[go: up one dir, main page]

Phu et al., 2005 - Google Patents

Security risks in mobile business

Phu et al., 2005

Document ID
17303064165900016041
Author
Phu D
Jamieson R
Publication year
Publication venue
International Conference on Mobile Business (ICMB'05)

External Links

Snippet

This paper presents the findings from a study which investigated the security and control issues surrounding the deployment of mobile and wireless applications within Australian based companies. This research undertakes an exploratory study into the perceptions of …
Continue reading at ieeexplore.ieee.org (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to network resources
    • H04L63/105Multiple levels of security
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network-specific arrangements or communication protocols supporting networked applications
    • H04L67/30Network-specific arrangements or communication protocols supporting networked applications involving profiles
    • H04L67/306User profiles

Similar Documents

Publication Publication Date Title
Yao et al. The Kano model analysis of features for mobile security applications
Friedman et al. Protecting data on mobile devices: A taxonomy of security threats to mobile computing and review of applicable defenses
Kim Online social media networking and assessing its security risks
US20080282338A1 (en) System and method for preventing the reception and transmission of malicious or objectionable content transmitted through a network
Varshney et al. Wireless in the enterprise: requirements, solutions and research directions
Gallaher et al. Cyber security: Economic strategies and public policy alternatives
Sahd et al. Mobile technology risk management
Mutong’Wa et al. A comparative study of critical success factors (csfs) in implementation of mobile money transfer services in Kenya
Proctor et al. The secured enterprise: Protecting your information assets
Milligan et al. Business risks and security assessment for mobile devices
Romansky Internet of Things and user privacy protection
Phu et al. Security risks in mobile business
Madan et al. Securely adopting mobile technology innovations for your enterprise using ibm security solutions
Blancaflor et al. A Compliance Based and Security Assessment of Bring Your Own Device (BYOD) in Organizations
Feagin The value of cyber security in small business
Gururajan A discussion on security risks in mobile commerce
Smith Establishing standards for wireless security in a security-conscious world
Hasan et al. Risk Catalogue for Mobile Business Applications.
Sanz et al. A threat model approach to attacks and countermeasures in on-line social networks
Hasan A conceptual framework for mobile security supporting enterprises in adopting mobility
Hasan et al. Security framework for adopting mobile applications in small and medium enterprises
Alqahtani Security of mobile phones and their usage in business
Franklin et al. Mobile Device Security
Harshanath Detection and protection related to data sharing technologies
Mansoor Intranet Security