Please use this identifier to cite or link to this item: http://hdl.handle.net/1942/12961
Full metadata record
DC FieldValueLanguage
dc.contributor.authorSCHREURS, Jeanne-
dc.contributor.authorAL-HUNEIDI, Ahmad-
dc.contributor.authorPrincen, Tom-
dc.date.accessioned2012-01-16T10:06:31Z-
dc.date.available2012-01-16T10:06:31Z-
dc.date.issued2012-
dc.identifier.citationAquino Santos, Raul; Edwards Block, Arthur (Ed.). Embedded Systems and Wireless Technologies : Theory and practical applications, Science Publishers 2012, p. 73-85-
dc.identifier.isbn978-1-57808-803-4-
dc.identifier.urihttp://hdl.handle.net/1942/12961-
dc.description.abstractNowadays employees are often on the road wasting time when travelling and when waiting at airports or other transportation facilities. Companies and employees try to change this lost time into productive time. Laptops, smart phones and other mobile appliances can be used to do professional work at a distance. But using mobile appliances to access the company network to retrieve information can be risky. Authentication and privacy are two crucial points. Browser attacks and mail client attacks are the biggest threats to mobile applications. Mobile security management can be structured as a 3-steps procedure; first, securing the user mobile devices and the local data; second, securing user communication via interne, or the transition of the data and; third, securing user access to systems on the company server. Mobile learning is one of the possible options on distance professional applications, where learner authentication is a key issue. Also, mobile learning applications require the integration of security design in the development process. The effective professional use of mobile applications can be guaranteed if an information security management policy is formulated and implemented in the organization.-
dc.language.isoen-
dc.publisherCRC Press-
dc.subject.otherSecurity management; on distance work; mobile appliances; Mobile learning; security management policy-
dc.titleSecured Professional Use of Wireless Technologies-
dc.typeBook Section-
local.bibliographicCitation.authorsAquino Santos, Raul-
local.bibliographicCitation.authorsEdwards Block, Arthur-
dc.identifier.epage85-
dc.identifier.spage73-
local.bibliographicCitation.jcatB2-
local.type.refereedRefereed-
local.type.specifiedBook Section-
dc.bibliographicCitation.oldjcatB2-
local.identifier.vabbc:vabb:340161-
local.bibliographicCitation.btitleEmbedded Systems and Wireless Technologies : Theory and practical applications-
item.validationvabb 2014-
item.contributorSCHREURS, Jeanne-
item.contributorAL-HUNEIDI, Ahmad-
item.contributorPrincen, Tom-
item.accessRightsRestricted Access-
item.fullcitationSCHREURS, Jeanne; AL-HUNEIDI, Ahmad & Princen, Tom (2012) Secured Professional Use of Wireless Technologies. In: Aquino Santos, Raul; Edwards Block, Arthur (Ed.). Embedded Systems and Wireless Technologies : Theory and practical applications, Science Publishers 2012, p. 73-85.-
item.fulltextWith Fulltext-
Appears in Collections:Research publications
Files in This Item:
File Description SizeFormat 
SECURED_PROFESSIONAL_USE_OF_MOBILE_ICT_DEVICESart.pdf
  Restricted Access
Peer-reviewed author version245.92 kBAdobe PDFView/Open    Request a copy
Show simple item record

Page view(s)

18
checked on Sep 7, 2022

Download(s)

6
checked on Sep 7, 2022

Google ScholarTM

Check

Altmetric


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.