On the efficacy of smartphone security: A critical analysis of modifications in business students’ practices over time

•We survey and assess undergraduate student use of smartphone security practices in 2014.•We compare our results to 2011 results of the same survey instrument.•Students are complacent in following appropriate security practices.•Students must be made more aware of security issues and should be taugh...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:International journal of information management 2015-10, Vol.35 (5), p.561-571
Hauptverfasser: Jones, Beth H., Chin, Amita Goyal
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 571
container_issue 5
container_start_page 561
container_title International journal of information management
container_volume 35
creator Jones, Beth H.
Chin, Amita Goyal
description •We survey and assess undergraduate student use of smartphone security practices in 2014.•We compare our results to 2011 results of the same survey instrument.•Students are complacent in following appropriate security practices.•Students must be made more aware of security issues and should be taught the precautions that they can take to protect their information and thwart nefarious activities Welfare effects depend on ex-ante or ex-post assumptions about quality information.•Instituting training and awareness education may help curtail the complacent behavior. Perhaps no prior technology has more expediently and more ubiquitously usurped the landscape than mobile technology. Smartphones are used for social interactions, financial transactions, to increase employee productivity, and in academic pursuits. Smartphones have established omnipresence on college campuses, where students are using them for all aspects of their daily life. With such significant usage, concerns for the security of data and personal information become paramount. This study employs a survey instrument to assess undergraduate student use of smartphone security practices in 2014, and compares this behavior to results from the same survey instrument when administered in 2011. Results indicate a worrisome trend, for while more students have smartphones and a higher percentage use them for financial purposes, risky behavior continues and, in several cases, has worsened. When good security practices are not followed, their efficacy is diminished and users are left more vulnerable than ever.
doi_str_mv 10.1016/j.ijinfomgt.2015.06.003
format Article
fullrecord <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_miscellaneous_1730072586</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><els_id>S0268401215000596</els_id><sourcerecordid>3781708761</sourcerecordid><originalsourceid>FETCH-LOGICAL-c376t-f2a4f92573ee697b3097b60c9420fa3d546391982d8bc3cee43f26843ca178103</originalsourceid><addsrcrecordid>eNqFkb-O1DAQhyMEEsvBM2CJhia5sZ3EWbrViX_SSddAbXmdMecosRePc2I7XoPX40lwtIjiGprxFN830s-_qnrNoeHA--up8ZMPLi7fciOAdw30DYB8Uu34oGTdKlBPqx2Ifqhb4OJ59YJoAuAKOrGrftwFlu-RoXPeGntm0TFaTMqn-xiQEdo1-Xx-xw7MlqUwMzPBzGfytLFLHP1mZh8DMR_YcSUfkIhRXkcMmX7__MVOydjiYlEeMLHsF3xZPXNmJnz1972qvn54_-XmU3179_HzzeG2tlL1uXbCtG4vOiUR-706SiijB7tvBTgjx67t5Z7vBzEORystYitdidpKa7gaOMir6u3l7inF7ytS1osni_NsAsaVNFcSQIlu6Av65hE6xTWVsBsFHZcd56JQ6kLZFIkSOn1KvvzYWXPQWyN60v8a0VsjGnpdGinm4WJiyfvgMWmyHoPF0Se0WY_R__fGH7-Kmq0</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>1705135112</pqid></control><display><type>article</type><title>On the efficacy of smartphone security: A critical analysis of modifications in business students’ practices over time</title><source>Elsevier ScienceDirect Journals Complete</source><creator>Jones, Beth H. ; Chin, Amita Goyal</creator><creatorcontrib>Jones, Beth H. ; Chin, Amita Goyal</creatorcontrib><description>•We survey and assess undergraduate student use of smartphone security practices in 2014.•We compare our results to 2011 results of the same survey instrument.•Students are complacent in following appropriate security practices.•Students must be made more aware of security issues and should be taught the precautions that they can take to protect their information and thwart nefarious activities Welfare effects depend on ex-ante or ex-post assumptions about quality information.•Instituting training and awareness education may help curtail the complacent behavior. Perhaps no prior technology has more expediently and more ubiquitously usurped the landscape than mobile technology. Smartphones are used for social interactions, financial transactions, to increase employee productivity, and in academic pursuits. Smartphones have established omnipresence on college campuses, where students are using them for all aspects of their daily life. With such significant usage, concerns for the security of data and personal information become paramount. This study employs a survey instrument to assess undergraduate student use of smartphone security practices in 2014, and compares this behavior to results from the same survey instrument when administered in 2011. Results indicate a worrisome trend, for while more students have smartphones and a higher percentage use them for financial purposes, risky behavior continues and, in several cases, has worsened. When good security practices are not followed, their efficacy is diminished and users are left more vulnerable than ever.