Skip to main content
Article
Handheld Usage Data Mining for Handheld Data Protection
Contemporary Management Research (2013)
  • Wen-Chen Hu, University of North Dakota
  • Naima Kaabouch, University of North Dakota
  • Lei Chen, Georgia Southern University
  • Hung-Jen Yang, National Kaohsiung Normal University
Abstract
Mobile handheld devices such as smart cellular phones are easily lost or stolen because of their small sizes and high mobility. Personal data such as addresses and messages stored in the devices may be revealed when the devices are lost. Handheld devices must include rigorous and convenient handheld data protection in case the devices are lost or stolen. This research proposes a novel approach for handheld data protection by using handheld usage data mining, which consists of five steps: (i) usage data gathering, (ii) usage data preparation, (iii) usage pattern discovery, (iv) usage pattern analysis and visualization, and (v) usage pattern applications. Handheld usage data is collected before applying this method. Usage patterns are discovered and saved by using finite automaton, which is then used to check device usage. When an unusual usage pattern such as an unlawful user trying to access the handheld data is detected, the device will automatically lock itself down until an action, such as entering a password, is taken. Experimental results show this method is effective and convenient for handheld data protection.
Keywords
  • Handheld Security,
  • Mobile Handheld Devices,
  • Smartphones,
  • Data Mining,
  • Usage Mining,
  • Usage Pattern Discovery,
  • and Identification
Publication Date
2013
DOI
10.7903/cmr.3845
Citation Information
Wen-Chen Hu, Naima Kaabouch, Lei Chen and Hung-Jen Yang. "Handheld Usage Data Mining for Handheld Data Protection" Contemporary Management Research Vol. 9 Iss. 2 (2013) p. 93 - 108 ISSN: 1813-5498
Available at: http://works.bepress.com/lei-chen/28/