1.What are the key words relevant to the vulnerabilities in wireless mobile data exchange 2.which digital data do you use? Did you use sciencedirect, springer, or other databases? Please list it/them. 3.Make a list of information of the related articles you find. While listing, please follow the format of the references list of the article you read. 4.What are the key points related to the vulnerabilities in wireless mobile data exchange that you get from the articles you found? That is, the ideas that may guide you to shape your idea of the thesis of your paper..