0% found this document useful (0 votes)
25 views6 pages

Final Research Topic - Edited

This document outlines a proposed research study on the significance of user authentication methods for securing mobile devices. The study will evaluate three primary authentication methods: knowledge-based authentication, two-factor authentication, and physiological biometric authentication. The objectives are to assess the usability, security levels, threats, and future trends of current authentication techniques. A survey of 50-100 people will be conducted to collect data, which will then be analyzed using SPSS to correlate authentication methods with mobile device security. The findings will provide conclusions on how authentication impacts the security of sensitive user information on mobile devices.

Uploaded by

Abednego Alii
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
25 views6 pages

Final Research Topic - Edited

This document outlines a proposed research study on the significance of user authentication methods for securing mobile devices. The study will evaluate three primary authentication methods: knowledge-based authentication, two-factor authentication, and physiological biometric authentication. The objectives are to assess the usability, security levels, threats, and future trends of current authentication techniques. A survey of 50-100 people will be conducted to collect data, which will then be analyzed using SPSS to correlate authentication methods with mobile device security. The findings will provide conclusions on how authentication impacts the security of sensitive user information on mobile devices.

Uploaded by

Abednego Alii
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 6

1

An assessment of the significance of user authentication methods on the security of mobile

devices

Instructor name

Institutional affiliation

I hereby certify that I am the author of this document and that any information derived from

different literature materials in the preparation of this assignment has been fully acknowledged in

the text and a list of references provided. No part of this work has been previously presented in

any other institution for any academic award.

Name…………………………… Sign……………………… Date…………………………..


2

Research Topic

An assessment of the significance of user authentication methods on the security of mobile

devices

Introduction

Through the development of mobile devices, technological growth has improved communication

(Lang & Jarvenpaa, 2005). The usage of mobile devices for numerous applications, including

online shopping, Internet banking, navigation, and mobile media, has brought about tremendous

convenience in addition to using these devices for communication.

Literature Review

Although the "Go Mobile" trend offers customers ease and flexibility, their sensitive data on

mobile devices could be compromised (Wang et al., 2020). By unlocking mobile devices, a foe

could gain access to the delicate private information kept within. As a result, the user's mobile

services and applications are vulnerable to security risks. For instance, the attacker (hackers)

might exploit the user's mobile device to engage in prohibited behavior (e.g., making online

transactions and installing malware). Due to the possibility of their personal information being

compromised by unauthorized access, whether through hacking or the loss of their mobile

device, users must consequently continually worry about security and privacy.

The Study's Purpose

My study focuses on the three primary knowledge-based authentication, two-factor

authentication, and physiological biometric authentication techniques for mobile device users.
3

Additionally, it concentrates on the security and privacy safeguards for mobile devices rather

than other electronic equipment like computers.

Significance of the Study

My research will evaluate the significance of mobile device user authentication as a safeguard

for users' private information and as a means of preventing unauthorized access to their devices.

To do this, I will evaluate the current mobile device authentication methods, paying close

attention to three fundamental methods: knowledge-based authentication, two-factor

authentication, and physiological biometric authentication. In addition, I'll evaluate the usability

and security of the current authentication techniques and review the attacks that have been made

against them to identify their weaknesses.

Relevance of the Study

The security industry can benefit from my research study's addition of knowledge to the body of

literature because it aims to address the problem of user authentication methods breaching the

security and privacy of mobile devices by examining the applicability, risks, and emerging trends

in mobile device user authentication.

Objectives of the study

This research study's general objective will be to assess the significance of user authentication on

the security of mobile devices.

The specific goals of this research study will be;


4

1. An assessment of several user authentication security methods for mobile devices

2. An assessment of the current user authentication methods' usability and security levels

3. An assessment of the current user authentication methods on mobile devices threats

4. An assessment of the prediction of user authentication patterns for mobile devices.

Study parameters

The security of mobile devices will be the dependent variable in my study, with knowledge-

based authentication, two-factor authentication, and physiological biometric authentication

serving as the independent variables.

Limitations of the research

Only three primary user authentication techniques will be the focus of my research study:

knowledge-based authentication (passwords and lock patterns), two-factor authentication, and

physiological biometric authentication (fingerprint and iris).

Ethics-Related considerations

My research project will abide by ethical principles with an emphasis on informed consent, and

any information obtained about them for this study will be handled in the strictest confidence.

Research Methodology

To achieve the goal of this study, I will conduct a descriptive survey on a population sample size

of 50–100 Texas State residents. To gather primary data, I will use a combination of physical

questionnaires, online questionnaires, and physical interviews. Both open-ended and closed-
5

ended questions will be included in the questionnaire's structure. After gathering the information,

I will use the SPSS program to analyze it and ascertain the correlation between each independent

variable and the dependent variable. Finally, I'll use a bar chart to illustrate the information

before reaching some valuable conclusions.


6

Reference List

Chen Wang, Yan Wang, Yingying Chen, Hongbo Liu, and Jian Liu. (2020, Apr 7 th). User

authentication on mobile devices: Approaches, threats, and trends. Retrieved from;

https://www.sciencedirect.com/science/article/abs/pii/S1389128618312799?fr=RR-

2&ref=pdf_download&rr=76141f20eec1b195

Lang, K. R., & Jarvenpaa, S. (2005). Managing the paradoxes of mobile technology. Information

systems management, 22(4), 7-23.

You might also like