NEGATIVE IMPACT OF MOBILE APPLICATIONS ON NATIONAL SECURITY
Keywords:
app type, mobile applications, security, user perception, a significant contribution.Abstract
This study aims to identify how mobile users perceive the security of different mobile apps and the extent to which different apps affect such perceptions. This study also investigates mobile user preferences for the places where they can access apps and their perceptions of risk at marketplaces vs. websites. This study is based on a qualitative research in which interviews were conducted with 32 university students. The study found that mobile users do not feel secure when installing mobile apps, and that concerns about hacking personal and private information are pervasive.
References
Androulidakis, I. I. (2016). A multinational survey on users’ practices, perceptions, and awareness regarding mobile phone security. In Mobile Phone Security and Forensics (pp. 15–28). Springer.
Bao, P., Pierce,J., Whittaker, S., & Zhai, S. (2011). Smart phone use by non-mobile business users. In Proceedings of the 13th International Conference on Human Computer Interaction with Mobile Devices and Services (pp. 445-454). Academic Press.
Gasimov, A., Tan, C., Phang, C., & Sutanto, J. (2010). Visiting Mobile Application Development: What, How and Where. In Proceedings of the 2010 Ninth International Conference on Mobile Business and 2010 Ninth Global Mobility Roundtable (ICMB-GMR) (pp. 74-81).
Dulaney, K., Cosgrove, T., Erensen,J.,Jones, N., McIntyre, A., & Reynolds, M. (2015). Predicts 2016: Mobile and Wireless. Gartner. Retrieved from https://www.gartnerinfo.com/ipg/predicts_2016_mobile_and_wir_273934.pdf
Fife, E., & Orjuela, J. (2012). The Privacy Calculus: Mobile Apps and User Perceptions of Privacy and Security. International Journal of Engineering Business Management, 4, 4–11. doi:10.5772/51645
Gupta, K., Kumar, R., & Loothra, S. (2014). Smartphone security and contact synchronization. In Proceedings of the 2014 Fourth International Conference on Communication Systems and Network Technologies (pp. 621- 625). Academic Press. doi:10.1109/CSNT.2014.130