Mobile Devices and Corporate Data Security

被引:0
|
作者
Markelj, Blaz
Bernik, Igor
机构
关键词
blended threats; corporate data; information security; mobile devices;
D O I
暂无
中图分类号
G40 [教育学];
学科分类号
040101 ; 120403 ;
摘要
Ensuring protection of corporate data has only recently become a main concern in the information and communication technology industry. In the past two years or so the use of mobile devices to access data has become a lot more frequent, therefore data security is now a new challenge for users and managers of information and computer systems alike - they all have to be aware of cyber threats, and the measures, which must necessarily be undertaken to maintain an adequate level of information security. Software for mobile devices, combined with the Internet, now provides easy and fast access to data and information; this relatively new technology facilitates rapid decision-making. Sophisticated software enables users to manage data and carry out various tasks on-line. The security of corporate data, in incidences when mobile devices are used to access information systems, can only be upheld, if users comply with certain safety measures.
引用
收藏
页码:97 / 104
页数:8
相关论文
共 50 条
  • [1] The Corporate Cyber Security of Mobile Devices: The Awareness of Slovenian Users
    Markelj, Blaz
    Zavrsnik, Ales
    [J]. REVIJA ZA KRIMINALISTIKO IN KRIMINOLOGIJO, 2016, 67 (01): : 44 - 60
  • [2] Data Security Evaluation for Mobile Android Devices
    Khokhlov, Igor
    Reznik, Leon
    [J]. PROCEEDINGS OF THE 20TH CONFERENCE OF OPEN INNOVATIONS ASSOCIATION (FRUCT 2017), 2017, : 154 - 160
  • [3] Research and Application of Data Security for Mobile Devices
    Zhang, Xiandi
    Yang, Feng
    Liu, Zhongqiang
    Wang, Zhenzhi
    Wang, Kaiyi
    [J]. COMPUTER AND COMPUTING TECHNOLOGIES IN AGRICULTURE IV, PT 3, 2011, 346 : 46 - 56
  • [4] Securing Corporate Data in Mobile Devices in a COPE Environment
    Rathnasekara, Chamath
    Athukorala, Tharindu
    Dikwellage, Lahiru
    Wickramasuriya, Udith
    Senarathne, Amila
    Elvitigala, Sandunika
    [J]. PROCEEDINGS OF THE 2017 6TH NATIONAL CONFERENCE ON TECHNOLOGY & MANAGEMENT (NCTM) - EXCEL IN RESEARCH AND BUILD THE NATION, 2017, : 120 - 125
  • [5] Biometrics Data Security Techniques for Portable Mobile Devices
    S. Roy
    S. Matloob
    A. Seetharam
    A. Rameshbabu
    W. C. O’Dell
    W. I. Davis
    [J]. INAE Letters, 2017, 2 (3): : 123 - 131
  • [6] Data Security and Raw Data Access of Contemporary Mobile Sensor Devices
    Handel, Till
    Schreiber, Max
    Rothmaler, Katrin
    Ivanova, Galina
    [J]. WORLD CONGRESS ON MEDICAL PHYSICS AND BIOMEDICAL ENGINEERING 2018, VOL 1, 2019, 68 (01): : 397 - 400
  • [7] Self-Encryption Scheme for Data Security in Mobile Devices
    Chen, Yu
    Ku, Wei-Shinn
    [J]. 2009 6TH IEEE CONSUMER COMMUNICATIONS AND NETWORKING CONFERENCE, VOLS 1 AND 2, 2009, : 850 - +
  • [8] Security model for the protection of sensitive and confidential data on mobile devices
    Asghar, M. Tayyab
    Riaz, Muhammad
    Ahmad, Jamil
    Safdar, Sohail
    [J]. 2008 INTERNATIONAL SYMPOSIUM ON BIOMETRICS AND SECURITY TECHNOLOGIES, 2008, : 198 - +
  • [9] Overview of Security on Mobile Devices
    Aron, Lukas
    Hanacek, Petr
    [J]. 2015 2ND WORLD SYMPOSIUM ON WEB APPLICATIONS AND NETWORKING (WSWAN), 2015,
  • [10] Security Issues for Mobile Devices
    Andreeski, Cvetko
    [J]. CYBER SECURITY AND RESILIENCY POLICY FRAMEWORK, 2014, 38 : 36 - 48