Search results

1 – 10 of over 16000
Article
Publication date: 18 July 2023

Stephen Mujeye

This study aims to investigate the differences in security-conscious (group A) and regular (group B) users’ behaviors and practices on mobile devices.

Abstract

Purpose

This study aims to investigate the differences in security-conscious (group A) and regular (group B) users’ behaviors and practices on mobile devices.

Design/methodology/approach

A survey was used to investigate the differences in behaviors and practices of security-conscious users (group A) and regular users (group B) on mobile devices. Each group will have 50 participants for a total of 100.

Findings

The analysis revealed differences in the behaviors and practices of security-conscious and regular users. The results indicated that security-conscious users engage in behaviors and practices that are more secure on mobile devices when compared with regular users.

Research limitations/implications

The results will help recommend the best behaviors and practices for mobile device users, increasing mobile device security.

Social implications

The results will help society to be more aware of security behaviors and practices on mobile devices.

Originality/value

This study answers the call for addressing the weaknesses and vulnerabilities in mobile device security. It develops a research instrument to measure the differences in behaviors and practices of security-conscious and regular mobile device users.

Details

Information & Computer Security, vol. 31 no. 5
Type: Research Article
ISSN: 2056-4961

Keywords

Article
Publication date: 1 May 2006

Zakaria Maamar

The aim of the research is to discuss the design and development of a mobile application using two technologies known as software agent (SA) and mobile web services.

2970

Abstract

Purpose

The aim of the research is to discuss the design and development of a mobile application using two technologies known as software agent (SA) and mobile web services.

Design/methodology/approach

The objectives were achieved by testing the integration of SAs and mobile web services into mobile applications. The approach suggested in the paper has relied on some modeling techniques such as service chart diagram and addressed some security issues.

Findings

It was found in the course of the work the necessity of being aware of the limitations of mobile devices, despite all the major developments that are happening. In addition, it was found that it is deemed appropriate to provide some modeling techniques which suit the development of mobile applications.

Originality/value

The paper discusses the concept of mobile web services. The paper is particularly useful to those who are in the field of mobile computing.

Details

Business Process Management Journal, vol. 12 no. 3
Type: Research Article
ISSN: 1463-7154

Keywords

Article
Publication date: 11 November 2014

Ivana Pažur

The purpose of this paper is to get an insight in users’ opinion on library resources/services on small screen mobile devices. Objectives were to establish which types of small…

Abstract

Purpose

The purpose of this paper is to get an insight in users’ opinion on library resources/services on small screen mobile devices. Objectives were to establish which types of small screen mobile devices are used and to find out is there a tendency for using academic and educational contents on such devices. Furthermore, aim was to identify whether the users need mobile friendly library web site and services at all. Also, what library resources/services and to what extent respondents consider as the important ones for mobile friendly customization. Finally the results would serve as an orientation in building mobile friendly library web site and services. The author believed that the users were still unaware of the possibility of accessing library web sites and services through mobile devices in general; therefore, this survey also had a role of raising awareness and stimulating their interest.

Design/methodology/approach

The survey was focussed on small screen mobile devices with screen size up to seven inches (17.1 cm). Data collection was performed through a questionnaire containing ten questions. The questionnaire was created by LimeSurvey tool, and for mobile optimized version SurveyMonkey.com service was used too. The authors received 295 questionnaires, out of which 285 were taken into account.

Findings

The survey found that the largest number of respondents own smartphone/tablet/phablet. The results show that small screen devices are, to some extent, used for educational, academic and informational purposes (reading of e-books and e-journals, education, data checking, internet searching and searching of handy information), but non-academic purposes still predominate (texting, reading e-mails, phone calls, taking pictures). Overall 64 percent of the respondents has expressed need for small screen mobile devices customized library resources/services, but there are 30 percent of undecided respondents. Croatian Scientific Bibliography, e-journals database (EZB), online databases, contact information and lecture halls reservations, has been resources/services requested by respondents to be available in a mobile friendly mode.

Originality/value

The survey examines users’ opinion on a new library service before its implementation. Besides giving us a precise insight into the Rudjer Bošković Institute library users’ interest and needs for mobile friendly customization of existing library resource/service, survey gives a unique insight into the correlation of age and gender of the respondents and their answers to the question about having a small screen mobile device and opinion about the customization of library resources and services. To the author’s knowledge, this is the first users’ survey on this topic in Croatia.

