Show simple item record

dc.contributor.authorKivindyo, Angela Wanjiku
dc.contributor.authorMasese, Nelson
dc.contributor.authorTanui, John Kipkorir
dc.date.accessioned2020-02-25T08:53:05Z
dc.date.available2020-02-25T08:53:05Z
dc.date.issued2019-10
dc.identifier.issn2454-8236
dc.identifier.urihttp://10.1.130.140:8080/xmlui/handle/123456789/306
dc.descriptionFULL TEXTen_US
dc.description.abstractPrivacy invasion is an offence perpetrated by availability, access, and use of advanced mobile devices when they land in the wrong hands of people who have the intention of infringing into the space of either organizations or individuals. There has been infringement of people’s rights by exposing their personal lives to third parties and the general public, a factor which is associated with detrimental effects, therefore the study sought to evaluate the effects of mobile application security strategies on privacy invasion with special focus on mobile shop operators within , Kenya, The study specifically sought to establish the effect of data encryption on privacy invasion and privacy settings on privacy invasion among mobile shop operators in Nakuru East Sub-County, Kenya. The study was guided by the Technology Acceptance Model and control theory of privacy. The study adopted a cross-sectional research design, and was carried out inNakuru East Sub-County. The units of observation were mobile shops withinNakuru East Sub-County, while the units of analysis were operators of mobile shops. According to Nakuru East Sub-County Business Register (2019), there are 221 mobile shops within Nakuru East Sub-County. The researcher purposively selected one respondent (Operators) from each of the 221 mobile shops therefore the study population had 221 respondents. Nassiuma’s (2000) formula was used to determine the sample size of 70 operators of mobile shops. The study used structured questionnaires to facilitate data collection. The pilot study was conducted in Eldoret town where questionnaires were issued out to 7 selected operators of mobile shops. The collected data was analyzed with the aid of the Statistical Package for Social Sciences. Descriptive statistics encompassing frequencies, percentages, means, standard deviations, and chi-square were used in the analysis. In addition, inferential statistics such as correlation and multiple regression analysis were used. From the findings the researcher concluded that, mobile shopoperators in Nakuru East Sub-County always use specific keys on all the data that they save on their phones. From the findings the researcher concluded that, mobile phone operators in Nakuru East Sub-County have embraced most of the mobile application security strategies on their phones and thus, lowering the chances of becoming victims of privacy invasion.The study recommended that mobile shop operators within Nakuru East Sub-Countyshould adopt data encryption security because it allows protection of data that they do not want anyone else to have access to. The researcher also recommended that mobile should adopt privacy setting techniques.en_US
dc.language.isoenen_US
dc.publisherWorld Journal of Innovative Researchen_US
dc.subjectData Encryption, Mobile Application Security Strategies, Privacy Invasion, Privacy Settings and Risk Analysis.en_US
dc.titleEffects of Mobile Application Security Strategies on Privacy Invasion among Mobile Shop Operators in Nakuru East Sub-County, Kenyaen_US
dc.typeArticleen_US


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record