Mobile Devices and Cyber Security - An Exploratory Study on User’s Response to Cyber Security Challenges

Kanthithasan Kauthamy, Noushin Ashrafi, Jean-Pierre Kuilboer

Abstract

In today’s increasingly connected, global, and fast-paced computing environment, sophisticated security threats are common occurrences and detrimental to users at home as well as in business. The first and most important step against computer security attacks is the awareness and understanding of the nature of the threats and their consequences. Although the users of mobile devices and laptops are often the target of security threats, many of them, specifically millennials, seem oblivious of such threats. A survey of college students reveals that despite all the hype about cybersecurity and its potential damages, the respondents are using their mobile devices without much apprehension or thoughts about threats, potential damages, and safeguarding against them. This study is on the premise that as the use of mobile devices is exponentially increasing among millennials, their laid back attitude and behaviour in response to cybersecurity is alarming and not to be overlooked. Simple solutions such as availability of useful information should be considered.

References

  1. Alcatel_Lucent, 2013, viewed 24 January 2017, http://www.tmcnet.com/tmc/whitepapers/documents/w hitepapers/2014/9861-kindsight-security-labsmalware-report-q4-2013.pdf
  2. Gangula, A., Ansari, S., & Gondhalekar, M. 2013, 'Survey on mobile computing security', In Modelling Symposium (EMS), European 2013 Nov 20, pp. 536- 542.
  3. Kaspersky Lab. 2012, viewed 24 January 2017, http://www.kaspersky.com/au/about/news/press/2012/ number-of-the-week-40-percent-of-modernsmartphones-owners-do-not-use-antivirus-software
  4. Thamsirarak, N., Seethongchuen, T. & Ratanaworabhan, P. 2015, 'A case for malware that make antivirus irrelevant', in 12th international conference on electrical engineering/electronics, computer, telecommunications and information technology (ecticon), pp. 1-6.
  5. Trend Micro Lab. 2012, Mobile Malware Surge from 30k to 175k, Q3. viewed 9 November 2014, http://www.trendmicro.com
  6. Vallina-Rodriguez, N., Shah, J., Finamore, A., Grunenberger, Y., Papagiannaki, K., Haddadi, H. & Crowcroft, J. 2012, 'Breaking for commercials: characterizing mobile advertising', in Proceedings of the 2012 ACM conference on Internet measurement conference, pp. 343-356.
  7. Wang, P., González, M., Menezes, R. & Barabási, A.L. 2013, 'Understanding the spread of malicious mobilephone programs and their damage potential', International Journal of Information Security, vol. 12, no. 5, pp. 383-392.
  8. Wang, Y., Streff, K. & Raman, S. 2012, 'Smartphone security challenges', Computer, vol. 45, no. 12, pp. 52- 58.
  9. Wash, R. 2010, 'Folk models of home computer security', In Proceedings of the Sixth Symposium on Usable Privacy and Security, Redmond, Washington, USA, p. 11. ACM.
Download


Paper Citation


in Harvard Style

Kauthamy K., Ashrafi N. and Kuilboer J. (2017). Mobile Devices and Cyber Security - An Exploratory Study on User’s Response to Cyber Security Challenges . In Proceedings of the 13th International Conference on Web Information Systems and Technologies - Volume 1: WEBIST, ISBN 978-989-758-246-2, pages 306-311. DOI: 10.5220/0006298803060311


in Bibtex Style

@conference{webist17,
author={Kanthithasan Kauthamy and Noushin Ashrafi and Jean-Pierre Kuilboer},
title={Mobile Devices and Cyber Security - An Exploratory Study on User’s Response to Cyber Security Challenges},
booktitle={Proceedings of the 13th International Conference on Web Information Systems and Technologies - Volume 1: WEBIST,},
year={2017},
pages={306-311},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0006298803060311},
isbn={978-989-758-246-2},
}


in EndNote Style

TY - CONF
JO - Proceedings of the 13th International Conference on Web Information Systems and Technologies - Volume 1: WEBIST,
TI - Mobile Devices and Cyber Security - An Exploratory Study on User’s Response to Cyber Security Challenges
SN - 978-989-758-246-2
AU - Kauthamy K.
AU - Ashrafi N.
AU - Kuilboer J.
PY - 2017
SP - 306
EP - 311
DO - 10.5220/0006298803060311