메뉴 건너뛰기




Volumn 21, Issue 5, 2013, Pages 381-400

A survey of security risks of mobile social media through blog mining and an extensive literature search

Author keywords

Blog mining; Bring your own device; Enterprise security; Mobile devices; Mobile social media; Risk mitigation; Security risks; Social media

Indexed keywords

BLOG MINING; BRING YOUR OWN DEVICES; ENTERPRISE SECURITY; MOBILE SOCIAL MEDIAS; RISK MITIGATION; SECURITY RISKS; SOCIAL MEDIA;

EID: 84887480221     PISSN: 09685227     EISSN: None     Source Type: Journal    
DOI: 10.1108/IMCS-12-2012-0068     Document Type: Article
Times cited : (46)

References (101)
  • 1
    • 0043232732 scopus 로고    scopus 로고
    • Users are not the enemy: Why users compromise computer security mechanisms and how to take remedial measures
    • Adams, A. and Sasse, M.A. (1999), "Users are not the enemy: why users compromise computer security mechanisms and how to take remedial measures", Communications of the ACM, Vol. 42, pp. 41-46.
    • (1999) Communications of the ACM , vol.42 , pp. 41-46
    • Adams, A.1    Sasse, M.A.2
  • 4
  • 6
    • 84860619315 scopus 로고    scopus 로고
    • Reducing the window of opportunity for Android malware Gotta catch'em all
    • Apvrille, A. and Strazzere, T. (2012), "Reducing the window of opportunity for Android malware Gotta catch'em all", Journal in Computer Virology, Vol. 8 Nos 1/2, pp. 61-71.
    • (2012) Journal in Computer Virology , vol.8 , Issue.1-2 , pp. 61-71
    • Apvrille, A.1    Strazzere, T.2
  • 8
    • 79957604407 scopus 로고    scopus 로고
    • Secure software installation on smartphones
    • Barrera, D. and Van Oorschot, P. (2011), "Secure software installation on smartphones", IEEE Security & Privacy, Vol. 9 No. 3, pp. 42-48.
    • (2011) IEEE Security & Privacy , vol.9 , Issue.3 , pp. 42-48
    • Barrera, D.1    Van Oorschot, P.2
  • 12
    • 84887452840 scopus 로고    scopus 로고
    • Improving security and mobility for personally owned devices
    • Buchholz, D., Dunlop, J. and Ross, A. (2012), "Improving security and mobility for personally owned devices", Intel White Paper, available at: http://communities.intel.com/docs/DOC- 19277
    • (2012) Intel White Paper
    • Buchholz, D.1    Dunlop, J.2    Ross, A.3
  • 14
    • 79952786946 scopus 로고    scopus 로고
    • Understanding consumer conversations around ads in a Web 2.0 world
    • Campbell, C., Pitt, L., Parent, M. and Berthon, P. (2011), "Understanding consumer conversations around ads in a Web 2.0 world", Journal of Advertising, Vol. 40 No. 1, pp. 87-102.
    • (2011) Journal of Advertising , vol.40 , Issue.1 , pp. 87-102
    • Campbell, C.1    Pitt, L.2    Parent, M.3    Berthon, P.4
  • 15
    • 33751163289 scopus 로고    scopus 로고
    • Mining communities and their relationships in blogs: A study of hate groups
    • Chau, M. and Xu, J. (2007), "Mining communities and their relationships in blogs: a study of hate groups", International Journal of Human-Computer Studies, Vol. 65, pp. 57-70.
    • (2007) International Journal of Human-Computer Studies , vol.65 , pp. 57-70
    • Chau, M.1    Xu, J.2
  • 16
    • 84868008189 scopus 로고    scopus 로고
    • Business intelligence in blogs: Understanding consumer interactions and communities
    • Chau, M. and Xu, J. (2012), "Business intelligence in blogs: understanding consumer interactions and communities", MIS Quarterly (MISQ), Vol. 36 No. 4, pp. 1189-1216.