Article
Publication date: 6 April 2010

Evi Syukur and Seng Wai Loke

Pervasive computing environments such as a pervasive campus domain, shopping, etc. will become commonplaces in the near future. The key to enhance these system environments with…

Abstract

Purpose

Pervasive computing environments such as a pervasive campus domain, shopping, etc. will become commonplaces in the near future. The key to enhance these system environments with services relies on the ability to effectively model and represent contextual information, as well as spontaneity in downloading and executing the service interface on a mobile device. The system needs to provide an infrastructure that handles the interaction between a client device that requests a service and a server which responds to the client's request via Web service calls. The system should relieve end‐users from low‐level tasks of matching services with locations or other context information. The mobile users do not need to know or have any knowledge of where the service resides, how to call a service, what the service API detail is and how to execute a service once downloaded. All these low‐level tasks can be handled implicitly by a system. The aim of this paper is to investigate the notion of context‐aware regulated services, and how they should be designed, and implemented.

Design/methodology/approach

The paper presents a detailed design, and prototype implementation of the system, called mobile hanging services (MHS), that provides the ability to execute mobile code (service application) on demand and control entities' behaviours in accessing services in pervasive computing environments. Extensive evaluation of this prototype is also provided.

Findings

The framework presented in this paper enables a novel contextual services infrastructure that allows services to be described at a high level of abstraction and to be regulated by contextual policies. This contextual policy governs the visibility and execution of contextual services in the environment. In addition, a range of contextual services is developed to illustrate different types of services used in the framework.

Originality/value

The main contribution of this paper is a high‐level model of a system for context‐aware regulated services, which consists of environments (domains and spaces), contextual software components, entities and computing devices.

Details

International Journal of Pervasive Computing and Communications, vol. 6 no. 1
Type: Research Article
ISSN: 1742-7371

Keywords

Article
Publication date: 29 March 2021

Ramaraj Palanisamy and Yang Wu

This study/ paper aims to empirically examine the user attitude on perceived security of enterprise systems (ES) mobility. Organizations are adopting mobile technologies for…

496

Abstract

Purpose

This study/ paper aims to empirically examine the user attitude on perceived security of enterprise systems (ES) mobility. Organizations are adopting mobile technologies for various business applications including ES to increase the flexibility and to gain sustainable competitive advantage. At the same time, end-users are exposed to security issues when using mobile technologies. The ES have seen breaches and malicious intrusions thereby more sophisticated recreational and commercial cybercrimes have been witnessed. ES have seen data breaches and malicious intrusions leading to more sophisticated cybercrimes. Considering the significance of security in ES mobility, the research questions in this study are: What are the security issues of ES mobility? What are the influences of users’ attitude towards those security issues? What is the impact of users’ attitude towards security issues on perceived security of ES mobility?

Design/methodology/approach

These questions are addressed by empirically testing a security model of mobile ES by collecting data from users of ES mobile systems. Hypotheses were evolved and tested by data collected through a survey questionnaire. The questionnaire survey was administered to 331 users from Chinese small and medium-sized enterprises (SME). The data was statistically analysed by tools such as correlation, factor analysis, regression and the study built a structural equation model (SEM) to examine the interactions between the variables.

Findings

The study results have identified the following security issues: users’ attitude towards mobile device security issues; users’ attitude towards wireless network security issues; users’ attitude towards cloud computing security issues; users’ attitude towards application-level security issues; users’ attitude towards data (access) level security issues; and users’ attitude towards enterprise-level security issues.

Research limitations/implications

The study results are based on a sample of users from Chinese SMEs. The findings may lack generalizability. Therefore, researchers are encouraged to examine the model in a different context. The issues requiring further investigation are the role of gender and type of device on perceived security of ES mobile systems.

Practical implications

The results show that the key security issues are related to a mobile device, wireless network, cloud computing, applications, data and enterprise. By understanding these issues and the best practices, organizations can maintain a high level of security of their mobile ES.

Social implications

Apart from understanding the best practices and the key issues, the authors suggest management and end-users to work collaboratively to achieve a high level of security of the mobile ES.

Originality/value

This is an empirical study conducted from the users’ perspective for validating the set of research hypotheses related to key security issues on the perceived security of mobile ES.

