offer
offer

Get Upto

55% OFF

-Coupon Code-

NEW25

offer
offer

Use Our Seasonal Offers!

Claim Now

4500+ Experts Writer

I'm an academic writer who is offering writing assistance to the college students for the past seven years. I hold master's degree in Nursing from the Victoria University, Australia. My expertise on the subject has helped many college and university students till date. I have delivered academic documents on various topics such as Nursing Studies, Primary and Community Care, Nutritional and Metabolic Health, Midwifery: Registered Midwife, Paramedic Practice, Pharmacology & Nursing Care, Introduction to Professional Nursing, Adult Medical Surgical Geriatric Nursing, Pathophysiology, Parent-Child Nursing, Psychiatric Mental Health Nursing and many others. Hire me to get a top-quality writing assistance with any reference style and on any topic related to this subject.

William Radcliff

William Radcliff

Orders in Progress - 34

Orders Finished - 2333

Hire Now

I am a full-time academic writer with Ph.D. credentials in Consumer Behaviour from The University of Melbourne. I can produce top-scoring academic papers on various topics related to this subject area. Till now, I have assisted several students on the concepts such as models of Consumer Behaviour, market segmentation, positioning, and marketing mix development, etc. I can proficiently write in almost every citation and referencing style required by the scholars studying in Australian-based universities/colleges. Hire me now for your assignment writing work and score the top grades.

Bella Austin

Bella Austin

Orders in Progress - 78

Orders Finished - 1267

Hire Now

I am a full-time academic writer who is working with Global Assignment Help Australia, an online academic writing service provider. I have done my doctorate in Media and Communication from the esteemed Australia Central Queensland University. I am frequently asked to write on the variety of topics associated with this subject and other related fields such as Art," Classics," Cultural Studies," Journalism," Literature," Media," Politics," Religion," Television," Theatre," Theology," Urban Studies, and many others. I can proficiently write in almost every citation and referencing style. Hire me to get topmost grades in any of your academic document related to this subject.

Jenny Blackwell

Jenny Blackwell

Orders in Progress - 67

Orders Finished - 2354

Hire Now

After completing my Ph.D., I worked as a Digital electronics engineer for two years. Then, I joined Global Assignment Help Australia as an academic writer. Here I learned all the intricacies of academic paper writing. With my knowledge and excellent writing skills, I started offering assignment writing assistance to the university students and have successfully delivered more than 2500+ projects in the last six years. I hold expertise in all the disciplines that come under this subject, such as Combinational vs. Sequential, Structure of digital systems, Asynchronous systems, Synchronous systems, Computer design, Register transfer systems, Computer architecture, Automated design tools, Design issues in digital circuits, etc.

Eric Branchett

Eric Branchett

Orders in Progress - 14

Orders Finished - 2672

Hire Now

Affordable Prices

Top Grades at Cheap Rates!

    Prices Starts From
    USD 7.19
    Offer Discount 25 % Off
    USD7.19

    Get upto 51% OFF on Your First Order !

    Prices Starts From

    USD 7.19

    Amazing Features We Offer

    24*7 Help Service

    100% Satisfaction

    No Privacy Infringement

    Super-fast Services

    Subject Experts

    Professional Documents

    Investigate The Extent To Which People Make Use Of Mobile Security Measures

    Introduction Of investigate the extent to which people make use of mobile security measures 

    The social networking site is a digital platform that is most commonly used for the purpose of sharing messages and making relations with different people. The relations are made on the basis of common interests and hobbies or for knowing different persons of various parts of world. The facilities delivered by such sites have made it very easier to share messages instantly along with sharing of various photographs and memories between people. With the invention of these sites, the interests of people have taken a new shape. The organizations who use to provide such facilities continuously try to make it more interesting and user friendly to increase their usage. With these advantages, there are some drawbacks of these sites as well. With enhanced usage of social networking sites, the risks related to privacy issues have also been developed. The cyber crimes have increased a lot where many people have filed cases of hacking their personal information’s by hackers and its misuse. Many times, these cases reach to severe level also due to which many people go under depression or commit suicides. Therefore, it becomes very necessary for users of these sites to be aware of such activities so that various risks related to their private information can be restricted.

    Methods

    Methodology is one of the vital elements of every research study as use of perfect and suitable methods and technique enable investigator to conclude the investigation effectively (Maher, Markey and Ebert-May, 2013).
    Participants

    In order to obtain required data, sample of 6 people on the street has been surveyed through questionnaire. All the participants have been selected randomly without any bias from the street. All the persons who were above the age of 18 have been invited to give their responses by filling-up the questionnaire. The reason behind selecting a sample of total 6 people is to minimize complexities in gathering data from every resident. Moreover, generating data from the representative sample also consumed less time period and helps to examine the entire universe (Hartas, 2015).

