Please use this identifier to cite or link to this item:
http://hdl.handle.net/1942/12961
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | SCHREURS, Jeanne | - |
dc.contributor.author | AL-HUNEIDI, Ahmad | - |
dc.contributor.author | Princen, Tom | - |
dc.date.accessioned | 2012-01-16T10:06:31Z | - |
dc.date.available | 2012-01-16T10:06:31Z | - |
dc.date.issued | 2012 | - |
dc.identifier.citation | Aquino Santos, Raul; Edwards Block, Arthur (Ed.). Embedded Systems and Wireless Technologies : Theory and practical applications, Science Publishers 2012, p. 73-85 | - |
dc.identifier.isbn | 978-1-57808-803-4 | - |
dc.identifier.uri | http://hdl.handle.net/1942/12961 | - |
dc.description.abstract | Nowadays employees are often on the road wasting time when travelling and when waiting at airports or other transportation facilities. Companies and employees try to change this lost time into productive time. Laptops, smart phones and other mobile appliances can be used to do professional work at a distance. But using mobile appliances to access the company network to retrieve information can be risky. Authentication and privacy are two crucial points. Browser attacks and mail client attacks are the biggest threats to mobile applications. Mobile security management can be structured as a 3-steps procedure; first, securing the user mobile devices and the local data; second, securing user communication via interne, or the transition of the data and; third, securing user access to systems on the company server. Mobile learning is one of the possible options on distance professional applications, where learner authentication is a key issue. Also, mobile learning applications require the integration of security design in the development process. The effective professional use of mobile applications can be guaranteed if an information security management policy is formulated and implemented in the organization. | - |
dc.language.iso | en | - |
dc.publisher | CRC Press | - |
dc.subject.other | Security management; on distance work; mobile appliances; Mobile learning; security management policy | - |
dc.title | Secured Professional Use of Wireless Technologies | - |
dc.type | Book Section | - |
local.bibliographicCitation.authors | Aquino Santos, Raul | - |
local.bibliographicCitation.authors | Edwards Block, Arthur | - |
dc.identifier.epage | 85 | - |
dc.identifier.spage | 73 | - |
local.bibliographicCitation.jcat | B2 | - |
local.type.refereed | Refereed | - |
local.type.specified | Book Section | - |
dc.bibliographicCitation.oldjcat | B2 | - |
local.identifier.vabb | c:vabb:340161 | - |
local.bibliographicCitation.btitle | Embedded Systems and Wireless Technologies : Theory and practical applications | - |
item.accessRights | Restricted Access | - |
item.fullcitation | SCHREURS, Jeanne; AL-HUNEIDI, Ahmad & Princen, Tom (2012) Secured Professional Use of Wireless Technologies. In: Aquino Santos, Raul; Edwards Block, Arthur (Ed.). Embedded Systems and Wireless Technologies : Theory and practical applications, Science Publishers 2012, p. 73-85. | - |
item.validation | vabb 2014 | - |
item.contributor | SCHREURS, Jeanne | - |
item.contributor | AL-HUNEIDI, Ahmad | - |
item.contributor | Princen, Tom | - |
item.fulltext | With Fulltext | - |
Appears in Collections: | Research publications |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
SECURED_PROFESSIONAL_USE_OF_MOBILE_ICT_DEVICESart.pdf Restricted Access | Peer-reviewed author version | 245.92 kB | Adobe PDF | View/Open Request a copy |
Page view(s)
18
checked on Sep 7, 2022
Download(s)
6
checked on Sep 7, 2022
Google ScholarTM
Check
Altmetric
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.