On the efficacy of smartphone security: A critical analysis of modifications in business students’ practices over time
•We survey and assess undergraduate student use of smartphone security practices in 2014.•We compare our results to 2011 results of the same survey instrument.•Students are complacent in following appropriate security practices.•Students must be made more aware of security issues and should be taugh...
Gespeichert in:
Veröffentlicht in: | International journal of information management 2015-10, Vol.35 (5), p.561-571 |
---|---|
Hauptverfasser: | , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 571 |
---|---|
container_issue | 5 |
container_start_page | 561 |
container_title | International journal of information management |
container_volume | 35 |
creator | Jones, Beth H. Chin, Amita Goyal |
description | •We survey and assess undergraduate student use of smartphone security practices in 2014.•We compare our results to 2011 results of the same survey instrument.•Students are complacent in following appropriate security practices.•Students must be made more aware of security issues and should be taught the precautions that they can take to protect their information and thwart nefarious activities Welfare effects depend on ex-ante or ex-post assumptions about quality information.•Instituting training and awareness education may help curtail the complacent behavior.
Perhaps no prior technology has more expediently and more ubiquitously usurped the landscape than mobile technology. Smartphones are used for social interactions, financial transactions, to increase employee productivity, and in academic pursuits. Smartphones have established omnipresence on college campuses, where students are using them for all aspects of their daily life. With such significant usage, concerns for the security of data and personal information become paramount. This study employs a survey instrument to assess undergraduate student use of smartphone security practices in 2014, and compares this behavior to results from the same survey instrument when administered in 2011. Results indicate a worrisome trend, for while more students have smartphones and a higher percentage use them for financial purposes, risky behavior continues and, in several cases, has worsened. When good security practices are not followed, their efficacy is diminished and users are left more vulnerable than ever. |
doi_str_mv | 10.1016/j.ijinfomgt.2015.06.003 |
format | Article |
fullrecord | <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_miscellaneous_1730072586</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><els_id>S0268401215000596</els_id><sourcerecordid>3781708761</sourcerecordid><originalsourceid>FETCH-LOGICAL-c376t-f2a4f92573ee697b3097b60c9420fa3d546391982d8bc3cee43f26843ca178103</originalsourceid><addsrcrecordid>eNqFkb-O1DAQhyMEEsvBM2CJhia5sZ3EWbrViX_SSddAbXmdMecosRePc2I7XoPX40lwtIjiGprxFN830s-_qnrNoeHA--up8ZMPLi7fciOAdw30DYB8Uu34oGTdKlBPqx2Ifqhb4OJ59YJoAuAKOrGrftwFlu-RoXPeGntm0TFaTMqn-xiQEdo1-Xx-xw7MlqUwMzPBzGfytLFLHP1mZh8DMR_YcSUfkIhRXkcMmX7__MVOydjiYlEeMLHsF3xZPXNmJnz1972qvn54_-XmU3179_HzzeG2tlL1uXbCtG4vOiUR-706SiijB7tvBTgjx67t5Z7vBzEORystYitdidpKa7gaOMir6u3l7inF7ytS1osni_NsAsaVNFcSQIlu6Av65hE6xTWVsBsFHZcd56JQ6kLZFIkSOn1KvvzYWXPQWyN60v8a0VsjGnpdGinm4WJiyfvgMWmyHoPF0Se0WY_R__fGH7-Kmq0</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>1705135112</pqid></control><display><type>article</type><title>On the efficacy of smartphone security: A critical analysis of modifications in business students’ practices over time</title><source>Elsevier ScienceDirect Journals Complete</source><creator>Jones, Beth H. ; Chin, Amita Goyal</creator><creatorcontrib>Jones, Beth H. ; Chin, Amita Goyal</creatorcontrib><description>•We survey and assess undergraduate student use of smartphone security practices in 2014.•We compare our results to 2011 results of the same survey instrument.•Students are complacent in following appropriate security practices.•Students must be made more aware of security issues and should be taught the precautions that they can take to protect their information and thwart nefarious activities Welfare effects depend on ex-ante or ex-post assumptions about quality information.•Instituting training and awareness education may help curtail the complacent behavior.
