| Literature DB >> 30538088 |
Leming Zhou1, Bambang Parmanto1, Zakiy Alfikri1, Jie Bao1.
Abstract
BACKGROUND: On many websites and mobile apps for personal health data collection and management, there are security features and privacy policies available for users. Users sometimes are given an opportunity to make selections in a security setting page; however, it is challenging to make informed selections in these settings for users who do not have much education in information security as they may not precisely know the meaning of certain terms mentioned in the privacy policy or understand the consequences of their selections in the security and privacy settings.Entities:
Keywords: data security; education; feasibility studies; mobile app
Year: 2018 PMID: 30538088 PMCID: PMC6305877 DOI: 10.2196/11210
Source DB: PubMed Journal: JMIR Mhealth Uhealth ISSN: 2291-5222 Impact factor: 4.773
Figure 1Screenshots for the list of security features and the options and simulation of 3 security features.
Demographic characteristics of the study participants (N=66).
| Demographic characteristic | Value | |
| Age in years, mean (SD) | 31.1 (13.42) | |
| Years of using smart mobile devices (1-10), mean (SD) | 6.0 (2.59) | |
| 18-28 | 40 (61) | |
| 29-50 | 16 (24) | |
| 51-65 | 10 (15) | |
| Male | 31 (47) | |
| Female | 35 (53) | |
| Black | 11 (17) | |
| White | 38 (58) | |
| Asian | 17 (26) | |
| High school or lower | 2 (3) | |
| Some college, no Bachelor’s degree | 23 (24) | |
| Bachelor’s | 17 (26) | |
| Graduate | 24 (36) | |
| Single | 51 (77) | |
| Married or in a long-term committed relationship | 13 (20) | |
| Divorced or separated | 2 (3) | |
| Urban | 48 (73) | |
| Suburban | 16 (24) | |
| Rural | 2 (3) | |
| Employed, working 1 to 20 hours per week | 14 (21) | |
| Employed, working 21 to 40 hours per week | 22 (33) | |
| Employed, working more than 40 hours per week | 9 (14) | |
| Not employed, looking for a job | 9 (14) | |
| Not employed, not looking for a job | 8 (12) | |
| Retired or disabled | 4 (6) | |
| Student | 24 (36) | |
| Researcher | 10 (15) | |
| Administrative personnel | 6 (9) | |
| Customer service | 5 (8) | |
| Retired, disabled, unemployed | 4 (6) | |
| Other | 14 (21) | |
| No answer | 3 (5) | |
| Excellent | 20 (30) | |
| Very good | 24 (36) | |
| Good | 19 (29) | |
| Fair | 3 (5) | |
| Android | 19 (29) | |
| iOS | 44 (67) | |
| Other | 3 (5) | |
| Yes | 38 (58) | |
| No | 28 (42) | |
| ≤US $10,000 | 13 (20) | |
| US $10,001–US $25,000 | 14 (21) | |
| US $25,001–US $50,000 | 18 (27) | |
| US $50,001–US $100,000 | 7 (11) | |
| >US $100,000 | 9 (14) | |
| Decline to answer | 5 (8) | |
Six security features implemented in the SecSim app, their options, and the selections made by 66 study participants before and after the security education.
| Feature label | Feature description | Before, n (%) | After, n (%) | |
| 1 | Encrypting data on local device (PLa=1) | 28 (42) | 18 (27) | |
| 2 | Encrypting data when transmission (PL=1) | 6 (9) | 5 (8) | |
| 3 | Encrypting data on the remote server (PL=1) | 13 (20) | 7 (11) | |
| 1,2 | Encrypting data on local device and during transmission (PL=2) | 0 (0) | 2 (3) | |
| 1,3 | Encrypting data on local device and remote server (PL=2) | 1 (2) | 0 (0) | |
| 2,3 | Encrypting data during transmission and on remote server (PL=2) | 3 (5) | 5 (8) | |
| 1,2,3 | Encrypting data on local, remote device and during transmission (PL=3) | 14 (21) | 29 (44) | |
| No answer | 1 (2) | 0 (0) | ||
| 1 | Once a month | 11 (17) | —b | |
| 2 | Once every 3 months | 15 (23) | — | |
| 3 | Once every 6 months | 19 (29) | — | |
| 4 | Once a year | 6 (9) | — | |
| 5 | Never | 13 (20) | — | |
| No answer | 2 (3) | — | ||
| 1 | On local device only | 34 (52) | — | |
| 2 | On remote server only | 5 (8) | — | |
| 3 | Both on local device and remote server | 25 (38) | — | |
| No answer | 2 (3) | — | ||
| 1 | Username, password, and PIN are required | 5 (8) | 10 (15) | |
| 2 | Username and password are required | 24 (36) | 18 (27) | |
| 3 | Only PIN is required | 16 (24) | 16 (24) | |
| 4 | Nothing is required, all saved on the local device | 20 (30) | 21 (32) | |
| No answer | 1 (2) | 1 (2) | ||
| 1 | Not using RBAC | 31 (47) | 13 (20) | |
| 2 | Using RBAC | 33 (50) | 53 (80) | |
| No answer | 2 (3) | 0 (0) | ||
| 1 | Not using image encryption | 20 (30) | 8 (12) | |
| 2 | Using image encryption | 44 (67) | 58 (88) | |
| No answer | 2 (3) | 0 (0) | ||
aPL: protection level.
bNot applicable.
cRBAC: role-based access control.
A summary of the changes in security option selection after security education (N=66).
| Security features | Stronger, n (%) | Weaker, n (%) | No change, n (%) |
| Encryption (local, remote, and transmission) | 21 (32) | 0 (0) | 45 (68) |
| Log-in credentials | 8 (12) | 7 (11) | 51 (77) |
| Role-based access control | 20 (30) | 1 (2) | 45 (68) |
| Image encryption | 14 (21) | 1 (2) | 51 (77) |
A summary of usability study results.
| Post-Study System Usability Questionnaire | Mean (SD) |
| 1. Overall, I am satisfied with how easy it is to use this system | 1.86 (0.892) |
| 2. It was simple to use this system | 1.97 (1.067) |
| 3. I could effectively complete the tasks and scenarios using this system | 1.95 (1.101) |
| 4. I was able to complete the tasks and scenarios quickly using this system | 1.97 (1.109) |
| 5. I was able to efficiently complete the tasks and scenarios using the system | 1.95 (1.044) |
| 6. I felt comfortable using this system | 2.03 (1.136) |
| 7. It was easy to learn to use this system | 1.89 (1.125) |
| 8. I believe I could become productive quickly using this system | 2.02 (1.130) |
| 9. The system gave error messages that clearly told me how to fix the problems | 3.18 (1.300) |
| 10. Whenever I made a mistake using the system, I could recover easily and quickly | 2.47 (1.205) |
| 11. The information (such as on-line help, on-screen messages and other documentation) provided with this system was clear | 2.30 (1.277) |
| 12. It was easy to find the information I needed | 2.26 (1.256) |
| 13. The information provided for the system was easy to understand | 2.23 (1.225) |
| 14. The information was effective in helping me complete the tasks and scenarios | 2.08 (1.042) |
| 15. The organization of information on the system screens was clear | 2.15 (1.218) |
| 16. The interface of this system was pleasant | 2.85 (1.765) |
| 17. I liked using the interface of this system | 2.68 (1.561) |
| 18. This system has all the functions and capabilities I expect it to have | 2.11 (1.083) |
| 19. Overall, I am satisfied with this system | 2.15 (1.167) |