“…Infrastructure trust emphasizes the trust people have in a channel used to access the internet located primarily through connections at home, work, public Wi-Fi and/or their mobile network provider (Lee et al , 2016; Mahadevan and Kaleta, 2018). To build a person’s trust, an internet channel should have all the functionality to overcome issues specific to its technology infrastructure and environment.…”
Section: Hypotheses Developmentmentioning
confidence: 99%
“…The internet is everywhere and accessible primarily from four channels, home, work, public Wi-Fi and cellular data (mobile networks) (Lee et al , 2016; Mahadevan and Kaleta, 2018). Access to the internet has been increasing at a remarkable pace with almost 110 million US households having fixed broadband internet access in 2017, up from approximately 80 million in 2009 (Statista, 2018c).…”
Purpose
Research of people’s perceptions of trust, privacy and risk on the internet has generally neglected the impact of the variety of channels used to access the internet. People primarily access the internet using internet channels at home, work, public Wi-Fi (hotspots) or through their mobile data network. The technology infrastructure of each of these channels combined with the vulnerabilities of the environment may form different perceptions, as it relates to trust, privacy and risk. The purpose of this study is to understand how people perceive the home and public Wi-Fi channel from a trust, privacy and risk perspective.
Design/methodology/approach
Adapting existing trust, privacy and risk scales, the authors conducted a survey of people’s perceptions, as it relates to home and public Wi-Fi internet channels.
Findings
The results of this study suggest significant differences in people’s perception of trust and risk depending on an internet channel. However, with regard to privacy, the results of this study provide non-conclusive, yet intriguing, outcomes motivating the need for future studies.
Originality/value
To the best of the authors’ knowledge, this is the first study that parses out people’s perceptions of trust, privacy and risk, as it pertains to specific internet channels. The authors expect future research to benefit from their findings of how different channel perceptions influence people’s online activities.
“…Infrastructure trust emphasizes the trust people have in a channel used to access the internet located primarily through connections at home, work, public Wi-Fi and/or their mobile network provider (Lee et al , 2016; Mahadevan and Kaleta, 2018). To build a person’s trust, an internet channel should have all the functionality to overcome issues specific to its technology infrastructure and environment.…”
Section: Hypotheses Developmentmentioning
confidence: 99%
“…The internet is everywhere and accessible primarily from four channels, home, work, public Wi-Fi and cellular data (mobile networks) (Lee et al , 2016; Mahadevan and Kaleta, 2018). Access to the internet has been increasing at a remarkable pace with almost 110 million US households having fixed broadband internet access in 2017, up from approximately 80 million in 2009 (Statista, 2018c).…”
Purpose
Research of people’s perceptions of trust, privacy and risk on the internet has generally neglected the impact of the variety of channels used to access the internet. People primarily access the internet using internet channels at home, work, public Wi-Fi (hotspots) or through their mobile data network. The technology infrastructure of each of these channels combined with the vulnerabilities of the environment may form different perceptions, as it relates to trust, privacy and risk. The purpose of this study is to understand how people perceive the home and public Wi-Fi channel from a trust, privacy and risk perspective.
Design/methodology/approach
Adapting existing trust, privacy and risk scales, the authors conducted a survey of people’s perceptions, as it relates to home and public Wi-Fi internet channels.
Findings
The results of this study suggest significant differences in people’s perception of trust and risk depending on an internet channel. However, with regard to privacy, the results of this study provide non-conclusive, yet intriguing, outcomes motivating the need for future studies.
Originality/value
To the best of the authors’ knowledge, this is the first study that parses out people’s perceptions of trust, privacy and risk, as it pertains to specific internet channels. The authors expect future research to benefit from their findings of how different channel perceptions influence people’s online activities.
“…Users possibly prefer to conserve a data quota or not enough data volume is left at the moment they need to access geospatial information. Lastly, although ever-growing Wi-Fi hotspots are deployed [21], looking for openly accessible ones is still no easy task, even in metropolitan areas [22]. Most discoverable access points are password-protected, and some enforce an authentication or registration via portals.…”
Geospatial information is gaining immense interest and importance as we enter the era of highly developed transportation and communication. Despite the proliferation of cellular network and WiFi, on some occasions, users still face barriers to accessing geospatial data. In this paper, we design and implement a distributed prototype system with a delay/disruption tolerant network (DTN), named Geo-DMP, for cooperatively and opportunistically sharing and exchanging named geospatial contents in a device-to-device fashion. First of all, we construct a lightweight “content agent” module to bridge the gap between the application layer and the underlying DTN protocol stack. Afterwards, to profile the mobility history of users in practical geospatial environments, we present a map segmentation scheme based on road network and administrative subdivision information. Subsequently, we associate the regional movement history information with the content retrieval process to devise a hierarchical and region-oriented DTN routing scheme for both requests and responses. Finally, we conduct extensive experiments with real-world trajectories and complete implementations on the emulation platform composed of virtual machines. The experiments corroborate that Geo-DMP has the capability of successfully retrieving geospatial contents for users for most of the time under mobile circumstances with episodic connectivity. Moreover, en-route caches can be efficiently exploited to provision contents from multiple sources with less network resource consumption and shorter user-perceived latencies.
“…Mobile devices are also preferred for usage in education (Joyce-Gibbons et al, 2018;Suryasa et al, 2020) and for communication and e-commerce (Einav et al, 2014) due to the information they store (Bitton et al, 2018) and their ease of use, portability, and reliable functions. In addition, most mobile phone users opt for wireless networks to access the Internet (Mahadevan & Kaleta, 2018). As a result, the use of wireless networks is exponentially growing (Cisco, 2020).…”
mentioning
confidence: 99%
“…One possible attack on wireless communications is the spoofing attack, sometimes referred to as KARMA (Jindal et al, 2014), rogue access point (RAP), evil twin attack (ETA) (Rech, 2012), or network spoofing attack (Mahadevan & Kaleta, 2018). Spoofing attacks on the internet work in an environment where information is transmitted between network users who are identified by Internet addresses.…”
Network spoofing is becoming a common attack in wireless networks. Similarly, there is a rapid growth of numbers in mobile devices in the working environments. The trends pose a huge threat to users since they become the prime target of attackers. More unfortunately, mobile devices have weak security measures due to their limited computational powers, making them an easy target for attackers. Current approaches to detect spoofing attacks focus on personal computers and rely on the network hosts’ capacity, leaving users with mobile devices at risk. Furthermore, some approaches on Android-based devices demand root privilege, which is highly discouraged. This research aims to study users' susceptibility to network spoofing attacks and propose a detection solution in Android-based devices. The presented approach considers the difference in security information and signal levels of an access point to determine its legitimacy. On the other hand, it tests the legitimacy of the captive portal with fake login credentials since, usually, fake captive portals do not authenticate users. The detection approaches are presented in three networks: (a) open networks, (b) closed networks and (c) networks with captive portals. As a departure from existing works, this solution does not require root access for detection, and it is developed for portability and better performance. Experimental results show that this approach can detect fake access points with an accuracy of 98% and 99% at an average of 24.64 and 7.78 milliseconds in open and closed networks, respectively. On the other hand, it can detect the existence of a fake captive portal at an accuracy of 88%. Despite achieving this performance, the presented detection approach does not cover APs that do not mimic legitimate APs. As an improvement, future work may focus on pcap files which is rich of information to be used in detection.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.