Mobile device espionage

Loading...
Thumbnail Image
Authors
Carstens, Deborah
Mahlman, John
Miller, Jeffrey
Shaffer, Matthew
Advisors
Issue Date
2019-12
Type
Article
Keywords
Smartphones , Personal identification numbers , Social networks , Internet crime
Research Projects
Organizational Units
Journal Issue
Citation
Carstens, Deborah,PhD., P.M.P., Mahlman, J.,M.S., Miller, J., PhD., & Shaffer, M., PhD. (2019). Mobile device espionage. Journal of Management & Engineering Integration, 12(2), 86-94. https://doi.org/10.62704/10057/24262
Abstract

Malware and hacking activities are growing among today's most popular mobile devices. These security risks are prompting companies, federal facilities, and other institutions to enact policies aimed at mitigating the amount of espionage and illegal events that can transpire on a cell phone or other mobile device. With all of the new devices and applications, publicly available, new security-related vulnerabilities continue to arise. These devices and applications are targets for attacks from malicious outside sources. Each day provides a new potential threat aimed at taking advantage of some security exploit in cell phones and mobile devices. Security analysts and experts are at a disadvantage in this war against threats because they are fighting a war without clear rules. The focus of this literature review is on cell phone and electronic device vulnerabilities, espionage in the workplace, and security solutions. This will provide an understanding of risks, threats and solutions that exist in the modern era of cell phones and mobile devices.

Table of Contents
Description
Published in SOAR: Shocker Open Access Repository by Wichita State University Libraries Technical Services, November 2022.
Publisher
Association for Industry, Engineering and Management Systems (AIEMS)
Journal
Book Title
Series
Journal of Management & Engineering Integration
v.12 no.2
PubMed ID
ISSN
1939-7984
EISSN