Search results
1 – 10 of over 16000
This study aims to investigate the differences in security-conscious (group A) and regular (group B) users’ behaviors and practices on mobile devices.
Abstract
Purpose
This study aims to investigate the differences in security-conscious (group A) and regular (group B) users’ behaviors and practices on mobile devices.
Design/methodology/approach
A survey was used to investigate the differences in behaviors and practices of security-conscious users (group A) and regular users (group B) on mobile devices. Each group will have 50 participants for a total of 100.
Findings
The analysis revealed differences in the behaviors and practices of security-conscious and regular users. The results indicated that security-conscious users engage in behaviors and practices that are more secure on mobile devices when compared with regular users.
Research limitations/implications
The results will help recommend the best behaviors and practices for mobile device users, increasing mobile device security.
Social implications
The results will help society to be more aware of security behaviors and practices on mobile devices.
Originality/value
This study answers the call for addressing the weaknesses and vulnerabilities in mobile device security. It develops a research instrument to measure the differences in behaviors and practices of security-conscious and regular mobile device users.
Details
Keywords
The aim of the research is to discuss the design and development of a mobile application using two technologies known as software agent (SA) and mobile web services.
Abstract
Purpose
The aim of the research is to discuss the design and development of a mobile application using two technologies known as software agent (SA) and mobile web services.
Design/methodology/approach
The objectives were achieved by testing the integration of SAs and mobile web services into mobile applications. The approach suggested in the paper has relied on some modeling techniques such as service chart diagram and addressed some security issues.
Findings
It was found in the course of the work the necessity of being aware of the limitations of mobile devices, despite all the major developments that are happening. In addition, it was found that it is deemed appropriate to provide some modeling techniques which suit the development of mobile applications.
Originality/value
The paper discusses the concept of mobile web services. The paper is particularly useful to those who are in the field of mobile computing.
Details
Keywords
The purpose of this paper is to get an insight in users’ opinion on library resources/services on small screen mobile devices. Objectives were to establish which types of small…
Abstract
Purpose
The purpose of this paper is to get an insight in users’ opinion on library resources/services on small screen mobile devices. Objectives were to establish which types of small screen mobile devices are used and to find out is there a tendency for using academic and educational contents on such devices. Furthermore, aim was to identify whether the users need mobile friendly library web site and services at all. Also, what library resources/services and to what extent respondents consider as the important ones for mobile friendly customization. Finally the results would serve as an orientation in building mobile friendly library web site and services. The author believed that the users were still unaware of the possibility of accessing library web sites and services through mobile devices in general; therefore, this survey also had a role of raising awareness and stimulating their interest.
Design/methodology/approach
The survey was focussed on small screen mobile devices with screen size up to seven inches (17.1 cm). Data collection was performed through a questionnaire containing ten questions. The questionnaire was created by LimeSurvey tool, and for mobile optimized version SurveyMonkey.com service was used too. The authors received 295 questionnaires, out of which 285 were taken into account.
Findings
The survey found that the largest number of respondents own smartphone/tablet/phablet. The results show that small screen devices are, to some extent, used for educational, academic and informational purposes (reading of e-books and e-journals, education, data checking, internet searching and searching of handy information), but non-academic purposes still predominate (texting, reading e-mails, phone calls, taking pictures). Overall 64 percent of the respondents has expressed need for small screen mobile devices customized library resources/services, but there are 30 percent of undecided respondents. Croatian Scientific Bibliography, e-journals database (EZB), online databases, contact information and lecture halls reservations, has been resources/services requested by respondents to be available in a mobile friendly mode.
Originality/value
The survey examines users’ opinion on a new library service before its implementation. Besides giving us a precise insight into the Rudjer Bošković Institute library users’ interest and needs for mobile friendly customization of existing library resource/service, survey gives a unique insight into the correlation of age and gender of the respondents and their answers to the question about having a small screen mobile device and opinion about the customization of library resources and services. To the author’s knowledge, this is the first users’ survey on this topic in Croatia.
