University Mobile Security: Analysis of Online Security Issues Report
VerifiedAdded on 2022/09/22
|17
|3549
|27
Report
AI Summary
This report provides a comprehensive analysis of the major issues associated with online mobile security. It begins with an introduction highlighting the increasing reliance on mobile devices for critical functions like banking and data storage, emphasizing the need for robust security measures. The report then outlines the purpose and significance of the study, underscoring the importance of investigating mobile security threats to protect user data and privacy. A literature review explores the current state of online mobile security and identifies key issues, including insecure data storage, mobile browsing threats, improper session handling, weak authentication, and brute force attacks. The methodology section details the research approach, which involves a quantitative research design utilizing both primary and secondary data. Primary data will be collected through online surveys, while secondary data will be obtained through literature review. The report also addresses ethical considerations related to data collection and analysis. The report concludes with a discussion of the implications of the study and its contribution to the field of mobile security.

Running head: PROPOSAL
Major issues associated with the online mobile security
Name of Student
Name of University
Author Note
Major issues associated with the online mobile security
Name of Student
Name of University
Author Note
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

1
PROPOSAL
Preface
Mobile security deals with the protection of mobile devices which include tablet, laptop,
computing devices and other network. Mobile security is related to wireless security. Mobile
security is increasingly important in mobile computing as malwares are becoming increasingly
sophisticated. This particular study aims in analysis of the major issues linked with online mobile
security. Investigation of the major security issues linked with online mobile security is essential
to eliminate the threats that can risks the data privacy of the users. The report proposes a
technique of investigating the major issues linked with online mobile security so that methods for
eliminating those issues can be identified. A process in which the reach study will be carried out
and the methods to be used are elaborated in this report. The study proposes the use of both
primary data and secondary data to investigate the major security issues linked with the online
functionalities of mobile devises.
PROPOSAL
Preface
Mobile security deals with the protection of mobile devices which include tablet, laptop,
computing devices and other network. Mobile security is related to wireless security. Mobile
security is increasingly important in mobile computing as malwares are becoming increasingly
sophisticated. This particular study aims in analysis of the major issues linked with online mobile
security. Investigation of the major security issues linked with online mobile security is essential
to eliminate the threats that can risks the data privacy of the users. The report proposes a
technique of investigating the major issues linked with online mobile security so that methods for
eliminating those issues can be identified. A process in which the reach study will be carried out
and the methods to be used are elaborated in this report. The study proposes the use of both
primary data and secondary data to investigate the major security issues linked with the online
functionalities of mobile devises.

2
PROPOSAL
Table of Contents
1. Introduction......................................................................................................................3
2. Purpose/Significance.......................................................................................................4
3. Literature Review............................................................................................................4
3.1. Online Mobile Security.............................................................................................4
3.2. Issues Associated with Online Mobile Security.......................................................5
4. Methodology....................................................................................................................7
5. Implication and Contribution to Knowledge.................................................................10
6. Research Schedule.........................................................................................................11
7. Budget............................................................................................................................11
References..........................................................................................................................13
PROPOSAL
Table of Contents
1. Introduction......................................................................................................................3
2. Purpose/Significance.......................................................................................................4
3. Literature Review............................................................................................................4
3.1. Online Mobile Security.............................................................................................4
3.2. Issues Associated with Online Mobile Security.......................................................5
4. Methodology....................................................................................................................7
5. Implication and Contribution to Knowledge.................................................................10
6. Research Schedule.........................................................................................................11
7. Budget............................................................................................................................11
References..........................................................................................................................13
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

