**** Absolutely no plagiarism ***** Topic : Mobile users and data security 1. A one full page single spaced paper discussing your topic. 2. A five source annotated bibliography. The sources should be high quality academic references (not techopedia or the like). The annotations for each source should include two paragraphs. The first paragraph should summarize the article and the second should be your reflections on it. Each paragraph must contain at least five sentences. 3. A PPT on Mobile users and data security with a minimum of 12 slides not including the title and references. The abstract that we have submitted before: (Dont copy form the below) Over the last years, technological advancement has continued to rise to create a significant change in the communication landscape. In the contemporary world, many people are linking up through the use of mobile devices by making calls, video calls and sending short messages. The estimate of mobile users in the world is about 5 billion people. Technological advancement has made the use of mobile phones to be smarter by incorporating both video and graphical materials. Improvement in technology is a result of continual research in the field. Unlike the 1970s devices, the current mobile devices have a wide variety of features that have enabled various functions. The past was characterized by limited and costly mobile phones but the current users have increased greatly. For instance, an individual can have as many phones as he or she desires depending on the phone features and specifications. The landscape is moving all the time with new smartphones hitting the market and new features being rolled out almost weekly,” (Curran, Maynes, & Harkin, 2015). Apart from voice communication, one can use a mobile phone to send and receive emails. Due to the change in technology that has led to an increase in mobile users, security threats have been on the rise. This situation calls for security actions from information technology departments. In 2004, the first computer virus that destroyed mobile devices emerged. Since then, many security vulnerabilities followed as more smartphones emerged. Mobile security is paramount not only to organizations but also the mobile phone users. It refers to taking initiative strategies to safeguard sensitive data that are kept in mobile devices or any other portal devices. It also involves the capability to protect the enterprise network from being manipulated by unauthorized users. Devices that are prone to mobile security threats are not only smartphones but also portal devices such as wearables, tablets and laptops. Hackers and cyber-criminals are now focusing much of their efforts on mobile platforms, often as a first step to breaking into corporate networks,” (Shaulov, 2016). Potential threats on mobile devices include unsecured WIFI networks, leakage of data, malicious apps and spyware. There are also physical threats such as losing a mobile device or ge.