A Study on Mobile Phone Security Industrial Ecology

被引:0
|
作者
Chen, Qiyu [1 ]
Hu, Jinlong [1 ]
Zhang, Ling [1 ]
机构
[1] S China Univ Technol, Commun & Comp Network Lab Guangdong Prov, Guangzhou, Guangdong, Peoples R China
来源
INTERNET OF THINGS-BK | 2012年 / 312卷
关键词
mobile phone security; industrial ecology; ecosystem;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the rapid increase of mobile phone applications, its security becomes a hit issue recently. The chain of mobile phones is composed by numerous manufacturers, services providers, consumers, and the government. They are also the participants of the mobile phone security industry. An ecosystem of mobile phone security industry has been established. Lots of research was focused on the single security problem of mobile, while the relationship among them was ignored. This paper focuses on some key characteristics of the mobile phone security and analyses the ecosystem environment which the industry faces. It also discusses how to keep the ecological balance of the mobile phone security industry.
引用
收藏
页码:409 / 414
页数:6
相关论文
共 50 条
  • [1] MOBILE PHONE SECURITY - AWARENESS AND PRACTICES
    Androulidakis, Iosif
    Kandus, Gorazd
    [J]. JOURNAL OF THE INSTITUTE OF TELECOMMUNICATIONS PROFESSIONALS, 2013, 7 : 16 - 23
  • [2] Smartphone and mobile phone security for the clinician
    Barber, Harry
    [J]. BRITISH JOURNAL OF HOSPITAL MEDICINE, 2016, 77 (08) : 467 - 470
  • [3] Mobile phone security keeps in tune
    不详
    [J]. ELECTRONICS WORLD, 2008, 114 (1865): : 8 - 8
  • [4] Research of Mobile Phone Security Technology
    Zhang, Haiyan
    [J]. 2012 INTERNATIONAL CONFERENCE ON FUTURE COMMUNICATION AND COMPUTER TECHNOLOGY (ICFCCT 2012), 2012, : 111 - 115
  • [5] Improving accessibility and security for mobile phone shopping
    Lee, S
    Park, S
    [J]. JOURNAL OF COMPUTER INFORMATION SYSTEMS, 2006, 46 (03) : 124 - 133
  • [6] Security analysis for authentication and authorisation in mobile phone
    Lewandowski, Piotr
    Felkner, Anna
    Janiszewski, Marek
    [J]. PRZEGLAD ELEKTROTECHNICZNY, 2019, 95 (08): : 132 - 138
  • [7] A Research on the Security of the Intelligent Mobile Phone System
    Li Nawen
    [J]. 2009 INTERNATIONAL CONFERENCE ON NETWORKING AND DIGITAL SOCIETY, VOL 1, PROCEEDINGS, 2009, : 49 - 52
  • [8] Strong authentication with mobile phone as security token
    Do Van Thanh
    Jorstad, Ivor
    Jonvik, Tore
    Do Van Thuan
    [J]. 2009 IEEE 6TH INTERNATIONAL CONFERENCE ON MOBILE ADHOC AND SENSOR SYSTEMS (MASS 2009), 2009, : 1018 - 1023
  • [9] Mobile phone based SCADA for industrial automation
    Ozdemir, E
    Karacor, M
    [J]. ISA TRANSACTIONS, 2006, 45 (01) : 67 - 75
  • [10] A Survey Study of Young Generation's Mobile Phone Usage and Security Concerns
    Zhang, Sonya
    Costa, Saree
    [J]. 2016 17TH INTERNATIONAL CONFERENCE ON PARALLEL AND DISTRIBUTED COMPUTING, APPLICATIONS AND TECHNOLOGIES (PDCAT), 2016, : 321 - 324