On the need for different security methods on mobile phones
2011
https://doi.org/10.1145/2037373.2037442Abstract
Abstract Mobile phones are rapidly becoming small-size general purpose computers, so-called smartphones. However, applications and data stored on mobile phones are less protected from unauthorized access than on most desktop and mobile computers. This paper presents a survey on users' security needs, awareness and concerns in the context of mobile phones. It also evaluates acceptance and perceived protection of existing and novel authentication methods.
References (25)
- Ben-Asher, N., Ben-Oved, A., Meyer, J.: Preliminary survey results -project "Graded Security for Mobiles". Deutsche Telekom Laboratories 2009
- Botha, R., Furnell, S., and Clarke, N.: From desktop to mobile: Examining the security experience. Computers & Security, 28(3-4):130-137, 2009.
- Braz, C., and Robert, J.: Security and usability: the case of the user authentication methods. Proceedings of the 18th International Conference of the Association Francophone d'Interaction Homme-Machine, page 203. ACM, 2006.
- Clarke, N., and Furnell, S.: Authentication of users on mobile telephones -A survey of attitudes and practices. Computers & Security, 24(7):519-527, 2005.
- Clarke, N., and Furnell, S.: Advanced user authentication for mobile devices. Computers & Security, 26(2):109-119, 2007.
- Clarke, N., Furnell, S., Rodwell, P., and Reynolds P.: Acceptance of subscriber authentication methods for mobile telephony devices. Computers & Security, 21(3):220-228, 2002.
- Clarke, N.,Furnell, S., Reynolds P.: Biometric authentication for mobile devices. In: Proceedings of the 3rd Australian Information Warfare and Security Conference, Perth, Western Australia, 28-29 November 2002
- Dörflinger, T., Voth, A., Krämer, J.: "My Smartphone is a Safe!" The user's point of view regarding novel authentication methods and gradual security levels on smartphones. The International Conference on Security and Cryptography (SECRYPT) 2010, July 26-28, Athens, Greece
- Furnell, S., Clarke, N., and Karatzouni, S.: Beyond the pin: Enhancing user authentication for mobile devices. Computer Fraud & Security, 2008(8):12-17, 2008.
- IDC: IDC press release from 28 Jan 2010 at www.idc.com/getdoc.jsp?containerId= prUS22186410
- Imperva Application Defense Center: Consumer Password Worst Practices. Imperva 2010 at www.imperva.com/docs/WP_Consumer_ Password_Worst_Practices.pdf
- Jain, A.K., Flynn, P., Ross, A.A. (eds.): Handbook of Biometrics. Springer (2008)
- Karlson, A., Brush, A., and Schechter, S.: Can I borrow your phone?: Understanding concerns when sharing mobile phones. Proceedings of the 27thinternational conference on Human factors in computing systems, pages 1647-1650. ACM New York, NY, USA, 2009.
- Kowalski, S. and Goldstein, M.: Consumers' Awareness of, Attitudes Towards and Adoption of Mobile Phone Security. Human Factors in Telecommunication (HFT) 06, 2006.
- Leavitt, N.: Mobile phones: The next frontier for hackers. IEEE Computer, 38(4): 20-23, 2005.
- McAfee, I.: Mobile Security Report 2009. Technical report, McAfee, 2009.
- Richardson, R.: CSI computer crime and security survey. Computer Security Institute, 2009.
- Riley, S.: Password security: what users know and what they actually do. Usability News, 8(1), 2006.
- Samarati, P. and De Capitani di Vimercati, S.: Access control: Policies, models, and mechanisms. Lecture Notes in Computer Science, pages 137-196, 2001.
- Samuelson, W. and Zeckhauser, R.: Status quo bias in decision making. Journal of risk and uncertainty, 1(1):7-59, 1988.
- Shaw, K.: Data on PDAs mostly unprotected, survey finds. World Wide Web electronic publication, 2004.
- Sieger, H., Kirschnick, N., Möller, S.: Poster: User preferences for biometric authentication methods and graded security on mobile phones. Symposium on Usability, Privacy, and Security (SOUPS) 2010
- Siponen, M.: A conceptual foundation for organizational information security awareness. Information Management and Computer Security, 8(1):31-41, 2000.
- Tognazzini, B.: Design for Usability. Cranor, L.F., Garfinkel, S. (eds.): Security and Usability. Designing Secure Systems That People Can Use. O'Reilly (2005)
- Examined websites (as of early February 2011): Apple, Inc.: www.apple.com, LG Electronics, Inc.: www.lge.com, Motorola, Inc.: www.motorola.com, Nokia Corp.: www.nokia.com, Research in Motion Ltd.: www.rim.com, Samsung Electronics Co. Ltd.: www.samsumg.com, Sony Ericsson Mobile Communications AB: www.sonyericsson.com