3
PROPOSAL
1. Introduction
Over the last few years, there have been an increasing use of mobile devices to carry on
with major and essential functions like banking, online (Wushishi and Ogundiya 2014). Recent
advances in the field of technology allows an user to make usage of mobile devices life
smartphone and tablets to make online monetary transaction, save confidential data or to send
important business data to other individuals (Isaac and Sherali 2014). Thus, protection of
security and confidentiality of the mobile devices becomes a necessity. The increasing risks on
the mobile devices harnesses the necessity of investigating the key issues associated with online
mobile security.
Data leakage, improper session handling, phishing attacks, network spoofing are few of
the most prominent issues in mobile security (Yuan et al. 2016). The report proposes the
methods, tools and techniques to be used to identify the major issues linked with online mobile
security. For this study, the researcher proposes the use of both secondary and primary data. The
secondary data will be obtained by the method of literature review. An evidence of a preliminary
review of literature review is indicated in this report. The report further proposes the techniques
to be considered for data collection and for investigation of the collected data. A quantitative
research design is proposed to undergo statistical analysis of the collected data.
In the following paragraphs, the purpose and significance of investigating the major
issues associated with the online mobile security is discussed. A preliminary literature review is
undertaken to identify the major threats linked with mobile security. The methodology section
proposes the tools to be used carrying out the study and to identify the issues that online mobile
security can face or is facing.
PROPOSAL
1. Introduction
Over the last few years, there have been an increasing use of mobile devices to carry on
with major and essential functions like banking, online (Wushishi and Ogundiya 2014). Recent
advances in the field of technology allows an user to make usage of mobile devices life
smartphone and tablets to make online monetary transaction, save confidential data or to send
important business data to other individuals (Isaac and Sherali 2014). Thus, protection of
security and confidentiality of the mobile devices becomes a necessity. The increasing risks on
the mobile devices harnesses the necessity of investigating the key issues associated with online
mobile security.
Data leakage, improper session handling, phishing attacks, network spoofing are few of
the most prominent issues in mobile security (Yuan et al. 2016). The report proposes the
methods, tools and techniques to be used to identify the major issues linked with online mobile
security. For this study, the researcher proposes the use of both secondary and primary data. The
secondary data will be obtained by the method of literature review. An evidence of a preliminary
review of literature review is indicated in this report. The report further proposes the techniques
to be considered for data collection and for investigation of the collected data. A quantitative
research design is proposed to undergo statistical analysis of the collected data.
In the following paragraphs, the purpose and significance of investigating the major
issues associated with the online mobile security is discussed. A preliminary literature review is
undertaken to identify the major threats linked with mobile security. The methodology section
proposes the tools to be used carrying out the study and to identify the issues that online mobile
security can face or is facing.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

4
PROPOSAL
2. Purpose/Significance
The successful accomplishment of this study is a necessity as there have been an
increasing use of mobile devices over the years, in carrying out the several vital functionalities,
which include online banking, money transfer, storage of confidential information and others.
Investigation of the issues associated with mobile security is a necessity to enhance the mobile
security (GSGN Gayathri and Gopinath 2015). Mobile security is essential as it protects an
individual from major cyber security risks while using a mobile device. The study is essential to
investigate the various threats associated with usage of online mobile devices. The findings of
the study will help in further examining the process in which mobile security can be enforced to
ensure complete data protection and protection of the privacy of the users (Sheila Faizal and
Shahrin 2015). The several security risks linked with the use of online mobile devices will be
investigated to find solution to the major security threats that can affect the normal
functionalities of the mobile devices (Agrawal and Chauhan 2015). The successful
accomplishment of the study will contribute to the field of mobile security. Mobile security
provides the needed protection to the smart phones, tablets and laptops and is responsible for
data protection of the users.
3. Literature Review
3.1. Online Mobile Security
According to Gonzalez (2014), engagement in various online activity using mobile
devices is quickly becoming nonnegotiable for majority of the business organizations and
therefore online mobile security is of paramount importance. The use of mobile and digital
technologies provides a number of advantages to the business organizations. In this digital
PROPOSAL
2. Purpose/Significance
The successful accomplishment of this study is a necessity as there have been an
increasing use of mobile devices over the years, in carrying out the several vital functionalities,
which include online banking, money transfer, storage of confidential information and others.
Investigation of the issues associated with mobile security is a necessity to enhance the mobile
security (GSGN Gayathri and Gopinath 2015). Mobile security is essential as it protects an
individual from major cyber security risks while using a mobile device. The study is essential to
investigate the various threats associated with usage of online mobile devices. The findings of
the study will help in further examining the process in which mobile security can be enforced to
ensure complete data protection and protection of the privacy of the users (Sheila Faizal and
Shahrin 2015). The several security risks linked with the use of online mobile devices will be
investigated to find solution to the major security threats that can affect the normal
functionalities of the mobile devices (Agrawal and Chauhan 2015). The successful
accomplishment of the study will contribute to the field of mobile security. Mobile security
provides the needed protection to the smart phones, tablets and laptops and is responsible for
data protection of the users.
3. Literature Review
3.1. Online Mobile Security
According to Gonzalez (2014), engagement in various online activity using mobile
devices is quickly becoming nonnegotiable for majority of the business organizations and
therefore online mobile security is of paramount importance. The use of mobile and digital
technologies provides a number of advantages to the business organizations. In this digital

