Provided by: International Journal of Scientific and Research Publication (IJSRP)
Date Added: Feb 2014
Information technology users are increasingly dependent on mobile devices while computers are stationed in offices and cyber cafes. Most of these mobile devices like Smartphones use location applications such as Google maps for reporting their locations. With computers in offices and cyber cafes and people able to log in to other accounts in their mobile devices, it is likely that a trusted workmate who gets access to their authentication credentials i.e. user name and password to use them to access, interfere, or copy their work in their absence.