0% found this document useful (0 votes)
87 views18 pages

A Comparative Study of Apple iOS and Android Operating Systems in Terms of Their Security

This document is a chapter from a research paper that compares the security of Apple's iOS operating system and Google's Android operating system. The chapter introduces the topic of mobile phone security and how it affects students. It establishes the problem statement, hypotheses, significance, and definitions of key terms for the research. The conceptual framework outlines how student profiles and choices will be gathered and evaluated to compare the security of the two operating systems and their impact on students.

Uploaded by

Michael Perdiz
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
87 views18 pages

A Comparative Study of Apple iOS and Android Operating Systems in Terms of Their Security

This document is a chapter from a research paper that compares the security of Apple's iOS operating system and Google's Android operating system. The chapter introduces the topic of mobile phone security and how it affects students. It establishes the problem statement, hypotheses, significance, and definitions of key terms for the research. The conceptual framework outlines how student profiles and choices will be gathered and evaluated to compare the security of the two operating systems and their impact on students.

Uploaded by

Michael Perdiz
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 18

Benigno “Ninoy” Aquino High School

Integrated Senior High School


Aguho St., Comembo, Makati City

A Comparative Study of Apple iOS and Android


Operating Systems in terms of their Security

Researcher:
Perdiz, Michael I.
12 - Oracle

Teacher:
Mrs. Joyce Alayon

Benigno "Ninoy" S. Aquino High School 2019-2020


CHAPTER 1

I. Introduction:

Mobile phones are one of the most used gadgets worldwide, cellphone users
were mainly used as storage for their secured files, documents and other files that
they could store them in their cellphones. In this generation, even children have their
own cellphones, it’s also another reason why mobile phone is one of the most used
gadgets in the whole world. This area of interest was chosen because of the
unregulated usage of all students, and over dependent attitude on these devices
especially among our Senior High School students in Benigno “Ninoy” Aquino High
School.

However, Apple, or iOS is the first operating system in smartphone that had
been released in June 2007. In recent years, there is one that competed with iOS, and
that’s what also most people used them. The name is Android OS, which also released
in September 2008. Different types of mobile phones have been produced by different
phone manufacturers. These includes; Nokia, Samsung, Vivo, RealMe, Cherry Mobile
etc., most of them has the same Android OS. Apple is the only one that has the iOS
system.

There are a lot of people who are using technologies nowadays and they are
called Techy Citizens, those persons who works in a company, students and etc. and
because of this matter according to the study of Statista the percentage Mobile Phone
Internet User Penetration Worldwide from 2014 up to this year 2019 is 63.4% which
is, it was well testified that the users of mobile phones this year is really increasing.
The researcher will find an Apple iOS user and an Android OS user to the students of
Senior High School to gather an information if what device or operating system is more
secured, and how does it affect to their everyday life.
II. Background of the Study

This study was conducted by the researcher to prove on who has the higher
security rate between iOS and Android Operating System. It also benefits the readers
and they’ll be aware of this kind of topic, and to be enlightened. In terms of security,
some people don’t know what security all about, they just using the Mobile Phone for
gaming, reading e-books, creating an account on social media without knowing if the
website that their browsing is safe, etc.

This is a short definition of these two Operating Systems:

Android is a mobile operating system developed by Google. It is used by


several smartphones and tablets. Examples include the Sony Xperia, the Samsung
Galaxy, and the Google Nexus One.

(https://techterms.com/definition/android)

iOS is a mobile operating system developed by Apple. It was originally named


the iPhone OS, but was renamed to the iOS in June, 2009. The iOS currently runs on
the iPhone, iPod touch, and iPad. Like modern desktop operating systems, iOS uses
a graphical user interface, or GUI. However, since it is a mobile operating system, iOS
is designed around touchscreen input, rather than a keyboard and mouse. For
example, applications, or "apps," can be opened by a single tap, rather than a double-
click. Different screens can be viewed by swiping your finger across the screen, rather
than clicking on open windows.

(https://techterms.com/definition/ios)
III. Conceptual Framework

In this study, the relationship between the students and the Operating System,
with their choice in comparing them is conceived the conceptual framework base on
the Input-Process-Output system approach. These conceptual frameworks will be
served as guide by the researchers in solving the problem under investigation.

