Analysis of the Security Threat and Vulnerability of Smartphone use among Tertiary Students in Ghana
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064

Survey Paper | Information Technology | Ghana | Volume 9 Issue 4, April 2020

Analysis of the Security Threat and Vulnerability of Smartphone use among Tertiary Students in Ghana

Issah Bala Abdulai, Abu Sulemana

The study was to find out the extent at which tertiary students in Ghana use Smartphone, and to examine the level of awareness regarding security risks that accompany the use of smartphones among tertiary students. A cross-sectional survey design was employed to collect data in four tertiary institutions. Data was collected from 150 tertiary students. These tertiary students were randomly sampled during visits to the various institutions. Data was gathered through questionnaire for all participants. The data was analysed using frequency counts and percentages to answer research questions. The results indicated that, generally, most tertiary students in Ghana use android operating system smartphones. Besides, some of the tertiary students are not aware of the security threat and vulnerability that affect their smartphones. Furthermore, majority of the tertiary students in Ghana do not do enough to protect their smartphone from being attacked. Finally, the study suggests a training programme to equip the tertiary students to manage the threat efficiently.

Keywords: Smartphone, Security Risk, Information Security, Operating System, Vulnerability

Edition: Volume 9 Issue 4, April 2020

Pages: 1643 - 1647

Share this Article

How to Cite this Article?

Issah Bala Abdulai, Abu Sulemana, "Analysis of the Security Threat and Vulnerability of Smartphone use among Tertiary Students in Ghana", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=SR20419140549, Volume 9 Issue 4, April 2020, 1643 - 1647

181 PDF Views | 67 PDF Downloads

Download Article PDF



Similar Articles with Keyword 'Smartphone'

Research Paper, Information Technology, Malaysia, Volume 3 Issue 12, December 2014

Pages: 2497 - 2502

The Most Favourable Mobile Messaging Apps among IIUM Students

Ayn Nur Azhana Azhar Amanullah, Noor Azian Mohamad Ali

Share this Article

Research Paper, Information Technology, India, Volume 3 Issue 11, November 2014

Pages: 2959 - 2961

Enhancing Media Access Using Cloud Computing for Mobile Devices

Gaurav V. Dahake, Dr. A A.Gurjar

Share this Article

Research Paper, Information Technology, Malaysia, Volume 4 Issue 5, May 2015

Pages: 952 - 954

Applying Utaut to Evaluate the Acceptance of Mobile Learning in Higher Education in Iraq

Huda Hussein Mohammad Jawad, Zainuddin Bin Hassan

Share this Article

M.Tech / M.E / PhD Thesis, Information Technology, India, Volume 4 Issue 6, June 2015

Pages: 2923 - 2928

Hiding User Privacy in Location Based Services Through Clustering

Nilam V. Khandade, Snehal Nargundi

Share this Article

Survey Paper, Information Technology, Malaysia, Volume 4 Issue 1, January 2015

Pages: 1287 - 1292

Survey on Mobile and Wireless Security Awareness: User Perspectives

Nadhirah binti Nazri, Noor Azian binti Mohamad Ali, Jamaludin Ibrahim

Share this Article

Similar Articles with Keyword 'Security Risk'

Survey Paper, Information Technology, Ghana, Volume 9 Issue 4, April 2020

Pages: 1643 - 1647

Analysis of the Security Threat and Vulnerability of Smartphone use among Tertiary Students in Ghana

Issah Bala Abdulai, Abu Sulemana

Share this Article

Dissertation Chapters, Information Technology, Kenya, Volume 8 Issue 9, September 2019

Pages: 1014 - 1023

To Investigate the Strength of Existing Information Security Policies among SACCOS in Kenya

Jerotich Sirma, Silvance O. Abeka, Benard Okelo

Share this Article

Similar Articles with Keyword 'Information Security'

Review Papers, Information Technology, Malaysia, Volume 3 Issue 12, December 2014

Pages: 773 - 778

Information Security in ICT from an Islamic Perspective

Jamaludin Ibrahim, Fatima Ahmed Mohamed Nuhaabdulaziz Alyami Effra Altaf Haqani

Share this Article

Informative Article, Information Technology, Malaysia, Volume 3 Issue 12, December 2014

Pages: 570 - 576

How Much Privacy We Still Have?

