Minneapolis, MN
August 23, 2022
June 26, 2022
June 29, 2022
10
10.18260/1-2--41116
https://peer.asee.org/41116
454
Dr. Stephen Mujeye an Assistant Professor of Computer Systems Technology at Illinois State University, Normal, Illinois. He earned a bachelor’s degree with a double major in Business Management and Business Systems Support Specialist from Siena Heights University, Adrian, Michigan. He has a master’s degree in Information Resource Management from Central Michigan University, Mt. Pleasant, Michigan. He completed his Ph.D. in Information Systems from Nova Southeastern University. His Ph.D. dissertation was titled “An Experimental Study on the Role of Password Strength and Cognitive Load on Employee Productivity.” He holds several industry certifications, including A+, Network+, CCNA, and CCNA Security. His areas of research interest are authentication methods, cyber security, mobile and network security.
Mobile devices are widespread worldwide; individuals increasingly use their mobile devices to check emails, online banking, social media, etc. Previous studies have shown, however, that mobile devices have specific weaknesses and vulnerabilities to security. Security attacks for mobile users have also been on the increase. In this work-in-progress study, we seek to investigate the differences in security-conscious and regular users' behaviors and practices on mobile devices. A descriptive research methodology will be developed, utilizing two groups of participants (security-conscious and regular users) to address the study's objective. Participants will be selected from students at Illinois State University. The data will be analyzed using the multivariate analysis of variance. The analysis will reveal if differences are present in the behaviors and practices of security-conscious users and regular users. The results will help in recommending the best behaviors and practices for mobile device users, thereby increasing mobile device security.
Mujeye, S. (2022, August), An analysis of differences in behaviors and practices of security-conscious users and regular users on mobile devices. Paper presented at 2022 ASEE Annual Conference & Exposition, Minneapolis, MN. 10.18260/1-2--41116
ASEE holds the copyright on this document. It may be read by the public free of charge. Authors may archive their work on personal websites or in institutional repositories with the following citation: © 2022 American Society for Engineering Education. Other scholars may excerpt or quote from these materials with the same citation. When excerpting or quoting from Conference Proceedings, authors should, in addition to noting the ASEE copyright, list all the original authors and their institutions and name the host city of the conference. - Last updated April 1, 2015