Show simple item record

dc.contributor.authorAlotaibi, S
dc.contributor.authorFurnell, S
dc.contributor.authorClarke, Nathan
dc.date.accessioned2023-10-12T14:57:05Z
dc.date.available2023-10-12T14:57:05Z
dc.date.issued2016-09-01
dc.identifier.issn2046-3723
dc.identifier.issn2046-3723
dc.identifier.urihttps://pearl.plymouth.ac.uk/handle/10026.1/21400
dc.description.abstract

The daily activities of mobile device users range from making calls and texting to accessing mobile applications, such as mobile banking and online social networks. Mobile phones are able to create, store, and process different types of data, and these data, whether personal, business, or governmental, are related to the owner of the mobile device. More specifically, user activities, such as posting on Facebook, is sensitive and confidential processes with varying degrees of social risk. The current point-of-entry authentication mechanisms, however, consider all applications on the mobile device as if they had the same level of importance; thus maintaining a single level of security for all applications, without any further access control rules. In this research, we argue that on a single mobile application there are different processes operating on the same data, with different social risks based on the user’s actions. More specifically, the unauthorised disclosure or modification of mobile applications data has the potential to lead to a number of undesirable consequences for the user, which in turn means that the risk is changing within the application. Thus, there is no single risk for using a single application. Accordingly, there is a severe lack of protection for user data stored in mobile phones due to the lack of further authentication or differentiated protection beyond the point-of-entry. To remedy that failing, this paper has introduced a new risk assessment model for mobile applications data, called MORI (Mobile Risk) that determines the risk level for each process on a single application. The findings demonstrate that this model has introduced a risk matrix which helps to move the access control system from the application level to the intra- process application level, based on the risk for the user action being performed on these processes.

dc.publisherInfonomics Society
dc.titleMORI: An Innovative Mobile Applications Data Risk Assessment Model
dc.typejournal-article
plymouth.issue3/4
plymouth.volume5
plymouth.publication-statusPublished online
plymouth.journalJournal of Internet Technology and Secured Transaction
dc.identifier.doi10.20533/jitst.2046.3723.2016.0062
plymouth.organisational-group|Plymouth
plymouth.organisational-group|Plymouth|Faculty of Science and Engineering
plymouth.organisational-group|Plymouth|Faculty of Science and Engineering|School of Engineering, Computing and Mathematics
plymouth.organisational-group|Plymouth|REF 2021 Researchers by UoA
plymouth.organisational-group|Plymouth|Users by role
plymouth.organisational-group|Plymouth|Users by role|Academics
plymouth.organisational-group|Plymouth|REF 2021 Researchers by UoA|UoA11 Computer Science and Informatics
dcterms.dateAccepted2016-01-01
dc.date.updated2023-10-12T14:57:05Z
dc.rights.embargodate2023-10-13
dc.identifier.eissn2046-3723
dc.rights.embargoperiodforever
rioxxterms.versionofrecord10.20533/jitst.2046.3723.2016.0062


Files in this item

Thumbnail
Thumbnail

This item appears in the following Collection(s)

Show simple item record


All items in PEARL are protected by copyright law.
Author manuscripts deposited to comply with open access mandates are made available in accordance with publisher policies. Please cite only the published version using the details provided on the item record or document. In the absence of an open licence (e.g. Creative Commons), permissions for further reuse of content should be sought from the publisher or author.
Theme by 
Atmire NV