24/7 writing help on your phone
Save to my list
Remove from my list
In the security discussion, the mobile gadget being attacked as a target because Smartphone is as much as computer can provide people. Accordingly, information and data will be stores in user's phone so attackers can easily break and theft data easily. In earlier studies have research the mobile devices cause extreme harm to user personal privacy and cause huge security problem to commercial as well, this research examine mobile phone security awareness between the University of Portsmouth and ICP students.
Finding that the extreme level of lack of awareness about mobile gadget security among university students.
Keywords: Mobile Gadget, Security, Awareness
The character of mankind living has been significant changed by gadget technology and personal life's. Most of people use their laptop, handheld PC and mobile devices in our daily routine life. There is demography indicate that mobile gadget personal users of the device 4.57 billion users in (2018), which is grown up in next years it will be 4.
68 billion users in (2019). In the current situation there are number of people uses Smartphone in worldwide. Nowadays, users can deal with mostly all function of both professional and personal use. Furthermore the cost of gadget heavily dependent on the advantage of the Smartphone, and people facing more problems regarding data security threats while they are using Wi-Fi connection. A certain report released that more than million mobile malware detected, which is never seen in past decade ago. There are various user may infected to the malware thread for personal and business both.
Unfortunately, a new survey graph shows many user are still lack of basic security on their mobile devices.
There are lots of vulnerabilities about not only software but also hardware. In this dissertation, I will elaborate several general ones which are include in all mobile devices platforms. Moreover, I will search out a number of possible steps of preventing weaknesses.
The primary objective of this research is to explore the extent to which Smartphone users are aware of the potential security risks when using their Smartphone. This dissertation also seeks to determine whether Smartphone users are actually concerned about the risks and if they are taking any steps to protect their personal data on their Smartphone.
This below table shows that the male compare to female Smartphone's users increased. If I compared male in percentage there are (41.9) Percentage uses their Smartphone's.
And if I compared female in there are number of female percentage will be increased (58.1)
Male | 65 | 41.9% |
Female | 90 | 58.1% |
Total | 155 | 100% |
If I compare with age in percentage (21-30) age people more uses of Smartphone's (36.1) out off 100.
And (31-40) age users Smartphone's uses are nearby the (21-30) age. It is nearby (20.6).
There are multiple user uses their different Operating System. But the highest user uses their OS is Android. because Android is easily to understand to all the people, The percentage of Android users use their operating system is (60.0). Second highest user is IOS it is near by the android user, it is (36.1) and (3.9) user use others operating system.
< 21 | 36 | 23.2% |
21-30 | 56 | 36.1%% |
31-40 | 32 | 20.6% |
41-50 | 24 | 15.5% |
>50 | 7 | 4.5% |
Total | 155 | 100% |
Mobile phone users Operating System
Android | 93 | 60.0% |
IOS | 56 | 36.1% |
Others | 6 | 3.9% |
Total | 155 | 100% |
Approach/Philosophy: Positivistic
Methodology: Survey
Method: Questionnaire
[State the fundamental methodology you are applying to the research study and design, e.g. qualitative, quantitative or mixed methods and give brief reasons for any limitations in that design.]
[State the research methods you intend to use in the study and justify their inclusion e.g., questionnaires, structured, semi-structured or unstructured interviews, fileld notes, reflexive journals, analysis of documents and materials.]
21 Justify the study size
[State clearly the intended minimum and maximum numbers of participants, giving the rationale for these].
[State any criteria for accepting volunteers as participants e.g. age, gender, demographics, subject specific knowledge, experience, profession, etc.]
[State how you will recruit participants e.g. volunteer participants will be recruited from; students / staff from ICP, local residents, local companies, etc. Clarify how consent will be sought; sending out further written details (participant information sheet) before a verbal briefing prior to seeking consent.]
[Describe the data collection process in complete detail, e.g. quantitative data via questionnaires and / or qualitative data via interviews. Provide a timeline to show clearly who is doing what and when.]
[State how, when and where the results will be reported, particularly if staged or interim reports are to be prepared.]
Participants will be withdrawn from the study on attaining any of the following criteria:
[State and assess the potential risks inherent in the study].
[Include here any references cited above.]
Mobile phone security awareness in ICP and Portsmouth University. (2019, Nov 23). Retrieved from https://studymoose.com/icp-pmp-mini-dissertation-research-protocol-example-essay
👋 Hi! I’m your smart assistant Amy!
Don’t know where to start? Type your requirements and I’ll connect you to an academic expert within 3 minutes.
get help with your assignment