2013
DOI: 10.1002/jcaf.21875
|View full text |Cite
|
Sign up to set email alerts
|

Your Guide to Authenticating Mobile Devices

Abstract: New information technology (IT) mobile devices—such as the iPhone and iPad—are increasingly emerging in the consumer market first. Then, they spread to the workplace. But this is creating major privacy and security headaches for corporate executives. Surveys show that IT groups significantly underestimate—by as much as 50%—how many employees use their own mobile devices for work purposes. So what is to be done? The authors take an in‐depth look at one vitally important security measure: user authentication. Co… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...

Citation Types

0
0
0

Year Published

2014
2014
2015
2015

Publication Types

Select...
2

Relationship

2
0

Authors

Journals

citations
Cited by 2 publications
references
References 1 publication
0
0
0
Order By: Relevance