Reference Hub12
Smartphone Confrontational Applications and Security Issues

Smartphone Confrontational Applications and Security Issues

Abhishek Kumar, Jyotir Moy Chatterjee, Pramod Singh Rathore
Copyright: © 2020 |Volume: 9 |Issue: 2 |Pages: 18
ISSN: 2160-9624|EISSN: 2160-9632|EISBN13: 9781799800804|DOI: 10.4018/IJRCM.2020040101
Cite Article Cite Article

MLA

Kumar, Abhishek, et al. "Smartphone Confrontational Applications and Security Issues." IJRCM vol.9, no.2 2020: pp.1-18. http://doi.org/10.4018/IJRCM.2020040101

APA

Kumar, A., Chatterjee, J. M., & Rathore, P. S. (2020). Smartphone Confrontational Applications and Security Issues. International Journal of Risk and Contingency Management (IJRCM), 9(2), 1-18. http://doi.org/10.4018/IJRCM.2020040101

Chicago

Kumar, Abhishek, Jyotir Moy Chatterjee, and Pramod Singh Rathore. "Smartphone Confrontational Applications and Security Issues," International Journal of Risk and Contingency Management (IJRCM) 9, no.2: 1-18. http://doi.org/10.4018/IJRCM.2020040101

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

In today's society, there is a high volume of smartphones, with Android being the most popular and most commonly used smartphones. In the last few years, the Android market has been booming, making lots of developers join the industry so as to create various mobile applications that are a benefit to people's lives. However, its over-popularity has brought many crime issues, including security. One of the major common incidents to mobile users is having their mobile phones lost or stolen. Since most mobile users want to find their lost phones, they are looking for the most reliable features that can help them locate their smartphones. Luckily, there are some developed applications and services that have been designed to track down and locate lost or stolen smartphones. In this work, the authors tried to identify a collection of these applications and the information they send to the user in aiding them to find their phone. Since some applications are able to send location information or a photo, this work will look at what metadata is usually sent with the message.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.