SlideShare a Scribd company logo
1 of 14
Smartphone
and
Security
Members:
Siu Sin Yung (15215822)
Kwong Shuk Ngan (15220680)
Lee Yu (15221407)
11/26/2015
Contents
Introduction of
smartphone &
security
problems
Survey Result Video Conclusion Job Division
Introduction
• A smartphone is an advanced gadget
• Different functions
(e.g. instant messaging, games, video-calling etc.)
• People also store important information in smartphones
(e.g. photos, credit card details etc.)
• To safeguard these information, there are different security locks
(e.g. number lock, fingerprint lock etc.)
Mind Map
Online survey
• Target:
Smartphone owners
• Aim:
To find out if smartphone owners have
awareness of smartphone security and
their uses of smartphones
• Sample size:
30 people (Female: 12, Male: 15)
• http://goo.gl/forms/wLTNFfeivK
Survey Result
4.4
4.6
4.8
5
5.2
5.4
5.6
5.8
6
6.2
1 2 3 4 5
I think the security level of my smartphone is:
Security level(1=very good, 5=very poor)
Survey Result
0
5
10
15
20
25
log out the account anti-virus software no reading the
permission details
Would you log out the account/ having anti-virus software/ download
materials without reading the permission details?
Yes
No
Survey Result
14.3
35.7
50 50 50
7.1
92.9
44.4 44.4
11.1
44.4
55.6
75
25
298302 293i0w 29#3b3 Yes(TP) No(TP) Yes(SS) No(SS)
Sense of security of Male and Female
Male(%)
Female(%)
TP= Telling others passwords
SS= Setting security
Percentage%
Survey Result
Number lock
39%
Voice lock
5%
Fingerprint lock
32%
PIN lock
24%
Other
0%
28.95%
Which of the following type(s) of lock do you use?
Result Analysis
• Smartphone owners believe that their
smartphones are highly secured
• Most of the users are not fully aware
of their phone security
(female is better than male)
• Number lock & fingerprint lock are
more commonly used.
Video
Conclusion
• Smartphones and security locks
(e.g. number locks) are commonly used.
• A lot of people lack knowledge or
awareness of phone security.
• People should learn how to secure their
smartphones better in order to prevent
others from invading their privacy.
Job Division
• Mind map: Siu Sin Yung, Lee Yu
• Survey: Siu Sin Yung, Kwong Shuk Ngan, Lee Yu
• Excel: Siu Sin Yung
• PowerPoint: Siu Sin Yung, Kwong Shuk Ngan, Lee Yu
• Prezi: Kwong Shuk Ngan
Smartphone & Security

More Related Content

Viewers also liked

anti theft vehicular security system
anti theft vehicular security systemanti theft vehicular security system
anti theft vehicular security systemAkshay Gaikwad
 
Steering india to a cashless economy
Steering india to a cashless economySteering india to a cashless economy
Steering india to a cashless economyVarsha Sutrave
 
My seminar ppt SPACE MOUSE
My seminar ppt  SPACE MOUSEMy seminar ppt  SPACE MOUSE
My seminar ppt SPACE MOUSESudeep Kumar
 
Cashless Powerpoint
Cashless PowerpointCashless Powerpoint
Cashless Powerpointguest6faf386
 
PPT Presentation on Facebook.com
PPT Presentation on Facebook.comPPT Presentation on Facebook.com
PPT Presentation on Facebook.comKrishan Majumder
 
Advantages and Disadvantages of Facebook
Advantages and Disadvantages of FacebookAdvantages and Disadvantages of Facebook
Advantages and Disadvantages of Facebookchintanchheda
 
2015 Mobile Security Trends: Are You Ready?
2015 Mobile Security Trends: Are You Ready?2015 Mobile Security Trends: Are You Ready?
2015 Mobile Security Trends: Are You Ready?IBM Security
 
Final ppt
Final pptFinal ppt
Final pptpramada
 
Facebook Powerpoint
Facebook PowerpointFacebook Powerpoint
Facebook Powerpointmyra14
 

Viewers also liked (17)

anti theft vehicular security system
anti theft vehicular security systemanti theft vehicular security system
anti theft vehicular security system
 
