1,024 research outputs found

    Future consumer mobile phone security: a case study using the data centric security model

    Get PDF
    In the interconnected world that we live in, traditional security barriers are\ud broken down. Developments such as outsourcing, increased usage of mobile\ud devices and wireless networks each cause new security problems.\ud To address the new security threats, a number of solutions have been suggested,\ud mostly aiming at securing data rather than whole systems or networks.\ud However, these visions (such as proposed by the Jericho Forum [9] and IBM\ud [4]) are mostly concerned with large (inter-) enterprise systems. Until now, it is\ud unclear what data-centric security could mean for other systems and environments.\ud One particular category of systems that has been neglected is that of\ud consumer mobile phones. Currently, data security is usually limited to a PIN\ud number on startup and the option to disable wireless connections. The lack of\ud protection does not seem justified, as these devices have steadily increased in\ud capabilities and capacity; they can connect wirelessly to the Internet and have\ud a high risk of being lost or stolen [8]. This not only puts end users at risk, but\ud also their contacts, as phones can contain privacy sensitive data of many others.\ud For example, if birth dates and addresses are kept with the contact records, in\ud many cases a thief will have enough information to impersonate a contact and\ud steal his identity.\ud Could consumer mobile phones benefit from data-centric security? How\ud useful is data-centric security in this context? These are the core questions we\ud will try to address here

    A Survey of Mobile Computing Security Issues and Possible Solutions

    Get PDF
    This project reviews security issues with mobile devices and offers possible solutions from Internet sources. (supplied by OPUS staff

    Native Apps versus Web Apps: which is best for healthcare applications?

    Get PDF
    Smartphone applications (Apps) provide a new way to deliver healthcare, illustrated by the fact that healthcare Apps are estimated to make up over 30% of new Apps currently being developed; with this number seemingly set to increase as the benefits become more apparent. In this paper, using the development of an In Vitro Fertilisation (IVF) treatment stress study App as the exemplar, the alternatives of Native App and Web App design and implementa-tion are considered across several factors that include: user interface, ease of development, capabilities, performance, cost, and potential problems. Development for iOS and Android platforms and a Web App using JavaScript and HTML5 are discussed

    Information security concerns around enterprise bring your own device adoption in South African higher education institutions

    Get PDF
    The research carried out in this thesis is an investigation into the information security concerns around the use of personally-owned mobile devices within South African universities. This concept, which is more commonly known as Bring Your Own Device or BYOD has raised many data loss concerns for organizational IT Departments across various industries worldwide. Universities as institutions are designed to facilitate research and learning and as such, have a strong culture toward the sharing of information which complicates management of these data loss concerns even further. As such, the objectives of the research were to determine the acceptance levels of BYOD within South African universities in relation to the perceived security risks. Thereafter, an investigation into which security practices, if any, that South African universities are using to minimize the information security concerns was carried out by means of a targeted online questionnaire. An extensive literature review was first carried out to evaluate the motivation for the research and to assess advantages of using Smartphone and Tablet PCā€™s for work related purposes. Thereafter, to determine security concerns, other surveys and related work was consulted to determine the relevant questions needed by the online questionnaire. The quantity of comprehensive academic studies concerning the security aspects of BYOD within organizations was very limited and because of this reason, the research took on a highly exploratory design. Finally, the research deliberated on the results of the online questionnaire and concluded with a strategy for the implementation of a mobile device security strategy for using personally-owned devices in a work-related environment

    From ZeuS to Zitmo : trends in banking malware

    Get PDF
    In the crimeware world, financial botnets are a global threat to banking organizations. Such malware purposely performs financial fraud and steals critical information from clients' computers. A common example of banking malware is the ZeuS botnet. Recently, variants of this malware have targeted mobile platforms, as The-ZeuS-in-the-Mobile or Zitmo. With the rise in mobile systems, platform security is becoming a major concern across the mobile world, with rising incidence of compromising Android devices. In similar vein, there have been mobile botnet attacks on iPhones, Blackberry and Symbian devices. In this setting, we report on trends and developments of ZeuS and its variants

    Survey of End-to-End Mobile Network Measurement Testbeds, Tools, and Services

    Full text link
    Mobile (cellular) networks enable innovation, but can also stifle it and lead to user frustration when network performance falls below expectations. As mobile networks become the predominant method of Internet access, developer, research, network operator, and regulatory communities have taken an increased interest in measuring end-to-end mobile network performance to, among other goals, minimize negative impact on application responsiveness. In this survey we examine current approaches to end-to-end mobile network performance measurement, diagnosis, and application prototyping. We compare available tools and their shortcomings with respect to the needs of researchers, developers, regulators, and the public. We intend for this survey to provide a comprehensive view of currently active efforts and some auspicious directions for future work in mobile network measurement and mobile application performance evaluation.Comment: Submitted to IEEE Communications Surveys and Tutorials. arXiv does not format the URL references correctly. For a correctly formatted version of this paper go to http://www.cs.montana.edu/mwittie/publications/Goel14Survey.pd

    Impact of switching costs and network effects on adoption of mobile platforms

    Get PDF
    Objectives of the Study: The purpose of this thesis is to evaluate the switching costs while adopting a new mobile platform and examine the network effects on the user switching behavior of the mobile platforms. In addition, this thesis examines whether it is more difficult to shift to a new cloud service provider or mobile platform. Windows, Android and iOS are the three platforms that are analyzed in this study. Academic background and methodology: To achieve the purpose of this study the qualitative research technique involving focus group interviews was utilized. The background literature outlined current understanding of the switching costs and divided them into five categories: search costs, costs of transaction, learning costs, complementary investments and brand relationship costs. Additional concepts were defined to get better understanding of the network effects, cloud services and mobile platforms. Three largest mobile platform providers, Microsoft, Apple and Google were analyzed using the (IISIn) model. The impact of the switching costs and network effects was analyzed from the user's perspective through four different focus groups with participants from different professional occupations. Thereafter the interviews were transcribed and qualitatively analyzed. The results of this study are presented in the form of propositions that can be tested in the future research. Findings and conclusions: The research shows that the most prominent barriers when adopting new mobile platforms are: time and effort required to learn how to use the new platform, loss of non-transferable goods and services, and emotional attachments to the brand. Furthermore, user's social circle, for example family and friends, play an important role in pre-adoption decision because of recommendations through word of mouth. Members that live in the same household might adopt the same mobile platform due to greater product compatibility. The high number of application developers in a platform is crucial to retain consumers in the post-adoption phase. Specifically, lack of available applications is one of the primary causes for negative user experience that can lead to switching. Finally, there is no consensus among users if switching mobile platform is harder than switching cloud service provider. There are multiple user characteristics that determine the outcome: extent of use of the cloud services, knowledge about converters to transfer data between cloud providers and monetary investments made into a mobile platform
    • ā€¦
    corecore