Phu et al., 2005 - Google Patents
Security risks in mobile businessPhu et al., 2005
- Document ID
- 17303064165900016041
- Author
- Phu D
- Jamieson R
- Publication year
- Publication venue
- International Conference on Mobile Business (ICMB'05)
External Links
Snippet
This paper presents the findings from a study which investigated the security and control issues surrounding the deployment of mobile and wireless applications within Australian based companies. This research undertakes an exploratory study into the perceptions of …
- 230000002708 enhancing 0 abstract description 2
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to network resources
- H04L63/105—Multiple levels of security
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network-specific arrangements or communication protocols supporting networked applications
- H04L67/30—Network-specific arrangements or communication protocols supporting networked applications involving profiles
- H04L67/306—User profiles
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Yao et al. | The Kano model analysis of features for mobile security applications | |
| Friedman et al. | Protecting data on mobile devices: A taxonomy of security threats to mobile computing and review of applicable defenses | |
| Kim | Online social media networking and assessing its security risks | |
| US20080282338A1 (en) | System and method for preventing the reception and transmission of malicious or objectionable content transmitted through a network | |
| Varshney et al. | Wireless in the enterprise: requirements, solutions and research directions | |
| Gallaher et al. | Cyber security: Economic strategies and public policy alternatives | |
| Sahd et al. | Mobile technology risk management | |
| Mutong’Wa et al. | A comparative study of critical success factors (csfs) in implementation of mobile money transfer services in Kenya | |
| Proctor et al. | The secured enterprise: Protecting your information assets | |
| Milligan et al. | Business risks and security assessment for mobile devices | |
| Romansky | Internet of Things and user privacy protection | |
| Phu et al. | Security risks in mobile business | |
| Madan et al. | Securely adopting mobile technology innovations for your enterprise using ibm security solutions | |
| Blancaflor et al. | A Compliance Based and Security Assessment of Bring Your Own Device (BYOD) in Organizations | |
| Feagin | The value of cyber security in small business | |
| Gururajan | A discussion on security risks in mobile commerce | |
| Smith | Establishing standards for wireless security in a security-conscious world | |
| Hasan et al. | Risk Catalogue for Mobile Business Applications. | |
| Sanz et al. | A threat model approach to attacks and countermeasures in on-line social networks | |
| Hasan | A conceptual framework for mobile security supporting enterprises in adopting mobility | |
| Hasan et al. | Security framework for adopting mobile applications in small and medium enterprises | |
| Alqahtani | Security of mobile phones and their usage in business | |
| Franklin et al. | Mobile Device Security | |
| Harshanath | Detection and protection related to data sharing technologies | |
| Mansoor | Intranet Security |