, we utilised the
widely deployed personality Eysenck scale as a
potential predictor for risk taking activities in relation
to information security [15].
Previous research suggests that personality of an
individual will predict types of mobile phone use (see
[16] . For example, extraversion is associated with
traits such as assertiveness, activity-oriented,
excitement-seeking and positive emotions [17] .Thus,
personality of individuals should also predict the
types of interactions and activities in which people
are prepared to engage using mobile phone
technology. Also, problematic mobile phone users or
addictive users are more likely to be extraverted [16].
As extroverts are more likely to take risks, they have
a higher likelihood to engage in risk-taking behaviour
that could compromise the security of data stored on
a mobile device or expose sensitive data/information
to misuses. While psychological theory, in particular
personality traits, can explain patterns of and
behavior in mobile phone use [18], there is
comparatively little information available on the
relationship between personality traits and perception
of data security/information privacy among mobile
phone users. Therefore, the present study makes an
important contribution in addressing the
4505
psychological predispositions that might underpin
mobile phone use.
Huang et al [19] reported on a study to investigate
people's perception of information security with the
aim to unveil the factors that influence peoples'
perception of different threats to information security.
Given that perception is a critical cognitive function
by which individuals assess external input in order to
generate a behavioural response, the work by Huang
et al is significant. Following a survey of 602
respondents and an exploratory factor analysis, a six-
factor structure characterising people’s perception of
different threats to information security was
developed. This model contains factors of knowledge
(K), impact (I), severity (S), controllability (C),
awareness (A) and possibility (P). The study did not
however, consider people-related features such as
cultural style, personality and risk sensitivity. For
young people and mobile phones such omissions may
be of relevance.
While research on mobile phone security exists
(see [20] and [21]) it has not explored the experiences
of young people in depth and in particular the
questions of security and how digital natives differ
has not been addressed. Some studies have compared
perceptions and the use of mobile phone across
cultures, age groups and gender. For example,
Campbell [22] (2007) in his survey of 231 students
from diverse cultural groups (i.e. US, Hawaii, Japan,
Taiwan and Sweden) found that various types of
cultural characteristics among these students are
associated with the mobile communication practices
and perception towards mobile technology, ranging
from psychological or relational tendencies to socio-
economic and political conditions.
Younger/adolescent users perceived mobile phone
technology as a tool for expressive purposes or
fashion statement [23] [24]; while older/adult users
associate it with instrumental purposes and
safety/security [25]. For gender comparison, males
emphasised the technical functions of mobile phones,
while females appreciate social and physical
appearance aspects, such as casing, design and ring
tone [9].
Recent research work suggest that although
technology is embedded in young people’s lives,
their use and degree of fluency in technology are not
uniform, particularly in aspects above and beyond
computer games and emails that require a deeper
understanding of the technology and its possible
impacts [26]. Kennedy and colleagues’ (2007) survey
on young people usage of Web 2.0 tools revealed that
only a relatively small proportion of students are
capable of utilising the newer technologies such as
blogs, wikis and social bookmarking which enable
students to collaborate and to produce and publish
material online [27]. Others indicated that college
students have very basic technological skills and do
not resognise the enhanced functionality of the
applications they own and use [28]. This lack of
knowledge on information technology may have
pertinent implications on young people’s attitudes
towards vulnerability of mobile phone data security.
The most widely used methods of authentitication
on moble phones are PINs and passwords. While,
study on IT professionals provides evidence on the
relationship between general awareness or concern of
data security and security measures/actions that
individuals take to protect their mobile phones and
sensitive data stored on them (see [29]), other studies
on young people indicate that many mobile users are
either unaware or do not use the security features
available on their mobile phones (i.e. did not use any
PIN or password security) [5] [12]. Kurkosky and
Syta (2010) have argued that the lack of knowledge is
not the reason why young people choose to leave
their mobile device unprotected. They asserted that
majority of the young people in their survey are
aware of phone-level (80%) and SIM-level PINs
(67%) but less than a third use PINs to lock phones
and Sim cards.
Mobile phones/devices have a particular set of
risks and vulnerabilities associated with them,
especially risk factors related to youth populations.
The mainstream media has highlighted the concern
about young people being targeted by bullies and
pedophiles through mobile phones and other media
technologies [30] [31]. For example, Valentine and
Holloway who explored young people’s use of
cyberspace noted parental concerns about young
people’s vulnerability, and their high level of
technological competence, which exposed them to
pornography and pedophiles while using the internet
[32] .
To understand perceptions of young people
towards issues of data security on their mobile
phones, theoretical models from IS/IT research
literature were also contemplated. Key theories such
as the Technology Acceptance Model (TAM) [6] and
The Diffusion of Innovation Theory [33] were
considered but discounted as they did not appear to
satisfactorily address the perceived dichotomy
between convenience and security (that is, the
likelihood that users behave less securely in the
presence of free services). Issues of rapid
development and diffusion of smart-phones and
mobile technologies in general also prevents adoption
of these theoretical models.
4506
In the context of this paper, the existing literature
presents limited evidence on correlational factors
leading to awareness of data security amongst this
target group 18-25 year old young people especially
since the large-scale adoption of smart phones. Thus
the primary contribution of this paper is to present
findings on factors that influence behaviour that has
impact on information security for users of mobile
smart phones and how such factors are correlated.
This study hypothesized the following: (a) Young
people’s perception of risks of data security would be
associated to their socio-demographic characteristics;
(b) Young people’s personality would be
significantly related to their perception on mobile
phone security; (c) Young people IT/information
literacy and data privacy/security measures would be
associated to their perception on mobile phone data
security. The findings have potential for policy and
design implications for mobile phone manufacturers.
3. Research Method
This research was conducted at four tertiary
(higher education) institutions in the UK with the
population from which the sample was obtained
studying a range of courses such as computer science,
sociology, psychology, criminology and business
studies at both undergraduate and postgraduate
levels.
An on-line approach to survey design was chosen
because of the clear advantages offered: storage of
data, flexibility and accuracy; targeting different
segments and the lower cost.
Students were recruited through university
courses, primarily through a web link sent via email.
