{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,1,17]],"date-time":"2023-01-17T00:17:05Z","timestamp":1673914625022},"reference-count":39,"publisher":"IGI Global","issue":"4","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,10,1]]},"abstract":"<p>This article reports on a study of mobile phone usage by young people in the UK tertiary education sector. Responses from 397 respondents were analysed to explore the attitudes of young people towards data security issues for mobile devices. Results from the comparative analysis found that there were significant differences in data security risk concerns across ethnic groups. Those who reported extrovert personalities tend to take more risk in data security issues. In addition, young people who were 'technology savvy' were less likely to expose themselves to risk to data security issues through the use of free wifi and access of installed applications. It is argued that there is an urgent need for greater education and awareness of Information and Communication Technology (ICT) to reduce risk of cybercrime. The research reported here is part of a wider study looking at the overall communications and mobile phone usage of young people and taken as a whole, the paper contributes to this increasingly important area of Information Technology.<\/p>","DOI":"10.4018\/ijsodit.2013100103","type":"journal-article","created":{"date-parts":[[2014,9,15]],"date-time":"2014-09-15T13:45:10Z","timestamp":1410788710000},"page":"43-58","source":"Crossref","is-referenced-by-count":2,"title":["Smart Phone Activity"],"prefix":"10.4018","volume":"3","author":[{"given":"Balbir S.","family":"Barn","sequence":"first","affiliation":[{"name":"Middlesex University, London, UK"}]},{"given":"Ravinder","family":"Barn","sequence":"additional","affiliation":[{"name":"Royal Holloway University of London, London, UK"}]},{"given":"Jo-Pei","family":"Tan","sequence":"additional","affiliation":[{"name":"Universiti Putra Malaysia, Serdang, Selangor, Malaysia"}]}],"member":"2432","reference":[{"key":"ijsodit.2013100103-0","doi-asserted-by":"publisher","DOI":"10.1287\/isre.9.2.204"},{"key":"ijsodit.2013100103-1","author":"A.Anastasi","year":"1997","journal-title":"Psychological testing"},{"key":"ijsodit.2013100103-2","doi-asserted-by":"publisher","DOI":"10.1111\/j.1467-8535.2007.00793.x"},{"key":"ijsodit.2013100103-3","doi-asserted-by":"publisher","DOI":"10.1089\/cpb.2005.8.39"},{"key":"ijsodit.2013100103-4","article-title":"Childrens use of communications technologies.","author":"P.Brandtzaed","year":"2005","journal-title":"Mobile Media and Youth Conference"},{"key":"ijsodit.2013100103-5","unstructured":"Breitinger, F., & Nickel, C. (2010). User survey on phone security and usage. Paper presented at the BIOSIG."},{"key":"ijsodit.2013100103-6","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2007.01.019"},{"key":"ijsodit.2013100103-7","unstructured":"Campbell, M. A. (2005). The impact of the mobile phone on young people's social life."},{"key":"ijsodit.2013100103-8","doi-asserted-by":"publisher","DOI":"10.1177\/1461444807075016"},{"key":"ijsodit.2013100103-9"},{"key":"ijsodit.2013100103-10","doi-asserted-by":"crossref","unstructured":"Clarke, N.L., & Furnell, S.M. (2005). Authentication of users on mobile telephones--A survey of attitudes and practices. Computers \\& Security, 24(7), 519--527.","DOI":"10.1016\/j.cose.2005.08.003"},{"key":"ijsodit.2013100103-11","doi-asserted-by":"publisher","DOI":"10.2307\/249008"},{"key":"ijsodit.2013100103-12","unstructured":"DimensionalResearch. (2013). The impact of mobile devices on information security: A survey of IT professionals. Retrieved 29 August 2013, 2013, from http:\/\/bit.ly\/1dSqXN9"},{"key":"ijsodit.2013100103-13","unstructured":"Edwards, L., & Brown, I. (2009). Data control and social networking: Irreconcilable ideas?"},{"key":"ijsodit.2013100103-14","author":"H. J.Eysenck","year":"1975","journal-title":"EPQ (Eysenck Personality Questionnaire)"},{"key":"ijsodit.2013100103-15","doi-asserted-by":"crossref","unstructured":"Fortunati, L. (2002). Italy: Stereotypes, true and false. Perpetual Contact: Mobile Communication, Private Talk, Public Performance, 42-62.","DOI":"10.1017\/CBO9780511489471.006"},{"key":"ijsodit.2013100103-16","first-page":"32","author":"N.Green","year":"2002","journal-title":"Who's watching whom? Monitoring and accountability in mobile relations. Wireless World"},{"key":"ijsodit.2013100103-17","doi-asserted-by":"crossref","unstructured":"Green, N. (2003). Outwardly mobile: Young people and mobile technologies. Machines that become us: The social context of personal communication technology (pp. 201-217).","DOI":"10.4324\/9780203786826-15"},{"key":"ijsodit.2013100103-18","doi-asserted-by":"crossref","unstructured":"Huang, D.L., Rau, P.L.P., & Salvendy, G. (2010). Perception of information security. Behaviour & Information Technology, 29(3), 221--232.","DOI":"10.1080\/01449290701679361"},{"key":"ijsodit.2013100103-19","doi-asserted-by":"crossref","unstructured":"Jones, O, Williams, M, & Fleuriot, C. (2003). \u201cA new sense of place?