##plugins.themes.bootstrap3.article.main##

The mode of teaching and learning has seen major changes since the inception of COVID-19. Some institutions apply technology to integrate face-to-face teaching approaches with online learning systems or wholly teach some of their courses online. Mobile devices, therefore, play a significant role in promoting teaching and learning. The increasing use of these devices comes along with several vulnerabilities that have the internet as its major source. The question to ask is, are students security conscious about or aware of these mobile security threats? Hence the intention is to assess mobile device security awareness among students at the University of Cape Coast, Ghana. A descriptive design was used for the study. A total of 1600 first-year undergraduate students were selected for the study. The study revealed that most students have little knowledge of mobile device security such as not-knowing their serial number, IMEI, data encryption, or activated SIM card PIN and their behaviour towards mobile devices which included making their Bluetooth visible, connecting to any Wi-Fi so far as they would get internet connectivity, downloading applications and files on the internet without being protected, makes most vulnerable and exposes them to a higher risk of being hacked and invaded by intruders.

References

  1. Abro, A. B. (2018). Mobile networks security landscape. In M. Liyanage, I. Ahmad, A. B. Abro, A. Gurtov, & M. Ylianttila (Eds.). A comprehensive guide to 5G security. (pp. 59–74). John Wiley & Sons. https://www.researchgate.net/publication/316244138_A_Comprehensive_Guide_to_5G_Security.
     Google Scholar
  2. Gkioulos, V., Wangen, G., Katsikas, S. K., Kavallieratos, G., & Kotzanikolaou, P. (2017). Security awareness of the digital natives. Information, 8(2), 42.
     Google Scholar
  3. Harris, M. A., Chin, A. G., & Brookshire, R. (2015). Mobile app installation: the role of precautions and desensitization. Journal of International Technology and Information Management, 24(4), 3.
     Google Scholar
  4. Hogben, G., & Dekker, M. (2012). Smartphones: Information security risks, opportunities and recommendations for users/European Network and information Security Agency (ENISA) –Forschungsbericht.
     Google Scholar
  5. Hooi, Y. K., Kalid, K. S., & Tachmammedov, S. (2018). Multi-factor attendance authentication system. International Journal of Software Engineering and Computer Systems, 4(2), 62–79. https://journal.ump.edu.my/ijsecs/article/view/705/143.
     Google Scholar
  6. Intel Corporation (2013). Strong Mobile Device Security Begins in the Hardware. Printed in USA 1113/PC/PRW/PDF Please Recycle 329623-001US. https://www.intel.com/content/dam/www/public/us/en/documents/solution-briefs/enterprise-security-mobile-device-windows-8-1-brief.pdf.
     Google Scholar
  7. Jeon, W., Kim, J., Lee, Y., & Won, D. (2011, July). A practical analysis of smartphone security. In Symposium on Human Interface (pp. 311–320). Springer, Berlin, Heidelberg. https://link.springer.com/content/pdf/10.1007/978-3-642-21793-7_35.pdf.
     Google Scholar
  8. Kao, I. L. (2011). Securing mobile devices in the business environment. IBM Global Technology Services–Thought Leadership White Paper.
     Google Scholar
  9. Kemp, S. (2021, February 11). Digital in Ghana: all the statistics you need in 2021-datareportal-global digital insights. Data Reportal-Global Digital Insights, Data Reportal-Global Digital Insights. https://datareportal.com/reports/digital-2021-ghana
     Google Scholar
  10. Lapitan Jr, L. D., Tiangco, C. E., Sumalinog, D. A. G., Sabarillo, N. S., & Diaz, J. M. (2021). An effective blended online teaching and learning strategy during the COVID-19 pandemic. Education for Chemical Engineers, 35, 116–131.
     Google Scholar
  11. McAfee, (2018). McAfee Mobile Treat Report Q1, 2018, McAfee. Santa Clara, CA, USA. https://www.mcafee.com/enterprise/en-us/assets/reports/rp-mobile-threat-report-2018.pdf.
     Google Scholar
  12. Moletsane, T., & Tsibolane, P. (2020, March). Mobile information security awareness among students in higher education: An exploratory study. In 2020 conference on information communications technology and society (ICTAS) (pp. 1–6). IEEE.
     Google Scholar
  13. MOVR (2017). Mobile overview report. https://skydeo.com/wp-content/uploads/2017/11/Device-Map-Report-WURFL.pdf.
     Google Scholar
  14. Mylonas, A., Kastania, A., & Gritzalis, D. (2013). Delegate the smartphone user? Security awareness in smartphone platforms. Computers & Security, 34, 47–66.
     Google Scholar
  15. Ophoff, J., & Robinson, M. (2014, August). Exploring end-user smartphone security awareness within a South African context. In 2014 Information Security for South Africa (pp. 1-7). IEEE.
     Google Scholar
  16. Radicati, S. (2014). Mobile statistics report, 2014–2018. Palo Alto, CA: Radicati Group. https://www.radicati.com/wp/wp-content/uploads/2014/01/Mobile-Statistics-Report-2014-2018-Executive-Summary.pdf
     Google Scholar
  17. Ruggiero, P., & Foote, J. (2011). Cyber threats to mobile phones: carnegie mellon university. Produced for US-CERT, a government organization.
     Google Scholar
  18. https://www.cisa.gov/uscert/sites/default/files/publications/cyber_threats-to_mobile_phones.pdf
     Google Scholar
  19. Sharma, R. (2021). Analysis of security risks associated with imeis and unwiped data of disposed mobile handsets. International Research Journal of Modernization in Engineering Technology and Science, 3(11),659–662. https://www.irjmets.com/uploadedfiles/paper/volume_3/issue_11_november_2021/17180/final/fin_irjmets1637305506.pdf
     Google Scholar
  20. Singh, R. K., & Tiwari, N. (2015). An investigation on wireless mobile network and wireless lan (wi-fi) for performance evaluation. International Journal of Computer Applications, 126(6). 1–8.
     Google Scholar
  21. https://citeseerx.ist.psu.edu/document?repid=rep1&type=pdf&doi=58f6ce34c31f81e72aac852e34b62c4535fd0044
     Google Scholar
  22. Sujithra, M. & Padmavathi, G. (2012). Mobile device security: a survey on mobile device threats, vulnerabilities, and their defensive mechanism. International Journal of Computer Applications, 56(14), 24–29. https://doi.org/10.5120/8960-3163.
     Google Scholar
  23. UNESCO, (2020). Half of world’s student population not attending school: UNESCO launches global coalition to accelerate deployment of remote learning solutions. https://en.unesco.org/news/half-worlds-student-population-not-attending-school-unesco-launches-global-coalition-accelerate.
     Google Scholar
  24. United Nations, Ghana (2020). COVID-19: Impact on Ghana's Education. https://ghana.un.org/en/45322-covid-19-impact-ghanas-education.
     Google Scholar