IssuesinInformationSystemsVolume15,IssueII,pp.
116-123,2014116MOBILEMALWARE:COMINGTOASMARTPHONENEARYOUKarenPaullet,RobertMorrisUniversity,paullet@rmu.
eduJamiePinchot,RobertMorrisUniversity,pinchot@rmu.
eduABSTRACTThisstudyexploredawarenessandconcernaboutmobilemalwareaswellasusagehabitsrelatedtopreventativemeasuresusedtomitigatemobilemalwareriskfactors.
Severalmobilemalwareriskfactorswereexplored,includingconnectingtounsecuredWi-Finetworks,settingmobiledevicestoautomaticallyconnecttoWi-Finetworks,leavingBluetoothconnectivityon,readingreviewsbeforedownloadingmobileapps,usinganti-malwaresoftwareorapps,frequencyofdatabackups,anddevicelocksusingpasswords,PINs,orfingerprints.
Atotalof187participantsweresurveyed,includingundergraduatesanddoctoralstudentsandalumniatamid-Atlanticuniversity.
Thestudyfoundthatamongtheriskfactorsexplored,participantswerenotasawareofthedangersassociatedwithconnectingmobiledevicestounsecuredWi-Finetworksandalsowerelargelyunfamiliarwithanti-malwaresoftwareandapps.
Asetofrecommendationsforincreasingawarenessofpreventativesecuritymeasuresformobilemalwarewerealsopresented.
Keywords:mobilemalware,mobilesecurity,smartphone,Bluetooth,Wi-FiINTRODUCTIONMobilephoneshavebecomeubiquitouswithinoursociety,andmanywouldnowconsiderthemanecessityratherthanaconvenience.
Wearelivinginaworldwherepeoplearestayingconnectedviamobiletechnologymorethaneverbefore.
Technologywhichwasonceonlyfoundondesktopcomputerscannowbecarriedinthepalmofourhands.
Thenumberofmobilephoneusersattheendof2012wasapproximately5.
9billionworldwide[8].
Mobiledevicesallowpeopletohaveaconstantconnectiontofriends,family,andinformation.
Aswemoveaboutourday,onewillnoticepeopleusingtheirmobiledevicesalmosteverywhere.
Usersarestayingconnectedwhilewaitinginlines,atthebusstop,whendiningoutwithfamilyandfriends,andinthecar.
Thisnoticeableconstantconnectiontoourmobiledevicesisbringingtotheforefrontanareaofconcerninregardtosecurity.
WhatsecuritymechanismsdowehaveinplacetodealwithmobilesecuritythreatsMostaveragecomputerusershavesometypeofanti-virusoranti-malwaresoftwareinstalledontheircomputers,butwhatabouttheirmobiledevicesMalwareisanycomputerprogramdesignedtoinfiltrate,use,ordamageadevicewithouttheowner'sconsent.
Thetermmalwareisoftencharacterizedashostile,intrusive,malicious,orannoying[11].
Infact,thetermitselfisderivedfrom"malicioussoftware,"andincommonusageithasbecomeanumbrellatermtodescribemanydifferenttypesofmaliciouscomputerprograms.
Mobilemalwareisanytypeofmalwarethatisspecificallytargetedtowardsmartphones,tabletsandothermobiledevices.
Mobilemalwareisontheriseandisprojectedtocontinueitsupwardtrajectory,propelledbythelargeandcontinuallygrowingsmartphoneuserbaseandanincreasinglymobileworkforcewhichprovideenticingtargetsforhackers[12].
Leavitt[12]describesthisphenomenonsuccinctly,"Intheworldofcomputersandcommunications,themorewidelyatechnologyisused,themorelikelyitistobecomethetargetofhackers"(p.
11).
Themaingoalsofmostmobilemalwareincludetheftofprivateinformation,incurringchargestopremiumnumbers,orgainingaccesstoauser'sbankaccountsorcredit[5,11,15].
Mobilemalwareposesaseriousthreatandisevolvingintoacomplexlandscapethatwilllikelysoonrivalthatoftraditionalcomputermalware[5].
Thenumberofsecuritybreachestopersonaldevicesisdifficulttomeasure,andfewstudieshaveexploredthisareatodate.
Ourresearchseekstoexploreawareness,concernandhabitsregardingnumerousmobiledevicesecurityissues.
RELATEDLITERATUREInordertobeabletoaddresstheriskfactorsassociatedwithmobilemalware,itisimperativetofirstunderstandthethreats[7].
Theincreasedusageofmobiledeviceshasintroducednewsecurityrisks[20].
Mobiledevicesarebecominganewtargettogainuserinformation,asmobiledevicesecurityhasnotkeptupwithtraditionalcomputersecurity.
Cybercriminalsarebeginningtoattackmobiledevicesduetothelackofsecuritymeasuresinplace.
Attackingmobiledeviceshasbecomeextremelyattractivetocriminalsduetotheplethoraofinformationthatishttps://doi.
org/10.
48009/2_iis_2014_116-123IssuesinInformationSystemsVolume15,IssueII,pp.
116-123,2014117storedonthedevice.
Suchinformationincludesemailaccounts,phonenumbers,calendarinformation,networkorlogincredentials,confidentialnotesorfiles,andcontactliststonameafew.
Fischer,Kuo,andHuang[6],discussthreeshiftsinmobiledevicesecurity.
Thefirstismobility,whichcreateduncertaintyaboutthemobiledevicesurroundings.
Mobiledevicescanbeusedonbothsecureandunsecureenvironments.
Forinstance,connectingtopublicWi-Fiathotelisanexampleofanunsecurenetwork,whereas,connectingtoaworkorpersonalnetworkareusuallysecure.
Whenusersconnecttoanunsecurenetwork,devicesareopenforattack.
Thesecondshiftinsecuritydealswithsensorsthatareinstalledonthedevice.
Mostmobiledeviceshavelocationtracking,Bluetooth,RFID,andcamerasbuilt-in.
Theautomaticinstallationofsensorsonmobiledeviceshasledtoanewareaforattack.
Thefinalshiftisconstantconnectivity.
MobiledeviceshaveconstantaccesstotheInternetandotherdevices,whichisalsoattractivetocybercriminals.
Thefactthatmobiledevicesareportablemakesthemeasytosteal.
Theownerofastolenphonecanactuallylosealloftheirpersonaldata[16].
Peopletakethetimetolockthedoorstotheirhomesandcarsinordertoprovidesecuritysothattheirpersonalpropertyisnotburglarized.
Butwhenitcomestosecuringmobiledevices,thatsamecareisoftenignored.
Mostpeoplewouldnotwalkdownthestreetandhandtheirpurseorwallettoacompletestrangertoholdfor60secondsormore.
Yetthesamepeoplethatwouldnotturnovertheirpurseorwalletwillthinknothingofaskingastrangertotakeapictureofthemusingtheirpersonalmobiledevicethatcontainsaplethoraofprivateinformation.
Peoplemusttakethetimetoimplementphysicalsecurityfeaturesaswellasvirtualsecurityfeaturesinordertostaysecure.
Tobegintostudymobilemalware,itisusefultounderstandthecategorygroupingsusedtodescribedifferenttypesofmalwareprograms.
Thoughdifferentauthorsdefinethesegroupingsindifferentways,severalcommoncategoriesappearthroughouttheliterature.
Thesecategoriesincludeviruses,worms,rootkits,botnets,phishing,spyware,Wi-FiandBluetoothhijacking,andmaliciousapps[11,12,13].
Eachofthesecommoncategorieswillbebrieflydescribed.
Avirusisacomputerprogramthatcanreplicateitself.
Virusesareoftenprogrammedtoinfectotherprogramsorfilesbyattachingtothem.
