Show simple item record

dc.contributor.authorCarstens, Deborah
dc.contributor.authorMahlman, John
dc.contributor.authorMiller, Jeffrey
dc.contributor.authorShaffer, Matthew
dc.date.accessioned2022-11-30T18:16:13Z
dc.date.available2022-11-30T18:16:13Z
dc.date.issued2019-12
dc.identifier.citationCarstens, Deborah,PhD., P.M.P., Mahlman, J.,M.S., Miller, J., PhD., & Shaffer, M., PhD. (2019). Mobile device espionage. Journal of Management & Engineering Integration, 12(2), 86-94.
dc.identifier.issn1939-7984
dc.identifier.urihttps://soar.wichita.edu/handle/10057/24262
dc.descriptionPublished in SOAR: Shocker Open Access Repository by Wichita State University Libraries Technical Services, November 2022.
dc.description.abstractMalware and hacking activities are growing among today's most popular mobile devices. These security risks are prompting companies, federal facilities, and other institutions to enact policies aimed at mitigating the amount of espionage and illegal events that can transpire on a cell phone or other mobile device. With all of the new devices and applications, publicly available, new security-related vulnerabilities continue to arise. These devices and applications are targets for attacks from malicious outside sources. Each day provides a new potential threat aimed at taking advantage of some security exploit in cell phones and mobile devices. Security analysts and experts are at a disadvantage in this war against threats because they are fighting a war without clear rules. The focus of this literature review is on cell phone and electronic device vulnerabilities, espionage in the workplace, and security solutions. This will provide an understanding of risks, threats and solutions that exist in the modern era of cell phones and mobile devices.
dc.format.extent9 pages
dc.language.isoen_US
dc.publisherAssociation for Industry, Engineering and Management Systems (AIEMS)
dc.relation.ispartofseriesJournal of Management & Engineering Integration
dc.relation.ispartofseriesv.12 no.2
dc.subjectSmartphones
dc.subjectPersonal identification numbers
dc.subjectSocial networks
dc.subjectInternet crime
dc.titleMobile device espionage
dc.typeArticle
dc.rights.holderInternational Conference on Industry, Engineering, and Management Systems


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record