INPUT PROCESS OUTPUT

 Student’s Profile  Comparison study of Apple


 Evaluations
iOS and Android Operating
through
 Student’s Choice Systems by their security at
survey,
among them Benigno "Ninoy" S. Aquino
questionnaire.
High School 2019-2020
 Survey instrument  Comparison  The usage and the relation
study of Apple -ship
iOS and between the mobile
Android phones
Operating of Senior High students of
Systems by Benigno
their security at Aquino High School.
Benigno
"Ninoy" S.  Recommendation of
Aquino High them is more secured
School 2019- among the Apple iOS
2020 and Android OS.
 Security that
had
experienced of
the SHS
students of
Benigno
“Ninoy” Aquino
High School.

 Presentation,
analysis and
interpretation
of results.
IV. STATEMENT OF THE PROBLEM

Mobile Phone Securities was not as rampant among users compared to how it
is now being used; especially among Senior High School Student’s. Because, security
is the best option to store our personal information safely and not to be seen by
everybody.

This study seeks to answer the following:

1. Do you have access to mobile phones?

2. Is the security of a Mobile Phone affects the daily lives of the students?

3. Do you care about their security?

V. HYPOTHESES

NULL:

There is no significant difference between Android and Apple Operating System in


terms of Security

ALTERNATIVE:

There is a significant difference between Android and Apple Operating System in


terms of Security
VI. SIGNIFICANCE OF THE STUDY

The result of the study will be a great benefit to the following:

Learners- It will provide the learners, the students some knowledge about the security
of these operating systems. It will also give the student’s realization that if a mobile
phone has a higher secured system, their documents and also the mobile phone won’t
be colonized by virus and to be hacked by everybody. At the end of this study, the
students would finally realize and aware that having and using a lower or higher
secured mobile phone is also a major problem that they are using every day.

Teachers- This given data will also guide the Teachers, because most teachers also
have a mobile phone. So, for me, this research will help them to be aware about the
security in each Mobile Operating Systems.

Programmers- They’ll benefit this kind of research, because they’re doing a program
or anything that needs that device or mobile phone more secured. So, they will realize
that they need a more secured mobile operating system to not be cracked by other
programmers and privately not be seen by everybody.

Future Researchers- This research will be a useful reference for the Future
Researchers who have plan to know more and study about this topic.

Companies/Agencies/Government- This given data will be a useful reference for


their everyday work. Their badly need a highly secured System in order to be protected
their important/private documents.
VII. DEFINITION OF TERMS

Apple iOS- iOS is a mobile operating system developed by Apple. It was originally
named the iPhone OS, but was renamed to the iOS in June, 2009.

Android- Android is a mobile operating system developed by Google. It is based on


a modified version of the Linux kernel and other open source software, and is
designed primarily for touchscreen mobile devices such as smartphones and tablets.

Security- It is concerned with studying from books or modules as opposed by a


practical work.

Impact- The effect of something on another thing.

Mobile- Anything that can be carried from one place to another.

Phone- Electronic Equipment that converts sound into electrical signals that can be
transmitted over, distances and then converts received signals back into sounds

Students- Someone who is studying at school.


CHAPTER II

REVIEW OF RELATED LITERATURE

This chapter includes the complication of literature and study personally

chosen by the researcher. To gain a wider view of the study, a review of related

literature and studies is conducted. Books as well as published and unpublished

theses and dissertation and the use of Internet are included in this review. These

materials are in one way or another related to the present study.

ANDROID vs iOS Security: A Comparative Study

According to I Mohamed & Dhiren Patel (2015). The massive adoption of

mobile devices by individuals as well as by organizations has brought forth many

security concerns. Their significant abilities have resulted in their permeating use

while correspondingly increasing their attractiveness as targets for cybercriminals.

Consequently, mobile device vendors have increasingly focused on security in their

design efforts. However, present security features might still be insufficient to protect

users' assets. In this paper, factors that influence security within the two leading

mobile platforms, Android and iOS, are presented and examined to promote

discussion while studying them under one umbrella. We consider various factors that

influence security on both platforms, such as application provenance, application

permissions, application isolation, and encryption mechanisms.


For instance, in 2009, Apple removed all applications developed by Storm8

from the App Store when it discovered that these applications were collecting users’

personal information.

When Apple knows about its offending behavior, it removes it from the App Store.

