A Scale Development and Application Study on Smartphone Security Awareness
Year 2024,
Volume: 37 Issue: 4, 1691 - 1705
Mevlüt Yıldırım
,
Veysel Demirer
Abstract
This study aims to assess the extent of smartphone security awareness among students pursuing an associate degree and to ascertain if there are substantial variations in smartphone security awareness based on certain demographic variables. Furthermore, its objective is to uncover the correlation between smartphone security awareness and proficiency in digital literacy. The Smartphone Security Awareness Scale was initially designed with this particular aim. The scale comprises nine items that are measured along a single dimension, accounting for 39.6% of the overall variation. The scale’s reliability coefficient was found to be 0.78. The study sample comprised 612 associate degree students pursuing further education in two vocational colleges. The data were obtained using the internet and voluntarily. The data indicate that associate degree students had a high level of awareness regarding smartphone security. There was no significant difference in smartphone security awareness based on gender, use of security software, participation in information security training, and level of care regarding the privacy and safeguarding of personal data. No significant relationship was found between smartphone security awareness and smartphone ownership duration. However, significant differences were found according to experience of security problems and competence in using information technologies. A positive, significant, and moderate correlation was discovered between smartphone security awareness and proficiency in digital literacy. The scale devised during the investigation can be utilised in other future studies. According to the results obtained in this direction, training and seminars can be organised to increase smartphone security awareness.
Ethical Statement
All ethical permissions were obtained and added as supplementary file.
References
- [1] Jeon, W., Kim, J., Lee, Y., Won, D., “A practical analysis of smartphone security”, Symposium on Human Interface, Springer, Berlin, Heidelberg, 311-320, (2011).
- [2] Parker, F., Ophoff, J., Van Belle, J. P., Karia, R., “Security awareness and adoption of security controls by smartphone users”, 2nd International Conference on Information Security and Cyber Forensics (InfoSec) IEEE, 99-104, (2015).
- [3] He, W., “A survey of security risks of mobile social media through blog mining and an extensive literature search”, Information Management & Computer Security, 21(5): 381-400, (2013).
- [4] Theoharidou, M., Mylonas, A., Gritzalis, D., “A risk assessment method for smartphones”, IFIP International Information Security Conference, Springer, Berlin, Heidelberg, 443-456, (2012).
- [5] Chin, E., Felt, A. P., Sekar, V., Wagner, D., “Measuring user confidence in smartphone security and privacy”, Proceedings of the 8th Symposium on Usable Privacy and Security, 1-16, (2012).
- [6] McGill, T., Thompson, N., “Old risks, new challenges: exploring differences in security between home computer and mobile device use”, Behaviour & Information Technology, 36(11): 1111-1124, (2017).
- [7] Koyuncu, M., Pusatli, T., “Security awareness level of smartphone users: an exploratory case study”, Mobile Information Systems, 2019(1): 1-11, (2019).
- [8] Ben-Asher, N., Kirschnick, N., Sieger, H., Meyer, J., Ben-Oved, A., Möller, S., “On the need for different security methods on mobile phones”, Proceedings of the 13th International Conference on Human Computer Interaction with Mobile Devices and Services, 465-473, (2011).
- [9] Pramod, D., Raman, R., “A study on the user perception and awareness of smartphone security”, International Journal of Applied Engineering Research, 9(23): 19133-19144, (2014).
- [10] La Polla, M., Martinelli, F., Sgandurra, D., ”A survey on security for mobile devices”, IEEE Communications Services & Tutorials, 15(1): 446-471, (2013).
- [11] Portokalidis, G., Homburg, P., Anagnostakis, K. & Bos, H., “Paranoid Android: versatile protection for smartphones”, In Proceedings of the 26th annual computer security applications conference (ss. 347-356), (2010).
- [12] Park, J. H., Yi, K. J., Jeong, Y. S., ”An enhanced smartphone security model based on information security management system (ISMS)”, Electronic Commerce Research, 14(3): 321-348, (2014).
