𝔖 Bobbio Scriptorium
✦   LIBER   ✦

Securing mobile devices: technology and attitude

✍ Scribed by Steven Furnell


Publisher
Elsevier Science
Year
2006
Tongue
English
Weight
106 KB
Volume
2006
Category
Article
ISSN
1353-4858

No coin nor oath required. For personal study only.

✦ Synopsis


Phishing is on the move. Cyber criminals are continually trying to find new ways to catch users off-guard. This may include new technological developments or it may simply mean using some topical 'hook' to beguile users. Here is a roundup of where it is today.


πŸ“œ SIMILAR VOLUMES


Securing the mobile device
✍ Bruce Potter πŸ“‚ Article πŸ“… 2004 πŸ› Elsevier Science 🌐 English βš– 98 KB
Mobile Security β€” New Needs on New Devic
πŸ“‚ Article πŸ“… 2002 πŸ› Elsevier Science 🌐 English βš– 258 KB

## Anytime, anywhere on any device Marketing tells us that a new era of mobility has just begun. Millions of socalled Personal Digital Assistants (PDA) have been sold over the past few years. Together with other mobility technologies like notebooks, mobile phones, wireless LAN, Bluetooth etc. they

Securing the global, remote, mobile user
✍ Walt Curtis; Lori Sinton πŸ“‚ Article πŸ“… 1999 πŸ› John Wiley and Sons 🌐 English βš– 957 KB

## Securing the Global, Remote, Mobile User Electronic commerce is inevitable and will reshape our lives, but before true electronic commerce environments can be realized, it will be necessary to secure your enterprise against outside attacks on its electronic information and provide controls for

Your firm's mobile devices: How secure a
✍ Harry R. Wright Jr.; J. Lowell Mooney; Abbie Gail Parham πŸ“‚ Article πŸ“… 2011 πŸ› John Wiley and Sons 🌐 English βš– 147 KB

## Abstract Mobile communication devices are taking the world by a storm. They offer significant benefits. But when deciding whether your company can benefit from giving mobile devices to employees, it is important to think strategically. Do you have a comprehensive mobile security strategy? Do you

New mutual agreement protocol to secure
✍ N.W. Lo; Kuo-Hui Yeh; Chan Yeob Yeun πŸ“‚ Article πŸ“… 2008 πŸ› Elsevier Science 🌐 English βš– 202 KB

The design of a secure communication scheme for Radio Frequency IDentification (RFID) systems has been extensively studied in recent years in view of the awareness of individual privacy and the requirement of robust system security. Most of previous works assume the communication channel between an

The β€˜textual attitude’ and new technolog
✍ Neil C Ramiller πŸ“‚ Article πŸ“… 2001 πŸ› Elsevier Science 🌐 English βš– 152 KB

One of the most important tasks information systems executives face is making sense of emerging opportunities for organizational innovation through information technology. However, the parlance of information systems practitioners yields a variety of metaphors suggesting that this crucial task is a