Survey on Mobile and Wireless Security Awareness: User Perspectives
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064



Downloads: 113 | Weekly Hits: ⮙2 | Monthly Hits: ⮙15

Survey Paper | Information Technology | Malaysia | Volume 4 Issue 1, January 2015

Survey on Mobile and Wireless Security Awareness: User Perspectives

Nadhirah binti Nazri, Noor Azian binti Mohamad Ali, Jamaludin Ibrahim

The use of wireless and mobile devices especially smartphones has become the norm nowadays. The emerging and advancement of wireless and mobile devices has brought the issue of security breaches and attacks back into focus. Many users are not aware of the security issues related to wireless and mobile devices. This has resulted in devices becoming attractive targets for malicious attack. In this paper, we discuss and analyze the factors of attack on mobile and wireless platforms and give in-depth overview of the attack mechanism. It is hoped that users will become aware and alert about the security issues and subsequently take the necessary action and precaution to protect themselves.

Keywords: Mobile devices, wireless technologies, behavior, awareness, attacks, threats

Edition: Volume 4 Issue 1, January 2015

Pages: 1287 - 1292

Share this Article

How to Cite this Article?

Nadhirah binti Nazri, Noor Azian binti Mohamad Ali, Jamaludin Ibrahim, "Survey on Mobile and Wireless Security Awareness: User Perspectives", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=SUB15466, Volume 4 Issue 1, January 2015, 1287 - 1292

Enter Your Registered Email Address





Similar Articles with Keyword 'Mobile devices'

Downloads: 88 | Monthly Hits: ⮙9

Research Paper, Information Technology, United States of America, Volume 9 Issue 7, July 2020

Pages: 1087 - 1088

Modern Warehouse Operations Execution Using Mobile Devices

Dhanesh Thatikonda

Share this Article

Downloads: 105 | Weekly Hits: ⮙2 | Monthly Hits: ⮙9

Research Paper, Information Technology, India, Volume 4 Issue 6, June 2015

Pages: 2917 - 2919

E Voting Using Android System

Namrata Thakur, Vrushalee Ambavale

Share this Article

Downloads: 107 | Weekly Hits: ⮙5 | Monthly Hits: ⮙11

M.Tech / M.E / PhD Thesis, Information Technology, India, Volume 3 Issue 5, May 2014

Pages: 1844 - 1847

Privacy Preserving in Participatory Sensing

Deepika Nair, Bhuvaneswari Raju

Share this Article

Downloads: 107 | Weekly Hits: ⮙1 | Monthly Hits: ⮙12

Research Paper, Information Technology, Nigeria, Volume 6 Issue 3, March 2017

Pages: 1875 - 1880

Harnessing E-healthcare Technologies for Equitable Healthcare Delivery in Nigeria: The Way Forward

Wilson Nwankwo PhD

Share this Article

Downloads: 110 | Weekly Hits: ⮙1 | Monthly Hits: ⮙16

Research Paper, Information Technology, India, Volume 4 Issue 1, January 2015

Pages: 2036 - 2041

Selective Scheduling Based on Number of Processor Cores for Parallel Processing

Ravinder Jeet, Upasna Garg

Share this Article

Similar Articles with Keyword 'wireless technologies'

Downloads: 113 | Weekly Hits: ⮙2 | Monthly Hits: ⮙15

Survey Paper, Information Technology, Malaysia, Volume 4 Issue 1, January 2015

Pages: 1287 - 1292

Survey on Mobile and Wireless Security Awareness: User Perspectives

Nadhirah binti Nazri, Noor Azian binti Mohamad Ali, Jamaludin Ibrahim

Share this Article

Downloads: 174 | Weekly Hits: ⮙7

Review Papers, Information Technology, Bangladesh, Volume 8 Issue 7, July 2019

Pages: 929 - 937

Cellular Mobile Technologies (1G to 5G) and Massive MIMO

MD. Hasan Mahmud

Share this Article

Similar Articles with Keyword 'behavior'

Downloads: 99 | Monthly Hits: ⮙11

Research Paper, Information Technology, India, Volume 3 Issue 3, March 2014

Pages: 138 - 141

Impact of Family Media Environment on Childrens Leisure Time Activities

B. N. Neelima

Share this Article

Downloads: 102 | Weekly Hits: ⮙1 | Monthly Hits: ⮙11

Research Paper, Information Technology, India, Volume 5 Issue 2, February 2016

Pages: 1465 - 1469

PTP Method in Network Security for Misbehavior Detection Using Entropy

Neha Pathak, R. S. Apare

Share this Article

Downloads: 103 | Monthly Hits: ⮙12

Survey Paper, Information Technology, Malaysia, Volume 3 Issue 4, April 2014

Pages: 754 - 759

The Ethical Dilemma of Professional IT

Cutifa Safitri, Yunura Azura, Jamaluddin Bin Ibrahim

Share this Article

Downloads: 103 | Weekly Hits: ⮙3 | Monthly Hits: ⮙10

Research Paper, Information Technology, India, Volume 4 Issue 4, April 2015

Pages: 2734 - 2737

Detection of Outliers Using Hybrid Algorithm on Categorical Datasets

Rachana P. Jakkulwar, Prof. R. A. Fadnavis

Share this Article

Downloads: 105 | Weekly Hits: ⮙4

Research Paper, Information Technology, Malaysia, Volume 5 Issue 2, February 2016

Pages: 1898 - 1903

A Systematic Review and Model Development of the Factors that Affect Knowledge Sharing in Educational Institutions

