Victoria University NIT6130: Mobile Security Research Proposal Report
VerifiedAdded on 2022/11/11
|12
|2797
|365
Report
AI Summary
This report presents a research proposal focusing on mobile device security and user awareness, particularly among young people. The study aims to assess the current state of mobile security issues and the level of awareness among young users. The methodology involves an online survey to gather data on users' perceptions and behaviors regarding mobile security. The expected outcomes include insights into the awareness levels, the creation of a user-friendly mobile application to enhance awareness, and the assessment of its usability. The report also covers data collection methods, data processing techniques, and ethical considerations, including informed consent and confidentiality. The research addresses the importance of ethical standards in academic research and the need to minimize risks to participants. The study concludes with the development of a survey questionnaire and consent forms, providing a comprehensive overview of the research project.

Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

Table of Contents
1. Objectives...........................................................................................................................................2
2. Method................................................................................................................................................2
3. Expected outcomes............................................................................................................................3
4. Data to be collected............................................................................................................................3
5. How data will be processed...............................................................................................................3
References............................................................................................................................................10
1. Objectives...........................................................................................................................................2
2. Method................................................................................................................................................2
3. Expected outcomes............................................................................................................................3
4. Data to be collected............................................................................................................................3
5. How data will be processed...............................................................................................................3
References............................................................................................................................................10

1. Objectives
The research starts with an issue explanation where the topic and interface among the mobile
devices security and how much awareness is present being discussed(Choo, Rokach and Bettini,
2016). The investigate address is expressed and a discourse is given on how the research will help
to search for the solutions.The point of this investigation is to decide the circumstance of
youthful users’ with respect to mobile gadget, its security issues and to show as how much they
are aware. In arrange to realize the point and reply the investigate address the taking after
destinations must be met: Examine the current status of versatile security issues and users
awareness
• Examine the young people’s alertness altitude with respect to mobile security
• Create a portable application to make strides the users’ alertness of versatile security.
• Assess the convenience which is provided to the user by the application.
2. Method
The process of data gathering being done through survey with the help of an on-line
questionnaire. Various other variables which are important in context to the users’ awareness and
the mobile security will be found in the current literature so as to design a survey. The main
objective of the survey acc to Resnik(2018) states that from the group of people they have to take
the same kind of data or measures in a standardized way and systematic. A Survey being made
for the survey so as to evaluate the alertness of the young people’s on mobile device security.
There will be a Statistical analysis(Witte, 2017) which will be done on the data which is obtained
The research starts with an issue explanation where the topic and interface among the mobile
devices security and how much awareness is present being discussed(Choo, Rokach and Bettini,
2016). The investigate address is expressed and a discourse is given on how the research will help
to search for the solutions.The point of this investigation is to decide the circumstance of
youthful users’ with respect to mobile gadget, its security issues and to show as how much they
are aware. In arrange to realize the point and reply the investigate address the taking after
destinations must be met: Examine the current status of versatile security issues and users
awareness
• Examine the young people’s alertness altitude with respect to mobile security
• Create a portable application to make strides the users’ alertness of versatile security.
• Assess the convenience which is provided to the user by the application.
2. Method
The process of data gathering being done through survey with the help of an on-line
questionnaire. Various other variables which are important in context to the users’ awareness and
the mobile security will be found in the current literature so as to design a survey. The main
objective of the survey acc to Resnik(2018) states that from the group of people they have to take
the same kind of data or measures in a standardized way and systematic. A Survey being made
for the survey so as to evaluate the alertness of the young people’s on mobile device security.
There will be a Statistical analysis(Witte, 2017) which will be done on the data which is obtained
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

in the form of the responses which are filled in the questionnaire so as to check the present status
of mobile security awareness along with the alertness of the young people’s in respect to mobile
device security. Qualitative data will be interpreted by using content analysis(Resnik, 2018).
3. Expected outcomes
The data is gathered by implies of an overview utilizing an on-line survey. Distinctive variables
that are vital with respect to portable users’ alertness of security 4 will be explored in existing
writing in arrange to plan a study. In order to analyze the answers of males and females a T-test
being done. Resnik (2018)states that the reason of an overview is to procure the same kind of
information from a gather of individuals or occasions in an orderly and consistent way. For the
overview a survey will be created to survey youthful people’s portable gadget security
mindfulness. The application which will be created should be user friendly. It should be very
easy and simple to use. The user can easily browse between the various activities
(Depts.washington.edu, 2019).
4. Data to be collected
This portion represents the information collection procedure (Research on Computer Information
Processing Technology under Large Data, 2018). The Google forms have created the
questionnaire. A mail was given to the members with a connect to the online survey. Prior to the
live survey a pre-test was done to create beyond any doubt that the questions were reasonable
and there is clarity in it. The pre-test was performed to find out whether the method of
information capturing and collection worked easily. The target audience for data collection will
be the youthful people attending a college (Resnik, 2018). They will be within the work
environment for little a long time. Hence the emails were delivered to post and undergraduates
counting students from all the resources at the college. There were many answers which are
recorded and can be utilized in this study(Research on Computer Information Processing
Technology under Large Data, 2018)
of mobile security awareness along with the alertness of the young people’s in respect to mobile
device security. Qualitative data will be interpreted by using content analysis(Resnik, 2018).
3. Expected outcomes
The data is gathered by implies of an overview utilizing an on-line survey. Distinctive variables
that are vital with respect to portable users’ alertness of security 4 will be explored in existing
writing in arrange to plan a study. In order to analyze the answers of males and females a T-test
being done. Resnik (2018)states that the reason of an overview is to procure the same kind of
information from a gather of individuals or occasions in an orderly and consistent way. For the
overview a survey will be created to survey youthful people’s portable gadget security
mindfulness. The application which will be created should be user friendly. It should be very
easy and simple to use. The user can easily browse between the various activities
(Depts.washington.edu, 2019).
4. Data to be collected
This portion represents the information collection procedure (Research on Computer Information
Processing Technology under Large Data, 2018). The Google forms have created the
questionnaire. A mail was given to the members with a connect to the online survey. Prior to the
live survey a pre-test was done to create beyond any doubt that the questions were reasonable
and there is clarity in it. The pre-test was performed to find out whether the method of
information capturing and collection worked easily. The target audience for data collection will
be the youthful people attending a college (Resnik, 2018). They will be within the work
environment for little a long time. Hence the emails were delivered to post and undergraduates
counting students from all the resources at the college. There were many answers which are
recorded and can be utilized in this study(Research on Computer Information Processing
Technology under Large Data, 2018)
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

5. How data will be processed
With the help of Statistics the basic things have come out and the taking after proposals can be
made and rules can be given. Conduct research on the respondents frequently asked questions on
modern applications on their portable gadgets. The data can be processed with the help of
various tools (Research on Computer Information Processing Technology under Large Data,
2018).
The awareness should be there related to the permit agreements and be taught approximately
about the security messages while the apps being introduced. The respondents shown that there
is a frequent blend between the individual and business information on their portable gadgets.
They ought to be taught and be prepared to utilize encryption for certain sorts of information,
e.g. monetary and other categories of delicate information. There were blended outcomes comes
about with respect to area administrations which are available all the time.
The issue of dynamic area services ought to be put into point of view to the youthful individuals
so that it should be clear as when to utilize it and as it were when completely essential. There
should be an awareness of youthful individual son how to safeguard their mobile devices. It
seems that there is no proper protection in relation to the smart phones and PCs
(Libguides.library.cityu.edu.hk, 2019).
Locks and the passwords are two main things used to safeguard the devices. There should be
some special mechanism on the protection of the devices, which should be installed and at the
same time should be taught to the youth also. These could be the antivirus programs, encryption
etc.
One should be alert while downloading anything from internet to your mobile devices. You
should be responsive to your own acts.
Answer (800 words)
With the help of Statistics the basic things have come out and the taking after proposals can be
made and rules can be given. Conduct research on the respondents frequently asked questions on
modern applications on their portable gadgets. The data can be processed with the help of
various tools (Research on Computer Information Processing Technology under Large Data,
2018).
The awareness should be there related to the permit agreements and be taught approximately
about the security messages while the apps being introduced. The respondents shown that there
is a frequent blend between the individual and business information on their portable gadgets.
They ought to be taught and be prepared to utilize encryption for certain sorts of information,
e.g. monetary and other categories of delicate information. There were blended outcomes comes
about with respect to area administrations which are available all the time.
The issue of dynamic area services ought to be put into point of view to the youthful individuals
so that it should be clear as when to utilize it and as it were when completely essential. There
should be an awareness of youthful individual son how to safeguard their mobile devices. It
seems that there is no proper protection in relation to the smart phones and PCs
(Libguides.library.cityu.edu.hk, 2019).
Locks and the passwords are two main things used to safeguard the devices. There should be
some special mechanism on the protection of the devices, which should be installed and at the
same time should be taught to the youth also. These could be the antivirus programs, encryption
etc.
One should be alert while downloading anything from internet to your mobile devices. You
should be responsive to your own acts.
Answer (800 words)

