• Login
    View Item 
    •   Shocker Open Access Repository Home
    • Engineering
    • Industrial, Systems, and Manufacturing Engineering
    • Journal of Management and Engineering Integration
    • Volume 12 (2019)
    • Journal of Management and Engineering Integration, v.12 no.2
    • View Item
    •   Shocker Open Access Repository Home
    • Engineering
    • Industrial, Systems, and Manufacturing Engineering
    • Journal of Management and Engineering Integration
    • Volume 12 (2019)
    • Journal of Management and Engineering Integration, v.12 no.2
    • View Item
    JavaScript is disabled for your browser. Some features of this site may not work without it.

    Mobile device espionage

    View/Open
    Article (92.63Kb)
    Date
    2019-12
    Author
    Carstens, Deborah
    Mahlman, John
    Miller, Jeffrey
    Shaffer, Matthew
    Metadata
    Show full item record
    Citation
    Carstens, Deborah,PhD., P.M.P., Mahlman, J.,M.S., Miller, J., PhD., & Shaffer, M., PhD. (2019). Mobile device espionage. Journal of Management & Engineering Integration, 12(2), 86-94.
    Abstract
    Malware and hacking activities are growing among today's most popular mobile devices. These security risks are prompting companies, federal facilities, and other institutions to enact policies aimed at mitigating the amount of espionage and illegal events that can transpire on a cell phone or other mobile device. With all of the new devices and applications, publicly available, new security-related vulnerabilities continue to arise. These devices and applications are targets for attacks from malicious outside sources. Each day provides a new potential threat aimed at taking advantage of some security exploit in cell phones and mobile devices. Security analysts and experts are at a disadvantage in this war against threats because they are fighting a war without clear rules. The focus of this literature review is on cell phone and electronic device vulnerabilities, espionage in the workplace, and security solutions. This will provide an understanding of risks, threats and solutions that exist in the modern era of cell phones and mobile devices.
    Description
    Published in SOAR: Shocker Open Access Repository by Wichita State University Libraries Technical Services, November 2022.
    URI
    https://soar.wichita.edu/handle/10057/24262
    Collections
    • Journal of Management and Engineering Integration, v.12 no.2

    Browse

    All of Shocker Open Access RepositoryCommunities & CollectionsBy Issue DateAuthorsTitlesSubjectsBy TypeThis CollectionBy Issue DateAuthorsTitlesSubjectsBy Type

    My Account

    LoginRegister

    Statistics

    Most Popular ItemsStatistics by CountryMost Popular Authors

    DSpace software copyright © 2002-2023  DuraSpace
    DSpace Express is a service operated by 
    Atmire NV