A Qualitative Approach to Data Breaches in Mobile Devices