Ethics are the standards for behavior that recognize between worthy and unsatisfactory conduct.
• Most social orders do have lawful rules which takes care of the behavior, but moral standards
be inclined to be more casual than laws.
• Many diverse disciplines, universities and employments have some norms for conduct that suit
their specific points and objectives. These specifications too offer ones individuals of the teach
and arrange their activities or exercises in order to set up the public's believe of the discipline.
Why are the inquiries necessary for the morals/ethics?
There are numerous reasons why it is essential to follow the fundamental standards of academic
research and the scientific behavior(Wise, 2014).
• They advertise the goals in order to investigate about developing the knowledge.
• They reinforce the values required for collaborative work, such as mutual regard and
honesty .this is important because the scientific inquirers depend on collaboration between
groups and researches.
Minimize the risk of harm
• Dissertation investigate should never hurt participants.
• Where there's the option that member may will be hurt or are in the situation of distress, there
must be capable for justifying for this (the Guardian, 2019). These kind of scenarios will more
over require
(a) Extra planning to demonstrate how participant abuse will be decreased,
(b) Point by point debriefing and
• Most social orders do have lawful rules which takes care of the behavior, but moral standards
be inclined to be more casual than laws.
• Many diverse disciplines, universities and employments have some norms for conduct that suit
their specific points and objectives. These specifications too offer ones individuals of the teach
and arrange their activities or exercises in order to set up the public's believe of the discipline.
Why are the inquiries necessary for the morals/ethics?
There are numerous reasons why it is essential to follow the fundamental standards of academic
research and the scientific behavior(Wise, 2014).
• They advertise the goals in order to investigate about developing the knowledge.
• They reinforce the values required for collaborative work, such as mutual regard and
honesty .this is important because the scientific inquirers depend on collaboration between
groups and researches.
Minimize the risk of harm
• Dissertation investigate should never hurt participants.
• Where there's the option that member may will be hurt or are in the situation of distress, there
must be capable for justifying for this (the Guardian, 2019). These kind of scenarios will more
over require
(a) Extra planning to demonstrate how participant abuse will be decreased,
(b) Point by point debriefing and
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

