Final Research Topic - Edited
Final Research Topic - Edited
devices
Instructor name
Institutional affiliation
I hereby certify that I am the author of this document and that any information derived from
different literature materials in the preparation of this assignment has been fully acknowledged in
the text and a list of references provided. No part of this work has been previously presented in
Research Topic
devices
Introduction
Through the development of mobile devices, technological growth has improved communication
(Lang & Jarvenpaa, 2005). The usage of mobile devices for numerous applications, including
online shopping, Internet banking, navigation, and mobile media, has brought about tremendous
Literature Review
Although the "Go Mobile" trend offers customers ease and flexibility, their sensitive data on
mobile devices could be compromised (Wang et al., 2020). By unlocking mobile devices, a foe
could gain access to the delicate private information kept within. As a result, the user's mobile
services and applications are vulnerable to security risks. For instance, the attacker (hackers)
might exploit the user's mobile device to engage in prohibited behavior (e.g., making online
transactions and installing malware). Due to the possibility of their personal information being
compromised by unauthorized access, whether through hacking or the loss of their mobile
device, users must consequently continually worry about security and privacy.
authentication, and physiological biometric authentication techniques for mobile device users.
3
Additionally, it concentrates on the security and privacy safeguards for mobile devices rather
My research will evaluate the significance of mobile device user authentication as a safeguard
for users' private information and as a means of preventing unauthorized access to their devices.
To do this, I will evaluate the current mobile device authentication methods, paying close
authentication, and physiological biometric authentication. In addition, I'll evaluate the usability
and security of the current authentication techniques and review the attacks that have been made
The security industry can benefit from my research study's addition of knowledge to the body of
literature because it aims to address the problem of user authentication methods breaching the
security and privacy of mobile devices by examining the applicability, risks, and emerging trends
This research study's general objective will be to assess the significance of user authentication on
2. An assessment of the current user authentication methods' usability and security levels
Study parameters
The security of mobile devices will be the dependent variable in my study, with knowledge-
Only three primary user authentication techniques will be the focus of my research study:
Ethics-Related considerations
My research project will abide by ethical principles with an emphasis on informed consent, and
any information obtained about them for this study will be handled in the strictest confidence.
Research Methodology
To achieve the goal of this study, I will conduct a descriptive survey on a population sample size
of 50–100 Texas State residents. To gather primary data, I will use a combination of physical
questionnaires, online questionnaires, and physical interviews. Both open-ended and closed-
5
ended questions will be included in the questionnaire's structure. After gathering the information,
I will use the SPSS program to analyze it and ascertain the correlation between each independent
variable and the dependent variable. Finally, I'll use a bar chart to illustrate the information
Reference List
Chen Wang, Yan Wang, Yingying Chen, Hongbo Liu, and Jian Liu. (2020, Apr 7 th). User
https://www.sciencedirect.com/science/article/abs/pii/S1389128618312799?fr=RR-
2&ref=pdf_download&rr=76141f20eec1b195
Lang, K. R., & Jarvenpaa, S. (2005). Managing the paradoxes of mobile technology. Information