- [13] Turner, A., “Mobile app statistics”, https://www.bankmycell.com/blog/number-of-mobile-apps-worldwide#:~:text=Today%2C%20there%20are%208.93%20million,installed%20on%20their%20, (2024).
- [14] Sheila, M., Abdollah, M. F., Sahib, S., “Dimension of mobile security model: mobile user security threats and awareness”, International Journal of Mobile Learning and Organisation, 9(1): 66-85, (2015).
- [15] Joshi, J., Parekh, C., ”Android smartphone vulnerabilities: a survey”, International Conference on Advances in Computing, Communication, & Automation (ICACCA), IEEE, 1-5, (2016).
- [16] Çubukçu, A., Bayzan, Ş., “Digital citizenship perception in Turkey and methods of increasing this perception through conscious, safe and effective use of the internet”, Middle Eastern & African Journal of Educational Research, 5: 148-173, (2013).
- [17] Spante, M., Hashemi, S. S., Lundin, M., Alger, A., “Digital competence and digital literacy in higher education research: systematic review of concept use”, Cogent Education, 5(1): 1-21, (2018).
- [18] Inoue, H., Naito, E., Koshizuka, M., “Mediacy: what it is? Where to go?”, The International Information & Library Review, 29(3-4): 403-413, (1997).
- [19] Eshet-Alkalai, Y., “Digital literacy: a conceptual framework for survival skills in the digital era”, Journal of Educational Multimedia and Hypermedia, 13(1): 93-106, (2004).
- [20] Hockly, N., “Technology for the language teacher: digital literacies”, English Language Teaching Journal, 66(1): 108-112, (2012).
- [21] Pegrum, M., “Modified, multiplied, and (re-)mixed: social media and digital literacies”, In M. Thomas, Digital Education, New York, NY: Palgrave Macmillan, 9-36, (2011).
- [22] Sophos. “The state of ransomware 2024”, https://assets.sophos.com/X24WTUEQ/at/9brgj5n44hqvgsp5f5bqcps/sophos-state-of-ransomware-2024-wp.pdf , (2024).
- [23] Nauman, M., Khan, S., Zhang, X., “Apex: extending android permission model and enforcement with user-defined runtime constraints”, Proceedings of the 5th ACM symposium on information, computer and communications security, 328-332, (2010).
- [24] Zhou, Y., Jiang, X., “Dissecting android malware: characterisation and evolution”, IEEE Symposium on Security and Privacy, 95-109, (2012).
- [25] Zhou, Y., Wang, Z., Zhou, W., Jiang, X., “Hey, you, get off of my market: detecting malicious apps in official and alternative android markets”, In NDSS, USA, 25(4): 50-52, (2012).
- [26] Breitinger, F., Tully-Doyle, R., Hassenfeldt, C., “A survey on smartphone user’s security choices, awareness and education”, Computers & Security, 88, (2020).
- [27] Furnell, S., “Why users cannot use security?”, Computers & Security, 24(4): 274-279, (2005).
- [28] Furnell, S. Jusoh, A. Katsabas, D., „The challenges of understanding and using security: a survey of end-users.”, Computers & Security, 25(1): 27-35, (2006).
- [29] Furnell S., “Making security usable: are things improving?”, Computers & Security, 26(6), (2007).
- [30] Whitten, A., Tygar, J. D., “Why Johnny Can’t Encrypt: A Usability Evaluation of PGP 5.0.”, USENIX Security Symposium, 348: 169-184, (1999).
- [31] Breitinger, F., Nickel, C., “User survey on phone security and usage”, BIOSIG 2010: Biometrics and Electronic Signatures, Proceedings of the Special Interest Group on Biometrics and Electronic Signatures, 139- 144, (2010).
- [32] Imgraben, J., Engelbrecht, A., Choo, K.-K.R., “Always connected, but are smart mobile users getting more security savvy? A survey of smart mobile device users”, Behaviour & Information Technology, 33(12): 1347-1360, (2014).
