Mobile interaction design: Integrating individual and organizational perspectives
Information-Knowledge-Systems Management - Enterprise Mobility: Applications, Technologes and Strategies
Information-Knowledge-Systems Management - Enterprise Mobility: Applications, Technologes and Strategies
Information Security and Ethics: Concepts, Methodologies, Tools and Applications
Information Security and Ethics: Concepts, Methodologies, Tools and Applications
Proceedings of the Eleventh Workshop on Mobile Computing Systems & Applications
Rootkits on smart phones: attacks, implications and opportunities
Proceedings of the Eleventh Workshop on Mobile Computing Systems & Applications
Guest Editors' Introduction: Mobile Device Security
IEEE Security and Privacy
Taming the Blue Beast: A Survey of Bluetooth Based Threats
IEEE Security and Privacy
Google Android: A Comprehensive Security Assessment
IEEE Security and Privacy
Mobile Security: Managing mobile security: How are we doing?
Network Security
Mobile Malware: Mobile malware - new avenues
Network Security
Mobile Security: Mobile security risks: ever evolving
Network Security
Modular anomaly detection for smartphone ad hoc communication
NordSec'11 Proceedings of the 16th Nordic conference on Information Security Technology for Applications
Know your enemy: the risk of unauthorized access in smartphones by insiders
Proceedings of the 15th international conference on Human-computer interaction with mobile devices and services
Hi-index | 0.00 |
Smart phones, their operating systems and security characteristics have rapidly evolved as has the reliance upon them by organizations to conduct business. The unusual mix of personal and business use for smart phones as well as their unique combination of capabilities creates a number of challenges to managing their risk. This paper explores the types and nature of threats to the organization from the use of smart phones along with controls, available security software and tools. The current state of corporate smart phone security programs and policies is examined. Smart phone security policy considerations are discussed and recommendations are made for building a smart phone security program.