Awormisavirusthatcopiesitselfandattemptstospreadtootherdevices,typicallythroughemailmessagesinthedesktoplandscape,butalsothroughShortMessageService(SMS)orMultimediaMessageService(MMS)messages,hereafterjointlyreferredtoas"textmessages"inordertotravelfromonemobiledevicetoanother[10].
Awormissimilartoavirus,butdoesnothavetoattachitselftoaprogramorfile.
Rather,itusescomputernetworks,includingWi-Fi,tospreadtootherdevices,typicallycapitalizingonsecurityflawsonthereceivingdeviceinordertoaccessit.
Rootkitsinfecttheoperatingsystem(OS)ofadevicetoallowvirusesandothermalwaretohideinplainsight,stealthilydisablingsecurityfeaturesoroverwritingOSfilesinordertoremainundetectedonthedeviceforlongerperiodsoftime[11].
Abotnetreferstoagroupofdevicesthathavebeencompromisedbymalwarethatgivesahackertheabilitytocontrolthedevicesremotely.
Ahackertypicallyactivatesthese"zombie"devicesinconcerttosendspam,carryoutDenial-of-Service(DoS)attacks,orperformothermaliciousacts.
Attackerscanalsousemobile"zombie"networkstosendtextmessagestopremiumnumbers,incurringchargestotheuserforeachmessagesent.
Hackersoftenworkwithpremiumnumberserviceownersandreceiveapercentageofthemoneygeneratedthroughthesescams[11,12,14,15].
Phishingscams,inwhichscammersposeaslegitimatecompaniesinordertoswindleunsuspectingusersintopayingmoneyorrevealingprivateinformation,aremuchthesameonmobiledevicesastheyareondesktopplatforms.
However,inadditiontoemailandsocialmediaposts,mobilephishingscamsutilizetextmessagesaswell.
Smishingisatermusedtodescribetheexploitationoftextmessagesonmobiledevicesforphishingscams[19].
Spywareapplicationsarebecomingcommongroundforcybercriminalstocaptureinformation.
Aspreviouslymentioned,criminalshavemuchtogainfromaccessingtheinformationstoredonmobiledevices.
Spywareapplicationsmonitordevicecommunications,suchasphoneconversations,emails,textmessages,inboundandoutboundcalllogsanduserlocations.
Itisevenpossibleforanattackertolistenremotelytophoneconversations[9]orreadtextmessagesandemails.
Infact,mobilespywarecanalsoturnonacompromisedsmartphonewithoutringing,essentiallyturningitintoahiddenmicrophonetoeavesdroponnearbyconversations.
TheGPSfunctionsofIssuesinInformationSystemsVolume15,IssueII,pp.
116-123,2014118thedevicecanalsobeusedtotrackitscurrentlocation[12].
Mostspywareapplicationscanusuallybedetectedprovidedthatanti-malwareapplicationsareinstalledonthedevice.
Wi-FihijackingorWi-FisnoopingoccurswhenhackersareabletointerceptcommunicationsbetweensmartphonesandunsecuredWi-Fihotspots,justastheycanwithdesktoporlaptopcomputers.
Thisapproachiscalledaman-in-the-middleattack,becauseeverythingthatyoutypeandtransmitisinterceptedbythehacker(themiddleman)beforeitgetstowhereitwasintended.
Thismeansthatahackercouldeasilygainaccesstousernames,passwords,andevencreditcardinformationifauserlogsintowebsitesorpurchasesitemsonlinewhilebeingmonitored[2,3].
Forconvenience,manysmartphoneshavesettingstoallowthedevicetoautomaticallyconnecttoavailableWi-Finetworks,makingthedevicevulnerable.
Bluetooth,oneofthemostcommonshort-rangewirelessprotocols,isoftenusedtoallowconnectivitybetweenmobiledevices.
ThereareafewdifferenttypesofvulnerabilitiesthatcanbeexploitedwhenBluetoothconnectivityisturnedonforamobiledevice.
Bluejackingisatypeofpracticaljokeakintospam.