5
PROPOSAL
environment, it is necessary for the executives to put into practice several security measures that
are capable of addressing the concerns related to data collection, storage and transfer of data
from the mobile devices.
Wang, Hahn, and Sutrave, (2016), also state that security is one of the prominent alarms
linked with online mobile use. The payment systems based on mobile devices are exposed to
threats. Although there are presence of certain regulations related to mobile payment, majority of
the security issues can be completely eliminated (Mansfield-Devine 2014). The authors point out
that the mobile payment system face several threats and attacks which increases the need of
monitoring this threat. The security issues linked with mobile payment system are required to be
identified to reduce its impacts.
3.2. Issues Associated with Online Mobile Security
According to Khan, Abbas and Al-Muhtadi (2015), with the increase in the usage of
mobile devices, mobile security problems and threats of data privacy have significantly increased
as well. Mobile devices become an idea target to certain severe security challenges, threats and
vulnerabilities. Therefore, it is necessary to put an emphasis on robust protection and limitation
of malicious activities. Having a clear idea of those malicious activities are of significant
importance to reduce the extreme number of security risks linked with the usage of these devices.
Insecure Data Storage: One of the critical threats linked with online mobile usage
include insecure storage of confidential data (Balasubramania 2015). A user can undergo a loss
of confidential data if a malicious application is used for erasing the most important information.
PROPOSAL
environment, it is necessary for the executives to put into practice several security measures that
are capable of addressing the concerns related to data collection, storage and transfer of data
from the mobile devices.
Wang, Hahn, and Sutrave, (2016), also state that security is one of the prominent alarms
linked with online mobile use. The payment systems based on mobile devices are exposed to
threats. Although there are presence of certain regulations related to mobile payment, majority of
the security issues can be completely eliminated (Mansfield-Devine 2014). The authors point out
that the mobile payment system face several threats and attacks which increases the need of
monitoring this threat. The security issues linked with mobile payment system are required to be
identified to reduce its impacts.
3.2. Issues Associated with Online Mobile Security
According to Khan, Abbas and Al-Muhtadi (2015), with the increase in the usage of
mobile devices, mobile security problems and threats of data privacy have significantly increased
as well. Mobile devices become an idea target to certain severe security challenges, threats and
vulnerabilities. Therefore, it is necessary to put an emphasis on robust protection and limitation
of malicious activities. Having a clear idea of those malicious activities are of significant
importance to reduce the extreme number of security risks linked with the usage of these devices.
Insecure Data Storage: One of the critical threats linked with online mobile usage
include insecure storage of confidential data (Balasubramania 2015). A user can undergo a loss
of confidential data if a malicious application is used for erasing the most important information.
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