As of May 2013, there were over 800,000 third-party applications in the Apple

App Store and about the same number on Google Play for the Android

(https://www.semanticscholar.org/paper/Android-vs-iOS-Security%3A-A-Comparative-Study-

Mohamed-Patel/f203b9e575d5d8256ce9ceff8a99e0f4b0407ba3#related-papers)

Published in 12th International Conference on Information.


CHAPTER III
METHODOLOGY

A research methodology is an organized plan needed to fully accomplish a


certain research. This will help in delivering true information and relevant data to the
readers by performing some techniques and approaches like quantitative method
which uses numerical data through survey or census and using non-numerical data
through observations or interviews in qualitative method. Research methodology will
help the inquisitors maximize their efforts and time through a systematic process in
figuring new ideas, collecting information, analyzing, and interpreting the data
gathered which will enable them to provide a well-written paper. Through research
methodology, articles that contains related contexts or articles and information from
the target population are combined to have a more meaningful paper.

3.1 RESEARCH DESIGN


This research will use the survey questionnaire to identify the comparison
between the two operating systems by their security in Senior High School Students.
The type of research design is a Quantitative Research Design. Because it needs a
number of students in order to make a perfect decision in comparing

3.2 POPULATION AND SAMPLING TECHNIQUE


The population of the study were made up to 30 students from the Grade 12.
The respondents were enrolled during the first semester in Benigno “Ninoy” S. Aquino
High School.

In this study, purposive sampling is used to find if the population size is large
for which to complete research. An analyst may take on a more feasible approach by
selecting a small group from the population. The small group is referred to as a sample
size, which is a subset of the population that is used to represent the entire population.
A sample may be selected from a population through a number of ways, to identify the
comparison between the two operating systems by their security based on the
answered survey questionnaires.

3.3 RESEARCH INSTRUMENT


Thirty (30) copies of the survey questionnaires were produced and
administered by the researcher to the randomly selected 30 students of Grade 11 from
Senior High School in Benigno “Ninoy” S. Aquino High School. The researcher will
select 15 students that use an Android Device. Then, also 15 students that use an iOS
device for a total of 30.

3.4 DATA GATHERING PROCEDURE


First, identify the answers of the respondents. Second, is the survey
questionnaire to achieve the purpose of the study because of this survey
questionnaire, the researcher can gather a lot of data or information in this study. The
respondents are the student who took the TVL-ICT track because they’re mainly
related in this kind of topic.
The questionnaire was composed of two parts, one, is contained the personal
data of the respondents such as their name, gender, year level and strand. Two, which
is the questions, these will be based upon the ideas found by the researcher in
journals, magazine, etc.

3.5 DATA ANALYSIS TECHNIQUE


The survey questionnaire is a set of questions and a type of data gathering
method that is utilized to collect, analyze and interpret the different views of a group
of people from a particular population. The researcher tabulates, analyze and prepare
graph five-point Likert scale data. Moreover, survey analysis gives the ability to
researchers to structure the qualitative data collected in a way that satisfies the
accomplishment of research objectives.

CHAPTER IV

PRESENTATION, ANALYSIS AND INTERPRETATION OF DATA

This chapter shows the presentation, analyzation and treatment of data of this

research study. The data presentation will serve as the answer set by the researcher

in the statement of the problem found in Chapter I. This is done by using or performing

appropriate techniques such as tables or graphs that require clear, specific, and logical

analysis of the researcher.


PRESENTATION OF DATA

The Demographic Profile of the Respondents.

Table 4.1

CHOICE PERCENTAGE
N

iOS 15 50.00%

ANDROID 15 50.00%

TOTAL 30 100%

Table 4.1.2

Demographic Profile of the Respondents

A. Grade level

GRADE LEVEL N PERCENTAGE

GRADE 12 TVL-ICT 30 100%

TOTAL 30 100%
This table the Demographic Profile of the chosen respondents. There are thirty

(30) respondents on the days the researcher conducted the survey. There are thirty

(30) respondents for the Grade 12 TVL-ICT students (15 are iOS users and 15 are

Android users) with a percentage score of 100%.

Table 4.2.1

1. Are you aware of one’s mobile system securities?

VARIABLES SCORES PERCENTAGE

Strongly Disagree 1 3%

Disagree 0 0%

Undecided 0 0%

Agree 3 10%

Strongly Agree 26 87%

TOTAL 30 100%

This table shows that the awareness of the students about securities has
a great impact based on the percentage of 87%.