ABluejackercansendane-contactcardtoanotherBluetoothdeviceindiscoverablemode,aslongasitiswithinapproximatelya30-footradiusoftheirowndevice.
However,insteadofaddingarealcontactintotheunsuspectingrecipient'ssmartphone,theBluejackerexploitsthee-contactcardtoreplacethe"From"sectionwithamessage.
Whentherecipientreceivesthis"Bluetoothspam,"itcanoftenscarethepersonintorealizingthattheyareundersurveillance,whichistypicallytheintentionoftheBluejacker.
Bluebuggingallowsahackertogainaccesstoanotheruser'sdevicethroughBluetoothandcontrolsomeofitsfunctions,includingmakingphonecallsorsendingtextmessagestopremiumnumbersoreavesdroppingoncallsmadebytheuser[18].
Hackerscanalsocompromisesmartphonesandothermobiledevicesbyembeddingmalwareintomobileappsthatusersthendownloadandinstall.
Thesemaliciousappsareoftenfreeinordertoenticeuserstodownloadthem,andonceinstalledtheycanstealprivateinformationfromthedeviceandsenditbacktoahacker.
Theymayalsoinstallotherappsoropen"backdoors"onthedevice,allowingahackertotakeremotecontrolofthedeviceatalatertime[12].
PURPOSEOFSTUDYTheliteratureexaminedmakesitclearthatmobilemalwareisontherise.
Italsopointsoutavarietyofwaysinwhichmobiledevicesecuritymeasuresparallelthesecuritymeasuresofstandardcomputers.
Forexample,mobilemalwarespreadsinmuchthesamewayasvirusesspreadbetweencomputers:viaemailattachments,phishingwebsites,exploitationviapublicWi-Finetworks,infectionofseeminglyofficialprograms(apps),textmessages,Bluetoothconnectivity,andphysicaltheftorintrusion.
Simplestepscanbetakentoprotectmobiledevicesfrommuchofthethreatofmobilemalware,ifpeopleareawarethatasmartphonemustbeprotectedfrommalware.
Thisexploratorystudysoughttoexploreawareness,concernandusagehabitsofmobilesecurityprotectionmeasuresamonguniversitystudentsandalumni.
Thefollowingresearchquestionswereaddressed:RQ1:DouniversitystudentsandalumnidemonstrateawarenessofmobilemalwareriskfactorsbyusingpreventativesecuritymeasurestomitigatemobilemalwareriskfactorsformobiledevicesRQ2:IstherearelationshipbetweenconcernaboutmobilemalwareandpreventativesecuritymeasuresusedbyuniversitystudentsandalumniIssuesinInformationSystemsVolume15,IssueII,pp.
116-123,2014119RESEARCHMETHODOLOGYThisexploratorystudyexaminedawareness,concernanduseofsecuritymeasuresforprotectingmobiledevicesagainstmobilemalwareamonguniversitystudentsandalumni.
Anelectronicsurveywasdistributedtoaconveniencesampleofundergraduatestudents,doctoralstudents,anddoctoralalumniatamid-AtlanticuniversityduringMarchandApril2014.
UndergraduatestudentsinthesamplewereselectedfromcoursesectionsintheComputerInformationSystemsdepartmentthatwererequiredaspartoftheuniversitycoreorwereelectivesknowntobetakenoftenbynon-majorsaswellasmajorswithinthedepartment.
Theseselectionsweremadetoattempttocaptureacross-sectionofstudentsfromvariousfieldsofstudywithintheuniversitywithintheconveniencesample.
Doctoralstudentsanddoctoralalumnioftheuniversitywerealsoincludedinthesample,astheseindividualsareadiversegroupintermsofage,ethnicity,location,occupationalaffiliations.
Again,theseparticipantswereselectedpurposefullyinordertocaptureacross-sectionofindividualsfromavarietyofindustriesandbackgrounds.
Asthisresearchisexploratoryinnature,andveryfewpreviousstudiesaddressingmobilemalwareandsecurityawarenesswerefound,theresearcherswishedtoincludeasmuchdiversityinthesampleaspossible.