Perhaps no prior technology has more expediently and more ubiquitously usurped the landscape than mobile technology. Smartphones are used for social interactions, financial transactions, to increase employee productivity, and in academic pursuits. Smartphones have established omnipresence on college campuses, where students are using them for all aspects of their daily life. With such significant usage, concerns for the security of data and personal information become paramount. This study employs a survey instrument to assess undergraduate student use of smartphone security practices in 2014, and compares this behavior to results from the same survey instrument when administered in 2011. Results indicate a worrisome trend, for while more students have smartphones and a higher percentage use them for financial purposes, risky behavior continues and, in several cases, has worsened. When good security practices are not followed, their efficacy is diminished and users are left more vulnerable than ever.</description><identifier>ISSN: 0268-4012</identifier><identifier>EISSN: 1873-4707</identifier><identifier>DOI: 10.1016/j.ijinfomgt.2015.06.003</identifier><language>eng</language><publisher>Kidlington: Elsevier Ltd</publisher><subject>Business ; Business students ; Cell phones ; College students ; Computer information security ; Data integrity ; Effectiveness ; Gender ; Landscapes ; Mobile devices ; Personal information ; Productivity ; Smartphone security ; Smartphones ; Social aspects ; Students ; Studies ; User behavior</subject><ispartof>International journal of information management, 2015-10, Vol.35 (5), p.561-571</ispartof><rights>2015 Elsevier Ltd</rights><rights>Copyright Elsevier Science Ltd. Oct 2015</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c376t-f2a4f92573ee697b3097b60c9420fa3d546391982d8bc3cee43f26843ca178103</citedby><cites>FETCH-LOGICAL-c376t-f2a4f92573ee697b3097b60c9420fa3d546391982d8bc3cee43f26843ca178103</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://dx.doi.org/10.1016/j.ijinfomgt.2015.06.003$$EHTML$$P50$$Gelsevier$$H</linktohtml><link.rule.ids>314,776,780,3536,27903,27904,45974</link.rule.ids></links><search><creatorcontrib>Jones, Beth H.</creatorcontrib><creatorcontrib>Chin, Amita Goyal</creatorcontrib><title>On the efficacy of smartphone security: A critical analysis of modifications in business students’ practices over time</title><title>International journal of information management</title><description>•We survey and assess undergraduate student use of smartphone security practices in 2014.•We compare our results to 2011 results of the same survey instrument.•Students are complacent in following appropriate security practices.•Students must be made more aware of security issues and should be taught the precautions that they can take to protect their information and thwart nefarious activities Welfare effects depend on ex-ante or ex-post assumptions about quality information.•Instituting training and awareness education may help curtail the complacent behavior.
Perhaps no prior technology has more expediently and more ubiquitously usurped the landscape than mobile technology. Smartphones are used for social interactions, financial transactions, to increase employee productivity, and in academic pursuits. Smartphones have established omnipresence on college campuses, where students are using them for all aspects of their daily life. With such significant usage, concerns for the security of data and personal information become paramount. This study employs a survey instrument to assess undergraduate student use of smartphone security practices in 2014, and compares this behavior to results from the same survey instrument when administered in 2011. Results indicate a worrisome trend, for while more students have smartphones and a higher percentage use them for financial purposes, risky behavior continues and, in several cases, has worsened. When good security practices are not followed, their efficacy is diminished and users are left more vulnerable than ever.</description><subject>Business</subject><subject>Business students</subject><subject>Cell phones</subject><subject>College students</subject><subject>Computer information security</subject><subject>Data integrity</subject><subject>Effectiveness</subject><subject>Gender</subject><subject>Landscapes</subject><subject>Mobile devices</subject><subject>Personal information</subject><subject>Productivity</subject><subject>Smartphone security</subject><subject>Smartphones</subject><subject>Social aspects</subject><subject>Students</subject><subject>Studies</subject><subject>User behavior</subject><issn>0268-4012</issn><issn>1873-4707</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2015</creationdate><recordtype>article</recordtype><recordid>eNqFkb-O1DAQhyMEEsvBM2CJhia5sZ3EWbrViX_SSddAbXmdMecosRePc2I7XoPX40lwtIjiGprxFN830s-_qnrNoeHA--up8ZMPLi7fciOAdw30DYB8Uu34oGTdKlBPqx2Ifqhb4OJ59YJoAuAKOrGrftwFlu-RoXPeGntm0TFaTMqn-xiQEdo1-Xx-xw7MlqUwMzPBzGfytLFLHP1mZh8DMR_YcSUfkIhRXkcMmX7__MVOydjiYlEeMLHsF3xZPXNmJnz1972qvn54_-XmU3179_HzzeG2tlL1uXbCtG4vOiUR-706SiijB7tvBTgjx67t5Z7vBzEORystYitdidpKa7gaOMir6u3l7inF7ytS1osni_NsAsaVNFcSQIlu6Av65hE6xTWVsBsFHZcd56JQ6kLZFIkSOn1KvvzYWXPQWyN60v8a0VsjGnpdGinm4WJiyfvgMWmyHoPF0Se0WY_R__fGH7-Kmq0</recordid><startdate>201510</startdate><enddate>201510</enddate><creator>Jones, Beth H.