    • (2012) MIS Quarterly (MISQ) , vol.36 , Issue.4 , pp. 1189-1216
    • Chau, M.1    Xu, J.2
  • 17
    • 84861550985 scopus 로고    scopus 로고
    • (accessed 9 November 2011)
    • Chi, M. (2011), "Security policy and social media use", available at: www.sans.org/reading-room/whitepapers/policyissues/reducing-risks- social-media-organization-33749 (accessed 9 November 2011).
    • (2011) Security Policy and Social Media Use
    • Chi, M.1
  • 20
    • 80955142795 scopus 로고    scopus 로고
    • The cyber threat landscape: Challenges and future research directions
    • Choo, K.R. (2011), "The cyber threat landscape: challenges and future research directions", Computers & Security, Vol. 30 No. 8, pp. 719-731.
    • (2011) Computers & Security , vol.30 , Issue.8 , pp. 719-731
    • Choo, K.R.1
  • 22
    • 34547919197 scopus 로고    scopus 로고
    • The future of mobile malware
    • Coursen, S. (2007), "The future of mobile malware", Network Security, No. 8, pp. 7-11.
    • (2007) Network Security , Issue.8 , pp. 7-11
    • Coursen, S.1
  • 26
    • 75549083466 scopus 로고    scopus 로고
    • Redefining social marketing with contemporary commercial marketing definitions
    • Dann, S. (2010), "Redefining social marketing with contemporary commercial marketing definitions", Journal of Business Research, Vol. 63 No. 2, pp. 147-153.
    • (2010) Journal of Business Research , vol.63 , Issue.2 , pp. 147-153
    • Dann, S.1
  • 27
    • 84870387829 scopus 로고    scopus 로고
    • Enabling information security culture: Influences and challenges for Australian SMEs
    • Paper 61
    • Dojkovski, S., Lichtenstein, S. and Warren, M. (2010), "Enabling information security culture: influences and challenges for Australian SMEs", ACIS 2010 Proceedings, Paper 61.
    • (2010) ACIS 2010 Proceedings
    • Dojkovski, S.1    Lichtenstein, S.2    Warren, M.3
  • 33
    • 20344390532 scopus 로고    scopus 로고
    • Handheld hazards: The rise of malware on mobile devices
    • Furnell, S. (2005), "Handheld hazards: the rise of malware on mobile devices", Computer Fraud & Security, No. 5, pp. 4-8.
    • (2005) Computer Fraud & Security , Issue.5 , pp. 4-8
    • Furnell, S.1
  • 35
    • 84864544614 scopus 로고    scopus 로고
    • Improving multilingual semantic interoperation in cross-organizational enterprise systems through concept disambiguation
    • Guo, J., Xu, L., Xiao, G. and Gong, Z. (2012a), "Improving multilingual semantic interoperation in cross-organizational enterprise systems through concept disambiguation", IEEE Transactions on Industrial Informatics, Vol. 8 No. 3, pp. 647-658.
    • (2012) IEEE Transactions on Industrial Informatics , vol.8 , Issue.3 , pp. 647-658
    • Guo, J.1    Xu, L.2    Xiao, G.3    Gong, Z.4
  • 36
    • 84857502559 scopus 로고    scopus 로고
    • Semantic inference on heterogeneous e-marketplace activities
    • Guo, J., Xu, L., Gong, Z., Che, C. and Chaudhry, S. (2012b), "Semantic inference on heterogeneous e-marketplace activities", IEEE Transactions on SMC Part A, Vol. 42 No. 2, pp. 316-330.
    • (2012) IEEE Transactions on SMC Part A , vol.42 , Issue.2 , pp. 316-330
    • Guo, J.1    Xu, L.2    Gong, Z.3    Che, C.4    Chaudhry, S.5
  • 37
    • 84861549713 scopus 로고    scopus 로고
    • A review of social media security risks and mitigation techniques
    • He, W. (2012), "A review of social media security risks and mitigation techniques", Journal of Systems and Information Technology, Vol. 14 No. 2, pp. 171-180.
