International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 112 | Views: 307

Survey Paper | Information Technology | Ghana | Volume 9 Issue 4, April 2020 | Popularity: 6.8 / 10


     

Analysis of the Security Threat and Vulnerability of Smartphone use among Tertiary Students in Ghana

Issah Bala Abdulai, Abu Sulemana


Abstract: The study was to find out the extent at which tertiary students in Ghana use Smartphone, and to examine the level of awareness regarding security risks that accompany the use of smartphones among tertiary students. A cross-sectional survey design was employed to collect data in four tertiary institutions. Data was collected from 150 tertiary students. These tertiary students were randomly sampled during visits to the various institutions. Data was gathered through questionnaire for all participants. The data was analysed using frequency counts and percentages to answer research questions. The results indicated that, generally, most tertiary students in Ghana use android operating system smartphones. Besides, some of the tertiary students are not aware of the security threat and vulnerability that affect their smartphones. Furthermore, majority of the tertiary students in Ghana do not do enough to protect their smartphone from being attacked. Finally, the study suggests a training programme to equip the tertiary students to manage the threat efficiently.


Keywords: Smartphone, Security Risk, Information Security, Operating System, Vulnerability


Edition: Volume 9 Issue 4, April 2020


Pages: 1643 - 1647



Make Sure to Disable the Pop-Up Blocker of Web Browser




Text copied to Clipboard!
Issah Bala Abdulai, Abu Sulemana, "Analysis of the Security Threat and Vulnerability of Smartphone use among Tertiary Students in Ghana", International Journal of Science and Research (IJSR), Volume 9 Issue 4, April 2020, pp. 1643-1647, URL: https://www.ijsr.net/getabstract.php?paperid=SR20419140549, DOI: https://www.doi.org/10.21275/SR20419140549



Downloads: 357 | Views: 1001

Information Technology, Ghana, Volume 8 Issue 6, June 2019

Pages: 64 - 69

The Use of Information and Communication Technology (ICT) in Teaching and Learning of Mathematics in Al-Faruq College of Education, Wenchi-Ghana

Abu Sulemana, Yahuza Abdul-Kadir


Downloads: 301 | Views: 558

Information Technology, India, Volume 8 Issue 1, January 2019

Pages: 456 - 460

Analysis of Blockchain and its Working Principle

S. Banupriya, G. Renuka Devi


Downloads: 266 | Views: 407

Information Technology, China, Volume 9 Issue 1, January 2020

Pages: 107 - 112

Network Optimization using Multi-Agent Genetic Algorithm

Sikandar Hanif


Downloads: 260 | Views: 471

Information Technology, Malaysia, Volume 8 Issue 1, January 2019

Pages: 64 - 70

University of the Future (UotF): Redesign Business Model for Local University in Malaysia through Humanising Education and 4IR

Nor Zaiasron Bin Yahaya, Abdul Rahman Bin Ahmad Dahlan


Downloads: 254 | Views: 418

Information Technology, India, Volume 9 Issue 1, January 2020

Pages: 477 - 479

IoT Based Smart Street Light for Energy Efficiency and Safety

Tanmay Patil, Arjun Ramendra


Top