The survey was a standardised instrument and
developed to elicit demographic details from the
young people (i.e. personal, social and family
background characteristics). Participation was strictly
voluntary. Other standardised instruments and open-
ended questions were used to gather information on
the usage and experience of mobile technology as
well as the role of mobile communication in the
wider social world of young people. In addition to the
survey, focus group discussions with 40 students
were also held during the piloting of the on-line
questionnaire and at the end of the survey. Data were
collected over a period of November 2012 through to
end of January 2013.
The lead institution obtained ethics approval and
the questionnaire design was subject to validation and
pilot testing to ensure readability, consistency and
error correction. The focus groups served as
important consultations to cross check with the
student views and experiences that were captured by
our research instruments. The focus groups also
provided additional qualitative data on mobile phone
usage.
While the survey addressed a range of areas, those
related to the research question under evaluation in
this paper included:
1. Information Literacy
2. Data Security
3. Experience towards Mobile Phone Usage
4. Communication & Personality
5. Demographic Details.
As noted in the introduction earlier, this paper
reports on the linkages between mobile phone usage
and risk-taking behavior. In this paper, risk taking is
broadly conceptualised as risks associated with
concern and management of data/information
security. Drilling down, for this exploration of
attitudes towards data security, the following survey-
derived items were determined to be potential factors
that may influence young people towards data
security issues on mobile phones (see Table 5). The
factors are discussed in section 4. Note that each
predictor variable group reported a minimum of 0.71
on the Cronbach Reliability Scale.
The wider scope of the research was exploratory in
nature. The five areas listed above were deemed as
predictors of perceptions towards (information
security) risk taking behaviour. It would be of value
to replicate this study in other country contexts.
Sample questions are shown in Table 7 and the full
research instrument is available from the authors.
4. Results and analysis
This section presents the results and analysis
focusing on the exploration of attitudes and practices
of young adults towards data security on mobile
phones. We first introduce descriptive statistics that
outline the demographic data. The descriptive
analysis section explores responses to key questions
related to the factors influencing information
security. This is followed by relevant correlation
analysis performed on the data.
At the end of the survey, base line data included:
397 respondents who started the survey with 291
respondents completing all questions. The socio-
demographic profile of young people and family is
presented in Table 1. The sample was 47.4% (n=137)
male and 52.6% (n=152) female; and average age is
23 years old (SD=6.15) with the majority (89.3%,
n=258) between 16 to 30 years old during the time of
the study. In terms of age for first mobile phone, the
average age is 15 years old (SD=5.94). A majority
4507
(72.6%, n=226) of the respondents reported that they
first had a mobile phone at age 15 or below.
Table 1 Descriptive Data
Variable N Mean or %
Male 137 47.4
Female 152 52.6
Age (years) 289 23.12
White British 74 25.8
White Other 63 22.0
Mixed 22 7.7
Black/ African/ Caribbean/
Black British
41 14.3
Asian/ Asian British 78 27.2
Home/EU Student 219 75.8
Overseas Student 70 24.2
Living away from family
home
170 58.9
Living at home with family 119 41.2
The current sample comprised young people from
different ethnic backgrounds. Almost half (47.8%,
n=137) of the youth were White with 25.8% (n=74)
White British and 22% (n=63) other White ethnic
background, while the rest were of black and
minority ethnic background (52.2%, n=150). This
includes those of Black British/African/Caribbean
(14.3%, n=41), Asian/British Asian (27.2%, n=78)
mixed-parentage (7.7%, n=22) and other ethnic
groups such as Arabs (2.3%, n=9). The ethnic
categories used in this research are based on the
widely used categories in the UK census
(http://www.ons.gov.uk/ons/guide-
method/census/2011/uk-census/index.html). The
majority (75.8%, n=219) of young people were
Home/EU students while the rest were overseas
students (24.2%, n=70).
There were almost similar numbers of students
living away from family home (58.8%, n=170) and
those living at home with family during the time of
the study (41.2%, n=119). Table 1 provides some of
the relevant overview descriptive statistics from the
sample.
Mobile phones present inherent security risks
concerning issues of data and privacy. Some of the
background to the nature of associated risks has
already been noted in section 2 earlier. Further
descriptive statistics explored the general concerns of
young people towards aspects of data security. Here
we report on the responses to questions by our
respondents that provide some insight into how issues
of data and privacy security are of concern to our
demographic. Table 2 shows that almost half of our
sample were concerned about the security of data
stored in their mobile phone. Moreover, From the
table, it is clear that young people recognise that there
are risks associated with securing data on mobile
phones with almost 50% reporting some concern
about infiltration by viruses or worms; and a similar
proportion expressing concern about wireless attacks
using Bluetooth or wifi connection.
At odds with this are the relatively small numbers
who are concerned about the risks of using free wifi
in public spaces (only 33%).
Table 3 and 4 also illustrate young people's
perceptions on privacy and security measures in
relations to mobile phone technology. Items on
password security measures were derived from
Kurkovsky and Syta [5] to examine mobile phone
data security and privacy measures among young
people. Our data show that half of our sample report
that they do not allow applications to access their
contacts; whilst two-fifths do not allow applications
to access any information. Only 1 in 10 regularly
allow apps access to information and their contacts.
The ‘sometimes’ response suggests that young people
are rather discerning in which applications they allow
to access their personal information and contacts (See
Table 3). This finding is consistent with a recent
PEW report [34].
The majority of the young people had indicated
that their mobile-phone (71.7%, n=230) and sim-card
(39.8%, n=127) are password protected while almost
75% of the young people rarely/never change their
password on their mobile phone (See Table 4). About
one third (30.7%, n=98) tend to change their
password as a security measure on a regular basis
(frequently or occasionally).
Slightly more than half of the young people
(53.8%, n=172) reported that no other people are
aware of their password; while the rest indicated one
(22.5%, n=72), two to three (16.6%, n=53) and four
or more (7.2%, n=23) people are aware of their
mobile phone password.
4.1 Descriptive Analysis
Table 5 shows the descriptive statistics of the
measures for personality, IT/information literacy,
data security and risk taking behaviour. The Eysenck
Personality Questionnaire (Extraversion vs
Introversion) [15] was used in the present study. This
12-item measure assesses a young person’s
personality on an extraversion/introversion
continuum (i.e. outgoing, talkative, high on positive
affect (feeling good), and in need of external
stimulation). Higher scores on the Personality
Questionnaire reflect greater tendency towards
extraversion personality. Based on the group median,
4508
more than half (60.3%, n=179) of the young people
reported low levels of extraversion personality. while
the remaining 40% (n=118) tend to have high
tendency of extraversion personality.