- [33] Vecchiato, D., Martins, E., ”Experience report: A field analysis of user-defined security configurations of android devices”, IEEE 26th International Symposium on Software Reliability Engineering (ISSRE), 314-323, (2015).
- [34] Androulidakis, I., Kandus, G., “A survey on saving personal data in the mobile phone”, Proceedings of the 6th International Conference on Availability, Reliability and Security, IEEE, 633-638, (2011).
- [35] Mylonas, A., Kastania, A. Gritzalis, D., “Delegate the smartphone user? Security awareness in smartphone platforms”, Computers & Security, 34: 47-66, (2013).
- [36] Talan, T., Aktürk, C., Korkmaz, A., Gülseçen, S., “Security awareness of university students in smartphone use”, Istanbul Journal of Open and Distance Education, 1(2): 61- 75, (2015).
- [37] Büyükgöze, S., Bıkmaz, Z., Dereli, E., Korkmaz, A., “Mobile security awareness of computer programming students”, 2nd International Congress of Contemporary Education Research, September-October, Muğla, Turkey, 15-19, (2017).
- [38] Bıkmaz, Z., ”Determination of mobile security awareness and digital data security awareness of health management students”, International Journal of Management Information Systems and Computer Science, 1(1): 22-30, (2017).
- [39] Karasar, N., “Scientific research method”, Ankara: Nobel Publication Distribution, (2005).
- [40] Frankel, J. R., Wallen, N. E., Hyun, H. H., “How to design and evaluate research in education (8th ed.)”, New York: McGraw-Hill International Edition, (2012).
- [41] Büyüköztürk, Ş., “Questionnaire development”, Turkish Journal of Educational Sciences, 3(2): 133-151, (2005).
- [42] Wilson, N., McClean, S., “Questionnaire design: a practical introduction”, Coleraine: University of Ulster, (1994).
- [43] Field, A. P., “Discovering statistics using Ibm Spss Statistics: and sex and drugs and Rock’ N’ Roll (4th Ed.)”, Sage, London, (2013).
- [44] Ng, W., “Can we teach digital natives digital literacy?”, Computers & Education, 59(3): 1065-1078, (2012).
- [45] Üstündağ, M.T., Güneş, E., Bahçivan, E., “Turkish adaptation of digital literacy scale and investigating pre-service science teachers’ digital literacy”, Journal of Education and Future, 12: 19-29, (2017).
- [46] Madden, M., Lenhart, A., Duggan, M., Cortesi, S., Gasser, U., “Teen and technology 2013”, https://www.pewresearch.org/internet/2013/03/13/teens-and-technology- 2013/, (2013).
- [47] Ophoff, J., Robinson, M., “Exploring end-user smartphone security awareness within a South African context”, Information Security for South Africa, IEEE, 1-7, (2014).
- [48] Sieger, H., Möller, S., “Gender differences in the perception of security of mobile phones”, Proceedings of the 14th International Conference on Human-computer Interaction with Mobile Devices and Services Companion (MobileHCI’ 12), Association for Computing Machinery, New York, NY, USA, 107-112, (2012).
- [49] Pramod, D., Raman, R., “A study on the user perception and awareness of smartphone security”, International Journal of Applied Engineering Research, 9(23): 19133-19144, (2014).
- [50] Murray, C., “Smartphone security risks: the extent of user security awareness”, Trinity College Dublin Master’s thesis, (2014).
- [51] Benenson, Z., Kroll-Peters, O., Krupp, M., “Attitudes to it security when using a smartphone”, Proceedings of the Federated Conference on Computer Science and Information Systems (FedCSIS). September, Wrocław, Poland, (2012).
- [52] Watson, B., Zheng, J., ”On the user awareness of mobile security recommendations” Proceedings of ACM SE ’17. April, Kennesaw, GA, USA, 120-127, (2017).
- [53] Eshet-Alkalai, Y., Amichai-Hamburger, Y., “Experiments in digital literacy”, CyberPsychology & Behaviour, 7(4): 421-429, (2004).
