**5. Discussion**

From the analysis of the survey results in the previous section, it can be seen that there are still mobile device users that aren't taking cyber security measures seriously and continued to stay negligent towards the dangers of cyber threats occurring to mobile devices. Number of reasons behind user's behaviour of not implementing any security measures in general such as:


**133**

*Revealing Cyber Threat of Smart Mobile Devices within Digital Ecosystem: User Information…*

• Users do not perceive any benefit and believes their behaviour will not affect security at all or users instead justify the cyber risk they perceived such as believing connecting themselves to an unsecure website for a short period of time is a safe action or by thinking there is no possibility of them being

• Users are lacking the knowledge and skills to handle any security issue such as ways and method of handling any fraudulent activities they encountered

• Users do not understand that any behaviour they have conducted will have an impact on the security risks as well as their level of vulnerability to these risks

• Users are simply forgotten to take on security measures due to various

In order to increase the level of awareness amongst mobile device users, it is necessary to increase their awareness on how each of their actions and behaviour could affect the security of their mobile devices. In order to do so, a new framework which has been proposed which has been created by analysing and assessing a

It has been discovered that creating a good design or interface for a security software or application has an impact on user's willingness to use such applications. Interface design is deemed as a crucial property compared to user participation in regards to security systems in computer. The rationale behind this discovery is that a good design can effectively transmit the correct information in an orderly manner to users, thus allowing users to make an accurate and precise decision in regards to the system's state, structure as well as the security aspect of it. When this is applied to the context of mobile devices, having a good design such as good visualisations and smooth interface allows the security applications to effectively communicate its users with the necessary information useful for users to assess their current security status and risk as well as making informed decisions. Additionally, it can also promote constant interactivity with users which will then eventually result in enticing

When users are determining themselves on how to behave, they will usually conduct a cost benefit analysis on the situation. One of the factors that could affect the analysis and consequently their behaviour is the presence of incentives, whether they are in the form of positive incentives such as rewards or any sort of benefits bestowed to the users or the incentives could also be negative in nature such as the cost or punishment for certain conduct or behaviour. When the economic factors of performing insecure actions are seen as acceptable to users, they would perform those risky actions such as visiting insecure websites and dismissing any security risk and credentials that could endanger both the user's mobile device as well as their sensitive information. The relationship between rewards and user's probability of behaving securely and it has been revealed that punishment, rewards as well as

It is very important for users to have the knowledge, understanding as well as the skills in order to defend themselves against fraudulent or unlwaful attacks. It is necessary for users to be equipped with the essential knowledge in order to perform and promote security measures as well as actions. Lack of user's knowledge in regards best security within the security aspect could result in a security failure. But

distractions encountered while surfing online

*Environmental influencers: Design factors.*

*Economic factors.*

number of factors that influences user's cyber security behaviour.

user's involvement and willingness to use such security applications.

control assurance has an impact on user's conformity.

*Personal influencers: Knowledge, skills and understanding.*

*DOI: http://dx.doi.org/10.5772/intechopen.95752*

attacked or breached

*Revealing Cyber Threat of Smart Mobile Devices within Digital Ecosystem: User Information… DOI: http://dx.doi.org/10.5772/intechopen.95752*


In order to increase the level of awareness amongst mobile device users, it is necessary to increase their awareness on how each of their actions and behaviour could affect the security of their mobile devices. In order to do so, a new framework which has been proposed which has been created by analysing and assessing a number of factors that influences user's cyber security behaviour.

#### *Environmental influencers: Design factors.*

It has been discovered that creating a good design or interface for a security software or application has an impact on user's willingness to use such applications. Interface design is deemed as a crucial property compared to user participation in regards to security systems in computer. The rationale behind this discovery is that a good design can effectively transmit the correct information in an orderly manner to users, thus allowing users to make an accurate and precise decision in regards to the system's state, structure as well as the security aspect of it. When this is applied to the context of mobile devices, having a good design such as good visualisations and smooth interface allows the security applications to effectively communicate its users with the necessary information useful for users to assess their current security status and risk as well as making informed decisions. Additionally, it can also promote constant interactivity with users which will then eventually result in enticing user's involvement and willingness to use such security applications.