Details

Information & Computer Security, vol. 29 no. 1
Type: Research Article
ISSN: 2056-4961

Keywords

Article
Publication date: 11 November 2019

Anthony Duke Giwah, Ling Wang, Yair Levy and Inkyoung Hur

The purpose of this paper is to investigate the information security behavior of mobile device users in the context of data breach. Much of the previous research done in user…

1221

Abstract

Purpose

The purpose of this paper is to investigate the information security behavior of mobile device users in the context of data breach. Much of the previous research done in user information security behavior have been in broad contexts, therefore creating needs of research that focuses on specific emerging technologies and trends such as mobile technology.

Design/methodology/approach

This study was an empirical study that gathered survey data from 390 mobile users. Delphi study and pilot study were conducted prior to the main survey study. Partial Least Square Structural Equation Modeling was used to analyze the survey data after conducting pre-analysis data screening.

Findings

This study shows that information security training programs must be designed by practitioners to target the mobile self-efficacy (MSE) of device users. It also reveals that practitioners must design mobile device management systems along with processes and procedures that guides users to take practical steps at protecting their devices. This study shows the high impact of MSE on users’ protection motivation (PM) to protect their mobile devices. Additionally, this study reveals that the PM of users influences their usage of mobile device security.

Originality/value

This study makes theoretical contributions to the existing information security literature. It confirms PM theory’s power to predict user behavior within the context of mobile device security usage. Additionally, this study investigates mobile users’ actual security usage. Thus, it goes beyond users’ intention.

Details

Journal of Intellectual Capital, vol. 21 no. 2
Type: Research Article
ISSN: 1469-1930

Keywords

Article
Publication date: 5 June 2020

Chin-Feng Lai, Hua-Xu Zhong, Po-Sheng Chiu and Ying-Hung Pu

This study aims to adopt cloud technology and develop a “cloud bookcase system” to make it possible to provide consistent mobile reading experiences to allow readers to use all…

Abstract

Purpose

This study aims to adopt cloud technology and develop a “cloud bookcase system” to make it possible to provide consistent mobile reading experiences to allow readers to use all kinds of mobile devices to read e-books.

Design/methodology/approach

This study implements a cloud bookcase and uses four indicators (system quality, information quality, service quality, user satisfaction) to evaluate the system for reading e-books.

Findings

After completing the system, the authors used a questionnaire to evaluate the system. The results show that the quality can meet the needs and satisfaction of users. Subsequent interviews with some of the participants also reveal the biggest concerns of readers include library policy, resources and system quality.

Practical implications

System quality, information quality, service quality and satisfaction are adopted as the indicators to assess the ratings from people using mobile devices to read e-books on the cloud bookcase system developed in this study to evaluate whether the cloud bookcase system is a successful information system as well as the relations between mobile device factors and user ratings. The results indicate that the ratings from more than half of the readers for the system, as shown in the various indicators, achieve more than 60%. From the interview results, the results show that some participants also reveal there is still room for improvement in some areas.

Originality/value

This study implements a cloud bookcase and there are three contributions: (1) the cloud bookcase system developed in this study based on related theories proves able to meet the needs of users, (2) this system had high ratings for all four indicators, (3) the interview responses reveal that most people regard system quality as the most important, and some of the people value some of the items more, including library policy, readers' interests and more resources, especially the number of e-books available.

Details

Library Hi Tech, vol. 39 no. 2
Type: Research Article
ISSN: 0737-8831

Keywords

Article
Publication date: 1 February 2008

Kevin Curran and Winston Huang

Student dropout rates have been a source of contention throughout many Universities worldwide. Universities recognize this fact and many have acted to improve their induction…

Abstract

Purpose

Student dropout rates have been a source of contention throughout many Universities worldwide. Universities recognize this fact and many have acted to improve their induction process for students joining the University in the first year. However, student dropout rates continue to be higher than acceptable and it is in this context that this project has been undertaken. However, quite often there is no additional support provided to overseas students arriving on the campus. Frequently, these students are taken into final year and miss all the inductions aimed at year 1 students. The purpose of this research is to investigate the feasibility of designing an information portal in the Chinese language to assist new arrivals on campus.

Design/methodology/approach

The authors started with the premise that any additional information that can make life easier for these foreign language students is to be welcomed. Mobile communications is a continually growing sector in industry and a wide variety of visual services such as video‐on‐demand have been created which are limited by low‐bandwidth network infrastructures. The distinction between mobile phones and personal device assistants has already become blurred with pervasive computing being the term coined to describe the tendency to integrate computing and communication into everyday life.

