Consumer mobile phone security requires more attention, now that their data storage capacity is increasing. At the same time, much effort is spent on data-centric security for large enterprises. In this article we try to apply data-centric security to consumer mobile phones. We show a maturity model that can be used as a roadmap for improving their security. Additionally, several shortcomings of the data-centric approach are discussed
This research analyses the various security mechanism for both personal and corporate users and how ...
The use of mobile devices in business is increasing as employees use them for communications, creati...
The use of mobile devices in business is increasing as employees use them for communications, creati...
In the interconnected world that we live in, traditional security barriers are broken down. Developm...
In the interconnected world that we live in, traditional security barriers are broken down. Developm...
Recently the usage of mobile devices has increased rapidly and it will be growing even more with enh...
Data-centric security is significant in understanding, assessing and mitigating the various risks an...
Recently the usage of mobile devices has increased rapidly and it will be growing even more as mobil...
Cash payment is still king in several markets, accounting for more than 90% of the payments i...
An ever increasing amount of functionality is incorporated into mobile phones-this trend will contin...
Abstract. With the proliferation of mobile devices in today’s information-rich environment, the secu...
An ever increasing amount of functionality is incorporated into mobile phones-this trend will contin...
Smartphones are proliferating into the workplace at an ever-increasing rate, similarly the threats t...
Submitted in partial fulfillment of the requirements for the Degree of Master of Science in Informa...
Securing smartphones' data is a new and growing concern, especially when this data represents valuab...
This research analyses the various security mechanism for both personal and corporate users and how ...
The use of mobile devices in business is increasing as employees use them for communications, creati...
The use of mobile devices in business is increasing as employees use them for communications, creati...
In the interconnected world that we live in, traditional security barriers are broken down. Developm...
In the interconnected world that we live in, traditional security barriers are broken down. Developm...
Recently the usage of mobile devices has increased rapidly and it will be growing even more with enh...
Data-centric security is significant in understanding, assessing and mitigating the various risks an...
Recently the usage of mobile devices has increased rapidly and it will be growing even more as mobil...
Cash payment is still king in several markets, accounting for more than 90% of the payments i...
An ever increasing amount of functionality is incorporated into mobile phones-this trend will contin...
Abstract. With the proliferation of mobile devices in today’s information-rich environment, the secu...
An ever increasing amount of functionality is incorporated into mobile phones-this trend will contin...
Smartphones are proliferating into the workplace at an ever-increasing rate, similarly the threats t...
Submitted in partial fulfillment of the requirements for the Degree of Master of Science in Informa...
Securing smartphones' data is a new and growing concern, especially when this data represents valuab...
This research analyses the various security mechanism for both personal and corporate users and how ...
The use of mobile devices in business is increasing as employees use them for communications, creati...
The use of mobile devices in business is increasing as employees use them for communications, creati...