Always Connected, but are Smart Mobile Users Getting More Security Savvy? A Survey of Smart Mobile Device Users
Imgraben J, Engelbrecht A and Choo K-K R. Always Connected, but are Smart Mobile Users Getting More Security Savvy? A Survey of Smart Mobile Device Users. Behaviour & Information Technology, Forthcoming
37 Pages Posted: 10 Jun 2014
Date Written: June 10, 2014
Abstract
Smart mobile devices are a potential attack vector for cyber criminal activities. 250 smart mobile device owners from the University of South Australia (UniSA) were surveyed. Not surprisingly, it was found that smart mobile device users in the survey generally underestimated the value that their collective identities have to criminals and how these can be sold. For example, participants who reported jail-breaking/rooting their devices were also more likely to exhibit risky behaviour (e.g. downloading and installing applications from unknown providers), and the participants generally had no idea of the value of their collective identities to criminals which can be sold to the highest bidder. In general, the participants did not understand the risks and may not have perceived cyber crime to be a real threat. Findings from the survey and the escalating complexities of the end-user mobile and online environment underscore the need for regular ongoing training programs for basic online security and the promotion of a culture of security among smart mobile device users. For example, targeted education and awareness programs could be developed to inform or educate smart mobile device users and correct misconceptions or myths in order to bring about changes in attitudes and usage behaviour (e.g. not taking preventative measures such as strong passwords to protect their devices). Such initiatives would enable all end users (including senior University management who use such devices to access privileged corporate data and accounts) to maintain current knowledge of the latest cyber crime activities and the best cyber security protection measures available.
Keywords: Cyber crime, Smart mobile devices, Security survey, Mobile security, Phishing, Malware, Unauthorised access
JEL Classification: C88, C89, K42, K49
Suggested Citation: Suggested Citation
Do you have a job opening that you would like to promote on SSRN?
