Paper title:

Security Issues for Information Quality on Mobile Devices

Published in: Issue 1, (Vol. 4) / 2010
Publishing date: 2010-03-30
Pages: 49-52
Author(s): Dana R. Andrisescu
Abstract. Mobile devices are used everywhere, from making a call to store huge volume of information. But together with devices shrinking and rise of storage space on a single device we bring to mind the problem of trusting the stored information. Trusting the information and assuring its quality means knowing the security threats these devices face and measures that should be taken. Many questions rise from here like “What happens when a mobile device is used by several persons and especially employees?”, “Is that information reliable and original?”, “Who is responsible for a device and its security?”. We are going to see in this paper that information quality can be assured even on portable devices by using the adequate security measures.
Keywords: Security, Threats, Information Quality, Mobile Devices
References:

1. Eppler, M., Managing information quality, Springer Publishing, 2nd Edition, 2006, p. 24

2. University of Central Florida, Security of Mobile Computing, Data Storage, and Communication Devices, USA, 2007, http://policies.ucf.edu/documents/4- 007SecurityofMobileDevicesFINAL.pdf, accessed 20.12.2009

3. Haskin, D., Prepare for Mobile Security Threats, May 2007, http://www.pcworld.com/article/132420/prepare_for_mo bile_security_threats.html, accessed December 2009

4. Shinder, D., Security in the Mobile Device Era, October 2008, http://www.windowsecurity.com/articles/SecurityMobile-Device-Era.html, accessed 20.12.2009

5. Boukerche, A., Security and Fraud Detection in Mobile and Wireless Networks, in Stojmenovic, I. (ed.), Handbook of Wireless Networks and Mobile Computing, Wiley Publishing, 2002, p. 311

6. NIST, Mobile Devices, October 2007, http://csrc.nist.gov/groups/SNS/mobile_security/mobile_ devices.html, accessed 20.12.2009

7. SearchMobileComputing, Blackberry, Mobile Security Policies, February 2009, http://wp.bitpipe.com/resource/org_990469824_534/RIM_sMobileComputingREV_2_13v2_.pdf, accessed 20.12.2009

Back to the journal content
Creative Commons License
This article is licensed under a
Creative Commons Attribution-ShareAlike 4.0 International License.
Home | Editorial Board | Author info | Archive | Contact
Copyright JACSM 2007-2024