Chapter 4 Dissertation (Only IT And Computer Science Experienced Person Should Contact Me) Write 25 pages of Chapter 4 Dissertation 3 Pages with all detai

Click here to Order a Custom answer to this Question from our writers. It’s fast and plagiarism-free.

Write 25 pages of Chapter 4 Dissertation

3 Pages with all details included in the document attached

Run the survey for 150 members survey questions are attached and do the calculation chi-square and conclude the results in detail

Please don’t contact me If you don’t have IT, Computer Science Experience


Topic name: Security issues with third-party applications personal use

This Dissertation collects data by doing a online survey related to security concerns and risks associated with third-party applications to identify and classify the primary security and privacy concerns in third-party applications. A methodology frequently describes the method utilized to gather information from accessible sources. Analyzing and identifying the risks and security issues and understanding better how the third-party applications can securely be utilized. This study focused on data privacy and protection in third-party applications by quantitative analysis and identifying and classifying third-party applications’ security concerns.

The purpose of this quantitative analysis study is to explore security concerns with third-party applications. Many users adopt third-party applications on their smartphones and personal computers for personal use.

Chapter Four


Research Findings



1 Introduction

Indent each new paragraph. Write your next section here.


2 Participants and Research Setting

Indent each new paragraph. Write your next section here. Include the number of participants (N=) and provide specifics about the surveyed sample population. (Perform survey check page 3)

Do not include the names of any schools, businesses, or institutions for confidentiality reasons. The use of an alternative format to identify the organization. Options such as the general geographical location (School district in the Southeast, Organization A, Organization B, or other appropriate alternative formats should be used.


3 Analyses of Research Questions

Indent each new paragraph. Write your next section here. List and number research questions one at a time. You should address each question with its own level three heading.

Research Question 1. What is the perceived usability of Third-party applications among smart device users?

Research Question 2. Can smart device users trust in a third-party security applications security functionality have a significant negative impact on the user’s privacy?

Research Question 3. Can smart device user’s trust in a third-party security applications security functionality have a significant positive impact on the user’s privacy?

Use italics for letters used as statistical symbols or algebraic variables (e.g., contained 587 t-test p values; R2 = .12). Report exact p values to two or three decimals (e.g., p = .006, p = .03). However, report p values less than .001 as “p < .001.”

Consult the Numbers and Statistics Guide from American Psychological Association for additional guidance. Consult the Tables and Figures section from APA Style for guidelines and examples of tables and figures.

5 Supplementary Findings

Indent each new paragraph. Write your next section here.

6. Statistical Test


7 Summary

Indent each new paragraph. Write your next section here. Summarize your results and provide a transition to Chapter Four.

8. Survey Questions:

1. I intend to download and use a free third-party security application

2. I am willing to download and use a free third-party security app on my smart devices

3. If my smartphone or tablet is lost, my privacy information could be exposed to others.

4. If my smartphone or tablet is lost, my life and work will be interrupted by the loss of information.

5. I believe that free third-party security apps are becoming more and more functional.

6. I believe that free third-party security apps are critical for smart devices.

7. I believe the operating system of my smart device is good at information security.

8. I believe that the operating system on my smart device is capable of keeping my information secure.

9. I believe that free third-party security apps in the market can protect my information as they promised.

10. I trust the functionality of free third-party security apps in information protection.

Collect survey responses minimum 150 and do the calculations chi square

Place your order now for a similar assignment and have exceptional work written by one of our experts, guaranteeing you an A result.

Need an Essay Written?

This sample is available to anyone. If you want a unique paper order it from one of our professional writers.

Get help with your academic paper right away

Quality & Timely Delivery

Free Editing & Plagiarism Check

Security, Privacy & Confidentiality