Please use this identifier to cite or link to this item:
Title: Mobile security and privacy
Authors: Au, MH 
Choo, KKR
Keywords: Mobile device capabilities
Mobile operating systems
Mobile security and privacy
Mobile threats
Issue Date: 2016
Publisher: Elsevier
Source: In MH Au & KKR Choo (Eds.), Mobile security and privacy : advances, challenges and future research directions. p. 1-4. Cambridge, MA: Elsevier, 2016 How to cite?
Abstract: The number of Internet-connected mobile devices reportedly surpassed the human population in Oct. 2014, proving that such devices are an indispensable part of our daily lives. One might also argue that in the world of business, every business is potentially a "mobile" business. This is not surprising, as the increasing capabilities of mobile devices have paved the way for many new and exciting applications (e.g., mobile commerce and payment). However, due to their popularity and the amount of data that they can store and make accessible, these devices are increasingly being targeted by cybercriminals.This chapter presents background information on the capabilities of mobile devices, the role of mobile devices within an enterprise, mobile operating systems, and finally, mobile security and privacy threats.
ISBN: 9780128047460
DOI: 10.1016/B978-0-12-804629-6.00001-8
Appears in Collections:Book Chapter

View full-text via PolyU eLinks SFX Query
Show full item record

Page view(s)

Last Week
Last month
Citations as of Aug 13, 2018

Google ScholarTM



Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.