Downloads: 112 | Views: 307
Survey Paper | Information Technology | Ghana | Volume 9 Issue 4, April 2020 | Popularity: 6.8 / 10
Analysis of the Security Threat and Vulnerability of Smartphone use among Tertiary Students in Ghana
Issah Bala Abdulai, Abu Sulemana
Abstract: The study was to find out the extent at which tertiary students in Ghana use Smartphone, and to examine the level of awareness regarding security risks that accompany the use of smartphones among tertiary students. A cross-sectional survey design was employed to collect data in four tertiary institutions. Data was collected from 150 tertiary students. These tertiary students were randomly sampled during visits to the various institutions. Data was gathered through questionnaire for all participants. The data was analysed using frequency counts and percentages to answer research questions. The results indicated that, generally, most tertiary students in Ghana use android operating system smartphones. Besides, some of the tertiary students are not aware of the security threat and vulnerability that affect their smartphones. Furthermore, majority of the tertiary students in Ghana do not do enough to protect their smartphone from being attacked. Finally, the study suggests a training programme to equip the tertiary students to manage the threat efficiently.
Keywords: Smartphone, Security Risk, Information Security, Operating System, Vulnerability
Edition: Volume 9 Issue 4, April 2020
Pages: 1643 - 1647
Make Sure to Disable the Pop-Up Blocker of Web Browser
Downloads: 357 | Views: 1001
Information Technology, Ghana, Volume 8 Issue 6, June 2019
Pages: 64 - 69The Use of Information and Communication Technology (ICT) in Teaching and Learning of Mathematics in Al-Faruq College of Education, Wenchi-Ghana
Abu Sulemana, Yahuza Abdul-Kadir
Downloads: 301 | Views: 558
Information Technology, India, Volume 8 Issue 1, January 2019
Pages: 456 - 460Analysis of Blockchain and its Working Principle
S. Banupriya, G. Renuka Devi
Downloads: 266 | Views: 407
Information Technology, China, Volume 9 Issue 1, January 2020
Pages: 107 - 112Network Optimization using Multi-Agent Genetic Algorithm
Sikandar Hanif
Downloads: 260 | Views: 471
Information Technology, Malaysia, Volume 8 Issue 1, January 2019
Pages: 64 - 70University of the Future (UotF): Redesign Business Model for Local University in Malaysia through Humanising Education and 4IR
Nor Zaiasron Bin Yahaya, Abdul Rahman Bin Ahmad Dahlan
Downloads: 254 | Views: 418
Information Technology, India, Volume 9 Issue 1, January 2020
Pages: 477 - 479IoT Based Smart Street Light for Energy Efficiency and Safety
Tanmay Patil, Arjun Ramendra