In the security discussion, the mobile gadget being attacked as a target because Smartphone is as much as computer can provide people. Accordingly, information and data will be stores in user’s phone so attackers can easily break and theft data easily. In earlier studies have research the mobile devices cause extreme harm to user personal privacy and cause huge security problem to commercial as well, this research examine mobile phone security awareness between the University of Portsmouth and ICP students.
Finding that the extreme level of lack of awareness about mobile gadget security among university students.
Keywords: Mobile Gadget, Security, Awareness
The character of mankind living has been significant changed by gadget technology and personal life’s. Most of people use their laptop, handheld PC and mobile devices in our daily routine life. There is demography indicate that mobile gadget personal users of the device 4.57 billion users in (2018), which is grown up in next years it will be 4.
68 billion users in (2019). In the current situation there are number of people uses Smartphone in worldwide. Nowadays, users can deal with mostly all function of both professional and personal use. Furthermore the cost of gadget heavily dependent on the advantage of the Smartphone, and people facing more problems regarding data security threats while they are using Wi-Fi connection. A certain report released that more than million mobile malware detected, which is never seen in past decade ago. There are various user may infected to the malware thread for personal and business both.
Unfortunately, a new survey graph shows many user are still lack of basic security on their mobile devices.
There are lots of vulnerabilities about not only software but also hardware. In this dissertation, I will elaborate several general ones which are include in all mobile devices platforms. Moreover, I will search out a number of possible steps of preventing weaknesses.
The primary objective of this research is to explore the extent to which Smartphone users are aware of the potential security risks when using their Smartphone. This dissertation also seeks to determine whether Smartphone users are actually concerned about the risks and if they are taking any steps to protect their personal data on their Smartphone.
This below table shows that the male compare to female Smartphone’s users increased. If I compared male in percentage there are (41.9) Percentage uses their Smartphone’s.
And if I compared female in there are number of female percentage will be increased (58.1)
Male | 65 | 41.9% |
Female | 90 | 58.1% |
Total | 155 | 100% |
If I compare with age in percentage (21-30) age people more uses of Smartphone’s (36.1) out off 100.
And (31-40) age users Smartphone’s uses are nearby the (21-30) age. It is nearby (20.6).
There are multiple user uses their different Operating System. But the highest user uses their OS is Android. because Android is easily to understand to all the people, The percentage of Android users use their operating system is (60.0). Second highest user is IOS it is near by the android user, it is (36.1) and (3.9) user use others operating system.
< 21 | 36 | 23.2% |
21-30 | 56 | 36.1%% |
31-40 | 32 | 20.6% |
41-50 | 24 | 15.5% |
>50 | 7 | 4.5% |
Total | 155 | 100% |
Mobile phone users Operating System
Android | 93 | 60.0% |
IOS | 56 | 36.1% |
Others | 6 | 3.9% |
Total | 155 | 100% |
Approach/Philosophy: Positivistic
Methodology: Survey
Method: Questionnaire
[State the fundamental methodology you are applying to the research study and design, e.g. qualitative, quantitative or mixed methods and give brief reasons for any limitations in that design.]
[State the research methods you intend to use in the study and justify their inclusion e.g., questionnaires, structured, semi-structured or unstructured interviews, fileld notes, reflexive journals, analysis of documents and materials.]
21 Justify the study size
[State clearly the intended minimum and maximum numbers of participants, giving the rationale for these].
[State any criteria for accepting volunteers as participants e.g. age, gender, demographics, subject specific knowledge, experience, profession, etc.]
[State how you will recruit participants e.g. volunteer participants will be recruited from; students / staff from ICP, local residents, local companies, etc. Clarify how consent will be sought; sending out further written details (participant information sheet) before a verbal briefing prior to seeking consent.]
[Describe the data collection process in complete detail, e.g. quantitative data via questionnaires and / or qualitative data via interviews. Provide a timeline to show clearly who is doing what and when.]
[State how, when and where the results will be reported, particularly if staged or interim reports are to be prepared.]
Participants will be withdrawn from the study on attaining any of the following criteria:
[State and assess the potential risks inherent in the study].
[Include here any references cited above.]
Remember! This is just a sample.
You can get a custom paper by one of our expert writers.
Get your custom essay
Helping students since 2015
Essay Writing Service Features
Our Experience
No matter how complex your assignment is, we can find the right professional for your specific task. Contact Essay is an essay writing company that hires only the smartest minds to help you with your projects. Our expertise allows us to provide students with high-quality academic writing, editing & proofreading services.Free Features
Free revision policy
$10Free bibliography & reference
$8Free title page
$8Free formatting
$8How Our Essay Writing Service Works
First, you will need to complete an order form. It's not difficult but, in case there is anything you find not to be clear, you may always call us so that we can guide you through it. On the order form, you will need to include some basic information concerning your order: subject, topic, number of pages, etc. We also encourage our clients to upload any relevant information or sources that will help.
Complete the order formOnce we have all the information and instructions that we need, we select the most suitable writer for your assignment. While everything seems to be clear, the writer, who has complete knowledge of the subject, may need clarification from you. It is at that point that you would receive a call or email from us.
Writer’s assignmentAs soon as the writer has finished, it will be delivered both to the website and to your email address so that you will not miss it. If your deadline is close at hand, we will place a call to you to make sure that you receive the paper on time.
Completing the order and download