13 research outputs found

    User Reaction Towards End User License Agreements on Android Smartphones

    Get PDF
    Smartphones are increasingly recognized as the most popular computing platform, forming an integral part of the way users interact with the online world. Accompanied with the advent of user-installed content, End User License Agreements have surfaced mirroring issues previously arising on more traditional platforms. This survey conducted in Perth, Western Australia looked at user behavior when viewing and accepting EULAs on smartphone devices. The results show that a majority of users do not read such agreements citing issues of readability and length

    Are You Annoyed? The Effects of Mobile Device User Interface and Intrusiveness of Security Notifications on User Security Perceptions

    Get PDF
    Research on the behavioral-based security of information systems within organizations and for personal use has been common over the last decade, however little is known regarding how individuals perceive the security of their mobile devices. This study seeks to explore how the security notifications within a mobile application environment alter adoption and security-related beliefs concerning their device. We proposed a theoretical model based on the technology adoption and psychological theories, and conducted a set of controlled experiments with 351 subjects in six US universities. A structural equation modeling technique was utilized to examine the overall research model. The data analysis results demonstrate that the majority of our proposed hypotheses were significant. We find that disruptive mobile security notifications cause user irritation, which negatively impacts user perception about mobile security. Mobile device user interface also has compounding effects on users’ perceived usefulness and security with mobile devices

    User perceptions of end user license agreements in the smartphone environment

    Get PDF
    With the increasing usage of smartphones as a computing platform has come alongside the movement of End User License Agreements to such platforms. The smartphone platform brings new issues to these agreements especially with the advent of app stores, which allow access to a large consumer base to small or unknown developers. This survey conducted in Perth, Western Australia looked at user perceptions of EULAs on smartphone devices. The results show that a majority of users do not read such agreements citing issues of readability and length. Even amongst those that do read the agreements there is a majority feeling that such agreements will never be used against them

    User perceptions of end user license agreements in the smartphone environment

    Get PDF
    With the increasing usage of smartphones as a computing platform has come alongside the movement of End User License Agreements to such platforms. The smartphone platform brings new issues to these agreements especially with the advent of app stores, which allow access to a large consumer base to small or unknown developers. This survey conducted in Perth, Western Australia looked at user perceptions of EULAs on smartphone devices. The results show that a majority of users do not read such agreements citing issues of readability and length. Even amongst those that do read the agreements there is a majority feeling that such agreements will never be used against them

    A new architecture and energy efficient keyword search in cloud

    Get PDF
    Normally with limited bandwidth capacity and limited battery life, these issues acquaint substantial overhead with registering and correspondence just as a higher power utilization for cell phone clients, which makes the encrypted search over mobile cloud very testing. In this paper, we propose TEES (Traffic and Energy saving Encrypted Search), a data transfer capacity and vitality effective encoded search design over mobile cloud. The proposed design offloads the calculation from cell phones to the cloud, and we further improve the correspondence between the versatile customers and the cloud. It is exhibited that the data security does not corrupt when the execution upgrade strategies are connected

    Conditional resource management for mobile devices

    Get PDF
    Mobile devices, such as smartphones and tablets, are becoming more popular everyday. This new devices class is constantly evolving on what concerns computing capabilities, allowing users to switch from larger computers to smaller mobile devices in several cases. Everyday new apps for these devices are developed and published in software repositories, enabling users to quickly install and benefit from new software. In order to deal with the multiple resource requests from different applications running in parallel, the operating system’s resource management design plays a key role. Most resource managers available to mobile phones are designed to maximize the performance of the system as a whole, not always taking into account the characteristics of the processes requiring resources in the application layer. This type of strategy can lead to cases where some applications experience longer latencies than desired while accessing resources, compromising the Quality of Service or system security. This work aims to offer a new resource management model for mobile devices, allowing the creation of rules that can prioritize the resource allocation for specific applications according to their needs. Also it implemented a proof of concept prototype version of this model, using the Android platform, confirming its viability.Dispositivos móveis, como os tablets e smartphones, ficam mais populares a cada dia. Esta nova classe de dispositivos está evoluindo constantemente em suas capacidades computacionais, permitindo os usuários trocarem computadores maiores por estes dispositivos móveis menores. Diariamente novas aplicações para estes dispositivos são desenvolvidas e publicadas em repositórios de software, possibilitando que os usuários instalem e se beneficiem de novos aplicativos rapidamente. Para gerenciar múltiplas requisições de recursos de diferentes aplicações rodando em paralelo, o design de gestão de recursos do sistema operacional desempenha um papel chave. A vasta maioria dos gerentes de recursos disponíveis nos dispositivos móveis são projetados para maximizar o desempenho do sistema como um todo, nem sempre levando em consideração as características dos processos solicitando recursos na camada de aplicação. Este tipo de estratégia pode levar a casos onde algumas aplicações experimentem tempos de latência mais longos que os desejados durante os acessos aos recursos, comprometendo a Qualidade de Serviço ou a segurança do sistema. Este trabalho tem por objetivo oferecer um novo modelo de gerência de recursos para dispositivos móveis, permitindo a criação de regras que priorizem a alocação de recursos para aplicações específicas de acordo com suas necessidades. Além disso foi implementado um prototótipo como prova de conceito deste modelo, usando a plataforma Android, para confirmando a viabilidade do mesmo