</description><identifier>ISSN: 0268-4012</identifier><identifier>EISSN: 1873-4707</identifier><identifier>DOI: 10.1016/j.ijinfomgt.2015.06.003</identifier><language>eng</language><publisher>Kidlington: Elsevier Ltd</publisher><subject>Business ; Business students ; Cell phones ; College students ; Computer information security ; Data integrity ; Effectiveness ; Gender ; Landscapes ; Mobile devices ; Personal information ; Productivity ; Smartphone security ; Smartphones ; Social aspects ; Students ; Studies ; User behavior</subject><ispartof>International journal of information management, 2015-10, Vol.35 (5), p.561-571</ispartof><rights>2015 Elsevier Ltd</rights><rights>Copyright Elsevier Science Ltd. Oct 2015</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c376t-f2a4f92573ee697b3097b60c9420fa3d546391982d8bc3cee43f26843ca178103</citedby><cites>FETCH-LOGICAL-c376t-f2a4f92573ee697b3097b60c9420fa3d546391982d8bc3cee43f26843ca178103</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://dx.doi.org/10.1016/j.ijinfomgt.2015.06.003$$EHTML$$P50$$Gelsevier$$H</linktohtml><link.rule.ids>314,776,780,3536,27903,27904,45974</link.rule.ids></links><search><creatorcontrib>Jones, Beth H.</creatorcontrib><creatorcontrib>Chin, Amita Goyal</creatorcontrib><title>On the efficacy of smartphone security: A critical analysis of modifications in business students’ practices over time</title><title>International journal of information management</title><description>•We survey and assess undergraduate student use of smartphone security practices in 2014.•We compare our results to 2011 results of the same survey instrument.•Students are complacent in following appropriate security practices.•Students must be made more aware of security issues and should be taught the precautions that they can take to protect their information and thwart nefarious activities Welfare effects depend on ex-ante or ex-post assumptions about quality information.•Instituting training and awareness education may help curtail the complacent behavior. Perhaps no prior technology has more expediently and more ubiquitously usurped the landscape than mobile technology. Smartphones are used for social interactions, financial transactions, to increase employee productivity, and in academic pursuits. Smartphones have established omnipresence on college campuses, where students are using them for all aspects of their daily life. With such significant usage, concerns for the security of data and personal information become paramount. This study employs a survey instrument to assess undergraduate student use of smartphone security practices in 2014, and compares this behavior to results from the same survey instrument when administered in 2011. Results indicate a worrisome trend, for while more students have smartphones and a higher percentage use them for financial purposes, risky behavior continues and, in several cases, has worsened. When good security practices are not followed, their efficacy is diminished and users are left more vulnerable than ever.</description><subject>Business</subject><subject>Business students</subject><subject>Cell phones</subject><subject>College students</subject><subject>Computer information security</subject><subject>Data integrity</subject><subject>Effectiveness</subject><subject>Gender</subject><subject>Landscapes</subject><subject>Mobile devices</subject><subject>Personal information</subject><subject>Productivity</subject><subject>Smartphone security</subject><subject>Smartphones</subject><subject>Social aspects</subject><subject>Students</subject><subject>Studies</subject><subject>User behavior</subject><issn>0268-4012</issn><issn>1873-4707</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2015</creationdate><recordtype>article</recordtype><recordid>eNqFkb-O1DAQhyMEEsvBM2CJhia5sZ3EWbrViX_SSddAbXmdMecosRePc2I7XoPX40lwtIjiGprxFN830s-_qnrNoeHA--up8ZMPLi7fciOAdw30DYB8Uu34oGTdKlBPqx2Ifqhb4OJ59YJoAuAKOrGrftwFlu-RoXPeGntm0TFaTMqn-xiQEdo1-Xx-xw7MlqUwMzPBzGfytLFLHP1mZh8DMR_YcSUfkIhRXkcMmX7__MVOydjiYlEeMLHsF3xZPXNmJnz1972qvn54_-XmU3179_HzzeG2tlL1uXbCtG4vOiUR-706SiijB7tvBTgjx67t5Z7vBzEORystYitdidpKa7gaOMir6u3l7inF7ytS1osni_NsAsaVNFcSQIlu6Av65hE6xTWVsBsFHZcd56JQ6kLZFIkSOn1KvvzYWXPQWyN60v8a0VsjGnpdGinm4WJiyfvgMWmyHoPF0Se0WY_R__fGH7-Kmq0</recordid><startdate>201510</startdate><enddate>201510</enddate><creator>Jones, Beth H.