1. Ensuring the security of information by understanding user behaviour on a mobile device
- Author
-
Bernik, Igor and Markelj, Blaž
- Subjects
grožnje ,varnost ,mobilne naprave ,študenti ,udc:004.056:621.395.721.5 - Abstract
Namen prispevka: Uporabniki različnih demografskih skupin vsakodnevno uporabljajo mobilne naprave v osebne in poslovne namene. Pri uporabi mobilnih naprav s pomočjo nameščene programske opreme in pri dostopanju do omrežij zanemarjajo varovanje informacij in večinoma ne delujejo v skladu s principi informacijske varnosti. Ob nevestni rabi mobilnih naprav je tveganje veliko. Ker so študenti velika skupina uporabnikov mobilnih naprav, ki vstopa v poslovni svet, smo izvedli raziskavo, kako le-ti uporabljajo mobilne naprave, koliko poznajo grožnje in uporabo možnih varnostnih zaščit. S tem znanjem organizacije lahko pripravimo na trenutne in prihajajoče informacijskovarnostne izzive. Metode: Predstavljene ugotovitve temeljijo na deskriptivnih dognanjih, izhajajočih iz pregleda virov in izvedene raziskave med študentsko populacijo ter analizirane s pomočjo statističnih metod. Ugotovitve: Študenti slabo poznajo načela varne uporabe mobilnih naprav, programske opreme zanje ter groženj in varnostnih rešitev. Glavne ugotovitve raziskave, izvedene 2012, pokažejo nizko stopnjo zavedanja in poznavanja groženj, ki pretijo uporabnikom mobilnih naprav ter nizko stopnjo uporabe varnostnih rešitev. Mobilne naprave postajajo mesto, kjer se shranjujejo in obdelujejo osebni in poslovni podatki. Pri mobilnih napravah je meja med osebnimi in poslovnimi podatki popolnoma izginila. Zato je pri uporabi mobilnih naprav priporočljivo spoštovati informacijskovarnostna priporočila in s tem zagotoviti ustrezno zaščito podatkov, do katerih imamo dostop. Omejitve/uporabnost raziskave Znanstvene objave na temo, ki jo obravnavamo v prispevku, so redke. Navedb primerov širših razsežnosti zlorab iz prakse, preiskovanja kriminalitete in dejanskih sodnih obravnav pa je malo. Praktična uporabnost: Skozi izsledke ugotavljamo načine uporabe mobilne naprave, zavedanje groženj in uporabo varnostnih rešitev. Izvirnost/pomembnost prispevka: Menimo, da je delo na področju uporabe mobilnih naprav originalno in na izviren način obravnava predstavljeno problematiko. Purpose: Mobile devices are used every day by users from various demographic groups, both for personal and business purposes. Users neglect information security and generally do not operate according to the principles of information security while using the mobile devices by using the installed software and accessing networks. When using the mobile devices in unconscious manner the risk is high. Since the students are a very large group of users of mobile devices, we conducted a survey among them on how they use their mobile devices, and how much do they know of the threats and the use of possible security features. Design/Methods/Approach: The presented results are based on descriptive findings resulting from the review of resources and on the research conducted among the student population and subsequently analysed by statistical methods. Findings: Students have poor knowledge of the safe use of mobile devices, the software for them, threats and security solutions. The main findings of the survey, conducted in 2012, show low level of awareness and knowledge of threats to mobile security of smart phones and low level of utilization of security solutions. Mobile devices are becoming a place to store and process personal and business data. In the case of mobile devices the boundary between personal and business data is disappearing completely. Therefore, when using mobile devices it is advisable to observe safety information and recommendations in order to ensure adequate protection of the data to which we have access. Research Limitations / Implications: Scientific publications on the topic under discussion in this paper are rare. Allegations of abuse cases from practice, investigation of crime and the actual court case law is limited. Practical Implications: Through the results of the descriptive analysis and done research ways to use mobile devices are found, as well as the awareness of the threat and use of security solutions. Originality/Value: There is no access to comparative research, so the work on the use of mobile devices is original, since it addresses the issue presented in an original way.
- Published
- 2020