Smartphone Security Challenges

被引:41
|
作者
Wang, Yong [1 ]
Streff, Kevin [1 ]
Raman, Sonell
机构
[1] Dakota State Univ, Natl Ctr Protect Financial Infrastruct, Madison, SD USA
关键词
attacks; mobile forensics; security; smartphones; threats;
D O I
10.1109/MC.2012.288
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Because of their unique characteristics, smartphones present challenges requiring new business models that offer countermeasures to help ensure their security.
引用
收藏
页码:52 / 58
页数:7
相关论文
共 50 条
  • [1] Smartphone's Hotspot Security Issues and Challenges
    Khoula, Al Harthy
    Shah, Nazaraf
    Shankarappa, Arun N. S.
    2016 11TH INTERNATIONAL CONFERENCE FOR INTERNET TECHNOLOGY AND SECURED TRANSACTIONS (ICITST), 2016, : 113 - 118
  • [2] Coping with Accessibility Challenges for Security - A User Study with Blind Smartphone Users
    Lobo, Sylvan
    Hirom, Ulemba
    Shyama, V. S.
    Basumatori, Mridul
    Doke, Pankaj
    HUMAN-COMPUTER INTERACTION - INTERACT 2017, PT IV, 2017, 10516 : 3 - 22
  • [3] Smartphone Security
    Flynn, Lori
    Klieber, Will
    IEEE PERVASIVE COMPUTING, 2015, 14 (04) : 16 - 21
  • [4] Smartphone Use and Security Challenges in Hospitals: A Survey among Resident Physicians in Germany
    Kraushaar, Judith
    Bohnet-Joschko, Sabine
    INTERNATIONAL JOURNAL OF ENVIRONMENTAL RESEARCH AND PUBLIC HEALTH, 2022, 19 (24)
  • [5] Smartphone security: understanding smartphone users' trust in information security management
    Jang, Yu-Teng
    Chang, Shuchih Ernest
    Tsai, Yi-Jey
    SECURITY AND COMMUNICATION NETWORKS, 2014, 7 (09) : 1313 - 1321
  • [6] The state of smartphone security
    Winder D.
    Infosecurity, 2011, 8 (04) : 36 - 39
  • [7] SMS Security for Smartphone
    Sagheer, Ali Makki
    Abdulhameed, Ayoob Abdulmunem
    AbdulJabbar, Mohammed Adeeb
    2013 SIXTH INTERNATIONAL CONFERENCE ON DEVELOPMENTS IN ESYSTEMS ENGINEERING (DESE), 2014, : 281 - 285
  • [8] Smartphone Security: Overview of Security Software Solutions
    Fischer, D.
    Markscheffel, B.
    Seyffarth, T.
    2013 8TH INTERNATIONAL CONFERENCE FOR INTERNET TECHNOLOGY AND SECURED TRANSACTIONS (ICITST), 2013, : 288 - 289
  • [9] Delegate the smartphone user? Security awareness in smartphone platforms
    Mylonas, Alexios
    Kastania, Anastasia
    Gritzalis, Dimitris
    COMPUTERS & SECURITY, 2013, 34 : 47 - 66
  • [10] Smartphone: Security and Privacy Protection
    Li, Xiu-Ting
    Ren, Shuo
    Cheng, Wei
    Xiang, Lai-Sheng
    Liu, Xi-Yu
    PERVASIVE COMPUTING AND THE NETWORKED WORLD, 2014, 8351 : 289 - +