SMART Vehicle Secure PPT
SMART Vehicle Secure PPTSMART Vehicle Secure PPT
SMART Vehicle Secure PPT
 
Steering india to a cashless economy
Steering india to a cashless economySteering india to a cashless economy
Steering india to a cashless economy
 
Facebook thrift
Facebook thriftFacebook thrift
Facebook thrift
 
Smartphone security issues
Smartphone security issuesSmartphone security issues
Smartphone security issues
 
Space Mouse
Space MouseSpace Mouse
Space Mouse
 
Social issues
Social issuesSocial issues
Social issues
 
My seminar ppt SPACE MOUSE
My seminar ppt  SPACE MOUSEMy seminar ppt  SPACE MOUSE
My seminar ppt SPACE MOUSE
 
Cashless Powerpoint
Cashless PowerpointCashless Powerpoint
Cashless Powerpoint
 
Pill camera
Pill cameraPill camera
Pill camera
 
PPT Presentation on Facebook.com
PPT Presentation on Facebook.comPPT Presentation on Facebook.com
PPT Presentation on Facebook.com
 
Social problems
Social problemsSocial problems
Social problems
 
Advantages and Disadvantages of Facebook
Advantages and Disadvantages of FacebookAdvantages and Disadvantages of Facebook
Advantages and Disadvantages of Facebook
 
2015 Mobile Security Trends: Are You Ready?
2015 Mobile Security Trends: Are You Ready?2015 Mobile Security Trends: Are You Ready?
2015 Mobile Security Trends: Are You Ready?
 
Project ppt
Project pptProject ppt
Project ppt
 
Final ppt
Final pptFinal ppt
Final ppt
 
Facebook Powerpoint
Facebook PowerpointFacebook Powerpoint
Facebook Powerpoint
 

Similar to Smartphone & Security

Gcit project mobile phone
Gcit project mobile phone Gcit project mobile phone
Gcit project mobile phone Kayan To
 
Fingerprint technology in our lives
Fingerprint technology in our livesFingerprint technology in our lives
Fingerprint technology in our livescodykong
 
Fingerprint Recognition System
Fingerprint Recognition SystemFingerprint Recognition System
Fingerprint Recognition System123456chan
 
Passwordless is Possible - How to Remove Passwords and Improve Security
Passwordless is Possible - How to Remove Passwords and Improve Security Passwordless is Possible - How to Remove Passwords and Improve Security
Passwordless is Possible - How to Remove Passwords and Improve Security SecureAuth
 
Fingerprint Recognition System
Fingerprint Recognition SystemFingerprint Recognition System
Fingerprint Recognition Systemchristywong1234
 
GCIT1015 Smartphones
GCIT1015 SmartphonesGCIT1015 Smartphones
GCIT1015 Smartphones16224027
 
F-LOCKER: An Android Face Recognition Applocker Using Local Binary Pattern Hi...
F-LOCKER: An Android Face Recognition Applocker Using Local Binary Pattern Hi...F-LOCKER: An Android Face Recognition Applocker Using Local Binary Pattern Hi...
F-LOCKER: An Android Face Recognition Applocker Using Local Binary Pattern Hi...IJCSIS Research Publications
 
Cyber Defense Matrix: Revolutions
Cyber Defense Matrix: RevolutionsCyber Defense Matrix: Revolutions
Cyber Defense Matrix: RevolutionsSounil Yu
 
Security Awareness Training by HIMSS Louisiana Chapter
Security Awareness Training by HIMSS Louisiana ChapterSecurity Awareness Training by HIMSS Louisiana Chapter
Security Awareness Training by HIMSS Louisiana ChapterAtlantic Training, LLC.
 
