BibTex RIS Kaynak Göster

It's all about me! The Influence of Personality on Susceptibility to Mobile Security Attacks

Yıl 2015, , 194 - 199, 29.06.2015
https://doi.org/10.18100/ijamec.47036

Öz

Mobile phones security is an emerging field of study. As the number of data-centric mobile phones grows, the industry experts expect them to face major security problems. We believe the first step to devise countermeasures for protecting users would be a comprehensive understanding of the mobile users’ perception of risk. We report on a qualitative grounded theory study to inspect such perception. The initial thematic analysis identified relationship between level of knowledge and security attitude. However, further grounded theory analysis returned in personality type taxonomy for exposure for mobile attacks in general and phishing attacks in particular. We confirm our findings by conducting the first naturalistic phishing experiment on mobile phones

Kaynakça

  • Informa Telecoms & Media report, London: Informa Telecoms & Media. 2009
  • D. Maslennikov. Mobile Malware Evolution: An Overview, Part 4". RetrievedJanuary , 2014 Available: http://securelist.com/large-slider/36350/mobile-malware-evolution-an-overview-part-4/
  • K. Dunham. Mobile Malware Attacks and defense. Syngress. 2008.
  • P. Cairns and A.L. Cox. Research Methods for Human-Interaction. Cambridge University Press. 2008.
  • J. Preece, Y. Roger and H. Sharp. Interaction Design beyond Human Computer Interaction, USA: John Wiley and Sons. 2002.
  • S. Love. Understanding mobile human computer interaction. ElSevier Ltd. 2005.
  • M. N. Marshall. Sampling for qualitative research. Oxford University Press. 1996
  • DH. Ingvar. Memory of the future": an essay on the temporal organization of conscious awareness. 1985
  • R. R. McCrae, A. Terracciano, P. T. Cost, and D. J. Ozer. Person-factors in the California adult Q-set: Closing the door on personality types? European Journal of Personality, 20, 29-44. 2006
  • A. Furnham, J. Crump. Personality Traits, Types, and Disorders: An Examination of the Relationship between Three Self-Report Measures. European Journal of Personality. 2005
  • L. Clark and D. Watson. Personality, disorder and personality disorder towards a more rational conceptualization. Journal of Personality Disorders, 13, 142–151. 1999
  • R. West. The psychology of security. Communications of the ACM 51(4). Pages 34-40, 2008.

Original Research Paper

Yıl 2015, , 194 - 199, 29.06.2015
https://doi.org/10.18100/ijamec.47036

Öz

Kaynakça

  • Informa Telecoms & Media report, London: Informa Telecoms & Media. 2009
  • D. Maslennikov. Mobile Malware Evolution: An Overview, Part 4". RetrievedJanuary , 2014 Available: http://securelist.com/large-slider/36350/mobile-malware-evolution-an-overview-part-4/
  • K. Dunham. Mobile Malware Attacks and defense. Syngress. 2008.
  • P. Cairns and A.L. Cox. Research Methods for Human-Interaction. Cambridge University Press. 2008.
  • J. Preece, Y. Roger and H. Sharp. Interaction Design beyond Human Computer Interaction, USA: John Wiley and Sons. 2002.
  • S. Love. Understanding mobile human computer interaction. ElSevier Ltd. 2005.
  • M. N. Marshall. Sampling for qualitative research. Oxford University Press. 1996
  • DH. Ingvar. Memory of the future": an essay on the temporal organization of conscious awareness. 1985
  • R. R. McCrae, A. Terracciano, P. T. Cost, and D. J. Ozer. Person-factors in the California adult Q-set: Closing the door on personality types? European Journal of Personality, 20, 29-44. 2006
  • A. Furnham, J. Crump. Personality Traits, Types, and Disorders: An Examination of the Relationship between Three Self-Report Measures. European Journal of Personality. 2005
  • L. Clark and D. Watson. Personality, disorder and personality disorder towards a more rational conceptualization. Journal of Personality Disorders, 13, 142–151. 1999
  • R. West. The psychology of security. Communications of the ACM 51(4). Pages 34-40, 2008.
Toplam 12 adet kaynakça vardır.

Ayrıntılar

Birincil Dil İngilizce
Bölüm Research Article
Yazarlar

Rasha Ibrahim

Yayımlanma Tarihi 29 Haziran 2015
Yayımlandığı Sayı Yıl 2015

Kaynak Göster

APA Ibrahim, R. (2015). It’s all about me! The Influence of Personality on Susceptibility to Mobile Security Attacks. International Journal of Applied Mathematics Electronics and Computers, 3(3), 194-199. https://doi.org/10.18100/ijamec.47036
AMA Ibrahim R. It’s all about me! The Influence of Personality on Susceptibility to Mobile Security Attacks. International Journal of Applied Mathematics Electronics and Computers. Haziran 2015;3(3):194-199. doi:10.18100/ijamec.47036
Chicago Ibrahim, Rasha. “It’s All about Me! The Influence of Personality on Susceptibility to Mobile Security Attacks”. International Journal of Applied Mathematics Electronics and Computers 3, sy. 3 (Haziran 2015): 194-99. https://doi.org/10.18100/ijamec.47036.
EndNote Ibrahim R (01 Haziran 2015) It’s all about me! The Influence of Personality on Susceptibility to Mobile Security Attacks. International Journal of Applied Mathematics Electronics and Computers 3 3 194–199.
IEEE R. Ibrahim, “It’s all about me! The Influence of Personality on Susceptibility to Mobile Security Attacks”, International Journal of Applied Mathematics Electronics and Computers, c. 3, sy. 3, ss. 194–199, 2015, doi: 10.18100/ijamec.47036.
ISNAD Ibrahim, Rasha. “It’s All about Me! The Influence of Personality on Susceptibility to Mobile Security Attacks”. International Journal of Applied Mathematics Electronics and Computers 3/3 (Haziran 2015), 194-199. https://doi.org/10.18100/ijamec.47036.
JAMA Ibrahim R. It’s all about me! The Influence of Personality on Susceptibility to Mobile Security Attacks. International Journal of Applied Mathematics Electronics and Computers. 2015;3:194–199.
MLA Ibrahim, Rasha. “It’s All about Me! The Influence of Personality on Susceptibility to Mobile Security Attacks”. International Journal of Applied Mathematics Electronics and Computers, c. 3, sy. 3, 2015, ss. 194-9, doi:10.18100/ijamec.47036.
Vancouver Ibrahim R. It’s all about me! The Influence of Personality on Susceptibility to Mobile Security Attacks. International Journal of Applied Mathematics Electronics and Computers. 2015;3(3):194-9.

Cited By