2015
DOI: 10.4018/978-1-4666-8345-7.ch002
|View full text |Cite
|
Sign up to set email alerts
|

Mobile Devices

Abstract: Mobile devices are becoming a method to provide an efficient and convenient way to access, find and share information; however, the availability of this information has caused an increase in cyber attacks. Currently, cyber threats range from Trojans and viruses to botnets and toolkits. Presently, 96% of mobile devices do not have pre-installed security software while approximately 65% of the vulnerabilities are found within the application layer. This lack in security and policy driven systems is an opportunit… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2016
2016
2024
2024

Publication Types

Select...
3
2

Relationship

1
4

Authors

Journals

citations
Cited by 8 publications
(1 citation statement)
references
References 9 publications
0
1
0
Order By: Relevance
“…However, there is not much guidance given on the protections of these tweets or the secure integration of Twitter into other Web 2.0 applications. As a result, this paper explores methods with which Twitter and its data can be exploited for nefarious uses (Dawson and Omar, 2015). Explored in this paper are the methods with which Twitter and its data can be exploited for nefarious uses.…”
Section: Literature Reviewmentioning
confidence: 99%
“…However, there is not much guidance given on the protections of these tweets or the secure integration of Twitter into other Web 2.0 applications. As a result, this paper explores methods with which Twitter and its data can be exploited for nefarious uses (Dawson and Omar, 2015). Explored in this paper are the methods with which Twitter and its data can be exploited for nefarious uses.…”
Section: Literature Reviewmentioning
confidence: 99%