Abstract
Mobile devices are becoming more sophisticated and powerful day by day, since the devices can do so much and are available at a much lower cost. They seem to be everywhere. However, because of their capabilities, they require much better management practices than users are used to. Mobile device users have had several complaints about their devices. This could have been a result of poor management or the lack of technical know-how on the use of mobile devices beyond making or receiving calls and texting. Some users imagine how mobile phones suddenly malfunction, how information on their devices is revealed to unknown people and others how they cannot make use of their phones shortly after purchase. These problems could be classified as hardware, software and user-based problems. Ruggiero and Foote (2011) observed that; Many users may consider mobile phone security to be less important than the security of their PCs, but the consequences of attacks on mobile phones can be just as severe. Malicious software can make a mobile phone a member of a network of devices that can be controlled by an attacker. The security of mobile devices has not just become important but necessary as mobile device users are vulnerable to wireless technology, device loss and ignorance of high cybercriminals. This paper seeks to address these problems through a user-friendly questionnaire to be served to sampled mobile device users, so that they can provide an understanding of the risk associated with mobile devices, provide users with knowledge of the threats associated with mobile devices, and provide users with a list of safeguards and best practices on mobile device security.
References
Mariantonietta La Polla, Fabio Martinelli & Daniele Sgandurra (2012). Survey on Security for Mobile Devices. IEEE Communications Surveys & Tutorials.
Mehrnezhad M. (2017). Stealing plus via mobile sensors: Actual risk versus user perception. International Journal of Information Security.
Berend D, Jungk B & Bhasin S. (2017). There goes your PIN: Exploiting Smartphone & sensor fusion and single and cross-user settings. Cryptology e-prints Archive.
Edim, Azom Emmanuel & Kayang, Justin Kanung (2017). A Mobile Application for Critical Environmental Situation Management. International Journal of Engineering Research and Allied Sciences (IJERAS) ISSN :
Woongryul Jeon, Jeeyeon Kim, Youngsook Lee, & Dongho Won. (2010). National Research Foundation of Korea (NRF); School of Information and Communication Engineering, Sungkyunkwan University, Korea.
Brain K. William & Stacy W. Sawyer (2011). Using Information Technology – A practical guide to computers and communication. McGraw-Hill, New York.
Larry G. Wlosinski (2016). Mobile Device Security: Threats, Governance, and Safeguards. CIO Council: Government Mobile and Wireless Security Baseline
Urban J. M., Hoofnagle C. J. and Su Li. (2012): Mobile Phones and Privacy. Berkeley Consumer Privacy Survey BCLT Research Paper.
Lei Zhang (2009). Mobile Security Threats and Issues -- A Broad Overview of Mobile Device Security. Tianjin University, Tianjin, China.
Paul Ruggiero & Jon Foote (2011). Cyber Threats to Mobile Phones, United States Computer Emergency Readiness Team, US-CERT. Carnegie Mellon University, US.
Yair Amit & Adi Sharabani (2014). Mobile Security Attacks: A Glimpse From the Trenches.RSA Conference 2014, Asia Pacific and Japan.
Bryant, P., Furnell, S., & Phippen, A. (2008). Improving protection and security awareness amongst home users. Advances in Networks, Computing and Communications.
Paul van Kessel & Jay Layman (2012). Mobile device security: Understanding vulnerabilities and managing risks. Insights on governance, risk and compliance. Ernst & Young EYGM Limited America.
Palen Leysia, Marilyn Salzman & Ed Youngs (2000). Going Wireless: Behavior & Practice of New Mobile Phone Users: University of Colorado, Boulder.
Busse, B., & Fuchs, M. (2013). Prevalence of Cell Phone Sharing. Survey Methods: Insights from the Field.
Poynter, R. 2015. The Utilization of Mobile Technology and Approaches in Commercial Market Research.
Mulliner Collin Richard (2017). Security of Smart Phones Master's Degree Thesis in Computer Science; University Of California, Santa Barbara.
Aaron Smith (2012). The Best (and Worst) of Mobile Connectivity; Pew Research Center’s Internet & American Life Project. Washington, D.C. http://pewinternet.org/Reports/2012/Best-Worst-Mobile.
Billieux, J. (2012). Problematic use of the mobile phone: a literature review and a pathways model. Current Psychiatry Reviews, 8 (4), 299

This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.
Copyright (c) 2026 Author
