Loading…
User Modelling Validation over the Security Awareness of Digital Natives
Young generations make extensive use of mobile devices, such as smart-phones, tablets and laptops, for a variety of daily tasks with potentially critical impact, while the number of security breaches via portable devices increases exponentially. A plethora of security risks associated with these dev...
Saved in:
Published in: | Future internet 2017-07, Vol.9 (3), p.32 |
---|---|
Main Authors: | , , |
Format: | Article |
Language: | English |
Subjects: | |
Citations: | Items that this one cites Items that cite this one |
Online Access: | Get full text |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
cited_by | cdi_FETCH-LOGICAL-c358t-68bacf5100ac6b8fe717dd7555b6c71c2c0a1b60224be3db247aeb893d0303933 |
---|---|
cites | cdi_FETCH-LOGICAL-c358t-68bacf5100ac6b8fe717dd7555b6c71c2c0a1b60224be3db247aeb893d0303933 |
container_end_page | |
container_issue | 3 |
container_start_page | 32 |
container_title | Future internet |
container_volume | 9 |
creator | Gkioulos, Vasileios Wangen, Gaute Katsikas, Sokratis |
description | Young generations make extensive use of mobile devices, such as smart-phones, tablets and laptops, for a variety of daily tasks with potentially critical impact, while the number of security breaches via portable devices increases exponentially. A plethora of security risks associated with these devices are induced by design shortcomings and vulnerabilities related to user behavior. Therefore, deploying suitable risk treatments requires the investigation of how security experts perceive the digital natives (young people, born in the digital era), when utilizing their user behavior models in the design and analysis of related systems. In this article, we present the results of a survey performed across a multinational sample of security professionals, in comparison to our earlier study over the security awareness of digital natives. Through this study, we seek to identify divergences between user behavior and the conceptual user-models that security experts utilise in their professional tasks. Our results indicate that the experts understanding over the user behaviour does not follow a solidified user-model, while influences from personal perceptions and randomness are also noticeable. |
doi_str_mv | 10.3390/fi9030032 |
format | article |
fullrecord | <record><control><sourceid>proquest_doaj_</sourceid><recordid>TN_cdi_doaj_primary_oai_doaj_org_article_523f084cefe9422bb20f41c5358b9484</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><doaj_id>oai_doaj_org_article_523f084cefe9422bb20f41c5358b9484</doaj_id><sourcerecordid>1952649838</sourcerecordid><originalsourceid>FETCH-LOGICAL-c358t-68bacf5100ac6b8fe717dd7555b6c71c2c0a1b60224be3db247aeb893d0303933</originalsourceid><addsrcrecordid>eNpNUMtOAjEUbYwmEmXhHzRx5QLtc6ZdEnxAgrpQ3DZtp8WScYrtgOHvrWKId3NfJ-eeewC4wOiaUolufJCIIkTJERhgKeWIl_74X30KhjmvUAkqSVXVAzBdZJfgY2xc24ZuCd90Gxrdh9jBuC2b_t3BF2c3KfQ7OP7SyXUuZxg9vA3L0OsWPhX01uVzcOJ1m93wL5-Bxf3d62Q6mj8_zCbj-chSLvpRJYy2nmOEtK2M8K7GddPUnHNT2RpbYpHGpkKEMONoYwirtTNC0qZ8RiWlZ2C2522iXql1Ch867VTUQf0OYloqnfpgW6c4oR4JZp13khFiDEGeYcuLECOZYIXrcs-1TvFz43KvVnGTuiJfYclJxaSgoqCu9iibYs7J-cNVjNSP7-rgO_0G_59zTQ</addsrcrecordid><sourcetype>Open Website</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>1952649838</pqid></control><display><type>article</type><title>User Modelling Validation over the Security Awareness of Digital Natives</title><source>Publicly Available Content Database</source><source>ABI/INFORM Global</source><creator>Gkioulos, Vasileios ; Wangen, Gaute ; Katsikas, Sokratis</creator><creatorcontrib>Gkioulos, Vasileios ; Wangen, Gaute ; Katsikas, Sokratis</creatorcontrib><description>Young generations make extensive use of mobile devices, such as smart-phones, tablets and laptops, for a variety of daily tasks with potentially critical impact, while the number of security breaches via portable devices increases exponentially. A plethora of security risks associated with these devices are induced by design shortcomings and vulnerabilities related to user behavior. Therefore, deploying