13,189 research outputs found

    Security and privacy of Single-Sign-On (SSO) in mobile environment: Students' experiences and perceptions

    Get PDF
    The number of password-protected Internet-based applications is increasing significantly compared to a decade ago.Many Internet applications require users to subscribe to their services and authenticate themselves through the use of login credentials.The number of such applications is increasing exponentially.Consequently, it causes an increase in the number of login credentials that users have to manage for both Internet and mobile environments.Due to the limitation in human memory, users usually forget their credentials (i.e., user names/IDs and passwords) and they tend to write down the passwords or replicate single password for many different applications. This practice could expose users to variety of security threats and attacks.A recent technological development on user authentication has introduced single-sign-on (SSO) that intends to help users with their credentials management.This research aims to investigate password management and SSO for accessing Internet applications especially through the use of mobile devices.The research was carried out in two phases: (i) a focus group study and (ii) survey.The researchers interviewed 11 students from School of Computing (SOC), Universiti Utara Malaysia (UUM).The results of the study found that the students did not practice proper password management. Further, it suggested that SSO may not be the immediate solution to improve the studentsā€™ password management.A behavioral study was conducted on 250 students from Universiti Utara Malaysia to understand how they managed their login credentials while accessing the Internet via their mobile devices, and their perceptions and awareness towards SSO.The results suggested that students practiced poor login credential management, however, the students are concerned about the security and privacy of their credentials.Security and privacy in mobile environment are important and need to be addressed through the use of technology and policy.The findings of this research imply system developers and policy makers on the aspect of usersā€™ security and privacy.The findings are also useful for the purpose of training and educating students on the importance of security and privacy in mobile environment

    Considerations Regarding the Security and Protection of E-Banking Services Consumersā€™ Interests

    Get PDF
    A significant number of breaches in the security of electronic banking (e-Banking) system is reported each year, drawing attention to the need to protect and inform customers about the risk of exposure to malicious actions initiated by cyber-criminals. Financial institutions and consumers recognize the fact that attacks and financial frauds are becoming more complex and are perpetrated by a different class of criminal. This class is increasingly sophisticated and uses technology as part of their strategy. Furthermore, the specialists forecast that the current global recession is likely to increase the frequency of internal fraud and security breaches. The present research tries: (1) to analyze the potential dangers threatening the security of e- Banking services through a comprehensive investigation of the relevant literature; (2) to identify the tools and methods that can ensure the consumersā€™ protection in E-Banking, (3) to present the results of a pilot study regarding the Romanian consumer perception on the protection and security related to E-Banking servicesE-Banking services, security, consumer protection, cyber-attack

    Smart technology for healthcare: Exploring the antecedents of adoption intention of healthcare wearable technology

    Get PDF
    Ā© The Author(s), 2019. Technological advancement and personalized health information has led to an increase in people using and responding to wearable technology in the last decade. These changes are often perceived to be beneficial, providing greater information and insights about health for users, organizations and healthcare and government. However, to date, understanding the antecedents of its adoption is limited. Seeking to address this gap, this cross-sectional study examined what factors influence usersā€™ adoption intention of healthcare wearable technology. We used self-administrated online survey to explore adoption intentions of healthcare wearable devices in 171 adults residing in Hong Kong. We analyzed the data by Partial least squares ā€“ structural equation modelling (PLS-SEM). The results reveal that perceived convenience and perceived irreplaceability are key predictors of perceived useful ness, which in turn strengthens usersā€™ adoption intention. Additionally, the results also reveal that health belief is one of the key predictors of adoption intention. This paper contributes to the extant literature by providing understanding of how to strengthen usersā€™ intention to adopt healthcare wearable technology. This includes the strengthening of perceived convenience and perceived irreplaceability to enhance the perceived usefulness, incorporating the extensive communication in the area of healthcare messages, which is useful in strengthening consumersā€™ adoption intention in healthcare wearable technology

    The factors that affect consumers intention to adopt near field communication mobile payment in supermarkets

