File Download

There are no files associated with this item.

  Links for fulltext
     (May Require Subscription)
Supplementary

Book Chapter: Mobile Security and Privacy

TitleMobile Security and Privacy
Authors
KeywordsMobile security and privacy
Mobile operating systems
Mobile threats
Mobile device capabilities
Issue Date2017
PublisherSyngress.
Citation
Mobile security and privacy. In Au, MH, Choo, KR (Eds.), Mobile Security and Privacy: Advances, Challenges and Future Research Directions, p. 1-4. Cambridge, MA: Syngress, 2017 How to Cite?
Abstract© 2017 Elsevier Inc. All rights reserved. The number of Internet-connected mobile devices reportedly surpassed the human population in Oct. 2014, proving that such devices are an indispensable part of our daily lives. One might also argue that in the world of business, every business is potentially a "mobile" business. This is not surprising, as the increasing capabilities of mobile devices have paved the way for many new and exciting applications (e.g., mobile commerce and payment). However, due to their popularity and the amount of data that they can store and make accessible, these devices are increasingly being targeted by cybercriminals.This chapter presents background information on the capabilities of mobile devices, the role of mobile devices within an enterprise, mobile operating systems, and finally, mobile security and privacy threats.
Persistent Identifierhttp://hdl.handle.net/10722/280614
ISBN

 

DC FieldValueLanguage
dc.contributor.authorAu, MH-
dc.contributor.authorChoo, KR-
dc.date.accessioned2020-02-17T14:34:29Z-
dc.date.available2020-02-17T14:34:29Z-
dc.date.issued2017-
dc.identifier.citationMobile security and privacy. In Au, MH, Choo, KR (Eds.), Mobile Security and Privacy: Advances, Challenges and Future Research Directions, p. 1-4. Cambridge, MA: Syngress, 2017-
dc.identifier.isbn9780128046296-
dc.identifier.urihttp://hdl.handle.net/10722/280614-
dc.description.abstract© 2017 Elsevier Inc. All rights reserved. The number of Internet-connected mobile devices reportedly surpassed the human population in Oct. 2014, proving that such devices are an indispensable part of our daily lives. One might also argue that in the world of business, every business is potentially a "mobile" business. This is not surprising, as the increasing capabilities of mobile devices have paved the way for many new and exciting applications (e.g., mobile commerce and payment). However, due to their popularity and the amount of data that they can store and make accessible, these devices are increasingly being targeted by cybercriminals.This chapter presents background information on the capabilities of mobile devices, the role of mobile devices within an enterprise, mobile operating systems, and finally, mobile security and privacy threats.-
dc.languageeng-
dc.publisherSyngress.-
dc.relation.ispartofMobile Security and Privacy: Advances, Challenges and Future Research Directions-
dc.subjectMobile security and privacy-
dc.subjectMobile operating systems-
dc.subjectMobile threats-
dc.subjectMobile device capabilities-
dc.titleMobile Security and Privacy-
dc.typeBook_Chapter-
dc.description.naturelink_to_subscribed_fulltext-
dc.identifier.doi10.1016/B978-0-12-804629-6.00001-8-
dc.identifier.scopuseid_2-s2.0-85009959363-
dc.identifier.spage1-
dc.identifier.epage4-
dc.publisher.placeCambridge, MA-

Export via OAI-PMH Interface in XML Formats


OR


Export to Other Non-XML Formats