Managing and securing mobile application and data

It should include peer reviewed articles, at least six
It should follow this book instruction “practical research, planning and design” 978-0-13-269324-0

It must be in the context of my research proposal and it should include securing personal network area