SlideShare a Scribd company logo
Smartphone
and
Security
Members:
Siu Sin Yung (15215822)
Kwong Shuk Ngan (15220680)
Lee Yu (15221407)
11/26/2015
Contents
Introduction of
smartphone &
security
problems
Survey Result Video Conclusion Job Division
Introduction
• A smartphone is an advanced gadget
• Different functions
(e.g. instant messaging, games, video-calling etc.)
• People also store important information in smartphones
(e.g. photos, credit card details etc.)
• To safeguard these information, there are different security locks
(e.g. number lock, fingerprint lock etc.)
Mind Map
Online survey
• Target:
Smartphone owners
• Aim:
To find out if smartphone owners have
awareness of smartphone security and
their uses of smartphones
• Sample size:
30 people (Female: 12, Male: 15)
• http://goo.gl/forms/wLTNFfeivK
Survey Result
4.4
4.6
4.8
5
5.2
5.4
5.6
5.8
6
6.2
1 2 3 4 5
I think the security level of my smartphone is:
Security level(1=very good, 5=very poor)
Survey Result
0
5
10
15
20
25
log out the account anti-virus software no reading the
permission details
Would you log out the account/ having anti-virus software/ download
materials without reading the permission details?
Yes
No
Survey Result
14.3
35.7
50 50 50
7.1
92.9
44.4 44.4
11.1
44.4
55.6
75
25
298302 293i0w 29#3b3 Yes(TP) No(TP) Yes(SS) No(SS)
Sense of security of Male and Female
Male(%)
Female(%)
TP= Telling others passwords
SS= Setting security
Percentage%
Survey Result
Number lock
39%
Voice lock
5%
Fingerprint lock
32%
PIN lock
24%
Other
0%
28.95%
Which of the following type(s) of lock do you use?
Result Analysis
• Smartphone owners believe that their
smartphones are highly secured
• Most of the users are not fully aware
of their phone security
(female is better than male)
• Number lock & fingerprint lock are
more commonly used.
Video
Conclusion
• Smartphones and security locks
(e.g. number locks) are commonly used.
• A lot of people lack knowledge or
awareness of phone security.
• People should learn how to secure their
smartphones better in order to prevent
others from invading their privacy.
Job Division
• Mind map: Siu Sin Yung, Lee Yu
• Survey: Siu Sin Yung, Kwong Shuk Ngan, Lee Yu
• Excel: Siu Sin Yung
• PowerPoint: Siu Sin Yung, Kwong Shuk Ngan, Lee Yu
• Prezi: Kwong Shuk Ngan
Smartphone & Security

More Related Content

Viewers also liked

anti theft vehicular security system
anti theft vehicular security systemanti theft vehicular security system
anti theft vehicular security system
Akshay Gaikwad
 
SMART Vehicle Secure PPT
SMART Vehicle Secure PPTSMART Vehicle Secure PPT
SMART Vehicle Secure PPT
Lighthouse Info Systems Pvt Ltd
 
Steering india to a cashless economy
Steering india to a cashless economySteering india to a cashless economy
Steering india to a cashless economy
Varsha Sutrave
 
Facebook thrift
Facebook thriftFacebook thrift
Facebook thrift
Bhuvana Laksminarayanan
 
Smartphone security issues
Smartphone security issuesSmartphone security issues
Smartphone security issues
Aleksandra Gavrilovska
 
Space Mouse
Space MouseSpace Mouse
Space Mouse
RAJU MAKWANA
 
Social issues
Social issuesSocial issues
Social issues
IES Montbui
 
My seminar ppt SPACE MOUSE
My seminar ppt  SPACE MOUSEMy seminar ppt  SPACE MOUSE
My seminar ppt SPACE MOUSE
Sudeep Kumar
 
Cashless Powerpoint
Cashless PowerpointCashless Powerpoint
Cashless Powerpoint
guest6faf386
 
Pill camera
Pill cameraPill camera
Pill camera
Joyce Thomas
 
PPT Presentation on Facebook.com
PPT Presentation on Facebook.comPPT Presentation on Facebook.com
PPT Presentation on Facebook.com
Krishan Majumder
 
Social problems
Social problemsSocial problems
Social problems
Kingsuk Sarkar
 
Advantages and Disadvantages of Facebook
Advantages and Disadvantages of FacebookAdvantages and Disadvantages of Facebook
Advantages and Disadvantages of Facebook
chintanchheda
 
2015 Mobile Security Trends: Are You Ready?
2015 Mobile Security Trends: Are You Ready?2015 Mobile Security Trends: Are You Ready?
2015 Mobile Security Trends: Are You Ready?
IBM Security
 
