Loading…

User Modelling Validation over the Security Awareness of Digital Natives

Young generations make extensive use of mobile devices, such as smart-phones, tablets and laptops, for a variety of daily tasks with potentially critical impact, while the number of security breaches via portable devices increases exponentially. A plethora of security risks associated with these dev...

Full description

Saved in:
Bibliographic Details
Published in:Future internet 2017-07, Vol.9 (3), p.32
Main Authors: Gkioulos, Vasileios, Wangen, Gaute, Katsikas, Sokratis
Format: Article
Language:English
Subjects:
Citations: Items that this one cites
Items that cite this one
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
cited_by cdi_FETCH-LOGICAL-c358t-68bacf5100ac6b8fe717dd7555b6c71c2c0a1b60224be3db247aeb893d0303933
cites cdi_FETCH-LOGICAL-c358t-68bacf5100ac6b8fe717dd7555b6c71c2c0a1b60224be3db247aeb893d0303933
container_end_page
container_issue 3
container_start_page 32
container_title Future internet
container_volume 9
creator Gkioulos, Vasileios
Wangen, Gaute
Katsikas, Sokratis
description Young generations make extensive use of mobile devices, such as smart-phones, tablets and laptops, for a variety of daily tasks with potentially critical impact, while the number of security breaches via portable devices increases exponentially. A plethora of security risks associated with these devices are induced by design shortcomings and vulnerabilities related to user behavior. Therefore, deploying suitable risk treatments requires the investigation of how security experts perceive the digital natives (young people, born in the digital era), when utilizing their user behavior models in the design and analysis of related systems. In this article, we present the results of a survey performed across a multinational sample of security professionals, in comparison to our earlier study over the security awareness of digital natives. Through this study, we seek to identify divergences between user behavior and the conceptual user-models that security experts utilise in their professional tasks. Our results indicate that the experts understanding over the user behaviour does not follow a solidified user-model, while influences from personal perceptions and randomness are also noticeable.
doi_str_mv 10.3390/fi9030032
format article
fullrecord <record><control><sourceid>proquest_doaj_</sourceid><recordid>TN_cdi_doaj_primary_oai_doaj_org_article_523f084cefe9422bb20f41c5358b9484</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><doaj_id>oai_doaj_org_article_523f084cefe9422bb20f41c5358b9484</doaj_id><sourcerecordid>1952649838</sourcerecordid><originalsourceid>FETCH-LOGICAL-c358t-68bacf5100ac6b8fe717dd7555b6c71c2c0a1b60224be3db247aeb893d0303933</originalsourceid><addsrcrecordid>eNpNUMtOAjEUbYwmEmXhHzRx5QLtc6ZdEnxAgrpQ3DZtp8WScYrtgOHvrWKId3NfJ-eeewC4wOiaUolufJCIIkTJERhgKeWIl_74X30KhjmvUAkqSVXVAzBdZJfgY2xc24ZuCd90Gxrdh9jBuC2b_t3BF2c3KfQ7OP7SyXUuZxg9vA3L0OsWPhX01uVzcOJ1m93wL5-Bxf3d62Q6mj8_zCbj-chSLvpRJYy2nmOEtK2M8K7GddPUnHNT2RpbYpHGpkKEMONoYwirtTNC0qZ8RiWlZ2C2522iXql1Ch867VTUQf0OYloqnfpgW6c4oR4JZp13khFiDEGeYcuLECOZYIXrcs-1TvFz43KvVnGTuiJfYclJxaSgoqCu9iibYs7J-cNVjNSP7-rgO_0G_59zTQ</addsrcrecordid><sourcetype>Open Website</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>1952649838</pqid></control><display><type>article</type><title>User Modelling Validation over the Security Awareness of Digital Natives</title><source>Publicly Available Content Database</source><source>ABI/INFORM Global</source><creator>Gkioulos, Vasileios ; Wangen, Gaute ; Katsikas, Sokratis</creator><creatorcontrib>Gkioulos, Vasileios ; Wangen, Gaute ; Katsikas, Sokratis</creatorcontrib><description>Young generations make extensive use of mobile devices, such as smart-phones, tablets and laptops, for a variety of daily tasks with potentially critical impact, while the number of security breaches via portable devices increases exponentially. A plethora of security risks associated with these devices are induced by design shortcomings and vulnerabilities related to user behavior. Therefore, deploying suitable