Mobile phones became main part of our daily life helping us accomplish many tasks or activities from anywhere anytime
at fingertips. These activities involve information either receiving or passing over internet, which cause cybersecurity problems. Most
of the activities handle sensitive data right from the identifying yourself to finish the activity. Cyber-threats increased with the increase
in the number of Mobiles, People, Apps and Activities. This is forcing us to consider cybersecurity of Man - Mobile and Activity –
Data/Apps concepts. In this paper, an analysis of these four main players is given in cybersecurity perspective by considering the
relationships among these four players. Further driven-apps and their influence are also considered in the analysis graphically.
Introduced a point scaling the effectiveness of analyzing the relationships which help understand the risk severity.
Published In:IJCSN Journal Volume 6, Issue 3
Date of Publication : June 2017
Pages : 409-416
Tables : 05
VSRao Sasipalli : received bachelors and masters in Mathematics
from Andhra University, advanced masters from Technical University
of Kaiserslautern and Doctorate from Hiroshima University. He
worked as Lecturer, Engineer and coordinator for companies and
Universities both in India and Japan. His main research interests
focus on applications of technology to society. Other interests include
developing strategies for technology development. He is a life
member in many professional organizations. He published paper in
interdisciplinary areas of Mathematics, Computer Science,
Electronics and Sociology. He received best faculty award from
SITAM Engineering College, India. He is currently focusing on
Hideaki Mukai : received bachelors and masters from
Hiroshima City University. He has been with Fuji Soft Co. Ltd., as
Manager of Software Division. His research interests include
development of good smartphones and manage technical human
resources. He is currently focusing on business development
strategies in smartphone arena.
KrishnamRaju Gottumukkala : is a retired professor of engineering
mathematics. His served Andhra University for 45 years and now
research advisor. His research interests focus on engineering
applications for society. He is currently focusing on developing
methodologies for social change through technology.
Man-Mobile, Data-Activity, Cybersecurity, Driven Apps, Point Scaling, t-tests and Analysis
Cybersecurity is a Fuzzy network of security problems and
solutions. Though several methodologies, approaches and
solutions are proposed by various researchers, none of
them focused on the Man – Mobile relationships to
analyze the security issues. We proposed new
methodology, studied and analyzed the Man – Mobile
relationships, by statistical methods. These statistical
methods usually are applied in population, or action –
response observation, but we apply them for security
 Cesar Cerrudo "Why Cybersecurity Should Be The
Biggest Concern Of 2017", Forbes Technology Council,
 "Cyber Security: Considerations and Techniques for
Network-Based Protection", an Industry Whitepaper,
Sandvine Incorporated ULC, 2016.
 "Which Activities Do Smartphone Owners Prioritize on
Their Devices?", Marketing Charts staff, Feb. 2016.
 Paul Ruggiero and Jon Foote, "Cyber Threats to Mobile
Phones", US-CERT, Carnegie Mellon University, 2011.
 Robertas Damasevicius Rytis Maskeliunas, et. al.,
"Smartphone User Identity Verification Using Gait
Characteristics", MDPI, pp.1-20, Vol.8, Symmetry 2016.
 "Situational Usage of Mobile Applications?", Marketing
Charts staff, Nov. 2016.
 Fox Van Allen "Top 25 Smartphone Apps Revealed",
Techlicious, Technical Report, Aug 2016.
 David Frei, “Conducting a Risk Assessment for Mobile
Devices” Information Systems Security Asso., May 2012.
All rights reserverd @ IJCSN International Journal www.IJCSN.org