Details
Keywords
Pervasive computing environments such as a pervasive campus domain, shopping, etc. will become commonplaces in the near future. The key to enhance these system environments with…
Abstract
Purpose
Pervasive computing environments such as a pervasive campus domain, shopping, etc. will become commonplaces in the near future. The key to enhance these system environments with services relies on the ability to effectively model and represent contextual information, as well as spontaneity in downloading and executing the service interface on a mobile device. The system needs to provide an infrastructure that handles the interaction between a client device that requests a service and a server which responds to the client's request via Web service calls. The system should relieve end‐users from low‐level tasks of matching services with locations or other context information. The mobile users do not need to know or have any knowledge of where the service resides, how to call a service, what the service API detail is and how to execute a service once downloaded. All these low‐level tasks can be handled implicitly by a system. The aim of this paper is to investigate the notion of context‐aware regulated services, and how they should be designed, and implemented.
Design/methodology/approach
The paper presents a detailed design, and prototype implementation of the system, called mobile hanging services (MHS), that provides the ability to execute mobile code (service application) on demand and control entities' behaviours in accessing services in pervasive computing environments. Extensive evaluation of this prototype is also provided.
Findings
The framework presented in this paper enables a novel contextual services infrastructure that allows services to be described at a high level of abstraction and to be regulated by contextual policies. This contextual policy governs the visibility and execution of contextual services in the environment. In addition, a range of contextual services is developed to illustrate different types of services used in the framework.
Originality/value
The main contribution of this paper is a high‐level model of a system for context‐aware regulated services, which consists of environments (domains and spaces), contextual software components, entities and computing devices.
Details
Keywords
Ramaraj Palanisamy and Yang Wu
This study/ paper aims to empirically examine the user attitude on perceived security of enterprise systems (ES) mobility. Organizations are adopting mobile technologies for…
Abstract
Purpose
This study/ paper aims to empirically examine the user attitude on perceived security of enterprise systems (ES) mobility. Organizations are adopting mobile technologies for various business applications including ES to increase the flexibility and to gain sustainable competitive advantage. At the same time, end-users are exposed to security issues when using mobile technologies. The ES have seen breaches and malicious intrusions thereby more sophisticated recreational and commercial cybercrimes have been witnessed. ES have seen data breaches and malicious intrusions leading to more sophisticated cybercrimes. Considering the significance of security in ES mobility, the research questions in this study are: What are the security issues of ES mobility? What are the influences of users’ attitude towards those security issues? What is the impact of users’ attitude towards security issues on perceived security of ES mobility?
Design/methodology/approach
These questions are addressed by empirically testing a security model of mobile ES by collecting data from users of ES mobile systems. Hypotheses were evolved and tested by data collected through a survey questionnaire. The questionnaire survey was administered to 331 users from Chinese small and medium-sized enterprises (SME). The data was statistically analysed by tools such as correlation, factor analysis, regression and the study built a structural equation model (SEM) to examine the interactions between the variables.
Findings
The study results have identified the following security issues: users’ attitude towards mobile device security issues; users’ attitude towards wireless network security issues; users’ attitude towards cloud computing security issues; users’ attitude towards application-level security issues; users’ attitude towards data (access) level security issues; and users’ attitude towards enterprise-level security issues.
Research limitations/implications
The study results are based on a sample of users from Chinese SMEs. The findings may lack generalizability. Therefore, researchers are encouraged to examine the model in a different context. The issues requiring further investigation are the role of gender and type of device on perceived security of ES mobile systems.
Practical implications
The results show that the key security issues are related to a mobile device, wireless network, cloud computing, applications, data and enterprise. By understanding these issues and the best practices, organizations can maintain a high level of security of their mobile ES.
Social implications
Apart from understanding the best practices and the key issues, the authors suggest management and end-users to work collaboratively to achieve a high level of security of the mobile ES.
Originality/value
This is an empirical study conducted from the users’ perspective for validating the set of research hypotheses related to key security issues on the perceived security of mobile ES.
