Survey Paper | Information Technology | Malaysia | Volume 4 Issue 1, January 2015
Survey on Mobile and Wireless Security Awareness: User Perspectives
Nadhirah binti Nazri, Noor Azian binti Mohamad Ali, Jamaludin Ibrahim
The use of wireless and mobile devices especially smartphones has become the norm nowadays. The emerging and advancement of wireless and mobile devices has brought the issue of security breaches and attacks back into focus. Many users are not aware of the security issues related to wireless and mobile devices. This has resulted in devices becoming attractive targets for malicious attack. In this paper, we discuss and analyze the factors of attack on mobile and wireless platforms and give in-depth overview of the attack mechanism. It is hoped that users will become aware and alert about the security issues and subsequently take the necessary action and precaution to protect themselves.
Keywords: Mobile devices, wireless technologies, behavior, awareness, attacks, threats
Edition: Volume 4 Issue 1, January 2015
Pages: 1287 - 1292
How to Cite this Article?
Nadhirah binti Nazri, Noor Azian binti Mohamad Ali, Jamaludin Ibrahim, "Survey on Mobile and Wireless Security Awareness: User Perspectives", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=SUB15466, Volume 4 Issue 1, January 2015, 1287 - 1292
109 PDF Views | 86 PDF Downloads
Similar Articles with Keyword 'Mobile devices'
Research Paper, Information Technology, United States of America, Volume 9 Issue 7, July 2020
Pages: 1087 - 1088Modern Warehouse Operations Execution Using Mobile Devices
Dhanesh Thatikonda
M.Tech / M.E / PhD Thesis, Information Technology, India, Volume 3 Issue 5, May 2014
Pages: 1844 - 1847Privacy Preserving in Participatory Sensing
Deepika Nair, Bhuvaneswari Raju
Research Paper, Information Technology, Nigeria, Volume 6 Issue 3, March 2017
Pages: 1875 - 1880Harnessing E-healthcare Technologies for Equitable Healthcare Delivery in Nigeria: The Way Forward
Wilson Nwankwo PhD
Review Papers, Information Technology, India, Volume 4 Issue 1, January 2015
Pages: 1666 - 1669Selective Scheduling Based on Number of Processor Cores for Parallel Processing
Ravinder Jeet, Upasna Garg
Research Paper, Information Technology, India, Volume 4 Issue 6, June 2015
Pages: 2917 - 2919E Voting Using Android System
Namrata Thakur, Vrushalee Ambavale
Similar Articles with Keyword 'wireless technologies'
Survey Paper, Information Technology, Malaysia, Volume 4 Issue 1, January 2015
Pages: 1287 - 1292Survey on Mobile and Wireless Security Awareness: User Perspectives
Nadhirah binti Nazri, Noor Azian binti Mohamad Ali, Jamaludin Ibrahim
Review Papers, Information Technology, Bangladesh, Volume 8 Issue 7, July 2019
Pages: 929 - 937Cellular Mobile Technologies (1G to 5G) and Massive MIMO
MD. Hasan Mahmud
Similar Articles with Keyword 'behavior'
Research Paper, Information Technology, India, Volume 3 Issue 3, March 2014
Pages: 138 - 141Impact of Family Media Environment on Childrens Leisure Time Activities
B. N. Neelima
Survey Paper, Information Technology, Malaysia, Volume 3 Issue 4, April 2014
Pages: 754 - 759The Ethical Dilemma of Professional IT
Cutifa Safitri, Yunura Azura, Jamaluddin Bin Ibrahim
Research Paper, Information Technology, India, Volume 5 Issue 2, February 2016
Pages: 1465 - 1469PTP Method in Network Security for Misbehavior Detection Using Entropy
Neha Pathak, R. S. Apare
M.Tech / M.E / PhD Thesis, Information Technology, India, Volume 3 Issue 7, July 2014
Pages: 1743 - 1746Hybrid Approach for Outlier Detection in High Dimensional Dataset
Rohini Balkrishna Gurav, Sonali Rangdale
Research Paper, Information Technology, India, Volume 4 Issue 4, April 2015
Pages: 2734 - 2737Detection of Outliers Using Hybrid Algorithm on Categorical Datasets
Rachana P. Jakkulwar, Prof. R. A. Fadnavis
Similar Articles with Keyword 'awareness'
Research Paper, Information Technology, Kenya, Volume 3 Issue 11, November 2014
Pages: 995 - 999A Donor Information Needs Driven Approach to Address Kenyas Declining Blood Donations
Ireri Salome, Waiganjo Peter, Orwa Daniel
Research Paper, Information Technology, Iraq, Volume 4 Issue 11, November 2015
Pages: 1736 - 1745Recommendations to Evaluate and Choose Cloud Services and Deployment Models for e-Business Strategic Use: A Case Study of Malaysian SMEs
Haider N. Hussain
Informative Article, Information Technology, Malaysia, Volume 3 Issue 12, December 2014
Pages: 570 - 576How Much Privacy We Still Have?