Thesurveywasadministeredto138undergraduatesand76doctoralstudentandalumni.
Participantswerefirstaskediftheyownedasmartphoneortablet.
Anyparticipantswhodidnotownasmartphoneortabletexitedthesurvey,andtheseresponseswerediscarded.
Afterparticipantswithoutamobiledevicewereremovedfromthedataset,therewere114undergraduateand73doctoralstudentandalumniresponses,foratotalof187participants.
Priortosurveyadministration,apilottestwasconductedwith61adultparticipantstotestthevalidityandreliabilityofthesurveyquestions.
Thesurveyquestionnaireconsistedofavarietyofquestionsrelatingtomobilesecurityprotectionmeasures.
Participantswerefirstaskedsomebasicdemographicquestionsincludingage,gender,andoccupationalaffiliation.
Next,participantswereaskedaboutthetypesofsmartphonesandtabletsthattheyown,includingdeviceplatformssuchasiOS,Android,BlackBerry,WindowsPhone,SymbianandOtherforsmartphonesandiOS,Android,KindleandOtherfortablets.
Then,participantswereaskedabouttheirhabitsregardingthedownloadingofmobileapps,includingwhethertheyhadeverdownloadedanapp,howoftentheydownloadfreeandpaidapps,andhowoftentheydownloadfinancial,health-related,socialmedia,andproductivityapps.
Thesefourcategoriesofappswerechosenbecauseofthesensitivenatureofthedatathatistypicallystoredinthesetypesofapps.
Thenextsetofquestionswastargetedtowardunderstandingtheparticipants'usagehabitsregardingseveralmobilesecurityriskfactorsidentifiedfromtheliterature.
Participantswereaskediftheytypicallyreadreviewsbeforedownloadingapps,whichcanbeasignificantdeterrenttodownloadingmaliciousapps[4].
Theywerealsoaskediftheyhadeverusedananti-virusoranti-malwareappontheirdevice,whichcanworkmuchliketheirdesktopcomputercounterpartstoscanforvirusesandmalware[12].
NexttheywereaskediftheytypicallyleaveBluetooth"on"ontheirmobiledevice,iftheirdeviceissettoautomaticallyconnecttoWi-FinetworksandhowoftentheyconnecttopublicWi-Fihotspots,allofwhichareriskfactorsforhijackingandman-in-the-middleattacks[2,3,16,18].
Nextthequestionnairecoveredsecuritymeasuresforprotectingagainstunauthorizedphysicaldeviceaccess,damageorloss.
Participantswereaskediftheirdeviceislockedwithapassword,PINorfingerprintandalsoaboutthefrequencywithwhichtheybackupdatafromtheirdevice.
Physicallocksandbackupsareimportantsecuritymeasures,asthemostcommonmethodofinformationtheftfromamobiledeviceinvolvesphysicaltheftofthedevice[17].
Carewastakenthatsomeofthequestionswerenegativelywordedwhileotherswerenot,soastonotskewtheresults.
Forinstance,onequestionwasworded"Doyoutypicallyreadreviewsorotherwiseresearchamobileappbeforedownloadingandinstallingit"A"Yes"answertothisquestionrevealsthattheuserdoesnothaveariskfactorinthiscategorybecausereadingreviewscanbeasignificantdeterrenttodownloadingmaliciousapps.
Anotherquestionwasworded,"IsyourmobiledevicesettoautomaticallyconnecttoWiFihotspots"A"Yes"answertothisquestionrevealsthattheuserdoeshaveariskfactorashisorherdevicecouldautoconnecttounsecuredWi-Finetworks.
Thenextsetofquestionswasfocusedonparticipants'awarenessofmobilesecurityriskfactors.
Participantswereaskediftheyhadeverexperiencedavirusormalwareontheirmobiledevice,andalsowhethertheywereconcernedaboutvirusesormalwareinregardtotheirmobiledevice.
