Nunoo, 2013 - Google Patents
Smartphone Information Security Risks: Portable Devices and Workforce MobilityNunoo, 2013
View PDF- Document ID
- 5378589096115048496
- Author
- Nunoo E
- Publication year
External Links
Snippet
Today's world is characterised by a heavy dependence on information technology and technological devices to perform even the simplest of tasks. While this in itself is not a bad thing, our over dependence and neglect has put us in a situation where the confidentiality …
- 238000005516 engineering process 0 abstract description 40
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6281—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database at program execution time, where the protection is within the operating system
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Nthala et al. | Informal support networks: an investigation into home data security practices | |
Jones et al. | Do business students practice smartphone security? | |
Parsons et al. | The predator in your pocket: A multidisciplinary assessment of the stalkerware application industry | |
Kim | Information security awareness status of business college: Undergraduate students | |
Barrett-Maitland et al. | Security in social networking services: a value-focused thinking exploration in understanding users’ privacy and security concerns | |
Chigada et al. | Exploring information systems security implications posed by BYOD for a financial services firm | |
Rasner | Cybersecurity and third-party risk: Third party threat hunting | |
Petihakis et al. | A Bring Your Own Device security awareness survey among professionals | |
Tounsi | Cyber-Vigilance and Digital Trust: Cyber Security in the Era of Cloud Computing and IoT | |
Wingreen et al. | Information Technology Security and Risk Management: Inductive Cases for Information Security | |
Rah | Device Management in the Security of “Bring Your Own Device”(BYOD) for the Post-pandemic, Remote Workplace | |
Nunoo | Smartphone Information Security Risks: Portable Devices and Workforce Mobility | |
Yevseyeva et al. | Addressing consumerization of IT risks with nudging | |
Hudaib | Comprehensive social media security analysis & xkeyscore espionage technology | |
Luckett | A Zero Trust Roadmap for Consumers and Small Businesses | |
Nthala | Home data security decisions | |
Wayne | Social Engineering: The Effects of Cybercriminals on the Human Mind | |
Maseko | Remedies to reduce user susceptibility to phishing attacks | |
Yadulla | A Qualitative Approach to Data Breaches in Mobile Devices | |
Okomanyi | Exploring risk-based approach for preventing cyberattacks in the automotive industry | |
Getir | Development of a threat modelling framework and a web-based threat modelling tool for micro businesses | |
Doerfler | Adversarial'Intended'Use of Technology and the Need for New Threat Models addressing Human Harms | |
Shearry-Sneed | A case study on the benefits and barriers of information security knowledge sharing in higher education institutions | |
Chicone | An exploration of security implementations for mobile wireless software applications within organizations | |
Schaller | Combine DLP and EDRM to enable automatized and secure information sharing |