logo

Mobile Security and Privacy: A Hybrid Methodology Approach

   

Added on  2024-06-04

15 Pages2801 Words107 Views
 | 
 | 
 | 
NIT6130 - ASS 3
1
Mobile Security and Privacy: A Hybrid Methodology Approach_1

Table of Contents
1.1 1. State your research problems and re-organize your collected literatures..........................2
1.1.1 a. Prepare a statement on your research problem............................................................2
1.1.2 b. Try to structure the problem into a set of smaller sub-problems if possible...............2
1.1.3 c. Organize the collected literature according to the sub-problems defined...................3
1.1.4 d. Record your work using the table below.....................................................................4
1.2 Determine the types of methodology (qualitative or quantitative)........................................5
1.2.1 a. Compare and contrast the features of qualitative and quantitative methodologies.....5
1.2.2 b. Decide what type of methodology you plan to apply in your project and justify your
decision.....................................................................................................................................6
1.3 Review of the Existing Methodologies..................................................................................7
1.3.1 Selected Sub-Problem.....................................................................................................7
1.3.2 Analysis of the Selected Methodologies.........................................................................7
1.3.3 Relevance of the Research Problem................................................................................9
1.3.4 Summary of the Reviewed Methodologies.....................................................................9
1.4 Proposed Methodology........................................................................................................10
1.4.1 Identification and Justification......................................................................................10
1.4.2 Benefits and Limitations...............................................................................................10
1.4.3 Framework and Explanation.........................................................................................10
References......................................................................................................................................11
2
Mobile Security and Privacy: A Hybrid Methodology Approach_2

1.1 1. State your research problems and re-organize your collected literatures
1.1.1 a. Prepare a statement on your research problem
The research is done to identify the risk of the mobile security and privacy. This research is
conducted for the implementation of the new and innovative technologies related to the
automobile industry (Wimbock, 2018). The research problem is related to the mobile hacking
and the privacy issues. This research is conducted to evaluate the common forms of the attacks
on the mobile function, which affects the work of the individual as well as of the organisation.
These kinds of attack changes the data present in the mobile and sometime data send to another
mobile or to other computer system. The main reason of this research is to solve problem which
affect the mobile function and the privacy related to the user. This research has some problems
which are required to be solving in this research. Every person has the different kind of problems
and they need to be solving on time.
1.1.2 b. Try to structure the problem into a set of smaller sub-problems if possible
There are the various problems in this research. The problems are designing the appropriate app,
this is the major problem of the mobile security and privacy. The sub problem of this problem is
lack of collaboration of different apps, designing issues, and correlation of different data
(Schäfer, 2018).The problem of this research is of data hacking. This is another issue related to
this research. The sub problem of the problem is this leak the information of the user and
sometimes the information is delivered to the other mobile user or to another computer system.
All these problems are the main reason of this research. Along with these problems the other
problems also exists and that are people awareness regarding the mobile technology and the
different improvements of the technology. Awareness regarding the health monitoring apps and
various changes of the behavior which is also the major issue of mobile technology.. This
research helps to provide the different objectives of the research and how to remove these
problems with the help of the users of the mobile technology.
3
Mobile Security and Privacy: A Hybrid Methodology Approach_3

c. Organize the collected literature according to the sub-problems defined
According to the Schnall, Bakken et al. (2015), the mobile technology is widely used by the
different people. This is the major used device now adays. As this is widely used technology so
the protection is very required to maintain the security of the mobile and the privacy of
individual as well as of the organization(Schnall, Bakken et al. 2015). To protect the user from
any kind of the security problem different health and the monitoring apps are used and protect
the interest of the users. These apps help to remove the difficulties related to the health and the
workplace(Biswas, 2018). To remove the all kind of the problems different apps are designed
and proper implementation of these apps are required to be maintained to reach the target set
goal of this research.
4
Mobile Security and Privacy: A Hybrid Methodology Approach_4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Methodology for Privacy Preservation in Cloud Computing - Desklib
|15
|2898
|229

Security and Privacy in Intelligence Assistance: A Mixed Methods Approach to Analyzing Collaboration Challenges
|16
|2722
|140

Research Methodology for NIT6130 Assignment 3
|17
|2870
|455

Methodology of Fraud and Theft Detection using Data Mining
|13
|3105
|190

Quantitative Research Methods
|14
|2478
|47

Data Security in Cloud Computing Systems
|12
|2956
|40