A Socio-Technical Investigation into Smartphone Security
نویسندگان
چکیده
Many people do not deliberately act to protect the data on their Smartphones. The most obvious explanation for a failure to behave securely is that the appropriate mechanisms are unusable. Does this mean usable mechanisms will automatically be adopted? Probably not! Poor usability certainly plays a role, but other factors also contribute to non-adoption of precautionary mechanisms and behaviours. We carried out a series of interviews to determine justifications for non-adoption of security precautions, specifically in the smartphone context, and developed a model of Smartphone precaution non-adoption. We propose that future work should investigate the use of media campaigns in raising awareness of these issues.
منابع مشابه
Identifying Educational Contents and Technical Features of a Self-Management Smartphone Application for Women with Breast Cancer
Background and Objective: Breast cancer patients need a variety of skills and abilities to deal with the consequences of the illness. Self-management is one of the operational strategies that leads to disease acceptance, treatment adherence, and improving the quality of life. The use of smartphone applications (apps) can play a pivotal role in the support and self-management of breast cancer pa...
متن کاملDeveloping location-based mobile advertising in Singapore: A socio-technical perspective
Article history: Received 17 August 2013 Received in revised form 18 March 2015 Accepted 2 June 2015 Available online xxxx Increasing adoption of location-based services and smartphones leads to optimistic forecasts for location-based mobile advertising (LBA).This study investigates the development of emerging LBA in Singapore by examining stakeholders’ perspectives and shaping forces in the so...
متن کاملSecurity implications of structure?
Computer security is an important issue in determining the dependability of computer systems. It becomes even more crucial when we talk about computer-based systems (CBS), where we take into consideration the roles played by the human actors (or human components) involved in the system. In this chapter, we begin to explore the security of complex CBS (sometimes called socio-technical systems). ...
متن کاملSTS-Tool 3.0: Maintaining Security in Socio-Technical Systems
In this paper, we present STS-Tool 3.0: a software tool that helps security requirement engineers in maintaining high level of security in socio-technical systems. STS-Tool 3.0 allows to specify social/organizational security requirements and to enforce them in part of the implementation of socio-technical systems.
متن کاملAssessing ICT Security Risks in Socio-Technical Systems (Dagstuhl Seminar 16461)
This report documents the program and the outcomes of Dagstuhl Seminar 16461 “Assessing ICT Security Risks in Socio-Technical Systems”. As we progress from classic mechanical or electrical production systems, over ICT systems, to socio-technical systems, risk assessment becomes increasingly complex and difficult. Risk assessment for traditional engineering systems assumes the systems to be dete...
متن کامل