Table 2 Concern about data security
In relation to IT literacy, information related to
overall information literacy, self-assessed technology
savviness and online activities were collected (see
Table 5). A 5-point Likert scale was developed to
measure the frequency of mobile usage on various
life aspects related to the youths: advanced
communication, entertainment, blogging, information
searching and other online activities ([35, 36]). Three
items were used to measure the knowledge and
literacy of information technology among youth in
relations to online journal or blogging, online sharing
or use material online for own artistic creation.
Higher composite score reflect higher level of
IT/information literacy. Based on the group median,
result showed that there were slightly more (56%,
n=188) young people who have a low level of
information literacy than those with a high level
(44%, n=148). Majority of the young people
perceived themselves to have a high level of
technology savviness. Almost two thirds of our
sample (61.4%, n=197) rated their technical skills
and general technology savviness as at least
intermediate or advanced with 35.5%
advanced/intermediate level and 25.9% advanced
level. A quarter of the sample (25.8%, n=99) rate
themselves at intermediate level and only a minority
(7.8%, n=25) perceived low or intermediate/low level
of technology savviness. More young people reported
‘rarely’ (19.2%, n=65) or ‘never’ (37.9%, n=128)
engaging in online shopping compared to those who
did engage in such activity (42.9%, n=145). It should
be noted that there were almost a quarter (23.1%,
n=78) who do online shopping using their mobile
phone on a ‘frequently’ or ‘all the time’ basis.
Similarly, there is a high percentage of young people
(44.7%, n=141) who use free wifi in public areas on a
regular basis (i.e. frequently or all the time) compared
to those who rarely or never (27%, n=85).
Table 3 Application access on mobile phone
Table 4 Privacy and security measures on mobile
phone
Password Security
Measures
N %
Mobile password
protected (n=321)
230 71.7
Sim-card password
protected (n=319)
127 39.8
Set password yourself
(n=308)
229 74.7
How often do you change
your password? (n=319)
Once after purchase 16 5.0
Frequently 31 9.7
Occasionally 67 21
4.2. Correlation Analysis
The following section presents inferential
statistics, that include comparative and correlational
analyses to further explore and examine the
distribution and relationship between the main
variables in the study.
We now present the results and analysis focusing
on the exploration of attitudes of young people
towards data security on mobile phones.
Here we were particularly interested in
investigating how the perceived risks of data security,
security measures and frequency of online activities
are related to ethnicity, gender and student status
(Table 6). Both Analysis of Variance (ANOVA)
(more than 2 groups) and Independent Sample t-test
(2 groups) were used to examine the group
differences across ethnic groups, gender and student
status. Result from comparative analyses indicated
that there were significant differences in the
perception on mobile phone data security among
young people across ethnic background and student
status. It was found that young people of Non-White
ethnic background tend to have higher awareness of
Security
of data
Risk of
using free
wifi
A virus
of Worm
attack
A wireless
attach
(Bluetooth
or wifi
)
Absolutely
unconcerned/
Somewhat
concerned
80
(24.5%)
114
(35.5%)
106
(32.2%)
103
(32.2%)
Neutral 85
(
26.5%
)
100
(
30.3%
)
63
(
19.7%
)
62
(
19.4%
)
Somewhat
concerned/
Absolutely
concerned
156
(48.6%)
107
(33.3%)
150
(47.1%)
155
(48.4%)
Total 321
(
100%
)
321
(
100%
)
319
(
100%
)
320
(
100%
)
Yes Some-
times
No Total
Allow
applications to
access info
38
(11.9%)
157
(49.1%)
125
(39.1%)
320
(100%)
Allow
applications to
access
contacts
39
(12.4%)
114
(36.2%)
162
(51.4%)
305
(100%)
4509
mobile phone data security than those of White ethnic
background (t=-.3.38, p<.001). Specifically, post-hoc
analysis showed that young people of Black and
Asian ethnic background reported greater awareness
of mobile phone data security than young people of
White ethnic background (F=5.06, p<.001).
Similarly, overseas students also demonstrated higher
level of awareness towards mobile phone data
security compared to Home/EU students (t=4.10,
p.<.001).
In terms of gender differences, young men were
found to be more likely to allow applications to
access their personal information and contact details
on phone and do online shopping than young women.
However, it should be noted that these differences
were only marginally significant, p<.10.
Table 8 presents results of the correlational
analysis between socio-demographic characteristics
with youth perception on mobile phone data security,
personality, IT/Information literacy and online
activities. Person Product Moment Correlation was
used to determine the magnitude and direction of the
relationship between these variables. It was found
that older students reported significantly greater
awareness of security threats on mobile phone than
younger students (r=19, p<.001). Young people of
White ethnicity background (r=-.20, p<.0001) and
those who are Home/EU students (r=.24, p<.0001)
tended to report lower level of concern on the
vulnerability of mobile phone security. Results in
Table 8 also showed that not only White (r=.13,
p<.05) and Home/EU students (r=-.12, p<.05) were
more likely to report a more extroversion personality,
they were also less information/IT literate (Ethnicity:
r=-.21, p<.0001; Student status: r=.22, p<.0001).
Surprisingly, females tend to score higher in
extroversion personality as compared to males in the
present study (r=-.17,p<.001).
Table 9 presents the result of the correlations
between perception on mobile phone data security,
personality, IT literacy and online activities among
young people. It was found that young people who
are more concerned about the threats on their mobile
phone security were more literate in information
technology (r=.15, p<.001), less likely to allow
applications to access their personal details (r=-.14,
p<.05) and more regular in using password security
measures on mobile phones (r=.14, p<.05). Besides,
young people who have higher awareness towards
mobile phone security threats are also less likely to
have an extrovert personality (r=-.12, p<.0001).
