Nowadays, many mobile devices such as phones and tablets are used in the workplace. A large amount of data is being transferred from one person to another. Data transfer is used for several different fields. Many companies and institutions are focusing on research and development on the way to further protect sensitive data. However, sensitive data still get leaks on mobile devices. To analyze how sensitive data get leak, a simulation on transferring sensitive data is developed. In this paper, we present the analysis of mobile security problem dealing with sensitive data from getting out. The goals in our research are for users to have a greater understanding on how data is being transferred and prevention sensitive data from being stolen. Our work will benefit mobile device users and help to prevent sensitive data from being stolen. Our experiments show different ways to safely transfer information on mobile devices by testing three methods types, which are backup , encryption, and lock plus wipe data.
CITATION STYLE
Wu, F., Chen, C., & Clarke, D. (2014). Sensitive Data Protection on Mobile Devices. International Journal of Advanced Computer Science and Applications, 5(9). https://doi.org/10.14569/ijacsa.2014.050907
Mendeley helps you to discover research relevant for your work.