Ayn Nur Azhana Binti Azhar Amanullah, Nur Faizah Binti Ab Aziz, Maya Novia Sari, Jamaludin Bin Ibrahim
Survey Paper, Information Technology, Nigeria, Volume 4 Issue 6, June 2015
Pages: 559 - 562An Evaluation of Media Audience Awareness of Community Broadcasting in Imo State, Nigeria
Nkwam-Uwaoma, A.O. Ph.D
Survey Paper, Information Technology, Malaysia, Volume 4 Issue 1, January 2015
Pages: 1287 - 1292Survey on Mobile and Wireless Security Awareness: User Perspectives
Nadhirah binti Nazri, Noor Azian binti Mohamad Ali, Jamaludin Ibrahim
Similar Articles with Keyword 'attacks'
Survey Paper, Information Technology, India, Volume 3 Issue 4, April 2014
Pages: 747 - 750A Survey on Shoulder Surfing Resistant Text Based Graphical Password Schemes
Mokal P. H., Devikar R. N.
M.Tech / M.E / PhD Thesis, Information Technology, India, Volume 4 Issue 3, March 2015
Pages: 2100 - 2103Automatic Patch Generation for Control Hijacking Attacks
Saud Adam Abdulkadir, Savaridassan P.
M.Tech / M.E / PhD Thesis, Information Technology, India, Volume 4 Issue 3, March 2015
Pages: 2473 - 2475Intrusion Detection System with Automatic Forensic Data Acquisition and Firewall
Laimayum Bulbul Sharma, J. Dharani
Research Paper, Information Technology, India, Volume 4 Issue 7, July 2015
Pages: 2400 - 2403Secure Deduplication in Cloud Backup Services
Nidhi Panpaliya, Prachi Sorte
Survey Paper, Information Technology, India, Volume 4 Issue 11, November 2015
Pages: 2128 - 2131A Comprehensive Survey on CAPTCHA and VRP
Vijayalaxmi Daundkar, Prashant Kumbharkar
Similar Articles with Keyword 'threats'
Survey Paper, Information Technology, India, Volume 3 Issue 12, December 2014
Pages: 1137 - 1140A Literature Survey on Virtualization Security Threats in Cloud Computing
Brona Shah, Jignesh Vania
M.Tech / M.E / PhD Thesis, Information Technology, India, Volume 4 Issue 3, March 2015
Pages: 2100 - 2103Automatic Patch Generation for Control Hijacking Attacks
Saud Adam Abdulkadir, Savaridassan P.
M.Tech / M.E / PhD Thesis, Information Technology, India, Volume 3 Issue 10, October 2014
Pages: 1390 - 1394Efficient Privacy Protection in Social Networks
Bharath Kumar Gowru, Ramadevi Polagani
Survey Paper, Information Technology, Malaysia, Volume 4 Issue 1, January 2015
Pages: 1287 - 1292Survey on Mobile and Wireless Security Awareness: User Perspectives
Nadhirah binti Nazri, Noor Azian binti Mohamad Ali, Jamaludin Ibrahim
Research Paper, Information Technology, India, Volume 4 Issue 5, May 2015
Pages: 1061 - 1065Review On design and Implementation of Enhanced Security in Multicloud Storage System Using Distributed File System
Priyanka R. Raut, Vaidehi Baporikar