</creator><creator>Chin, Amita Goyal</creator><general>Elsevier Ltd</general><general>Elsevier Science Ltd</general><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>8FD</scope><scope>E3H</scope><scope>F2A</scope><scope>JQ2</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><scope>7SP</scope></search><sort><creationdate>201510</creationdate><title>On the efficacy of smartphone security: A critical analysis of modifications in business students’ practices over time</title><author>Jones, Beth H. ; Chin, Amita Goyal</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c376t-f2a4f92573ee697b3097b60c9420fa3d546391982d8bc3cee43f26843ca178103</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2015</creationdate><topic>Business</topic><topic>Business students</topic><topic>Cell phones</topic><topic>College students</topic><topic>Computer information security</topic><topic>Data integrity</topic><topic>Effectiveness</topic><topic>Gender</topic><topic>Landscapes</topic><topic>Mobile devices</topic><topic>Personal information</topic><topic>Productivity</topic><topic>Smartphone security</topic><topic>Smartphones</topic><topic>Social aspects</topic><topic>Students</topic><topic>Studies</topic><topic>User behavior</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Jones, Beth H.</creatorcontrib><creatorcontrib>Chin, Amita Goyal</creatorcontrib><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Technology Research Database</collection><collection>Library & Information Sciences Abstracts (LISA)</collection><collection>Library & Information Science Abstracts (LISA)</collection><collection>ProQuest Computer Science Collection</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><collection>Electronics & Communications Abstracts</collection><jtitle>International journal of information management</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Jones, Beth H.</au><au>Chin, Amita Goyal</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>On the efficacy of smartphone security: A critical analysis of modifications in business students’ practices over time</atitle><jtitle>International journal of information management</jtitle><date>2015-10</date><risdate>2015</risdate><volume>35</volume><issue>5</issue><spage>561</spage><epage>571</epage><pages>561-571</pages><issn>0268-4012</issn><eissn>1873-4707</eissn><abstract>•We survey and assess undergraduate student use of smartphone security practices in 2014.•We compare our results to 2011 results of the same survey instrument.•Students are complacent in following appropriate security practices.•Students must be made more aware of security issues and should be taught the precautions that they can take to protect their information and thwart nefarious activities Welfare effects depend on ex-ante or ex-post assumptions about quality information.•Instituting training and awareness education may help curtail the complacent behavior.
Perhaps no prior technology has more expediently and more ubiquitously usurped the landscape than mobile technology. Smartphones are used for social interactions, financial transactions, to increase employee productivity, and in academic pursuits. Smartphones have established omnipresence on college campuses, where students are using them for all aspects of their daily life. With such significant usage, concerns for the security of data and personal information become paramount. This study employs a survey instrument to assess undergraduate student use of smartphone security practices in 2014, and compares this behavior to results from the same survey instrument when administered in 2011. Results indicate a worrisome trend, for while more students have smartphones and a higher percentage use them for financial purposes, risky behavior continues and, in several cases, has worsened. When good security practices are not followed, their efficacy is diminished and users are left more vulnerable than ever.</abstract><cop>Kidlington</cop><pub>Elsevier Ltd</pub><doi>10.1016/j.ijinfomgt.2015.06.003</doi><tpages>11</tpages></addata></record> |
fulltext | fulltext |
identifier | ISSN: 0268-4012 |
ispartof | International journal of information management, 2015-10, Vol.35 (5), p.561-571 |
issn | 0268-4012 1873-4707 |
language | eng |
recordid | cdi_proquest_miscellaneous_1730072586 |
source | Elsevier ScienceDirect Journals Complete |
subjects | Business Business students Cell phones College students Computer information security Data integrity Effectiveness Gender Landscapes Mobile devices Personal information Productivity Smartphone security Smartphones Social aspects Students Studies User behavior |
title | On the efficacy of smartphone security: A critical analysis of modifications in business students’ practices over time |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-22T19%3A27%3A15IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=On%20the%20efficacy%20of%20smartphone%20security:%20A%20critical%20analysis%20of%20modifications%20in%20business%20students%E2%80%99%20practices%20over%20time&rft.jtitle=International%20journal%20of%20information%20management&rft.au=Jones,%20Beth%20H.&rft.date=2015-10&rft.volume=35&rft.issue=5&rft.spage=561&rft.epage=571&rft.pages=561-571&rft.issn=0268-4012&rft.eissn=1873-4707&rft_id=info:doi/10.1016/j.ijinfomgt.2015.06.003&rft_dat=%3Cproquest_cross%3E3781708761%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=1705135112&rft_id=info:pmid/&rft_els_id=S0268401215000596&rfr_iscdi=true |