Final111111

User Generated

81853_

Business Finance

Description

Please find the attachment

Unformatted Attachment Preview

Topic: Mobile Security And Privacy Final paper must follow the one of the provided templates and include, at minimum, the information below • • • • • • • • • • • • • • • • • • Title Page (1 page separate from other pages) Table of Contents (pages as needed and separate from other pages) List of Tables, Figures and Appendices (pages as needed and separate from other pages) Abstract (1 page separate from other pages) Introduction (pages as needed) • Problem Statement • Research Question (s) • Rationale (pages as needed) • Definitions (if applicable) (pages as needed) • Hypothesis (if applicable) (pages as needed) Literature Review (pages as needed) Methodology (pages as needed) Research Design • Describe and define the research approach or strategy used and how this approach was appropriate for this research Participants • Describe the sample population (number, gender, age, socio-economics, etc.) including how you obtained permission and consent Instrumentation • Describe any instruments used to collect data Procedure • Provide the detail about how you conducted the research Data Processing and Analysis • Explain, in detail, how you processed and analyzed collected data Summary Results (pages as needed) Discussion (pages as needed) Conclusions (pages as needed) References (pages as needed and separate from other pages) (minimum of thirteen (13) peer-reviewed, professional references) Appendices (if applicable) (pages as needed and separate from other pages The paper does not have a page limitation (maximum or minimum) (Black font points have to be completed and edit as per the need) • • • • The presentation must be a Microsoft Office PowerPoint file (.ppt or .pptx) uploaded. Project introduction Description of the issue, project, problem (problem statement) overview of your research findings/results (Traditional Research) Overview of what went well in the project • • o o o • Overview of what could be improved Overview of what you learned about: Project management Following procedures Yourself Do not include what you learned about programming, programming languages, applications, or any other technical aspect of your research Students who developed a website, a webpage or webpages, a productivity, social media, or gaming application must present a live demonstration of their final product.
Purchase answer to see full attachment
User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Explanation & Answer

Attached.

Mobile Security and Privacy
Name
Institution

Introduction


Improvement in technology creates the need to enhance mobile
security.



The protection of the needs of the users is important in encouraging
their mobile usage.



Publicity of the information on protection is important in guiding
the users on enhancing their security.



The breach of the information affects the mobile usage leading to
the need to focus on the correct security measures.

Problem Statement





The convenience of the use of mobile phones creates a
security risk to the users.
The need for the privacy of the users is enabled by the
capabilities of the users.
Privacy invasion involves hacking of the messages and the
logging of the telephone calls.
It poses a risk necessitating for the analysis of the trends in the
market.

Research Findings


The improvement in technology leads to the need to create
awareness among the users.



Consumers are aware of the need to secure the mobile phones and
the focus on the environment of operation.



Policies are important in enhancing privacy and the encouraging the
decision making process.



The education of the consumers encourages the management of the
risks in the market.

Cont’d


The management of the risks of the application is important in
guiding the protection of the users.



Safety in the downloading of the applications is enhanced by
managing the sensitive information.



There is analysis of the role of the stakeholders in guiding the
operation system capabilities and value addition.



Transparency of the application is important in helping to protect
the consumers.

What Went Well






The design of the instrument was enhanced by the
effectiveness it provides in the collection of the information.
The participants were cooperative in answering of the
questions and this helped in the analysis of the security needs.
The analysis of the results and the decentralization of the
different aspects helps in realizing the need for the privacy
measures.
Literature review provided insights on the trend of the security
issues.

Improvements


Further research is required to enable the need to keep up with the
technological improvements.



The intervention in mobile security and privacy creates the need to
focus on the constant improvement of technology.



The risks presented in the exploration research guide the need to
improve the networks in the process of analysis.



There is need to improve the interpretation of the information and
the guidance on the usage of the mobile phones.

Lessons


Project management requires that there is outlining of the goals and
objectives and focus on the efficiency created in managing the project.



The following of the specific procedures in research creates the need to
manage the implementation process and the analysis of the results.



There is focus on the needs of the participants and the efficiency of the
process.



As person, there is the management of the expectations in the process of
identifying the mobile security measures.

Conclusion


Mobile security and privacy helps in prevention of frequent attacks on
the gadgets.



The constant improvement in technology leads to the need to create
new strategies in managing the tactics of the cyber criminals.



The expertise that enhances the mobile security helps in the creation
of awareness on the needs of the users.



The protection measures should ensure that there is connection on the
various changing issues.

References
Chien-Lung, H., Atsuo, I., Sk. Md. Mizanur, R., Fatos, X., & Laurence T., Y. (2015).
Security, Privacy, and Applications in Mobile Healthcare. International Journal Of
Distributed Sensor Networks, Vol 2015 (2015), doi:10.1155/2015/675129
Erturk, E. (2015). Two Trends in Mobile Security: Financial Motives and Transitioning from
Static to Dynamic Analysis.
Yu.S., C., & T.I., K. (2016). (In-)Privacy In Mobile Apps. Customer Opportunities. NaučnoTehničeskij Vestnik Informacionnyh Tehnologij, Mehaniki I Optiki, Vol 16, Iss 1, Pp 9095 (2016), (1), 90. doi:10.17586/2226-1494-2016-16-1-90-95


Running head: MOBILE SECURITY AND PRIVACY

Mobile Security and Privacy
Name
Institution

1

MOBILE SECURITY AND PRIVACY

2
Contents

Introduction ..................................................................................................................................... 3
Problem Statement .......................................................................................................................... 4
Research Questions ......................................................................................................................... 4
Rationale ......................................................................................................................................... 5
Definitions....................................................................................................................................... 6
Hypothesis....................................................................................................................................... 7
Literature Review............................................................................................................................ 7
Technological Changes and its Effects on Mobile Security and Privacy ....................................... 7
Research Methodology ................................................................................................................. 11
Research Design............................................................................................................................ 12
Research Approach ....................................................................................................................... 12
Sample Population ........................................................................................................................ 13
Instrument ..................................................................................................................................... 14
Data Processing and Analysis ....................................................................................................... 15
Summary ....................................................................................................................................... 15
Results ........................................................................................................................................... 16
Discussion ..................................................................................................................................... 16
Conclusion .................................................................................................................................... 16

MOBILE SECURITY AND PRIVACY

3

Mobile Security and Privacy
Introduction
The improvement in technology has helped increase the need to come up with the best
security measures that help in the protection of the data in the mobile phones. The protection of
the mobile applications is critical in contributing to protecting the users and the enhancement of
confidence in the use of the phones. It is important that there is focus on the publicity given to
the use of the mobile phones as it assists in the investigation of the areas that the users of the
mobile phones need to be protected. It is important that there is the inclusion of the various
things that assist in the handling of information and that help the users to understand the different
ways in which information ...

Similar Content

Related Tags