In addition, young people who are more
extroverted not only experienced higher tendency to
use free wifi in public area (r=.17, p<.001) but also
allow applications to access personal information
(r=.12,p<.05). Young people with extroverted
personality were also more IT literate (r=.14, p<.05)
and regularly use password as security measures on
mobile phone (r=.12, p<.05). Those who are more IT
literate tend to be more likely to use their mobile
phone for activities such as online shopping (r=.34,
p<.0001), free wifi in public areas (r=.14, p<.05) and
allow applications to access to information in their
mobile phones (r=.17, p<.001).
5. Conclusion
For young adults, the importance of mobile phones
as the device of choice coupled with continuous
network connectivity raises key issues of risk-taking
behaviours. The attitudes of young people towards
data/information security are particularly important.
Further, the gamut of communications styles and the
range of activities that can be performed on a phone
increases considerable risk arising from data security
and privacy concerns. Our research with students
from four UK universities has shown factors related
to IT literacy, data security measures and
online/application activities are correlated with
different demographic groups. Of note, are the
comparative analyses that indicate significant
differences on the risks associated with data security
with respect to ethnic groups, gender and student
status (Overseas versus Home/EU). The level of IT
literacy also determined the extent to which apps are
allowed to access data from the phone or the extent to
which the use of free public wifi is adopted. Another
key finding of this study is that young people’s
personality is also significantly related to their use of
mobile phone technology and perceptions of data
security.
We acknowledge limitations of the findings
reported here. Specifically, we accept that the young
people participating in this project are from the
tertiary education sector and hence generalisations to
the wider younger population should be treated with
caution. Further, sensitive data such as financial
personal data and how young people handle it on
mobile phones needs further research.
Given the move towards mobile devices, research
that explores behaviour of young people in their use
of mobile technology continues to increase in
importance. Thus, this study contributes current
findings on the use of smart phones in the context of
internet related activity and presents findings that
note significant differences towards information
security between different demographic groups.
These distinctions have potential marketing, technical
4510
and policy implications to those involved in the eco-
systems around mobile technology.
References
[1] Green, N., "Who's Watching Whom? Monitoring and
Accountability in Mobile Relations": Wireless World, Springer,
2002, pp. 32--45.
[2] Jones, O., Williams, M., and Fleuriot, C., ""A New Sense of
Place?" The Implications of Mobile Wearable Ict Devices for the
Geographies of Urban Childhood", Children\`s Geographies, 2003,
pp. 1--2.
[3] Carroll, J., Howard, S., Vetere, F., Peck, J., and Murphy, J.,
"Just What Do the Youth of Today Want? Technology
Appropriation by Young People", System Sciences, 2002. HICSS.
Proceedings of the 35th Annual Hawaii International Conference
on, 2002, pp. 1777--1785.
[4] Mitomo, H., Someya, H., and Sanbonmatsu, N., "Chopstick
Culture and Mobile Communication: How the University Students
in East Asia Utilize Mobile Phones---Empirical Evidence from the
Asian Metropolitan Mobile Survey", Tokyo: Waseda University,
2006,
[5] Kurkovsky, S., and Syta, E., "Digital Natives and Mobile
Phones: A Survey of Practices and Attitudes About Privacy and
Security", Technology and Society (ISTAS), 2010 IEEE
International Symposium on, 2010, pp. 441--449.
[6] Davis, F.D., "Perceived Usefulness, Perceived Ease of Use, and
User Acceptance of Information Technology", MIS quarterly,
1989, pp. 319--340.
[7] Kim, S., and Garrison, G., "Investigating Mobile Wireless
Technology Adoption: An Extension of the Technology
Acceptance Model", Information Systems Frontiers, 11(3), 2009,
pp. 323--333.
[8] Prensky, M., "Digital Natives, Digital Immigrants Part 2: Do
They Really Think Differently?", On the horizon, 9(6), 2001, pp.
1--6.
[9] Skog, B., "Mobiles and the Norwegian Teen: Identity, Gender
and Class", Perpetual contact: Mobile communication, private talk,
public performance, 2002, pp. 255.
[10] Oksman, V., and Turtiainen, J., "Mobile Communication as a
Social Stage Meanings of Mobile Communication in Everyday
Life among Teenagers in Finland", New Media \& Society, 6(3),
2004, pp. 319--339.
[11] Ling, R., "Mobile Communications Vis-À-Vis Teen
Emancipation, Peer Group Integration and Deviance": The inside
Text, Springer, 2005, pp. 175--193.
[12] Clarke, N.L., and Furnell, S.M., "Authentication of Users on
Mobile Telephones--a Survey of Attitudes and Practices",
Computers \& Security, 24(7), 2005, pp. 519--527.
[13] Edwards, L., and Brown, I., "Data Control and Social
Networking: Irreconcilable Ideas?", 2009,
[14] Agarwal, R., and Prasad, J., "A Conceptual and Operational
Definition of Personal Innovativeness in the Domain of
Information Technology", Information systems research, 9(2),
1998, pp. 204--215.
[15] Eysenck, H.J., and Eysenck, S.B.G., Epq (Eysenck
Personality Questionnaire), Educational and Industrial Testing
Service, 1975.
[16] Bianchi, A., and Phillips, J.G., "Psychological Predictors of
Problem Mobile Phone Use", CyberPsychology & Behavior, 8(1),
2005, pp. 39-51.
[17] Anastasi, A., and Urbina, S., Psychological Testing, Prentice
Hall Upper Saddle River, NJ, 1997.
[18] Butt, S., and Phillips, J.G., "Personality and Self Reported
Mobile Phone Use", Computers in Human Behavior, 24(2), 2008,
pp. 346-360.
[19] Huang, D.L., Rau, P.L.P., and Salvendy, G., "Perception of
Information Security", Behaviour \& Information Technology,
29(3), 2010, pp. 221--232.
[20] Breitinger, F., and Nickel, C., "User Survey on Phone
Security and Usage", in (Editor, 'ed.'^'eds.'): Book User Survey on
Phone Security and Usage, 2010, pp. 139-144.
[21] Kowalski, S., and Goldstein, M., "Consumers’ Awareness of,
Attitudes Towards and Adoption of Mobile Phone Security", in
(Editor, 'ed.'^'eds.'): Book Consumers’ Awareness of, Attitudes
Towards and Adoption of Mobile Phone Security, Citeseer, 2006
[22] Campbell, S.W., "A Cross-Cultural Comparison of
Perceptions and Uses of Mobile Telephony", New Media &
Society, 9(2), 2007, pp. 343-363.
