{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,25]],"date-time":"2025-10-25T14:31:31Z","timestamp":1761402691504,"version":"build-2065373602"},"reference-count":17,"publisher":"Emerald","issue":"5","license":[{"start":{"date-parts":[[2025,7,7]],"date-time":"2025-07-07T00:00:00Z","timestamp":1751846400000},"content-version":"vor","delay-in-days":33,"URL":"https:\/\/creativecommons.org\/licences\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,10,28]]},"abstract":"<jats:sec>\n                    <jats:title>Purpose<\/jats:title>\n                    <jats:p>Digital mobile radio communication networks are used for coordinating operations in many important sectors, including critical infrastructures and large industries. Despite this, there is a dearth of knowledge about how their information security is managed. The most commonly used standard for such networks is TETRA. Given the critical role of TETRA networks, this study aims to clarify how they are used, how their users manage information security and the implications of vulnerabilities in the standard.<\/jats:p>\n                  <\/jats:sec>\n                  <jats:sec>\n                    <jats:title>Design\/methodology\/approach<\/jats:title>\n                    <jats:p>The study is based on semi-structured interviews with representatives from 11 organizations in Sweden that own and operate TETRA networks, representing 32% of registered users in the country and a wide range of users and applications. Thematic analysis was used to analyze the data.<\/jats:p>\n                  <\/jats:sec>\n                  <jats:sec>\n                    <jats:title>Findings<\/jats:title>\n                    <jats:p>Management of TETRA networks is generally outsourced, leaving TETRA network owners with scant knowledge of the state of security in their networks. Although organizations have high demands on availability and integrity, the use of encryption and authentication is rare. Instead, users generally rely on the protocol\u2019s complexity and obscurity for security. Because organizations\u2019 core operations are often dependent on functioning TETRA networks, attacks can have severe consequences.<\/jats:p>\n                  <\/jats:sec>\n                  <jats:sec>\n                    <jats:title>Originality\/value<\/jats:title>\n                    <jats:p>Previous research on security in digital mobile radio communication networks has focused on technical vulnerabilities in standards. This study is the first, to the best of the authors\u2019 knowledge, to investigate users\u2019 approaches to information security, the potential consequences of attacks and the implications of known security issues in this context.<\/jats:p>\n                  <\/jats:sec>","DOI":"10.1108\/ics-12-2024-0318","type":"journal-article","created":{"date-parts":[[2025,6,2]],"date-time":"2025-06-02T13:04:13Z","timestamp":1748869453000},"page":"766-784","source":"Crossref","is-referenced-by-count":0,"title":["User adoption of TETRA mobile radio communication networks: an information security perspective"],"prefix":"10.1108","volume":"33","author":[{"given":"Marcus","family":"Dansarie","sequence":"first","affiliation":[{"name":"Swedish Defence University Department of Systems Science for Defence and Security, , Stockholm, , and School of Informatics, University of Sk\u00f6vde, Sk\u00f6vde, Sweden, and","place":["Sweden"]}]},{"given":"Marcus","family":"Nohlberg","sequence":"additional","affiliation":[{"name":"University of Sk\u00f6vde School of Informatics, , Sk\u00f6vde,","place":["Sweden"]}]}],"member":"140","published-online":{"date-parts":[[2025,6,4]]},"reference":[{"volume-title":"Mobile Telecommunications Standards: GSM, UMTS, TETRA, and ERMES","year":"2001","author":"Bekkers","key":"2025102510280471300_ref001"},{"key":"2025102510280471300_ref002","first-page":"49","article-title":"Why (Special Agent) Johnny (still) can\u2019t encrypt: a security analysis of the APCO Project 25 two-way radio system","author":"Clark","year":"2011"},{"key":"2025102510280471300_ref003","unstructured":"Curtain, C.