Revista: | Latin-American Journal of Computing (LAJC) |
Base de datos: | |
Número de sistema: | 000610611 |
ISSN: | 1390-9134 |
Autores: | Malele, Vusumuzi1 Mphasane, Kagiso1 |
Instituciones: | 1North-West University, School of Computer Science and Information Systems, Potchefstroom. Sudáfrica |
Año: | 2025 |
Volumen: | 12 |
Número: | 1 |
Paginación: | 27-34 |
País: | Ecuador |
Idioma: | Inglés |
Tipo de documento: | Artículo |
Resumen en español | Insecure third-party mobile applications (apps) can have a detrimental impact on mobile users in terms of information security and data privacy. Insufficient protection for third-party mobile apps platforms may result in harmful installations. The purpose of this paper was to make recommendation on guidelines for safeguarding mobile users from violations by third-party apps. In this regard, empirical data was collected through questionnaires developed to determine the necessary themes that led to the development of the recommendations. The findings showed that a large percentage of participants are not aware of basic security methods to safeguard themselves. Secondly, there is a need for increased confidence in data integrity protocols, and the necessity to ability for emphasizing strong availability controls and backup strategies for mobile users continuous access to services. Since the findings align to the Confidentiality, Integrity, and Availability (CIA) triad framework, then the recommendations were made as an implementation strategy of the CIA triad for safeguarding mobile users against violation by the third-party apps. Mobile users will benefit immensely on the recommendations as empower them as the first line of defense against cybercrimes. |
Resumen en inglés | Insecure third-party mobile applications (apps) can have a detrimental impact on mobile users in terms of information security and data privacy. Insufficient protection for third-party mobile apps platforms may result in harmful installations. The purpose of this paper was to make recommendation on guidelines for safeguarding mobile users from violations by third-party apps. In this regard, empirical data was collected through questionnaires developed to determine the necessary themes that led to the development of the recommendations. The findings showed that a large percentage of participants are not aware of basic security methods to safeguard themselves. Secondly, there is a need for increased confidence in data integrity protocols, and the necessity to ability for emphasizing strong availability controls and backup strategies for mobile users continuous access to services. Since the findings align to the Confidentiality, Integrity, and Availability (CIA) triad framework, then the recommendations were made as an implementation strategy of the CIA triad for safeguarding mobile users against violation by the third-party apps. Mobile users will benefit immensely on the recommendations as empower them as the first line of defense against cybercrimes. |
Disciplinas: | Ciencias de la computación |
Palabras clave: | Procesamiento de datos |
Keyword: | Data processing |
Texto completo: | Texto completo (Ver PDF) Texto completo (Ver HTML) |