Security Awareness Investigation for Mobile User Examined by Using Association Rule Mining Method

Due to the development of mobile communications, some innovation APPs (Applications) provide convenient mobile lifestyle. Smartphone has gradually replaced the traditional cellular phone. The huge usages of smartphones driving the mobile APP have been developed, that the wide use of APPs makes human...

Full description

Saved in:
Bibliographic Details
Published in2016 10th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS) pp. 440 - 445
Main Authors Hsing-Chung Chen, Pei-Chi Yeh, Ze-Min Lin, Qiu-Hua Ruan
Format Conference Proceeding
LanguageEnglish
Published IEEE 01.07.2016
Subjects
Online AccessGet full text
DOI10.1109/IMIS.2016.142

Cover

Abstract Due to the development of mobile communications, some innovation APPs (Applications) provide convenient mobile lifestyle. Smartphone has gradually replaced the traditional cellular phone. The huge usages of smartphones driving the mobile APP have been developed, that the wide use of APPs makes human life more easily. These APPs are not only built-in software, but also sold or free download in online APP stores. User has doubts for unsolicited APPs. Therefore, the smart phone which performs these APPs requires preventing hacker attacks, and the user of smart phone should has some knowledges of information security on when he or she use the kind of APPs. In this paper, the subject of the investigation are the mobile device users who are some university students belonging to different disciplines, grade and gender in Taiwan. We collected total 174 valid questionnaires. Next, the level for mobile security awareness are analyzed by the results collected from questionnaire. The evaluation results of security awareness investigation for the mobile users examined by association rule mining are also revealed in this paper.
AbstractList Due to the development of mobile communications, some innovation APPs (Applications) provide convenient mobile lifestyle. Smartphone has gradually replaced the traditional cellular phone. The huge usages of smartphones driving the mobile APP have been developed, that the wide use of APPs makes human life more easily. These APPs are not only built-in software, but also sold or free download in online APP stores. User has doubts for unsolicited APPs. Therefore, the smart phone which performs these APPs requires preventing hacker attacks, and the user of smart phone should has some knowledges of information security on when he or she use the kind of APPs. In this paper, the subject of the investigation are the mobile device users who are some university students belonging to different disciplines, grade and gender in Taiwan. We collected total 174 valid questionnaires. Next, the level for mobile security awareness are analyzed by the results collected from questionnaire. The evaluation results of security awareness investigation for the mobile users examined by association rule mining are also revealed in this paper.
Author Hsing-Chung Chen
Ze-Min Lin
Qiu-Hua Ruan
Pei-Chi Yeh
Author_xml – sequence: 1
  surname: Hsing-Chung Chen
  fullname: Hsing-Chung Chen
  email: shin8409@ms6.hinet.net
  organization: Dept. of Comput. Sci. & Inf. Eng., Asia Univ., Taichung, Taiwan
– sequence: 2
  surname: Pei-Chi Yeh
  fullname: Pei-Chi Yeh
  email: yueyue8271@gmail.com
  organization: Dept. of Comput. Sci. & Inf. Eng., Asia Univ., Taichung, Taiwan
– sequence: 3
  surname: Ze-Min Lin
  fullname: Ze-Min Lin
  email: o143888486@gmail.com
  organization: Dept. of Comput. Sci. & Inf. Eng., Asia Univ., Taichung, Taiwan
– sequence: 4
  surname: Qiu-Hua Ruan
  fullname: Qiu-Hua Ruan
  email: jvc954061@gmail.com
  organization: Dept. of Comput. Sci. & Inf. Eng., Asia Univ., Taichung, Taiwan