[23] Green, N., "Outwardly Mobile: Young People and Mobile
Technologies", Machines that become us: The social context of
personal communication technology, 2003, pp. 201-217.
[24] Fortunati, L., "Italy: Stereotypes, True and False", Perpetual
contact: Mobile communication, private talk, public performance,
2002, pp. 42-62.
[25] Ling, R., The Mobile Connection: The Cell Phone's Impact on
Society, Morgan Kaufmann, 2004.
[26] Bennett, S., Maton, K., and Kervin, L., "The ‘Digital Natives’
Debate: A Critical Review of the Evidence", British journal of
educational technology, 39(5), 2008, pp. 775-786.
[27] Kennedy, G., Dalgarno, B., Gray, K., Judd, T., Waycott, J.,
Bennett, S., Maton, K., Krause, K.-L., Bishop, A., and Chang, R.,
"The Net Generation Are Not Big Users of Web 2.0 Technologies:
Preliminary Findings", ICT: Providing choices for learners and
learning. Proceedings ascilite Singapore, 2007, pp. 517-525.
[28] Kvavik, R.B., "Convenience, Communications, and Control:
How Students Use Technology", Educating the net generation,
1(2005, pp. 7.1-7.20.
[29] http://bit.ly/1dSqXN9, accessed 29 August 2013, 2013.
[30] Campbell, M.A., "The Impact of the Mobile Phone on Young
People's Social Life", 2005,
[31] Brandtzaed, P., "Childrens Use of Communications
Technologies", Mobile Media and Youth Conference,
Copenhagen, 2005,
[32] Valentine, G., and Holloway, S., "Online Dangers:
Geographies of Parents Fears for Childrens Safety in Cyberspace",
The Professional Geographer, 53(1), 2001, pp. 71--83.
[33] Rogers, E.M., and Shoemaker, F.F., "Communication of
Innovations; a Cross-Cultural Approach.", 1971,
[34] Madden, M., Lenhart, A., Cortesi, S., and Gasser, U., "Teens
and Mobile Apps Privacy", in (Editor, 'ed.'^'eds.'): Book Teens and
Mobile Apps Privacy, Pew Research Center, PewInternet.org,
2013
[35] Lenhart, A., Purcell, K., Smith, A., and Zickuhr, K., Social
Media \& Mobile Internet Use among Teens and Young Adults,
Pew internet \& American life project, Washington, DC, 2010.
[36] Pain, R., Grundy, S., Gill, S., Towner, E., Sparks, G., and
Hughes, K., ""So Long as I Take My Mobile": Mobile Phones,
Urban Life and Geographies of Young People's Safety",
International Journal of Urban and Regional Research, 29(4),
2005, pp. 814--830.
4511
Table 5 Factors influencing data/information security
Variable n (%) Mean (SD) Median Min Max
Personality (Extraversion) (n=297) 7.89 (3.22) 9.00 0 12
Low 179 (60.3)
High 118 (39.7)
Information & IT literacy measures
Information Literacy (n=336) 6.55 (3.11) 6.00 3 15
Low 188 (56.0)
High 148 (44.0)
Self-assessed ‘Tech Savviness’ (n=336) 3.77 (0.97) 4.00 1 5
Low 7 (2.2)
Intermediate/Low 18 (5.6)
Intermediate 99 (25.8)
Advanced/Intermediate 114 (35.5)
Advanced 83 (25.9)
Frequency of Online Shopping (n=336) 2.35 (1.33) 2.00 1 5
Never 128 (37.9)
Rarely 65 (19.2)
Occasionally 67 (19.8)
Frequently 52 (15.4)
All the time 26 (7.7)
Free wifi use at public places (n=336) 3.24 (1.26) 3.00 1 5
Never 38 (12.1)
Rarely 47 (14.9)
Occasionally 89 (23.2)
Frequently 81 (25.7)
All the time 60 (19.0)
Data security and Privacy
Perception of data security (n=311) 39.47 (8.05) 40.00 16 55
Low 166 (53.4)
High 145 (46.6)
Password security (n=306) 2.20 (1.34) 2.00 0 4
Low 159 (52.0)
High 147 (48.0)
Application Accessibility (n=315) 3.35 (1.20) 3.00 2 6
Low 170 (54.0)
High 145 (46.0)
4512
Table 6 Description of Data Security Measures across Ethnicity, Gender and Student Status
Perception on
Mobile Phone Data
Security
Password
security
measures
Applications
Accessibility
Frequency of
Online
Shopping
Usage of free
wifi at public
places
N Mean (SD) N Mean (SD) N Mean (SD) N Mean (SD) N Mean (SD)
Ethnicity
White British
(WB)
72 36.44 (6.95) 74 3.34 (1.41) 71 2.18 (1.41) 74 2.45 (1.37) 71 3.25 (1.23)
Other White
(OW)
63 39.52 (7.93) 62 3.27 (1.16) 62 2.16 (1.46) 63 2.17 (1.31) 63 3.21 (1.22)
Black (B) 40 42.00 (7.71) 39 3.15 (0.99) 36 1.67 (1.39) 40 2.63 (1.39) 41 2.97 (1.42)
Asian/Asian
British (AB)
75 40.97 (7.83) 76 3.35 (1.01) 75 2.34 (1.19) 77 2.30 (1.31) 76 3.30 (1.29)
Mixed (M) 20 41.85 (9.24) 21 3.67 (1.32) 21 2.57 (1.33) 21 2.24 (1.14) 21 3.71 (0.90)
Others (O) 9 39.88 (9.86) 9 3.00 (1.12) 9 2.13 (1.25) 9 2.67 (1.22) 9 3.67 (1.11)
F-value# 5.06**
WB<B,AC,
n.s. 2.14+
n.s. n.s.
White 129 38.16 (7.54) 12
8
2.17 (1.44) 130 3.31 (1.32) 13
1
2.33 (1.24) 12
8
3.24 (1.44)
Non-White 135 41.42 (8.14) 13
2
2.14 (1.31) 136 3.31 (1.08) 13
8
2.41 (1.30) 13
2
2.14 (1.31)
t-value -3.38*** n.s. n.s. n.s. n.s.
