TY - GEN
T1 - Exploring the adoption of physical security controls in smartphones
AU - Alshammari, Nasser O.
AU - Mylonas, Alexios
AU - Sedky, Mohamed
AU - Champion, Justin
AU - Bauer, Carolin
PY - 2015
Y1 - 2015
N2 - The proliferation of smartphones has changed our life due to the enhanced connectivity, increased storage capacity and innovative functionality they offer. Their increased popularity has drawn the attention of attackers, thus, nowadays their users are exposed to many security and privacy threats. The fact that smartphones store significant data (e.g. personal, business, government, etc.) in combination with their mobility, increase the impact of unauthorized physical access to smartphones. However, past research has revealed that this is not clearly understood by smartphone users, as they disregard the available security controls. In this context, this paper explores the attitudes and perceptions towards security controls that protect smartphone user’s data from unauthorized physical access. We conducted a survey to measure their adoption and the reasons behind users’ selections. Our results, suggest that nowadays users are more concerned about their physical security, but still reveal that a considerable portion of our sample is prone to unauthorized physical access.
AB - The proliferation of smartphones has changed our life due to the enhanced connectivity, increased storage capacity and innovative functionality they offer. Their increased popularity has drawn the attention of attackers, thus, nowadays their users are exposed to many security and privacy threats. The fact that smartphones store significant data (e.g. personal, business, government, etc.) in combination with their mobility, increase the impact of unauthorized physical access to smartphones. However, past research has revealed that this is not clearly understood by smartphone users, as they disregard the available security controls. In this context, this paper explores the attitudes and perceptions towards security controls that protect smartphone user’s data from unauthorized physical access. We conducted a survey to measure their adoption and the reasons behind users’ selections. Our results, suggest that nowadays users are more concerned about their physical security, but still reveal that a considerable portion of our sample is prone to unauthorized physical access.
KW - Anti-theft
KW - Authentication
KW - Biometrics
KW - Security control
KW - Smartphone
KW - User acceptance of security policies and technologies
UR - http://www.scopus.com/inward/record.url?scp=84944041493&partnerID=8YFLogxK
U2 - 10.1007/978-3-319-20376-8_26
DO - 10.1007/978-3-319-20376-8_26
M3 - Conference contribution
AN - SCOPUS:84944041493
SN - 9783319203751
T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
SP - 287
EP - 298
BT - Human Aspects of Information Security, Privacy and Trust - 3rd International Conference, HAS 2015 Held as Part of HCI International 2015, Proceedings
A2 - Tryfonas, Theo
A2 - Askoxylakis, Ioannis
PB - Springer Nature Link
T2 - 3rd International Conference on Human Aspects of Information Security, Privacy and Trust, HAS 2015 Held as Part of 17th International Conference on Human-Computer Interaction, HCI International 2015
Y2 - 2 August 2015 through 7 August 2015
ER -