IIUM Repository

Mobile Quran app security vulnerabilities

Talib, Shuhaili and Mahmud, Murni and Abd Rahman, Emilia Sarah and Songib, Anis Suraya and Ibrahim, Adamu Abubakar (2015) Mobile Quran app security vulnerabilities. In: 5th International Conference on Computing and Informatics, ICOCI 2015, 11th-13th Aug. 2015, Istanbul, Turkey.

[img] PDF - Published Version
Restricted to Registered users only

Download (1MB) | Request a copy
PDF (WOS) - Supplemental Material
Download (349kB) | Preview


The security threats and vulnerabilities of mobile Quran appli-cations can be viewed from both developers’ and a service perspective. Sim-ilar to other apps categories like entertainment apps, games apps, banking apps and many others, understanding the threats and vulnerabilities of mobile Quran apps and the ways to manage them is crucial. With regard to the rapid transformation of many services and transactions onto mobile platforms, the security awareness of these becomes very important. Developers are respon-sible for ensuring that they have the necessary tools they need to build secure mobile apps which will secure and protect end user privacy and ensure relia-ble service delivery. Mobile Quran apps that provide features for enabling reading the Quran and interacting with other add-ons prolific events, like an easy and fast surah index list, efficient search features and many more need to be protected. Any attempt that could compromise the originality of the con-tent of the Quran which is built for mobile apps needs to be identified. Unfor-tunately the security vulnerabilities within these features that convey the con-tents of the Quran are not clear, and there is a lack of noticeable security threats and vulnerabilities from previous studies. This paper examine the cat-egory of mobile Quran app and investigates its security threats and vulnera-bilities. The outcome indicates measures to ensure that end users get the mo-bile Quran apps they need without compromising their privacy.

Item Type: Conference or Workshop Item (Plenary Papers)
Additional Information: 4295/46377
Uncontrolled Keywords: mobile Quran apps, threat, security vulnerabilities
Subjects: T Technology > T Technology (General) > T55.4 Industrial engineering.Management engineering. > T58.5 Information technology
Kulliyyahs/Centres/Divisions/Institutes (Can select more than one option. Press CONTROL button): Kulliyyah of Information and Communication Technology > Department of Information System
Kulliyyah of Information and Communication Technology > Department of Information System

Kulliyyah of Information and Communication Technology
Kulliyyah of Information and Communication Technology
Depositing User: Ms Shuhaili Talib
Date Deposited: 23 Dec 2015 11:39
Last Modified: 17 Oct 2019 16:34
URI: http://irep.iium.edu.my/id/eprint/46377

Actions (login required)

View Item View Item


Downloads per month over past year