4.5 Article

Always connected, but are smart mobile users getting more security savvy? A survey of smart mobile device users

Journal

BEHAVIOUR & INFORMATION TECHNOLOGY
Volume 33, Issue 12, Pages 1347-1360

Publisher

TAYLOR & FRANCIS LTD
DOI: 10.1080/0144929X.2014.934286

Keywords

cyber crime; smart mobile devices; security survey; mobile security; phishing; malware; unauthorised access

Ask authors/readers for more resources

Smart mobile devices are a potential attack vector for cyber criminal activities. Two hundred and fifty smart mobile device owners from the University of South Australia were surveyed. Not surprisingly, it was found that smart mobile device users in the survey generally underestimated the value that their collective identities have to criminals and how these can be sold. For example, participants who reported jail-breaking/rooting their devices were also more likely to exhibit risky behaviour (e.g. downloading and installing applications from unknown providers), and the participants generally had no idea of the value of their collective identities to criminals which can be sold to the highest bidder. In general, the participants did not understand the risks and may not have perceived cyber crime to be a real threat. Findings from the survey and the escalating complexities of the end-user mobile and online environment underscore the need for regular ongoing training programs for basic online security and the promotion of a culture of security among smart mobile device users. For example, targeted education and awareness programmes could be developed to inform or educate smart mobile device users and correct misconceptions or myths in order to bring about changes in attitudes and usage behaviour (e.g. not taking preventative measures such as strong passwords to protect their devices). Such initiatives would enable all end users (including senior University management who use such devices to access privileged corporate data and accounts) to maintain current knowledge of the latest cyber crime activities and the best cyber security protection measures available.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.5
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

Article Computer Science, Theory & Methods

Technical Requirements and Approaches in Personal Data Control

Junsik Sim, Beomjoong Kim, Kiseok Jeon, Moonho Joo, Jihun Lim, Junghee Lee, Kim-Kwang Raymond Choo

Summary: There is a trend towards providing extended data control to their owners, driven by the introduction of GDPR. This paper surveys the literature to explore existing approaches for personal data control, which mainly focus on facilitating compliance. The privacy regulations in different regions are also examined. Based on the review, technical requirements, research gaps, and potential future directions are identified.

ACM COMPUTING SURVEYS (2023)

Review Computer Science, Information Systems

AI-enabled IoT penetration testing: state-of-the-art and research challenges

Claudia Greco, Giancarlo Fortino, Bruno Crispo, Kim-Kwang Raymond Choo

Summary: This paper provides a comprehensive review of literature on penetration testing of IoT devices and systems. It identifies existing and potential IoT penetration testing applications and proposed approaches, and highlights recent advances in AI-enabled penetration testing methods at the network edge.

ENTERPRISE INFORMATION SYSTEMS (2023)

Article Computer Science, Information Systems

Provable Multiple-Copy Integrity Auditing Scheme for Cloud-Based IoT

Tongtong Sang, Peng Zeng, Kim-Kwang Raymond Choo

Summary: This article proposes a provable multicopy integrity auditing scheme that reduces the verification cost for users to ensure the integrity of data stored on cloud servers. By introducing a hospital information center, the scheme also minimizes computation overhead for users in medical settings.

IEEE SYSTEMS JOURNAL (2023)

Article Computer Science, Hardware & Architecture

Inference of User Desires to Spread Disinformation Based on Social Situation Analytics and Group Effect

Junchang Jing, Zhiyong Zhang, Kim-Kwang Raymond Choo, Kefeng Fan, Bin Song, Lili Zhang

Summary: This article investigates the spreading patterns and regularities of disinformation within and across platforms, and proposes a user propagation desire inference model and an optimization algorithm based on deep neural networks. Experimental results demonstrate that users' desire to spread disinformation is related to their interests and topics, and cross-platform dissemination motivation is weak. These findings can inform fine-grained governance and mitigation strategies to minimize disinformation dissemination.

IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (2023)

Article Business

Understanding the Trends in Blockchain Domain Through an Unsupervised Systematic Patent Analysis

Gianluca Zanella, Charles Zhechao Liu, Kim-Kwang Raymond Choo

Summary: This article introduces an unsupervised patent analysis framework that aims to improve the identification of novelty in blockchain-related patents. The proposed method helps companies better target their R&D efforts and maximize the return on technology investments. Experimental results show high precision and recall of the proposed method.

IEEE TRANSACTIONS ON ENGINEERING MANAGEMENT (2023)

Article Engineering, Civil

CITS-MEW: Multi-Party Entangled Watermark in Cooperative Intelligent Transportation System

Tong Wu, Xinghua Li, Yinbin Miao, Mengfan Xu, Haiyan Zhang, Ximeng Liu, Kim-Kwang Raymond Choo

Summary: Federated learning is beneficial for building better cooperative intelligent transportation systems (C-ITS) with intellectual property protection. Existing research on watermark-based protection in centralized models is not effective in federated learning due to differences in watermark distribution and loss of global model accuracy. To address these issues, we propose a multi-party entangled watermark algorithm in federated learning. Our scheme includes a local watermark enhancement algorithm to solve local watermark failures and a global entanglement aggregation algorithm to mitigate the loss of global model accuracy. Experimental results show significant advantages of our proposal in model accuracy and watermark success rate compared to existing watermark schemes in federated learning.

IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS (2023)

Letter Computer Science, Information Systems

BSKCN and BSAML: blind signatures from the module lattice and the asymmetric module lattice

Xiaofan Liu, Wei Ren, Kim-Kwang Raymond Choo

FRONTIERS OF COMPUTER SCIENCE (2023)

Article Computer Science, Information Systems

BESIFL: Blockchain-Empowered Secure and Incentive Federated Learning Paradigm in IoT

Yajing Xu, Zhihui Lu, Keke Gai, Qiang Duan, Junxiong Lin, Jie Wu, Kim-Kwang Raymond Choo

Summary: Federated learning (FL) is a promising approach for efficient machine learning with privacy protection in distributed environments such as IoT and MEC. The effectiveness of FL depends on participant nodes contributing their data and computing capacities to collaboratively train a global model. To enhance FL security and performance, this article proposes a blockchain-based secure and incentive FL (BESIFL) paradigm. BESIFL utilizes blockchain to achieve a fully decentralized FL system, integrating effective mechanisms for malicious node detection and incentive management in a unified framework. Experimental results demonstrate the effectiveness of BESIFL in improving FL performance through protection against malicious nodes, incentive management, and selection of credible nodes.

IEEE INTERNET OF THINGS JOURNAL (2023)

Article Computer Science, Cybernetics

Disinformation Propagation Trend Analysis and Identification Based on Social Situation Analytics and Multilevel Attention Network

Junchang Jing, Fei Li, Bin Song, Zhiyong Zhang, Kim-Kwang Raymond Choo

Summary: This study proposes a method for analyzing and identifying the diffusion trends of digital disinformation on online social networks. The method utilizes social situation analytics and a multilevel attention network to accurately identify and predict the spread of disinformation.

IEEE TRANSACTIONS ON COMPUTATIONAL SOCIAL SYSTEMS (2023)

Article Computer Science, Artificial Intelligence

An Efficient Multilayered Linkable Ring Signature Scheme With Logarithmic Size for Anonymous Payment in Vehicle-to-Grid Networks

Yulin Liu, Debiao He, Zijian Bao, Huaqun Wang, Muhammad Khurram Khan, Kim-Kwang Raymond Choo

Summary: Vehicle-to-Grid (V2G) networks are potential solutions to energy and environmental challenges, but security is a key concern. To address the issue of private information leakage in V2G networks, we propose an efficient multilayered linkable ring signature scheme called Emularis, along with an anonymous payment scheme. Rigorous security analysis proves that Emularis ensures security and privacy requirements, while also outperforming existing schemes in terms of communication and computation costs.

