Please use this identifier to cite or link to this item:
http://hdl.handle.net/1942/12961
Title: | Secured Professional Use of Wireless Technologies | Authors: | SCHREURS, Jeanne AL-HUNEIDI, Ahmad Princen, Tom |
Issue Date: | 2012 | Publisher: | CRC Press | Source: | Aquino Santos, Raul; Edwards Block, Arthur (Ed.). Embedded Systems and Wireless Technologies : Theory and practical applications, Science Publishers 2012, p. 73-85 | Abstract: | Nowadays employees are often on the road wasting time when travelling and when waiting at airports or other transportation facilities. Companies and employees try to change this lost time into productive time. Laptops, smart phones and other mobile appliances can be used to do professional work at a distance. But using mobile appliances to access the company network to retrieve information can be risky. Authentication and privacy are two crucial points. Browser attacks and mail client attacks are the biggest threats to mobile applications. Mobile security management can be structured as a 3-steps procedure; first, securing the user mobile devices and the local data; second, securing user communication via interne, or the transition of the data and; third, securing user access to systems on the company server. Mobile learning is one of the possible options on distance professional applications, where learner authentication is a key issue. Also, mobile learning applications require the integration of security design in the development process. The effective professional use of mobile applications can be guaranteed if an information security management policy is formulated and implemented in the organization. | Keywords: | Security management; on distance work; mobile appliances; Mobile learning; security management policy | Document URI: | http://hdl.handle.net/1942/12961 | ISBN: | 978-1-57808-803-4 | Category: | B2 | Type: | Book Section | Validations: | vabb 2014 |
Appears in Collections: | Research publications |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
SECURED_PROFESSIONAL_USE_OF_MOBILE_ICT_DEVICESart.pdf Restricted Access | Peer-reviewed author version | 245.92 kB | Adobe PDF | View/Open Request a copy |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.