ProductsLogo
LogoStudy Documents
LogoAI Grader
LogoAI Answer
LogoAI Code Checker
LogoPlagiarism Checker
LogoAI Paraphraser
LogoAI Quiz
LogoAI Detector
PricingBlogAbout Us
logo

Data Security in Mobile Computing

Verified

Added on  2023/01/06

|14
|2741
|29
AI Summary
This study explores the effectiveness and reasons for data security in mobile computing. It discusses the benefits of data encryption and ways to protect mobile devices from theft or loss of sensitive data. The study also addresses common problems and challenges in mobile computing and highlights the importance of using appropriate tools for data security.

Contribute Materials

Your contribution can guide someone’s learning journey. Share your documents today.
Document Page
Research Methods
AE_1

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
Abstract
This present study shows effectiveness and reasons of data security in mobile computing and
how people can protect them against theft or loss of sensitive data. Data encryption will be
shown in this study as the best and effective way of data security and mobile security in mobile
computing. It will also discuss some main problems which businessmen and users face related to
mobile computing like, integrity, confidentiality and authentication which all can create
problems of loss of data. Lastly, it will show effectiveness of businesses as how by making use
of appropriate mobile computing tools they can make their customers feel safe, secure and
motivated.
Document Page
Table of Contents
Abstract............................................................................................................................................2
TITLE: Data security in mobile computing.....................................................................................1
INTRODUCTION...........................................................................................................................1
Background of the study.........................................................................................................1
Aims and Objectives...............................................................................................................1
Research questions.................................................................................................................2
Systematic Approach (Literature review)........................................................................................2
Reasons and benefits of securing mobile or data in mobile computing.................................2
Some data security issues in mobile computing.....................................................................2
Ways of securing or protecting mobile from theft of data.....................................................3
Research methodology.....................................................................................................................3
Data analysis and Results.................................................................................................................5
Conclusion.......................................................................................................................................7
REFERENCES................................................................................................................................9
Document Page
TITLE: Data security in mobile computing
INTRODUCTION
Mobile security is all about protection of smart phones, laptops and other portable computing
devices from networks they connect to, threats of data privacy and others (Decharms, 2017).
Mobile security or data security on mobile computing is becoming more important because
millions of people have access to smart phones and they store their personal as well as
professional information’s in mobile phones. So, for protecting against theft of data, wrong
allegations, money security, people require protecting their mobile computing. Mobile
computing allows mobile communication, mobile software and hardware as well. It is considered
as an effective idea that users can process information and also can perform several digital tasks
on mobile devices. Maintaining data and protect themselves against loss or theft of data in
mobile computing is difficult and main task but by using some ways like data encryption in a
timely manner, using computing guidelines, all these problems can be mitigated.
Background of the study
Mobile computing refers a human computer interaction in which people expect from
computer to be transported at the time of normal usage. This present study is going to show
importance of data security in mobile computing as how it can allow people to make use of their
personal as well as professional information without getting affected and accomplish goals. It
will also show some problems and challenges in mobile computing as identification of theft is
quite difficult to eradicate (Todeschini, Hussey and Crimm, 2016). There are several other
problems related to mobile computing which this study will discuss such as: communication,
mobility and portability. It will also show some effective ways by which people can protect
themselves against theft of personal and profession data in mobile computing such as encryption
of data, education or awareness, micro segmentation and making use of cloud government
policies.
Aims and Objectives
Aim
“To define effectiveness of data security in mobile computing”.
1