#### *Economic factors.*

*Data Integrity and Quality*

to use the application once more.

the world.

**Figure 14.**

*Apps issues towards security.*

**5. Discussion**

the application itself. If it was in such instances, then these respondents are willing

Lastly, when the respondents were asked on whether they think cyber security is important for mobile devices, 99.1% of the respondents agrees on the importance of cyber security for mobile devices while 0.9% of the respondents disagrees and believes that cyber security is unimportant for mobile devices. Almost all respondents believed that cyber security is important to mobile devices because the respondents believed that cyber security will protect their personal or sensitive data, their privacy as well as confidentiality that were available within their mobile device from being manipulated, misused or taken advantage of. The respondents also believed that the presence of cyber security is the most effective way to fight against cyber threat issues and reduce the number of cyber crime cases throughout

From the analysis of the survey results in the previous section, it can be seen that there are still mobile device users that aren't taking cyber security measures seriously and continued to stay negligent towards the dangers of cyber threats occurring to mobile devices. Number of reasons behind user's behaviour of not

• User's habit of making irrational thoughts or decisions such as clicking

"I accept" without reading what they are actually agreeing to and not contem-

• User's extreme preference for convenience rather than taking the more difficult

• User's extreme priority on fulfilling user's desire rather than going for security such as downloading applications that they deem very important when there

• The financial costs of opting for security such as purchasing security software such as anti-virus is much greater than the security gains felt by the user.

• Users felt that the level of effort required to fully exercise security measures is too high such as remembering different passwords for different accounts and

implementing any security measures in general such as:

plating about the consequences of their behaviour

are alternatives that could be a much secure

keeping anti-virus updated regularly.

method namely security

**132**

When users are determining themselves on how to behave, they will usually conduct a cost benefit analysis on the situation. One of the factors that could affect the analysis and consequently their behaviour is the presence of incentives, whether they are in the form of positive incentives such as rewards or any sort of benefits bestowed to the users or the incentives could also be negative in nature such as the cost or punishment for certain conduct or behaviour. When the economic factors of performing insecure actions are seen as acceptable to users, they would perform those risky actions such as visiting insecure websites and dismissing any security risk and credentials that could endanger both the user's mobile device as well as their sensitive information. The relationship between rewards and user's probability of behaving securely and it has been revealed that punishment, rewards as well as control assurance has an impact on user's conformity.

*Personal influencers: Knowledge, skills and understanding.*

It is very important for users to have the knowledge, understanding as well as the skills in order to defend themselves against fraudulent or unlwaful attacks. It is necessary for users to be equipped with the essential knowledge in order to perform and promote security measures as well as actions. Lack of user's knowledge in regards best security within the security aspect could result in a security failure. But

#### *Data Integrity and Quality*

one of the challenges faced by users is that it is quite difficult for users to conform to best practices of protecting their mobile device because users would not know which specific type of attack or risk they will encounter, especially during these times where by the nature of cyber attacks are always changing as attackers could find many different method to perform fraudulent actions. Due to such uncertainties, users tend to rely on their individual heuristics ability or skills that enables users to make quick and efficient judgements as well as decisions within a short period of time. However, it is also noted that even though the use of heuristics is beneficial, it may lead users to create biases.

On the other hand, the availability and delivery of constant and beneficial information is required in order for users to exhibit security behaviours but it is also noted that such information might not be enough to inspire or motivate users to change their behaviours into a more security oriented in nature. Users still exhibit poor security behaviours even after attending cyber awareness training and campaigns and further added that it is not recommended to refer to user's knowledge level as a determiner of good cyber security behaviours.
