It's all about me! The Influence of Personality on Susceptibility to Mobile Security Attacks

Authors

  • Rasha IBRAHIM

DOI:

https://doi.org/10.18100/ijamec.47036

Keywords:

Phishing, Personality, the Big-Five, Mobile, Cyber-security, Human Factors, SMS, Text Messages

Abstract

Mobile phones security is an emerging field of study. As the number of data-centric mobile phones grows, the industry experts expect them to face major security problems. We believe the first step to devise countermeasures for protecting users would be a comprehensive understanding of the mobile users’ perception of risk. We report on a qualitative grounded theory study to inspect such perception. The initial thematic analysis identified relationship between level of knowledge and security attitude. However, further grounded theory analysis returned in personality type taxonomy for exposure for mobile attacks in general and phishing attacks in particular. We confirm our findings by conducting the first naturalistic phishing experiment on mobile phones

Downloads

Download data is not yet available.

References

Informa Telecoms & Media report, London: Informa Telecoms & Media. 2009

D. Maslennikov. Mobile Malware Evolution: An Overview, Part 4". RetrievedJanuary , 2014 Available: http://securelist.com/large-slider/36350/mobile-malware-evolution-an-overview-part-4/

K. Dunham. Mobile Malware Attacks and defense. Syngress. 2008.

P. Cairns and A.L. Cox. Research Methods for Human-Interaction. Cambridge University Press. 2008.

J. Preece, Y. Roger and H. Sharp. Interaction Design beyond Human Computer Interaction, USA: John Wiley and Sons. 2002.

S. Love. Understanding mobile human computer interaction. Elsevier Ltd. 2005.

M. N. Marshall. Sampling for qualitative research. Oxford University Press. 1996

DH. Ingvar. Memory of the future": an essay on the temporal organization of conscious awareness. 1985

R. R. McCrae, A. Terracciano, P. T. Cost, and D. J. Ozer. Person-factors in the California adult Q-set: Closing the door on personality types? European Journal of Personality, 20, 29-44. 2006

A. Furnham, J. Crump. Personality Traits, Types, and Disorders: An Examination of the Relationship between Three Self-Report Measures. European Journal of Personality. 2005

L. Clark and D. Watson. Personality, disorder and personality disorder towards a more rational conceptualization. Journal of Personality Disorders, 13, 142–151. 1999

R. West. The psychology of security. Communications of the ACM 51(4). Pages 34-40, 2008.

Downloads

Published

29-06-2015

Issue

Section

Research Articles

How to Cite

[1]
“It’s all about me! The Influence of Personality on Susceptibility to Mobile Security Attacks”, J. Appl. Methods Electron. Comput., vol. 3, no. 3, pp. 194–199, Jun. 2015, doi: 10.18100/ijamec.47036.

Similar Articles

41-50 of 118

You may also start an advanced similarity search for this article.