(c). informed consent
Obtain informed consent
Get consent which is informed (Research.uci.edu, 2019)
• One of the establishments of investigatemorals is the good idea ofeducated consent.
• Participants should understand that
(a) They are taking portion in research to inquire about and
(b) What are the essentials which requires
This kind of data consist of
• Purpose of the inquire about,
• The strategies being utilized,
• The possible results of the investigate,
• As well as related requests, burdens distresses and dangers which can be confronted by the
members.
• Principle that members need to be initiators, taking portion with no coerced and misdirected
Whilst is it not conceivable to know in particular that which data is a latent member would (or
would not) need to know, in which the goal not to take off out any fabric data; that’s, data simply
feel would impact whether assent would (or would not) be granted.
• Where educated consent cannot be taken from members, you must make clear why this can be
the case. You ought to too be mindful that there are occurrences educated assent isn't essentially
required or must be loose. These incorporate certain instructive, authoritative and naturalistic
investigate settings.
Safeguard the confidentiality and anoymity
The members will continuously be willing to give data, particularly data of a private or the
sensitive nature, if the researcher accepts the data in confidence.
• Harm can be caused when information isn't treated privately, whether in terms of the capacity
of information, or during the distribution processor, its examination (i.e., when submitting you’re
the stamped dissertation).
• Not all information collected from research members needs to be kept confidential or
mysterious. It may be imaginable to reveal the character and sees of people at various stages to
Obtain informed consent
Get consent which is informed (Research.uci.edu, 2019)
• One of the establishments of investigatemorals is the good idea ofeducated consent.
• Participants should understand that
(a) They are taking portion in research to inquire about and
(b) What are the essentials which requires
This kind of data consist of
• Purpose of the inquire about,
• The strategies being utilized,
• The possible results of the investigate,
• As well as related requests, burdens distresses and dangers which can be confronted by the
members.
• Principle that members need to be initiators, taking portion with no coerced and misdirected
Whilst is it not conceivable to know in particular that which data is a latent member would (or
would not) need to know, in which the goal not to take off out any fabric data; that’s, data simply
feel would impact whether assent would (or would not) be granted.
• Where educated consent cannot be taken from members, you must make clear why this can be
the case. You ought to too be mindful that there are occurrences educated assent isn't essentially
required or must be loose. These incorporate certain instructive, authoritative and naturalistic
investigate settings.
Safeguard the confidentiality and anoymity
The members will continuously be willing to give data, particularly data of a private or the
sensitive nature, if the researcher accepts the data in confidence.
• Harm can be caused when information isn't treated privately, whether in terms of the capacity
of information, or during the distribution processor, its examination (i.e., when submitting you’re
the stamped dissertation).
• Not all information collected from research members needs to be kept confidential or
mysterious. It may be imaginable to reveal the character and sees of people at various stages to
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

inquire about process (from information collection through for the distribution of your
dissertation).
• An another option is to expel identifiers (e.g., names, geologicalprompts, vernacular terms,
etc.) or give intermediaries when composing up.
• Strip of the particular data may not possible always.
Include deception of participants?
• It isn’t so feasible to allow everyone in a specific inquire about setting and know what you're
doing
• This is most likely to be the case where investigate includes perception, instead to contact
directly with members, particularly in a open or online setting. e.g.
• Observing what clients are doing in a Web chat room.
Provide the rights to withdraw
• Observing people going all about their commerce (e.g., attending to work, shopping etc.
• In these cases, where individuals are coming and going, it may essentially be incomprehensible
to let everybody know what you're doing.
• You may not be intentioned attempting to engage in the practices, but clearly members are not
giving you their educated assent.
Give the proper to withdraw
• With the special case of those instances of undercover perception where isn't feasible to let
everyone that's being observed and know what you're doing, investigate participants should
continuously have right to pull back from the researches about process.
• Participants should have the full confidence to drag back at any stage within the investigate
handle.
• As soon the member selects to pull back from the investigate prepare, it will not be influenced
or be pressured in any way to undertake and stop the progress of them from withdrawing.
Information to participant’s document
dissertation).
• An another option is to expel identifiers (e.g., names, geologicalprompts, vernacular terms,
etc.) or give intermediaries when composing up.
• Strip of the particular data may not possible always.
Include deception of participants?
• It isn’t so feasible to allow everyone in a specific inquire about setting and know what you're
doing
• This is most likely to be the case where investigate includes perception, instead to contact
directly with members, particularly in a open or online setting. e.g.
• Observing what clients are doing in a Web chat room.
Provide the rights to withdraw
• Observing people going all about their commerce (e.g., attending to work, shopping etc.
• In these cases, where individuals are coming and going, it may essentially be incomprehensible
to let everybody know what you're doing.
• You may not be intentioned attempting to engage in the practices, but clearly members are not
giving you their educated assent.
Give the proper to withdraw
• With the special case of those instances of undercover perception where isn't feasible to let
everyone that's being observed and know what you're doing, investigate participants should
continuously have right to pull back from the researches about process.
• Participants should have the full confidence to drag back at any stage within the investigate
handle.
• As soon the member selects to pull back from the investigate prepare, it will not be influenced
or be pressured in any way to undertake and stop the progress of them from withdrawing.
Information to participant’s document