Ayn Nur Azhana Binti Azhar Amanullah, Nur Faizah Binti Ab Aziz, Maya Novia Sari, Jamaludin Bin Ibrahim

Share this Article

Research Paper, Information Technology, India, Volume 4 Issue 4, April 2015

Pages: 1241 - 1243

Addressing Security Issues of Small and Medium Enterprises through Enhanced SIEM Technology

Prateek Shivhare, Savaridassan.P

Share this Article

M.Tech / M.E / PhD Thesis, Information Technology, India, Volume 4 Issue 6, June 2015

Pages: 1358 - 1360

A Secure Image Stegnography Process

Sakshi, Jaspreet Kaur

Share this Article

Survey Paper, Information Technology, Ghana, Volume 9 Issue 4, April 2020

Pages: 1643 - 1647

Analysis of the Security Threat and Vulnerability of Smartphone use among Tertiary Students in Ghana

Issah Bala Abdulai, Abu Sulemana

Share this Article

Similar Articles with Keyword 'Operating System'

Research Paper, Information Technology, Nigeria, Volume 4 Issue 3, March 2015

Pages: 1998 - 2006

Cloud Based E-Learning Model for Open and Distance Learning in Nigerian Universities

D. R Aremu, Babatunde Peter JACOB, Peter M Ogedebe

Share this Article

Research Paper, Information Technology, Kenya, Volume 5 Issue 4, April 2016

Pages: 1549 - 1552

A Framework to Support Collaborative Learning Using Social Media

Josphat Karani, Florence K. Maweu

Share this Article

Survey Paper, Information Technology, Ghana, Volume 9 Issue 4, April 2020

Pages: 1643 - 1647

Analysis of the Security Threat and Vulnerability of Smartphone use among Tertiary Students in Ghana

Issah Bala Abdulai, Abu Sulemana

Share this Article

Research Paper, Information Technology, India, Volume 4 Issue 6, June 2015

Pages: 429 - 432

Android Application Supporting Old Age Life

Yashika Tyagi, Alpana Kakkar

Share this Article

Research Paper, Information Technology, Malaysia, Volume 8 Issue 10, October 2019

Pages: 665 - 668

Virtual OS of Semi-Authorized in a Smartphones

Moceheb Lazam Shuwandy

Share this Article

Similar Articles with Keyword 'Vulnerability'

Research Paper, Information Technology, India, Volume 4 Issue 4, April 2015

Pages: 1635 - 1639

Developing Firefox add-on for DOM vulnerability Assessment

Saranraj Ilangovan, Geogen George

Share this Article

M.Tech / M.E / PhD Thesis, Information Technology, India, Volume 4 Issue 3, March 2015

Pages: 2100 - 2103

Automatic Patch Generation for Control Hijacking Attacks

Saud Adam Abdulkadir, Savaridassan P.

Share this Article

Survey Paper, Information Technology, India, Volume 3 Issue 6, June 2014

Pages: 1470 - 1473

The Heartbleed Bug: An Open Secure Sockets Layer Vulnerability

Thabiso Peter Mpofu, Noe Elisa, Nicholaus Gati

Share this Article

Research Paper, Information Technology, India, Volume 4 Issue 3, March 2015

Pages: 636 - 640

Exploit Development Research on x86 Windows Application: Buffer Overflow

Geogen George, Sivasundaram R

Share this Article

Survey Paper, Information Technology, Ghana, Volume 9 Issue 4, April 2020

Pages: 1643 - 1647

Analysis of the Security Threat and Vulnerability of Smartphone use among Tertiary Students in Ghana

Issah Bala Abdulai, Abu Sulemana

Share this Article
Top