메뉴 건너뛰기




Volumn 5, Issue , 2013, Pages 3441-3451

The need for BYOD mobile device security awareness and training

Author keywords

Android; BYOD; IOS; Mobile device security; Security awareness and training

Indexed keywords

ANDROID; BYOD; IOS; MOBILE DEVICE SECURITY; SECURITY AWARENESS;

EID: 84893219965     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (21)

References (33)
  • 2
    • 79951987516 scopus 로고    scopus 로고
    • Hacking wifi the easy way
    • doi: 10.1016/s1353-4858(11)70014-9
    • Bradbury, D. (2011) Hacking wifi the easy way, Network Security, 2, 9-12, doi: 10.1016/s1353-4858(11)70014-9.
    • (2011) Network Security , vol.2 , pp. 9-12
    • Bradbury, D.1
  • 4
    • 84893290887 scopus 로고    scopus 로고
    • Coninsync, Retrieved 02/17/2013, from
    • Coninsync. (2013) Why You Should Avoid Saving Passwords on Your Smartphone? Retrieved 02/17/2013, from http://coninsync.com/why-you-should-avoid-saving-passwords-on-your-smartphone/.
    • (2013) Why You Should Avoid Saving Passwords On Your Smartphone?
  • 5
    • 84893243799 scopus 로고    scopus 로고
    • CSI, 2010/2011Computer Crime and Security Survey. Retrieved 11-3-2012, from
    • CSI. (2011) 2010/2011Computer Crime and Security Survey. Retrieved 11-3-2012, from https://cours.etsmtl.ca/log619/documents/divers/CSIsurvey2010.pdf.
    • (2011)
  • 6
    • 84893306634 scopus 로고    scopus 로고
    • ESET, Retrieved 03/07/2013, from
    • ESET. (2013) Trends for 2013. Retrieved 03/07/2013, from http://go.eset.com/us/resources/whitepapers/Trends_for_2013_preview.pdf.
    • (2013) Trends For 2013
  • 8
    • 81755177550 scopus 로고    scopus 로고
    • Cracking wireless networks
    • doi: 10.1016/s1353-4858(11)70120-9
    • Gold, S. (2011) Cracking wireless networks, Network Security, 11, 14-18, doi: 10.1016/s1353-4858(11)70120-9.
    • (2011) Network Security , vol.11 , pp. 14-18
    • Gold, S.1
  • 11
    • 84893316822 scopus 로고    scopus 로고
    • Homeland-Security, Retrieved 05/02/2013, from
    • Homeland-Security. (2013) Cybersecurity Tips. Retrieved 05/02/2013, from http://www.dhs.gov/cybersecurity-tips.
    • (2013) Cybersecurity Tips
  • 12
    • 84893271673 scopus 로고    scopus 로고
    • InfoSec, Retrieved 02/17/2013, from
    • InfoSec. (2013) Protecting Mobile Devices. Retrieved 02/17/2013, from http://www.infosec.gov.hk/textonly/english/yourself/handheld.html.
    • (2013) Protecting Mobile Devices
  • 13
    • 84893271001 scopus 로고    scopus 로고
    • Kaspersky, Retrieved 02/11/13, from
    • Kaspersky. (2013) Find and Call: Leak and Spam. Retrieved 02/11/13, from http://www.securelist.com/en/blog/208193641/Find_and_Call_Leak_and_Spam.
    • (2013) Find and Call: Leak and Spam
  • 14
    • 0034316957 scopus 로고    scopus 로고
    • Health care management and information systems security: Awareness, training or education?
    • Katsikas, S. K. (2000) Health care management and information systems security: awareness, training or education? International Journal of Medical Informatics, 60, 129-135.
    • (2000) International Journal of Medical Informatics , vol.60 , pp. 129-135
    • Katsikas, S.K.1
  • 15
    • 84893289485 scopus 로고    scopus 로고
    • Should I jailbreak my iPhone?
    • Forbes, May 28, 2012. Retrieved 02/17/2013, from
    • Kingsley-Hughes, A. (2012) 'Should I jailbreak my iPhone?' And other jailbreaking questions answered, Forbes, May 28, 2012. Retrieved 02/17/2013, from http://www.forbes.com/sites/adriankingsleyhughes/2012/05/28/should-i-jailbreak-my-iphone-and-otherjailbreaking-questions-answered/.
    • (2012) And Other Jailbreaking Questions Answered
    • Kingsley-Hughes, A.1
  • 16
    • 84893290096 scopus 로고    scopus 로고
    • Lookout, Retrieved 11-3-2012, from
    • Lookout. (2011) Lookout MobileThreatReport 2011. Retrieved 11-3-2012, from https://www.lookout.com/resources/reports/mobile-threat-report.
    • (2011) Lookout MobileThreatReport 2011
  • 17
    • 84875849683 scopus 로고    scopus 로고
    • Lookout, Retrieved 01/13/2013, from
    • Lookout. (2012) State of Mobile Security 2012. Retrieved 01/13/2013, from https://www.lookout.com/resources/reports/state-of-mobile-security-2012.
    • (2012) State of Mobile Security 2012
  • 18
    • 84893273928 scopus 로고    scopus 로고
    • Lookout, 2013 Mobile Threat Predictions. Retrieved 02/11/13, from
    • Lookout. (2013). 2013 Mobile Threat Predictions. Retrieved 02/11/13, from https://blog.lookout.com/blog/2012/12/13/2013-mobile-threat-predictions/.
    • (2013)
  • 19
    • 84868140773 scopus 로고    scopus 로고
