Usable Privacy and Security in Mobile Applications: Perception of Mobile End Users in Saudi Arabia

被引:0
|
作者
Saeed, Saqib [1 ]
机构
[1] Imam Abdulrahman Bin Faisal Univ, Coll Comp Sci & Informat Technol, Dept Comp Informat Syst, POB 1982, Dammam 31441, Saudi Arabia
关键词
usable privacy and security; user security; human security; user centric computing; USABILITY; CONTEXT; DESIGN;
D O I
10.3390/bdcc8110162
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Privacy and security is very critical for mobile users and in-depth research into the area highlights a need for more scientific literature on the perception and challenges of end users to better align the design of privacy and security controls with user expectations. In this paper, we have explored the perceptions of the usability of privacy and security settings in mobile applications from mobile users in Saudi Arabia. The findings highlight that gender, age, and education level of users do not have any positive correlation with the privacy and security usability perceptions of mobile users. On the other hand, user concerns about privacy and security and the trustworthiness levels of end users regarding mobile phone privacy and security have a positive impact on end users' perception of privacy and security usability. Furthermore, privacy usability perception has a positive impact on users' feelings about their control over the privacy and security of their mobile phones. Based on the results of this empirical study, we propose that user-centric design of privacy and security controls, transparent data handling policies, periodic data management status preview and validation by end users, user education guidelines, strict governmental policies, and automated security settings recommendations can enhance the usability of the privacy and security of mobile phone applications. Our study did not take the geographical location of respondents into account, nor were the respondents balanced based on age and gender. In future work, these weaknesses need to be taken into account, and more qualitative studies can help to extract design guidelines for usable and secure mobile applications.
引用
收藏
页数:17
相关论文
共 50 条
  • [21] A new privacy and authentication protocol for end-to-end mobile users
    Lee, CC
    Yang, CC
    Hwang, MS
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2003, 16 (09) : 799 - 808
  • [22] Are Mobile Spreadsheet Applications Usable?
    Flood, Derek
    Harrison, Rachel
    Iacob, Claudia
    Nosseir, Ann
    McDaid, Kevin
    JOURNAL OF ORGANIZATIONAL AND END USER COMPUTING, 2013, 25 (01) : 43 - 63
  • [23] Evaluating and Comparing the Usability of Mobile Banking Applications in Saudi Arabia
    Alhejji, Sarah
    Albesher, Abdulmohsen
    Wahsheh, Heider
    Albarrak, Abdulaziz
    INFORMATION, 2022, 13 (12)
  • [24] Editorial: Security and Privacy Protection for Mobile Applications and Platforms
    Victor Sucasas
    Georgios Mantas
    Saud Althunibat
    José-Fernán Martínez Ortega
    Mobile Networks and Applications, 2020, 25 : 151 - 152
  • [25] Editorial: Security and Privacy Protection for Mobile Applications and Platforms
    Sucasas, Victor
    Mantas, Georgios
    Althunibat, Saud
    Ortega, Jose-Fernan Martinez
    MOBILE NETWORKS & APPLICATIONS, 2020, 25 (01): : 151 - 152
  • [26] Analysis of Privacy and Security Exposure in Mobile Dating Applications
    Patsakis, Constantinos
    Zigomitros, Athanasios
    Solanas, Agusti
    MOBILE, SECURE, AND PROGRAMMABLE NETWORKING, MSPN 2015, 2015, 9395 : 151 - 162
  • [27] Privacy and Security Issues with Mobile Health Research Applications
    Tovino, Stacey A.
    JOURNAL OF LAW MEDICINE & ETHICS, 2020, 48 (1_SUPPL): : 154 - 158
  • [28] Security and Privacy for Mobile IoT Applications Using Blockchain
    Carvalho, Kevin
    Granjal, Jorge
    SENSORS, 2021, 21 (17)
  • [29] End-users? knowledge and perception about security of clinical mobile health apps: A case study with two Saudi Arabian mHealth providers?
    Aljedaani, Bakheet
    Ahmad, Aakash
    Zahedi, Mansooreh
    Babar, M. Ali
    JOURNAL OF SYSTEMS AND SOFTWARE, 2023, 195
  • [30] Security and privacy of mobile wallet users in Bitcoin, Dash, Monero, and Zcash
    Biryukov, Alex
    Tikhomirov, Sergei
    PERVASIVE AND MOBILE COMPUTING, 2019, 59