Securing mobile devices: technology and attitude
β Scribed by Steven Furnell
- Publisher
- Elsevier Science
- Year
- 2006
- Tongue
- English
- Weight
- 106 KB
- Volume
- 2006
- Category
- Article
- ISSN
- 1353-4858
No coin nor oath required. For personal study only.
β¦ Synopsis
Phishing is on the move. Cyber criminals are continually trying to find new ways to catch users off-guard. This may include new technological developments or it may simply mean using some topical 'hook' to beguile users. Here is a roundup of where it is today.
π SIMILAR VOLUMES
## Anytime, anywhere on any device Marketing tells us that a new era of mobility has just begun. Millions of socalled Personal Digital Assistants (PDA) have been sold over the past few years. Together with other mobility technologies like notebooks, mobile phones, wireless LAN, Bluetooth etc. they
## Securing the Global, Remote, Mobile User Electronic commerce is inevitable and will reshape our lives, but before true electronic commerce environments can be realized, it will be necessary to secure your enterprise against outside attacks on its electronic information and provide controls for
## Abstract Mobile communication devices are taking the world by a storm. They offer significant benefits. But when deciding whether your company can benefit from giving mobile devices to employees, it is important to think strategically. Do you have a comprehensive mobile security strategy? Do you
The design of a secure communication scheme for Radio Frequency IDentification (RFID) systems has been extensively studied in recent years in view of the awareness of individual privacy and the requirement of robust system security. Most of previous works assume the communication channel between an
One of the most important tasks information systems executives face is making sense of emerging opportunities for organizational innovation through information technology. However, the parlance of information systems practitioners yields a variety of metaphors suggesting that this crucial task is a