    Have a question or Need assistance
    Call us at +61 483982483

    Design

    Research design specifies and standardise that how a particular investigation will be carry out thoroughly by the investigator.  Referring the current study, design of study incorporated by the researcher is analytical. As in these, the findings and outcome of the mobile phone security questionnaire result have been evaluated and examined by applying statistical tools and technique through SPSS. Data collection is a very important and crucial facet of design, as authenticate, reliable and prominent information gathered by the investigators helps to find out an appropriate solution of the issue or vice-versa. In order to gather required quantum of data, there are two alternatives available to researchers to either generate information by applying primary method or secondary or a combination of both (Punch, 2013). Former is used to acquire fresh or unique information that not already obtained by any other researcher scholar previously. Most importantly, it is incorporated to tailor certain specific requirement of the users through conducting observation, field-survey, questionnaire survey or interviews. Unlike primary method, secondary data collection process aims at utilizing already available data sources either published or non-published (Schmidt and Hunter, 2014). In order to assure validity, it is necessary for the investigator to take some precautions while using secondary data so as to avoid the use of time-outdated data.For more Info Get Assignment Help.

    Here, in the present investigation, scholar has applied primary technique to generate reliable and specific information that will be helpful for fulfilling the aims and objectives of the study. In such regards, a survey has been conducted by the investigator of selected participants to obtain sufficient quantum of data (Davis, Evershed and Mills, 2013). It will be proves greatly beneficial for the researcher to tailor and meet-out their specific information need.

    The present study followed a quantitative research, as in which, scholar applied a famous statistical software, Statistical Package for Social Science (SPSS) to evaluate and examine the findings and results of numerical data (Creswell, 2013). In such regards, regression and descriptive statistical methods have been performed to reach the effective and accurate solution of the problem.

    Material

    Researcher has designed a mobile phone security questionnaire as an instrument of research. In total, three set of questionnaire have been developed to study the extent to which public incorporates a range of precautions regards to mobile-phone usage. The focus of the selected investigation material is to ask respondents about the type of mobile phone usage and their adopted security measures to prevent crime (Monette, Sullivan and DeJong, 2013). In total, three questionnaires have been prepared by the researcher differentiated from each other only on the basis of time such as last week, typical week and typical month.

    Procedure

    While collecting data, every participant has been asked to fill only one of the three drafted questionnaires and randomly assigned to one of the three groups. Every questions prepared in the questionnaire has been answered by two people so as to generate responses quickly (Douzenis and Seretis, 2013). While surveying respondents, scholar assured that at one time, only one respondents will be surveyed in order to eliminate confusion or confound in the experiment (Yilmaz, 2013). After gathering data, SPSS technique has been applied to generate the needed outcome so as to find out the right solution of the selected issue (Belk, 2013).

    Results

    Quantitative analysis

    Hypothesis 1

    Ho: There is no significant difference between mean values of mobile phone usage in terms of weeks and mobile security measures.

    H1: There is a significant difference between mean values of mobile phone usage in terms of weeks and mobile security measures.

     Hypothesis 2

    Ho: There is no significant difference between mean values of monthly mobile phone usage and security measures.

    H1: There is a significant difference between mean values of monthly mobile phone usage and security measures.

    Looking for Free Tools to Ease Your Academic Writing Stress? CLICK HERE!

    By doing descriptive statistics, it has been assessed that mean value of recorded serial number and hours online is 1.80 & 22.23. Further, extent to which mean amount will deviate in the future by .404 & 17.11. Along with this, it has been identified that people who were spent more time on online makes use of recorded phone serial number. Moreover, level of significance between both the variables is 0.1 which shows that alternative hypothesis is true. In addition to this, mean value of the option of screen code or pattern is 1.09 & 0.29.  Correlation-ship which takes place between the two variables is .13. By considering this, it can be stated that moderate level of relationship takes place between lock pattern option and hours which are spent by the customers online.  R square is 0.18 which presents that minute changes will take place in the usage of the option of lock pattern. Level of significance which takes place between the usage of screen code lock or pattern and online spending hours is 0.04.  It lies within the value of 0.05 which shows that null hypothesis is rejected.