TABLE 4.2.2

2. Do you usually think that, the higher the price of the phone, the more secured
system it has?

VARIABLES SCORES PERCENTAGE

Strongly Disagree 1 3%
Disagree 3 10%

Undecided 5 17%

Agree 4 13%

Strongly Agree 17 57%

TOTAL 30 100%

This table shows that buying a pricy phone has more security protection
based on the percentage of 57% in Strongly Agree.

TABLE 4.2.3
3. Do you think Android’s security is more secured than Apple iOS’s security?

VARIABLES SCORES PERCENTAGE

Strongly Disagree 5 17%

Disagree 6 20%

Undecided 5 17%

Agree 2 7%

Strongly Agree 12 40%

TOTAL 30 100%

This table shows that 40% of students of G12-TVL ICT decides that
Android’s security is more secured than Apple’s iOS security.
TABLE 4.2.4
4. Is it better to buy an expensive phone rather than the cheap ones?

VARIABLES SCORES PERCENTAGE

Strongly Disagree 1 3%

Disagree 2 7%

Undecided 6 20%

Agree 6 20%

Strongly Agree 15 50%

TOTAL 30 100%

This table shows that 50% of them strongly agreed that buying a much
expensive mobile phone is better than buying a cheaper phone.

TABLE 4.2.5
5. Do you think iOS’s security is more secured than Android?

VARIABLES SCORES PERCENTAGE

Strongly Disagree 1 3%

Disagree 6 20%

Neutral 2 7%

Agree 7 23%

Strongly Agree 14 48%

TOTAL 30 100%
This table shows that 48% of students of G12-TVL ICT decides that iOS’s
security is more secured than Android’s security.

CHAPTER V

SUMMARY, CONCLUSIONS, AND RECOMMENDATIONS

5.1 SUMMARY

This study focused about the comparison of the two Operating Systems ,the
Android and the Apple iOS in terms of their security. However, the following findings
were made from the study:

1. The table 4.2.1, the respondents answered that their awareness about their
cellphone’s security had a great impact with a percentage of 87%

2. The table 4.2.2, 57% agreed they usually think when buying a more expensive
phone, the higher security protection it has.

3. The Table 4.2.3, only 40% of respondents agreed that Android has a greater
security protection than Apple.

4. The Table 4.2.4, the students agreed that its way better you’ll buy an expensive
Phone. Because for them, it has a greater security protection.

5. 48% of respondents strongly agreed that iOS’s security is slightly better than
Android.

5.2 CONCLUSION

1. In conclusion, most of the students tend to have an expensive mobile phone,


because its more usable, reliable, and has more security protection rather than a
cheap mobile phone, but its rarely uncomfortable and has lesser security protection
which they’ll get worry about. Apple is the best example for an expensive phone,
then Android for cheaper phones.

2. Android’s Operating System and Apple’s Operating System in terms of their


security results is just near to each other. Based on their strongly agreed answers,
48% had agreed to Apple, and 40% for Android.
3. According to the data gathered, the respondents of the research are
composed of 15 Android user students with a percentage of 50.00% and a number
of 15 Apple user students with a percentage of 50.00%.

5.3 RECOMMENDATIONS

Based on the findings of this research, the following recommendations were


formulated:

1. Students should have a better decision in buying a mobile phone.

2. In terms of security, the readers of this research should be aware about this
result.

3. All of the cellphone users should also be advised for buying an expensive
phone, rather than a cheap phone. They’ll just give an advice for their security
of their documents to be more protected and to not be colonized by virus,
hackers, etc.
REFERENCES

https://www.researchgate.net/publication/235439008_The_
Impact_of_Mobile_Phone_Usage_on_Student_Learning?fbcli
d=IwAR0oYf6xX34Y89sTZ4JE2kRMDv1TvmKs4kDKN6PAJW2q
rPMIVDDbCnsqR1A

https://www.semanticscholar.org/paper/Android-vs-iOS-
Security%3A-A-Comparative-Study-Mohamed-
Patel/f203b9e575d5d8256ce9ceff8a99e0f4b0407ba3#re
lated-papers

https://techterms.com/definition/android

https://www.semanticscholar.org/paper/Android-vs-iOS-
Security%3A-A-Comparative-Study-Mohamed-
Patel/f203b9e575d5d8256ce9ceff8a99e0f4b0407ba3#related-
papers

https://techterms.com/definition/ios

You might also like