Downloads provided by UsageCounts
Abstract— Mobile devices are a big part of our daily life, and an integrated part of the daily business processes, due to the advantages that these devices offer. Businesses use these devices to gain a competitive advantage in the market. But this request for the mobile device to be added to the assets of the organization, comes with a price, and that is security. The mobile device user and the organization need to understand that this approach toward the access through mobile devices of the organization’s data and sources it is a big security matter. As the data that the mobile user will access in the remote device or his own mobile device is at risk. With risk, we understand the risk that comes with the network, applications, data loss, out-of-date devices/apps etc. Keywords: Mobile device; malware; cyber security; data loss; applications; BYOD; smartphones; data loss.
Network Security, Information Security, Computer Science, Mobile Device, Malware
Network Security, Information Security, Computer Science, Mobile Device, Malware
| selected citations These citations are derived from selected sources. This is an alternative to the "Influence" indicator, which also reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically). | 0 | |
| popularity This indicator reflects the "current" impact/attention (the "hype") of an article in the research community at large, based on the underlying citation network. | Average | |
| influence This indicator reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically). | Average | |
| impulse This indicator reflects the initial momentum of an article directly after its publication, based on the underlying citation network. | Average |
| views | 2 | |
| downloads | 3 |

Views provided by UsageCounts
Downloads provided by UsageCounts