A Persuasive System for Influencing Mobile Phone Users’ Locking Behavior

Authors: S. Agholor, D.O. Aborisade and A. Onuodafin
Affiliation: Federal College of Education, Federal University of Agriculture, College of Education, Nigeria


Keywords: Android Operating, System Auto-reminder, Persuasive System, Countermeasures, Passwords, Screen, Lock Options
ABSTRACT. The ease of usage of mobile phones led to its adoption by the users as personal digital assistant. This adoption, no doubt made it a lucrative target for cyber-criminals. A mobile phone can get into the hands of criminals through theft or loss. When this happens, the stored data can easily be compromised if the mobile phone is not protected with a password. To avoid this, developers of the mobile phone operating system included various screen lock options as the first line of defence to prevent unauthorized access to the mobile phone and by extension, the stored data. Various studies on the use of these screen lock options revealed that most end-users do not generally make use of it. To solve this problem, an Auto-reminder Persuasive System (APS) was developed. The system was implemented using Android SDK and JAVA. A pilot test was carried out using purposive selection of 1000 participants randomly divided into two equal groups of 500 members labeled A and B for experimental and control groups respectively. In the experimental group, APS was installed on the mobile phones of the members, while in the control group there was no installation of APS. At the end of the three months of the pilot test, the mobile phones of members of the two groups were collected and attempts were made to use the phones. The result from group A showed that 98.40% of members of the group passworded their phones as against the 24.00% from group B. With this result, it showed that APS is a highly promising method of persuading end-users to use password in protecting their mobile phones against unauthorized access.


Halmiton, A (2007) Banking Goes Mobile. From wwww.time.com/time/business/… Date visited 07/03/2015
Tiwari, R., Buse, S and Herstatt, C (2007) Mobile Services in Banking Sector: The Role of Innovative Business Solutions in Generating Competitive Advantage. In International Research Conference on Quality, Innovation and Knowledge Management, New Delni, pp. 1-17
Sabzevar, A. P and Sousa, J. P (2008) Inproving the Security of Mobile-Phone Access to Remote Personal Computers. In International Conference on Software and Data Technologies, pp. 96-103
CTIA (2012) U.S. Wireless Quick Facts. From ctia.org/… Date visited 03/03/15
Nigerian Communications Commission (2015) Subscribers Statistics. From www.ncc.gov.ng/. Date visited 03/03/2015
Fischer, I., Kuo, C., Huang, L and Frank, M (2012) Smartphones: Not Smart Enough? In ACM Workshop on Security and Privacy in Smartphones and Mobile Devices (SPSM) pp. 1-6
Lookout Blog (2011) Lost and Found: The Challenges of finding your lost or stolen phone. From www.blog.mylookout.com/blog/... Date visited 03/03/2015
Jaroslovsky, R (2012) Help for Lost Cell Phones. From www.businessweek.com/magazine/ content/… Date visited 06/06/12
Agholor, S (2015) The Use of Screen Lock Options in Securing Mobile Phones. In Akoka Journal of Vocational and Science Education, Vol. 3, No. 2, pp. 231-237
. Lyne, J (2011) 67 Percent of Consumers Don’t Have Password Protection on Their Mobile Phones. From www.sophos.com. Date visited 03/03/2015
Retrevo Blog (2011) iPhones, backups and tablets, what is the connection? From www.retrevo.com/content/blog... Date visited 07/03/2015
Norton (2011) Norton Survey reveals one in three experience cell phone loss/theft. From www.symantec.com/about/news/release/... Date visited 07/03/2015
Sophos Blog (2011) Survey says 70% do not Password-Protect their Mobile Phones. From www.nakedsecurity.sophos.com/... Date visited 07/03/2015
. Confident Technologies (2014) Survey Shows Smartphone Users Choose Convenience Over Security. From www.confidentTechnologies.com/survey. Date visited 07/03/15
Apperian (2011) Solving Android Multiple Personality Disorder: No Drugs Required. From www.apperian.com/... Date visited 03/03/15
Fraunhofer (2012) BizzTrust Two Smartphones in One. From www.sit.fraunhofer.de/en/ bizztrust/… Date visited 03/03/15
iGillottResearch (2006) Security Mobile Devices on Converged Networks. From www.trustedcomputinggroup.org/... Date visited 03/03/15
Anderson, C. L. and Agarwal, R (2010) Practicing Safe Computing: A Multi Method Emperical Examination of Home Computer User Security Behavioural Intentions. In MIS Quarterly, Vol. 34, No. 3, pp. 613-643
Information-Technology Promotion Agency (2012) Security Measures Guide For Smartphones. From www.ipa.gov.jp/security... Date visited 07/03/2015
Chris, R (2012) Smart Phone, Dumb Security. In Review of Business Information Systems, First Quarter, Vol. 16, No. 1, pp. 21-26
Agholor, S (2017) An Improved Approach for Managing Multiple Passwords. An Unpublished Ph.D. Thesis submitted to Dept of Computer Science, FUNAAB, pp. 1- 289
Gikas, M (2014) Most Americans Don’t Secure their Smartphones. From www.cnbc.com/101611. Date visited 07/03/15
Bojinov, H., Bursztein, E., Boyen, X., and Boneh, D (2010) Kamouflage: LossResistant Password Management. From www.cryto.stanford.edu. Date visited 11/12/2014