Browse > Article
http://dx.doi.org/10.5392/IJoC.2015.11.3.014

Analysis of a Security Survey for Smartphones  

Nam, Sang-Zo (Department of Service Management Mokwon University)
Publication Information
Abstract
This paper presents the findings of a study in which students at a four-year university were surveyed in an effort to analyze and verify the differences in perceived security awareness, security-related activities, and security damage experiences when using smartphones, based on demographic variables such as gender, academic year, and college major. Moreover, the perceived security awareness items and security-related activities were tested to verify whether they affect the students' security damage experience. Based on survey data obtained from 592 participants, the findings indicate that demographic differences exist for some of the survey question items. The majority of the male students replied "affirmative" to some of the questions related to perceived security awareness and "enthusiastic" to questions about security-related activities. Some academic year differences exist in the responses to perceived security awareness and security-related activities. On the whole, freshmen had the lowest level of security awareness. Security alert seems to be very high in sophomores, but it decreases as the students become older. While the difference in perceived security awareness based on college major was not significant, the difference in some security-related activities based on that variable was significant. No significant difference was found in some items such as storing private information in smartphones and frequency of implementation of security applications based on the college major variable. However, differences among the college majors were verified in clicking hyperlinks in unknown SMS messages and in the number of security applications in smartphones. No differences were found in security damage experiences based on gender, academic year, and college major. Security awareness items had no impact on the experience of security damage in smartphones. However, some security activities, such as storing resident registration numbers in a smartphone, clicking hyperlinks in unknown SMS messages, the number of security apps in a smartphone, and the frequency of implementation of security apps did have an impact on security damage.
Keywords
Smartphone; Security;
Citations & Related Records
Times Cited By KSCI : 5  (Citation Analysis)
연도 인용수 순위
1 Y. H. Lee, H. S. Kwon, and S. J. Kim, “A Proposal for Security Enforcement of Smartphone and Mobile Office,” IT & SOCIETY, vol. 26, 2010, pp. 29-34.
2 Y. S. Lee, “Security Threat and Response,” Journal of KOSHAM, vol. 11, no. 3, 2011, pp. 52-58.
3 H. C. Lee, J. H. Jung, S. H. Kim, and J. H. Lee, “Security Technology Trend,” Korea Information Processing Society Review, vol. 17, no. 3, 2010, pp. 61-72.   DOI
4 I. H. Park, E. D. Lee, and S. W. Seo, “Analysis of Security Awareness Survey for Improvement of Research Information Security,” Proc. KASBA Annual Conference 2009, 2009, pp. 1-7.
5 I. H. Park, S. W. Kim, and S. W. Seo, “Improving Research Information Security in Academic Institutes through the Analysis of Security Awareness and Activities,” Journal of Korea Institute of Information Security and Cryptology, vol. 20, no. 2, 2010, pp. 91-108.
6 J. Kim and D. Kang, “The Effects of Security Policies, Security Awareness and Individual Characteristics on Password Security Effectiveness,” Journal of Korea Institute of Information Security and Cryptology, vol. 18, no. 4, 2008, pp. 123-133.
7 S. W. Ha and H. J. Kim, “The Effects of User’s Security Awareness on Password Security Behavior,” Journal of Digital Contents Society, vol. 14, no. 2, 2013, pp. 179-189.   DOI
8 S. Z. Nam, “Evaluation of University Students' Utilization of Smartphone,” International Journal of Smart Home, vol. 7, no. 4, 2013, pp. 175-182.
9 K. H. Hwang, Y. S. Yoo, and O. H. Cho, “Smartphone Overuse and Upper Extremity Pain, Anxiety, Depression, and Interpersonal Relationships among College Students,” The Journal of the Korea Contents Association, vol. 12, no. 10, 2012, pp. 365-375.   DOI
10 J. M. Lee and J. H. Park, “Effect of Smart-phone Use on Performance,” The Journal of the Korea Contents Association, vol. 13, no. 2, 2013, pp. 451-459.   DOI
11 B. K. Seo, “Adult Internet Addiction and Smartphone Use Characteristics,” The Journal of the Korea Contents Association, vol. 14, no. 1, 2014, pp. 305-317.   DOI
12 C. Jeon, Y. Cho, and J. Hong, “Detecting Collaborative Privacy Information Leaks on Android Applications,” Proc. Korea Computer Congress 2012, vol. 39, no. 1, 2012, pp. 92-94.
13 http://teamcrak.tistory.com/270
14 http://www.zdnet.com/blog/security/pwn2own-2010-iphone-hacked-sms-database-hijacked/5836.
15 McAfee, Inc. Threat Statistics, McAfee Labs Threats Report, Feb. 2015, pp. 35-40.
16 S. K. Kim, “Show Interest in Smartphone Security,” KLID Local Information Magazine, vol. 71, 2011, pp. 12-15.
17 S. K. Jang, “Security Threats in Smartphone,” Korea Information Processing Society Review, vol. 17, no. 2, 2010, pp. 64-69.
18 S. W. Na, Y. H. Lee, and S. J. Jee, “Security Issue and Confrontational Strategy,” IT & SOCIETY, vol. 26, 2010, pp. 1-28.