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Objectives
To discus importance or benefits of data security in mobile computing.
To identify some data security issues in mobile computing.
To explore some ways of securing or protecting mobile from theft of data.
Research questions
1. What are some reasons and benefits of securing mobile or data in mobile computing?
2. What problems might occur due to lack of security in mobile computing?
3. What are some ways or strategies by which people can protect data in mobile computing?
Systematic Approach (Literature review)
Reasons and benefits of securing mobile or data in mobile computing
There are several advantages and benefits of data securing and using appropriate tools in
mobile computing. One of the main reason of securing is it increases trust of customers as many
employers save their customers’ data in their mobile phones and by making use of appropriate
tools of data securing they can make their customers feel valued and safe Stergiou and et.al.,
(2018). Lack of data security or loss of data can create several problems for users as attackers
can also have access to bank details of users and they can take out money and it is one of the
main problems. So, by making use of appropriate mobile computing tools, users can protect
themselves against all these problems and can live an effective, tension free life Ni and et.al.,
(2017) stated that it makes users able to known about apps as which apps can damage their smart
phones as well as areas for improvement.
Some data security issues in mobile computing
There are several threats associated to mobile computing and one of the main threats is
data loss from stolen, theft and decommissioned devices. It all happens because o weak password
access, no password as well as no data encryption. All these lead to data theft of leakage on
devices because mobile go with us wherever we go Alotaibi, AlBar and Hoque, (2016). Users
sell and discard devices without even deleting some data as they do not have proper knowledge
and understanding risks of data. Data loss or threat is too high in mobile computing.
Network access and unsecured marketplace is other main issue associated with data
security in mobile computing. In this context, Waseem, Lakhan and Jamali, (2016) stated that
2
Document Page
Android users can easily opt to download and install apps from third-party marketplaces. So, it
can be said that android malware threat is high which can frequently and can easily be distributed
through these marketplace. Network access due to lack of password and other security allow risk
of attack surface for users who connect to such networks. There is a near field communication
technique which allows mobile devices to interact with other devices in small range of areas.
This technique is mainly being used for payment transaction, coupon delivery and other sharing.
Attackers can attack easily but as compare to other threat, it is low.
Ways of securing or protecting mobile from theft of data
There are several ways by which users can protect themselves against data breaches or can
secure their all stored important data in mobile computing. According to the Malavet, (2017)
encryption of data in a timely manner at every stage is one of the effective way in which people
requires encrypting their data or encoding their information at both when they store them and
when they are being transited to the cloud. So, by addressing data encryption at rest and in
movement, users can protect their data from breaches.
In addition, West and Zentner, (2019) said that by making use of CASB (closed access
security broker) methods, which is being managed by API’s, users can monitor their network
activity and can also limits any operation which deemed high risk. There are several cloud
governing policie4s which also help users against data breaches and data theft in mobile
computing, by protecting mobile from strong password and certifying cloud application, users
can secure their data
Research methodology
Research type: There are mainly 2 ways of form of collecting data such as numerical and non
numerical. All those information or data which are being gathered in numerical form by
researcher is known as quantitative research (Tracy, 2019). All data which are being collected in
non numerical form is known as qualitative research. Selection of research type depends upon
the nature of the topic as for this study researcher wants to identify importance of data security
along with ways so, it would be better to collect information in non numerical or words form. So,
this study is qualitative research.
3
Document Page
Research approach: After selecting the main research type, researcher requires selecting
research approach which is a plan consists of step of broad assumptions of detailed plan.
Inductive and deductive are 2 research approaches. In inductive research, researcher focuses on
generating a brand new theory by which they can gather information related to the research topic.
In deductive research approach, scholar focuses on developing an existing theory. Inductive
research approach increases knowledge of researcher because they generate theory at their own
and it is associated with qualitative research so, scholar chooses inductive research approach for
this study.
Data collection: Data collection is known as one of the important elements in research as for
accomplishing all goals and answering of all research questions, researcher requires having some
appropriate information related to the topic. For that they will either use primary or secondary or
may be mixed. In primary data collection, researcher gathers new information which may never
be used before in secondary data collection they gather second hand data. For this study, scholar
makes use of both primary and secondary by making use of internet, literature as secondary and
questionnaire as primary (Prada-Ramallal and et.al., 2018).
Data analysis: After collecting data, it is important for researcher to analyse them in order to
make them use in an effective manner. Qualitative and quantitative are 2 data analysis in which
researcher selects type on the basis of research type. If study is qualitative then for analysing non
numerical data, researcher uses qualitative data analysis tools. For analysing numerical data,
scholar uses quantitative data analysis tools. For this study researcher uses thematic qualitative
data analysis tools.
Sample: Sample refers a group of people. Selected by researcher for giving answers of questions
related to the topic and this process of selecting people in known as sampling, Random and non
random are 2 sampling method (Puy and et.al., 2018). In random, people are being selected
randomly and in non random, researcher select people non-randomly or set criteria of selection.
For this researcher selects 20 random people for knowing about data security.
Data analysis and Results
4