Best Effort Security Testing for Mobile Applications - 2015 #ISC2CONGRESS
Best Effort Security Testing for Mobile Applications -  2015 #ISC2CONGRESSBest Effort Security Testing for Mobile Applications -  2015 #ISC2CONGRESS
Best Effort Security Testing for Mobile Applications - 2015 #ISC2CONGRESSLostar
 
Venkat Sastry talking on MoLE Project A Global Technology Initiative
Venkat Sastry talking on MoLE ProjectA Global Technology InitiativeVenkat Sastry talking on MoLE ProjectA Global Technology Initiative
Venkat Sastry talking on MoLE Project A Global Technology InitiativeeAssessment in Practice Symposium
 
W01 Levent Gurses X
W01 Levent Gurses XW01 Levent Gurses X
W01 Levent Gurses XMovel
 
Usability vs. Security: Find the Right Balance in Mobile Apps
Usability vs. Security: Find the Right Balance in Mobile AppsUsability vs. Security: Find the Right Balance in Mobile Apps
Usability vs. Security: Find the Right Balance in Mobile AppsJosiah Renaudin
 
Symantec Webinar | National Cyber Security Awareness Month: Secure IT
Symantec Webinar | National Cyber Security Awareness Month: Secure ITSymantec Webinar | National Cyber Security Awareness Month: Secure IT
Symantec Webinar | National Cyber Security Awareness Month: Secure ITSymantec
 
Demonstrating Information Security Program Effectiveness
Demonstrating Information Security Program EffectivenessDemonstrating Information Security Program Effectiveness
Demonstrating Information Security Program EffectivenessDoug Copley
 
Using mobile devices in adult education
Using mobile devices in adult educationUsing mobile devices in adult education
Using mobile devices in adult educationNell Eckersley
 
Webinar - Keep Your Connected Nonprofit or Library Secure - 2015-10-01
Webinar - Keep Your Connected Nonprofit or Library Secure - 2015-10-01Webinar - Keep Your Connected Nonprofit or Library Secure - 2015-10-01
Webinar - Keep Your Connected Nonprofit or Library Secure - 2015-10-01TechSoup
 

Similar to Smartphone & Security (20)

Gcit project mobile phone
Gcit project mobile phone Gcit project mobile phone
Gcit project mobile phone
 
Fingerprint technology in our lives
Fingerprint technology in our livesFingerprint technology in our lives
Fingerprint technology in our lives
 
Group 4
Group 4Group 4
Group 4
 
Group 4
Group 4Group 4
Group 4
 
Fingerprint Recognition System
Fingerprint Recognition SystemFingerprint Recognition System
Fingerprint Recognition System
 
Passwordless is Possible - How to Remove Passwords and Improve Security
Passwordless is Possible - How to Remove Passwords and Improve Security Passwordless is Possible - How to Remove Passwords and Improve Security
Passwordless is Possible - How to Remove Passwords and Improve Security
 
Fingerprint Recognition System
Fingerprint Recognition SystemFingerprint Recognition System
Fingerprint Recognition System
 
GCIT1015 Smartphones
GCIT1015 SmartphonesGCIT1015 Smartphones
GCIT1015 Smartphones
 
F-LOCKER: An Android Face Recognition Applocker Using Local Binary Pattern Hi...
F-LOCKER: An Android Face Recognition Applocker Using Local Binary Pattern Hi...F-LOCKER: An Android Face Recognition Applocker Using Local Binary Pattern Hi...
F-LOCKER: An Android Face Recognition Applocker Using Local Binary Pattern Hi...
 
Cyber Defense Matrix: Revolutions
Cyber Defense Matrix: RevolutionsCyber Defense Matrix: Revolutions
Cyber Defense Matrix: Revolutions
 
Security Awareness Training by HIMSS Louisiana Chapter
Security Awareness Training by HIMSS Louisiana ChapterSecurity Awareness Training by HIMSS Louisiana Chapter
Security Awareness Training by HIMSS Louisiana Chapter
 
Best Effort Security Testing for Mobile Applications - 2015 #ISC2CONGRESS
Best Effort Security Testing for Mobile Applications -  2015 #ISC2CONGRESSBest Effort Security Testing for Mobile Applications -  2015 #ISC2CONGRESS
Best Effort Security Testing for Mobile Applications - 2015 #ISC2CONGRESS
 
Venkat Sastry talking on MoLE Project A Global Technology Initiative
Venkat Sastry talking on MoLE ProjectA Global Technology InitiativeVenkat Sastry talking on MoLE ProjectA Global Technology Initiative
Venkat Sastry talking on MoLE Project A Global Technology Initiative
 