Lastly,severalquestionsrelatingtoinformationprivacyconcernswereasked,butnotutilizedforthisstudy.
IssuesinInformationSystemsVolume15,IssueII,pp.
116-123,2014120FINDINGSOfthe187participants,66%weremaleand34%werefemale.
Theagerangeofparticipantsspannedfrom18to72,withameanof32.
Thelargestagegrouprepresentedincluded18-20year-olds,at31%ofthesample.
Participantsaged21-30madeup25%ofthesample,thoseaged31-40madeup11%,thoseaged41-50madeup18%,thoseaged51-60madeup10%,andtheremaining5%includedparticipantsaged61-72.
Theslightskewtowardtheyoungerendoftheagespectrumcanbelargelyattributedtothe114undergraduatesincludedinthesample.
Intermsofoccupationalaffiliation,36%ofparticipantsworkedinindustry(forprofit),3%workedforanon-profitorganization,10%workedforgovernment(local,stateorfederal),4%workedinhealthcare,30%workedineducation,and17%indicated"other.
"Nearlyalloftheresponsesinthe"other"categorycamefromundergraduatesandcanperhapsbeattributedtothefactthatmanyundergraduateswerenotworkingwhileattendingschool.
Inretrospect,a"notapplicable"categorywouldhavebeenusefultoaddtothisquestion.
Allparticipantswhowerekeptinthedatasetownedatleastonemobiledevice.
Amajorityoftheparticipants,94%ownedasmartphoneand63%ownedatablet.
Nearlyalloftheparticipants,96%,haddownloadedamobileapptotheirdevice.
Ofthosewhohaddownloadedamobileapp,themajoritytendedtodownloadfreeappsmorefrequentlythanpaidapps.
Morethanhalf,53%,downloadedfreeappsfrequentlyorveryfrequently,40%occasionally,6%rarely,and1%never.
Only7%downloadedpaidappsfrequentlyorveryfrequently,19%occasionally,43%rarely,and31%neverdownloadedapaidapp.
Regardingtypesofappsdownloaded,participantswhohaddownloadedanappwereaskedhowoftentheydownloadedfinancial,health-related,socialmedia,andproductivityapps,sincethesecategoriesofappsarethemostlikelytoinvolvetheuseofprivateinformation.
Forfinancialapps,39%downloadedthemfrequentlyorveryfrequently,17%occasionally,15%rarely,and29%never.
Forhealth-relatedapps,21%downloadedfrequentlyorveryfrequently,28%occasionally,17%rarely,and34%never.
Forsocialmediaapps,71%downloadedfrequentlyorveryfrequently,13%occasionally,10%rarely,and6%never.
Andlastlyforproductivityapps,36%downloadedfrequentlyorveryfrequently,28%occasionally,18%rarely,and18%never.
Participantsweredirectlyaskedwhethertheywereconcernedaboutmobilemalwareinregardtotheirmobiledevices.
Thesamplewasnearlysplitevenly,with46%respondingthattheywereconcerned,50%respondingthattheywerenotconcerned,and4%responding"Idon'tknow,"whichcouldindicatealackofawarenessofthetopic.
Theconcernaboutmobilemalwarewasrelativelyhighgiventhatveryfewoftheparticipants,2%,hadexperiencedmobilemalwareontheirowndevice.
Themajority,88%,indicatedthattheyhadnotexperiencedmobilemalware.
However,10%responded"Idon'tknow"tothisquestion,whichcanbeconstruedasagenerallackofawarenessregardingmobilemalware.
ThesepercentagesaredepictedinFigure1.
Figure1.
Percentageofparticipantswhoexperiencedandareconcernedaboutmobilemalware2%46%88%50%10%4%0%20%40%60%80%100%ExperiencedmobilemalwareConcernedaboutmobilemalwareYesNoIdon'tknowIssuesinInformationSystemsVolume15,IssueII,pp.
