Search engine for discovering works of Art, research articles, and books related to Art and Culture
ShareThis
Javascript must be enabled to continue!

Security Issues for Mobile Devices

View through CrossRef
The history of smart phones and tablet computers is relatively short from a historical point of view, yet these devices are widely used for personal and business tasks daily. We present the advances of these devices in comparison to laptop and other computers with an awareness of their abilities to safeguard data. They are used as devices that hold sensitive information; and they are intended for use with different type of wireless and mobile communication lines. This kind of communication increases the risk of data transfer. Their characteristics (dimensions, processing power, networking etc.), working environment, stored information and their value, makes them suitable for theft and abuse. This paper addresses the problem of countermeasures needed to make smart phones and tablets more secure. Besides the fact that the first commercially available tablet computer was presented only three years ago, sales increase significantly each year. According to the analysis of the web site statista.com, in the last quarter of 2012 76% more tablet computers were purchased in comparison with the same quarter in 2011. According to the research expectations, this trend should continue in the next few years, and in 2016 we can expect around 283 million tablet computers to be purchased which will exceed purchases of laptop computers.
Title: Security Issues for Mobile Devices
Description:
The history of smart phones and tablet computers is relatively short from a historical point of view, yet these devices are widely used for personal and business tasks daily.
We present the advances of these devices in comparison to laptop and other computers with an awareness of their abilities to safeguard data.
They are used as devices that hold sensitive information; and they are intended for use with different type of wireless and mobile communication lines.
This kind of communication increases the risk of data transfer.
Their characteristics (dimensions, processing power, networking etc.
), working environment, stored information and their value, makes them suitable for theft and abuse.
This paper addresses the problem of countermeasures needed to make smart phones and tablets more secure.
Besides the fact that the first commercially available tablet computer was presented only three years ago, sales increase significantly each year.
According to the analysis of the web site statista.
com, in the last quarter of 2012 76% more tablet computers were purchased in comparison with the same quarter in 2011.
According to the research expectations, this trend should continue in the next few years, and in 2016 we can expect around 283 million tablet computers to be purchased which will exceed purchases of laptop computers.

Related Results

SECURITY REQUIREMENTS VALIDATION FOR MOBILE APPS: A SYSTEMATIC LITERATURE REVIEW
SECURITY REQUIREMENTS VALIDATION FOR MOBILE APPS: A SYSTEMATIC LITERATURE REVIEW
Security requirements are important to increase the confidence of mobile users to perform many online transactions, such as banking, booking and payment via mobile devices.  Object...
Securing Mobile Data Computing in Healthcare
Securing Mobile Data Computing in Healthcare
Access to mobile data and messages is essential in healthcare environment as patients and healthcare providers are mobile. This is inline with the need of ubiquitous computing in e...
A NOVEL APPROACH FOR MOBILE WALLET SECURITY AND MONEY ASSOCIATE’S SECURITY
A NOVEL APPROACH FOR MOBILE WALLET SECURITY AND MONEY ASSOCIATE’S SECURITY
 Mobile money refers to performing monetary transactions using telecommunications networks. This activity is intended to be referred to as "mobile money." The rapid use of mobile m...
Everyday Life in the "Tourist Zone"
Everyday Life in the "Tourist Zone"
This article makes a case for the everyday while on tour and argues that the ability to continue with everyday routines and social relationships, while at the same time moving thro...
Assessing Security with Regard to Cloud Applications in STEM Education
Assessing Security with Regard to Cloud Applications in STEM Education
There are many steps involved with securing a cloud system and its applications (SaaS) and developed ones in (PaaS). Security and privacy issues represent the biggest concerns to m...
Analisis SWOT Mobile Dictionary Pleco dan Hanping Lite
Analisis SWOT Mobile Dictionary Pleco dan Hanping Lite
Penelitian berjudul “Analisis SWOT Mobile Dictionary Pleco dan Hanping Lite” dirancang sebagai pedoman pengguna untuk menentukan Mobile Dictionary yang sesuai dengan kebutuhan ...
Video tutorial pendaftaran mobile JKN dapat meningkatkan pemahaman pasien BPJS kesehatan
Video tutorial pendaftaran mobile JKN dapat meningkatkan pemahaman pasien BPJS kesehatan
Background: The national health insurance mobile application is used for registration of social security administrator patients who want to seek treatment at health service facilit...

Back to Top