W01 Levent Gurses X
W01 Levent Gurses XW01 Levent Gurses X
W01 Levent Gurses X
 
Usability vs. Security: Find the Right Balance in Mobile Apps
Usability vs. Security: Find the Right Balance in Mobile AppsUsability vs. Security: Find the Right Balance in Mobile Apps
Usability vs. Security: Find the Right Balance in Mobile Apps
 
Symantec Webinar | National Cyber Security Awareness Month: Secure IT
Symantec Webinar | National Cyber Security Awareness Month: Secure ITSymantec Webinar | National Cyber Security Awareness Month: Secure IT
Symantec Webinar | National Cyber Security Awareness Month: Secure IT
 
Demonstrating Information Security Program Effectiveness
Demonstrating Information Security Program EffectivenessDemonstrating Information Security Program Effectiveness
Demonstrating Information Security Program Effectiveness
 
FET3_BA.pptx
FET3_BA.pptxFET3_BA.pptx
FET3_BA.pptx
 
Using mobile devices in adult education
Using mobile devices in adult educationUsing mobile devices in adult education
Using mobile devices in adult education
 
Webinar - Keep Your Connected Nonprofit or Library Secure - 2015-10-01
Webinar - Keep Your Connected Nonprofit or Library Secure - 2015-10-01Webinar - Keep Your Connected Nonprofit or Library Secure - 2015-10-01
Webinar - Keep Your Connected Nonprofit or Library Secure - 2015-10-01
 

Recently uploaded

How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusZilliz
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native ApplicationsWSO2
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Victor Rentea
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Zilliz
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxRemote DBA Services
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfOrbitshub
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxRustici Software
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...apidays
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDropbox
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...apidays
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Bhuvaneswari Subramani
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...Zilliz
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Zilliz
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MIND CTI
 

Recently uploaded (20)

How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 

Smartphone & Security

  • 1. Smartphone and Security Members: Siu Sin Yung (15215822) Kwong Shuk Ngan (15220680) Lee Yu (15221407) 11/26/2015
  • 3. Introduction • A smartphone is an advanced gadget • Different functions (e.g. instant messaging, games, video-calling etc.) • People also store important information in smartphones (e.g. photos, credit card details etc.) • To safeguard these information, there are different security locks (e.g. number lock, fingerprint lock etc.)
  • 5. Online survey • Target: Smartphone owners • Aim: To find out if smartphone owners have awareness of smartphone security and their uses of smartphones • Sample size: 30 people (Female: 12, Male: 15) • http://goo.gl/forms/wLTNFfeivK
  • 6. Survey Result 4.4 4.6 4.8 5 5.2 5.4 5.6 5.8 6 6.2 1 2 3 4 5 I think the security level of my smartphone is: Security level(1=very good, 5=very poor)
  • 7. Survey Result 0 5 10 15 20 25 log out the account anti-virus software no reading the permission details Would you log out the account/ having anti-virus software/ download materials without reading the permission details? Yes No
  • 8. Survey Result 14.3 35.7 50 50 50 7.1 92.9 44.4 44.4 11.1 44.4 55.6 75 25 298302 293i0w 29#3b3 Yes(TP) No(TP) Yes(SS) No(SS) Sense of security of Male and Female Male(%) Female(%) TP= Telling others passwords SS= Setting security Percentage%
  • 9. Survey Result Number lock 39% Voice lock 5% Fingerprint lock 32% PIN lock 24% Other 0% 28.95% Which of the following type(s) of lock do you use?
  • 10. Result Analysis • Smartphone owners believe that their smartphones are highly secured • Most of the users are not fully aware of their phone security (female is better than male) • Number lock & fingerprint lock are more commonly used.
  • 11. Video
  • 12. Conclusion • Smartphones and security locks (e.g. number locks) are commonly used. • A lot of people lack knowledge or awareness of phone security. • People should learn how to secure their smartphones better in order to prevent others from invading their privacy.
  • 13. Job Division • Mind map: Siu Sin Yung, Lee Yu • Survey: Siu Sin Yung, Kwong Shuk Ngan, Lee Yu • Excel: Siu Sin Yung • PowerPoint: Siu Sin Yung, Kwong Shuk Ngan, Lee Yu • Prezi: Kwong Shuk Ngan