**** Absolutely no plagiarism *****
Topic : Mobile users and data security
1. A one full page single spaced paper discussing your topic.
2. A five source annotated bibliography. The sources should be high quality academic references (not techopedia or the like). The annotations for each source should include two paragraphs. The first paragraph should summarize the article and the second should be your reflections on it. Each paragraph must contain at least five sentences.
3. A PPT on Mobile users and data security with a minimum of 12 slides not including the title and references.
The abstract that we have submitted before: (Dont copy form the below)
Over the last years, technological advancement has continued to rise to create a significant change in the communication landscape. In the contemporary world, many people are linking up through the use of mobile devices by making calls, video calls and sending short messages. The estimate of mobile users in the world is about 5 billion people. Technological advancement has made the use of mobile phones to be smarter by incorporating both video and graphical materials. Improvement in technology is a result of continual research in the field.
Unlike the 1970s devices, the current mobile devices have a wide variety of features that have enabled various functions. The past was characterized by limited and costly mobile phones but the current users have increased greatly. For instance, an individual can have as many phones as he or she desires depending on the phone features and specifications. The landscape is moving all the time with new smartphones hitting the market and new features being rolled out almost weekly,” (Curran, Maynes, & Harkin, 2015). Apart from voice communication, one can use a mobile phone to send and receive emails. Due to the change in technology that has led to an increase in mobile users, security threats have been on the rise. This situation calls for security actions from information technology departments. In 2004, the first computer virus that destroyed mobile devices emerged. Since then, many security vulnerabilities followed as more smartphones emerged.
Mobile security is paramount not only to organizations but also the mobile phone users. It refers to taking initiative strategies to safeguard sensitive data that are kept in mobile devices or any other portal devices. It also involves the capability to protect the enterprise network from being manipulated by unauthorized users. Devices that are prone to mobile security threats are not only smartphones but also portal devices such as wearables, tablets and laptops. Hackers and cyber-criminals are now focusing much of their efforts on mobile platforms, often as a first step to breaking into corporate networks,” (Shaulov, 2016). Potential threats on mobile devices include unsecured WIFI networks, leakage of data, malicious apps and spyware. There are also physical threats such as losing a mobile device or getting stolen. Mobile security can be enhanced through software security, educating mobile users and having internal policies in organizations.
Furthermore, sharing of information on the internet or social media platforms poses a risk to information sabotage. It is essential to protect data and maintain data authenticity by ensuring that information is directed to the right recipient. “Considering the importance of personal privacy, people mainly only shares their information with friends and acquaintances,” (Chen & Li, 2017). Lack of data protection makes the user vulnerable to security threats. However, security threats can be managed by viewing information as always vulnerable and taking precautions to ensure that data protection is implemented. For instance, organizations and individuals that deal with critical information should prevent data loss by using backups.
Data hacking is another key security to mobile users. This malicious activity is carried out by hackers by getting access to a system and corrupt files as well as manipulating the existing data. Essential information can be lost through this activity or the files can be made to malfunction through virus infections. Thus mobile users need to exercise mobile security by updating anti-viruses to protect their devices. Other mobile security measures also include avoiding the undesired installation of a firewall and using strong passwords.
References
Chen, H., & Li, W. (2017). Mobile device users’ privacy security assurance behavior. Information and Computer Security, 25(3), 330–344. https://doi.org/10.1108/ics-04-2016-0027
Curran, K., Maynes, V., & Harkin, D. (2015). Mobile device security. International Journal of Information and Computer Security, 7(1), 1. https://doi.org/10.1504/ijics.2015.069205
Shaulov, M. (2016). Bridging mobile security gaps. Network Security, 2016(1), 5–8. https://doi.org/10.1016/s1353-4858(16)30006-x
We provide professional writing services to help you score straight A’s by submitting custom written assignments that mirror your guidelines.
Get result-oriented writing and never worry about grades anymore. We follow the highest quality standards to make sure that you get perfect assignments.
Our writers have experience in dealing with papers of every educational level. You can surely rely on the expertise of our qualified professionals.
Your deadline is our threshold for success and we take it very seriously. We make sure you receive your papers before your predefined time.
Someone from our customer support team is always here to respond to your questions. So, hit us up if you have got any ambiguity or concern.
Sit back and relax while we help you out with writing your papers. We have an ultimate policy for keeping your personal and order-related details a secret.
We assure you that your document will be thoroughly checked for plagiarism and grammatical errors as we use highly authentic and licit sources.
Still reluctant about placing an order? Our 100% Moneyback Guarantee backs you up on rare occasions where you aren’t satisfied with the writing.
You don’t have to wait for an update for hours; you can track the progress of your order any time you want. We share the status after each step.
Although you can leverage our expertise for any writing task, we have a knack for creating flawless papers for the following document types.
Although you can leverage our expertise for any writing task, we have a knack for creating flawless papers for the following document types.
From brainstorming your paper's outline to perfecting its grammar, we perform every step carefully to make your paper worthy of A grade.
Hire your preferred writer anytime. Simply specify if you want your preferred expert to write your paper and we’ll make that happen.
Get an elaborate and authentic grammar check report with your work to have the grammar goodness sealed in your document.
You can purchase this feature if you want our writers to sum up your paper in the form of a concise and well-articulated summary.
You don’t have to worry about plagiarism anymore. Get a plagiarism report to certify the uniqueness of your work.
Join us for the best experience while seeking writing assistance in your college life. A good grade is all you need to boost up your academic excellence and we are all about it.
We create perfect papers according to the guidelines.
We seamlessly edit out errors from your papers.
We thoroughly read your final draft to identify errors.
Work with ultimate peace of mind because we ensure that your academic work is our responsibility and your grades are a top concern for us!
Dedication. Quality. Commitment. Punctuality
Here is what we have achieved so far. These numbers are evidence that we go the extra mile to make your college journey successful.
We have the most intuitive and minimalistic process so that you can easily place an order. Just follow a few steps to unlock success.
We understand your guidelines first before delivering any writing service. You can discuss your writing needs and we will have them evaluated by our dedicated team.
We write your papers in a standardized way. We complete your work in such a way that it turns out to be a perfect description of your guidelines.
We promise you excellent grades and academic excellence that you always longed for. Our writers stay in touch with you via email.