BibTex RIS Cite

It's all about me! The Influence of Personality on Susceptibility to Mobile Security Attacks

Year 2015, Volume: 3 Issue: 3, 194 - 199, 29.06.2015
https://doi.org/10.18100/ijamec.47036

Abstract

Mobile phones security is an emerging field of study. As the number of data-centric mobile phones grows, the industry experts expect them to face major security problems. We believe the first step to devise countermeasures for protecting users would be a comprehensive understanding of the mobile users’ perception of risk. We report on a qualitative grounded theory study to inspect such perception. The initial thematic analysis identified relationship between level of knowledge and security attitude. However, further grounded theory analysis returned in personality type taxonomy for exposure for mobile attacks in general and phishing attacks in particular. We confirm our findings by conducting the first naturalistic phishing experiment on mobile phones

References

  • Informa Telecoms & Media report, London: Informa Telecoms & Media. 2009
  • D. Maslennikov. Mobile Malware Evolution: An Overview, Part 4". RetrievedJanuary , 2014 Available: http://securelist.com/large-slider/36350/mobile-malware-evolution-an-overview-part-4/
  • K. Dunham. Mobile Malware Attacks and defense. Syngress. 2008.
  • P. Cairns and A.L. Cox. Research Methods for Human-Interaction. Cambridge University Press. 2008.
  • J. Preece, Y. Roger and H. Sharp. Interaction Design beyond Human Computer Interaction, USA: John Wiley and Sons. 2002.
  • S. Love. Understanding mobile human computer interaction. ElSevier Ltd. 2005.
  • M. N. Marshall. Sampling for qualitative research. Oxford University Press. 1996
  • DH. Ingvar. Memory of the future": an essay on the temporal organization of conscious awareness. 1985
  • R. R. McCrae, A. Terracciano, P. T. Cost, and D. J. Ozer. Person-factors in the California adult Q-set: Closing the door on personality types? European Journal of Personality, 20, 29-44. 2006
  • A. Furnham, J. Crump. Personality Traits, Types, and Disorders: An Examination of the Relationship between Three Self-Report Measures. European Journal of Personality. 2005
  • L. Clark and D. Watson. Personality, disorder and personality disorder towards a more rational conceptualization. Journal of Personality Disorders, 13, 142–151. 1999
  • R. West. The psychology of security. Communications of the ACM 51(4). Pages 34-40, 2008.

Original Research Paper

Year 2015, Volume: 3 Issue: 3, 194 - 199, 29.06.2015
https://doi.org/10.18100/ijamec.47036

Abstract

References

  • Informa Telecoms & Media report, London: Informa Telecoms & Media. 2009
  • D. Maslennikov. Mobile Malware Evolution: An Overview, Part 4". RetrievedJanuary , 2014 Available: http://securelist.com/large-slider/36350/mobile-malware-evolution-an-overview-part-4/
  • K. Dunham. Mobile Malware Attacks and defense. Syngress. 2008.
  • P. Cairns and A.L. Cox. Research Methods for Human-Interaction. Cambridge University Press. 2008.
  • J. Preece, Y. Roger and H. Sharp. Interaction Design beyond Human Computer Interaction, USA: John Wiley and Sons. 2002.
  • S. Love. Understanding mobile human computer interaction. ElSevier Ltd. 2005.
  • M. N. Marshall. Sampling for qualitative research. Oxford University Press. 1996
  • DH. Ingvar. Memory of the future": an essay on the temporal organization of conscious awareness. 1985
  • R. R. McCrae, A. Terracciano, P. T. Cost, and D. J. Ozer. Person-factors in the California adult Q-set: Closing the door on personality types? European Journal of Personality, 20, 29-44. 2006
  • A. Furnham, J. Crump. Personality Traits, Types, and Disorders: An Examination of the Relationship between Three Self-Report Measures. European Journal of Personality. 2005
  • L. Clark and D. Watson. Personality, disorder and personality disorder towards a more rational conceptualization. Journal of Personality Disorders, 13, 142–151. 1999
  • R. West. The psychology of security. Communications of the ACM 51(4). Pages 34-40, 2008.
There are 12 citations in total.

Details

Primary Language English
Journal Section Research Article
Authors

Rasha Ibrahim

Publication Date June 29, 2015
Published in Issue Year 2015 Volume: 3 Issue: 3

Cite

APA Ibrahim, R. (2015). It’s all about me! The Influence of Personality on Susceptibility to Mobile Security Attacks. International Journal of Applied Mathematics Electronics and Computers, 3(3), 194-199. https://doi.org/10.18100/ijamec.47036
AMA Ibrahim R. It’s all about me! The Influence of Personality on Susceptibility to Mobile Security Attacks. International Journal of Applied Mathematics Electronics and Computers. June 2015;3(3):194-199. doi:10.18100/ijamec.47036
Chicago Ibrahim, Rasha. “It’s All about Me! The Influence of Personality on Susceptibility to Mobile Security Attacks”. International Journal of Applied Mathematics Electronics and Computers 3, no. 3 (June 2015): 194-99. https://doi.org/10.18100/ijamec.47036.
EndNote Ibrahim R (June 1, 2015) It’s all about me! The Influence of Personality on Susceptibility to Mobile Security Attacks. International Journal of Applied Mathematics Electronics and Computers 3 3 194–199.
IEEE R. Ibrahim, “It’s all about me! The Influence of Personality on Susceptibility to Mobile Security Attacks”, International Journal of Applied Mathematics Electronics and Computers, vol. 3, no. 3, pp. 194–199, 2015, doi: 10.18100/ijamec.47036.
ISNAD Ibrahim, Rasha. “It’s All about Me! The Influence of Personality on Susceptibility to Mobile Security Attacks”. International Journal of Applied Mathematics Electronics and Computers 3/3 (June 2015), 194-199. https://doi.org/10.18100/ijamec.47036.
JAMA Ibrahim R. It’s all about me! The Influence of Personality on Susceptibility to Mobile Security Attacks. International Journal of Applied Mathematics Electronics and Computers. 2015;3:194–199.
MLA Ibrahim, Rasha. “It’s All about Me! The Influence of Personality on Susceptibility to Mobile Security Attacks”. International Journal of Applied Mathematics Electronics and Computers, vol. 3, no. 3, 2015, pp. 194-9, doi:10.18100/ijamec.47036.
Vancouver Ibrahim R. It’s all about me! The Influence of Personality on Susceptibility to Mobile Security Attacks. International Journal of Applied Mathematics Electronics and Computers. 2015;3(3):194-9.

Cited By

Creative Commons License

Address: Selcuk University, Faculty of Technology 42031 Selcuklu, Konya/TURKEY.