Reference Hub1
Mobile Phone Usage Patterns, Security Concerns, and Security Practices of Digital Generation

Mobile Phone Usage Patterns, Security Concerns, and Security Practices of Digital Generation

Sonya Zhang, Saree Costa
Copyright: © 2018 |Volume: 10 |Issue: 1 |Pages: 17
ISSN: 1942-390X|EISSN: 1942-3918|EISBN13: 9781522544104|DOI: 10.4018/IJMHCI.2018010102
Cite Article Cite Article

MLA

Zhang, Sonya, and Saree Costa. "Mobile Phone Usage Patterns, Security Concerns, and Security Practices of Digital Generation." IJMHCI vol.10, no.1 2018: pp.23-39. http://doi.org/10.4018/IJMHCI.2018010102

APA

Zhang, S. & Costa, S. (2018). Mobile Phone Usage Patterns, Security Concerns, and Security Practices of Digital Generation. International Journal of Mobile Human Computer Interaction (IJMHCI), 10(1), 23-39. http://doi.org/10.4018/IJMHCI.2018010102

Chicago

Zhang, Sonya, and Saree Costa. "Mobile Phone Usage Patterns, Security Concerns, and Security Practices of Digital Generation," International Journal of Mobile Human Computer Interaction (IJMHCI) 10, no.1: 23-39. http://doi.org/10.4018/IJMHCI.2018010102

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

As the digital generations have grown up with high-tech gadgets and become avid users of mobile phones and apps, they are also exposed to increasing mobile security threats and vulnerability. In this paper the authors discuss the impact of recent mobile technology advancements on mobile threat environment and mobile security practices. They also conducted a survey to 262 college students to examine their mobile phone usage patterns, security concerns and practices. The results show that students use their mobile phone frequently for various productivity and entertainment purposes. They are generally aware of and concerned about mobile security, not only on losing the phone physically but also on data theft, web threat, and mobile malware. Students also practice security to some extend - most change PIN and passwords regularly, download their apps mostly from official app stores, and generally keep their OS and apps up-to-date. The authors also found significant correlations between mobile security practices and personal attributes, including major, gender, and technology aptitude.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.