116-123,2014121RQ1asked,"Douniversitystudentsandalumnidemonstrateawarenessofmobilemalwareriskfactorsbyusingpreventativesecuritymeasurestomitigatemobilemalwareriskfactorsformobiledevices"Toanswerthisquestion,theresearcherslookedattheresponsestosevenquestionsonthequestionnairethateachdemonstratedariskybehaviorintermsofpreventativemeasuresformitigatingexposuretomobilemalware.
ThesesevenquestionsincludedaskingparticipantshowoftentheyusepublicWi-Fi,whethertheirdeviceissettoautoconnecttoWi-Finetworks,whethertheytypicallyleaveBluetoothconnectivitysettoon,whethertheyreadreviewsbeforedownloadingapps,iftheyhaveeverusedanti-malwareontheirdevice,howoftentheybackupdataontheirdevice,andwhethertheylocktheirdevicewithapassword,PINorfingerprint.
ThemajorityofparticipantsdisplayedriskybehaviorintermsofconnectingtopublicWi-Finetworks,with73%indicatingthattheyconnecttopublicWi-Fioccasionallyormorefrequently,while26%indicatedthattheyrarelyorneverconnecttopublicWi-Fi.
WhenaskediftheirmobiledeviceissettoautomaticallyconnecttoWi-Fihotspots,themajorityofparticipants,70%,displayednon-riskybehaviorbyindicatingthattheydonotallowtheirdevicetoautomaticallyconnecttoWi-Fi.
Oftheparticipantsdisplayingriskybehaviorforthisquestion,26%indicatedthattheydohavethissetting,while4%answered"Idon'tknow.
"Thirty-onepercent(31%)ofparticipantsindicatedthattheydoleaveBluetoothonorthattheydidnotknow,bothindicatingriskybehavior.
Theremaining69%respondedthattheydonotleaveBluetoothon.
Themajorityofparticipants,72%,indicatedthattheydoreadreviewsorotherwiseresearchamobileappbeforedownloadingandinstallingit,displayingnon-riskybehavior.
Theremaining28%didnotreadreviews,thusmakingtheirdevicesmorevulnerabletodownloadingmaliciousapps.
However,mostparticipants,75%,displayedriskybehaviorbyfailingtouseanti-malwaresoftwareorapps.
Sixty-sixpercent(66%)hadneverusedanti-malware,while9%indicatedthattheydidnotknowiftheyhadornot,alsoariskybehaviorindicatingalackofawarenessofanti-malware.
Only25%ofparticipantshadusedanti-malware.
Intermsofphysicalsecuritypreventativemeasures,73%ofparticipantsrespondedthattheybackupdataontheirmobiledevicesoccasionallyormorefrequently,while27%backuprarelyornever.
Themajorityofparticipants,77%,protecttheirdeviceswithapassword,PIN,orfingerprintwhiletheremaining23%donot.
RQ2asked,"Istherearelationshipbetweenconcernaboutmobilemalwareandpreventativesecuritymeasuresusedbyuniversitystudentsandalumni"Toanswerthisquestion,theresearcherscreatedaMobileMalwareRiskFactorIndexbasedonthesevenmobilemalwareriskfactorsquestionsutilizedtoanswerRQ1.
Thedevelopmentofanindexisasupportedwaytomeasureaconstructusinganaccumulationofscoresfromavarietyofrelatedbutindividualitems[1],andisoftendonetotransformdataintoaformthatcanbeusedinotherstatisticalanalyses.
Tobuildtheindex,theresponsetoeachofthesesevenquestionswasscoredone(1)iftheresponseindicatedariskybehaviorincludingusingpublicWi-Fioccasionallyormorefrequently,leavingtheirdevicesettotypicallykeepBluetoothconnectivityon,usingadevicesettingtoallowautoconnectingtoWi-Finetworks,notreadingreviewsorresearchingappsbeforedownloadingthem,notusinganti-malwareontheirdevice,backinguptheirdevicedatararelyornever,ornotlockingtheirdevicewithapassword,PINorfingerprint.
