Insider Threats+Disruptive Smart Phone Technology = New Challenges to Corporate Security

Ahmed Mubarak Ahmed Al-Haiqi, Kasmiran Jumari, Mahamod Ismail

Research output: Contribution to journalArticle

2 Citations (Scopus)

Abstract

Wireless portable computing technology is proving itself as the ultimate disruptive technology to enterprises and new threats have already been a concern for media and industry. Unlike most available advisories and public guidelines, the focus of this study is on the intersection of two aspects of these new challenges; the indispensable smart phones in the hands of malicious insiders to the corporate. Many new threats could be less than obvious with the combination of these two aspects. Researchers provide a general classification for these threats, present some challenging scenarios and finally discuss the solutions that already had been considered or could be taken into consideration to eliminate or mitigate the new threats.

Original languageEnglish
Pages (from-to)161-166
Number of pages6
JournalResearch Journal of Applied Sciences
Volume8
Issue number3
DOIs
Publication statusPublished - 2013

Fingerprint

intersections
industries
Industry

All Science Journal Classification (ASJC) codes

  • Engineering(all)
  • General

Cite this

@article{04fc6169449b43f1be1b6842af1d71c9,
title = "Insider Threats+Disruptive Smart Phone Technology = New Challenges to Corporate Security",
abstract = "Wireless portable computing technology is proving itself as the ultimate disruptive technology to enterprises and new threats have already been a concern for media and industry. Unlike most available advisories and public guidelines, the focus of this study is on the intersection of two aspects of these new challenges; the indispensable smart phones in the hands of malicious insiders to the corporate. Many new threats could be less than obvious with the combination of these two aspects. Researchers provide a general classification for these threats, present some challenging scenarios and finally discuss the solutions that already had been considered or could be taken into consideration to eliminate or mitigate the new threats.",
author = "{Ahmed Al-Haiqi}, {Ahmed Mubarak} and Kasmiran Jumari and Mahamod Ismail",
year = "2013",
doi = "10.3923/rjasci.2013.161.166",
language = "English",
volume = "8",
pages = "161--166",
journal = "Research Journal of Applied Sciences",
issn = "1815-932X",
publisher = "Medwell Publishing",
number = "3",

}

Insider Threats+Disruptive Smart Phone Technology = New Challenges to Corporate Security. / Ahmed Al-Haiqi, Ahmed Mubarak; Jumari, Kasmiran; Ismail, Mahamod.

In: Research Journal of Applied Sciences, Vol. 8, No. 3, 2013, p. 161-166.

Research output: Contribution to journalArticle

TY - JOUR

T1 - Insider Threats+Disruptive Smart Phone Technology = New Challenges to Corporate Security

AU - Ahmed Al-Haiqi, Ahmed Mubarak

AU - Jumari, Kasmiran

AU - Ismail, Mahamod

PY - 2013

Y1 - 2013

N2 - Wireless portable computing technology is proving itself as the ultimate disruptive technology to enterprises and new threats have already been a concern for media and industry. Unlike most available advisories and public guidelines, the focus of this study is on the intersection of two aspects of these new challenges; the indispensable smart phones in the hands of malicious insiders to the corporate. Many new threats could be less than obvious with the combination of these two aspects. Researchers provide a general classification for these threats, present some challenging scenarios and finally discuss the solutions that already had been considered or could be taken into consideration to eliminate or mitigate the new threats.

AB - Wireless portable computing technology is proving itself as the ultimate disruptive technology to enterprises and new threats have already been a concern for media and industry. Unlike most available advisories and public guidelines, the focus of this study is on the intersection of two aspects of these new challenges; the indispensable smart phones in the hands of malicious insiders to the corporate. Many new threats could be less than obvious with the combination of these two aspects. Researchers provide a general classification for these threats, present some challenging scenarios and finally discuss the solutions that already had been considered or could be taken into consideration to eliminate or mitigate the new threats.

UR - http://www.scopus.com/inward/record.url?scp=84885695062&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=84885695062&partnerID=8YFLogxK

U2 - 10.3923/rjasci.2013.161.166

DO - 10.3923/rjasci.2013.161.166

M3 - Article

AN - SCOPUS:84885695062

VL - 8

SP - 161

EP - 166

JO - Research Journal of Applied Sciences

JF - Research Journal of Applied Sciences

SN - 1815-932X

IS - 3

ER -