\n           (2023), \u201cQualCoder 3.5\u201d, available at:https:\/\/github.com\/ccbogel\/QualCoder\/releases\/tag\/3.5"},{"key":"2025102510280471300_ref004","doi-asserted-by":"publisher","first-page":"91101","DOI":"10.1109\/ACCESS.2024.3420091","article-title":"Security issues in special-purpose digital radio communication systems: a systematic review","volume":"12","author":"Dansarie","year":"2024","journal-title":"IEEE Access"},{"issue":"1","key":"2025102510280471300_ref005","first-page":"88","article-title":"Security analysis of the Terrestrial Trunked Radio (TETRA) authentication protocol","volume":"2","author":"Duan","year":"2013","journal-title":"Norsk Informasjonssikkerhetskonferanse [Norwegian Information Security Conference] (NISK)"},{"key":"2025102510280471300_ref006","unstructured":"Ecorys\n           (2009), \u201cStudy on the competitiveness of the EU security industry\u201d, available at:www.decision.eu\/wp-content\/uploads\/2016\/11\/Study-on-the-Competitivenessof-the-EU-security-industry.pdf"},{"key":"2025102510280471300_ref007","article-title":"Green lights forever: analyzing the security of traffic infrastructure","volume-title":"8th USENIX Workshop on Offensive Technologies, WOOT 2014","author":"Ghena","year":"2014"},{"key":"2025102510280471300_ref008","doi-asserted-by":"publisher","first-page":"116","DOI":"10.1007\/978-3-642-31909-9_7","article-title":"Insecurity in public-safety communications: APCO Project 25","author":"Glass","year":"2012","journal-title":"Security and Privacy in Communication Networks"},{"key":"2025102510280471300_ref00400","doi-asserted-by":"publisher","first-page":"22","DOI":"10.1109\/ICEIEC58029.2023.10200747","article-title":"A Formal analysis of emergency communication system based on model checking","author":"Liu","year":"2023"},{"key":"2025102510280471300_ref009","doi-asserted-by":"publisher","first-page":"71","DOI":"10.1145\/1998412.1998426","article-title":"Interactive decryption of DECT phone calls","volume-title":"Proceedings of the Fourth ACM Conference on Wireless Network Security, WiSec \u201911","author":"McHardy","year":"2011"},{"key":"2025102510280471300_ref010","first-page":"7463","article-title":"All cops are broadcasting: TETRA under scrutiny","author":"Meijer","year":"2023"},{"key":"2025102510280471300_ref011","first-page":"1469","article-title":"The vulnerability analysis and improvement of the TETRA authentication protocol","author":"Park","year":"2010"},{"key":"2025102510280471300_ref01200","doi-asserted-by":"publisher","first-page":"117","DOI":"10.1145\/2994459.2994463","article-title":"Analyzing TETRA location privacy and network availability","volume":"16","author":"Pfeiffer","year":"2016","journal-title":"Proceedings of the 6th Workshop on Security and Privacy in Smartphones and Mobile Devices"},{"key":"2025102510280471300_ref012","first-page":"28492","article-title":"Robust speech recognition via large-scale weak supervision","author":"Radford","year":"2023"},{"key":"2025102510280471300_ref013","volume-title":"Diffusion of Innovations","author":"Rogers","year":"2003","edition":"5th ed."},{"issue":"6","key":"2025102510280471300_ref014","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/TITS.2016.2612584","article-title":"On perception and reality in wireless air traffic communication security","volume":"18","author":"Strohmeier","year":"2017","journal-title":"IEEE Transactions on Intelligent Transportation Systems"},{"key":"2025102510280471300_ref015","doi-asserted-by":"publisher","first-page":"135","DOI":"10.1007\/978-3-030-16874-2_10","article-title":"Surveying aviation professionals on the security of the air traffic control system","volume-title":"Security and Safety Interplay of Intelligent Software Systems, CSITS ISSA 2018","author":"Strohmeier","year":"2019"}],"container-title":["Information &amp; Computer Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/ICS-12-2024-0318\/full\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/ics\/article-pdf\/33\/5\/766\/10387298\/ics-12-2024-0318en.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/www.emerald.com\/ics\/article-pdf\/33\/5\/766\/10387298\/ics-12-2024-0318en.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,25]],"date-time":"2025-10-25T14:28:07Z","timestamp":1761402487000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.emerald.com\/ics\/article\/33\/5\/766\/1249902\/User-adoption-of-TETRA-mobile-radio-communication"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,6,4]]},"references-count":17,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2025,10,28]]}},"URL":"https:\/\/doi.org\/10.1108\/ics-12-2024-0318","relation":{},"ISSN":["2056-4961","2056-497X"],"issn-type":[{"type":"print","value":"2056-4961"},{"type":"electronic","value":"2056-497X"}],"subject":[],"published":{"date-parts":[[2025,6,4]]}}}