Interpreting Users’ Perceptions of Mobile Security Methods and Their Effectiveness
Richmond Adebiaye 

Dr. Richmond Adebiaye, College of Information Technology, Head of Information Systems Department, Ajman University, Ajman UAE.
Manuscript received on 13 April 2017 | Revised Manuscript received on 20 April 2017 | Manuscript Published on 30 April 2017 | PP: 83-90 | Volume-6 Issue-4, April 2017 | Retrieval Number: D4917046417/17©BEIESP
Open Access | Editorial and Publishing Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: The increasing adoption of open source operating system (OS) platforms, such as Android and iOS, have opened up new security vulnerabilities and threats to mobile devices and other wireless access technologies. Recent statistics show that mobile networks around the globe “generate exceedingly over 86 exabytes of traffic annually”. Thus, mobile security vulnerabilities and threats such as SMS spam, rogue apps, adware, malware, cyber-attacks and unlawful eavesdropping have become an ever-increasing problem for mobile users around the world. This paper proposes a quantitative research survey to investigate mobile device security and the implications of security application recommendations for its users. The objective is to identify increased security risks, and recommend best security practices for mobile users. To obtain quantitative values, webbased questionnaires using the Likert scale were used, and data processed by factor analysis, ANOVA and multiple regression analysis tabulated along a continuum in numerical form. The study thus identifies and reveals the impacts of smartphone security threats such as mobile adware, rogue application downloads, and considers the suitability of smartphone security solutions offered by various vendors. This paper provided insights into users’ problems of malware, attack channels, black industry ‘chain of smartphone security’, and accessibility to smartphone security solutions introduced by mobile vendors. As this study adds to the available body of knowledge, it is anticipated that future research will continue to advance the available information regarding rogue applications, adware, malware, and other security threats related to mobile technology
Keywords: Smartphones; Mobile Security; Information Security; Android O/S; Vulnerabilities and Threats; iOS

Scope of the Article: Security and Privacy