Report | Awareness Of People For Safety Measures

Added on - 28 Jan 2020

  • 46

    pages

  • 6848

    words

  • 17

    views

  • 0

    downloads

Showing pages 1 to 8 of 46 pages
TOPIC: To investigate the extent to whichpeople make use of mobile security measures
Table of ContentsINTRODUCTION...........................................................................................................................4METHODS..................................................................................................................................4Participants..................................................................................................................................4Design..........................................................................................................................................4Material........................................................................................................................................5Procedure.....................................................................................................................................6RESULTS........................................................................................................................................7DISCUSSION..................................................................................................................................9REFERENCES..............................................................................................................................11TABLES........................................................................................................................................13
ABSTRACTThe use of social networking sites has become the most popular and recent trend which isused by almost all people in world. This is an online platform which is used for making relationwith people and as per their common interests and backgrounds. There are various sites whichprovide these types of facilities in which most popular ones are those which render the servicesof instant messaging. All these sites share some common features that is mainly focussed on userfriendly interface. This makes all sites like Facebook, Twitter, Instagram etc. popular and bestway to communicate among people residing at different parts of world. With all such facilitieswhich is enjoyed by using such social networking sites, there are various issues as well which isrelated with the safety of persons using these services. Most of the people are not much aware ofthese safety aspect because of which cases related to leak of personal information and pothercyber crimes have increased. The present report is also based on such aspect to study theawareness of people for safety measures. For this purpose, SPSS technique has been applied inthe research under which regression tool is also used.
INTRODUCTIONThe social networking site is a digital platform that is most commonly used for the purposeof sharing messages and making relations with different people. The relations are made on thebasis of common interests and hobbies or for knowing different persons of various parts ofworld. The facilities delivered by such sites have made it very easier to share messages instantlyalong with sharing of various photographs and memories between people. With the invention ofthese sites, the interests of people have taken a new shape. The organizations who use to providesuch facilities continuously try to make it more interesting and user friendly to increase theirusage. With these advantages, there are some drawbacks of these sites as well. With enhancedusage of social networking sites, the risks related to privacy issues have also been developed.The cyber crimes have increased a lot where many people have filed cases of hacking theirpersonal information’s by hackers and its misuse. Many times, these cases reach to severe levelalso due to which many people go under depression or commit suicides. Therefore, it becomesvery necessary for users of these sites to be aware of such activities so that various risks relatedto their private information can be restricted.METHODSMethodology is one of the vital elements of every research study as use of perfect andsuitable methods and technique enable investigator to conclude the investigation effectively(Maher, Markey and Ebert-May, 2013).ParticipantsIn order to obtain required data, sample of 6 people on the street has been surveyedthrough questionnaire. All the participants have been selected randomly without any bias fromthe street. All the persons who were above the age of 18 have been invited to give their responsesby filling-up the questionnaire. The reason behind selecting a sample of total 6 people is tominimize complexities in gathering data from every resident. Moreover, generating data from therepresentative sample also consumed less time period and helps to examine the entire universe(Hartas, 2015).
DesignResearch design specifies and standardise that how a particular investigation will be carryout thoroughly by the investigator. Referring the current study, design of study incorporated bythe researcher is analytical. As in these, the findings and outcome of the mobile phone securityquestionnaire result have been evaluated and examined by applying statistical tools andtechnique through SPSS. Data collection is a very important and crucial facet of design, asauthenticate, reliable and prominent information gathered by the investigators helps to find outan appropriate solution of the issue or vice-versa. In order to gather required quantum of data,there are two alternatives available to researchers to either generate information by applyingprimary method or secondary or a combination of both (Punch, 2013). Former is used to acquirefresh or unique information that not already obtained by any other researcher scholar previously.Most importantly, it is incorporated to tailor certain specific requirement of the users throughconducting observation, field-survey, questionnaire survey or interviews. Unlike primarymethod, secondary data collection process aims at utilizing already available data sources eitherpublished or non-published(Schmidt and Hunter, 2014). In order to assure