scholarly journals A Security Monitoring Framework for Mobile Devices

Electronics ◽  
2020 ◽  
Vol 9 (8) ◽  
pp. 1197 ◽  
Author(s):  
António Lima ◽  
Luis Rosa ◽  
Tiago Cruz ◽  
Paulo Simões

Quite often, organizations are confronted with the burden of managing mobile device assets, requiring control over installed applications, security, usage profiles or customization options. From this perspective, the emergence of the Bring Your Own Device (BYOD) trend has aggravated the situation, making it difficult to achieve an adequate balance between corporate regulations, freedom of usage and device heterogeneity. Moreover, device and information protection on mobile ecosystems are quite different from securing other device assets such as laptops or desktops, due to their specific characteristics and limitations—quite often, the resource overhead associated with specific security mechanisms is more important for mobile devices than conventional computing platforms, as the former frequently have comparatively less computing capabilities and more strict power management policies. This paper presents an intrusion and anomaly detection framework specifically designed for managed mobile device ecosystems, that is able to integrate into mobile device and management frameworks for complementing conventional intrusion detection systems. In addition to presenting the reference architecture for the proposed framework, several implementation aspects are also analyzed, based on the lessons learned from developing a proof-of-concept prototype that was used for validation purposes.

2022 ◽  
Vol ahead-of-print (ahead-of-print) ◽  
Author(s):  
Khutsafalo Kadimo ◽  
Athulang Mutshewa ◽  
Masego B. Kebaetse

Purpose Seeking to leverage on benefits of personal mobile device use, medical schools and healthcare facilities are increasingly embracing the use of personal mobile devices for medical education and healthcare delivery through bring-your-own-device (BYOD) policies. However, empirical research findings that could guide the development of BYOD policies are scarce. Available research is dominated by studies that were guided by technocentric approaches, hence seemingly overlooking the complexities of the interactions of actors in mobile device technologies implementation. The purpose of this study was to use the actor–network theory to explore the potential role of a BYOD policy at the University of Botswana’s Faculty of Medicine. Design/methodology/approach Purposive sampling was used to select the participants and interviews, focus group discussions, observations and document analysis were used to collect data. Data were collected from 27 participants and analysed using grounded theory techniques. Emerging themes were continually compared and contrasted with incoming data to create broad themes and sub-themes and to establish relationships or patterns from the data. Findings The results suggest that the potential roles for BYOD policy include promoting appropriate mobile device use, promoting equitable access to mobile devices and content, and integrating mobile devices into medical education, healthcare delivery and other institutional processes. Research limitations/implications BYOD policy could be conceptualized and researched as a “script” that binds actors/actants into a “network” of constituents (with shared interests) such as medical schools and healthcare facilities, mobile devices, internet/WiFi, computers, software, computer systems, medical students, clinical teachers or doctors, nurses, information technology technicians, patients, curriculum, information sources or content, classrooms, computer labs and infections. Practical implications BYOD is a policy that seeks to represent the interests (presents as a solution to their problems) of the key stakeholders such as medical schools, healthcare facilities and mobile device users. BYOD is introduced in medical schools and healthcare facilities to promote equitable access to mobile devices and content, appropriate mobile device use and ensure distribution of liability between the mobile device users and the institution and address the implication of mobile device use in teaching and learning. Originality/value The BYOD policy is a comprehensive solution that transcends other institutional policies and regulations to fully integrate mobile devices in medical education and healthcare delivery.


