File Download
There are no files associated with this item.
Links for fulltext
(May Require Subscription)
- Publisher Website: 10.1016/B978-0-12-804629-6.00001-8
- Scopus: eid_2-s2.0-85009959363
Supplementary
-
Citations:
- Scopus: 0
- Appears in Collections:
Book Chapter: Mobile Security and Privacy
Title | Mobile Security and Privacy |
---|---|
Authors | |
Keywords | Mobile security and privacy Mobile operating systems Mobile threats Mobile device capabilities |
Issue Date | 2017 |
Publisher | Syngress. |
Citation | Mobile security and privacy. In Au, MH, Choo, KR (Eds.), Mobile Security and Privacy: Advances, Challenges and Future Research Directions, p. 1-4. Cambridge, MA: Syngress, 2017 How to Cite? |
Abstract | © 2017 Elsevier Inc. All rights reserved. The number of Internet-connected mobile devices reportedly surpassed the human population in Oct. 2014, proving that such devices are an indispensable part of our daily lives. One might also argue that in the world of business, every business is potentially a "mobile" business. This is not surprising, as the increasing capabilities of mobile devices have paved the way for many new and exciting applications (e.g., mobile commerce and payment). However, due to their popularity and the amount of data that they can store and make accessible, these devices are increasingly being targeted by cybercriminals.This chapter presents background information on the capabilities of mobile devices, the role of mobile devices within an enterprise, mobile operating systems, and finally, mobile security and privacy threats. |
Persistent Identifier | http://hdl.handle.net/10722/280614 |
ISBN |
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Au, MH | - |
dc.contributor.author | Choo, KR | - |
dc.date.accessioned | 2020-02-17T14:34:29Z | - |
dc.date.available | 2020-02-17T14:34:29Z | - |
dc.date.issued | 2017 | - |
dc.identifier.citation | Mobile security and privacy. In Au, MH, Choo, KR (Eds.), Mobile Security and Privacy: Advances, Challenges and Future Research Directions, p. 1-4. Cambridge, MA: Syngress, 2017 | - |
dc.identifier.isbn | 9780128046296 | - |
dc.identifier.uri | http://hdl.handle.net/10722/280614 | - |
dc.description.abstract | © 2017 Elsevier Inc. All rights reserved. The number of Internet-connected mobile devices reportedly surpassed the human population in Oct. 2014, proving that such devices are an indispensable part of our daily lives. One might also argue that in the world of business, every business is potentially a "mobile" business. This is not surprising, as the increasing capabilities of mobile devices have paved the way for many new and exciting applications (e.g., mobile commerce and payment). However, due to their popularity and the amount of data that they can store and make accessible, these devices are increasingly being targeted by cybercriminals.This chapter presents background information on the capabilities of mobile devices, the role of mobile devices within an enterprise, mobile operating systems, and finally, mobile security and privacy threats. | - |
dc.language | eng | - |
dc.publisher | Syngress. | - |
dc.relation.ispartof | Mobile Security and Privacy: Advances, Challenges and Future Research Directions | - |
dc.subject | Mobile security and privacy | - |
dc.subject | Mobile operating systems | - |
dc.subject | Mobile threats | - |
dc.subject | Mobile device capabilities | - |
dc.title | Mobile Security and Privacy | - |
dc.type | Book_Chapter | - |
dc.description.nature | link_to_subscribed_fulltext | - |
dc.identifier.doi | 10.1016/B978-0-12-804629-6.00001-8 | - |
dc.identifier.scopus | eid_2-s2.0-85009959363 | - |
dc.identifier.spage | 1 | - |
dc.identifier.epage | 4 | - |
dc.publisher.place | Cambridge, MA | - |