Project ppt
Project pptProject ppt
Project ppt
Rahul Yadav
 
Final ppt
Final pptFinal ppt
Final ppt
pramada
 
Facebook Powerpoint
Facebook PowerpointFacebook Powerpoint
Facebook Powerpoint
myra14
 

Viewers also liked (17)

anti theft vehicular security system
anti theft vehicular security systemanti theft vehicular security system
anti theft vehicular security system
 
SMART Vehicle Secure PPT
SMART Vehicle Secure PPTSMART Vehicle Secure PPT
SMART Vehicle Secure PPT
 
Steering india to a cashless economy
Steering india to a cashless economySteering india to a cashless economy
Steering india to a cashless economy
 
Facebook thrift
Facebook thriftFacebook thrift
Facebook thrift
 
Smartphone security issues
Smartphone security issuesSmartphone security issues
Smartphone security issues
 
Space Mouse
Space MouseSpace Mouse
Space Mouse
 
Social issues
Social issuesSocial issues
Social issues
 
My seminar ppt SPACE MOUSE
My seminar ppt  SPACE MOUSEMy seminar ppt  SPACE MOUSE
My seminar ppt SPACE MOUSE
 
Cashless Powerpoint
Cashless PowerpointCashless Powerpoint
Cashless Powerpoint
 
Pill camera
Pill cameraPill camera
Pill camera
 
PPT Presentation on Facebook.com
PPT Presentation on Facebook.comPPT Presentation on Facebook.com
PPT Presentation on Facebook.com
 
Social problems
Social problemsSocial problems
Social problems
 
Advantages and Disadvantages of Facebook
Advantages and Disadvantages of FacebookAdvantages and Disadvantages of Facebook
Advantages and Disadvantages of Facebook
 
2015 Mobile Security Trends: Are You Ready?
2015 Mobile Security Trends: Are You Ready?2015 Mobile Security Trends: Are You Ready?
2015 Mobile Security Trends: Are You Ready?
 
Project ppt
Project pptProject ppt
Project ppt
 
Final ppt
Final pptFinal ppt
Final ppt
 
Facebook Powerpoint
Facebook PowerpointFacebook Powerpoint
Facebook Powerpoint
 

Similar to Smartphone & Security

Gcit project mobile phone
Gcit project mobile phone Gcit project mobile phone
Gcit project mobile phone
Kayan To
 
Fingerprint technology in our lives
Fingerprint technology in our livesFingerprint technology in our lives
Fingerprint technology in our lives
codykong
 
Group 4
Group 4Group 4
Group 4
natatalie
 
Group 4
Group 4Group 4
Group 4
natatalie
 
Fingerprint Recognition System
Fingerprint Recognition SystemFingerprint Recognition System
Fingerprint Recognition System
123456chan
 
Passwordless is Possible - How to Remove Passwords and Improve Security
Passwordless is Possible - How to Remove Passwords and Improve Security Passwordless is Possible - How to Remove Passwords and Improve Security
Passwordless is Possible - How to Remove Passwords and Improve Security
SecureAuth
 
Fingerprint Recognition System
Fingerprint Recognition SystemFingerprint Recognition System
Fingerprint Recognition System
christywong1234
 
GCIT1015 Smartphones
GCIT1015 SmartphonesGCIT1015 Smartphones
GCIT1015 Smartphones
16224027
 
F-LOCKER: An Android Face Recognition Applocker Using Local Binary Pattern Hi...
F-LOCKER: An Android Face Recognition Applocker Using Local Binary Pattern Hi...F-LOCKER: An Android Face Recognition Applocker Using Local Binary Pattern Hi...
F-LOCKER: An Android Face Recognition Applocker Using Local Binary Pattern Hi...
IJCSIS Research Publications
 
Cyber Defense Matrix: Revolutions
Cyber Defense Matrix: RevolutionsCyber Defense Matrix: Revolutions
Cyber Defense Matrix: Revolutions
Sounil Yu
 
Security Awareness Training by HIMSS Louisiana Chapter
Security Awareness Training by HIMSS Louisiana ChapterSecurity Awareness Training by HIMSS Louisiana Chapter
Security Awareness Training by HIMSS Louisiana Chapter
Atlantic Training, LLC.
 
