IDEAS home Printed from https://ideas.repec.org/a/igg/jmhci0/v10y2018i1p23-39.html
   My bibliography  Save this article

Mobile Phone Usage Patterns, Security Concerns, and Security Practices of Digital Generation

Author

Listed:
  • Sonya Zhang

    (College of Business Administration, California State Polytechnic University, Pomona, CA, USA)

  • Saree Costa

    (College of Business Administration, California State Polytechnic University, Pomona, CA, USA)

Abstract

As the digital generations have grown up with high-tech gadgets and become avid users of mobile phones and apps, they are also exposed to increasing mobile security threats and vulnerability. In this paper the authors discuss the impact of recent mobile technology advancements on mobile threat environment and mobile security practices. They also conducted a survey to 262 college students to examine their mobile phone usage patterns, security concerns and practices. The results show that students use their mobile phone frequently for various productivity and entertainment purposes. They are generally aware of and concerned about mobile security, not only on losing the phone physically but also on data theft, web threat, and mobile malware. Students also practice security to some extend - most change PIN and passwords regularly, download their apps mostly from official app stores, and generally keep their OS and apps up-to-date. The authors also found significant correlations between mobile security practices and personal attributes, including major, gender, and technology aptitude.

Suggested Citation

  • Sonya Zhang & Saree Costa, 2018. "Mobile Phone Usage Patterns, Security Concerns, and Security Practices of Digital Generation," International Journal of Mobile Human Computer Interaction (IJMHCI), IGI Global, vol. 10(1), pages 23-39, January.
  • Handle: RePEc:igg:jmhci0:v:10:y:2018:i:1:p:23-39
    as

    Download full text from publisher

    File URL: http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/IJMHCI.2018010102
    Download Restriction: no
    ---><---

    More about this item

    Statistics

    Access and download statistics

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:igg:jmhci0:v:10:y:2018:i:1:p:23-39. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    We have no bibliographic references for this item. You can help adding them by using this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Journal Editor (email available below). General contact details of provider: https://www.igi-global.com .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.