Gender
Male 134 39.67 (7.95) 13
0
214 (1.38) 134 3.46 (1.22) 13
7
2.51 (1.26) 13
6
3.33 (1.21)
Female 151 39.50 (8.18) 14
4
2.24 (1.35) 149 3.21 (1.15) 14
9
2.23 (1.39) 14
7
3.18 (1.30)
t-value n.s. n.s. 1.81+ 1.85+ n.s.
Student status
Overseas 67 43.01 (7.39) 67 2.06 (1.39) 68 3.47 (1.18) 70 2.39 (1.25) 69 3.34 (1.34)
Home/EU 213 38.51 (7.97) 20
7
2.23 (1.35) 215 3.28 (1.19) 21
6
2.36 (1.35) 21
4
3.21 (1.23)
t-value 4.10*** n.s. n.s. n.s. n.s.
Note. +p<.10 *p < .05. **p < .01. ***p < .001 # Mixed and Other ethnic groups were excluded for ANOVA due to
small sample size.
Table 7 Sample questions
Sample Questions
Information & IT literacy measures:
a) Do you use FREE WIFI in public places? (Yes, No)
b) How do you rate your technical skills and general ‘tech’ savviness? (Advanced, Intermediate, Low)
Password security and data privacy:
a) Is your mobile phone password protected? (Yes, No)
b) Is your simcard password protected? (Yes, No)
c) How often do you change your password? (once after purchase, frequently, occasionally, rarely, never)
d) Do you allow application to access your contact? (Yes, Sometimes, No)
e) Do you allow applications to access your personal information? (Yes, Sometimes, No)
Perception of data security:
a) In general, to what degree are you concerned about the risk of using any FREE WIFI in public places?
b) To what degree are you concerned about the security of data in your mobile phone being compromised by A virus or worm
somehow getting into your mobile phone?
The full research instrument is available from the authors (b.barn@mdx.ac.uk)
4513
Table 8 Correlational Analysis of Socio-demographic Characteristics with youth perception on mobile phone data
security, Personality IT Literacy and Online Activities
Socio-
Demographic
Characteristics
r-value
Perception
on Mobile
Phone
Data
Security
Extraversion
Personality
Frequency
of Online
Shopping
Usage of
free wifi at
public
places
Information
Literacy
Applications
Accessibility
Password
security
measures
1. Age (years) .19*** -.11+ .03 -.03 -.20 -.10 -.08
2. Gender
(1=Male,0=Fe
male)
.01 -.17** .11+ .06 .08 .11+ -.04
3. Ethnicity
(1=White,0=N
W)
-
.20***
.13* -.03 -.02 -.21*** .00 .01
4. Overseas
students
(1=Yes,0=No)
.24*** -.12* .01 .04 .22*** .07 -.05
5. Intact family
(1=Yes,0=No)
.07 -.01 -.03 .03 .08 -.03 -.01
6. Living away
from Home
(1,0)
-.01 .06 -.06 -.04 .00 .06 -.10+
7. Father
Education level
.00 .12+ -.13* -.12+ .05 .16* -.01
8. Mother
Education level
-.10 .07 -.08 .03 .03 .08 .04
Note. +p<.10 *p < .05. **p < .01. ***p < .001
Table 9 Correlational Analysis of youth perception on mobile phone data security, Personality, IT Literacy and
Online Activities
Variables
r-value
Perception
on Mobile
Phone Data
Security
Extraversion
Personality
Frequency of
Online
Shopping
Usage of
free wifi at
public
places
Information
Literacy
Applications
Accessibility
Password
security
measures
1. Perception on
Mobile Phone
Data Security
-
2. Extraversion
Personality
-.12* -
3. Frequency of
Online
Shopping
.07 .00 -
4. Usage of free
wifi at public
places
-.07 .17** -.11+ -
5. Information
Literacy
.15** .14* .34*** .14* -
6. Applications
Accessibility
-.14* .12* .05 .01 .17** -
7. Password
security
measures
.14* .12* .10+ .06 .13* .02 -
Note. +p<.10 *p < .05. **p < .01. ***p < .001
4514
... Many studies have explored how national culture has an effect on cyber security related activities [5]. National culture nests a subculture around cyber on the intentional and unintentional manner in which entities make use of cyber space, based on assumptions, beliefs, values, and knowledge of users in a digital environment [6]. As our focus is on CMAs at country level, we consider these macro-cultures to form the foundation of the fuzzy model optimisation that we perform in this research study. ...
Conference Paper
Full-text available
Different assessment models exist to measure a coun-try's cyber security maturity levels. These levels serve as a benchmark for indicating how well prepared a nation is against a cyber security attack and how resilient it would be in recovering from such an attack. However, results from these maturity assessments are either too general, overly complex, or resource intensive to apply and guide important national cyber security strategies and frameworks. To address this we propose a model to link national culture with a country's cyber security maturity through fuzzy logic mapping to ensure that a more uniform reflection of the cyber security maturity level within a country can be measured. In this paper, we present additional research towards optimising our model. The extended model incorporates input from two cyber security assessment models, and validates the refined output models on 11 countries to compare the maturity levels from the traditional assessment model with our optimised fuzzy model. Our results show that it is viable to reduce the resources required to conduct a national cyber security maturity assessment.
... The importance of mobile phones for young people as the device with a continuous network connectivity, raises key issues of risk-taking behaviours in the form of privacy concerns and lack of awareness towards data security implications associated with mobile phones. The research 'Young People and Smart Phones: An Empirical Study on Information Security' [69], which concerns students from four UK universities, has shown that there were significant differences in the perception on mobile phone data security among young people depending on different factors. Results from comparative analysis indicated that IT literacy is the variable that most influences the approach to mobile risk among young people. ...
