2013 International Conference on Current Trends in Information Technology (CTIT) 2013
DOI: 10.1109/ctit.2013.6749496
|View full text |Cite
|
Sign up to set email alerts
|

Smartphone security awareness: Time to act

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

1
3
0

Year Published

2015
2015
2024
2024

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 15 publications
(4 citation statements)
references
References 1 publication
1
3
0
Order By: Relevance
“…These findings represent concerns regarding users' information privacy, especially when MCMC stated that most Malaysian smartphone users tend to opt for "jailbreak" smartphones that allow the downloading of apps which have not been approved by app stores as these apps may impose security and data integrity risks [4]. This confirms that the increasing number of smartphone users will only lead to the increasing of privacy risks [8], [9].…”
Section: Introductionsupporting
confidence: 54%
“…These findings represent concerns regarding users' information privacy, especially when MCMC stated that most Malaysian smartphone users tend to opt for "jailbreak" smartphones that allow the downloading of apps which have not been approved by app stores as these apps may impose security and data integrity risks [4]. This confirms that the increasing number of smartphone users will only lead to the increasing of privacy risks [8], [9].…”
Section: Introductionsupporting
confidence: 54%
“…Other studies about mobile information security focused on interviews about bluetooth, SMS and web browser applications (Al-Hadadi and Al Shidhani, 2013), technical dimensions (e.g. authentication, network security) (Clarke et al , 2016) and model and framework development (Ngogo and Flowerday, 2015a, b; Bitton et al , 2018).…”
Section: Theoretical Frameworkmentioning
confidence: 99%
“…Hence, human security behavior is critical to ensure an efficient information security environment that does not depend on technology only. It is suggested that risk communication should go one step further to changing user's security behavior [57][58] [59]. However, several studies have confirmed that users do not react in the same manner to the same security threat nor the same user make the same decision in all situations.…”
Section: Related Workmentioning
confidence: 99%