Survey on Mobile and Wireless Security Awareness: User Perspectives
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064

Survey Paper | Information Technology | Malaysia | Volume 4 Issue 1, January 2015

Survey on Mobile and Wireless Security Awareness: User Perspectives

Nadhirah binti Nazri, Noor Azian binti Mohamad Ali, Jamaludin Ibrahim

The use of wireless and mobile devices especially smartphones has become the norm nowadays. The emerging and advancement of wireless and mobile devices has brought the issue of security breaches and attacks back into focus. Many users are not aware of the security issues related to wireless and mobile devices. This has resulted in devices becoming attractive targets for malicious attack. In this paper, we discuss and analyze the factors of attack on mobile and wireless platforms and give in-depth overview of the attack mechanism. It is hoped that users will become aware and alert about the security issues and subsequently take the necessary action and precaution to protect themselves.

Keywords: Mobile devices, wireless technologies, behavior, awareness, attacks, threats

Edition: Volume 4 Issue 1, January 2015

Pages: 1287 - 1292

Share this Article

How to Cite this Article?

Nadhirah binti Nazri, Noor Azian binti Mohamad Ali, Jamaludin Ibrahim, "Survey on Mobile and Wireless Security Awareness: User Perspectives", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=SUB15466, Volume 4 Issue 1, January 2015, 1287 - 1292

109 PDF Views | 86 PDF Downloads

Download Article PDF



Similar Articles with Keyword 'Mobile devices'

Research Paper, Information Technology, United States of America, Volume 9 Issue 7, July 2020

Pages: 1087 - 1088

Modern Warehouse Operations Execution Using Mobile Devices

Dhanesh Thatikonda

Share this Article

M.Tech / M.E / PhD Thesis, Information Technology, India, Volume 3 Issue 5, May 2014

Pages: 1844 - 1847

Privacy Preserving in Participatory Sensing

Deepika Nair, Bhuvaneswari Raju

Share this Article

Research Paper, Information Technology, Nigeria, Volume 6 Issue 3, March 2017

Pages: 1875 - 1880

Harnessing E-healthcare Technologies for Equitable Healthcare Delivery in Nigeria: The Way Forward

Wilson Nwankwo PhD

Share this Article

Review Papers, Information Technology, India, Volume 4 Issue 1, January 2015

Pages: 1666 - 1669

Selective Scheduling Based on Number of Processor Cores for Parallel Processing

Ravinder Jeet, Upasna Garg

Share this Article

Research Paper, Information Technology, India, Volume 4 Issue 6, June 2015

Pages: 2917 - 2919

E Voting Using Android System

Namrata Thakur, Vrushalee Ambavale

Share this Article

Similar Articles with Keyword 'wireless technologies'

Survey Paper, Information Technology, Malaysia, Volume 4 Issue 1, January 2015

Pages: 1287 - 1292

Survey on Mobile and Wireless Security Awareness: User Perspectives

Nadhirah binti Nazri, Noor Azian binti Mohamad Ali, Jamaludin Ibrahim

Share this Article

Review Papers, Information Technology, Bangladesh, Volume 8 Issue 7, July 2019

Pages: 929 - 937

Cellular Mobile Technologies (1G to 5G) and Massive MIMO

MD. Hasan Mahmud

Share this Article

Similar Articles with Keyword 'behavior'

Research Paper, Information Technology, India, Volume 3 Issue 3, March 2014

Pages: 138 - 141

Impact of Family Media Environment on Childrens Leisure Time Activities

B. N. Neelima

Share this Article

Survey Paper, Information Technology, Malaysia, Volume 3 Issue 4, April 2014

Pages: 754 - 759

The Ethical Dilemma of Professional IT

Cutifa Safitri, Yunura Azura, Jamaluddin Bin Ibrahim

Share this Article

Research Paper, Information Technology, India, Volume 5 Issue 2, February 2016

Pages: 1465 - 1469

PTP Method in Network Security for Misbehavior Detection Using Entropy

Neha Pathak, R. S. Apare

Share this Article

M.Tech / M.E / PhD Thesis, Information Technology, India, Volume 3 Issue 7, July 2014

Pages: 1743 - 1746

Hybrid Approach for Outlier Detection in High Dimensional Dataset

Rohini Balkrishna Gurav, Sonali Rangdale

Share this Article

Research Paper, Information Technology, India, Volume 4 Issue 4, April 2015

Pages: 2734 - 2737

Detection of Outliers Using Hybrid Algorithm on Categorical Datasets

Rachana P. Jakkulwar, Prof. R. A. Fadnavis

Share this Article

Similar Articles with Keyword 'awareness'

