[go: up one dir, main page]

Nunoo, 2013 - Google Patents

Smartphone Information Security Risks: Portable Devices and Workforce Mobility

Nunoo, 2013

View PDF
Document ID
5378589096115048496
Author
Nunoo E
Publication year

External Links

Snippet

Today's world is characterised by a heavy dependence on information technology and technological devices to perform even the simplest of tasks. While this in itself is not a bad thing, our over dependence and neglect has put us in a situation where the confidentiality …
Continue reading at www.diva-portal.org (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6281Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database at program execution time, where the protection is within the operating system

Similar Documents

Publication Publication Date Title
Nthala et al. Informal support networks: an investigation into home data security practices
Jones et al. Do business students practice smartphone security?
Parsons et al. The predator in your pocket: A multidisciplinary assessment of the stalkerware application industry
Kim Information security awareness status of business college: Undergraduate students
Barrett-Maitland et al. Security in social networking services: a value-focused thinking exploration in understanding users’ privacy and security concerns
Chigada et al. Exploring information systems security implications posed by BYOD for a financial services firm
Rasner Cybersecurity and third-party risk: Third party threat hunting
Petihakis et al. A Bring Your Own Device security awareness survey among professionals
Tounsi Cyber-Vigilance and Digital Trust: Cyber Security in the Era of Cloud Computing and IoT
Wingreen et al. Information Technology Security and Risk Management: Inductive Cases for Information Security
Rah Device Management in the Security of “Bring Your Own Device”(BYOD) for the Post-pandemic, Remote Workplace
Nunoo Smartphone Information Security Risks: Portable Devices and Workforce Mobility
Yevseyeva et al. Addressing consumerization of IT risks with nudging
Hudaib Comprehensive social media security analysis & xkeyscore espionage technology
Luckett A Zero Trust Roadmap for Consumers and Small Businesses
Nthala Home data security decisions
Wayne Social Engineering: The Effects of Cybercriminals on the Human Mind
Maseko Remedies to reduce user susceptibility to phishing attacks
Yadulla A Qualitative Approach to Data Breaches in Mobile Devices
Okomanyi Exploring risk-based approach for preventing cyberattacks in the automotive industry
Getir Development of a threat modelling framework and a web-based threat modelling tool for micro businesses
Doerfler Adversarial'Intended'Use of Technology and the Need for New Threat Models addressing Human Harms
Shearry-Sneed A case study on the benefits and barriers of information security knowledge sharing in higher education institutions
Chicone An exploration of security implementations for mobile wireless software applications within organizations
Schaller Combine DLP and EDRM to enable automatized and secure information sharing