Information to the participants, which is involved in research
You’re invited to take part
You're invited to take part in a study project entitled “Security in Mobile Computing” This
undertaking is being carried out via Dr. Amir Ghapanchi, professor Dr. Alasdair Mcandrewf and
yuan Miao from college of science and engineering at Victoria university.
Project clarification-
Getting to know management systems, In our university the VU collaborate, which is necessary
for the success of every university in the current situation. This study is an effort to explore the
reasons that impact students’ use of VU collaborates.
What will I be requested to do?
If you’re agreeing to take part in this questionnaire, you have to answer many multiple choice
questions and some open-ended questions secretly.
Project clarification-
Getting to know management systems, In our university the VU collaborate, which is necessary
for the success of every university in the current situation. This study is an effort to explore the
reasons that impact students’ use of VU collaborates.
What will I benefit from participating?
Through taking part in this study, you can allow us to uncover issues that help students’ use of
VU collaborate organization.
How will the data I provide be used?
I’m volunteering to have my thoughts about using the “Vu collaborate”.
You’re invited to take part
You're invited to take part in a study project entitled “Security in Mobile Computing” This
undertaking is being carried out via Dr. Amir Ghapanchi, professor Dr. Alasdair Mcandrewf and
yuan Miao from college of science and engineering at Victoria university.
Project clarification-
Getting to know management systems, In our university the VU collaborate, which is necessary
for the success of every university in the current situation. This study is an effort to explore the
reasons that impact students’ use of VU collaborates.
What will I be requested to do?
If you’re agreeing to take part in this questionnaire, you have to answer many multiple choice
questions and some open-ended questions secretly.
Project clarification-
Getting to know management systems, In our university the VU collaborate, which is necessary
for the success of every university in the current situation. This study is an effort to explore the
reasons that impact students’ use of VU collaborates.
What will I benefit from participating?
Through taking part in this study, you can allow us to uncover issues that help students’ use of
VU collaborate organization.
How will the data I provide be used?
I’m volunteering to have my thoughts about using the “Vu collaborate”.
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

I know that the information collected can be anonymous and I've not required any data that can
identify me.
I remember that the aggregated and anonymous feedback received from this survey can be posted
as academic articles.
What are potential risks of taking part in this project?
I know that there will be no risk related to participating in this survey.
How will this project be conducted?
This project aim to use a survey as a research method and by doing a questionnaire with some of
the multiple choice and open-ended questions concerning college students’ awareness
approximately VU collaborate.
Consent Form document
Consent form for researchers which doing research
Information to participants-
You’re invited to participate in a survey regarding the college students’ acceptance of VU work
together.
Getting to know management systems, In our university the VU collaborate, which is necessary
for the success of every university in the current situation. This study is an effort to explore the
reasons that impact students’ use of VU collaborate(Research.uci.edu, 2019).
Guarantee by participants
I am here to certify that my age is a minimum of 18 yrs * and that I'm voluntarily giving my
approval to participate in the study:
identify me.
I remember that the aggregated and anonymous feedback received from this survey can be posted
as academic articles.
What are potential risks of taking part in this project?
I know that there will be no risk related to participating in this survey.
How will this project be conducted?
This project aim to use a survey as a research method and by doing a questionnaire with some of
the multiple choice and open-ended questions concerning college students’ awareness
approximately VU collaborate.
Consent Form document
Consent form for researchers which doing research
Information to participants-
You’re invited to participate in a survey regarding the college students’ acceptance of VU work
together.
Getting to know management systems, In our university the VU collaborate, which is necessary
for the success of every university in the current situation. This study is an effort to explore the
reasons that impact students’ use of VU collaborate(Research.uci.edu, 2019).
Guarantee by participants
I am here to certify that my age is a minimum of 18 yrs * and that I'm voluntarily giving my
approval to participate in the study:
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