Best Effort Security Testing for Mobile Applications - 2015 #ISC2CONGRESS
Best Effort Security Testing for Mobile Applications -  2015 #ISC2CONGRESSBest Effort Security Testing for Mobile Applications -  2015 #ISC2CONGRESS
Best Effort Security Testing for Mobile Applications - 2015 #ISC2CONGRESS
Lostar
 
Venkat Sastry talking on MoLE Project A Global Technology Initiative
Venkat Sastry talking on MoLE ProjectA Global Technology InitiativeVenkat Sastry talking on MoLE ProjectA Global Technology Initiative
Venkat Sastry talking on MoLE Project A Global Technology Initiative
eAssessment in Practice Symposium
 
Usability vs. Security: Find the Right Balance in Mobile Apps
Usability vs. Security: Find the Right Balance in Mobile AppsUsability vs. Security: Find the Right Balance in Mobile Apps
Usability vs. Security: Find the Right Balance in Mobile Apps
Josiah Renaudin
 
W01 Levent Gurses X
W01 Levent Gurses XW01 Levent Gurses X
W01 Levent Gurses X
Movel
 
Symantec Webinar | National Cyber Security Awareness Month: Secure IT
Symantec Webinar | National Cyber Security Awareness Month: Secure ITSymantec Webinar | National Cyber Security Awareness Month: Secure IT
Symantec Webinar | National Cyber Security Awareness Month: Secure IT
Symantec
 
Demonstrating Information Security Program Effectiveness
Demonstrating Information Security Program EffectivenessDemonstrating Information Security Program Effectiveness
Demonstrating Information Security Program Effectiveness
Doug Copley
 
FET3_BA.pptx
FET3_BA.pptxFET3_BA.pptx
FET3_BA.pptx
ManasiMirajkar1
 
Using mobile devices in adult education
Using mobile devices in adult educationUsing mobile devices in adult education
Using mobile devices in adult education
Nell Eckersley
 
Webinar - Keep Your Connected Nonprofit or Library Secure - 2015-10-01
Webinar - Keep Your Connected Nonprofit or Library Secure - 2015-10-01Webinar - Keep Your Connected Nonprofit or Library Secure - 2015-10-01
Webinar - Keep Your Connected Nonprofit or Library Secure - 2015-10-01
TechSoup
 

Similar to Smartphone & Security (20)

Gcit project mobile phone
Gcit project mobile phone Gcit project mobile phone
Gcit project mobile phone
 
Fingerprint technology in our lives
Fingerprint technology in our livesFingerprint technology in our lives
Fingerprint technology in our lives
 
Group 4
Group 4Group 4
Group 4
 
Group 4
Group 4Group 4
Group 4
 
Fingerprint Recognition System
Fingerprint Recognition SystemFingerprint Recognition System
Fingerprint Recognition System
 
Passwordless is Possible - How to Remove Passwords and Improve Security
Passwordless is Possible - How to Remove Passwords and Improve Security Passwordless is Possible - How to Remove Passwords and Improve Security
Passwordless is Possible - How to Remove Passwords and Improve Security
 
Fingerprint Recognition System
Fingerprint Recognition SystemFingerprint Recognition System
Fingerprint Recognition System
 
GCIT1015 Smartphones
GCIT1015 SmartphonesGCIT1015 Smartphones
GCIT1015 Smartphones
 
F-LOCKER: An Android Face Recognition Applocker Using Local Binary Pattern Hi...
F-LOCKER: An Android Face Recognition Applocker Using Local Binary Pattern Hi...F-LOCKER: An Android Face Recognition Applocker Using Local Binary Pattern Hi...
F-LOCKER: An Android Face Recognition Applocker Using Local Binary Pattern Hi...
 
Cyber Defense Matrix: Revolutions
Cyber Defense Matrix: RevolutionsCyber Defense Matrix: Revolutions
Cyber Defense Matrix: Revolutions
 
Security Awareness Training by HIMSS Louisiana Chapter
Security Awareness Training by HIMSS Louisiana ChapterSecurity Awareness Training by HIMSS Louisiana Chapter
Security Awareness Training by HIMSS Louisiana Chapter
 
Best Effort Security Testing for Mobile Applications - 2015 #ISC2CONGRESS
Best Effort Security Testing for Mobile Applications -  2015 #ISC2CONGRESSBest Effort Security Testing for Mobile Applications -  2015 #ISC2CONGRESS
Best Effort Security Testing for Mobile Applications - 2015 #ISC2CONGRESS
 
Venkat Sastry talking on MoLE Project A Global Technology Initiative
Venkat Sastry talking on MoLE ProjectA Global Technology InitiativeVenkat Sastry talking on MoLE ProjectA Global Technology Initiative
Venkat Sastry talking on MoLE Project A Global Technology Initiative
 