Research Paper, Information Technology, Kenya, Volume 3 Issue 11, November 2014

Pages: 995 - 999

A Donor Information Needs Driven Approach to Address Kenyas Declining Blood Donations

Ireri Salome, Waiganjo Peter, Orwa Daniel

Share this Article

Research Paper, Information Technology, Iraq, Volume 4 Issue 11, November 2015

Pages: 1736 - 1745

Recommendations to Evaluate and Choose Cloud Services and Deployment Models for e-Business Strategic Use: A Case Study of Malaysian SMEs

Haider N. Hussain

Share this Article

Informative Article, Information Technology, Malaysia, Volume 3 Issue 12, December 2014

Pages: 570 - 576

How Much Privacy We Still Have?

Ayn Nur Azhana Binti Azhar Amanullah, Nur Faizah Binti Ab Aziz, Maya Novia Sari, Jamaludin Bin Ibrahim

Share this Article

Survey Paper, Information Technology, Nigeria, Volume 4 Issue 6, June 2015

Pages: 559 - 562

An Evaluation of Media Audience Awareness of Community Broadcasting in Imo State, Nigeria

Nkwam-Uwaoma, A.O. Ph.D

Share this Article

Survey Paper, Information Technology, Malaysia, Volume 4 Issue 1, January 2015

Pages: 1287 - 1292

Survey on Mobile and Wireless Security Awareness: User Perspectives

Nadhirah binti Nazri, Noor Azian binti Mohamad Ali, Jamaludin Ibrahim

Share this Article

Similar Articles with Keyword 'attacks'

Survey Paper, Information Technology, India, Volume 3 Issue 4, April 2014

Pages: 747 - 750

A Survey on Shoulder Surfing Resistant Text Based Graphical Password Schemes

Mokal P. H., Devikar R. N.

Share this Article

M.Tech / M.E / PhD Thesis, Information Technology, India, Volume 4 Issue 3, March 2015

Pages: 2100 - 2103

Automatic Patch Generation for Control Hijacking Attacks

Saud Adam Abdulkadir, Savaridassan P.

Share this Article

M.Tech / M.E / PhD Thesis, Information Technology, India, Volume 4 Issue 3, March 2015

Pages: 2473 - 2475

Intrusion Detection System with Automatic Forensic Data Acquisition and Firewall

Laimayum Bulbul Sharma, J. Dharani

Share this Article

Research Paper, Information Technology, India, Volume 4 Issue 7, July 2015

Pages: 2400 - 2403

Secure Deduplication in Cloud Backup Services

Nidhi Panpaliya, Prachi Sorte

Share this Article

Survey Paper, Information Technology, India, Volume 4 Issue 11, November 2015

Pages: 2128 - 2131

A Comprehensive Survey on CAPTCHA and VRP

Vijayalaxmi Daundkar, Prashant Kumbharkar

Share this Article

Similar Articles with Keyword 'threats'

Survey Paper, Information Technology, India, Volume 3 Issue 12, December 2014

Pages: 1137 - 1140

A Literature Survey on Virtualization Security Threats in Cloud Computing

Brona Shah, Jignesh Vania

Share this Article

M.Tech / M.E / PhD Thesis, Information Technology, India, Volume 4 Issue 3, March 2015

Pages: 2100 - 2103

Automatic Patch Generation for Control Hijacking Attacks

Saud Adam Abdulkadir, Savaridassan P.

Share this Article

M.Tech / M.E / PhD Thesis, Information Technology, India, Volume 3 Issue 10, October 2014

Pages: 1390 - 1394

Efficient Privacy Protection in Social Networks

Bharath Kumar Gowru, Ramadevi Polagani

Share this Article

Survey Paper, Information Technology, Malaysia, Volume 4 Issue 1, January 2015

Pages: 1287 - 1292

Survey on Mobile and Wireless Security Awareness: User Perspectives

Nadhirah binti Nazri, Noor Azian binti Mohamad Ali, Jamaludin Ibrahim

Share this Article

Research Paper, Information Technology, India, Volume 4 Issue 5, May 2015

Pages: 1061 - 1065

Review On design and Implementation of Enhanced Security in Multicloud Storage System Using Distributed File System

Priyanka R. Raut, Vaidehi Baporikar

Share this Article
Top