An application to estimate the Cyber - risk Detection Skill of mobile device users . ( Novel idea presentation )

نویسندگان

  • Guillaume Schaff
  • Marianne Junger
چکیده

According to experts’ predictions, mobile devices (smartphones, tablet computers) will replace the widespread personal computer by 2017 for personal and work tasks (emergence of BYOD). In parallel, the expert community has observed an increase of cyber-attacks against mobile devices. Mobile device users are increasingly required to develop new skills to manage their equipment correctly. Towards this goal, the 21st Century Skills framework redefines the essential knowledge and skills, which people should acquire during the education process in order to meet the new requirements of the “computing society”. However, the lack of IT security awareness on mobile devices clearly shows that the 21st Century Skills is not yet assimilated by the users. To measure and improve the assimilation of such skills, we propose to define a new psychological concept; Cyber-risk Detection Skill (CDS), inspired by the 21st Century Skills framework. In this, paper we present the concept and design of a user behaviour test based on a cyber-attack scenario in order to measure user awareness. In a later phase we propose to develop a psychological tool (such as a specific methodology), which will measure the Risk Detection Skill of mobile device users in a more comprehensive way.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Connection Interface Designing for Grid and Mobile Devices

There area lot of mobile computer devices with a variety of applications and users Tend to use them more. Due to the limitations of mobile devices, running most of the procedures are impossible. To resolve this problem, mobile devices can be connected to the grid, to use the facilities of grid. On the other hand the communication mechanisms are different for each device and they cannot be c...

متن کامل

Connection Interface Designing for Grid and Mobile Devices

There area lot of mobile computer devices with a variety of applications and users Tend to use them more. Due to the limitations of mobile devices, running most of the procedures are impossible. To resolve this problem, mobile devices can be connected to the grid, to use the facilities of grid. On the other hand the communication mechanisms are different for each device and they cannot be c...

متن کامل

A Novel Hybrid Approach for Email Spam Detection based on Scatter Search Algorithm and K-Nearest Neighbors

Because cyberspace and Internet predominate in the life of users, in addition to business opportunities and time reductions, threats like information theft, penetration into systems, etc. are included in the field of hardware and software. Security is the top priority to prevent a cyber-attack that users should initially be detecting the type of attacks because virtual environments are not moni...

متن کامل

Satisfaction of Mobile Users with mobile Application "Identification, Prevention, and Control of Bed Bugs": Designing and Developing Mobile Health Application

Introduction: Bed bugs are considered as public health nuisance insects, which can feed on humans and cause psychological distress, insomnia, anxiety, anemia, and skin itching in individuals. The aim of this study was to design and implement a mobile application "identification, prevention, and control of bed bug", and also to assess the satisfaction of mobile users with this application. Metho...

متن کامل

The Presentation of an Ideal Safe SMS based model in mobile Electronic commerce using Encryption hybrid algorithms AES and ECC

Mobile commerce is whatever electronic transfer or transaction via a mobile modem through a mobile net in which the true value or advance payment is done for goods, services or information. A mobile payment system should be beneficial for all related persons. For a payment system to be a Successful system, End-user, seller, exporter and operators should see a additional value in it. End-user ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2013