Corpus ID: 160033204

Mobile Devices and Corporate Data Security

@inproceedings{MarkeljMobileDA,
  title={Mobile Devices and Corporate Data Security},
  author={Blaz Markelj and Igor Bernik}
}

Figures and Tables from this paper

Addressing the incremental risks associated with adopting Bring Your Own Device
Bring Your Own Device (BYOD) involves allowing employees to use their own mobile devices to access their organisations’ networks. Many organisations are embracing this trend as a means to cutExpand
PROTECTING THE PRIVACY OF INFORMATION ON MOBILE DEVICES (CELL PHONES)
Protecting the privacy of information on mobile devices is highly important, both at present and also in the future, due to the significant role that mobile devices play in keeping and storing ourExpand
Literature-based analysis of the influences of the new forces on ISMS: A conceptual framework
TLDR
The role of ISMS in protecting an organization’s information environment and infrastructure is analyzed and four key areas that strongly influence the safety of information resources are identified: cloud computing; social media/networking; mobility; and information management/big data. Expand
Security, Privacy, Confidentiality and Integrity of Emerging Healthcare Technologies: A Framework for Quality of Life Technologies to be HIPAA/HITECH Compliant, with Emphasis on Health Kiosk Design
TLDR
An evaluation system and audit checklist for multi-user kiosk systems adapted from the Office for Civil Rights (OCR) audit protocols to address the vulnerabilities identified from research. Expand
Users' attitude on perceived security of enterprise systems mobility: an empirical study
Purpose This study/ paper aims to empirically examine the user attitude on perceived security of enterprise systems (ES) mobility. Organizations are adopting mobile technologies for various businessExpand
Emerging use of UAV’s: secure communication protocol issues and challenges
TLDR
An overview of UAV, their working mechanism, types, different communication protocols which are used for communication among UAVs, and a new secure communication protocol are given. Expand
The adoption of byod or cope policies by a Brazilian company in the Petroleum industry
This study aims to assess the perception of employees of a large Brazilian company taking into account the use of personal mobile devices for professional purposes as well as their preferenceExpand
Bring Your Own Device Adoption Readiness in a South African University
TLDR
The purpose of this article is to assess the readiness status of South African universities to adopt BYOD for education purposes, using a conceptualised BYOD readiness assessment framework. Expand
Mobile Devices for Learning in Universities: Challenges and Effects of Usage
TLDR
This study recommended that mobile devices should be encouraged, allow students to use Mobile devices according to lesson’s topics, discourage students from using Mobile devices in class for other activities not related to the topic and formulate the usability policy of mobile devices. Expand
Mobile Device Strategy : From a Management Point of View
In recent years, mobile devices have become an indispensable part of working life. However, in many cases the same device is also used privately, which has blurred the line between personal and comExpand
...
1
2
3
4
...

References

SHOWING 1-7 OF 7 REFERENCES
Mobile Security
Kombinirane grožnje informacijski varnosti pri rabi mobilnih naprav
  • Nove razmere in priložnosti v informatiki kot posledica družbenih sprememb [ Digital source ] : zbornik konference / 18 . konferenca Dnevi slovenske informatike , Portorož , Slovenija
  • 2011
Legal issues in mobile banking
The use of mobile phones in order to effectuate banking transactions is bound to increase in a significant way in the near future. This growth in mobile financial services not only depends onExpand
Zlonamerna koda nad zasebnost uporabnikov mobilnikov Android
  • 2010
Upravljanje , nadzor in varnost informacijskih sistemov . Acquired 11 . 10
  • 2009
Preprečite uhajanje podatkov iz omrežja
  • 2008
Malicious Mobile Threats Report 2010 / 2011 . Acquired on 10 . 9