Please use this identifier to cite or link to this item: http://dspace2020.uniten.edu.my:8080/handle/123456789/8699
Full metadata record
DC FieldValueLanguage
dc.contributor.authorAl-Haiqi, A.
dc.contributor.authorJumari, K.
dc.contributor.authorIsmail, M.
dc.date.accessioned2018-02-20T03:50:39Z-
dc.date.available2018-02-20T03:50:39Z-
dc.date.issued2013
dc.identifier.urihttp://dspace.uniten.edu.my/jspui/handle/123456789/8699-
dc.description.abstractWireless portable computing technology is proving itself as the ultimate disruptive technology to enterprises and new threats have already been a concern for media and industry. Unlike most available advisories and public guidelines, the focus of this study is on the intersection of two aspects of these new challenges; the indispensable smart phones in the hands of malicious insiders to the corporate. Many new threats could be less than obvious with the combination of these two aspects. Researchers provide a general classification for these threats, present some challenging scenarios and finally discuss the solutions that already had been considered or could be taken into consideration to eliminate or mitigate the new threats. © Medwell Journals, 2013.
dc.titleInsider Threats+Disruptive Smart Phone Technology = New Challenges to Corporate Security
item.fulltextNo Fulltext-
item.grantfulltextnone-
Appears in Collections:COE Scholarly Publication
Show simple item record

Google ScholarTM

Check


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.