Data Security Measures: Android App for Vulnerable Smartphone Users

Verified

Added on  2022/09/24

|7
|2220
|17
Project
AI Summary
This project proposal outlines the development of a data security app for vulnerable smartphone users, specifically targeting individuals with visual, hearing, and mobility impairments. The project aims to address the increased vulnerability of their personal data to hacking and misuse. The proposal includes a review of existing literature, a detailed methodology employing agile development, and a proposed work plan with defined phases for initiation, planning, execution, and closure. The project's intended contribution lies in advancing academic research on security measures for vulnerable users. The deliverables include interface design, coding, database development, testing, and validation. The project also considers ethical aspects and resource requirements, including human, software, and financial resources. A Gantt chart is provided to visualize the timeline and milestones of the project, with an estimated budget of $50,000. The project concludes with a discussion of the benefits and ethical considerations of the proposed security app, emphasizing its potential to protect sensitive information and provide a secure mobile experience for vulnerable users.
Document Page
TEMPLATE:
Title of the project
The title of the project is “Data security measures for vulnerable users of smartphones”
Abstract
The paper mainly reflects on data security measures for vulnerable users like people who
have vision issue, mobility issues as well as hearing problem. This is mainly because they
are unable to use their mobile phones as normal people and therefore their personal data
are much more vulnerable to hacking which are further used for other malicious
activities. In order to resolve such issue, a security app will be developed for disabled
people so that their data can be effectively secured. In this paper, a number of literatures
are reviewed in order to analyze the significance of security app. Furthermore, proper
schedule is also reflected that showcases the activities that are executed with deadlines.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Table of Contents
1. Introduction..................................................................................................................3
2. State of the Art Review................................................................................................3
3. Methods.......................................................................................................................3
4. Proposed Work............................................................................................................4
4.1. Intended contribution of the work.........................................................................4
4.2. Benefits of the proposed work..............................................................................4
4.3. Procedures and activities of the proposed work....................................................4
4.4. Evaluation of the project.......................................................................................5
4.5. Resources needed..................................................................................................5
4.6. Access to participants and clients.........................................................................5
4.7. Ethical Aspects......................................................................................................5
5. Work plan and schedule...............................................................................................6
6. Conclusions..................................................................................................................6
7. Bibliography................................................................................................................6
2
Document Page
1. Introduction
Problem statement
It is found that the mobile security threats can be more dangerous for vulnerable
users like people with visual problems, speaking problems as well as mobility problems.
This is because the confidential as well as private data of those users are accessed without
their knowledge and then they are used for performing a number of malicious actions
without their knowledge including transfer of device control as well as sending
unsolicited messages.
Aims and objectives
The main aim of the paper is to undertake proper data security measures for
vulnerable users of android smartphone by developing proper security app for people
who have visual, hearing, mobility as well as visual problems in order to secure their
data.
The objectives of the paper include:
To develop data security measures for vulnerable users of smartphones
To develop a security app for people who have visual, hearing, mobility as well as
visual problems
To secure the data as well as information of the users who are vulnerable to
security challenges
Contribution of the project
It is found that with the help of this project proper contribution will be done in the
academic field for studying various security methods in order to avoid data security
issues that are faced by the users who have visual, hearing, mobility as well as visual
problems.
2. State of the Art Review
According to Aziz et al. (2017), there are a number of types of disabilities
including difficulty in hearing, visually impaired, problem of mobility and many more
which make their life difficult. They are unable to use smartphone in proper way as
somebody else due to security risk. It is stated by Oltrogge et al. (2018) that development
of proper security apps for disabled people is considered as an advantage which not only
allows those people to use their smart phone efficiently but also helps in resolving data
security issues by properly implementing proper security measures.
It is opined by Matheny (2016) security apps generally refer to the practices as
well as policies which are mainly utilized for shielding high vale mobile app from
tampering, reverse engineering as well as other types of app centric attacks. It is found
that this type of security apps are generally required so that the people with disability
does not face issues in keeping their data secure and generally faces a lot of security
issues as well as challenges.
3. Methods
It is found that in order to achieve the aims and objectives of the project, it is quite
necessary to develop a prototype for the security app which is mainly developed for
people having problem in hearing, speaking as well as visual so that their data and
3
Document Page
information from the smartphone cannot get hacked or misused. It is found that agile
methodology is mainly utilized in order to develop the app effectively as per project
specification so that it can be delivered on time. Furthermore, testing is considered as one
of the verification methods in order to ensure that the system will be helpful in managing
the issue whereas validation revalidation validation is mainly utilized for checking that
the system is properly operating and no uninterrupted changes are affected the process
(Ababneh, Shrafat and Zeglat 2017). Moreover, proper system evaluation method is also
used for properly evaluating the application level, technological as well as functional
level.
4. Proposed Work
It is found that in order to develop the security app in order to keep the data secure of the
