NABET, NABET 2015 Faculty Conference

Font Size: 
Mobile Business: Best Security Practices
Kustim Wibowo, Azad Ali

Last modified: 2015-10-22

Abstract


There are more and more activities one can perform using mobile technology from personal such as communicating with friends and family via either telephone, text messaging, or engaging with others through social media platforms such as Facebook and Twitter, to managing business activities such as checking bank and credit card statements or involve in financial portfolio trading.  All of those activities include endless amounts of data, from valuable personal data to very important business data.  Those data available to us almost instantly at our fingertips into our mobile devices through mobile networks and the Internet. Since those channels can be accessed publicly, we cannot assume that the data transmissions through those channels are safe.

This research will find out various mobile malware programs and what these programs are capable of doing to a user’s mobile device.  It will also discuss what we, as mobile device users, can do to protect ourselves and limit mobile device risks.  It will explore any programs that are available to detect and eliminate mobile malware, along with the best practices to use to avoid potential harm cause by mobile malware.  This research will also search what businesses need to take into consideration in regards to mobile device usage, and how these businesses can limit their risks and protect themselves from the harmful effects of mobile malware.


Keywords


E-Mobile, Infromation Security