Delegate the smartphone user? Security awareness in smartphone platforms

نویسندگان

  • Alexios Mylonas
  • Anastasia Kastania
  • Dimitris Gritzalis
چکیده

Smartphone users increasingly download and install third-party applications from official application repositories. Attackers may use this centralized application delivery architecture as a security and privacy attack vector. This risk increases since application vetting mechanisms are often not in place and the user is delegated to authorize which functionality and protected resources are accessible by third-party applications. In this paper, we mount a survey to explore the security awareness of smartphone users who download applications from official application repositories (e.g. Google Play, Apple’s App Store, etc.). The survey findings suggest a security complacency, as the majority of users trust the app repository, security controls are not enabled or not added, and users disregard security during application selection and installation. As a response to this security complacency, we built a prediction model to indentify users who trust the app repository. Then, the model is assessed, evaluated, and proved to be statistically significant and efficient.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Evaluation of social well-being and emotional self-awareness based on the quality of relationship with parents due to smartphone addiction in high-intelligence students

Introduction: Instant and easy access to smartphones and the internet has become the cause of addiction. Mobile phone addiction has a negative effect on the quality of the relationship between parents and children. The aim of this study was to compare and test the causal relationship model of social well-being, emotional self-awareness with parents due to smartphone addiction in high-intelligen...

متن کامل

Fine-grained Access Control for Mobile Platforms

With the introduction of the smartphone, mobile phones have gone from closed systems with limited capability to mobile software platforms with rich software ecosystems. The same operating systems are now present in other mobile devices as well, such as tablets. The security mechanism of such software platforms have, apart from end-user requirements, heavily been influenced by business and legis...

متن کامل

The Effect of Duration of Smartphone Use on Head and Shoulders Posture of Young Adults Aged 20-35 Years

Background and Objectives: Given the increasing prevalence of smart phone usage, it can be considered as an important and significant issue in all aspects of human life. Therefore, the purpose of this study was to study the effect of duration of smartphone use on head and shoulders’ posture of young adults aged 20-35 years. Methods: The statistical population of this study was young people age...

متن کامل

A Qualitative Metrics Vector for the Awareness of Smartphone Security Users

The proliferation of smartphones introduced new challenges in the users’ security and privacy. Currently, the literature concentrates mainly on the ‘nuts and bolts’ of their security models. Not extensive work is available on the security awareness of smartphone users, even though their role in the ecosystem is important. This is so, as users’ actions directly affect their security and privacy....

متن کامل

Travel Mode Identification with Smartphone Sensors

Travel Mode Identification with Smartphone Sensors by Xing Su Advisor: Hanghang Tong Personal trips in a modern urban society typically involve multiple travel modes. Recognizing a traveller’s transportation mode is not only critical to personal context-awareness in related applications, but also essential to urban traffic operations, transportation planning, and facility design. While the stat...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • Computers & Security

دوره 34  شماره 

صفحات  -

تاریخ انتشار 2013