Explore chapters and articles related to this topic
IT Security Action Plan
Published in Frank R. Spellman, Fundamentals of Public Utilities Management, 2020
If an organization uses mobile devices to conduct company business, such as accessing company email or sensitive data, pay close attention to mobile security and the potential threats that can expose and compromise a company’s business networks. This section describes the mobile threat environment and the practices that businesses can use to help secure devices such as smartphones, tablets, and Wi-Fi enabled laptops.
It Won’t Happen to Me: Surveying SME Attitudes to Cyber-security
Published in Journal of Computer Information Systems, 2023
Martin Wilson, Sharon McDonald, Dominic Button, Kenneth McGarry
Maintaining regular backups (Mdn 5.0, 4.36), using strong passwords (Mdn 4.0, 4.35) and preventing malware (Mdn 4.0, 4.22) were rated equally highly with no significant difference between them. Mobile security (Mdn 4.0, 3.83) was rated as least beneficial with ratings significantly lower than maintaining back-ups, using strong passwords and malware prevention. Phishing prevention (Mdn 4.0, 4.12) was rated as significantly less beneficial than maintaining backups but was not rated significantly different from any other factor.
Research, implementation, and improvement of MPTCP on mobile smart devices
Published in International Journal of Computers and Applications, 2019
Tongguang Zhang, Shuai Zhao, Bo Cheng, Bingfei Ren, Junliang Chen
Bingfei Ren is a PhD candidate in the State Key Laboratory of Networking and Switching Technology at Beijing University of Posts and Telecommunications (BUPT). He received the BS degree in software engineering in 2014 from BUPT in China. His main research interests include mobile computing, mobile security and wireless network.
Prototyping Usable Privacy and Security Systems: Insights from Experts
Published in International Journal of Human–Computer Interaction, 2022
Florian Mathis, Kami Vaniea, Mohamed Khamis
Our final sample had 12 USEC experts (4 females, 8 males). Our interviewees are from the US, Europe, and Asia, and work in academia (6), industry (2), or in both academia and industry (4). At the time of the interviews, 10 interviewees held a PhD (1 full professor/4 associate professors/1 assistant professor/1 adjunct professor & security research scientist/1 user experience researcher/1 USEC research engineer/1 research fellow). We also included two senior PhD candidates who had published usable privacy and security research in top-tier venues and received best paper awards. Their inclusion widened the covered spectrum as they had more recent hands-on experience in implementing systems and conducting user-centered evaluations. All interviewees worked in the broader field of usable privacy and security including, but not limited to, user authentication, anti-phishing efforts, mobile security and privacy, and web privacy. Our interviewed experts have on average 123.42 publications (max = 386, min = 18, SD = 129.81), 3740.75 citations (max = 14,627, min = 25, SD = 4857.28), and an h-index of 22.5 (max = 56, min = 3, SD = 16.69). All reported numbers (i.e., publications, citations, h-index) involve all kinds of publications, including usable privacy and security works. We report the overall numbers because all publications eventually contribute to a researcher’s h-index, and extracting the number of USEC-specific papers in a precise way is challenging. The final set of publications (N = 27) used to setup context during interviews ranged from 2010 to 2019 (Md = 2018). Out of the 27 publications used in the interviews, 14 papers comprise software-based prototype systems and 9 comprise hardware components. We also used four additional USEC papers from experts we interviewed, three of which are considered to be highly influential in USEC and the fourth one reports on research on an in-the-wild deployed security system. One of these additional publications discussed, for example, the last decade of usable security prototype systems and outlined learned lessons when developing and evaluating USEC prototypes. Table 1 shows an overview of our participants in an anonymized form.