On mobile device security practices and training efficacy

An empirical study

Amita Goyal Chin, Ugochukwu Etudo, Mark Alan Harris

Research output: Contribution to journalArticle

4 Citations (Scopus)

Abstract

The past decade has witnessed an explosion of the penetration of mobile technology through all strata of society. Mobile technologies including cell phones, tablets, and even some e-readers are used for surfing the web, running apps, reading email, posting to social media, conducting banking transactions, etc. This liberation from desktop and laptop machines and from the requirements of a specific geographic location raises concerns regarding the problems and challenges of maintaining security while traversing cyberspace. The purpose of this empirical study is to investigate the attitudes, behaviors, and security practices of business students using mobile devices to access online resources. One group of students surveyed received no specific training regarding mobile security while a second group was surveyed following the completion of an online training program. Results show no significant difference in the security practices of the two groups, indicating that commercially available security training programs are largely inefficacious with respect to modifying student behavior and that additional research on training efficacy is needed.

Original languageEnglish (US)
Pages (from-to)235-252
Number of pages18
JournalInformatics in Education
Volume15
Issue number2
DOIs
StatePublished - Jan 1 2016

Fingerprint

Mobile devices
Students
training program
Electronic mail
Application programs
cell phone
Group
student
Explosions
social stratum
liberation
social media
virtual reality
banking
transaction
Industry
resources

Keywords

  • Higher education
  • Mobile device
  • Mobile technology
  • Training

ASJC Scopus subject areas

  • Education
  • Communication
  • Computer Science Applications

Cite this

On mobile device security practices and training efficacy : An empirical study. / Goyal Chin, Amita; Etudo, Ugochukwu; Harris, Mark Alan.

In: Informatics in Education, Vol. 15, No. 2, 01.01.2016, p. 235-252.

Research output: Contribution to journalArticle

Goyal Chin, Amita ; Etudo, Ugochukwu ; Harris, Mark Alan. / On mobile device security practices and training efficacy : An empirical study. In: Informatics in Education. 2016 ; Vol. 15, No. 2. pp. 235-252.
@article{14e1a436d4df46c59cdfbe3d69a8ef87,
title = "On mobile device security practices and training efficacy: An empirical study",
abstract = "The past decade has witnessed an explosion of the penetration of mobile technology through all strata of society. Mobile technologies including cell phones, tablets, and even some e-readers are used for surfing the web, running apps, reading email, posting to social media, conducting banking transactions, etc. This liberation from desktop and laptop machines and from the requirements of a specific geographic location raises concerns regarding the problems and challenges of maintaining security while traversing cyberspace. The purpose of this empirical study is to investigate the attitudes, behaviors, and security practices of business students using mobile devices to access online resources. One group of students surveyed received no specific training regarding mobile security while a second group was surveyed following the completion of an online training program. Results show no significant difference in the security practices of the two groups, indicating that commercially available security training programs are largely inefficacious with respect to modifying student behavior and that additional research on training efficacy is needed.",
keywords = "Higher education, Mobile device, Mobile technology, Training",
author = "{Goyal Chin}, Amita and Ugochukwu Etudo and Harris, {Mark Alan}",
year = "2016",
month = "1",
day = "1",
doi = "10.15388/infedu.2016.12",
language = "English (US)",
volume = "15",
pages = "235--252",
journal = "Informatics in Education",
issn = "1648-5831",
publisher = "Institute of Mathematics and Informatics",
number = "2",

}

TY - JOUR

T1 - On mobile device security practices and training efficacy

T2 - An empirical study

AU - Goyal Chin, Amita

AU - Etudo, Ugochukwu

AU - Harris, Mark Alan

PY - 2016/1/1

Y1 - 2016/1/1

N2 - The past decade has witnessed an explosion of the penetration of mobile technology through all strata of society. Mobile technologies including cell phones, tablets, and even some e-readers are used for surfing the web, running apps, reading email, posting to social media, conducting banking transactions, etc. This liberation from desktop and laptop machines and from the requirements of a specific geographic location raises concerns regarding the problems and challenges of maintaining security while traversing cyberspace. The purpose of this empirical study is to investigate the attitudes, behaviors, and security practices of business students using mobile devices to access online resources. One group of students surveyed received no specific training regarding mobile security while a second group was surveyed following the completion of an online training program. Results show no significant difference in the security practices of the two groups, indicating that commercially available security training programs are largely inefficacious with respect to modifying student behavior and that additional research on training efficacy is needed.

AB - The past decade has witnessed an explosion of the penetration of mobile technology through all strata of society. Mobile technologies including cell phones, tablets, and even some e-readers are used for surfing the web, running apps, reading email, posting to social media, conducting banking transactions, etc. This liberation from desktop and laptop machines and from the requirements of a specific geographic location raises concerns regarding the problems and challenges of maintaining security while traversing cyberspace. The purpose of this empirical study is to investigate the attitudes, behaviors, and security practices of business students using mobile devices to access online resources. One group of students surveyed received no specific training regarding mobile security while a second group was surveyed following the completion of an online training program. Results show no significant difference in the security practices of the two groups, indicating that commercially available security training programs are largely inefficacious with respect to modifying student behavior and that additional research on training efficacy is needed.

KW - Higher education

KW - Mobile device

KW - Mobile technology

KW - Training

UR - http://www.scopus.com/inward/record.url?scp=85003766047&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=85003766047&partnerID=8YFLogxK

U2 - 10.15388/infedu.2016.12

DO - 10.15388/infedu.2016.12

M3 - Article

VL - 15

SP - 235

EP - 252

JO - Informatics in Education

JF - Informatics in Education

SN - 1648-5831

IS - 2

ER -