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
Theme 1: The best way or tool of securing data in mobile computing
Participants Answers
13 Data encryption
7 External identification
Interpretation: On the basis of above data it can be said that there are some ways by which
users can protect them against loss, theft of data in mobile computing. In this context, majority or
13 random, people stated or said that they believe that data encryption is one of the common and
effective way by which users can protect their sensitive data, stored in mobile devices. On the
other hand, 7 people said that they believe that external identification like their name, photos and
any identity on mobile devices and also protect mobile devices from strong password can protect
them against easy access by attackers.
Theme 2: The main common problem of issue associated with mobile computing
Participants Answers
6 Authentication
5
Document Page
10 Confidentiality
4 Integrity
Interpretation: On the basis of above graph it can clearly be said that several issues are
occurred with mobile computing or data security. In this regard to, 6 people said that one of the
main common problem associated with mobile computing is authentication in which identity of
users can be accessed by attackers. But by making use of digital response, users can protect
themselves against this. On the other hand, majority of people or 10 peopl said that
confidentiality is the main problem in which attackers can get access to personal and professional
data stored in mobile devices. It can be solved out from data encryption. Only 4 people said that
integrity is the main issue for which users are now making use of hash function (MAC).
Theme 3: Reason of using antivirus and firewalls software?
Participants Answers
8 Protect against malware viruses
12 Data security or lack of access
6
Document Page
Interpretation: On the basis of above data it can be said that firewalls and antivirus plays an
important role in securing people against loss of data. In this context, 8 people said that by
making use of firewalls, people or users of mobile computing can protect themselves against
malware viruses by which files got corrupted. On the other hand, 12 people said that by making
use of antivirus and firewalls they can protect their data from theft or loss.
Conclusion
From the above study it has been summarized that data security played a vital role in mobile
computing and making use of appropriate strategies can help people against theft of data. It has
also discussed some problems associated with data security in mobile computing and how it
affects users in a negative manner to the great extent. Further, this study has also shown
importance of education, data encryption and other ways by which users can secure their data in
mobile computing. This present study has shown effectiveness of data collection and research
type as it helps scholar in gathering and analysing data for accomplishing goals.
7

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
8
Document Page
REFERENCES
Books & Journals
Alotaibi, E.F., AlBar, A.M. and Hoque, M.R., 2016. Mobile computing security: issues and
requirements. Journal of Advances in Information Technology Vol, 7(1).
Decharms, C., 2017. Mobile security technology. U.S. Patent 9,820,120.
Malavet, J.N., 2017. Cyber Security in Higher Education: Accuracy of Resources Utilized by
Information Technology Departments to Prevent Data Breaches (Doctoral dissertation,
Utica College).
Ni, J. and et.al., 2017. Securing fog computing for internet of things applications: Challenges and
solutions. IEEE Communications Surveys & Tutorials, 20(1), pp.601-628.
Prada-Ramallal, G. and et.al., 2018. Primary versus secondary source of data in observational
studies and heterogeneity in meta-analyses of drug effects: a survey of major medical
journals. BMC medical research methodology, 18(1), p.97.
Puy, G. and et.al., 2018. Random sampling of bandlimited signals on graphs. Applied and
Computational Harmonic Analysis, 44(2), pp.446-475.
Stergiou, C. and et.al., 2018. Secure integration of IoT and cloud computing. Future Generation
Computer Systems, 78, pp.964-975.
Todeschini, E., Hussey, R.M. and Crimm, P., Hand Held Products Inc, 2016. Mobile computing
device with data cognition software. U.S. Patent Application 14/462,801.
Tracy, S.J., 2019. Qualitative research methods: Collecting evidence, crafting analysis,
communicating impact. John Wiley & Sons.
Waseem, M., Lakhan, A. and Jamali, I.A., 2016. Data security of mobile cloud computing on
cloud server. Open Access Library Journal, 3(4), pp.1-11.
West, T. and Zentner, A., 2019. Threats and Major Data Breaches: Securing Third-Party
Vendors. Available at SSRN 3532024.
9
Document Page
Questionnaire
1. According to you, what is the best way or tool of securing data in mobile computing?
Data encryption
External identification
2. What is the main common problem of issue associated with mobile computing?
Authentication.
Confidentiality
Integrity
3. What is the main reason of using antivirus and firewalls software?
Protect against malware viruses
Data security or lack of access.
10

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
11
1 out of 14
[object Object]

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]