suitable risk treatments requires the investigation of how security experts perceive the digital natives (young people, born in the digital era), when utilizing their user behavior models in the design and analysis of related systems. In this article, we present the results of a survey performed across a multinational sample of security professionals, in comparison to our earlier study over the security awareness of digital natives. Through this study, we seek to identify divergences between user behavior and the conceptual user-models that security experts utilise in their professional tasks. Our results indicate that the experts understanding over the user behaviour does not follow a solidified user-model, while influences from personal perceptions and randomness are also noticeable.</description><identifier>ISSN: 1999-5903</identifier><identifier>EISSN: 1999-5903</identifier><identifier>DOI: 10.3390/fi9030032</identifier><language>eng</language><publisher>Basel: MDPI AG</publisher><subject>Digital literacy ; digital natives ; education ; Electronic devices ; Human behavior ; Internet ; mobile devices ; Portable equipment ; Security ; security awareness ; security experts ; Security management ; Tablet computers ; User behavior ; Young adults</subject><ispartof>Future internet, 2017-07, Vol.9 (3), p.32</ispartof><rights>Copyright MDPI AG 2017</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c358t-68bacf5100ac6b8fe717dd7555b6c71c2c0a1b60224be3db247aeb893d0303933</citedby><cites>FETCH-LOGICAL-c358t-68bacf5100ac6b8fe717dd7555b6c71c2c0a1b60224be3db247aeb893d0303933</cites><orcidid>0000-0002-3861-6746</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktopdf>$$Uhttps://www.proquest.com/docview/1952649838/fulltextPDF?pq-origsite=primo$$EPDF$$P50$$Gproquest$$Hfree_for_read</linktopdf><linktohtml>$$Uhttps://www.proquest.com/docview/1952649838?pq-origsite=primo$$EHTML$$P50$$Gproquest$$Hfree_for_read</linktohtml><link.rule.ids>314,776,780,11667,25731,27901,27902,36037,36989,44339,44566,74638,74869</link.rule.ids></links><search><creatorcontrib>Gkioulos, Vasileios</creatorcontrib><creatorcontrib>Wangen, Gaute</creatorcontrib><creatorcontrib>Katsikas, Sokratis</creatorcontrib><title>User Modelling Validation over the Security Awareness of Digital Natives</title><title>Future internet</title><description>Young generations make extensive use of mobile devices, such as smart-phones, tablets and laptops, for a variety of daily tasks with potentially critical impact, while the number of security breaches via portable devices increases exponentially. A plethora of security risks associated with these devices are induced by design shortcomings and vulnerabilities related to user behavior. Therefore, deploying suitable risk treatments requires the investigation of how security experts perceive the digital natives (young people, born in the digital era), when utilizing their user behavior models in the design and analysis of related systems. In this article, we present the results of a survey performed across a multinational sample of security professionals, in comparison to our earlier study over the security awareness of digital natives. Through this study, we seek to identify divergences between user behavior and the conceptual user-models that security experts utilise in their professional tasks. Our results indicate that the experts understanding over the user behaviour does not follow a solidified user-model, while influences from personal perceptions and randomness are also noticeable.