“Security in Mobile Computing”
I confirm that the goals of the study, with any safeguards and risks related to the procedures,
indexed hereunder to be achieved within the research, were fully explained to me by the
information to participants concerned with research form, along with that I freely consent to
participation concerning the following questionnaire.
I confirm that I've had the opportunity to have every question answered and that I know that I can
leave my studies any time and that this leaving of studies will not jeopardize me in any case.
I have been learned that the facts I provide can be kept confidentially.
References
Choo, K., Rokach, L. and Bettini, C. (2016). Mobile security and privacy: Advances,
challenges and future research directions. Pervasive and Mobile Computing, 32,
pp.1-2.
Depts.washington.edu. (2019). Research Ethics. [online] Available at:
https://depts.washington.edu/bioethx/topics/resrch.html [Accessed 14 Jun. 2019].
Libguides.library.cityu.edu.hk. (2019). Research Guides: Research Methods: Ethics
in Research. [online] Available at:
https://libguides.library.cityu.edu.hk/researchmethods/ethics [Accessed 14 Jun.
2019].
National Institute of Environmental Health Sciences. (2019). What is Ethics in
Research & Why is it Important?. [online] Available at:
https://www.niehs.nih.gov/research/resources/bioethics/whatis/index.cfm
[Accessed 14 Jun. 2019].
Research on Computer Information Processing Technology under Large Data.
(2018). International Journal of Recent Trends in Engineering and Research,
4(10), pp.59-61.
I confirm that the goals of the study, with any safeguards and risks related to the procedures,
indexed hereunder to be achieved within the research, were fully explained to me by the
information to participants concerned with research form, along with that I freely consent to
participation concerning the following questionnaire.
I confirm that I've had the opportunity to have every question answered and that I know that I can
leave my studies any time and that this leaving of studies will not jeopardize me in any case.
I have been learned that the facts I provide can be kept confidentially.
References
Choo, K., Rokach, L. and Bettini, C. (2016). Mobile security and privacy: Advances,
challenges and future research directions. Pervasive and Mobile Computing, 32,
pp.1-2.
Depts.washington.edu. (2019). Research Ethics. [online] Available at:
https://depts.washington.edu/bioethx/topics/resrch.html [Accessed 14 Jun. 2019].
Libguides.library.cityu.edu.hk. (2019). Research Guides: Research Methods: Ethics
in Research. [online] Available at:
https://libguides.library.cityu.edu.hk/researchmethods/ethics [Accessed 14 Jun.
2019].
National Institute of Environmental Health Sciences. (2019). What is Ethics in
Research & Why is it Important?. [online] Available at:
https://www.niehs.nih.gov/research/resources/bioethics/whatis/index.cfm
[Accessed 14 Jun. 2019].
Research on Computer Information Processing Technology under Large Data.
(2018). International Journal of Recent Trends in Engineering and Research,
4(10), pp.59-61.

Research.uci.edu. (2019). Drafting the Informed Consent Form. [online] Available at:
https://www.research.uci.edu/compliance/human-research-protections/
researchers/drafting-consent-form.html [Accessed 14 Jun. 2019].
Resnik, D. (2018). The Ethics of Research with Human Subjects. New York: Springer.
the Guardian. (2019). How do you make sure your research is ethical?. [online]
Available at:
https://www.theguardian.com/higher-education-network/blog/2014/may/20/why-
research-ethics-matter [Accessed 14 Jun. 2019].
Wise, J. (2014). UK research bodies agree steps to protect anonymity of study
participants. BMJ, 348(mar26 2), pp.g2372-g2372.
Witte, R. (2017). Statistics. New York: Wiley.
https://www.research.uci.edu/compliance/human-research-protections/
researchers/drafting-consent-form.html [Accessed 14 Jun. 2019].
Resnik, D. (2018). The Ethics of Research with Human Subjects. New York: Springer.
the Guardian. (2019). How do you make sure your research is ethical?. [online]
Available at:
https://www.theguardian.com/higher-education-network/blog/2014/may/20/why-
research-ethics-matter [Accessed 14 Jun. 2019].
Wise, J. (2014). UK research bodies agree steps to protect anonymity of study
participants. BMJ, 348(mar26 2), pp.g2372-g2372.
Witte, R. (2017). Statistics. New York: Wiley.
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide
1 out of 12
Related Documents
Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
Copyright © 2020–2025 A2Z Services. All Rights Reserved. Developed and managed by ZUCOL.