    • (2012) Journal of Systems and Information Technology , vol.14 , Issue.2 , pp. 171-180
    • He, W.1
  • 38
    • 84868671545 scopus 로고    scopus 로고
    • Integration of distributed enterprise applications: A survey
    • in press)
    • He, W. and Xu, L. (2013), "Integration of distributed enterprise applications: a survey", IEEE Transactions on Industrial Informatics (in press).
    • (2013) IEEE Transactions on Industrial Informatics
    • He, W.1    Xu, L.2
  • 39
    • 58349108259 scopus 로고    scopus 로고
    • Insight into interface design of web-based case-based reasoning retrieval systems
    • He, W., Wang, F., Means, T. and Xu, L. (2009a), "Insight into interface design of web-based case-based reasoning retrieval systems", Expert Systems with Applications, Vol. 36 No. 3, pp. 7280-7287.
    • (2009) Expert Systems with Applications , vol.36 , Issue.3 , pp. 7280-7287
    • He, W.1    Wang, F.2    Means, T.3    Xu, L.4
  • 40
    • 70350134774 scopus 로고    scopus 로고
    • Integrating Web 2.0 with the case-based reasoning cycle: A systems approach
    • He, W., Xu, L., Means, T. and Wang, P. (2009b), "Integrating Web 2.0 with the case-based reasoning cycle: a systems approach", Systems Research and Behavioral Science, Vol. 26 No. 6, pp. 717-728.
    • (2009) Systems Research and Behavioral Science , vol.26 , Issue.6 , pp. 717-728
    • He, W.1    Xu, L.2    Means, T.3    Wang, P.4
  • 42
    • 67650152666 scopus 로고    scopus 로고
    • Protection motivation and deterrence: A framework for security policy compliance in organizations
    • Herath, T. and Rao, H.R. (2009), "Protection motivation and deterrence: a framework for security policy compliance in organizations", European Journal of Information Systems, Vol. 8 No. 2, pp. 106-125.
    • (2009) European Journal of Information Systems , vol.8 , Issue.2 , pp. 106-125
    • Herath, T.1    Rao, H.R.2
  • 44
    • 0036388121 scopus 로고    scopus 로고
    • Concept mapping as an alternative approach for the analysis of open-ended survey responses
    • Jackson, K. and Trochim, W.K.M. (2002), "Concept mapping as an alternative approach for the analysis of open-ended survey responses", Organizational Research Methods, Vol. 5 No. 4, pp. 307-336.
    • (2002) Organizational Research Methods , vol.5 , Issue.4 , pp. 307-336
    • Jackson, K.1    Trochim, W.K.M.2
  • 45
    • 84887487195 scopus 로고    scopus 로고
    • Javelin Strategy & Research (2012), "Identity fraud rose 13 percent in 2011", available at: www.javelinstrategy.com/news/1314/92/ Identity-Fraud-Rose-13-Percent-in-2011-According-to- New-Javelin-Strategy- Research-Report/d,pressRoomDetail
    • (2012) Identity Fraud Rose 13 Percent in 2011
  • 47
    • 71149088987 scopus 로고    scopus 로고
    • Users of the world, unite! the challenges and opportunities of social media
    • Kaplan, A. and Haenlein, M. (2010), "Users of the world, unite! The challenges and opportunities of social media", Business Horizons, Vol. 53, pp. 59-68.
    • (2010) Business Horizons , vol.53 , pp. 59-68
    • Kaplan, A.1    Haenlein, M.2
  • 48
    • 84861551431 scopus 로고    scopus 로고
    • Kaspersky Labs (accessed 16 November 2011)
    • Kaspersky Labs (2009), "Kaspersky security bulletin: malware evolution 2008", available at: www.securelist.com/en/analysis?pubid= 204792051 (accessed 16 November 2011).
    • (2009) Kaspersky Security Bulletin: Malware Evolution 2008
  • 53
    • 82255175850 scopus 로고    scopus 로고
    • Fighting identity theft: The coping perspective
    • Lai, F., Li, D. and Hsieh, C. (2012), "Fighting identity theft: the coping perspective", Decision Support Systems, Vol. 52, pp. 353-363.