Details
Keywords
Anthony Duke Giwah, Ling Wang, Yair Levy and Inkyoung Hur
The purpose of this paper is to investigate the information security behavior of mobile device users in the context of data breach. Much of the previous research done in user…
Abstract
Purpose
The purpose of this paper is to investigate the information security behavior of mobile device users in the context of data breach. Much of the previous research done in user information security behavior have been in broad contexts, therefore creating needs of research that focuses on specific emerging technologies and trends such as mobile technology.
Design/methodology/approach
This study was an empirical study that gathered survey data from 390 mobile users. Delphi study and pilot study were conducted prior to the main survey study. Partial Least Square Structural Equation Modeling was used to analyze the survey data after conducting pre-analysis data screening.
Findings
This study shows that information security training programs must be designed by practitioners to target the mobile self-efficacy (MSE) of device users. It also reveals that practitioners must design mobile device management systems along with processes and procedures that guides users to take practical steps at protecting their devices. This study shows the high impact of MSE on users’ protection motivation (PM) to protect their mobile devices. Additionally, this study reveals that the PM of users influences their usage of mobile device security.
Originality/value
This study makes theoretical contributions to the existing information security literature. It confirms PM theory’s power to predict user behavior within the context of mobile device security usage. Additionally, this study investigates mobile users’ actual security usage. Thus, it goes beyond users’ intention.
Details
Keywords
Chin-Feng Lai, Hua-Xu Zhong, Po-Sheng Chiu and Ying-Hung Pu
This study aims to adopt cloud technology and develop a “cloud bookcase system” to make it possible to provide consistent mobile reading experiences to allow readers to use all…
Abstract
Purpose
This study aims to adopt cloud technology and develop a “cloud bookcase system” to make it possible to provide consistent mobile reading experiences to allow readers to use all kinds of mobile devices to read e-books.
Design/methodology/approach
This study implements a cloud bookcase and uses four indicators (system quality, information quality, service quality, user satisfaction) to evaluate the system for reading e-books.
Findings
After completing the system, the authors used a questionnaire to evaluate the system. The results show that the quality can meet the needs and satisfaction of users. Subsequent interviews with some of the participants also reveal the biggest concerns of readers include library policy, resources and system quality.
Practical implications
System quality, information quality, service quality and satisfaction are adopted as the indicators to assess the ratings from people using mobile devices to read e-books on the cloud bookcase system developed in this study to evaluate whether the cloud bookcase system is a successful information system as well as the relations between mobile device factors and user ratings. The results indicate that the ratings from more than half of the readers for the system, as shown in the various indicators, achieve more than 60%. From the interview results, the results show that some participants also reveal there is still room for improvement in some areas.
Originality/value
This study implements a cloud bookcase and there are three contributions: (1) the cloud bookcase system developed in this study based on related theories proves able to meet the needs of users, (2) this system had high ratings for all four indicators, (3) the interview responses reveal that most people regard system quality as the most important, and some of the people value some of the items more, including library policy, readers' interests and more resources, especially the number of e-books available.
Details
Keywords
Kevin Curran and Winston Huang
Student dropout rates have been a source of contention throughout many Universities worldwide. Universities recognize this fact and many have acted to improve their induction…
Abstract
Purpose
Student dropout rates have been a source of contention throughout many Universities worldwide. Universities recognize this fact and many have acted to improve their induction process for students joining the University in the first year. However, student dropout rates continue to be higher than acceptable and it is in this context that this project has been undertaken. However, quite often there is no additional support provided to overseas students arriving on the campus. Frequently, these students are taken into final year and miss all the inductions aimed at year 1 students. The purpose of this research is to investigate the feasibility of designing an information portal in the Chinese language to assist new arrivals on campus.
