Survey Paper | Information Technology | Ghana | Volume 9 Issue 4, April 2020
Analysis of the Security Threat and Vulnerability of Smartphone use among Tertiary Students in Ghana
Issah Bala Abdulai, Abu Sulemana
The study was to find out the extent at which tertiary students in Ghana use Smartphone, and to examine the level of awareness regarding security risks that accompany the use of smartphones among tertiary students. A cross-sectional survey design was employed to collect data in four tertiary institutions. Data was collected from 150 tertiary students. These tertiary students were randomly sampled during visits to the various institutions. Data was gathered through questionnaire for all participants. The data was analysed using frequency counts and percentages to answer research questions. The results indicated that, generally, most tertiary students in Ghana use android operating system smartphones. Besides, some of the tertiary students are not aware of the security threat and vulnerability that affect their smartphones. Furthermore, majority of the tertiary students in Ghana do not do enough to protect their smartphone from being attacked. Finally, the study suggests a training programme to equip the tertiary students to manage the threat efficiently.
Keywords: Smartphone, Security Risk, Information Security, Operating System, Vulnerability
Edition: Volume 9 Issue 4, April 2020
Pages: 1643 - 1647
How to Cite this Article?
Issah Bala Abdulai, Abu Sulemana, "Analysis of the Security Threat and Vulnerability of Smartphone use among Tertiary Students in Ghana", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=SR20419140549, Volume 9 Issue 4, April 2020, 1643 - 1647
250 PDF Views | 107 PDF Downloads
Similar Articles with Keyword 'Smartphone'
Research Paper, Information Technology, Malaysia, Volume 4 Issue 5, May 2015
Pages: 952 - 954Applying Utaut to Evaluate the Acceptance of Mobile Learning in Higher Education in Iraq
Huda Hussein Mohammad Jawad, Zainuddin Bin Hassan
Survey Paper, Information Technology, Ghana, Volume 9 Issue 4, April 2020
Pages: 1643 - 1647Analysis of the Security Threat and Vulnerability of Smartphone use among Tertiary Students in Ghana
Issah Bala Abdulai, Abu Sulemana
M.Tech / M.E / PhD Thesis, Information Technology, India, Volume 4 Issue 6, June 2015
Pages: 2923 - 2928Hiding User Privacy in Location Based Services Through Clustering
Nilam V. Khandade, Snehal Nargundi
Research Paper, Information Technology, India, Volume 3 Issue 11, November 2014
Pages: 2959 - 2961Enhancing Media Access Using Cloud Computing for Mobile Devices
Gaurav V. Dahake, Dr. A A.Gurjar
Research Paper, Information Technology, Malaysia, Volume 3 Issue 12, December 2014
Pages: 2497 - 2502The Most Favourable Mobile Messaging Apps among IIUM Students
Ayn Nur Azhana Azhar Amanullah, Noor Azian Mohamad Ali
Similar Articles with Keyword 'Security Risk'
Survey Paper, Information Technology, Ghana, Volume 9 Issue 4, April 2020
Pages: 1643 - 1647Analysis of the Security Threat and Vulnerability of Smartphone use among Tertiary Students in Ghana
Issah Bala Abdulai, Abu Sulemana
Dissertation Chapters, Information Technology, Kenya, Volume 8 Issue 9, September 2019
Pages: 1014 - 1023To Investigate the Strength of Existing Information Security Policies among SACCOS in Kenya
Jerotich Sirma, Silvance O. Abeka, Benard Okelo
Similar Articles with Keyword 'Information Security'
Informative Article, Information Technology, Malaysia, Volume 3 Issue 12, December 2014
Pages: 570 - 576How Much Privacy We Still Have?
Ayn Nur Azhana Binti Azhar Amanullah, Nur Faizah Binti Ab Aziz, Maya Novia Sari, Jamaludin Bin Ibrahim
Survey Paper, Information Technology, Ghana, Volume 9 Issue 4, April 2020
Pages: 1643 - 1647Analysis of the Security Threat and Vulnerability of Smartphone use among Tertiary Students in Ghana
Issah Bala Abdulai, Abu Sulemana
Review Papers, Information Technology, Malaysia, Volume 3 Issue 12, December 2014
Pages: 773 - 778Information Security in ICT from an Islamic Perspective
Jamaludin Ibrahim, Fatima Ahmed Mohamed Nuhaabdulaziz Alyami Effra Altaf Haqani
Research Paper, Information Technology, India, Volume 4 Issue 4, April 2015
Pages: 1576 - 1580Intrusion Detection in Wireless Network Using Fuzzy Rules
Ketaki P. Bhusari, Swati G. Kale
Research Paper, Information Technology, India, Volume 4 Issue 4, April 2015
Pages: 1241 - 1243Addressing Security Issues of Small and Medium Enterprises through Enhanced SIEM Technology
Prateek Shivhare, Savaridassan.P
Similar Articles with Keyword 'Operating System'
Research Paper, Information Technology, Kenya, Volume 5 Issue 4, April 2016
Pages: 1549 - 1552A Framework to Support Collaborative Learning Using Social Media
Josphat Karani, Florence K. Maweu
Survey Paper, Information Technology, Ghana, Volume 9 Issue 4, April 2020
Pages: 1643 - 1647Analysis of the Security Threat and Vulnerability of Smartphone use among Tertiary Students in Ghana
Issah Bala Abdulai, Abu Sulemana
Research Paper, Information Technology, Nigeria, Volume 4 Issue 3, March 2015
Pages: 1998 - 2006Cloud Based E-Learning Model for Open and Distance Learning in Nigerian Universities
D. R Aremu, Babatunde Peter JACOB, Peter M Ogedebe
Research Paper, Information Technology, Malaysia, Volume 8 Issue 10, October 2019
Pages: 665 - 668Virtual OS of Semi-Authorized in a Smartphones
Moceheb Lazam Shuwandy
Research Paper, Information Technology, Indonesia, Volume 8 Issue 1, January 2019
Pages: 1372 - 1377SOA Implementation of E-Banking Unified Bill Payment in Measuring Customer Satisfaction on XYZ Bank
Jeannie Artha Rosmauly, Ivan Alexander, Raymond Wijaya
Similar Articles with Keyword 'Vulnerability'
Research Paper, Information Technology, India, Volume 4 Issue 4, April 2015
Pages: 1635 - 1639Developing Firefox add-on for DOM vulnerability Assessment
Saranraj Ilangovan, Geogen George
M.Tech / M.E / PhD Thesis, Information Technology, India, Volume 4 Issue 3, March 2015
Pages: 2100 - 2103Automatic Patch Generation for Control Hijacking Attacks
Saud Adam Abdulkadir, Savaridassan P.
Survey Paper, Information Technology, India, Volume 5 Issue 4, April 2016
Pages: 1865 - 1867Survey on Cloud Computing Security Algorithms
Akash Kanthale, S. P. Potdar
Survey Paper, Information Technology, India, Volume 3 Issue 6, June 2014
Pages: 1470 - 1473The Heartbleed Bug: An Open Secure Sockets Layer Vulnerability
Thabiso Peter Mpofu, Noe Elisa, Nicholaus Gati
Survey Paper, Information Technology, Ghana, Volume 9 Issue 4, April 2020
Pages: 1643 - 1647Analysis of the Security Threat and Vulnerability of Smartphone use among Tertiary Students in Ghana
Issah Bala Abdulai, Abu Sulemana