3,334 research outputs found

    Android Applications Security

    Get PDF
    The use of smartphones worldwide is growing very fast and also the malicious attacks have increased. The mobile security applications development keeps the pace with this trend. The paper presents the vulnerabilities of mobile applications. The Android applications and devices are analyzed through the security perspective. The usage of restricted API is also presented. The paper also focuses on how users can prevent these malicious attacks and propose some prevention measures, including the architecture of a mobile security system for Android devices.Mobile Application, Security, Malware, Android, Permissions

    Digital and Mobile Security for Mexican Journalists and Bloggers

    Get PDF
    A new survey of 102 journalists and bloggers in 20 Mexican states shows nearly 70 percent have been threatened or have suffered attacks because of their work. In addition, 96 percent say they know of colleagues who have been attacked. Respondents to the survey also say they view cyber-espionage and email-account cracking as the most serious digital risks they face. And while nearly all have access to and rely on the Internet, social networks, mobile phones and blogging platforms for their work, they also admit that they have little or no command of digital security tools such as encryption, use of virtual private networks (VPNs), anonymous Internet navigation and secure file removal. The results of this survey show the urgent need to introduce Mexican journalists and bloggers to new technologies and protocols and help newsrooms develop a culture of digital-security awareness to counter increasingly sophisticated threats and attacks from both governmental agencies and criminal organizations

    A New Learner's Security Behavior Model For M-Learning In Malaysian Higher Education Institution

    Get PDF
    The motivation to conduct this research came from the awareness that the mobile device exposes m-Learning to security threats and vulnerabilities. The most unfocused issues were the mobile security behavior on learners itself; despite statistically determined that the risks are developing each day on mobile application and devices. Literature has pointed out that learnersā€™ security behavior required to be addressed to control the mobile security threats. This research proposes a learnerā€™s security behavioral model for mobile learning in Malaysia Higher Education Institutions (HEIs). With the security behavior reflection, this model aimed to improve the implementation and management of mobile security in m-Learning taking consideration of the learnersā€™ perspective. This research consisted of four phases, Planning phase, Data Collection Phase, Analysis Phase and Model Development Phase. Four mix-method studies were conducted to generate the dimensions for the model development. Review from the experts and risk based analysis approach confirmed the research findings and validated the practicality of addressing the learnersā€™ behaviors in mobile security. This research contributed to better understanding of the learnersā€™ complexity in mobile security. The research suggested that learnersā€™ security behavior view is significant in preparing mobile security model. This model found to be compatible and qualified, providing the m-Learning learnersā€™ perception within possible security threats that significantly controls to defend against malicious and non-malicious attacks. This approach can guide on what can be done to improve learnersā€™ participation and responsibilities on securing m-Learning. This research also extended the existing knowledge of mobile security and m-Learning fields by focusing analytically on the intersection of both fields. New knowledge about mobile security in the m-Learning from the learnersā€™ security behavior perspective was derived in this research

    Mobile security and smart systems

    Get PDF

    Secure Electronic Cards in Public Services

    Get PDF
    The paper presents the electronic wallet solution implemented within a GSM SIM technology for accessing public services. The solution is implemented in the medical field to provide information on the patient's medical history and payment for private medical services. The security issue is a very important one as the patient's history is confidential and the payment has to be safe.public services, mobile, security, m-application, smart card

    Mobile Security as a Service

    Get PDF
    The purpose of this paper is to study how a software product company can expand its product-based business with the Software as a Service (SaaS) model in the mobile setting. In this research study we examine how the SaaS model can be implemented by a software company with existing PC-based software business and conduct a case study on F-Secure and its mobile security as a service offering. The differences between the product and service business are considerable and the change of focus from one to the other is not easily done. For example, the scale economies, which are associated with product business, are not easily achieved in service business. However, the SaaS business model has many benefits to offer to SaaS providers. To providers, SaaS offers e.g. expanded customer base, lowered production and distribution costs, more predictable cash flows, and shortened sales cycle.Our findings include that by successfully solving the risks associated with the SaaS model and by fulfilling the customersĆ¢ā‚¬ā„¢ demands of customization and at the same time benefiting from economies of scale, scope, and aggregation, F-Secure has managed to leverage its domain area expertise with its SaaS offering: F-Secure has expanded its PC-based antivirus and security application business to cover also mobile devices. F-Secure has also increased its potential customer base amongst smart phone users (both end-users and businesses) with the help of its partners: mobile operators and handset manufacturers

    The influence of user mobility in mobile virus propagation: An enterprise mobile security perspective

    Get PDF
    In this paper, the authors review the usage of mobile devices in the enterprise and also the major impact from the infected mobile devices.Then the authors highlight the virus threat to enterprise mobile security and how critical the problems are.The authors then discuss the mobile virus infection dynamics which are the Bluetooth infections, mobile emails infections and mobile internet infections which are the threats to the enterprise mobile security. Then the authors discuss on the influences of user mobility issue in spreading mobile viruses before concluded this article
    • ā€¦
    corecore