    Get PDF
    The emergence of mobile technologies has changed the consumerā€™s life in many ways, especially the way they perform payment. This thesis examines the core drivers of using Near Field Communication (NFC) mobile payment in the supermarket industry from the consumerā€™s perspective. Based on the Technology Acceptance Model (TAM) and Innovation Diffusion Theory (IDT), the author developed a sevenfactor model to reveal the determinants of consumersā€™ intention to use Near Field Communication (NFC) mobile payment. Relative advantage, speed of transaction, compatibility with consumersā€™ lifestyles, security and awareness were added to the two-factor TAM model (usefulness and ease of use). Author evaluated the proposed model empirically, applying survey data gathered from supermarket consumers respect to their perceptions on Near Field Communication (NFC) mobile payment. Six significant factors found in this research can serve as guideline to encourage consumer adoption of Near Field Communication (NFC) mobile payment in supermarkets. Among which most of the respondents reported that relative advantage was not their primary reason in their decision to adopt the system. More over ease of use was significantly influenced by awareness of consumers and perceived usefulness influenced by speed of transaction which can be best explained by the fact that consumers would find the system useful if it provides them means to avoid long checkout lanes. Based on the findings of this research, marketing of new technologies must focus on creating awareness and gaining consumers trust to enable consumers to be easily familiarized with the Near Field Communication (NFC) mobile payment system

    The influence of user mobility in mobile virus propagation: An enterprise mobile security perspective

    Get PDF
    In this paper, the authors review the usage of mobile devices in the enterprise and also the major impact from the infected mobile devices.Then the authors highlight the virus threat to enterprise mobile security and how critical the problems are.The authors then discuss the mobile virus infection dynamics which are the Bluetooth infections, mobile emails infections and mobile internet infections which are the threats to the enterprise mobile security. Then the authors discuss on the influences of user mobility issue in spreading mobile viruses before concluded this article

    Citizensā€™ Perception About M-Government Services: Results from an Exploratory Survey

    Get PDF
    The development of mobile technology is facilitating the transformation in a way that governments deliver their services. Mobile government is one area that has received very little research, but it can have a tremendous impact on the way citizens engage with their government. This research analyses the data gathered from 81 respondents through online survey on the various aspects of mobile government and collects their views on some of the key questions related to the use of mobile government. The findings showed that although citizens are aware of the possibilities they hardly used mobile devices as a direct communication channel with government. Most users tend to use social media platforms and social media is used as an intermediary between government and citizens. The findings of this research also indicated that although the users are well aware of m-government services and own smartphones, only a handful of them use their mobiles for accessing government services

    BYOD Security Policy Compliance Framework

    Get PDF
    Bring Your Own Device (BYOD) is an environment that allows employees to use their own personal device to access organisationā€™s resources to perform their work, but it has raised some security concerns as with BYOD, organisations face bigger challenges to safeguard their information assets. Compliance with ISP is a key factor in reducing organisationā€™s information security risks, as such, understanding employeesā€™ compliance behaviour and other relevant factors that influence compliance with ISP is crucial. Hence, this study aims to explore this phenomenon by investigating the factors influencing employees in complying with BYOD Information Security Policy (ISP) in Malaysian public sector. A mixed method study on five (5) ministries in the public sector is proposed for the study. The understanding of these factors would assist in systematically developing a BYOD compliance framework for the public sector. This is critical as this trend is here to stay or even expand rapidly as employees carry more than one device to the workplace. The proposed framework will help improve ISP compliance to ensure organisational information assets are well protecte

    Disposition to trust, interpersonal trust and institutional trust of mobile banking in Malaysia

    Get PDF
    Mobile banking refers to the use of smart phones or other mobile devices to perform tasks online banking from your home computer, such as monitoring the account balances, transfer of funds between accounts, pay bills and prepaid top-up. Mobile banking is a new strategy for the bank to enhance their latest technology in a new dynamic marketing environment.The low penetration of mobile banking in Malaysia, especially in terms of adoption patterns is becoming the research interest, especially when compared to the total number of cellular telephone subscriptions. The penetration rate of mobile banking in Malaysia is still in the minority.One of the issues identified by a few researchers is the perception of trust. This article will discuss along the trust issue and its constituents and then after the intention to use of mobile banking services. The bank should enhance their strategy to improve and develop new strategy in order to gain more utilization and adoption on intention to use. This article attempts to discuss on the element of trust to benefit the service provider in Malaysia
    • ā€¦
    corecore