    • (2012) Decision Support Systems , vol.52 , pp. 353-363
    • Lai, F.1    Li, D.2    Hsieh, C.3
  • 54
    • 79959333760 scopus 로고    scopus 로고
    • Mobile security: Finally a serious problem?
    • Leavitt, N. (2011), "Mobile security: finally a serious problem?", IEEE Computer, Vol. 44 No. 6, pp. 11-14.
    • (2011) IEEE Computer , vol.44 , Issue.6 , pp. 11-14
    • Leavitt, N.1
  • 55
    • 84887419507 scopus 로고    scopus 로고
    • Leximancer Brisbane
    • Leximancer (2010), Leximancer White Paper, Leximancer, Brisbane, available at:www.leximancer.com/lmedia/Leximancer-White-Paper-2010.pdf
    • (2010) Leximancer White Paper
  • 56
    • 84896989071 scopus 로고    scopus 로고
    • Version 4, Leximancer, Brisbane
    • Leximancer (2011), Leximancer Manual: Version 4, Leximancer, Brisbane, available at: www.leximancer.com/lp/4.00.20L1173952/m/doc/LeximancerManual.pdf
    • (2011) Leximancer Manual
  • 57
    • 84887461836 scopus 로고    scopus 로고
    • Lookout (2011), 2011 Mobile Threat Report, available at:www.mylookout. com/mobile-threat-report
    • (2011) 2011 Mobile Threat Report
  • 58
    • 84887445016 scopus 로고    scopus 로고
    • Lumension and Ponemon Institute
    • Lumension and Ponemon Institute (2012), Growing Insecurity: 2012 State of the Endpoint Report, available at: www.lumension.com/2012-state-of-the- endpoint.aspx
    • (2012) Growing Insecurity 2012 State of the Endpoint Report
  • 59
    • 84876259472 scopus 로고    scopus 로고
    • McAfee (2012), 2012 Threats Predictions, available at: www.mcafee.com/us/resources/reports/rp-threat-predictions-2012.pdf
    • (2012) 2012 Threats Predictions
  • 63
    • 80955163816 scopus 로고    scopus 로고
    • Cybercrime: Understanding and addressing the concerns of stakeholders
    • Martin, N. and Rice, J. (2011), "Cybercrime: understanding and addressing the concerns of stakeholders", Computers & Security, Vol. 30 No. 8, pp. 803-814.
    • (2011) Computers & Security , vol.30 , Issue.8 , pp. 803-814
    • Martin, N.1    Rice, J.2
  • 64
    • 84867375385 scopus 로고    scopus 로고
    • BYOD: Security and privacy considerations
    • Miller, K.W., Voas, J. and Hurlburt, G.F. (2012), "BYOD: security and privacy considerations", IT Professional, Vol. 14 No. 5, pp. 53-55.
    • (2012) IT Professional , vol.14 , Issue.5 , pp. 53-55
    • Miller, K.W.1    Voas, J.2    Hurlburt, G.F.3
  • 65
    • 77954796523 scopus 로고    scopus 로고
    • A review and future research directions of secure and trustworthy mobile agent-based e-marketplace systems
    • Patel, A., Qi, W. and Wills, C. (2010), "A review and future research directions of secure and trustworthy mobile agent-based e-marketplace systems", Information Management & Computer Security, Vol. 18 No. 3, pp. 144-161.
    • (2010) Information Management & Computer Security , vol.18 , Issue.3 , pp. 144-161
    • Patel, A.1    Qi, W.2    Wills, C.3
  • 66
    • 84861538043 scopus 로고    scopus 로고
    • Social engineering: Concepts and solutions
    • Peltier, T.R. (2006), "Social engineering: concepts and solutions", Information Systems Security, Vol. 15 No. 5, pp. 13-21.
    • (2006) Information Systems Security , vol.15 , Issue.5 , pp. 13-21
    • Peltier, T.R.1
  • 67
    • 84861101642 scopus 로고    scopus 로고
    • Leveraging behavioral science to mitigate cyber security risk
    • Pfleeger, S.L. and Caputo, D. (2012), "Leveraging behavioral science to mitigate cyber security risk", Computers & Security, Vol. 31 No. 4, pp. 597-611.