6
PROPOSAL
Threats with Mobile Browsing: Online mobile usage is associated with mobile browsing
and it is one of the significant application of internet. Browsing an unsecure URL can give rise to
security threats (Stiakakis, Georgiadis and Andronoudi 2016).
Multiple User Logging: The online mobile usage may involve a number of users making
use of a single device of system. Multiple usage increase the chances of a devices getting hacked
by the hackers.
Client Side Infection: The operation of malicious and unsafe programs on the mobile
devices can occur by web browsing client side injection. “HTML injection” and “SQL
injection” are certain major attacks linked with client side injection (LoBiondo-Wood and Singh
2014). This is a significant threat as it provides an opportunity to the hackers to execute a text-
based attack and exploit the vulnerability of a targeted examiner.
Improper session handling: For online mobile devices, “session handling” is considered
to be a significant security issue. Sessions that include long expiry times mainly involves
vulnerabilities especially if it is related to performing certain financial tasks (Khan, Abbas and
Al-Muhtadi 2015). Poor session management are the reasons of unauthorized access to the
mobile devices by the hackers.
Weak Authentication and Brute Force Attack: Weak authentication is another major
security issues linked with the online mobile devices. If the owners of these mobile devices does
not enforce appropriate security in form of strong password, there are high chances of users
exposing themselves to a host of threats.
Harvey and Harvey (2014), further illustrates the security issues associated with mobile
heath platforms. There has been an increasing use of mobile health platform mainly because of
PROPOSAL
Threats with Mobile Browsing: Online mobile usage is associated with mobile browsing
and it is one of the significant application of internet. Browsing an unsecure URL can give rise to
security threats (Stiakakis, Georgiadis and Andronoudi 2016).
Multiple User Logging: The online mobile usage may involve a number of users making
use of a single device of system. Multiple usage increase the chances of a devices getting hacked
by the hackers.
Client Side Infection: The operation of malicious and unsafe programs on the mobile
devices can occur by web browsing client side injection. “HTML injection” and “SQL
injection” are certain major attacks linked with client side injection (LoBiondo-Wood and Singh
2014). This is a significant threat as it provides an opportunity to the hackers to execute a text-
based attack and exploit the vulnerability of a targeted examiner.
Improper session handling: For online mobile devices, “session handling” is considered
to be a significant security issue. Sessions that include long expiry times mainly involves
vulnerabilities especially if it is related to performing certain financial tasks (Khan, Abbas and
Al-Muhtadi 2015). Poor session management are the reasons of unauthorized access to the
mobile devices by the hackers.
Weak Authentication and Brute Force Attack: Weak authentication is another major
security issues linked with the online mobile devices. If the owners of these mobile devices does
not enforce appropriate security in form of strong password, there are high chances of users
exposing themselves to a host of threats.
Harvey and Harvey (2014), further illustrates the security issues associated with mobile
heath platforms. There has been an increasing use of mobile health platform mainly because of
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

7
PROPOSAL
the ease of its usage. However, the increase in use of these applications increases the security
issues as well for which there is a necessity of developing effective strategies of data protection.
The security issues in online mobile usage mostly arise because of the certain acute
mobile threats which include physical threats, web based threats, application based threats and
network based threats.
Physical threats are not that significant with online mobile device usage (Gonzalez 2014).
However, the web based threats, network based threats and application based threats
considerably increases the security issues and vulnerabilities.
Application based threats generally arise from applications, which are downloadable and
are accessible through internet. Malicious applications are the significant concern in this case as
they can be infected with spyware, malware and other vulnerable applications that can increase
the privacy threats (Gonzalez 2014).
The Network based threats include DDos attacks, wifi sniffing and other network exploits
that can risk the privacy of a user. The web based threats are mostly associated with browser
exploits and phishing scams.
4. Methodology
Research methodology identifies the key processes and techniques required for
identification, selection and analyzing the required information needed for successful execution
of the study.
In this section of the study, the methods that will be used for successful accomplishment
of the research is proposed. The study will involve the use of quantitative research design. A
PROPOSAL
the ease of its usage. However, the increase in use of these applications increases the security
issues as well for which there is a necessity of developing effective strategies of data protection.
The security issues in online mobile usage mostly arise because of the certain acute
mobile threats which include physical threats, web based threats, application based threats and
network based threats.
Physical threats are not that significant with online mobile device usage (Gonzalez 2014).
However, the web based threats, network based threats and application based threats
considerably increases the security issues and vulnerabilities.
Application based threats generally arise from applications, which are downloadable and
are accessible through internet. Malicious applications are the significant concern in this case as
they can be infected with spyware, malware and other vulnerable applications that can increase
the privacy threats (Gonzalez 2014).
The Network based threats include DDos attacks, wifi sniffing and other network exploits
that can risk the privacy of a user. The web based threats are mostly associated with browser
exploits and phishing scams.
4. Methodology
Research methodology identifies the key processes and techniques required for
identification, selection and analyzing the required information needed for successful execution
of the study.
In this section of the study, the methods that will be used for successful accomplishment
of the research is proposed. The study will involve the use of quantitative research design. A