BookMark eNotjEFLwzAYhiPoQeeOnrzkD7R-SZOmOZYxtbAiOHceafN1BrZEkk7tv3djnl543ofnjlz74JGQBwY5Y6CfmrZZ5xxYmTPBr8hcq4pJ0AC6EtUtMWvsj9GNE61_TESPKdHGf2Ma3c6MLng6hEjb0Lk90k3CSJe_5uA8WtpNJ-D8jtYphd5d7PfjyWudP_MWx89g78nNYPYJ5_87I5vn5cfiNVu9vTSLepU5puSYsRK17UrNwVrVARTCKiMlCOCcm55pqZhURvUgzs9Q9rIAI9CwqoJCqmJGHi9dh4jbr-gOJk5bpbSQoIo_cmdQ7Q
CODEN IEEPAD
ContentType Conference Proceeding
DBID 6IE
6IL
CBEJK
RIE
RIL
DOI 10.1109/IMIS.2016.142
DatabaseName IEEE Electronic Library (IEL) Conference Proceedings
IEEE Xplore POP ALL
IEEE Xplore All Conference Proceedings
IEEE Electronic Library (IEL)
IEEE Proceedings Order Plans (POP All) 1998-Present
DatabaseTitleList
Database_xml – sequence: 1
  dbid: RIE
  name: IEEE Electronic Library (IEL)
  url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/
  sourceTypes: Publisher
DeliveryMethod fulltext_linktorsrc
EISBN 9781509009848
1509009833
1509009841
9781509009831
EndPage 445
ExternalDocumentID 7794507
Genre orig-research
GroupedDBID 6IE
6IL
CBEJK
RIE
RIL
ID FETCH-LOGICAL-i175t-16e9db6920dd7b0034d7a55040222ac1957157a7c044d7af6c530a4ea18803573
IEDL.DBID RIE
IngestDate Wed Jun 26 19:26:52 EDT 2024
IsPeerReviewed false
IsScholarly false
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-i175t-16e9db6920dd7b0034d7a55040222ac1957157a7c044d7af6c530a4ea18803573
PageCount 6
ParticipantIDs ieee_primary_7794507
PublicationCentury 2000
PublicationDate 2016-July
PublicationDateYYYYMMDD 2016-07-01
PublicationDate_xml – month: 07
  year: 2016
  text: 2016-July
PublicationDecade 2010
PublicationTitle 2016 10th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS)
PublicationTitleAbbrev IMIS
PublicationYear 2016
Publisher IEEE
Publisher_xml – name: IEEE
Score 1.6192513
Snippet Due to the development of mobile communications, some innovation APPs (Applications) provide convenient mobile lifestyle. Smartphone has gradually replaced the...
SourceID ieee
SourceType Publisher
StartPage 440
SubjectTerms association rule mining
Data mining
Mobile communication
mobile user
questionnaire
Security
security awareness
Smart phones
Software
Title Security Awareness Investigation for Mobile User Examined by Using Association Rule Mining Method
URI https://ieeexplore.ieee.org/document/7794507
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1LS8NAEF5qT55UWvHNHDyaNsm-mqNISxEiYi30VvYVEDERSfDx653dVFvFg7eQBBJ25svMZOebj5BzaxhNqXORw-gaoVMIhNSoiATF4KJZqnTsucP5jZjO2fWCLzrk4psL45wLzWdu4A_DXr6tTON_lQ0lOg_31PEtORItV2s9NnOIYJ_5Xi2B6E9_iKWEWDHZIfnXU9oWkcdBU-uB-fg1gPG_r7FL-mtWHtx-x5s90nFlj6jZSoAOLl89rws_XLAxO6MqAbNSyCuN6Ic5-huM39QTppYW9DuEhgHYMBHcNXhfHlQjIA_q0n0yn4zvr6bRSjYhesBcoI4S4TKrRZbG1kqPWmalwkKE-dpOmSTjMuFSSRMzf6UQhtNYMaf8aDbKJd0n3bIq3QGBgmVJMTKYsxmDdXSmOSYc1lpNExtjIXRIen55ls_tZIzlamWO_j59TLa9edpm1xPSrV8ad4ohvdZnwZafkZyjZA
linkProvider IEEE
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1LS8NAEF6KHvSk0opv9-DRtEn21RxFWqo2RWwLvZV9BURMRBJ8_HpnN7Wt4sFbSAIJO_NlZrLzzYfQhdGUxMTawEJ0DcApOECqmwWcQHBRNJYqdNzhdMQHU3o7Y7MGulxyYay1vvnMtt2h38s3ha7cr7KOAOdhjjq-ySilrGZrrQZndgDuY9etxQH_8Q-5FB8t-jso_X5O3STy1K5K1dafv0Yw_vdFdlFrxcvD98uIs4caNm8iOV5I0OGrN8fsgk8XXpueUeQY8lKcFgrwj6fgcbj3Lp8huTRYfWDfMoDXjIQfKrgv9boROPX60i007fcm14NgIZwQPEI2UAYRt4lRPIlDY4TDLTVCQilCXXUndZQwETEhhQ6pu5JxzUgoqZVuOBthguyjjbzI7QHCGU2irKsha9MaKulEMUg5jDGKRCaEUugQNd3yzF_q2Rjzxcoc_X36HG0NJulwPrwZ3R2jbWequvX1BG2Ur5U9hQBfqjNv1y9NcKax
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=2016+10th+International+Conference+on+Innovative+Mobile+and+Internet+Services+in+Ubiquitous+Computing+%28IMIS%29&rft.atitle=Security+Awareness+Investigation+for+Mobile+User+Examined+by+Using+Association+Rule+Mining+Method&rft.au=Hsing-Chung+Chen&rft.au=Pei-Chi+Yeh&rft.au=Ze-Min+Lin&rft.au=Qiu-Hua+Ruan&rft.date=2016-07-01&rft.pub=IEEE&rft.spage=440&rft.epage=445&rft_id=info:doi/10.1109%2FIMIS.2016.142&rft.externalDocID=7794507