    • (2012) Computers & Security , vol.31 , Issue.4 , pp. 597-611
    • Pfleeger, S.L.1    Caputo, D.2
  • 69
    • 20444466128 scopus 로고    scopus 로고
    • Knowledge, economy, technology and society: The politics of discourse
    • Rooney, D. (2005), "Knowledge, economy, technology and society: the politics of discourse", Telematics and Informatics, Vol. 22 No. 4, pp. 405-422.
    • (2005) Telematics and Informatics , vol.22 , Issue.4 , pp. 405-422
    • Rooney, D.1
  • 70
    • 80053018618 scopus 로고    scopus 로고
    • Facets of serendipity in everyday chance encounters: A grounded theory approach to blog analysis
    • Rubin, V.L., Burkel, J. and Quan-Haase, A. (2011), "Facets of serendipity in everyday chance encounters: a grounded theory approach to blog analysis", Information Research: An International Electronic Journal, Vol. 16 No. 3, available at: http://informationr.net/ir/16- 3/paper488.html
    • (2011) Information Research: An International Electronic Journal , vol.16 , Issue.3
    • Rubin, V.L.1    Burkel, J.2    Quan-Haase, A.3
  • 71
    • 77956395261 scopus 로고    scopus 로고
    • Ethical decision making: Improving the quality of acceptable use policies
    • Ruighaver, A.B., Maynard, S.B. and Warren, M. (2010), "Ethical decision making: improving the quality of acceptable use policies", Computers & Security, Vol. 29 No. 7, pp. 731-736.
    • (2010) Computers & Security , vol.29 , Issue.7 , pp. 731-736
    • Ruighaver, A.B.1    Maynard, S.B.2    Warren, M.3
  • 77
    • 42549166924 scopus 로고    scopus 로고
    • Security aspects of mobile phone virus: A critical survey
    • Shih, D., Lin, B., Chiang, H. and Shih, M. (2008), "Security aspects of mobile phone virus: a critical survey", Industrial Management & Data Systems, Vol. 108 No. 4, pp. 478-494.
    • (2008) Industrial Management & Data Systems , vol.108 , Issue.4 , pp. 478-494
    • Shih, D.1    Lin, B.2    Chiang, H.3    Shih, M.4
  • 79
    • 33748991451 scopus 로고    scopus 로고
    • Evaluation of unsupervised semantic mapping of natural language with Leximancer concept mapping
    • Smith, A.E. and Humphreys, M.S. (2006), "Evaluation of unsupervised semantic mapping of natural language with Leximancer concept mapping", Behavior Research Methods, Vol. 38 No. 2, pp. 262-279.
    • (2006) Behavior Research Methods , vol.38 , Issue.2 , pp. 262-279
    • Smith, A.E.1    Humphreys, M.S.2
  • 80
    • 80054707541 scopus 로고    scopus 로고
    • Out of fear or desire? Toward a better understanding of employees' motivation to follow IS security policies
    • Son, J.Y. (2011), "Out of fear or desire? Toward a better understanding of employees' motivation to follow IS security policies", Information & Management, Vol. 48 No. 7, pp. 296-302.
    • (2011) Information & Management , vol.48 , Issue.7 , pp. 296-302
    • Son, J.Y.1
  • 81
    • 84869206387 scopus 로고    scopus 로고
    • Sophos (2012), Security Threat Report 2012, available at: www.sophos.com/en-us/security-newstrends/reports/security-threat-report.aspx
    • (2012) Security Threat Report 2012
  • 84
    • 56049089609 scopus 로고    scopus 로고
    • A business process intelligence system for enterprise process performance management
    • Tan, W., Shen, W., Xu, L., Zhou, B. and Li, L. (2008), "A business process intelligence system for enterprise process performance management", IEEE Transactions on SMC Part C, Vol. 38 No. 6, pp. 745-756.