risk treatments requires the investigation of how security experts perceive the digital natives (young people, born in the digital era), when utilizing their user behavior models in the design and analysis of related systems. In this article, we present the results of a survey performed across a multinational sample of security professionals, in comparison to our earlier study over the security awareness of digital natives. Through this study, we seek to identify divergences between user behavior and the conceptual user-models that security experts utilise in their professional tasks. Our results indicate that the experts understanding over the user behaviour does not follow a solidified user-model, while influences from personal perceptions and randomness are also noticeable.</description><identifier>ISSN: 1999-5903</identifier><identifier>EISSN: 1999-5903</identifier><identifier>DOI: 10.3390/fi9030032</identifier><language>eng</language><publisher>Basel: MDPI AG</publisher><subject>Digital literacy ; digital natives ; education ; Electronic devices ; Human behavior ; Internet ; mobile devices ; Portable equipment ; Security ; security awareness ; security experts ; Security management ; Tablet computers ; User behavior ; Young adults</subject><ispartof>Future internet, 2017-07, Vol.9 (3), p.32</ispartof><rights>Copyright MDPI AG 2017</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c358t-68bacf5100ac6b8fe717dd7555b6c71c2c0a1b60224be3db247aeb893d0303933</citedby><cites>FETCH-LOGICAL-c358t-68bacf5100ac6b8fe717dd7555b6c71c2c0a1b60224be3db247aeb893d0303933</cites><orcidid>0000-0002-3861-6746</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktopdf>$$Uhttps://www.proquest.com/docview/1952649838/fulltextPDF?pq-origsite=primo$$EPDF$$P50$$Gproquest$$Hfree_for_read</linktopdf><linktohtml>$$Uhttps://www.proquest.com/docview/1952649838?pq-origsite=primo$$EHTML$$P50$$Gproquest$$Hfree_for_read</linktohtml><link.rule.ids>314,776,780,11667,25731,27901,27902,36037,36989,44339,44566,74638,74869</link.rule.ids></links><search><creatorcontrib>Gkioulos, Vasileios</creatorcontrib><creatorcontrib>Wangen, Gaute</creatorcontrib><creatorcontrib>Katsikas, Sokratis</creatorcontrib><title>User Modelling Validation over the Security Awareness of Digital Natives</title><title>Future internet</title><description>Young generations make extensive use of mobile devices, such as smart-phones, tablets and laptops, for a variety of daily tasks with potentially critical impact, while the number of security breaches via portable devices increases exponentially. A plethora of security risks associated with these devices are induced by design shortcomings and vulnerabilities related to user behavior. Therefore, deploying suitable risk treatments requires the investigation of how security experts perceive the digital natives (young people, born in the digital era), when utilizing their user behavior models in the design and analysis of related systems. In this article, we present the results of a survey performed across a multinational sample of security professionals, in comparison to our earlier study over the security awareness of digital natives. Through this study, we seek to identify divergences between user behavior and the conceptual user-models that security experts utilise in their professional tasks. Our results indicate that the experts understanding over the user behaviour does not follow a solidified user-model, while influences from personal perceptions and randomness are also noticeable.