Affiliation:
1. Capitol Technology University , Laurel , United States
Abstract
Abstract
This study examines the growth of mobile technology usage and the increasing cybersecurity threats that come with it, with over 3.8 billion users globally. The paper reviews existing research on mobile technology security, highlighting a surge in cybersecurity incidents, and identifies patterns, user behaviors, and technological gaps that exacerbate security risks. By providing a more nuanced understanding of mobile technology’s security challenges, this paper contributes to developing more effective protection strategies to ensure users’ safety in the digital domain.
Reference34 articles.
1. Al-Khateeb, S., & Agarwal, N. (2016). The rise & fall of #NoBackDoor on Twitter: The apple vs. FBI case. 2016 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM). Available at: https://doi.org/10.1109/asonam.2016.7752334.
2. Almansoori, A., Al-Emran, M., & Shaalan, K. (2023). Exploring the frontiers of cybersecurity behavior: A systematic review of studies and theories. Applied Sciences, Vol. 13, Issue 9, 5700. Available at: https://doi.org/10.3390/app13095700.
3. Arksey, H., & O’Malley, L. (2005). Scoping studies: towards a methodological framework. International Journal of Social Research Methodology, Vol. 8, Issue 1, 19-32.
4. Asefa, A., et al. (2022). Does the perception of HIV risk among female sex workers affect HIV prevention behavior? Application of the Health Belief Model (H.B.M.). BMC Public Health, Vol. 22, 1-10. Available at: https://doi.org/10.1186/s12889-022-14046-3.
5. Black, L., Scala, N.M., Goethals, P.L., & Howard, J. (2018). Values and trends in cybersecurity. In Proceedings of the Institute of Industrial and Systems Engineering Conference. 1820-1825. Orlando, FL: Institute of Industrial and Systems Engineers.