    Sleeping Android: Exploit Through Dormant Permission Requests

    Get PDF

    Empirical Assessment of Mobile Device Users’ Information Security Behavior towards Data Breach: Leveraging Protection Motivation Theory

    Get PDF
    User information security behavior has been an area of growing demand in information systems (IS) research. Unfortunately, most of the previous research done in user information security behavior have been in broad contexts, therefore creating a gap in the literature of similar research that focuses on specific emerging technologies and trends. With the growing reliance on mobile devices to increase the flexibility, speed and efficiency in how we work, communicate, shop, seek information and entertain ourselves, it is obvious that these devices have become data warehouses and platform for data in transit. This study was an empirical and quantitative study that gathered data leveraging a web-survey. Prior to conducting the survey for the main data collection, a Delphi study and pilot study were conducted. Convenience sampling was the category of nonprobability sampling design used to gather data. The 7-Point Likert Scale was used on all survey items. Pre-analysis data screening was conducted prior to data analysis. The Partial Least Square Structural Equation Modeling (PLS-SEM) was used to analyze the data gathered from a total of 390 responses received. The results of this study showed that perceived threat severity has a negative effect on protection motivation, while perceived threat susceptibility has a positive effect on protection motivation. Contrarily, the results from this study did not show that perceived response cost influences protection motivation. Response efficacy and mobile self-efficacy had a significant positive influence on protection motivation. Mobile device security usage showed to be significantly influenced positively by protection motivation. This study brings additional insight and theoretical implications to the existing literature. The findings reveal the PMT’s capacity to predict user behavior based on threat and coping appraisals within the context of mobile device security usage. Additionally, the extension of the PMT for the research model of this study implies that mobile devices users also can take recommended responses to protect their devices from security threats

    Conservation of Limited Resources: Design Principles for Security and Usability on Mobile Devices

    Get PDF
    Mobile devices have evolved from an accessory to the primary computing device for an increasing portion of the general population. Not only is mobile the primary device, consumers on average have multiple Internet-connected devices. The trend towards mobile has resulted in a shift to “mobile-first” strategies for delivering information and services in business organizations, universities, and government agencies. Though principles for good security design exist, those principles were formulated based upon the traditional workstation configuration instead of the mobile platform. Security design needs to follow the shift to a “mobile-first” emphasis to ensure the usability of the security interface. The mobile platform has constraints on resources that can adversely impact the usability of security. This research sought to identify design principles for usable security for mobile devices that address the constraints of the mobile platform. Security and usability have been seen as mutually exclusive. To accurately identify design principles, the relationship between principles for good security design and usability design must be understood. The constraints for the mobile environment must also be identified, and then evaluated for their impact on the interaction of a consumer with a security interface. To understand how the application of the proposed mobile security design principles is perceived by users, an artifact was built to instantiate the principles. Through a series of guided interactions, the importance of proposed design principles was measured in a simulation, in human-computer interaction, and in user perception. The measures showed a resounding difference between the usability of the same security design delivered on mobile vs. workstation platform. It also reveals that acknowledging the constraints of an environment and compensating for the constraints yields mobile security that is both usable and secure. Finally, the hidden cost of security design choices that distract the user from the surrounding environment were examined from both the security perspective and public safety perspective
    corecore