</description><subject>Digital literacy</subject><subject>digital natives</subject><subject>education</subject><subject>Electronic devices</subject><subject>Human behavior</subject><subject>Internet</subject><subject>mobile devices</subject><subject>Portable equipment</subject><subject>Security</subject><subject>security awareness</subject><subject>security experts</subject><subject>Security management</subject><subject>Tablet computers</subject><subject>User behavior</subject><subject>Young adults</subject><issn>1999-5903</issn><issn>1999-5903</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2017</creationdate><recordtype>article</recordtype><sourceid>M0C</sourceid><sourceid>PIMPY</sourceid><sourceid>DOA</sourceid><recordid>eNpNUMtOAjEUbYwmEmXhHzRx5QLtc6ZdEnxAgrpQ3DZtp8WScYrtgOHvrWKId3NfJ-eeewC4wOiaUolufJCIIkTJERhgKeWIl_74X30KhjmvUAkqSVXVAzBdZJfgY2xc24ZuCd90Gxrdh9jBuC2b_t3BF2c3KfQ7OP7SyXUuZxg9vA3L0OsWPhX01uVzcOJ1m93wL5-Bxf3d62Q6mj8_zCbj-chSLvpRJYy2nmOEtK2M8K7GddPUnHNT2RpbYpHGpkKEMONoYwirtTNC0qZ8RiWlZ2C2522iXql1Ch867VTUQf0OYloqnfpgW6c4oR4JZp13khFiDEGeYcuLECOZYIXrcs-1TvFz43KvVnGTuiJfYclJxaSgoqCu9iibYs7J-cNVjNSP7-rgO_0G_59zTQ</recordid><startdate>20170710</startdate><enddate>20170710</enddate><creator>Gkioulos, Vasileios</creator><creator>Wangen, Gaute</creator><creator>Katsikas, Sokratis</creator><general>MDPI AG</general><scope>AAYXX</scope><scope>CITATION</scope><scope>3V.</scope><scope>7SC</scope><scope>7WY</scope><scope>7WZ</scope><scope>7XB</scope><scope>87Z</scope><scope>8AL</scope><scope>8FD</scope><scope>8FE</scope><scope>8FG</scope><scope>8FK</scope><scope>8FL</scope><scope>ABUWG</scope><scope>AFKRA</scope><scope>ARAPS</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>BEZIV</scope><scope>BGLVJ</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>FRNLG</scope><scope>F~G</scope><scope>GNUQQ</scope><scope>HCIFZ</scope><scope>JQ2</scope><scope>K60</scope><scope>K6~</scope><scope>K7-</scope><scope>L.-</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><scope>M0C</scope><scope>M0N</scope><scope>P5Z</scope><scope>P62</scope><scope>PIMPY</scope><scope>PQBIZ</scope><scope>PQBZA</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>PRINS</scope><scope>Q9U</scope><scope>DOA</scope><orcidid>https://orcid.org/0000-0002-3861-6746</orcidid></search><sort><creationdate>20170710</creationdate><title>User Modelling Validation over the Security Awareness of Digital Natives</title><author>Gkioulos, Vasileios ; Wangen, Gaute ; Katsikas, Sokratis</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c358t-68bacf5100ac6b8fe717dd7555b6c71c2c0a1b60224be3db247aeb893d0303933</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2017</creationdate><topic>Digital literacy</topic><topic>digital natives</topic><topic>education</topic><topic>Electronic devices</topic><topic>Human behavior</topic><topic>Internet</topic><topic>mobile devices</topic><topic>Portable equipment</topic><topic>Security</topic><topic>security awareness</topic><topic>security experts</topic><topic>Security management</topic><topic>Tablet computers</topic><topic>User behavior</topic><topic>Young adults</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Gkioulos, Vasileios</creatorcontrib><creatorcontrib>Wangen, Gaute</creatorcontrib><creatorcontrib>Katsikas, Sokratis</creatorcontrib><collection>CrossRef</collection><collection>ProQuest Central (Corporate)</collection><collection>Computer and Information Systems Abstracts</collection><collection>ABI/INFORM Collection</collection><collection>ABI/INFORM Global (PDF only)</collection><collection>ProQuest Central (purchase pre-March 2016)</collection><collection>ABI/INFORM Global (Alumni Edition)</collection><collection>Computing Database (Alumni Edition)</collection><collection>Technology Research Database</collection><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>ProQuest Central (Alumni) (purchase pre-March 2016)</collection><collection>ABI/INFORM Collection (Alumni Edition)</collection><collection>ProQuest Central (Alumni Edition)</collection><collection>ProQuest Central UK/Ireland</collection><collection>Advanced Technologies & Aerospace Collection</collection><collection>ProQuest Central Essentials</collection><collection>ProQuest Central</collection><collection>ProQuest Business Premium Collection</collection><collection>Technology Collection</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central Korea</collection><collection>Business Premium Collection (Alumni)</collection><collection>ABI/INFORM Global (Corporate)</collection><collection>ProQuest Central Student</collection><collection>SciTech Premium Collection</collection><collection>ProQuest Computer Science Collection</collection><collection>ProQuest