The Influence of Students' Characteristics on Mobile Device Security Measures

This study aimed at investigating the influence of students' characteristics majors, maturity, and gender on mobile device security practices in the context of a developing country. Focusing on graduate and undergraduate students from both public and private universities, participants' characteristics were measured against three approaches of mobile devices security practices user-behavior and activities, device settings, and disaster recovery. The sample consisted of 375 students from two public universities and three private university colleges. The results found that Technology and Engineering students differ statistically from Business and Arts students in terms of mobile device settings and disaster recovery practices. The undergraduate students were less engaged in risky activities with their devices compared with the graduate students. Moreover, the younger students were more cautious than the older students regarding user-behavior and device settings. Finally, female students were more negligent when it comes to setting the devices to militate against security threats.

[1]  David A. Wagner,et al.  Android permissions: user attention, comprehension, and behavior , 2012, SOUPS.

[2]  Lorrie Faith Cranor,et al.  A Conundrum of Permissions: Installing Applications on an Android Smartphone , 2012, Financial Cryptography Workshops.

[3]  J. Lowell Mooney,et al.  Your Firm’s Mobile Devices: How Secure Are They? , 2011 .

[4]  Qing Hu,et al.  Future directions for behavioral information security research , 2013, Comput. Secur..

[5]  Alain Yee-Loong Chong,et al.  Understanding Mobile Commerce Continuance Intentions: An Empirical Analysis of Chinese Consumers , 2013, J. Comput. Inf. Syst..

[6]  Elizabeth C. Whipple,et al.  Third-year medical students’ knowledge of privacy and security issues concerning mobile devices , 2012, Medical teacher.

[7]  Ashutosh Mishra,et al.  Exploring the threats in Cell Phone as a Portable Storage Device , 2010 .

[8]  Craig C. Claybaugh,et al.  Professional Social Network Participation of Business School Graduates: Effects of University, Degree Type, and Gender , 2014, Int. J. Inf. Syst. Soc. Chang..

[9]  K. Scarfone,et al.  Guidelines for Managing the Security of Mobile Devices in the Enterprise , 2013 .

[10]  Scott Mensch,et al.  Information Security Activities of College Students: An Exploratory Study , 2011 .

[11]  Ken Munro Android scraping: accessing personal data on mobile devices , 2014, Netw. Secur..

[12]  Jon Friedman,et al.  Protecting data on mobile devices: A taxonomy of security threats to mobile computing and review of applicable defenses , 2008, Inf. Knowl. Syst. Manag..

[13]  Robert Miller,et al.  Online Social Networks: Student Perceptions and Behavior Across Four Countries , 2012, Int. J. Inf. Syst. Soc. Chang..

[14]  Kim-Kwang Raymond Choo,et al.  Always connected, but are smart mobile users getting more security savvy? A survey of smart mobile device users , 2014, Behav. Inf. Technol..

[15]  Ewuuk Lomo-David,et al.  Information Systems Security and Safety Measures: The Dichotomy between Students' Familiarity and Practice , 2009 .

[16]  R. Sitgreaves Psychometric theory (2nd ed.). , 1979 .

[17]  Margaret Tan,et al.  An investigation of students' perception of Bluetooth security , 2012, Inf. Manag. Comput. Secur..

[18]  Beth H. Jones,et al.  Risky business: Students and smartphones , 2014 .

[19]  Zoran Budimac,et al.  Wiki as a Tool of Choice for Students' Team Assignments , 2013, Int. J. Inf. Syst. Soc. Chang..

[20]  Mark A. Harris,et al.  The Need to Address Mobile Device Security in the Higher Education IT Curriculum , 2013, J. Inf. Syst. Educ..

[21]  R. Raisamo,et al.  Investigating students' behavioural intention to adopt and use mobile learning in higher education in East Africa , 2014 .

[22]  Geoffrey E. Mills,et al.  Educational Research: Competencies for Analysis and Application , 1995 .

[23]  S. E. Kruck,et al.  Empiracal Study of Students' Computer Security Practices/Perceptions , 2007, J. Comput. Inf. Syst..