Chapter 4 Dissertation - Security issues with third-party applications personal

Question # 00819149 Posted By: wildcraft Updated on: 02/15/2022 10:56 PM Due on: 02/16/2022
Subject Education Topic General Education Tutorials:
Question
Dot Image

Chapter 4 Dissertation (Only IT and Computer science experienced person should contact me)

Topic name: Security issues with third-party applications personal use

This Dissertation collects data by doing a online survey related to security concerns and risks associated with third-party applications to identify and classify the primary security and privacy concerns in third-party applications. A methodology frequently describes the method utilized to gather information from accessible sources. Analyzing and identifying the risks and security issues and understanding better how the third-party applications can securely be utilized. This study focused on data privacy and protection in third-party applications by quantitative analysis and identifying and classifying third-party applications' security concerns.

The purpose of this quantitative analysis study is to explore security concerns with third-party applications. Many users adopt third-party applications on their smartphones and personal computers for personal use.

Chapter Four

Research Findings

1 Introduction

Indent each new paragraph. Write your next section here.

2 Participants and Research Setting

Indent each new paragraph. Write your next section here. Include the number of participants (N=) and provide specifics about the surveyed sample population. (Perform survey check page 3)

Do not include the names of any schools, businesses, or institutions for confidentiality reasons. The use of an alternative format to identify the organization. Options such as the general geographical location (School district in the Southeast, Organization A, Organization B, or other appropriate alternative formats should be used.

3 Analyses of Research Questions

Indent each new paragraph. Write your next section here. List and number research questions one at a time. You should address each question with its own level three heading.

Research Question 1. What is the perceived usability of Third-party applications among smart device users?

Research Question 2. Can smart device users trust in a third-party security applications security functionality have a significant negative impact on the user's privacy?

Research Question 3. Can smart device user's trust in a third-party security applications security functionality have a significant positive impact on the user's privacy?

Use italics for letters used as statistical symbols or algebraic variables (e.g., contained 587 t-test p values; R2 = .12). Report exact p values to two or three decimals (e.g., p = .006, p = .03). However, report p values less than .001 as “p < .001.”

Consult the Numbers and Statistics Guide from American Psychological Association for additional guidance. Consult the Tables and Figures section from APA Style for guidelines and examples of tables and figures.

5 Supplementary Findings

 

Indent each new paragraph. Write your next section here.

6. Statistical Test

7 Summary

Indent each new paragraph. Write your next section here. Summarize your results and provide a transition to Chapter Four.

8. Survey Questions:

1. I intend to download and use a free third-party security application

2. I am willing to download and use a free third-party security app on my smart devices

3. If my smartphone or tablet is lost, my privacy information could be exposed to others.

4. If my smartphone or tablet is lost, my life and work will be interrupted by the loss of information.

5. I believe that free third-party security apps are becoming more and more functional.

6. I believe that free third-party security apps are critical for smart devices.

7. I believe the operating system of my smart device is good at information security.

8. I believe that the operating system on my smart device is capable of keeping my information secure.

9. I believe that free third-party security apps in the market can protect my information as they promised.

10. I trust the functionality of free third-party security apps in information protection.

Dot Image
Tutorials for this Question
  1. Tutorial # 00814488 Posted By: wildcraft Posted on: 02/15/2022 10:57 PM
    Puchased By: 2
    Tutorial Preview
    The solution of Chapter 4 Dissertation - Security issues with third-party applications personal...
    Attachments
    Chapter_4_Dissertation_-_Security_issues_with_third-party_applications_personal.ZIP (18.96 KB)

Great! We have found the solution of this question!

Whatsapp Lisa