Samera Ali Abdullah, Rosnafisah Bt Sulaiman

Share this Article

Similar Articles with Keyword 'awareness'

Downloads: 2 | Weekly Hits: ⮙1 | Monthly Hits: ⮙2

Research Paper, Information Technology, Vietnam, Volume 10 Issue 4, April 2021

Pages: 798 - 803

Enhancing the Legal Awareness of Vietnamese Basic Officers

Tran Thuy Linh

Share this Article

Downloads: 88 | Weekly Hits: ⮙2 | Monthly Hits: ⮙17

Research Paper, Information Technology, Kenya, Volume 3 Issue 11, November 2014

Pages: 995 - 999

A Donor Information Needs Driven Approach to Address Kenyas Declining Blood Donations

Ireri Salome, Waiganjo Peter, Orwa Daniel

Share this Article

Downloads: 101 | Weekly Hits: ⮙2 | Monthly Hits: ⮙13

Research Paper, Information Technology, Iraq, Volume 4 Issue 11, November 2015

Pages: 1736 - 1745

Recommendations to Evaluate and Choose Cloud Services and Deployment Models for e-Business Strategic Use: A Case Study of Malaysian SMEs

Haider N. Hussain

Share this Article

Downloads: 109 | Weekly Hits: ⮙3

Informative Article, Information Technology, Malaysia, Volume 3 Issue 12, December 2014

Pages: 570 - 576

How Much Privacy We Still Have?

Ayn Nur Azhana Binti Azhar Amanullah, Nur Faizah Binti Ab Aziz, Maya Novia Sari, Jamaludin Bin Ibrahim

Share this Article

Downloads: 111 | Monthly Hits: ⮙11

Survey Paper, Information Technology, Ghana, Volume 9 Issue 4, April 2020

Pages: 1643 - 1647

Analysis of the Security Threat and Vulnerability of Smartphone use among Tertiary Students in Ghana

Issah Bala Abdulai, Abu Sulemana

Share this Article

Similar Articles with Keyword 'attacks'

Downloads: 103 | Weekly Hits: ⮙2 | Monthly Hits: ⮙8

M.Tech / M.E / PhD Thesis, Information Technology, India, Volume 4 Issue 3, March 2015

Pages: 2100 - 2103

Automatic Patch Generation for Control Hijacking Attacks

Saud Adam Abdulkadir, Savaridassan P.

Share this Article

Downloads: 104 | Weekly Hits: ⮙1 | Monthly Hits: ⮙12

Survey Paper, Information Technology, India, Volume 3 Issue 4, April 2014

Pages: 747 - 750

A Survey on Shoulder Surfing Resistant Text Based Graphical Password Schemes

Mokal P. H., Devikar R. N.

Share this Article

Downloads: 105 | Weekly Hits: ⮙7 | Monthly Hits: ⮙13

Survey Paper, Information Technology, India, Volume 3 Issue 11, November 2014

Pages: 2849 - 2851

A Survey on Secure Mechanism for Wireless Sensor Networks

Tabbasum Sajjan Magdum, Y.B.Gurav

Share this Article

Downloads: 105 | Weekly Hits: ⮙5 | Monthly Hits: ⮙13

Research Paper, Information Technology, India, Volume 4 Issue 4, April 2015

Pages: 1274 - 1277

Automation of Mutated Cross Site Scripting

Anchal Tiwari, J. Jeysree

Share this Article

Downloads: 106 | Weekly Hits: ⮙3 | Monthly Hits: ⮙10

M.Tech / M.E / PhD Thesis, Information Technology, India, Volume 3 Issue 10, October 2014

Pages: 1390 - 1394

Efficient Privacy Protection in Social Networks

Bharath Kumar Gowru, Ramadevi Polagani

Share this Article

Similar Articles with Keyword 'threats'

Downloads: 102 | Weekly Hits: ⮙1 | Monthly Hits: ⮙9

Survey Paper, Information Technology, India, Volume 3 Issue 12, December 2014

Pages: 1137 - 1140

A Literature Survey on Virtualization Security Threats in Cloud Computing

Brona Shah, Jignesh Vania

Share this Article

Downloads: 103 | Weekly Hits: ⮙2 | Monthly Hits: ⮙8

M.Tech / M.E / PhD Thesis, Information Technology, India, Volume 4 Issue 3, March 2015

Pages: 2100 - 2103

Automatic Patch Generation for Control Hijacking Attacks

Saud Adam Abdulkadir, Savaridassan P.

Share this Article

Downloads: 106 | Weekly Hits: ⮙3 | Monthly Hits: ⮙10

M.Tech / M.E / PhD Thesis, Information Technology, India, Volume 3 Issue 10, October 2014

Pages: 1390 - 1394

Efficient Privacy Protection in Social Networks

Bharath Kumar Gowru, Ramadevi Polagani

Share this Article

Downloads: 113 | Weekly Hits: ⮙2 | Monthly Hits: ⮙15

Survey Paper, Information Technology, Malaysia, Volume 4 Issue 1, January 2015

Pages: 1287 - 1292

Survey on Mobile and Wireless Security Awareness: User Perspectives

Nadhirah binti Nazri, Noor Azian binti Mohamad Ali, Jamaludin Ibrahim

Share this Article

Downloads: 113 | Weekly Hits: ⮙5 | Monthly Hits: ⮙10

Research Paper, Information Technology, India, Volume 4 Issue 5, May 2015

Pages: 1061 - 1065

Review On design and Implementation of Enhanced Security in Multicloud Storage System Using Distributed File System

Priyanka R. Raut, Vaidehi Baporikar

Share this Article



Top