- [54] Hague, C., Payton, S., “Digital literacy across the curriculum”, London: Futurelab, (2010).
- [55] Ng, W., “Empowering scientific literacy through digital literacy and multiliteracies”, New York: Nova Science Publishers, (2013).
- [56] Zaidi, S., Shah, M., Kamran, M., Javaid, Q., Zhang, S., “A survey on security for smartphone device”, Internaitonal Journal of Advanced Computer Science and Applications, 7(4): 206-219, (2016).
- [57] Åhlfeldt, R. M., Spagnoletti, P., Sindre, G., “Improving the information security model by using TFI”, IFIP International Information Security Conference, Springer, Boston, MA, 73-84, (2007).
Year 2024,
Volume: 37 Issue: 4, 1691 - 1705
Mevlüt Yıldırım
,
Veysel Demirer
References
- [1] Jeon, W., Kim, J., Lee, Y., Won, D., “A practical analysis of smartphone security”, Symposium on Human Interface, Springer, Berlin, Heidelberg, 311-320, (2011).
- [2] Parker, F., Ophoff, J., Van Belle, J. P., Karia, R., “Security awareness and adoption of security controls by smartphone users”, 2nd International Conference on Information Security and Cyber Forensics (InfoSec) IEEE, 99-104, (2015).
- [3] He, W., “A survey of security risks of mobile social media through blog mining and an extensive literature search”, Information Management & Computer Security, 21(5): 381-400, (2013).
- [4] Theoharidou, M., Mylonas, A., Gritzalis, D., “A risk assessment method for smartphones”, IFIP International Information Security Conference, Springer, Berlin, Heidelberg, 443-456, (2012).
- [5] Chin, E., Felt, A. P., Sekar, V., Wagner, D., “Measuring user confidence in smartphone security and privacy”, Proceedings of the 8th Symposium on Usable Privacy and Security, 1-16, (2012).
- [6] McGill, T., Thompson, N., “Old risks, new challenges: exploring differences in security between home computer and mobile device use”, Behaviour & Information Technology, 36(11): 1111-1124, (2017).
- [7] Koyuncu, M., Pusatli, T., “Security awareness level of smartphone users: an exploratory case study”, Mobile Information Systems, 2019(1): 1-11, (2019).
- [8] Ben-Asher, N., Kirschnick, N., Sieger, H., Meyer, J., Ben-Oved, A., Möller, S., “On the need for different security methods on mobile phones”, Proceedings of the 13th International Conference on Human Computer Interaction with Mobile Devices and Services, 465-473, (2011).
- [9] Pramod, D., Raman, R., “A study on the user perception and awareness of smartphone security”, International Journal of Applied Engineering Research, 9(23): 19133-19144, (2014).
- [10] La Polla, M., Martinelli, F., Sgandurra, D., ”A survey on security for mobile devices”, IEEE Communications Services & Tutorials, 15(1): 446-471, (2013).
- [11] Portokalidis, G., Homburg, P., Anagnostakis, K. & Bos, H., “Paranoid Android: versatile protection for smartphones”, In Proceedings of the 26th annual computer security applications conference (ss. 347-356), (2010).
- [12] Park, J. H., Yi, K. J., Jeong, Y. S., ”An enhanced smartphone security model based on information security management system (ISMS)”, Electronic Commerce Research, 14(3): 321-348, (2014).
- [13] Turner, A., “Mobile app statistics”, https://www.bankmycell.com/blog/number-of-mobile-apps-worldwide#:~:text=Today%2C%20there%20are%208.93%20million,installed%20on%20their%20, (2024).
- [14] Sheila, M., Abdollah, M. F., Sahib, S., “Dimension of mobile security model: mobile user security threats and awareness”, International Journal of Mobile Learning and Organisation, 9(1): 66-85, (2015).
- [15] Joshi, J., Parekh, C., ”Android smartphone vulnerabilities: a survey”, International Conference on Advances in Computing, Communication, & Automation (ICACCA), IEEE, 1-5, (2016).