</description><subject>Digital literacy</subject><subject>digital natives</subject><subject>education</subject><subject>Electronic devices</subject><subject>Human behavior</subject><subject>Internet</subject><subject>mobile devices</subject><subject>Portable equipment</subject><subject>Security</subject><subject>security awareness</subject><subject>security experts</subject><subject>Security management</subject><subject>Tablet computers</subject><subject>User behavior</subject><subject>Young adults</subject><issn>1999-5903</issn><issn>1999-5903</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2017</creationdate><recordtype>article</recordtype><sourceid>M0C</sourceid><sourceid>PIMPY</sourceid><sourceid>DOA</sourceid><recordid>eNpNUMtOAjEUbYwmEmXhHzRx5QLtc6ZdEnxAgrpQ3DZtp8WScYrtgOHvrWKId3NfJ-eeewC4wOiaUolufJCIIkTJERhgKeWIl_74X30KhjmvUAkqSVXVAzBdZJfgY2xc24ZuCd90Gxrdh9jBuC2b_t3BF2c3KfQ7OP7SyXUuZxg9vA3L0OsWPhX01uVzcOJ1m93wL5-Bxf3d62Q6mj8_zCbj-chSLvpRJYy2nmOEtK2M8K7GddPUnHNT2RpbYpHGpkKEMONoYwirtTNC0qZ8RiWlZ2C2522iXql1Ch867VTUQf0OYloqnfpgW6c4oR4JZp13khFiDEGeYcuLECOZYIXrcs-1TvFz43KvVnGTuiJfYclJxaSgoqCu9iibYs7J-cNVjNSP7-rgO_0G_59zTQ</recordid><startdate>20170710</startdate><enddate>20170710</enddate><creator>Gkioulos, Vasileios</creator><creator>Wangen, Gaute</creator><creator>Katsikas, Sokratis</creator><general>MDPI AG</general><scope>AAYXX</scope><scope>CITATION</scope><scope>3V.</scope><scope>7SC</scope><scope>7WY</scope><scope>7WZ</scope><scope>7XB</scope><scope>87Z</scope><scope>8AL</scope><scope>8FD</scope><scope>8FE</scope><scope>8FG</scope><scope>8FK</scope><scope>8FL</scope><scope>ABUWG</scope><scope>AFKRA</scope><scope>ARAPS</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>BEZIV</scope><scope>BGLVJ</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>FRNLG</scope><scope>F~G</scope><scope>GNUQQ</scope><scope>HCIFZ</scope><scope>JQ2</scope><scope>K60</scope><scope>K6~</scope><scope>K7-</scope><scope>L.-</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><scope>M0C</scope><scope>M0N</scope><scope>P5Z</scope><scope>P62</scope><scope>PIMPY</scope><scope>PQBIZ</scope><scope>PQBZA</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>PRINS</scope><scope>Q9U</scope><scope>DOA</scope><orcidid>https://orcid.org/0000-0002-3861-6746</orcidid></search><sort><creationdate>20170710</creationdate><title>User Modelling Validation over the Security Awareness of Digital Natives</title><author>Gkioulos, Vasileios ; Wangen, Gaute ; Katsikas, Sokratis</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c358t-68bacf5100ac6b8fe717dd7555b6c71c2c0a1b60224be3db247aeb893d0303933</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2017</creationdate><topic>Digital literacy</topic><topic>digital natives</topic><topic>education</topic><topic>Electronic devices</topic><topic>Human behavior</topic><topic>Internet</topic><topic>mobile devices</topic><topic>Portable equipment</topic><topic>Security</topic><topic>security awareness</topic><topic>security experts</topic><topic>Security management</topic><topic>Tablet computers</topic><topic>User behavior</topic><topic>Young adults</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Gkioulos, Vasileios</creatorcontrib><creatorcontrib>Wangen, Gaute</creatorcontrib><creatorcontrib>Katsikas, Sokratis</creatorcontrib><collection>CrossRef</collection><collection>ProQuest Central (Corporate)</collection><collection>Computer and Information Systems Abstracts</collection><collection>ABI/INFORM Collection</collection><collection>ABI/INFORM Global (PDF only)</collection><collection>ProQuest Central (purchase pre-March 2016)</collection><collection>ABI/INFORM Global (Alumni Edition)</collection><collection>Computing Database (Alumni Edition)</collection><collection>Technology Research Database</collection><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>ProQuest Central (Alumni) (purchase pre-March 2016)</collection><collection>ABI/INFORM Collection (Alumni Edition)</collection><collection>ProQuest Central (Alumni Edition)</collection><collection>ProQuest Central UK/Ireland</collection><collection>Advanced Technologies &amp; Aerospace Collection</collection><collection>ProQuest Central Essentials</collection><collection>ProQuest Central</collection><collection>ProQuest Business Premium Collection</collection><collection>Technology Collection</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central Korea</collection><collection>Business Premium Collection (Alumni)</collection><collection>ABI/INFORM Global (Corporate)</collection><collection>ProQuest Central Student</collection><collection>SciTech Premium Collection</collection><collection>ProQuest Computer Science