people who have mobility, visual as well as hearing issues. The development of security
app can be carried out in different phases including initiation, planning, execution as well
as closure phase. In the initiation phase, the problem is identified and proper business
case for the problem is developed by determining the aims and objectives whereas in the
planning phase, the team members are hired, budget for the project is analyzed as well
another hardware and software that are need are arranged (Meredith et al. 2017). In the
execution phase, interface of the security app is designed that is followed up by coding,
code validation as well as development of database. Furthermore, testing is conducted for
checking the operation of the system. In the closure phase, post project review is
undertaken and then proper dissertation is prepared.
4.1. Intended contribution of the work
It is found that the project helps in contributing within the academic field as various
concepts are utilized in order to develop security app for the people who are more
vulnerable to different types of security challenges. The concept that was provided helps
in providing a sensible contribution to the ontology research and it generally helps in
providing innovative idea for keeping the data secure.
4.2. Benefits of the proposed work
It is found that development of security app for the people who have issues, in hearing,
mobility as well as visual can be able to secure their data within the smartphone properly
and nobody else can be able to access information for using it for wring purpose.
4.3. Procedures and activities of the proposed work
The high-level objectives of the paper will be mainly achieved by producing a deliverable
which is mainly reflected in the below table with proper dates. Moreover, the milestones
are also showcased for showing the completion of each activity.
Deliverables Duration Start Finish
Developing the interface for mobile
design 6 days Mon 01-06-20 Mon 08-06-20
Using data security measures 1 day Tue 09-06-20 Tue 09-06-20
4
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Coding 8 days Wed 10-06-20 Fri 19-06-20
Code validation 4 days Mon 22-06-20 Thu 25-06-20
Database development 7 days Fri 26-06-20 Mon 06-07-20
Testing 3 days Tue 07-07-20 Thu 09-07-20
Validation and verification 2 days Fri 10-07-20 Mon 13-07-20
Milestone 3: security app
development for disabled 0 days Mon 13-07-20 Mon 13-07-20
4.4. Evaluation of the project
Prototype evaluation: Testing the prototype is done for confirming that the security app
will be helpful in resolving issues as well as keeping the data secured (Carvalho, Rocha
and Abreu 2019).
Process evaluation: Proper project plan is used in order to evaluate the process of the
project and for resolving project related issues.
4.5. Resources needed
The various resources which are required for the development of security app are listed
below:
Human resources: The human resources who are associated with the project are listed
below:
Project manager
Tester
IT manager
Application manager
Database administrator
Software: Designing tools as well as platform like android
Financial resources: It is found that budget of around $50,000 is needed for proper
development of security app.
4.6. Access to participants and clients
It is found that secure access to client organization must be done at the beginning of the
project and this must be done by gaining trust as well as willingness. The trust as well as
willingness can be gained by reflecting the benefits that app will provide and how they
will be advantageous. Additionally, if this plan does not work then the manager needs to
use contingency plan as per which strong brand must support the app so that trust and
willingness can be developed within the users.
4.7. Ethical Aspects
It is found that in this particular project straightforward data collection is used in the form
of questionnaire as well as inter instead of undertaking experiments as well as direct
human to human interaction (Paradice et al. 2018). This is mainly done no participants
5
Document Page
will be forced to take part in the interview and the answered that are provided by them
must be kept confidential and must only be used for security app development.
5. Work plan and schedule
The work plan that is developed is helpful in reflecting the activities that are generally
executed for developing the security app. All the works are done in four different phases
and the project will be tracked from the initiation phase for avoiding delay. The schedule
is provided below:
Figure 1: Schedule
(Source: Created by Author)
6. Conclusions
It can be concluded from the entire paper that development of security app will be
beneficial in keeping the data of the vulnerable people secure. It is also analyzed from
this paper that undertaking this project is worth as it not only secures data but it will be
used by many and thus huge amount of profit will be gained from the project. Moreover,
the different types of ethical aspects must be avoided in the project.
7. Bibliography
Ababneh, H., Shrafat, F. and Zeglat, D., 2017. Approaching information system
evaluation methodology and techniques: a comprehensive review. International Journal
of Business Information Systems, 24(1), pp.1-30.
Aziz, A., Abd Wahab, M.H., Mustapha, A. and Mohsin, M.F.M., 2017. Design and
Development of Smart Home Security System for Disabled and Elderly People. Journal
6
Document Page
of Telecommunication, Electronic and Computer Engineering (JTEC), 9(3-7), pp.135-
138.
Carvalho, J.V., Rocha, Á. and Abreu, A., 2019. Maturity Assessment Methodology for
HISMM-Hospital Information System Maturity Model. Journal of medical
systems, 43(2), p.35.
Divya, N.E., Divya, R. and Deepa, L.C., 2017. Moving wheel chair based on voice
command for a disabled person. Advances in Natural and Applied Sciences, 11(7),
pp.172-176.
Erfani, S.M.H., Danesh, S., Karrabi, S.M., Gheibi, M. and Nemati, S., 2019. Statistical
analysis of effective variables on the performance of waste storage service using
geographical information system and response surface methodology. Journal of
environmental management, 235, pp.453-462.
Fernandes, E., Jung, J. and Prakash, A., 2016, May. Security analysis of emerging smart
home applications. In 2016 IEEE Symposium on Security and Privacy (SP) (pp. 636-654).
IEEE.
Kalysch, A., Bove, D. and Müller, T., 2018, November. How Android's UI Security is
Undermined by Accessibility. In Proceedings of the 2nd Reversing and Offensive-
oriented Trends Symposium (pp. 1-10).
Matheny, K., 2016. Catholic Social Thought, Social Security Disability, and Inclusion of
the Disabled in the American Economy. Rutgers JL & Religion, 18, p.33.
Meredith, J.R., Mantel Jr, S.J. and Shafer, S.M., 2017. Project management: a
managerial approach. John Wiley & Sons.
Oltrogge, M., Derr, E., Stransky, C., Acar, Y., Fahl, S., Rossow, C., Pellegrino, G.,
Bugiel, S. and Backes, M., 2018, May. The rise of the citizen developer: Assessing the
security impact of online app generators. In 2018 IEEE Symposium on Security and
Privacy (SP) (pp. 634-647). IEEE.
Paradice, D., Freeman, D., Hao, J., Lee, J. and Hall, D., 2018. A Review of Ethical Issue
Considerations in the Information Systems Research Literature. Foundations and
Trends® in Information Systems, 2(2), pp.117-236.
7
chevron_up_icon
1 out of 7
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]