Risks Management of IT Smart Software and Hardware Controlling Daily Activities

The explosion of smart devices along with the numerous applications which connect us and make our life easier/embellish our life haven’t passed unnoticed by the malware creators. In the context of smart devices’ growing popularity while containing various important information and having low Security levels and many users, data theft for creating growing data bases seems to become a real “opportunity” for hackers. Our study aims to analyse the Security culture of smart devices users on a quota sample and to provide an idea about the dimension of risk associated with the personal smart devices’ lack of security, ways of managing their risk when used daily, along with improvement proposals for this state of affairs.

[1]  Karen A. Scarfone,et al.  Guidelines on Cell Phone and PDA Security , 2008 .

[2]  Nathan L. Clarke,et al.  Risk Assessment for Mobile Devices , 2011, TrustBus.

[3]  Wayne Jansen,et al.  Guidelines on Cell Phone and PDA Security: Recommendations of the National Institute of Standards and Technology , 2008 .

[4]  K. Faqih Exploring the Influence of Perceived Risk and Internet Self-Efficacy on Consumer Online Shopping Intentions: Perspective of Technology Acceptance Model , 2013 .

[5]  Yuval Elovici,et al.  Google Android: A Comprehensive Security Assessment , 2010, IEEE Security & Privacy.

[6]  Daniel Kardefelt-Winther,et al.  A conceptual and methodological critique of internet addiction research: Towards a model of compensatory internet use , 2014, Comput. Hum. Behav..

[7]  Jan H. P. Eloff,et al.  Information security: The moving target , 2009, Comput. Secur..

[8]  Dimitris Gritzalis,et al.  Smartphone security evaluation The malware attack case , 2011, Proceedings of the International Conference on Security and Cryptography.

[9]  Yajin Zhou,et al.  Systematic Detection of Capability Leaks in Stock Android Smartphones , 2012, NDSS.

[10]  Rolf Oppliger Security and Privacy in an Online World , 2011, Computer.

[11]  Tommi Laukkanen,et al.  Mapping the reasons for resistance to Internet banking: A means-end approach , 2007, Int. J. Inf. Manag..

[12]  Michael D. Reisig,et al.  Perceived Risk of Internet Theft Victimization , 2009 .

[13]  Tracey Caldwell Smart security , 2011, Netw. Secur..

[14]  Swarat Chaudhuri,et al.  A Study of Android Application Security , 2011, USENIX Security Symposium.

[15]  Troels Fibæk Bertel,et al.  From SMS to SNS: The Use of the Internet on the Mobile Phone among Young Danes , 2011 .

[16]  Monica Barbovschi Dealing with misuse of personal information online – Coping measures of children in the EU Kids Online III project , 2014 .

[17]  Dongho Won,et al.  A Practical Analysis of Smartphone Security , 2011, HCI.

[18]  Shashi Shekhar,et al.  QUIRE: Lightweight Provenance for Smart Phone Operating Systems , 2011, USENIX Security Symposium.

[19]  Felix C. Freiling,et al.  Mobile Security Catching Up? Revealing the Nuts and Bolts of the Security of Mobile Devices , 2011, 2011 IEEE Symposium on Security and Privacy.