     Along with this, output of SPSS presents that people who spent 22 hours on internet in a typical week had not registered their phone on asset register.  Outcome of descriptive statistics present that people whose weekly spending hours are 22 prefers to track or lock mobile phones with the aim to prevent the threat aspects. Significance level of such aspect is also near to the standard criteria.  Outcome of SPSS entails that  customers with average spending  hours of 22 does not make use of the security measure such as physically marked phone. Thus, by following such aspects it can be said that there is a significant difference takes place in the weekly usage of mobile phones and employment of security measures (Seuring, 2013). All these aspects shows that there are several people who spend more online weekly hours do not make use of mobile security measures.

    From quantitative investigation, it has been assessed that people who spent 22 monthly hours do not make use of serial numbers to protect the mobile phone. Level of significance which is related to such aspect is .14.  By doing investigation, it also has been identified that people who spend more time online makes use of screen lock or pattern to protect their mobile phones.  On the other side, as similar to weekly users, people who make use of internet monthly basis lays high level of emphasis on using lock system. The rationale behind this, it prevents other to make use of mobile and access to private details (Backonja and et.al., 2013).  By taking into account all the above presented aspects it can be said that there is a significant difference takes place in the mean value of monthly mobile usage and usage of security measures. In survey, most the respondents have presented their views in similar direction. Thus, usage rate of security measure is very slow which in turn negatively affects the information to the large extent. The reason behind this, now hacking related activities are increased with the very high pace. In this situation, by making use of suitable measures people can keep secure the information shared by them (Gibson and Morgan, 2013). Thus, outcome of SPSS shows that alternative hypothesis is accepted which presents that now there is less number of people who make use mobile security measures.

    Discussion

    As per detailed analysis of primary and secondary data, it can be said that people are more attracted towards effective use of mobile network. In addition to this, it can be said that people are spending half of their day in the usage of mobile. Number of social networking sites is there which is being used by the members such as facebook, twitter is being accessed. Along with this, it has also been noticed that there is slightly difference between mean values of mobile phone usage in terms of weeks and mobile security measures (Marshall and et.al., 2013). In addition to this, it can be said that people are using mobile phone but they does not focus much on security measures. It indicates the difference between overall outcome. Analysis of information also reflects that there is no significant difference between mean values of monthly mobile phone usage and security measures. In addition to this, it can also be said that phone serial number is one of security measure which helps in effective development of organization. Recorded security measures are also being taken into account for measuring the use of mobile. Number of people is using mobile and internet but at the same time the ratio of usage of recorded phone serial number is not in much use. It impacts the overall outcome in diverse manner (Flick, 2015). Along with this, male and female both are using mobile firms but there is slight difference between the ratio. Male are using mobile phone more as compared to female. It is significant to have improvement in security measures so that goals and objectives can be accomplished effectively. Moreover, overall outcome in respect to security mobile need to be understand effectively. For Homework Help Visit Global Assignment help Australia.

    You May Also Like To Read - Internet Marketing

    References

    • Backonja, M. M. and et.al., 2013. Value of quantitative sensory testing in neurological and pain disorders: NeuPSIG consensus. Pain. 154(9). pp.1807-1819.
    • Belk, R. W., 2013. Qualitative versus quantitative research in marketing. Revista de Negócios. 18(1). pp.5-9.
    • Creswell, J. W., 2013. Research design: Qualitative, quantitative, and mixed methods approaches. Sage publications.
    • Davis, G. R., Evershed, A. N. and Mills, D., 2013. Quantitative high contrast X-ray microtomography for dental research. Journal of dentistry. 41(5). pp.475-482.
    • Douzenis, A. and Seretis, D., 2013. Descriptive and predictive validity of somatic attributions in patients with somatoform disorders: A systematic review of quantitative research. Journal of psychosomatic research. 75(3). pp.199-210.
    • Flick, U., 2015. Introducing research methodology: A beginner's guide to doing a research project. Sage.
    • Gibson, K. and Morgan, M., 2013. Narrative research on child sexual abuse: Addressing perennial problems in quantitative research. Qualitative Research in Psychology. 10(3). pp.298-317.
    • Hartas, D., 2015. Educational research and inquiry: Qualitative and quantitative approaches. Bloomsbury Publishing.

    Amazing Discount

    UPTO55% OFF

    Subscribe now for More Exciting Offers + Freebies

    Download Full Sample

    Cite This Work

    To export references to this Sample, select the desired referencing style below:

    Students sometimes cannot express their inability to work on assignments and wonder, "Who will do my assignment?" To help them understand the complexities of writing, we are providing "samples" on various subjects. Also, we have experienced assignment writers who can provide the best and affordable assignment writing services, essay writing services, dissertation writing services, and so on. Thus, don't wait any longer! Place your order now to take advantage of discounted deals and offers.

    Limited Time Offer

    Exclusive Library Membership + FREE Wallet Balance