Responsesthatdemonstratednon-riskybehaviors(theoppositesofthosementioned)werescoredazero(0).
ThescoreswerethensummedtobuildaMobileMalwareRiskFactorIndexthatrangedfromzero(theleastrisky)toseven(themostrisky).
Therelationshipbetweenconcernaboutmobilemalwareandmobilemalwareriskfactors(asmeasuredbytheMobileMalwareRiskFactorIndex)wasinvestigatedusingthePearsonproduct-momentcorrelationcoefficient.
Preliminarytestswereperformedtoensurethattheassumptionsofnormality,linearityandhomoscedasticitywerenotviolated.
Therewasasignificant,negativecorrelationbetweenthetwovariableswithasmalleffectsize,r=-.
191,n=177,pkaspersky.
com/bluetooth-security/19.
USCERT.
(2010,April15).
US-CERTTechnicalInformationPaper–TIP-10-105-01.
RetrievedonMay3,2014fromhttps://www.
us-cert.
gov/sites/default/files/publications/TIP10-105-01.
pdf20.
Webroot.
(2013).
MobileThreatsareRealandCostly.
Acommissionedstudy.
RetrievedonApril16,2014fromhttp://www.
webroot.
com/shared/pdf/byod-mobile-security-study.
pdf
SugarHosts 糖果主机商也算是比较老牌的主机商,从2009年开始推出虚拟主机以来,目前当然还是以虚拟主机为主,也有新增云服务器和独立服务器。早年很多网友也比较争议他们家是不是国人商家,其实这些不是特别重要,我们很多国人商家或者国外商家主要还是看重的是品质和服务。一晃十二年过去,有看到SugarHosts糖果主机商12周年的促销活动。如果我们有需要香港、美国、德国虚拟主机的可以选择,他们家的...
Virtono最近推出了夏季促销活动,为月付、季付、半年付等提供9折优惠码,年付已直接5折,而且下单后在LET回复订单号还能获得双倍内存,不限制付款周期。这是一家成立于2014年的国外VPS主机商,提供VPS和服务器租用等产品,商家支持PayPal、信用卡、支付宝等国内外付款方式,可选数据中心包括罗马尼亚、美国洛杉矶、达拉斯、迈阿密、英国和德国等。下面列出几款VPS主机配置信息,请留意,下列配置中...
妮妮云的来历妮妮云是 789 陈总 张总 三方共同投资建立的网站 本着“良心 便宜 稳定”的初衷 为小白用户避免被坑妮妮云的市场定位妮妮云主要代理市场稳定速度的云服务器产品,避免新手购买云服务器的时候众多商家不知道如何选择,妮妮云就帮你选择好了产品,无需承担购买风险,不用担心出现被跑路 被诈骗的情况。妮妮云的售后保证妮妮云退款 通过于合作商的友好协商,云服务器提供2天内全额退款,超过2天不退款 物...
kaspersky.com为你推荐
杨紫别祝我生日快乐关于“致自己生日”的唯美句子有哪些?云计算什么是云计算?云计算什么叫做“云计算”?微信回应封杀钉钉微信发过来的钉钉链接打不开?18comic.fun黑色禁药http://www.lovecomic.cn/attachment/Fid_18/18_4_00d3b0cb502ea74.jpg这幅画名字叫什么?陈嘉垣陈浩民、马德钟强吻女星陈嘉桓,求大家一个说法。125xx.comwww.free.com 是官方网站吗?www.kanav001.com翻译为日文: 主人,请你收养我一天吧. 带上罗马音标会更好www16668.com香港最快开奖现场直播今晚开www.ijinshan.com好电脑要用什么样的软件
手机域名注册 动态域名解析软件 花生壳域名贝锐 ftp空间 paypal认证 512av 绍兴高防 ca4249 789电视 idc是什么 免费活动 安徽双线服务器 宏讯 lick 论坛主机 游戏服务器出租 万网空间 lamp架构 阿里云邮箱登陆 群英网络 更多