Perspectives of Managing Mobile Service Security Risks
The rapid growth of mobile telecommunications industry has been influencing the tremendous technological diffusion offering lower access cost, mobility, and convenience based communication as compared to wired telecom. The global rise of mobile competition helped service providers to offer much impr...
Main Author: | |
---|---|
Format: | Article |
Language: | English |
Published: |
SAGE Publishing
2015-07-01
|
Series: | International Journal of Distributed Sensor Networks |
Online Access: | https://doi.org/10.1155/2015/592150 |
id |
doaj-c01641af8f09448bb3793a2f18917059 |
---|---|
record_format |
Article |
spelling |
doaj-c01641af8f09448bb3793a2f189170592020-11-25T04:03:12ZengSAGE PublishingInternational Journal of Distributed Sensor Networks1550-14772015-07-011110.1155/2015/592150592150Perspectives of Managing Mobile Service Security RisksMohammed Ahmed Truki AlSudiaryThe rapid growth of mobile telecommunications industry has been influencing the tremendous technological diffusion offering lower access cost, mobility, and convenience based communication as compared to wired telecom. The global rise of mobile competition helped service providers to offer much improved services both in terms of capabilities, information processing, retrieval, and communication over typical problems of inefficiencies generated by monopolies in wired networks. While there are significant opportunities to leverage the growth of mobile devices to increase the effectiveness of mobile users, also there are significant concerns about security and privacy of sensitive data that must be handled in these devices. Correspondingly, cyber security is becoming one of the top priorities for any nation. This paper reviews and presents some of the literature exercises in this regard. Objectives of this paper are: (i) to bring into light the explicit and implicit assumptions on the nature of technological change and how they could raise security issues, (ii) to discuss the technology and management perspectives on the security issues, and (iii) to present them through a methodology oriented taxonomy. It is believed that the adoption of methodology driven by sense-and-respond model would serve as an effective means to achieve these objectives.https://doi.org/10.1155/2015/592150 |
collection |
DOAJ |
language |
English |
format |
Article |
sources |
DOAJ |
author |
Mohammed Ahmed Truki AlSudiary |
spellingShingle |
Mohammed Ahmed Truki AlSudiary Perspectives of Managing Mobile Service Security Risks International Journal of Distributed Sensor Networks |
author_facet |
Mohammed Ahmed Truki AlSudiary |
author_sort |
Mohammed Ahmed Truki AlSudiary |
title |
Perspectives of Managing Mobile Service Security Risks |
title_short |
Perspectives of Managing Mobile Service Security Risks |
title_full |
Perspectives of Managing Mobile Service Security Risks |
title_fullStr |
Perspectives of Managing Mobile Service Security Risks |
title_full_unstemmed |
Perspectives of Managing Mobile Service Security Risks |
title_sort |
perspectives of managing mobile service security risks |
publisher |
SAGE Publishing |
series |
International Journal of Distributed Sensor Networks |
issn |
1550-1477 |
publishDate |
2015-07-01 |
description |
The rapid growth of mobile telecommunications industry has been influencing the tremendous technological diffusion offering lower access cost, mobility, and convenience based communication as compared to wired telecom. The global rise of mobile competition helped service providers to offer much improved services both in terms of capabilities, information processing, retrieval, and communication over typical problems of inefficiencies generated by monopolies in wired networks. While there are significant opportunities to leverage the growth of mobile devices to increase the effectiveness of mobile users, also there are significant concerns about security and privacy of sensitive data that must be handled in these devices. Correspondingly, cyber security is becoming one of the top priorities for any nation. This paper reviews and presents some of the literature exercises in this regard. Objectives of this paper are: (i) to bring into light the explicit and implicit assumptions on the nature of technological change and how they could raise security issues, (ii) to discuss the technology and management perspectives on the security issues, and (iii) to present them through a methodology oriented taxonomy. It is believed that the adoption of methodology driven by sense-and-respond model would serve as an effective means to achieve these objectives. |
url |
https://doi.org/10.1155/2015/592150 |
work_keys_str_mv |
AT mohammedahmedtrukialsudiary perspectivesofmanagingmobileservicesecurityrisks |
_version_ |
1724441252509777920 |