2017 ◽  
Vol 8 (1) ◽  
pp. 17-29 ◽  
Author(s):  
B-Abee Toperesu ◽  
Jean-Paul Van Belle

Abstract Background: Mobile device adoption is on the rise and people are increasingly using mobile devices as a part of their lives. Studies have shown that people can use mobile devices to perform their work duties from anywhere. Organisations are now exploring ways of enabling and supporting mobility for employees’ mobile devices, including BYOD (Bring-Your-Own-Device) policies. Objective: The objective of this study is to identify the main capabilities required for enterprise mobility. Methods/Approach: This qualitative research study presents empirical results based on interviews with selected senior IS managers of large organizations. Results: The main findings of this study suggest that information security and mobile device management are among the main capabilities required for enterprise mobility. Conclusions: Enterprise mobility is an emerging field which has received very little research attention. More research in the field will help organisations make informed decisions on how to increase productivity, sales and efficiency while achieving employee satisfaction through enterprise mobility.


2021 ◽  
Vol 35 (1) ◽  
pp. 37-41
Author(s):  
Klara U. Kunakova ◽  

The trend of using your own mobile device in the workplace or within the walls of an educational institution has been called BYOD (bring-your own device). The concept of BYOD does not require much expense for the student, other than choosing the right Internet traffic and keeping your device running. The use of mobile devices in the classroom is a modern trend, as their technical capabilities are very large. The article describes some techniques and types of work on the use of mobile devices to intensify classes and increase the motivation of students to obtain knowledge.


Author(s):  
Keri K. Stephens

Mobile devices have diffused into work by transitioning from being organizational assets to personal communication tools. This chapter examines the perceptions and practices of diverse types of workers, located around the globe, and reveals the often-hidden complexities surrounding mobile use at work. People can use their mobiles to be productive and connected on the job, but they also face challenges. The shift in control over communication means that organizations have reacted by creating bring-your-own-device-to-work policies, banning their employees from using personal mobiles, and practically forcing workers to provide their own devices and be accessible 24/7. Along the way, workers have had to negotiate with co-workers, managers, clients, friends, strangers, and family concerning how and when they use their mobiles. As they try to build bridges between work and personal life, struggles with self-management and temporal mismatches in the form of reachability can emerge.


Electronics ◽  
2020 ◽  
Vol 9 (12) ◽  
pp. 2208
Author(s):  
Jesús D. Trigo ◽  
Óscar J. Rubio ◽  
Miguel Martínez-Espronceda ◽  
Álvaro Alesanco ◽  
José García ◽  
...  

Mobile devices and social media have been used to create empowering healthcare services. However, privacy and security concerns remain. Furthermore, the integration of interoperability biomedical standards is a strategic feature. Thus, the objective of this paper is to build enhanced healthcare services by merging all these components. Methodologically, the current mobile health telemonitoring architectures and their limitations are described, leading to the identification of new potentialities for a novel architecture. As a result, a standardized, secure/private, social-media-based mobile health architecture has been proposed and discussed. Additionally, a technical proof-of-concept (two Android applications) has been developed by selecting a social media (Twitter), a security envelope (open Pretty Good Privacy (openPGP)), a standard (Health Level 7 (HL7)) and an information-embedding algorithm (modifying the transparency channel, with two versions). The tests performed included a small-scale and a boundary scenario. For the former, two sizes of images were tested; for the latter, the two versions of the embedding algorithm were tested. The results show that the system is fast enough (less than 1 s) for most mHealth telemonitoring services. The architecture provides users with friendly (images shared via social media), straightforward (fast and inexpensive), secure/private and interoperable mHealth services.


10.5772/5694 ◽  
2007 ◽  
Vol 4 (2) ◽  
pp. 24 ◽  
Author(s):  
E. Colon ◽  
G. De Cubber ◽  
H. Ping ◽  
J-C Habumuremyi ◽  
H. Sahli ◽  
...  

This paper summarises the main results of 10 years of research and development in Humanitarian Demining. The Hudem project focuses on mine detection systems and aims at provided different solutions to support the mine detection operations. Robots using different kind of locomotion systems have been designed and tested on dummy minefields. In order to control these robots, software interfaces, control algorithms, visual positioning and terrain following systems have also been developed. Typical data acquisition results obtained during trial campaigns with robots and data acquisition systems are reported. Lessons learned during the project and future work conclude this paper.


