This research was conducted to bridge the gap between the purchase and deployment of mobile devices and their security, the problem of mobile devices is the lack of laid down methods for securing them. It analyses the various security mechanism for both personal and corporate users. It classifies users based on the frequency of use for mobile devices, the breath of use and the multiplicity of tasks that the devices a put to in it's different contexts. User profiles were analyzed and different statistics on the types of users and their characteristics was established. Based on previous research it is evident that a one security policy fits all will not suffice in this situation hence the classification of users into Novice, Intermediate, Adv...
Over the last decade the popularity of mobile devices has increased enormously. Initially, personal ...
This paper is concerned with arising problems on security and privacy of personal data on mobile dev...
Mobile devices are used everywhere, from making acall to store huge volume of information. But toget...
This research analyses the various security mechanism for both personal and corporate users and how ...
In last 3-4 years use of advanced mobile devices such as PDA and smartphone has become a regular pra...
In last couple of years use of advanced mobile devices such as PDA and smartphone has become a regul...
The use of mobile devices in business is increasing as employees use them for communications, creati...
The use of mobile devices in business is increasing as employees use them for communications, creati...
Mobile devices have faced tremendous changes in the past few years. Mobile devices are now tending t...
The number of professionals using mobile wireless devices in the workplace is growing rapidly. This ...
Submitted in partial fulfillment of the requirements for the Degree of Master of Science in Informa...
have had such a dramatic impact on our personal and professional lives as mobility. Mobile devices s...
In the business world, mobile devices represent an important tool for carrying out one‘s work. By pr...
The problem addressed by this research is a demand for increased flexibility in access to organisati...
The problem addressed by this research is a demand for increased flexibility in access to organisati...
Over the last decade the popularity of mobile devices has increased enormously. Initially, personal ...
This paper is concerned with arising problems on security and privacy of personal data on mobile dev...
Mobile devices are used everywhere, from making acall to store huge volume of information. But toget...
This research analyses the various security mechanism for both personal and corporate users and how ...
In last 3-4 years use of advanced mobile devices such as PDA and smartphone has become a regular pra...
In last couple of years use of advanced mobile devices such as PDA and smartphone has become a regul...
The use of mobile devices in business is increasing as employees use them for communications, creati...
The use of mobile devices in business is increasing as employees use them for communications, creati...
Mobile devices have faced tremendous changes in the past few years. Mobile devices are now tending t...
The number of professionals using mobile wireless devices in the workplace is growing rapidly. This ...
Submitted in partial fulfillment of the requirements for the Degree of Master of Science in Informa...
have had such a dramatic impact on our personal and professional lives as mobility. Mobile devices s...
In the business world, mobile devices represent an important tool for carrying out one‘s work. By pr...
The problem addressed by this research is a demand for increased flexibility in access to organisati...
The problem addressed by this research is a demand for increased flexibility in access to organisati...
Over the last decade the popularity of mobile devices has increased enormously. Initially, personal ...
This paper is concerned with arising problems on security and privacy of personal data on mobile dev...
Mobile devices are used everywhere, from making acall to store huge volume of information. But toget...