Browsing by Author "Koyuncu, M."
Now showing 1 - 2 of 2
- Results Per Page
- Sort Options
Article Citation - Scopus: 0Do Users Sacrifice Security for Speed and Ease-of-Use on Smartphones?: A Case Study on Attitude(IGI Global, 2020) Koyuncu, Murat; Pusatli, T.; Koyuncu, M.; Nakip, Mahir; Nakip, M.; 51704; 118963; Uluslararası Ticaret ve FinansmanStoring credentials on smartphones to perform online activities increases ease-of-use (EoU) and speed. However, such practices increase security risks, especially if users use a number of applications or store data on their smartphones. Risks become more complicated by keeping smartphones online. This work aims to find potential relationships between security perceptions of smartphone users and their ease-of-use and speed preferences. Two user attitudes are defined as “not considering risk” and “risk exaggeration.” User ease-of-use and speed preferences are limited with the factors related to storing credentials on a smartphone and always keeping the device online. A survey of 154 participants was conducted through convenience sampling. Through regression analyses, logarithmic causality relations are found between EoU and speed and attitudes of not considering risk or risk exaggeration; so the participants preferred to take advantage of EoU and speed despite the fact that they were aware of the risks. Copyright © 2020, IGI Global.Conference Object Citation - Scopus: 0Security Requirements in IoT Environments(Springer Science and Business Media Deutschland GmbH, 2022) Binglaw, F.; Koyuncu, Murat; Koyuncu, M.; Pusatlı, T.; 51704; Uluslararası Ticaret ve FinansmanThe Internet of Things (IoT) is a relatively new concept as it connects things (or objects) that do not have high computational power. The IoT helps these things see, listen, and take action by interoperating with minimal human intervention to make people’s lives easier. However, these systems are vulnerable to attacks and security threats that could potentially undermine consumer confidence in them. For this reason, it is critical to understand the characteristics of IoT security and their requirements before starting to discuss how to protect them. In this scope, the present work reviews the importance of security in IoT applications, factors that restrict the use of traditional security methods to protect IoTs, and the basic requirements necessary to judge them as secure environments. © 2022, ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering.