That it is not under consideration for publication elsewhere.The work described has not been formally published before, except in the form of an abstract or as part of a published lecture, review, thesis, or overlay journal.They are authorized by their co-authors to enter into these arrangements.In submitting the manuscript to the journal, the authors certify that: Introduction to Robust Estimation and Hypothesis Testing (Ed.2). UNDP Smartphone and Cyber security practices for developing nations. Despite the News, Your Cellphone is Not Yet Sending Spam, SYMANTEC. Cyber security Challenges in Developing Nations. Available at: DOI: 10.5281/zenodo.1218519 Http://Journal of Engineering Technologies and Management Research Tagert, A.C. The Internet of Things Is Wildly Insecure and Often Unpatchable, SYMANTEC. The Internet of Things Is Wildly Insecure And Often Unpatchable. Carnegie Mellon University, Washington USA. US Computer Emergency Readiness Team (US-CERT). Regulating the Internet of Things: First Steps Towards Managing Discrimination, Privacy, Security & Consent. Available at: Orodho,J.A.Elements of Education and Social Sciences Research Education Research. The Internet of Things: New Threats Emerge in a Connected World, SYMANTEC. Guidelines on Cell Phone and PDA Security (SP 800-124). National Institute of Standards and Technology. Focus Groups: A Practical Guide for Applied Research 3rd. Research Methodology and Techniques 2ndedition. National Institute of Standards and Technology, Gaithersburg, MD. Computer Security Incident Handling Guide (Trans: Computer Security Division ITL). Cyber security in developing countries, a digital divide issue, Journal of International Communication. Dubai: Deloitte Corporate Finance Limited. Cybercrime: The current landscape and the hidden costs. Net Losses: Estimating the Global Cost of Cybercrime Economic impact of cybercrime II. 10(2), 2014, 180-211.Ĭenter for Strategic and International Studies. Security Response: How safe is your quantified self? Journal of International Communication. Perspectives for Cyber-Deterrence: A Quantitative Analysis of Cyber Threats and Attacks on Consumers, International Journal of Innovative Research in Science, Engineering and Technology. Interpreting User’s perceptions of Mobile Security Methods and Their Effectiveness, International Journal of Engineering and Advanced Technology. Mitigating Vulnerability Risks in Cyber security Using Predictive Measures, International Journal of Advanced Scientific Research & Development. The study also found that lack of knowledge about technology or applications for SP security, lack of security habits and practices, rigorous involvement of setting SP security details like backups, encryption, security software etc., assumptions that SP are security and tamper-proof as well as lack of training, guidance and after sale services on SP security are significant reasons for lack of security measures practices concerning smart-phone usage by college students.Īdebiaye, R. Use of Biometrics or other security unknown security adoptions were not included in the study. On the other hand, 35.4% protected their SP data through encryption, 47.4% had data checks and security alert while 46.2% had set Bluetooth applications and 41.4% had used backup storage for sensitive data. The results showed 69.8% of college students set PIN, password and screen lock on their smart phones while 74.8% were cautious with smart phone applications and 6.2% practiced on setting of security software including rooting services. The t-test, Pearson’s correlation, regression coefficients and their respective p-values. Using a quantitative research survey and simple random sampling procedure, the methodology focused on analyzing data through testing of hypotheses. The study also examined the Consideration of Future Consequences (CFC) level in relation to the level of smart-phone security measures, determined the levels of security measures on smart-phone (SP) by users, and establish the relationship between CFC level and the levels of smart-phone security measures among college students. The study aimed to quantitatively determine the reasons for inactive practice of security measures of smart-phone usage among college students in the United States. The ability to remain connected, the ease of smart phone use and declining mobile costs have allowed this technology to expand at a very high rate globally. Mobile phone usage is growing at an unprecedented rate. Level of Practice of Security Measures of SP, SP Usage, Consideration of Future Consequences Level Abstract Department of Informatics and Engineering Systems, College of Science and Technology, University of South Carolina Upstate, USAĭepartment of Computer Information Systems, Ferrum College, VA, USA
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |