Security Concerns

Mobile computing and applications implythat there is no physical connection between the users exposing them to multiple security issues and threats. The security issues are associated with the transmission of data between the users orthose associated with information stored in the mobile devices(Arpaci, Kilicer & Bardakci, 2015). Users of the technology do not have control of the security procedures used to protect them. Hackers can intercept radio signals emanating from the device to attack the users. The attackers can also listen to private conversations or derive private information and use it to harm the users. Hackers can intercept information as using it to impersonate individuals owning private accounts. The hacker can haveunauthorized access and modify it to their own advantage.