28
views
0
recommends
+1 Recommend
0 collections
    0
    shares
      • Record: found
      • Abstract: found
      • Article: found
      Is Open Access

      Smartphone users: Understanding how security mechanisms are perceived and new persuasive methods

      research-article
      1 , * , 2 , 1
      PLoS ONE
      Public Library of Science

      Read this article at

      Bookmark
          There is no author summary for this article yet. Authors can add summaries to their articles on ScienceOpen to make them more accessible to a non-specialist audience.

          Abstract

          Protecting smartphones against security threats is a multidimensional problem involving human and technological factors. This study investigates how smartphone users’ security- and privacy-related decisions are influenced by their attitudes, perceptions, and understanding of various security threats. In this work, we seek to provide quantified insights into smartphone users’ behavior toward multiple key security features including locking mechanisms, application repositories, mobile instant messaging, and smartphone location services. To the best of our knowledge, this is the first study that reveals often unforeseen correlations and dependencies between various privacy- and security-related behaviors. Our work also provides evidence that making correct security decisions might not necessarily correlate with individuals’ awareness of the consequences of security threats. By comparing participants’ behavior and their motives for adopting or ignoring certain security practices, we suggest implementing additional persuasive approaches that focus on addressing social and technological aspects of the problem. On the basis of our findings and the results presented in the literature, we identify the factors that might influence smartphone users’ security behaviors. We then use our understanding of what might drive and influence significant behavioral changes to propose several platform design modifications that we believe could improve the security levels of smartphones.

          Related collections

          Most cited references23

          • Record: found
          • Abstract: found
          • Article: not found

          Assessing the five-factor model of personality description.

          S R Briggs (1992)
          Several approaches to assessing the dimensions of the five-factor model are reviewed and evaluated. The items in the assessment instrument may be adjectives or phrases, and the instrument itself may have been developed specifically to measure the five factors or may have been reinterpreted in terms of the five-factor model. Data are presented comparing an adjective-based measure of the model (Goldberg, 1990) with two phrase-based measures (Costa & McCrae, 1985; Hogan, 1986), and recommendations are made for the choice of an instrument in different research contexts. Allport's (1937) distinctions between the structure of the trait lexicon and the structure of personality in individuals are reiterated.
            Bookmark
            • Record: found
            • Abstract: not found
            • Article: not found

            Analysis of end user security behaviors

              Bookmark
              • Record: found
              • Abstract: not found
              • Article: not found

              A Survey on Security for Mobile Devices

                Bookmark

                Author and article information

                Contributors
                Role: Editor
                Journal
                PLoS One
                PLoS ONE
                plos
                plosone
                PLoS ONE
                Public Library of Science (San Francisco, CA USA )
                1932-6203
                2017
                15 March 2017
                : 12
                : 3
                : e0173284
                Affiliations
                [1 ]King Abdulaziz City for Science and Technology (KACST), Riyadh, Kingdom of Saudi Arabia
                [2 ]Software Engineering Department, King Saud University, Riyadh, Kingdom of Saudi Arabia
                University of Texas at San Antonio, UNITED STATES
                Author notes

                Competing Interests: The authors have declared that no competing interests exist.

                • Conceptualization: MA AA.

                • Data curation: MA NA.

                • Formal analysis: NA MA.

                • Funding acquisition: MA.

                • Investigation: NA.

                • Methodology: MA AA.

                • Project administration: MA NA.

                • Resources: AA.

                • Software: MA.

                • Supervision: MA AA.

                • Validation: NA.

                • Visualization: NA.

                • Writing – original draft: NA MA AA.

                • Writing – review & editing: NA MA AA.

                Article
                PONE-D-16-28423
                10.1371/journal.pone.0173284
                5352308
                28297719
                73449975-fe6f-4c6b-a5bc-1cec1ad5483d
                © 2017 Alsaleh et al

                This is an open access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited.

                History
                : 15 July 2016
                : 4 February 2017
                Page count
                Figures: 12, Tables: 2, Pages: 35
                Funding
                Funded by: funder-id http://dx.doi.org/10.13039/501100004919, King Abdulaziz City for Science and Technology;
                This work was supported by King Abdulaziz City for Science and Technology (KACST) - Internal Fund.
                Categories
                Research Article
                Engineering and Technology
                Equipment
                Communication Equipment
                Cell Phones
                Biology and Life Sciences
                Behavior
                Computer and Information Sciences
                Computer Networks
                Biology and Life Sciences
                Behavior
                Habits
                Biology and Life Sciences
                Behavior
                Motivation
                Biology and Life Sciences
                Neuroscience
                Cognitive Science
                Cognitive Psychology
                Motivation
                Biology and Life Sciences
                Psychology
                Cognitive Psychology
                Motivation
                Social Sciences
                Psychology
                Cognitive Psychology
                Motivation
                Computer and Information Sciences
                Network Analysis
                Social Networks
                Social Sciences
                Sociology
                Social Networks
                People and Places
                Demography
                Social Sciences
                Political Science
                National Security
                Custom metadata
                All relevant data are within the paper.

                Uncategorized
                Uncategorized

                Comments

                Comment on this article