Usability vs. Security: Find the Right Balance in Mobile Apps
Usability vs. Security: Find the Right Balance in Mobile AppsUsability vs. Security: Find the Right Balance in Mobile Apps
Usability vs. Security: Find the Right Balance in Mobile Apps
 
W01 Levent Gurses X
W01 Levent Gurses XW01 Levent Gurses X
W01 Levent Gurses X
 
Symantec Webinar | National Cyber Security Awareness Month: Secure IT
Symantec Webinar | National Cyber Security Awareness Month: Secure ITSymantec Webinar | National Cyber Security Awareness Month: Secure IT
Symantec Webinar | National Cyber Security Awareness Month: Secure IT
 
Demonstrating Information Security Program Effectiveness
Demonstrating Information Security Program EffectivenessDemonstrating Information Security Program Effectiveness
Demonstrating Information Security Program Effectiveness
 
FET3_BA.pptx
FET3_BA.pptxFET3_BA.pptx
FET3_BA.pptx
 
Using mobile devices in adult education
Using mobile devices in adult educationUsing mobile devices in adult education
Using mobile devices in adult education
 
Webinar - Keep Your Connected Nonprofit or Library Secure - 2015-10-01
Webinar - Keep Your Connected Nonprofit or Library Secure - 2015-10-01Webinar - Keep Your Connected Nonprofit or Library Secure - 2015-10-01
Webinar - Keep Your Connected Nonprofit or Library Secure - 2015-10-01
 

Recently uploaded

National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc
 
GenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizationsGenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizations
kumardaparthi1024
 
Infrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI modelsInfrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI models
Zilliz
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
Claudio Di Ciccio
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
panagenda
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Speck&Tech
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
DianaGray10
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
Neo4j
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
SOFTTECHHUB
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
Neo4j
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
Neo4j
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
Neo4j
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
Zilliz
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
Kumud Singh
 
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceAI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
IndexBug
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
Neo4j
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 

Recently uploaded (20)

National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
 
GenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizationsGenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizations
 
Infrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI modelsInfrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI models
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
 
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceAI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 

Smartphone & Security

  • 1. Smartphone and Security Members: Siu Sin Yung (15215822) Kwong Shuk Ngan (15220680) Lee Yu (15221407) 11/26/2015
  • 3. Introduction • A smartphone is an advanced gadget • Different functions (e.g. instant messaging, games, video-calling etc.) • People also store important information in smartphones (e.g. photos, credit card details etc.) • To safeguard these information, there are different security locks (e.g. number lock, fingerprint lock etc.)
  • 5. Online survey • Target: Smartphone owners • Aim: To find out if smartphone owners have awareness of smartphone security and their uses of smartphones • Sample size: 30 people (Female: 12, Male: 15) • http://goo.gl/forms/wLTNFfeivK
  • 6. Survey Result 4.4 4.6 4.8 5 5.2 5.4 5.6 5.8 6 6.2 1 2 3 4 5 I think the security level of my smartphone is: Security level(1=very good, 5=very poor)
  • 7. Survey Result 0 5 10 15 20 25 log out the account anti-virus software no reading the permission details Would you log out the account/ having anti-virus software/ download materials without reading the permission details? Yes No
  • 8. Survey Result 14.3 35.7 50 50 50 7.1 92.9 44.4 44.4 11.1 44.4 55.6 75 25 298302 293i0w 29#3b3 Yes(TP) No(TP) Yes(SS) No(SS) Sense of security of Male and Female Male(%) Female(%) TP= Telling others passwords SS= Setting security Percentage%
  • 9. Survey Result Number lock 39% Voice lock 5% Fingerprint lock 32% PIN lock 24% Other 0% 28.95% Which of the following type(s) of lock do you use?
  • 10. Result Analysis • Smartphone owners believe that their smartphones are highly secured • Most of the users are not fully aware of their phone security (female is better than male) • Number lock & fingerprint lock are more commonly used.
  • 11. Video
  • 12. Conclusion • Smartphones and security locks (e.g. number locks) are commonly used. • A lot of people lack knowledge or awareness of phone security. • People should learn how to secure their smartphones better in order to prevent others from invading their privacy.
  • 13. Job Division • Mind map: Siu Sin Yung, Lee Yu • Survey: Siu Sin Yung, Kwong Shuk Ngan, Lee Yu • Excel: Siu Sin Yung • PowerPoint: Siu Sin Yung, Kwong Shuk Ngan, Lee Yu • Prezi: Kwong Shuk Ngan