Design/methodology/approach
The authors started with the premise that any additional information that can make life easier for these foreign language students is to be welcomed. Mobile communications is a continually growing sector in industry and a wide variety of visual services such as video‐on‐demand have been created which are limited by low‐bandwidth network infrastructures. The distinction between mobile phones and personal device assistants has already become blurred with pervasive computing being the term coined to describe the tendency to integrate computing and communication into everyday life.
Findings
The authors believe that placing location based campus information on a mobile device outlining key information concerning the University of Ulster at the Magee campus in the Chinese language will assist overseas students greatly in the crucial early days of arrival at the University.
Originality/value
This paper outlines the unique implementation of a multilingual Chinese–English Campus information portal for mobile devices which assists fresh arrivals in locating important information about the university. The research finds that students are assisted by mobile portals created in their native language directing them to important sources of information on campus.
Details
Keywords
Sunday Adewale Olaleye, Dandison Ukpabi, Heikki Karjaluoto and Ioannis Rizomyliotis
The purpose of this paper is to use the consumer-based discrepancy theory to examine consumers’ behavioral motivations for using mobile devices and the factors that influence the…
Abstract
Purpose
The purpose of this paper is to use the consumer-based discrepancy theory to examine consumers’ behavioral motivations for using mobile devices and the factors that influence the rapid diffusion of Chinese mobile devices in Nigeria.
Design/methodology/approach
Data were collected using focus group interviews with samples cutting across users, technicians and experts from Port Harcourt, Nigeria’s industrial capital. This study conducted a thematic analysis of the data with NVivo Pro 11 for deductive coding.
Findings
The authors found that weak regulatory environment opened the Nigerian mobile market to the influx of mobile devices from Chinese local manufacturers. Though largely absent in developed markets, Chinese mobile devices are household names in Africa, particularly Nigeria. Having studied the Nigerian market, Chinese mobile device manufacturers have incorporated features and specifications in their mobile devices that are adapted specifically to this market. Our findings also show that these “China phones and tablets” are significantly inferior to those manufactured by global brands. However, consumer complaints have led to significant improvements in their quality. Consequently, due to their successful diffusion, Nigeria is being used as a launching pad to other African countries.
Research limitations/implications
While the study could not look at the economic, environmental and health implications of the high death rate of the mobile devices, it however provides useful insights on the application of the consumer-based discrepancy theory: expectation vs performance, in the Nigerian mobile market context.
Originality/value
The study is the first to empirically examine the diffusion of Chinese mobile devices in one of the key emerging markets in Africa. The study provides blueprint for the local regulatory authorities on how to strengthen their regulatory oversight and also advances critical understanding on how Chinese mobile device manufacturers can improve their technologies and optimize market opportunity in Africa.
Details
Keywords
Yu-Jung Cheng and Kuang-Hua Chen
The present study aims to clarify the following two research objectives: (1) the user behavior of government websites during the coronavirus disease (COVID-19) period and (2) how…
Abstract
Purpose
The present study aims to clarify the following two research objectives: (1) the user behavior of government websites during the coronavirus disease (COVID-19) period and (2) how the government improved government's website design during the COVID-19 period.
Design/methodology/approach
The authors used website analytics to examine usage patterns and behaviors of the government website via personal computer (PC) and mobile devices during the COVID-19 pandemic. In-depth interviews were conducted to understand the user experience of government website users and to gather users' opinions about how government websites should be redesigned.
Findings
With the rising of the COIVID-19 pandemic, most studies expect that the use of government websites through a mobile device will grow astonishingly. The authors uncovered that the COVID-19 pandemic did not increase the use of government websites. Instead, severe declines in website usage were observed for all device users with the declines being more pronounced in mobile device users than in PC users. This is an admonitory caveat that reveals public health and pandemic prevention information announced on government websites cannot be effectively transmitted to the general public through official online platforms.
Originality/value
The study highlights the gap in information behavior and usage patterns between PC and mobile device users when visiting government websites. Although mobile devices brought many new visitors, mobile devices are ineffective in retaining visitors and continuous long-term use. The results of localize experience is helpful in the improvement of government website evaluation worldwide.
Details