    • (2008) IEEE Transactions on SMC Part C , vol.38 , Issue.6 , pp. 745-756
    • Tan, W.1    Shen, W.2    Xu, L.3    Zhou, B.4    Li, L.5
  • 85
    • 77952924818 scopus 로고    scopus 로고
    • Efficient signature based malware detection on mobile devices
    • Venugopal, D. and Hu, G. (2008), "Efficient signature based malware detection on mobile devices", Mobile Information Systems, Vol. 4 No. 1, pp. 33-49.
    • (2008) Mobile Information Systems , vol.4 , Issue.1 , pp. 33-49
    • Venugopal, D.1    Hu, G.2
  • 86
    • 84861453131 scopus 로고    scopus 로고
    • Towards information security behavioral compliance
    • Vroom, C. and von Solms, R. (2004), "Towards information security behavioral compliance", Information Management & Computer Security, Vol. 6 No. 4, pp. 167-173.
    • (2004) Information Management & Computer Security , vol.6 , Issue.4 , pp. 167-173
    • Vroom, C.1    Von Solms, R.2
  • 88
    • 0242708745 scopus 로고    scopus 로고
    • Pretty good persuasion: A first step towards effective password security for the real world
    • ACM Press, New York, NY
    • Weirich, D. and Sasse, M.A. (2001), "Pretty good persuasion: a first step towards effective password security for the real world", Proceedings of the New Security Paradigms Workshop, ACM Press, New York, NY, pp. 137-143.
    • (2001) Proceedings of the New Security Paradigms Workshop , pp. 137-143
    • Weirich, D.1    Sasse, M.A.2
  • 90
    • 81255151151 scopus 로고    scopus 로고
    • Enterprise systems: State-of-the-art and future trends
    • Xu, L. (2011), "Enterprise systems: state-of-the-art and future trends", IEEE Transactions on Industrial Informatics, Vol. 7 No. 4, pp. 630-640.
    • (2011) IEEE Transactions on Industrial Informatics , vol.7 , Issue.4 , pp. 630-640
    • Xu, L.1
  • 91
    • 46849118987 scopus 로고    scopus 로고
    • An integrated approach for agricultural ecosystem management
    • Xu, L., Liang, N. and Gao, Q. (2008), "An integrated approach for agricultural ecosystem management", IEEE Transactions on SMC Part C, Vol. 38 No. 4, pp. 590-599.
    • (2008) IEEE Transactions on SMC Part C , vol.38 , Issue.4 , pp. 590-599
    • Xu, L.1    Liang, N.2    Gao, Q.3
  • 95
    • 34447298085 scopus 로고    scopus 로고
    • Threats and countermeasures for information system security: A crossindustry study
    • Yeh, Q. and Chang, A. (2007), "Threats and countermeasures for information system security: a crossindustry study", Information & Management, Vol. 44 No. 5, pp. 480-491.
    • (2007) Information & Management , vol.44 , Issue.5 , pp. 480-491
    • Yeh, Q.1    Chang, A.2
  • 97
    • 84863087619 scopus 로고    scopus 로고
    • A new open door: The smartphone's impact on work-to-life conflict, stress, and resistance
    • Yun, H., Kettinger, W. and Lee, C. (2012), "A new open door: the smartphone's impact on work-to-life conflict, stress, and resistance", International Journal of Electronic Commerce, Vol. 16 No. 4, pp. 121-152.
    • (2012) International Journal of Electronic Commerce , vol.16 , Issue.4 , pp. 121-152
    • Yun, H.1    Kettinger, W.2    Lee, C.3
  • 101
    • 77951204516 scopus 로고    scopus 로고
    • Improving information security awareness and behaviour through dialogue, participation and collective reflection - An intervention study
    • Albrechtsen, E. and Hovden, J. (2010), "Improving information security awareness and behaviour through dialogue, participation and collective reflection - an intervention study", Computers & Security, Vol. 29 No. 4, pp. 432-445.
    • (2010) Computers & Security , vol.29 , Issue.4 , pp. 432-445
    • Albrechtsen, E.1    Hovden, J.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.