Mobile interaction and security issues
คำสำคัญ:
Mobile, HCI, Security, Interaction, Mobile securityบทคัดย่อ
People once witnessed an interaction method between a user and mobile devices where buttons used to play a prominent role in interacting with the device. However, such interaction has been developed from the past in a variety of ways as we can see from the advancement of smartphones, tablets, and smart devices. Buttons were replaced with a touch screen system, along with many new methods to interact with a mobile device such as voice, camera, and fingerprint. These novel methods have a lot of input, saying the Virtual Reality and Augmented Reality that already has been taken in by the mobile devices. The modern interaction methods aim to give its users the best experience in the areas of communication and interaction. They are expected to have a great ability to access and simple to use. Regardless of the positive light, the new interaction methods may provide, they arguably have a shortcoming for its safety of use. Seeing that the security issues of advanced interaction methods should be explored further, this article has been conducted on the pattern of interaction, both direct and indirect way, between devices and users in different methods to see the potentiality of the security issues that may harm its users.
References
Statista. Number of smartphone users worldwide (in millions). [Internet]. 2016 [cited 2019 February 11]. Available from: http://www.statista.com/statistics/330695/number-ofsmartphone-users-worldwide/
Statista. Worldwide tablet shipments from 2nd quarter 2010 to 2nd quarter 2016 (in million units). [Internet]. 2016 [cited 2019 February 11]. Available from: https://www.statista.com/statistics/272070/global-tablet-shipments-byquarter/
Techopedia. Mobile Device. [Internet]. [cited 2019 January 15]. Available from: https://www.techopedia.com/definition/23586/mobiledevice
Dictionary.com. Mobile device. [Internet]. [cited 2018 December 10]. Available from: http://www.dictionary.com/browse/mobiledevice
IDC Research. Smartphone OS Market Share, 2016 Q2. [Internet]. 2016 [cited 2018 December 11]. Available from: http://www.idc.com/prodserv/smartphone-os-market-share.jsp
Tran H, Zepernick HJ. Proactive attack: a strategy for legitimate eavesdropping.in 2016. In: IEEE Sixth International Conference on Communications and Electronics (ICCE), 2016. pp. 457-61.
Aviv AJ, Gibson K, Mossop E, Blaze M, Smith JM. Smudge attacks on smartphone touch screens. In proceedings of the 4th USENIX Conference on Offensive Technologies, Berkeley, CA, USA; 2010. pp. 1-7.
Mali YK, Mohanpurkar A. Advanced pin entry method by resisting shoulder surfing attacks in 2015. In: International Conference on Information Processing (ICIP), 2015. pp. 37–42.
Chang WL, Sun HM, Wu W. An android behavior-based malware detection method using machine learning in 2016. In: IEEE International Conference on Signal Processing, Communications and Computing (ICSPCC), 2016. pp. 1-4.
Nokia. Nokia malware report shows surge in mobile device infections in 2016. [Internet]. 2016 [cited 2017 September 1]. Available from: http://company.nokia.com/en/news/pressreleases/2016/09/01/nokia-malware-reportshows-surge-in-mobile-device-infectionsin-2016
Nokia. A mobile device infections surge in 2016. [Internet]. 2016 [cited 2017 September 1]. Available from: https://www.msn.com/en-za/news/techandscience/mobile-deviceinfections-surge-in-2016-nokia
Ahmed AA, Abdullah NA. Real time detection of phishing websites in 2016. In: IEEE 7th Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON), 2016. pp. 1-6.
Julie JCH, Ryan C, Cade K. Predicting susceptibility to social influence in phishing emails. Int J Hum Comput Stud 2019;(128):17-26.
Gemalto NV. Data breach statistics. [Internet]. 2016 [cited 2018 August 30]. Available from: http://breachlevelindex.com/
Chen Y, Trappe W, Martin RP. Detecting and localizing wireless spoofing attacks in 2007. In: 4th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks, 2007. pp. 193-202.
TechTarget. Broken cryptography and data security. [Internet]. 2015 [cited 2018 August 20] . Available from: http ://searchsoftwarequality.techtarget.com/photostory/2240177848/Top-ten-threats-tomobile-enterprise-security/10/Brokencryptography-and-data-security
Banks R. The origin of the touchscreen. [Internet]. 2015 [cited 2018 August 23]. Available from: http://www.mobileindustryreview.com/2015/04/touchscreen-inventors.html
Baanto. History of touch screen technology. [Internet]. 2016 [cited 2018 September 11]. Available from: http://baanto.com/touchscreen-technology-history
Schlogl GCGMTLS. Exploring voice user interfaces for seniors. In: Pervasive Technologies Related to Assistive Environments (PETRA), Rhodes, 2013.
University of Rochester, Google Research, Carnegie Mellon University. Just speak: enabling universal voice control on android. In: The International Cross-Disciplinary Conference on Web Accessibility, Seoul, 2014.
Patil S, Gudasalamani S, Lyer N. A survey on Iris recognition system in 2016. In: International Conference on Electrical, Electronics, and Optimization Techniques (ICEEOT), 2016. pp. 2207-10.
Khan N, Gupta M. Face recognition system using improved artificial bee colony algorithm in 2016. In: International Conference on Electrical, Electronics, and Optimization Techniques (ICEEOT), 2016. pp. 3731-5.
Priya R, Tamilselvi V, Rameshkumar GP. A novel algorithm for secure Internet Banking with finger print recognition in 2014. In: International Conference on Embedded Systems (ICES), 2014. pp. 104-9.
Farooq A, Evreinov G, Raisamo R. Enhancing mobile device peripheral controls using Visible Light Communication (VLC) in 2015. In: 9th International Conference on Sensing Technology (ICST), 2015. pp. 623-8.
Downloads
เผยแพร่แล้ว
How to Cite
ฉบับ
บท
License
บทความทุกบทความที่ได้รับการตีพิมพ์ถือเป็นลิขสิทธิ์ของ คณะวิทยาศาสตร์และเทคโนโลยี มหาวิทยาลัยหัวเฉียวเฉลิมพระเกียรติ