- [16] Çubukçu, A., Bayzan, Ş., “Digital citizenship perception in Turkey and methods of increasing this perception through conscious, safe and effective use of the internet”, Middle Eastern & African Journal of Educational Research, 5: 148-173, (2013).
- [17] Spante, M., Hashemi, S. S., Lundin, M., Alger, A., “Digital competence and digital literacy in higher education research: systematic review of concept use”, Cogent Education, 5(1): 1-21, (2018).
- [18] Inoue, H., Naito, E., Koshizuka, M., “Mediacy: what it is? Where to go?”, The International Information & Library Review, 29(3-4): 403-413, (1997).
- [19] Eshet-Alkalai, Y., “Digital literacy: a conceptual framework for survival skills in the digital era”, Journal of Educational Multimedia and Hypermedia, 13(1): 93-106, (2004).
- [20] Hockly, N., “Technology for the language teacher: digital literacies”, English Language Teaching Journal, 66(1): 108-112, (2012).
- [21] Pegrum, M., “Modified, multiplied, and (re-)mixed: social media and digital literacies”, In M. Thomas, Digital Education, New York, NY: Palgrave Macmillan, 9-36, (2011).
- [22] Sophos. “The state of ransomware 2024”, https://assets.sophos.com/X24WTUEQ/at/9brgj5n44hqvgsp5f5bqcps/sophos-state-of-ransomware-2024-wp.pdf , (2024).
- [23] Nauman, M., Khan, S., Zhang, X., “Apex: extending android permission model and enforcement with user-defined runtime constraints”, Proceedings of the 5th ACM symposium on information, computer and communications security, 328-332, (2010).
- [24] Zhou, Y., Jiang, X., “Dissecting android malware: characterisation and evolution”, IEEE Symposium on Security and Privacy, 95-109, (2012).
- [25] Zhou, Y., Wang, Z., Zhou, W., Jiang, X., “Hey, you, get off of my market: detecting malicious apps in official and alternative android markets”, In NDSS, USA, 25(4): 50-52, (2012).
- [26] Breitinger, F., Tully-Doyle, R., Hassenfeldt, C., “A survey on smartphone user’s security choices, awareness and education”, Computers & Security, 88, (2020).
- [27] Furnell, S., “Why users cannot use security?”, Computers & Security, 24(4): 274-279, (2005).
- [28] Furnell, S. Jusoh, A. Katsabas, D., „The challenges of understanding and using security: a survey of end-users.”, Computers & Security, 25(1): 27-35, (2006).
- [29] Furnell S., “Making security usable: are things improving?”, Computers & Security, 26(6), (2007).
- [30] Whitten, A., Tygar, J. D., “Why Johnny Can’t Encrypt: A Usability Evaluation of PGP 5.0.”, USENIX Security Symposium, 348: 169-184, (1999).
- [31] Breitinger, F., Nickel, C., “User survey on phone security and usage”, BIOSIG 2010: Biometrics and Electronic Signatures, Proceedings of the Special Interest Group on Biometrics and Electronic Signatures, 139- 144, (2010).
- [32] Imgraben, J., Engelbrecht, A., Choo, K.-K.R., “Always connected, but are smart mobile users getting more security savvy? A survey of smart mobile device users”, Behaviour & Information Technology, 33(12): 1347-1360, (2014).
- [33] Vecchiato, D., Martins, E., ”Experience report: A field analysis of user-defined security configurations of android devices”, IEEE 26th International Symposium on Software Reliability Engineering (ISSRE), 314-323, (2015).
- [34] Androulidakis, I., Kandus, G., “A survey on saving personal data in the mobile phone”, Proceedings of the 6th International Conference on Availability, Reliability and Security, IEEE, 633-638, (2011).
- [35] Mylonas, A., Kastania, A. Gritzalis, D., “Delegate the smartphone user? Security awareness in smartphone platforms”, Computers & Security, 34: 47-66, (2013).