Findings

The authors believe that placing location based campus information on a mobile device outlining key information concerning the University of Ulster at the Magee campus in the Chinese language will assist overseas students greatly in the crucial early days of arrival at the University.

Originality/value

This paper outlines the unique implementation of a multilingual Chinese–English Campus information portal for mobile devices which assists fresh arrivals in locating important information about the university. The research finds that students are assisted by mobile portals created in their native language directing them to important sources of information on campus.

Details

Interactive Technology and Smart Education, vol. 5 no. 1
Type: Research Article
ISSN: 1741-5659

Keywords

Article
Publication date: 12 February 2019

Sunday Adewale Olaleye, Dandison Ukpabi, Heikki Karjaluoto and Ioannis Rizomyliotis

The purpose of this paper is to use the consumer-based discrepancy theory to examine consumers’ behavioral motivations for using mobile devices and the factors that influence the…

Abstract

Purpose

The purpose of this paper is to use the consumer-based discrepancy theory to examine consumers’ behavioral motivations for using mobile devices and the factors that influence the rapid diffusion of Chinese mobile devices in Nigeria.

Design/methodology/approach

Data were collected using focus group interviews with samples cutting across users, technicians and experts from Port Harcourt, Nigeria’s industrial capital. This study conducted a thematic analysis of the data with NVivo Pro 11 for deductive coding.

Findings

The authors found that weak regulatory environment opened the Nigerian mobile market to the influx of mobile devices from Chinese local manufacturers. Though largely absent in developed markets, Chinese mobile devices are household names in Africa, particularly Nigeria. Having studied the Nigerian market, Chinese mobile device manufacturers have incorporated features and specifications in their mobile devices that are adapted specifically to this market. Our findings also show that these “China phones and tablets” are significantly inferior to those manufactured by global brands. However, consumer complaints have led to significant improvements in their quality. Consequently, due to their successful diffusion, Nigeria is being used as a launching pad to other African countries.

Research limitations/implications

While the study could not look at the economic, environmental and health implications of the high death rate of the mobile devices, it however provides useful insights on the application of the consumer-based discrepancy theory: expectation vs performance, in the Nigerian mobile market context.

Originality/value

The study is the first to empirically examine the diffusion of Chinese mobile devices in one of the key emerging markets in Africa. The study provides blueprint for the local regulatory authorities on how to strengthen their regulatory oversight and also advances critical understanding on how Chinese mobile device manufacturers can improve their technologies and optimize market opportunity in Africa.

Details

International Journal of Emerging Markets, vol. 14 no. 5
Type: Research Article
ISSN: 1746-8809

Keywords

Article
Publication date: 31 May 2022

Yu-Jung Cheng and Kuang-Hua Chen

The present study aims to clarify the following two research objectives: (1) the user behavior of government websites during the coronavirus disease (COVID-19) period and (2) how…

Abstract

Purpose

The present study aims to clarify the following two research objectives: (1) the user behavior of government websites during the coronavirus disease (COVID-19) period and (2) how the government improved government's website design during the COVID-19 period.

Design/methodology/approach

The authors used website analytics to examine usage patterns and behaviors of the government website via personal computer (PC) and mobile devices during the COVID-19 pandemic. In-depth interviews were conducted to understand the user experience of government website users and to gather users' opinions about how government websites should be redesigned.

Findings

With the rising of the COIVID-19 pandemic, most studies expect that the use of government websites through a mobile device will grow astonishingly. The authors uncovered that the COVID-19 pandemic did not increase the use of government websites. Instead, severe declines in website usage were observed for all device users with the declines being more pronounced in mobile device users than in PC users. This is an admonitory caveat that reveals public health and pandemic prevention information announced on government websites cannot be effectively transmitted to the general public through official online platforms.

Originality/value

The study highlights the gap in information behavior and usage patterns between PC and mobile device users when visiting government websites. Although mobile devices brought many new visitors, mobile devices are ineffective in retaining visitors and continuous long-term use. The results of localize experience is helpful in the improvement of government website evaluation worldwide.

Details

Aslib Journal of Information Management, vol. 75 no. 1
Type: Research Article
ISSN: 2050-3806

Keywords

1 – 10 of over 16000