IEEE TRANSACTIONS ON INTELLIGENT VEHICLES (2023)

Article Computer Science, Information Systems

Privacy-Preserving and Reliable Decentralized Federated Learning

Yuanyuan Gao, Lei Zhang, Lulu Wang, Kim-Kwang Raymond Choo, Rui Zhang

Summary: In this paper, two new tools, quality-based aggregation method and extended dynamic contribution broadcast encryption (DConBE), are introduced. Based on these tools and local differential privacy, a privacy-preserving and reliable decentralized federated learning (FL) scheme is proposed to support batch joining/leaving of clients with minimal delay and high model accuracy.

IEEE TRANSACTIONS ON SERVICES COMPUTING (2023)

Article Computer Science, Information Systems

Verifiable and Dynamic Multi-Keyword Search Over Encrypted Cloud Data Using Bitmap

Feng Li, Jianfeng Ma, Yinbin Miao, Qi Jiang, Ximeng Liu, Kim-Kwang Raymond Choo

Summary: Searchable Symmetric Encryption (SSE) has attracted attention for enabling users to search encrypted data without decryption. However, existing SSE schemes suffer from low search efficiency and lack support for multi-keyword search, dynamic updates, and result verification. To address these issues, we propose a Verifiable and Dynamic Multi-keyword Search (VDMS) scheme using bitmap and RSA accumulator, offering efficient, verifiable, and updated multi-keyword search. The scheme employs bitmap as a data structure for indexes to improve search efficiency and reduce storage space. The combination of RSA accumulator and bitmap ensures result correctness. Security analysis shows that VDMS is adaptively secure against Chosen-Keyword Attacks (CKA), and experiments using real-world data demonstrate its efficiency and feasibility.

IEEE TRANSACTIONS ON CLOUD COMPUTING (2023)

Article Computer Science, Information Systems

Towards Efficient Verifiable Boolean Search Over Encrypted Cloud Data

Feng Li, Jianfeng Ma, Yinbin Miao, Zhiquan Liu, Kim-Kwang Raymond Choo, Ximeng Liu, Robert H. Deng

Summary: Symmetric Searchable Encryption (SSE) schemes have been extensively explored for improved function, efficiency, and security. However, in real-world settings, additional functions such as forward and backward privacy and support for boolean search are needed. In this article, we propose the construction of Verifiable Boolean Search (VBS) over encrypted data and enhance it to achieve Forward and Backward privacy (VBS-FB). We also provide a formal proof of security and evaluate the performance using real-world datasets.

IEEE TRANSACTIONS ON CLOUD COMPUTING (2023)

Article Computer Science, Information Systems

Privacy-Preserving Top-$k$k Spatial Keyword Queries in Fog-Based Cloud Computing

Xinghua Li, Lizhong Bai, Yinbin Miao, Siqi Ma, Jianfeng Ma, Ximeng Liu, Kim-Kwang Raymond Choo

Summary: With the rise in popularity of location-based services, spatial keyword queries have become an important application. To address the issues of privacy leakage and network bandwidth overheads, we propose PSKF, a Privacy-preserving top-k Spatial Keyword query system based on Fog computing. By utilizing IR-tree and distributing subtrees among fog servers, we achieve efficient search and improve search efficiency. Formal security analysis shows that our proposed PSKF scheme achieves Indistinguishability under Known-Plaintext Attacks (IND-KPA), and extensive experiments demonstrate its efficiency and feasibility in practical applications.

IEEE TRANSACTIONS ON SERVICES COMPUTING (2023)

Article Computer Science, Information Systems

EPNS: Efficient Privacy-Preserving Intelligent Traffic Navigation From Multiparty Delegated Computation in Cloud-Assisted VANETs

Jun Zhou, Shiying Chen, Kim-Kwang Raymond Choo, Zhenfu Cao, Xiaolei Dong

Summary: Real-time navigation is important in various applications, and preserving location privacy is a concern. Existing approaches use pseudonyms or fully homomorphic encryption (FHE), but they have limitations. This paper proposes an efficient multiparty delegated computation (MPDC) and a lightweight privacy-preserving real-time intelligent traffic navigation scheme (EPNS) to address these issues, providing secure evaluation and accurate prediction.

IEEE TRANSACTIONS ON MOBILE COMPUTING (2023)

No Data Available