Business Collection (Alumni Edition)</collection><collection>ProQuest Business Collection</collection><collection>Computer Science Database</collection><collection>ABI/INFORM Professional Advanced</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts – Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><collection>ABI/INFORM Global</collection><collection>Computing Database</collection><collection>Advanced Technologies & Aerospace Database</collection><collection>ProQuest Advanced Technologies & Aerospace Collection</collection><collection>Publicly Available Content Database</collection><collection>One Business (ProQuest)</collection><collection>ProQuest One Business (Alumni)</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>ProQuest Central China</collection><collection>ProQuest Central Basic</collection><collection>DOAJ Directory of Open Access Journals</collection><jtitle>Future internet</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Gkioulos, Vasileios</au><au>Wangen, Gaute</au><au>Katsikas, Sokratis</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>User Modelling Validation over the Security Awareness of Digital Natives</atitle><jtitle>Future internet</jtitle><date>2017-07-10</date><risdate>2017</risdate><volume>9</volume><issue>3</issue><spage>32</spage><pages>32-</pages><issn>1999-5903</issn><eissn>1999-5903</eissn><abstract>Young generations make extensive use of mobile devices, such as smart-phones, tablets and laptops, for a variety of daily tasks with potentially critical impact, while the number of security breaches via portable devices increases exponentially. A plethora of security risks associated with these devices are induced by design shortcomings and vulnerabilities related to user behavior. Therefore, deploying suitable risk treatments requires the investigation of how security experts perceive the digital natives (young people, born in the digital era), when utilizing their user behavior models in the design and analysis of related systems. In this article, we present the results of a survey performed across a multinational sample of security professionals, in comparison to our earlier study over the security awareness of digital natives. Through this study, we seek to identify divergences between user behavior and the conceptual user-models that security experts utilise in their professional tasks. Our results indicate that the experts understanding over the user behaviour does not follow a solidified user-model, while influences from personal perceptions and randomness are also noticeable.</abstract><cop>Basel</cop><pub>MDPI AG</pub><doi>10.3390/fi9030032</doi><orcidid>https://orcid.org/0000-0002-3861-6746</orcidid><oa>free_for_read</oa></addata></record> |
fulltext | fulltext |
identifier | ISSN: 1999-5903 |
ispartof | Future internet, 2017-07, Vol.9 (3), p.32 |
issn | 1999-5903 1999-5903 |
language | eng |
recordid | cdi_doaj_primary_oai_doaj_org_article_523f084cefe9422bb20f41c5358b9484 |
source | Publicly Available Content Database; ABI/INFORM Global |
subjects | Digital literacy digital natives education Electronic devices Human behavior Internet mobile devices Portable equipment Security security awareness security experts Security management Tablet computers User behavior Young adults |
title | User Modelling Validation over the Security Awareness of Digital Natives |
url | http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-02-08T06%3A08%3A36IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_doaj_&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=User%20Modelling%20Validation%20over%20the%20Security%20Awareness%20of%20Digital%20Natives&rft.jtitle=Future%20internet&rft.au=Gkioulos,%20Vasileios&rft.date=2017-07-10&rft.volume=9&rft.issue=3&rft.spage=32&rft.pages=32-&rft.issn=1999-5903&rft.eissn=1999-5903&rft_id=info:doi/10.3390/fi9030032&rft_dat=%3Cproquest_doaj_%3E1952649838%3C/proquest_doaj_%3E%3Cgrp_id%3Ecdi_FETCH-LOGICAL-c358t-68bacf5100ac6b8fe717dd7555b6c71c2c0a1b60224be3db247aeb893d0303933%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_pqid=1952649838&rft_id=info:pmid/&rfr_iscdi=true |