- [36] Talan, T., Aktürk, C., Korkmaz, A., Gülseçen, S., “Security awareness of university students in smartphone use”, Istanbul Journal of Open and Distance Education, 1(2): 61- 75, (2015).
- [37] Büyükgöze, S., Bıkmaz, Z., Dereli, E., Korkmaz, A., “Mobile security awareness of computer programming students”, 2nd International Congress of Contemporary Education Research, September-October, Muğla, Turkey, 15-19, (2017).
- [38] Bıkmaz, Z., ”Determination of mobile security awareness and digital data security awareness of health management students”, International Journal of Management Information Systems and Computer Science, 1(1): 22-30, (2017).
- [39] Karasar, N., “Scientific research method”, Ankara: Nobel Publication Distribution, (2005).
- [40] Frankel, J. R., Wallen, N. E., Hyun, H. H., “How to design and evaluate research in education (8th ed.)”, New York: McGraw-Hill International Edition, (2012).
- [41] Büyüköztürk, Ş., “Questionnaire development”, Turkish Journal of Educational Sciences, 3(2): 133-151, (2005).
- [42] Wilson, N., McClean, S., “Questionnaire design: a practical introduction”, Coleraine: University of Ulster, (1994).
- [43] Field, A. P., “Discovering statistics using Ibm Spss Statistics: and sex and drugs and Rock’ N’ Roll (4th Ed.)”, Sage, London, (2013).
- [44] Ng, W., “Can we teach digital natives digital literacy?”, Computers & Education, 59(3): 1065-1078, (2012).
- [45] Üstündağ, M.T., Güneş, E., Bahçivan, E., “Turkish adaptation of digital literacy scale and investigating pre-service science teachers’ digital literacy”, Journal of Education and Future, 12: 19-29, (2017).
- [46] Madden, M., Lenhart, A., Duggan, M., Cortesi, S., Gasser, U., “Teen and technology 2013”, https://www.pewresearch.org/internet/2013/03/13/teens-and-technology- 2013/, (2013).
- [47] Ophoff, J., Robinson, M., “Exploring end-user smartphone security awareness within a South African context”, Information Security for South Africa, IEEE, 1-7, (2014).
- [48] Sieger, H., Möller, S., “Gender differences in the perception of security of mobile phones”, Proceedings of the 14th International Conference on Human-computer Interaction with Mobile Devices and Services Companion (MobileHCI’ 12), Association for Computing Machinery, New York, NY, USA, 107-112, (2012).
- [49] Pramod, D., Raman, R., “A study on the user perception and awareness of smartphone security”, International Journal of Applied Engineering Research, 9(23): 19133-19144, (2014).
- [50] Murray, C., “Smartphone security risks: the extent of user security awareness”, Trinity College Dublin Master’s thesis, (2014).
- [51] Benenson, Z., Kroll-Peters, O., Krupp, M., “Attitudes to it security when using a smartphone”, Proceedings of the Federated Conference on Computer Science and Information Systems (FedCSIS). September, Wrocław, Poland, (2012).
- [52] Watson, B., Zheng, J., ”On the user awareness of mobile security recommendations” Proceedings of ACM SE ’17. April, Kennesaw, GA, USA, 120-127, (2017).
- [53] Eshet-Alkalai, Y., Amichai-Hamburger, Y., “Experiments in digital literacy”, CyberPsychology & Behaviour, 7(4): 421-429, (2004).
- [54] Hague, C., Payton, S., “Digital literacy across the curriculum”, London: Futurelab, (2010).
- [55] Ng, W., “Empowering scientific literacy through digital literacy and multiliteracies”, New York: Nova Science Publishers, (2013).
- [56] Zaidi, S., Shah, M., Kamran, M., Javaid, Q., Zhang, S., “A survey on security for smartphone device”, Internaitonal Journal of Advanced Computer Science and Applications, 7(4): 206-219, (2016).
- [57] Åhlfeldt, R. M., Spagnoletti, P., Sindre, G., “Improving the information security model by using TFI”, IFIP International Information Security Conference, Springer, Boston, MA, 73-84, (2007).