Book
Full-text available
The problem of Social Engineering (SE) is evolving since few years at an incredible pace. What, till the end of the past century, was an advanced, but niche, way of attacking specific systems, is nowadays mainstream in cybercrime and terrorism. The complexity level of attacks that are actively exploiting the human element is incredibly high and often the exploitation of the human element is the enabler element for the following technological part1. However, also SE evolves and today we are talking of SE 2.0 vs old-school SE. The old-school SE is an adaptation of the ageless art of deception to the modern communication media (e.g., mainly phone and early use of email, beside physical intrusions), where the level of personal talent involved and effort required, limited this type of attacks to the capabilities of few famous attackers, who were concentrated on valuable targets. Hence, traditionally the Information Security considers the “human factor” a potential threat only in those systems requiring «SECURITY-IN-DEPTH», because for these situations any possible threat, also the less common one, is evaluated up to the innermost levels. The reason behind such evolution is the utter increasing relevance of the Targeted Attacks (TAs) as also reported by all nowadays attacks' statistics. TAs are the most popular and most widely used in today’s attack strategy, also for SMEs. TAs are a type of attack which takes advantages of a complex Human Attack Vector combined with a technological exploit mixed into a unique targeted and specialized ad-hoc attack which exploits (deceives) both the humans and the IT systems. Targeted Attacks are often confused with APTs (Advanced Persistent Threats), but even though they share the techniques, they do not have the same intent (TA are usually not driven by government agencies). Modern SE includes and extends the former SE concepts into a wider vision. Probably the cornerstone that splits between old-school and modern SE is the possibility to exploit the SE techniques on a larger scale, using automated attacks on a potentially large number of victims. The transition from old school to modern SE was triggered by the large amount of machine-readable data that is freely available today. This trend has been exponentially strengthened by the advent of Social Networks and the new social trends of information sharing. Another important aspect was also the involvement, in the planning of the attacks, of competences for never previously seen in the cybercrime world, required to better understand how to “exploit the humans”. Competences such as psychologists, marketing experts and in general all the human sciences are becoming requested by the Organized Crime Groups (OCG). The aim of this document is to present the evolution of modern social engineering and to discuss its relationship with modern cybercrime and cyberterrorism trends. The aim of the document is to be a funding document for the whole project, giving a clear and complete view of the Social Engineering influence on modern cybercrime tactics, technologies and trends.
... The model is too coarse [47], places too much responsibility on the user, uses no sand-boxing and an open market [43]. Applications also often make use of more permissions than explicitly disclosed to the user [7]. Android relies on developers to include encryption in their applications. ...
Conference Paper
Full-text available
Despite their familiarity with the digital, so-called 'digital natives' are not tech-savvy, particularly with respect to privacy and security. In this study we characterize this problem by looking at a cohort of South African students. We employ a web-based survey of 100 students, supplemented by in-depth interviews with 10 additional students. In both cases we inquired about, and observed knowledge of permissions, encryption and application installation practices. Our findings show that most students (80%) do not look for or understand permissions or encryption, and use location-based services unsafely. Based on these results we argue that digital natives lack the technical skills and understanding to properly engage with mobile privacy and security. We further argue that this generation has been so over-exposed to mobile requests that violate their privacy and security that they have become desensitized and their definition of privacy and security has changed. Lastly, we discuss the implications of our findings for higher education institutions, policy, and mobile application design.
... Disturbingly, survey results find that many people do not configure their phones to require any form of authentication (Clarke and Furnell 2005, ConsumerReports 2014, Jones and Heinrichs 2012. Moreover, the majority of people who do configure a password or PIN to access their phone report that they never change it (Barn et al. 2014). The trend to incorporate biometrics to initially logon to a mobile device (e.g., fingerprints or facial recognition) mitigates the risk that an unauthorized person can use a lost or stolen device. ...
Article
Full-text available
It is not enough to get information technology (IT) users to adopt a secure behavior. They must also continue to behave securely. Positive outcomes of secure behavior may encourage the continuance of that behavior, whereas negative outcomes may lead users to adopt less-secure behaviors. For example, in the context of authentication, login success rates may determine whether users continue to use a strong credential or switch to less secure behaviors (e.g., storing a credential or changing to a weaker, albeit easier to successfully enter, credential). Authentication is a particularly interesting security behavior for information systems researchers to study because it is affected by an IT artifact (the design of the user interface). Laptops and desktop computers use full-size physical keyboards. However, users are increasingly adopting mobile devices, which provide either miniature physical keypads or touchscreens for entering authentication credentials. The difference in interface design affects the ease of correctly entering authentication credentials. Thus, the move to use of mobile devices to access systems provides an opportunity to study the effects of the user interface on authentication behaviors. We extend existing process models of secure behaviors to explain what influences their (dis)continuance. We conduct a longitudinal field experiment to test our predictions and find that the user interface does affect login success rates. In turn, poor performance (login failures) leads to discontinuance of a secure behavior and the adoption of less-secure behaviors. In summary, we find that a process model reveals important insights about how the IT artifact leads people to (dis)continue secure behaviors.
Article
Password manager applications have the potential to alleviate password pain and improve password strength, yet they are not widely adopted. Password managers are dissimilar to other kinds of software tools, given that the leakage of the credentials they store could give a hacker access to all the individual's online accounts. Moreover, adoption requires a deliberate switch away from an existing (manual) password management routine. As such, traditional technology adoption models are unlikely to model password manager adoption accurately. In this paper, we propose and explain how we validated a theoretical model of smartphone password manager adoption. We commenced by carrying out exploratory interviews with 30 smartphone owners to identify factors that influence adoption. These were used to develop a model that reflects the password manager adoption process, building on migration theory. The proposed model, MIGRANT (MIGRation pAssword maNager adopTion), was validated and subsequently refined in a week-long study with 198 smartphone owners, combining self-report and observation to measure constructs. This study contributes to the information security behavioral literature by isolating the main factors that encourage or deter password manager adoption, and those that moor smartphone owners in their current practices, hindering switching. With this investigation, we introduce migration theory as a reference theory for future studies in the information security behavioral field.
Chapter
As the digital generations have grown up with high-tech gadgets and become avid users of mobile phones and apps, they are also exposed to increasing mobile security threats and vulnerability. In this paper the authors discuss the impact of recent mobile technology advancements on mobile threat environment and mobile security practices. They also conducted a survey to 262 college students to examine their mobile phone usage patterns, security concerns and practices. The results show that students use their mobile phone frequently for various productivity and entertainment purposes. They are generally aware of and concerned about mobile security, not only on losing the phone physically but also on data theft, web threat, and mobile malware. Students also practice security to some extend - most change PIN and passwords regularly, download their apps mostly from official app stores, and generally keep their OS and apps up-to-date. The authors also found significant correlations between mobile security practices and personal attributes, including major, gender, and technology aptitude.