</creator><creator>Chin, Amita Goyal</creator><general>Elsevier Ltd</general><general>Elsevier Science Ltd</general><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>8FD</scope><scope>E3H</scope><scope>F2A</scope><scope>JQ2</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><scope>7SP</scope></search><sort><creationdate>201510</creationdate><title>On the efficacy of smartphone security: A critical analysis of modifications in business students’ practices over time</title><author>Jones, Beth H. ; Chin, Amita Goyal</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c376t-f2a4f92573ee697b3097b60c9420fa3d546391982d8bc3cee43f26843ca178103</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2015</creationdate><topic>Business</topic><topic>Business students</topic><topic>Cell phones</topic><topic>College students</topic><topic>Computer information security</topic><topic>Data integrity</topic><topic>Effectiveness</topic><topic>Gender</topic><topic>Landscapes</topic><topic>Mobile devices</topic><topic>Personal information</topic><topic>Productivity</topic><topic>Smartphone security</topic><topic>Smartphones</topic><topic>Social aspects</topic><topic>Students</topic><topic>Studies</topic><topic>User behavior</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Jones, Beth H.</creatorcontrib><creatorcontrib>Chin, Amita Goyal</creatorcontrib><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Technology Research Database</collection><collection>Library &amp; Information Sciences Abstracts (LISA)</collection><collection>Library &amp; Information Science Abstracts (LISA)</collection><collection>ProQuest Computer Science Collection</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts – Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><collection>Electronics &amp; Communications Abstracts</collection><jtitle>International journal of information management</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Jones, Beth H.</au><au>Chin, Amita Goyal</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>On the efficacy of smartphone security: A critical analysis of modifications in business students’ practices over time</atitle><jtitle>International journal of information management</jtitle><date>2015-10</date><risdate>2015</risdate><volume>35</volume><issue>5</issue><spage>561</spage><epage>571</epage><pages>561-571</pages><issn>0268-4012</issn><eissn>1873-4707</eissn><abstract>•We survey and assess undergraduate student use of smartphone security practices in 2014.•We compare our results to 2011 results of the same survey instrument.•Students are complacent in following appropriate security practices.•Students must be made more aware of security issues and should be taught the precautions that they can take to protect their information and thwart nefarious activities Welfare effects depend on ex-ante or ex-post assumptions about quality information.•Instituting training and awareness education may help curtail the complacent behavior. Perhaps no prior technology has more expediently and more ubiquitously usurped the landscape than mobile technology. Smartphones are used for social interactions, financial transactions, to increase employee productivity, and in academic pursuits. Smartphones have established omnipresence on college campuses, where students are using them for all aspects of their daily life. With such significant usage, concerns for the security of data and personal information become paramount. This study employs a survey instrument to assess undergraduate student use of smartphone security practices in 2014, and compares this behavior to results from the same survey instrument when administered in 2011. Results indicate a worrisome trend, for while more students have smartphones and a higher percentage use them for financial purposes, risky behavior continues and, in several cases, has worsened. When good security practices are not followed, their efficacy is diminished and users are left more vulnerable than ever.</abstract><cop>Kidlington</cop><pub>Elsevier Ltd</pub><doi>10.1016/j.ijinfomgt.2015.06.003</doi><tpages>11</tpages></addata></record>
fulltext fulltext
identifier ISSN: 0268-4012
ispartof International journal of information management, 2015-10, Vol.35 (5), p.561-571
issn 0268-4012
1873-4707
language eng
recordid cdi_proquest_miscellaneous_1730072586
source Elsevier ScienceDirect Journals Complete
subjects Business
Business students
Cell phones
College students
Computer information security
Data integrity
Effectiveness
Gender
Landscapes
Mobile devices
Personal information
Productivity
Smartphone security
Smartphones
Social aspects
Students
Studies
User behavior
title On the efficacy of smartphone security: A critical analysis of modifications in business students’ practices over time
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-22T19%3A27%3A15IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=On%20the%20efficacy%20of%20smartphone%20security:%20A%20critical%20analysis%20of%20modifications%20in%20business%20students%E2%80%99%20practices%20over%20time&rft.jtitle=International%20journal%20of%20information%20management&rft.au=Jones,%20Beth%20H.&rft.date=2015-10&rft.volume=35&rft.issue=5&rft.spage=561&rft.epage=571&rft.pages=561-571&rft.issn=0268-4012&rft.eissn=1873-4707&rft_id=info:doi/10.1016/j.ijinfomgt.2015.06.003&rft_dat=%3Cproquest_cross%3E3781708761%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=1705135112&rft_id=info:pmid/&rft_els_id=S0268401215000596&rfr_iscdi=true