Academia.eduAcademia.edu

Outline

On the need for different security methods on mobile phones

2011

https://doi.org/10.1145/2037373.2037442

Abstract

Abstract Mobile phones are rapidly becoming small-size general purpose computers, so-called smartphones. However, applications and data stored on mobile phones are less protected from unauthorized access than on most desktop and mobile computers. This paper presents a survey on users' security needs, awareness and concerns in the context of mobile phones. It also evaluates acceptance and perceived protection of existing and novel authentication methods.

References (25)

  1. Ben-Asher, N., Ben-Oved, A., Meyer, J.: Preliminary survey results -project "Graded Security for Mobiles". Deutsche Telekom Laboratories 2009
  2. Botha, R., Furnell, S., and Clarke, N.: From desktop to mobile: Examining the security experience. Computers & Security, 28(3-4):130-137, 2009.
  3. Braz, C., and Robert, J.: Security and usability: the case of the user authentication methods. Proceedings of the 18th International Conference of the Association Francophone d'Interaction Homme-Machine, page 203. ACM, 2006.
  4. Clarke, N., and Furnell, S.: Authentication of users on mobile telephones -A survey of attitudes and practices. Computers & Security, 24(7):519-527, 2005.
  5. Clarke, N., and Furnell, S.: Advanced user authentication for mobile devices. Computers & Security, 26(2):109-119, 2007.
  6. Clarke, N., Furnell, S., Rodwell, P., and Reynolds P.: Acceptance of subscriber authentication methods for mobile telephony devices. Computers & Security, 21(3):220-228, 2002.
  7. Clarke, N.,Furnell, S., Reynolds P.: Biometric authentication for mobile devices. In: Proceedings of the 3rd Australian Information Warfare and Security Conference, Perth, Western Australia, 28-29 November 2002
  8. Dörflinger, T., Voth, A., Krämer, J.: "My Smartphone is a Safe!" The user's point of view regarding novel authentication methods and gradual security levels on smartphones. The International Conference on Security and Cryptography (SECRYPT) 2010, July 26-28, Athens, Greece
  9. Furnell, S., Clarke, N., and Karatzouni, S.: Beyond the pin: Enhancing user authentication for mobile devices. Computer Fraud & Security, 2008(8):12-17, 2008.
  10. IDC: IDC press release from 28 Jan 2010 at www.idc.com/getdoc.jsp?containerId= prUS22186410
  11. Imperva Application Defense Center: Consumer Password Worst Practices. Imperva 2010 at www.imperva.com/docs/WP_Consumer_ Password_Worst_Practices.pdf
  12. Jain, A.K., Flynn, P., Ross, A.A. (eds.): Handbook of Biometrics. Springer (2008)
  13. Karlson, A., Brush, A., and Schechter, S.: Can I borrow your phone?: Understanding concerns when sharing mobile phones. Proceedings of the 27thinternational conference on Human factors in computing systems, pages 1647-1650. ACM New York, NY, USA, 2009.
  14. Kowalski, S. and Goldstein, M.: Consumers' Awareness of, Attitudes Towards and Adoption of Mobile Phone Security. Human Factors in Telecommunication (HFT) 06, 2006.
  15. Leavitt, N.: Mobile phones: The next frontier for hackers. IEEE Computer, 38(4): 20-23, 2005.
  16. McAfee, I.: Mobile Security Report 2009. Technical report, McAfee, 2009.
  17. Richardson, R.: CSI computer crime and security survey. Computer Security Institute, 2009.
  18. Riley, S.: Password security: what users know and what they actually do. Usability News, 8(1), 2006.
  19. Samarati, P. and De Capitani di Vimercati, S.: Access control: Policies, models, and mechanisms. Lecture Notes in Computer Science, pages 137-196, 2001.
  20. Samuelson, W. and Zeckhauser, R.: Status quo bias in decision making. Journal of risk and uncertainty, 1(1):7-59, 1988.
  21. Shaw, K.: Data on PDAs mostly unprotected, survey finds. World Wide Web electronic publication, 2004.
  22. Sieger, H., Kirschnick, N., Möller, S.: Poster: User preferences for biometric authentication methods and graded security on mobile phones. Symposium on Usability, Privacy, and Security (SOUPS) 2010
  23. Siponen, M.: A conceptual foundation for organizational information security awareness. Information Management and Computer Security, 8(1):31-41, 2000.
  24. Tognazzini, B.: Design for Usability. Cranor, L.F., Garfinkel, S. (eds.): Security and Usability. Designing Secure Systems That People Can Use. O'Reilly (2005)
  25. Examined websites (as of early February 2011): Apple, Inc.: www.apple.com, LG Electronics, Inc.: www.lge.com, Motorola, Inc.: www.motorola.com, Nokia Corp.: www.nokia.com, Research in Motion Ltd.: www.rim.com, Samsung Electronics Co. Ltd.: www.samsumg.com, Sony Ericsson Mobile Communications AB: www.sonyericsson.com