Article
As the digital generations have grown up with high-tech gadgets and become avid users of mobile phones and apps, they are also exposed to increasing mobile security threats and vulnerability. In this paper the authors discuss the impact of recent mobile technology advancements on mobile threat environment and mobile security practices. They also conducted a survey to 262 college students to examine their mobile phone usage patterns, security concerns and practices. The results show that students use their mobile phone frequently for various productivity and entertainment purposes. They are generally aware of and concerned about mobile security, not only on losing the phone physically but also on data theft, web threat, and mobile malware. Students also practice security to some extend - most change PIN and passwords regularly, download their apps mostly from official app stores, and generally keep their OS and apps up-to-date. The authors also found significant correlations between mobile security practices and personal attributes, including major, gender, and technology aptitude.
Chapter
The rapid deployment of mobile devices and the development of mobile services and applications require to address the mobile information security from the human side. This study was aimed at identifying factors influencing people's perception of mobile information security, to investigate the impact of these factors and to facilitate related service design. A survey was conducted and analyzed with exploratory factor analysis. Five factors were identified, including perceived familiarity, perceived impact, perceived controllability, perceived awareness and perceived possibility. Thereinto, the impact of controllability, impact and familiarity on the adoption of mobile payment was investigated. Impact significantly affected the intention to use, but not the perceived security of payment systems. Control level significantly affected the intention to use and the perceived security. Familiarity was found to have an effect on neither the intention to use nor the perceived security. Related design implications for mobile payment systems were discussed.
Article
The rapid deployment of mobile devices and the development of mobile services and applications require to address the mobile information security from the human side. This study was aimed at identifying factors influencing people's perception of mobile information security, to investigate the impact of these factors and to facilitate related service design. A survey was conducted and analyzed with exploratory factor analysis. Five factors were identified, including perceived familiarity, perceived impact, perceived controllability, perceived awareness and perceived possibility. Thereinto, the impact of controllability, impact and familiarity on the adoption of mobile payment was investigated. Impact significantly affected the intention to use, but not the perceived security of payment systems. Control level significantly affected the intention to use and the perceived security. Familiarity was found to have an effect on neither the intention to use nor the perceived security. Related design implications for mobile payment systems were discussed.
Article
Full-text available
A study developed and validated new scales for perceived usefulness and perceived ease of use, which were hypothesized to be fundamental determinants of user acceptance. The definitions of the 2 variables were used to develop scale items that were pretested for content validity. The items were then tested for reliability and construct validity in 2 studies involving a total of 152 users and 4 application programs. After refining and streamlining the measures, the resulting 2 scales of 6 items each demonstrated reliabilities of .98 for usefulness and .94 for ease of use. The scales also exhibited high convergent, discriminant, and factorial validity. In both studies, usefulness had a greater correlation with usage behavior than did ease of use, though both were significantly correlated with current usage and future usage. Regression analyses suggest that perceived ease of use may actually be a casual antecedent to perceived usefulness, as opposed to a direct determinant of system usage.
Article
Full-text available
The spread of mobile communication among Finnish teenagers has been markedly rapid during the latter half of the 1990s. Young people have created and developed a communication culture that incorporates many special features, such as a rise in the use of text-based communication channels. Teenagers’ intersecting and selective use of communication channels has generated multimedial communication. From the theoretical standpoint provided by symbolic interactionism, we can ask whether communication through new media technologies generates new forms of social interaction. If this is the case, how could we describe and analyse these new forms of interaction? The media landscapes created by teenagers serve to articulate their personal space, as well as enabling their presentation of self and defining their relationships to others. This article is based on thematic interview material, and its purpose is to analyse the meanings and use contexts of mobile communication and other multimedial communication culture among Finnish youth.
Article
Full-text available
In this paper we describe a new research initiative, 'A New Sense of Place?', which involves the collaboration of private- and public-sector partners. Its purpose is to explore and develop the interface between children and new mobile 'wearable' computing and communication devices. The research team is particularly interested in how these new technologies might be applied to help children (re-)engage with urban spaces. In the paper we give a description of wearable computing devices; briefly set out some contexts of children's geographies into which they are emerging; and describe the rationale and objectives of the project. We then give an account of a two-day workshop in which 10 children were introduced to and enabled to experience, work with and respond to these new technologies. The research shows that children are capable of handling and exploiting these technologies and are able to conceptualise their incorporation into their everyday lives. Also, it reveals that the creation of 'virtual' digital landscapes, which these technologies allow, has the potential to represent adult-ordered spaces in more 'child-friendly' forms. Lastly, the programme opens up new questions of power, surveillance and childhood-technology relations.
Book
Has the cell phone forever changed the way people communicate? The mobile phone is used for "real time" coordination while on the run, adolescents use it to manage their freedom, and teens "text" to each other day and night. The mobile phone is more than a simple technical innovation or social fad, more than just an intrusion on polite society. This book, based on world-wide research involving tens of thousands of interviews and contextual observations, looks into the impact of the phone on our daily lives. The mobile phone has fundamentally affected our accessibility, safety and security, coordination of social and business activities, and use of public places. Based on research conducted in dozens of countries, this insightful and entertaining book examines the once unexpected interaction between humans and cell phones, and between humans, period. The compelling discussion and projections about the future of the telephone should give designers everywhere a more informed practice and process, and provide researchers with new ideas to last years.
Chapter
The spread of mobile communication, most obtrusively as cell phones but increasingly in other wireless devices, is affecting people's lives and relationships to a previously unthought-of extent. Mobile phones, which are fast becoming ubiquitous, affect either directly or indirectly every aspect of our personal and professional lives. They have transformed social practices and changed the way we do business, yet surprisingly little serious academic work has been done on them. This 2002 book, with contributions from the foremost researchers in the field, studies the impact of the mobile phone on contemporary society from a social scientific perspective. Providing a comprehensive overview of mobile phones and social interaction, it comprises an introduction covering the key issues, a series of unique national studies and a final section examining specific issues.