    • Android architecture: Attacking the weak points
    • doi: http://dx.doi.org/10.1016/S1353-4858(12)70092-2
    • Mansfield-Devine, S. (2012a) Android architecture: attacking the weak points, Network Security, 10, 5-12, doi: http://dx.doi.org/10.1016/S1353-4858(12)70092-2.
    • (2012) Network Security , vol.10 , pp. 5-12
    • Mansfield-Devine, S.1
  • 20
    • 84866649310 scopus 로고    scopus 로고
    • Paranoid Android: Just how insecure is the most popular mobile platform?
    • doi: http://dx.doi.org/10.1016/S1353-4858(12)70081-8
    • Mansfield-Devine, S. (2012b) Paranoid Android: just how insecure is the most popular mobile platform? Network Security, 9, 5-10, doi: http://dx.doi.org/10.1016/S1353-4858(12)70081-8.
    • (2012) Network Security , vol.9 , pp. 5-10
    • Mansfield-Devine, S.1
  • 21
    • 84872789642 scopus 로고    scopus 로고
    • Security review: The past year
    • doi: http://dx.doi.org/10.1016/S1361-3723(13)70006-X
    • Mansfield-Devine, S. (2013) Security review: the past year, Computer Fraud & Security, 1, 5-11, doi: http://dx.doi.org/10.1016/S1361-3723(13)70006-X.
    • (2013) Computer Fraud & Security , vol.1 , pp. 5-11
    • Mansfield-Devine, S.1
  • 22
    • 84891843335 scopus 로고    scopus 로고
    • Delegate the smartphone user? Security awareness in smartphone platforms
    • doi: http://dx.doi.org/10.1016/j.cose.2012.11.004
    • Mylonas, A., Kastania, A., and Gritzalis, D. (2012) Delegate the smartphone user? Security awareness in smartphone platforms, Computers & Security, 0, doi: http://dx.doi.org/10.1016/j.cose.2012.11.004.
    • (2012) Computers & Security
    • Mylonas, A.1    Kastania, A.2    Gritzalis, D.3
  • 24
    • 84880906554 scopus 로고    scopus 로고
    • Platform-Versions, Retrieved 02/05/2013, from
    • Platform-Versions. (2013) Platform Versions. Retrieved 02/05/2013, from http://developer.android.com/about/dashboards/index.html.
    • (2013) Platform Versions
  • 25
    • 84888985340 scopus 로고    scopus 로고
    • SANS, Retrieved 02/11/2013, from
    • SANS. (2012). Mobility/BYOD Security Survey. Retrieved 02/11/2013, from https://www.sans.org/reading_room/analysts_program/mobility-sec-survey.pdf.
    • (2012) Mobility/BYOD Security Survey
  • 26
    • 84893254482 scopus 로고    scopus 로고
    • Statcounter, Top 8 Mobile Operating Systems in the United States from Jan 2012 to Jan 2013, StatCounter Global Stats. Retrieved 02/12/13, from
    • Statcounter. (2013) Top 8 Mobile Operating Systems in the United States from Jan 2012 to Jan 2013, StatCounter Global Stats. Retrieved 02/12/13, from http://gs.statcounter.com/#mobile_os-US-monthly-201201-201301.
    • (2013)
  • 27
    • 84893260240 scopus 로고    scopus 로고
    • PCWorld, August 31, 2011. Retrieved 02/11/13, from
    • Strohmeyer, R. (2011) Why I get apps from amazon, not google, PCWorld, August 31, 2011. Retrieved 02/11/13, from http://www.pcworld.com/article/239270/why_i_get_apps_from_amazon_not_google.html.
    • (2011) Why I Get Apps From Amazon, Not Google
    • Strohmeyer, R.1
  • 29
    • 84857696369 scopus 로고    scopus 로고
    • BYOD: Enabling the chaos
    • doi: 10.1016/s1353-4858(12)70013-2
    • Thomson, G. (2012) BYOD: enabling the chaos, Network Security, 2, 5-8, doi: 10.1016/s1353-4858(12)70013-2.
    • (2012) Network Security , vol.2 , pp. 5-8
    • Thomson, G.1
  • 30
    • 84893284118 scopus 로고    scopus 로고
    • Trend-Micro, Retrieved from
    • Trend-Micro. (2012) Repeating History. Retrieved from http://www.trendmicro.com/cloudcontent/us/pdfs/security-intelligence/reports/rpt-repeating-history.pdf.
    • (2012) Repeating History
  • 31
    • 84885759934 scopus 로고    scopus 로고
    • US-CERT, Retrieved 5/2/2013, from
    • US-CERT. (2011a) Cyber Threats to Mobile Phones. Retrieved 5/2/2013, from http://www.uscert.gov/sites/default/files/publications/cyber_threats-to_mobile_phones.pdf.
    • (2011) Cyber Threats to Mobile Phones
  • 32
    • 84893311516 scopus 로고    scopus 로고
    • US-CERT, Retrieved 5/2/2013, from
    • US-CERT. (2011b) Protecting Portable Devices: Physical Security. Retrieved 5/2/2013, from http://www.us-cert.gov/ncas/tips/ST04-017.
    • (2011) Protecting Portable Devices: Physical Security
  • 33
    • 84893310120 scopus 로고    scopus 로고
    • ZDNet, Retrieved 02/12/13, from
    • ZDNet. (2013) DJailbreaking or Rooting Devices and BYOD Mix? Retrieved 02/12/13, from http://www.zdnet.com/does-jailbreaking-or-rooting-devices-and-byod-mix-7000011069/.
    • (2013) Does Jailbreaking Or Rooting Devices and BYOD Mix?


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.