8
PROPOSAL
quantitative research design is chosen for the study to obtain primary data for the study (Leavy
2017).
There are mainly two methods of data gathering, which are primary data gathering
method and secondary process of data gathering. The primary method involves collection of data
from the sources who have knowledge or experience about the subject of the study (Cleland
2015). The primary data is collection in form of survey, interview and observation. Survey is a
method that involves collection of a primary data from a significantly large number of sample
size (Quinlan et al. 2019). In this method, a pre-determined set of questionnaire is circulated
among the research participants to collect data from them.
The method of interview is another effective method of data collection. Interview is
conducted either through telephone or through personal interview (Antwi and Hamza 2015). The
sample size in this method of data collection is considerably small.
Another method of data collection involves collection of secondary data. In this method,
the data needed for successful accomplishment of the study is collected from the research
journals and previously published literature (Patten and Newhart 2017). The advantage of this
method of data collection that a large amount of data can be easily accessed. However, the
disadvantage is that a large amount of unstructured data is generated in this process.
Data Collection:-
The technique proposed for collection of needed data for this study is both primary and
secondary data. The secondary data will be obtained by the method of literature review where the
works of the authors in this field will be evaluated. The primary data will be obtained by the
method of survey.
PROPOSAL
quantitative research design is chosen for the study to obtain primary data for the study (Leavy
2017).
There are mainly two methods of data gathering, which are primary data gathering
method and secondary process of data gathering. The primary method involves collection of data
from the sources who have knowledge or experience about the subject of the study (Cleland
2015). The primary data is collection in form of survey, interview and observation. Survey is a
method that involves collection of a primary data from a significantly large number of sample
size (Quinlan et al. 2019). In this method, a pre-determined set of questionnaire is circulated
among the research participants to collect data from them.
The method of interview is another effective method of data collection. Interview is
conducted either through telephone or through personal interview (Antwi and Hamza 2015). The
sample size in this method of data collection is considerably small.
Another method of data collection involves collection of secondary data. In this method,
the data needed for successful accomplishment of the study is collected from the research
journals and previously published literature (Patten and Newhart 2017). The advantage of this
method of data collection that a large amount of data can be easily accessed. However, the
disadvantage is that a large amount of unstructured data is generated in this process.
Data Collection:-
The technique proposed for collection of needed data for this study is both primary and
secondary data. The secondary data will be obtained by the method of literature review where the
works of the authors in this field will be evaluated. The primary data will be obtained by the
method of survey.
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

9
PROPOSAL
Sampling:
An online survey will be conducted to collect data from the users of the mobile devices.
A sample size of 100 research respondents is proposed for the study. The associated respondents
will be chosen by the method of random sampling. A preset questionnaire with close ended
questions will be circulated among the research respondents to obtain primary data needed for
the study.
Data Analysis:
There are two methods of data analysis, which include “qualitative data analysis” and
“quantitative data analysis”. The former involves theoretical analysis of the collected data while
the later involves statistical analysis of the collected data.
The data analysis process opted for the study is quantitative analysis. The data obtained
from the primary data collection method will be analyzed and represented using charts and
graphs in excel spreadsheet. A “quantitative data analysis” process is opted for the study as it is
more reliable since it involves statistical data analysis.
Ethical Considerations:
The study requires gathering of primary data and thus certain ethical issues are required
to be considered. The following ethical considerations are linked with the proposed research
study-
1. Consent from every research respondents will be obtained prior to the study. The study
requires gathering of data through informed consent (Connelly 2014)
PROPOSAL
Sampling:
An online survey will be conducted to collect data from the users of the mobile devices.
A sample size of 100 research respondents is proposed for the study. The associated respondents
will be chosen by the method of random sampling. A preset questionnaire with close ended
questions will be circulated among the research respondents to obtain primary data needed for
the study.
Data Analysis:
There are two methods of data analysis, which include “qualitative data analysis” and
“quantitative data analysis”. The former involves theoretical analysis of the collected data while
the later involves statistical analysis of the collected data.
The data analysis process opted for the study is quantitative analysis. The data obtained
from the primary data collection method will be analyzed and represented using charts and
graphs in excel spreadsheet. A “quantitative data analysis” process is opted for the study as it is
more reliable since it involves statistical data analysis.
Ethical Considerations:
The study requires gathering of primary data and thus certain ethical issues are required
to be considered. The following ethical considerations are linked with the proposed research
study-
1. Consent from every research respondents will be obtained prior to the study. The study
requires gathering of data through informed consent (Connelly 2014)
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

