Perspectives of Managing Mobile Service Security Risks

The rapid growth of mobile telecommunications industry has been influencing the tremendous technological diffusion offering lower access cost, mobility, and convenience based communication as compared to wired telecom. The global rise of mobile competition helped service providers to offer much impr...

Full description

Bibliographic Details
Main Author: Mohammed Ahmed Truki AlSudiary
Format: Article
Language:English
Published: SAGE Publishing 2015-07-01
Series:International Journal of Distributed Sensor Networks
Online Access:https://doi.org/10.1155/2015/592150
id doaj-c01641af8f09448bb3793a2f18917059
record_format Article
spelling doaj-c01641af8f09448bb3793a2f189170592020-11-25T04:03:12ZengSAGE PublishingInternational Journal of Distributed Sensor Networks1550-14772015-07-011110.1155/2015/592150592150Perspectives of Managing Mobile Service Security RisksMohammed Ahmed Truki AlSudiaryThe rapid growth of mobile telecommunications industry has been influencing the tremendous technological diffusion offering lower access cost, mobility, and convenience based communication as compared to wired telecom. The global rise of mobile competition helped service providers to offer much improved services both in terms of capabilities, information processing, retrieval, and communication over typical problems of inefficiencies generated by monopolies in wired networks. While there are significant opportunities to leverage the growth of mobile devices to increase the effectiveness of mobile users, also there are significant concerns about security and privacy of sensitive data that must be handled in these devices. Correspondingly, cyber security is becoming one of the top priorities for any nation. This paper reviews and presents some of the literature exercises in this regard. Objectives of this paper are: (i) to bring into light the explicit and implicit assumptions on the nature of technological change and how they could raise security issues, (ii) to discuss the technology and management perspectives on the security issues, and (iii) to present them through a methodology oriented taxonomy. It is believed that the adoption of methodology driven by sense-and-respond model would serve as an effective means to achieve these objectives.https://doi.org/10.1155/2015/592150
collection DOAJ
language English
format Article
sources DOAJ
author Mohammed Ahmed Truki AlSudiary
spellingShingle Mohammed Ahmed Truki AlSudiary
Perspectives of Managing Mobile Service Security Risks
International Journal of Distributed Sensor Networks
author_facet Mohammed Ahmed Truki AlSudiary
author_sort Mohammed Ahmed Truki AlSudiary
title Perspectives of Managing Mobile Service Security Risks
title_short Perspectives of Managing Mobile Service Security Risks
title_full Perspectives of Managing Mobile Service Security Risks
title_fullStr Perspectives of Managing Mobile Service Security Risks
title_full_unstemmed Perspectives of Managing Mobile Service Security Risks
title_sort perspectives of managing mobile service security risks
publisher SAGE Publishing
series International Journal of Distributed Sensor Networks
issn 1550-1477
publishDate 2015-07-01
description The rapid growth of mobile telecommunications industry has been influencing the tremendous technological diffusion offering lower access cost, mobility, and convenience based communication as compared to wired telecom. The global rise of mobile competition helped service providers to offer much improved services both in terms of capabilities, information processing, retrieval, and communication over typical problems of inefficiencies generated by monopolies in wired networks. While there are significant opportunities to leverage the growth of mobile devices to increase the effectiveness of mobile users, also there are significant concerns about security and privacy of sensitive data that must be handled in these devices. Correspondingly, cyber security is becoming one of the top priorities for any nation. This paper reviews and presents some of the literature exercises in this regard. Objectives of this paper are: (i) to bring into light the explicit and implicit assumptions on the nature of technological change and how they could raise security issues, (ii) to discuss the technology and management perspectives on the security issues, and (iii) to present them through a methodology oriented taxonomy. It is believed that the adoption of methodology driven by sense-and-respond model would serve as an effective means to achieve these objectives.
url https://doi.org/10.1155/2015/592150
work_keys_str_mv AT mohammedahmedtrukialsudiary perspectivesofmanagingmobileservicesecurityrisks
_version_ 1724441252509777920