Please use this identifier to cite or link to this item: http://hdl.handle.net/1942/12961
Title: Secured Professional Use of Wireless Technologies
Authors: SCHREURS, Jeanne 
AL-HUNEIDI, Ahmad 
Princen, Tom
Issue Date: 2012
Publisher: CRC Press
Source: Aquino Santos, Raul; Edwards Block, Arthur (Ed.). Embedded Systems and Wireless Technologies : Theory and practical applications, Science Publishers 2012, p. 73-85
Abstract: Nowadays employees are often on the road wasting time when travelling and when waiting at airports or other transportation facilities. Companies and employees try to change this lost time into productive time. Laptops, smart phones and other mobile appliances can be used to do professional work at a distance. But using mobile appliances to access the company network to retrieve information can be risky. Authentication and privacy are two crucial points. Browser attacks and mail client attacks are the biggest threats to mobile applications. Mobile security management can be structured as a 3-steps procedure; first, securing the user mobile devices and the local data; second, securing user communication via interne, or the transition of the data and; third, securing user access to systems on the company server. Mobile learning is one of the possible options on distance professional applications, where learner authentication is a key issue. Also, mobile learning applications require the integration of security design in the development process. The effective professional use of mobile applications can be guaranteed if an information security management policy is formulated and implemented in the organization.
Keywords: Security management; on distance work; mobile appliances; Mobile learning; security management policy
Document URI: http://hdl.handle.net/1942/12961
ISBN: 978-1-57808-803-4
Category: B2
Type: Book Section
Validations: vabb 2014
Appears in Collections:Research publications

Files in This Item:
File Description SizeFormat 
SECURED_PROFESSIONAL_USE_OF_MOBILE_ICT_DEVICESart.pdf
  Restricted Access
Peer-reviewed author version245.92 kBAdobe PDFView/Open    Request a copy
Show full item record

Page view(s)

18
checked on Sep 7, 2022

Download(s)

6
checked on Sep 7, 2022

Google ScholarTM

Check

Altmetric


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.