Abstract

The number of mobile devices that are getting connected to the Internet is on the rise and interconnectivity has brought together billions of devices in the cyber-sphere. The chapter focuses on security and privacy of mobile devices and systems for identifying security and privacy issues as well as the current measures of detecting and preventing such issues. The systematic review methodology will rely on the PRISMA checklist and flowchart to include and exclude papers in the review process. However, given the nature and debates around privacy and security in mobile systems, the search will be conducted in several databases which Digital library IEEE Xplore, Digital Library ACM, and the DBLP Computer Science Bibliography besides ProQuest Central and EBSCO. Given the number of databases that will be used to search for the articles, PICO will be used to prepare search strings and queries implemented in the databases. The results of the search will include descriptive statistics including distribution of articles per journal and year of publication as well as qualitative analysis of thematic areas emerging from the search string results. Finally, the findings and discussions will illuminate the problems identified, measures, and development in the provision of security and privacy in mobile systems. Probable research gaps and considerations for future studies will also be included in the conclusion section.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call