10
PROPOSAL
2. The research respondents, at any point of time can opt out from participating in the
study
3. The confidentiality and privacy of the research respondents will be preserved
throughout the execution of the study.
4. Since the study requires collection of secondary data, all the works of the other authors
used in the study will be acknowledged.
5. All the data collection and storage linked with the study will adhere to Data Protection
Act (1998).
The above indicated ethical considerations are lined with the study that aims in analysis
of online mobile security issues.
5. Implication and Contribution to Knowledge
The successful accomplishment of the study has positive implication in the field of
mobile security. The successful accomplishment of this study will positively contribute to
knowledge as the major security risks linked with online mobile usage will be evaluated. The
success of the study will enable a mobile user to know about the key risks that can prove to be a
threat to users’ privacy and data confidentiality. The results of the study is capable of increasing
users’ awareness towards the safe use of mobile devices.
The online mobile threats that will be investigated in the study will leave a scope of
further research. The security measures that can be taken to address those threats can be
investigated in further researches. Therefore, the successful accomplishment of the study is
PROPOSAL
2. The research respondents, at any point of time can opt out from participating in the
study
3. The confidentiality and privacy of the research respondents will be preserved
throughout the execution of the study.
4. Since the study requires collection of secondary data, all the works of the other authors
used in the study will be acknowledged.
5. All the data collection and storage linked with the study will adhere to Data Protection
Act (1998).
The above indicated ethical considerations are lined with the study that aims in analysis
of online mobile security issues.
5. Implication and Contribution to Knowledge
The successful accomplishment of the study has positive implication in the field of
mobile security. The successful accomplishment of this study will positively contribute to
knowledge as the major security risks linked with online mobile usage will be evaluated. The
success of the study will enable a mobile user to know about the key risks that can prove to be a
threat to users’ privacy and data confidentiality. The results of the study is capable of increasing
users’ awareness towards the safe use of mobile devices.
The online mobile threats that will be investigated in the study will leave a scope of
further research. The security measures that can be taken to address those threats can be
investigated in further researches. Therefore, the successful accomplishment of the study is

11
PROPOSAL
necessary for both the users of the online mobile devices and for the researchers who are willing
to carry further researches in this field.
The successful accomplishment of the study will add to the knowledge in the field of
computing. The study will contribute to the knowledge associated with computing and mobile
security. The success of the study will ensure identification of key security measure that a user
needs to take to ensure secure use of the mobile devices. The research study will investigate the
common threats that can risk the privacy of a user and therefore, the study will be a great help to
identify a process in which online mobile security can be enforced.
6. Research Schedule
A research schedule is prepared that provides an idea of the time needed to complete
majority of the project task. The research schedule is indicated in the Gantt chart below-
Figure 1: Research Schedule
The research schedule in the above Gantt chart indicates that the entire study will require
more than six months to complete.
PROPOSAL
necessary for both the users of the online mobile devices and for the researchers who are willing
to carry further researches in this field.
The successful accomplishment of the study will add to the knowledge in the field of
computing. The study will contribute to the knowledge associated with computing and mobile
security. The success of the study will ensure identification of key security measure that a user
needs to take to ensure secure use of the mobile devices. The research study will investigate the
common threats that can risk the privacy of a user and therefore, the study will be a great help to
identify a process in which online mobile security can be enforced.
6. Research Schedule
A research schedule is prepared that provides an idea of the time needed to complete
majority of the project task. The research schedule is indicated in the Gantt chart below-
Figure 1: Research Schedule
The research schedule in the above Gantt chart indicates that the entire study will require
more than six months to complete.
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide
1 out of 17
Related Documents

Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
Copyright © 2020–2025 A2Z Services. All Rights Reserved. Developed and managed by ZUCOL.