\u201d The implications of mobile wearable ICT devices for the geographies of urban childhood. Children\\`s Geographies, 1--2.","DOI":"10.1080\/14733280302195"},{"key":"ijsodit.2013100103-20","unstructured":"Kennedy, G., Dalgarno, B., Gray, K., Judd, T., Waycott, J., Bennett, S., ... Chang, R. (2007). The net generation are not big users of Web 2.0 technologies: Preliminary findings. ICT: Providing choices for learners and learning. Proceedings ASCILITE Singapore (pp. 517-525)."},{"key":"ijsodit.2013100103-21","doi-asserted-by":"publisher","DOI":"10.1007\/s10796-008-9073-8"},{"key":"ijsodit.2013100103-22","unstructured":"Kowalski, S., & Goldstein, M. (2006). Consumers\u2019 awareness of, attitudes towards and adoption of mobile phone security. Paper presented at the Int. Symp. on Human Factors in Telecommunication."},{"key":"ijsodit.2013100103-23"},{"key":"ijsodit.2013100103-24","unstructured":"Kvavik, Robert B. (2005). Convenience, communications, and control: How students use technology. Educating the Net Generation, 1, 7.1-7.20."},{"key":"ijsodit.2013100103-25","unstructured":"Lenhart, A., Purcell, K., Smith, A., & Zickuhr, K. (2010). Social media \\& mobile internet use among teens and young adults. Pew internet \\& American life project, Washington, DC."},{"key":"ijsodit.2013100103-26","author":"R.Ling","year":"2004","journal-title":"The mobile connection: The cell phone's impact on society"},{"key":"ijsodit.2013100103-27","first-page":"175","author":"R.Ling","year":"2005","journal-title":"Mobile communications vis-\u00e0-vis teen emancipation, peer group integration and deviance The Inside Text"},{"key":"ijsodit.2013100103-28","author":"M.Madden","year":"2013","journal-title":"Teens and mobile apps privacy. PewInternet.org"},{"key":"ijsodit.2013100103-29","author":"H.Mitomo","year":"2006","journal-title":"Chopstick culture and mobile communication: How the University students in East Asia utilize mobile phones---Empirical evidence from the Asian metropolitan mobile survey"},{"issue":"1","key":"ijsodit.2013100103-30","article-title":"Cybercrime victimization: An examination of Individual and Situational level factors.","volume":"5","author":"F. T.Ngo","year":"2011","journal-title":"International Journal of Cyber Criminology"},{"key":"ijsodit.2013100103-31","doi-asserted-by":"crossref","unstructured":"Oksman, Virpi, & Turtiainen, Jussi. (2004). Mobile communication as a social stage meanings of mobile communication in everyday life among teenagers in Finland. New Media \\& Society, 6(3), 319--339.","DOI":"10.1177\/1461444804042518"},{"key":"ijsodit.2013100103-32","doi-asserted-by":"publisher","DOI":"10.1111\/j.1468-2427.2005.00623.x"},{"key":"ijsodit.2013100103-33","doi-asserted-by":"publisher","DOI":"10.1108\/10748120110424843"},{"key":"ijsodit.2013100103-34","doi-asserted-by":"publisher","DOI":"10.1177\/0022427811425539"},{"key":"ijsodit.2013100103-35","unstructured":"Rogers, E. M., & Shoemaker, F. F. (1971). Communication of innovations; A cross-cultural approach."},{"key":"ijsodit.2013100103-36","doi-asserted-by":"crossref","unstructured":"Skog, Berit. (2002). Mobiles and the Norwegian teen: Identity, gender and class. Perpetual Contact: Mobile Communication, Private Talk, Public Performance, 255.","DOI":"10.1017\/CBO9780511489471.020"},{"issue":"1","key":"ijsodit.2013100103-37","first-page":"71","article-title":"Online dangers: Geographies of parents fears for children\u2019s safety in cyberspace.","volume":"53","author":"G.Valentine","year":"2001","journal-title":"The Professional Geographer"},{"key":"ijsodit.2013100103-38","unstructured":"Webster, S., Davidson, J., Bifulco, A., Gottschalk, P., Caretti, V., Pham, T., & Graparo, G. (2012). European online grooming project: Final report. European Commission Safer Internet Plus Programme, Tech. Rep."}],"container-title":["International Journal of Social and Organizational Dynamics in IT"],"original-title":[],"language":"ng","link":[{"URL":"https:\/\/www.igi-global.com\/viewtitle.aspx?TitleId=114983","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,1]],"date-time":"2022-06-01T19:31:47Z","timestamp":1654111907000},"score":1,"resource":{"primary":{"URL":"https:\/\/services.igi-global.com\/resolvedoi\/resolve.aspx?doi=10.4018\/ijsodit.2013100103"}},"subtitle":["Risk-Taking Behaviours and Perceptions on Data Security among Young People in England"],"short-title":[],"issued":{"date-parts":[[2013,10,1]]},"references-count":39,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2013,10]]}},"URL":"https:\/\/doi.org\/10.4018\/ijsodit.2013100103","relation":{},"ISSN":["2155-6334","2155-6342"],"issn-type":[{"value":"2155-6334","type":"print"},{"value":"2155-6342","type":"electronic"}],"subject":[],"published":{"date-parts":[[2013,10,1]]}}}