validity, it isnecessary for the investigator to take some precautions while using secondary data so as to avoidthe use of time-outdated data.Here, in the present investigation, scholar has applied primary technique to generatereliable and specific information that will be helpful for fulfilling the aims and objectives of thestudy. In such regards, a survey has been conducted by the investigator of selected participants toobtain sufficient quantum of data(Davis, Evershed and Mills, 2013). It will be proves greatlybeneficial for the researcher to tailor and meet-out their specific information need.The present study followed a quantitative research, as in which, scholar applied a famousstatistical software, Statistical Package for Social Science (SPSS) to evaluate and examine thefindings and results of numerical data (Creswell, 2013). In such regards, regression anddescriptive statistical methods have been performed to reach the effective and accurate solutionof the problem.MaterialResearcher has designed a mobile phone security questionnaire as an instrument ofresearch. In total, three set of questionnaire have been developed to study the extent to which
public incorporates a range of precautions regards to mobile-phone usage. The focus of theselected investigation material is to ask respondents about the type of mobile phone usage andtheir adopted security measures to prevent crime(Monette, Sullivan and DeJong, 2013). In total,three questionnaires have been prepared by the researcher differentiated from each other only onthe basis of time such as last week, typical week and typical month.ProcedureWhile collecting data, every participant has been asked to fill only one of the threedrafted questionnaires and randomly assigned to one of the three groups. Every questionsprepared in the questionnaire has been answered by two people so as to generate responsesquickly(Douzenis and Seretis, 2013). While surveying respondents, scholar assured that at onetime, only one respondents will be surveyed in order to eliminate confusion or confound in theexperiment (Yilmaz, 2013). After gathering data, SPSS technique has been applied to generatethe needed outcome so as to find out the right solution of the selected issue (Belk, 2013).
RESULTSQuantitative analysisHypothesis 1Ho: There is no significant difference between mean values of mobile phone usage in terms ofweeks and mobile security measures.H1: There is a significant difference between mean values of mobile phone usage in terms ofweeks and mobile security measures.Hypothesis 2Ho: There is no significant difference between mean values of monthly mobile phone usage andsecurity measures.H1: There is a significant difference between mean values of monthly mobile phone usage andsecurity measures.By doing descriptive statistics, it has been assessed that mean value of recorded serialnumber and hours online is 1.80 & 22.23. Further, extent to which mean amount will deviate inthe future by .404 & 17.11. Along with this, it has been identified that people who were spentmore time on online makes use of recorded phone serial number. Moreover, level of significancebetween both the variables is 0.1 which shows that alternative hypothesis is true. In addition tothis, mean value of the option of screen code or pattern is 1.09 & 0.29. Correlation-ship whichtakes place between the two variables is .13. By considering this, it can be stated that moderatelevel of relationship takes place between lock pattern option and hours which are spent by thecustomers online. R square is 0.18 which presents that minute changes will take place in theusage of the option of lock pattern. Level of significance which takes place between the usage ofscreen code lock or pattern and online spending hours is 0.04. It lies within the value of 0.05which shows that null hypothesis is rejected.Along with this, output of SPSS presents that people who spent 22 hours on internet in atypical week had not registered their phone on asset register. Outcome of descriptive statisticspresent that people whose weekly spending hours are 22 prefers to track or lock mobile phones
with the aim to prevent the threat aspects. Significance level of such aspect is also near to thestandard criteria. Outcome of SPSS entails that customers with average spending hours of 22does not make use of the security measure such as physically marked phone. Thus, by followingsuch aspects it can be said that there is a significant difference takes place in the weekly usage ofmobile phones and employment of security measures(Seuring, 2013). All these aspects showsthat there are several people who spend more online weekly hours do not make use of mobilesecurity measures.From quantitative investigation, it has been assessed that people who spent 22 monthlyhours do not make use of serial numbers to protect the mobile phone. Level of significancewhich is related to such aspect is .14. By doing investigation, it also has been identified thatpeople who spend more time online makes use of screen lock or pattern to protect their mobilephones. On the other side, as similar to weekly users, people who make use of internet monthlybasis lays high level of emphasis on using lock system. The rationale behind this, it preventsother to make use of mobile and access to private details(Backonja and et.al., 2013). By takinginto account all the above presented aspects it can be said that there is a significant differencetakes place in the mean value of monthly mobile usage and usage of security measures. Insurvey, most the respondents have presented their views in similar direction. Thus, usage rate ofsecurity measure is very slow which in turn negatively affects the information to the large extent.The reason behind this, now hacking related activities are increased with the very high pace. Inthis situation, by making use of suitable measures people can keep secure the information sharedby them(Gibson and Morgan, 2013). Thus, outcome of SPSS shows that alternative hypothesisis accepted which presents that now there is less number of people who make use mobile securitymeasures.
desklib-logo
You’re reading a preview
card-image

To View Complete Document

Become a Desklib Library Member.
Subscribe to our plans

Download This Document