Safeguarding Mobile Users from Violation by Third-party Apps
Insecure third-party mobile applications (apps) can have a detrimental impact on mobile users in terms of information security and data privacy. Insufficient protection for third-party mobile apps platforms may result in harmful installations. The purpose of this paper was to make recommendation on...
Saved in:
Main Authors: | , |
---|---|
Format: | Article |
Language: | English |
Published: |
Escuela Politécnica Nacional (EPN)
2025-01-01
|
Series: | Latin-American Journal of Computing |
Subjects: | |
Online Access: | https://lajc.epn.edu.ec/index.php/LAJC/article/view/418 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
_version_ | 1832096502509469696 |
---|---|
author | Vusumuzi Malele Kagiso Mphasane |
author_facet | Vusumuzi Malele Kagiso Mphasane |
author_sort | Vusumuzi Malele |
collection | DOAJ |
description | Insecure third-party mobile applications (apps) can have a detrimental impact on mobile users in terms of information security and data privacy. Insufficient protection for third-party mobile apps platforms may result in harmful installations. The purpose of this paper was to make recommendation on guidelines for safeguarding mobile users from violations by third-party apps. In this regard, empirical data was collected through questionnaires developed to determine the necessary themes that led to the development of the recommendations. The findings showed that a large percentage of participants are not aware of basic security methods to safeguard themselves. Secondly, there is a need for increased confidence in data integrity protocols, and the necessity to ability for emphasizing strong availability controls and backup strategies for mobile users’ continuous access to services. Since the findings align to the Confidentiality, Integrity, and Availability (CIA) triad framework, then the recommendations were made as an implementation strategy of the CIA triad for safeguarding mobile users against violation by the third-party apps. Mobile users will benefit immensely on the recommendations as empower them as the first line of defense against cybercrimes. |
format | Article |
id | doaj-art-29bdc5a6f002491aa21f7288b83e7403 |
institution | Kabale University |
issn | 1390-9266 1390-9134 |
language | English |
publishDate | 2025-01-01 |
publisher | Escuela Politécnica Nacional (EPN) |
record_format | Article |
series | Latin-American Journal of Computing |
spelling | doaj-art-29bdc5a6f002491aa21f7288b83e74032025-02-05T14:49:41ZengEscuela Politécnica Nacional (EPN)Latin-American Journal of Computing1390-92661390-91342025-01-011212734418Safeguarding Mobile Users from Violation by Third-party AppsVusumuzi Malele0Kagiso Mphasane1North-West UniversityNorth-West UniversityInsecure third-party mobile applications (apps) can have a detrimental impact on mobile users in terms of information security and data privacy. Insufficient protection for third-party mobile apps platforms may result in harmful installations. The purpose of this paper was to make recommendation on guidelines for safeguarding mobile users from violations by third-party apps. In this regard, empirical data was collected through questionnaires developed to determine the necessary themes that led to the development of the recommendations. The findings showed that a large percentage of participants are not aware of basic security methods to safeguard themselves. Secondly, there is a need for increased confidence in data integrity protocols, and the necessity to ability for emphasizing strong availability controls and backup strategies for mobile users’ continuous access to services. Since the findings align to the Confidentiality, Integrity, and Availability (CIA) triad framework, then the recommendations were made as an implementation strategy of the CIA triad for safeguarding mobile users against violation by the third-party apps. Mobile users will benefit immensely on the recommendations as empower them as the first line of defense against cybercrimes.https://lajc.epn.edu.ec/index.php/LAJC/article/view/418cia cybersecuritythird-party apps security.third-party apps security |
spellingShingle | Vusumuzi Malele Kagiso Mphasane Safeguarding Mobile Users from Violation by Third-party Apps Latin-American Journal of Computing cia cybersecurity third-party apps security. third-party apps security |
title | Safeguarding Mobile Users from Violation by Third-party Apps |
title_full | Safeguarding Mobile Users from Violation by Third-party Apps |
title_fullStr | Safeguarding Mobile Users from Violation by Third-party Apps |
title_full_unstemmed | Safeguarding Mobile Users from Violation by Third-party Apps |
title_short | Safeguarding Mobile Users from Violation by Third-party Apps |
title_sort | safeguarding mobile users from violation by third party apps |
topic | cia cybersecurity third-party apps security. third-party apps security |
url | https://lajc.epn.edu.ec/index.php/LAJC/article/view/418 |
work_keys_str_mv | AT vusumuzimalele safeguardingmobileusersfromviolationbythirdpartyapps AT kagisomphasane safeguardingmobileusersfromviolationbythirdpartyapps |