Please use this identifier to cite or link to this item:
http://dspace2020.uniten.edu.my:8080/handle/123456789/8699
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Al-Haiqi, A. | |
dc.contributor.author | Jumari, K. | |
dc.contributor.author | Ismail, M. | |
dc.date.accessioned | 2018-02-20T03:50:39Z | - |
dc.date.available | 2018-02-20T03:50:39Z | - |
dc.date.issued | 2013 | |
dc.identifier.uri | http://dspace.uniten.edu.my/jspui/handle/123456789/8699 | - |
dc.description.abstract | Wireless portable computing technology is proving itself as the ultimate disruptive technology to enterprises and new threats have already been a concern for media and industry. Unlike most available advisories and public guidelines, the focus of this study is on the intersection of two aspects of these new challenges; the indispensable smart phones in the hands of malicious insiders to the corporate. Many new threats could be less than obvious with the combination of these two aspects. Researchers provide a general classification for these threats, present some challenging scenarios and finally discuss the solutions that already had been considered or could be taken into consideration to eliminate or mitigate the new threats. © Medwell Journals, 2013. | |
dc.title | Insider Threats+Disruptive Smart Phone Technology = New Challenges to Corporate Security | |
item.fulltext | No Fulltext | - |
item.grantfulltext | none | - |
Appears in Collections: | COE Scholarly Publication |
Google ScholarTM
Check
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.