2010 IEEE International Symposium on Technology and Society 2010
DOI: 10.1109/istas.2010.5514610
|View full text |Cite
|
Sign up to set email alerts
|

Digital natives and mobile phones: A survey of practices and attitudes about privacy and security

Abstract: Abstract

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

2
34
0

Year Published

2013
2013
2022
2022

Publication Types

Select...
4
3
2

Relationship

0
9

Authors

Journals

citations
Cited by 37 publications
(36 citation statements)
references
References 7 publications
2
34
0
Order By: Relevance
“…Moreover, half of the users had passwords that were used by others, and 15% saved their password on the mobile device. As a result, this technique is considered insufficient for safeguarding mobile devices [5]. With the Android password pattern, the user is required to drag his/her finger across a touch screen on the three by three adjacent contact dots (i.e.…”
Section: Mobile Authentication Mechanismsmentioning
confidence: 99%
“…Moreover, half of the users had passwords that were used by others, and 15% saved their password on the mobile device. As a result, this technique is considered insufficient for safeguarding mobile devices [5]. With the Android password pattern, the user is required to drag his/her finger across a touch screen on the three by three adjacent contact dots (i.e.…”
Section: Mobile Authentication Mechanismsmentioning
confidence: 99%
“…Importantly, despite the wide availability of a preponderance of electronic devices, the smart mobile phone providing access to a range of services (voice, text, email, social networks, rich media) and ubiquity of network connectivity means that it has become the device of choice for young people [5].…”
Section: Related Workmentioning
confidence: 99%
“…There have been studies conducted in Australia exploring models of technology adoption [3], East Asia [4] and the USA for example [5]. The latter is an example that specifically explored issues around data / information security.…”
Section: Introductionmentioning
confidence: 99%
“…Then, the imposter is able to access all services, applications, and information without authentication. As a result, this technique is considered insufficient for safeguarding mobile devices [6]. Similarly, with the Android password pattern, the user is required to drag his/her finger across a touch screen on the three by three adjacent contact dots (i.e.…”
Section: Introductionmentioning
confidence: 99%