2014
DOI: 10.1016/j.ijcip.2014.10.002
|View full text |Cite
|
Sign up to set email alerts
|

Security considerations related to the use of mobile devices in the operation of critical infrastructures

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
5
0

Year Published

2016
2016
2023
2023

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 12 publications
(5 citation statements)
references
References 20 publications
0
5
0
Order By: Relevance
“…Because of this, the individuals' data is being sent to the unauthorized third parties. [15][16][17] This paper supplements the previous reviews by extending the scope of malware development and Android security issues. The permissions given by the defined smartphone are checked and compared, and these permissions are granted accordingly.…”
Section: Introductionmentioning
confidence: 72%
See 1 more Smart Citation
“…Because of this, the individuals' data is being sent to the unauthorized third parties. [15][16][17] This paper supplements the previous reviews by extending the scope of malware development and Android security issues. The permissions given by the defined smartphone are checked and compared, and these permissions are granted accordingly.…”
Section: Introductionmentioning
confidence: 72%
“…The data is instantly transferred from infected phones to premium‐rate phone numbers without even knowledge of the client. Because of this, the individuals' data is being sent to the unauthorized third parties 15–17 . This paper supplements the previous reviews by extending the scope of malware development and Android security issues.…”
Section: Introductionmentioning
confidence: 83%
“…Because of this, the user's data from mobile is being sent to unauthorized third parties without any permission fromthe user. [11,12]. This researchadds the previous reviews and work by extending the scope of malware/vulnerabilities development and Android security issues.…”
mentioning
confidence: 67%
“…It is important to note that some people may use more than one mobile device when participating in BYOD. As Android is the preferred operating system for modern businesses, it is logical that more malware is aimed towards it than its competitors because of its popularity [42,44,48]. Android and Apple iOS have and likely will continue to dominate the market [49,50], thus businesses would benefit from catering security mechanisms to prioritise their unique needs [43].…”
Section: Fundamental Demographic Informationmentioning
confidence: 99%