Collection</collection><collection>ProQuest Business Collection (Alumni Edition)</collection><collection>ProQuest Business Collection</collection><collection>Computer Science Database</collection><collection>ABI/INFORM Professional Advanced</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts – Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><collection>ABI/INFORM Global</collection><collection>Computing Database</collection><collection>Advanced Technologies &amp; Aerospace Database</collection><collection>ProQuest Advanced Technologies &amp; Aerospace Collection</collection><collection>Publicly Available Content Database</collection><collection>One Business (ProQuest)</collection><collection>ProQuest One Business (Alumni)</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>ProQuest Central China</collection><collection>ProQuest Central Basic</collection><collection>DOAJ Directory of Open Access Journals</collection><jtitle>Future internet</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Gkioulos, Vasileios</au><au>Wangen, Gaute</au><au>Katsikas, Sokratis</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>User Modelling Validation over the Security Awareness of Digital Natives</atitle><jtitle>Future internet</jtitle><date>2017-07-10</date><risdate>2017</risdate><volume>9</volume><issue>3</issue><spage>32</spage><pages>32-</pages><issn>1999-5903</issn><eissn>1999-5903</eissn><abstract>Young generations make extensive use of mobile devices, such as smart-phones, tablets and laptops, for a variety of daily tasks with potentially critical impact, while the number of security breaches via portable devices increases exponentially. A plethora of security risks associated with these devices are induced by design shortcomings and vulnerabilities related to user behavior. Therefore, deploying suitable risk treatments requires the investigation of how security experts perceive the digital natives (young people, born in the digital era), when utilizing their user behavior models in the design and analysis of related systems. In this article, we present the results of a survey performed across a multinational sample of security professionals, in comparison to our earlier study over the security awareness of digital natives. Through this study, we seek to identify divergences between user behavior and the conceptual user-models that security experts utilise in their professional tasks. Our results indicate that the experts understanding over the user behaviour does not follow a solidified user-model, while influences from personal perceptions and randomness are also noticeable.</abstract><cop>Basel</cop><pub>MDPI AG</pub><doi>10.3390/fi9030032</doi><orcidid>https://orcid.org/0000-0002-3861-6746</orcidid><oa>free_for_read</oa></addata></record>
fulltext fulltext
identifier ISSN: 1999-5903
ispartof Future internet, 2017-07, Vol.9 (3), p.32
issn 1999-5903
1999-5903
language eng
recordid cdi_doaj_primary_oai_doaj_org_article_523f084cefe9422bb20f41c5358b9484
source Publicly Available Content Database; ABI/INFORM Global
subjects Digital literacy
digital natives
education
Electronic devices
Human behavior
Internet
mobile devices
Portable equipment
Security
security awareness
security experts
Security management
Tablet computers
User behavior
Young adults
title User Modelling Validation over the Security Awareness of Digital Natives
url http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-02-08T06%3A08%3A36IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_doaj_&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=User%20Modelling%20Validation%20over%20the%20Security%20Awareness%20of%20Digital%20Natives&rft.jtitle=Future%20internet&rft.au=Gkioulos,%20Vasileios&rft.date=2017-07-10&rft.volume=9&rft.issue=3&rft.spage=32&rft.pages=32-&rft.issn=1999-5903&rft.eissn=1999-5903&rft_id=info:doi/10.3390/fi9030032&rft_dat=%3Cproquest_doaj_%3E1952649838%3C/proquest_doaj_%3E%3Cgrp_id%3Ecdi_FETCH-LOGICAL-c358t-68bacf5100ac6b8fe717dd7555b6c71c2c0a1b60224be3db247aeb893d0303933%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_pqid=1952649838&rft_id=info:pmid/&rfr_iscdi=true