In the security discussion, the mobile gadget being attacked as a target because Smartphone is as much as computer can provide people. Accordingly, information and data will be stores in user’s phone so attackers can easily break and theft data easily. In earlier studies have research the mobile devices cause extreme harm to user personal privacy and cause huge security problem to commercial as well, this research examine mobile phone security awareness between the University of Portsmouth and ICP students.
Finding that the extreme level of lack of awareness about mobile gadget security among university students.
Keywords: Mobile Gadget, Security, Awareness
Introduction / Review Of Literature
The character of mankind living has been significant changed by gadget technology and personal life’s. Most of people use their laptop, handheld PC and mobile devices in our daily routine life. There is demography indicate that mobile gadget personal users of the device 4.57 billion users in (2018), which is grown up in next years it will be 4.
68 billion users in (2019). In the current situation there are number of people uses Smartphone in worldwide. Nowadays, users can deal with mostly all function of both professional and personal use. Furthermore the cost of gadget heavily dependent on the advantage of the Smartphone, and people facing more problems regarding data security threats while they are using Wi-Fi connection. A certain report released that more than million mobile malware detected, which is never seen in past decade ago. There are various user may infected to the malware thread for personal and business both. Unfortunately, a new survey graph shows many user are still lack of basic security on their mobile devices.
There are lots of vulnerabilities about not only software but also hardware. In this dissertation, I will elaborate several general ones which are include in all mobile devices platforms. Moreover, I will search out a number of possible steps of preventing weaknesses.
Research Question / Aims & Objectives
The primary research question being asked in this dissertation is:
- “To what extent are smartphone users aware of the potential security risks when using their smartphones?””
- Sub-questions that arise from this are:
- “Whether there is an awareness amongst smartphone users of malicious threats and risks to their smartphone devices?”
- “Whether there is any concern amongst smartphone users about these threats and risks?”
- “What steps, if any, are smartphone users taking to protect their privacy and security when using their smartphone?”
The primary objective of this research is to explore the extent to which Smartphone users are aware of the potential security risks when using their Smartphone. This dissertation also seeks to determine whether Smartphone users are actually concerned about the risks and if they are taking any steps to protect their personal data on their Smartphone.
This below table shows that the male compare to female Smartphone’s users increased. If I compared male in percentage there are (41.9) Percentage uses their Smartphone’s.
And if I compared female in there are number of female percentage will be increased (58.1)
Gender Frequency Percentage
If I compare with age in percentage (21-30) age people more uses of Smartphone’s (36.1) out off 100.
And (31-40) age users Smartphone’s uses are nearby the (21-30) age. It is nearby (20.6).
There are multiple user uses their different Operating System. But the highest user uses their OS is Android. because Android is easily to understand to all the people, The percentage of Android users use their operating system is (60.0). Second highest user is IOS it is near by the android user, it is (36.1) and (3.9) user use others operating system.
Mobile Phone users Age
Age Frequency Percentage
Mobile phone users Operating System
Operating System Frequency Percentage
Methodology And Methods
[State the fundamental methodology you are applying to the research study and design, e.g. qualitative, quantitative or mixed methods and give brief reasons for any limitations in that design.]
[State the research methods you intend to use in the study and justify their inclusion e.g., questionnaires, structured, semi-structured or unstructured interviews, fileld notes, reflexive journals, analysis of documents and materials.]
21 Justify the study size
[State clearly the intended minimum and maximum numbers of participants, giving the rationale for these].
- Probability: Simple Random
- Probability Stratified
- Probability Systematic
[State any criteria for accepting volunteers as participants e.g. age, gender, demographics, subject specific knowledge, experience, profession, etc.]
[State how you will recruit participants e.g. volunteer participants will be recruited from; students / staff from ICP, local residents, local companies, etc. Clarify how consent will be sought; sending out further written details (participant information sheet) before a verbal briefing prior to seeking consent.]
[Describe the data collection process in complete detail, e.g. quantitative data via questionnaires and / or qualitative data via interviews. Provide a timeline to show clearly who is doing what and when.]
- [State here the methods or reasons for exclusion e.g. not within the target group criteria as specified within the sampling strategy].
- Excel Analysis
- [Explain any descriptive, numerical, or other analysis which is required, and then describe the statistical techniques (if any) to be used.]
[State how, when and where the results will be reported, particularly if staged or interim reports are to be prepared.]
Participants will be withdrawn from the study on attaining any of the following criteria:
- on the request of the participant
- on the decision of the principal investigator or supervisor
[State and assess the potential risks inherent in the study].
References (Harvard APA)
[Include here any references cited above.]
Cite this essay
Mobile phone security awareness in ICP and Portsmouth University. (2019, Nov 23). Retrieved from https://studymoose.com/icp-pmp-mini-dissertation-research-protocol-example-essay