Author(s):  
Masoomeh Shabazi ◽  
Mostafa Amini Rarani ◽  
Sharam Tahmasebian ◽  
Maryam Jahanbakhsh

In recent years, the number of people who use mobile devices for business and organizational purposes has increased. This phenomenon is now known as “bring your own device” (BYOD), and it is rapidly entering the health industry, which makes clear the necessity of studying its various dimensions for its implementation and application. Recently, the use of mobile devices is increasing due to the social tendencies of people. Rapid changes in modern gadgets and smartphones have also encouraged organizations to use their mobile devices in the workplace for business purposes, creating related opportunities and challenges. These cases have made the expansion of BYOD inevitable so that the only way to control BYOD’s threats is to accept its process and finally formulate related strategies and policies before using it.


2016 ◽  
Vol 11 (6) ◽  
pp. 32 ◽  
Author(s):  
Shwu-Ing Wu ◽  
Rou Jyun Chen

<p class="ArticleTitle">In recent years, the increasingly innovative and diverse mobile devices have significantly promoted the mobile device-based shopping. What factors influence this kind of shopping? Will consumers purchase things with mobile devices? These are two topics that need to be explored. Through the literature analysis and the empirical research, this study aims to analyze the quality of information, system, service and mobile devices on the mobile device-based shopping platform. Moreover, it studies the attitude of consumers towards mobile device-based shopping, their willingness to adopt the shopping method and the behavioral relationship model in the actual mobile device-based shopping as well as compares the groups of different frequencies of the Internet use in terms of the relationship model.</p>  With the convenient sampling, this study made an investigation among some of those who had experienced shopping on such mobile devices as tablets or smart phones. The 765 retrieved valid copies of questionnaire were divided into three groups—“often”, “average” and “seldom” according to the frequency consumers undertook mobile device-based shopping and were then compared. The results showed that there were significant differences among the three groups in four relationship paths, including: 1) the information quality of the mobile device-based shopping platform has more significant positive influence on consumers’ attitude path of mobile device-based shopping in the “average” group than in the other two; 2) the service quality of the mobile device-based shopping platform has more significant positive influence on consumers’ attitude path of mobile device-based shopping in the “seldom” group than in the other two; 3) the preference for mobile device-based shopping has much significant positive influence on the behavior path of mobile device-based shopping in the “often” group. According to the research results, different groups have different behavior models. These results can serve as reference information in the decision-making of those who establish mobile device-based shopping platforms and manufacture mobile devices.


2010 ◽  
Vol 7 (4) ◽  
pp. 813-822 ◽  
Author(s):  
Daniel Fuentes ◽  
Juan Álvarez ◽  
Juan Ortega ◽  
Luis Gonzalez-Abril ◽  
Francisco Velasco

This paper focuses on the behavior of Trojan horses in mobile devices. This malicious software tries to steal information from a mobile device while the user is unaware. We describe the communication links through a Trojan horse installed into a mobile device. To demonstrate the effects of a Trojan horse infection we present a practical example on a PDA. Via SMS, the malicious user can access a user?s contacts information through the previous installation of the Trojan horse. The results show that this process means a loss of information and a quantified cost to the attacked user too. This paper proposes different solutions to avoid this malware and its effects.


2010 ◽  
Vol 14 (1) ◽  
pp. 115-124 ◽  
Author(s):  
Weijan Shen ◽  
Fock-Lai Tan

This paper presents the experimental study of using phase change material in the cooling of the mobile devices. It investigates the thermal performance of transient charging and discharging of mobile devices in three different situations; making phone calls frequently, making long duration calls, and making occasional calls. The results show that mobile devices are heated up fastest during the long duration usage. Experiments are also conducted to determine the effect of fins and effect of orientation of the mobile device on its thermal performance.


Sign in / Sign up

Export Citation Format

Share Document