INFORMATION TECHNOLOGY USAGE: QUANTITATIVE ANALYSIS OF SMARTPHONE SECURITY AWARENESS AND PRACTICES AMONG UNDERGRADUATE STUDENTS IN THE UNITED STATES
Keywords:Level of Practice of Security Measures of SP, SP Usage, Consideration of Future Consequences Level
Mobile phone usage is growing at an unprecedented rate. The ability to remain connected, the ease of smart phone use and declining mobile costs have allowed this technology to expand at a very high rate globally. The study aimed to quantitatively determine the reasons for inactive practice of security measures of smart-phone usage among college students in the United States. The study also examined the Consideration of Future Consequences (CFC) level in relation to the level of smart-phone security measures, determined the levels of security measures on smart-phone (SP) by users, and establish the relationship between CFC level and the levels of smart-phone security measures among college students. Using a quantitative research survey and simple random sampling procedure, the methodology focused on analyzing data through testing of hypotheses. The t-test, Pearson’s correlation, regression coefficients and their respective p-values. The results showed 69.8% of college students set PIN, password and screen lock on their smart phones while 74.8% were cautious with smart phone applications and 6.2% practiced on setting of security software including rooting services. On the other hand, 35.4% protected their SP data through encryption, 47.4% had data checks and security alert while 46.2% had set Bluetooth applications and 41.4% had used backup storage for sensitive data. Use of Biometrics or other security unknown security adoptions were not included in the study. The study also found that lack of knowledge about technology or applications for SP security, lack of security habits and practices, rigorous involvement of setting SP security details like backups, encryption, security software etc., assumptions that SP are security and tamper-proof as well as lack of training, guidance and after sale services on SP security are significant reasons for lack of security measures practices concerning smart-phone usage by college students.
Adebiaye, R. Mitigating Vulnerability Risks in Cyber security Using Predictive Measures, International Journal of Advanced Scientific Research & Development. 4(10/I), 2017, 12-26. DOI: https://doi.org/10.26836/ijasrd/2017/v4/i10/4106
Adebiaye, R. Interpreting User’s perceptions of Mobile Security Methods and Their Effectiveness, International Journal of Engineering and Advanced Technology. 6(4), 2017, 01-18.
Adebiaye, R., Alryalat, H., and Owusu, T. Perspectives for Cyber-Deterrence: A Quantitative Analysis of Cyber Threats and Attacks on Consumers, International Journal of Innovative Research in Science, Engineering and Technology. 5(7), 2016, 01-18.
Barcena, M. B. et al. Security Response: How safe is your quantified self? Journal of International Communication. 10(2), 2014, 180-211.
Center for Strategic and International Studies. Net Losses: Estimating the Global Cost of Cybercrime Economic impact of cybercrime II. CSIS. 2014.
Deloitte. Cybercrime: The current landscape and the hidden costs. Dubai: Deloitte Corporate Finance Limited. 2016.
Ellada, G. Cyber security in developing countries, a digital divide issue, Journal of International Communication. 20(2), 2014, 200-217. DOI: https://doi.org/10.1080/13216597.2014.954593
Fink, E. &Segall, L. Your TV might be watching you. CNN MONEY.2013. Available at: http://money.cnn.com/2013/08/01/technology/security/tv-hack/index.html
Graham D. Computer Security Incident Handling Guide (Trans: Computer Security Division ITL). NIST Special Publication. National Institute of Standards and Technology, Gaithersburg, MD. 2013.
Kothari, C.R. Research Methodology and Techniques; 2ndedition. New Delhi. New York. New Age International Publishers. 2004.
Krueger, A. and Casey, M.A. Focus Groups: A Practical Guide for Applied Research 3rd. ed. Thousand Oaks, C.A, Sage.2000.
Mugenda,O.M.and Mugenda,A.G. Research methods. Qualitative and quantitative approaches. Nairobi: Acts Press. 2003.
National Institute of Standards and Technology. Guidelines on Cell Phone and PDA Security (SP 800-124). 2014. Available at:http://csrc.nist.gov/publications/nistpubs/800-124/SP800-124.pdf
O’Brien, D. The Internet of Things: New Threats Emerge in a Connected World, SYMANTEC. 2014. Available at: www.symantec.com/connect/blogs/internet-thing-new-threats-emergeconnected-world
Orodho,J.A.Elements of Education and Social Sciences Research Methods.Nairobi.Bureau Education Research. Masola Publishers. 2004.
Peppet, S. R. Regulating the Internet of Things: First Steps Towards Managing Discrimination, Privacy, Security & Consent. 93(85), 2014, 115-126.
Ruggiero, P. and Foote, J. Cyber Threats to Mobile Phones. US Computer Emergency Readiness Team (US-CERT). Carnegie Mellon University, Washington USA. 2011.
Schneier, B. The Internet of Things Is Wildly Insecure And Often Unpatchable. 2014. Available at: http://www.wired.com/2014/01/theres-no-good-way-to-patch-the-internet-of-things-and-thatsa-huge-problem
Schneier, B. The Internet of Things Is Wildly Insecure and Often Unpatchable, SYMANTEC. (Version 1.1). 2014. Available at: DOI: 10.5281/zenodo.1218519 Http://www.ijetmr.com©International Journal of Engineering Technologies and Management Research  www.symantec.com/content/en/us/enterprise/media/security_response/whitepapers/how-safe-isyour-quantified-self.pdf
Tagert, A.C. Cyber security Challenges in Developing Nations. Dissertations. Paper 22. 2010.
Thomas, P. Despite the News, Your Cellphone is Not Yet Sending Spam, SYMANTEC. 2014. Available at: http://www.symantec.com/connect/blogs/despite-news-your-cellphone-not-yetsending-spam
UNDP. UNDP Smartphone and Cyber security practices for developing nations. New York: UNDP. 2016.
Wilcox, R. Introduction to Robust Estimation and Hypothesis Testing (Ed.2). 2005, 3-17.
How to Cite
License and Copyright Agreement
In submitting the manuscript to the journal, the authors certify that:
- They are authorized by their co-authors to enter into these arrangements.
- The work described has not been formally published before, except in the form of an abstract or as part of a published lecture, review, thesis, or overlay journal.
- That it is not under consideration for publication elsewhere.
- That its release has been approved by all the author(s) and by the responsible authorities – tacitly or explicitly – of the institutes where the work has been carried out.
- They secure the right to reproduce any material that has already been published or copyrighted elsewhere.
- They agree to the following license and copyright agreement.
Authors who publish with International Journal of Engineering Technologies and Management Research agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License (CC BY-SA 4.0) that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.
- Authors can enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or edit it in a book), with an acknowledgment of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) before and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work.
For More info, please visit CopyRight Section