Author:
Shih Dong‐Her,Lin Binshan,Chiang Hsiu‐Sen,Shih Ming‐Hung
Abstract
PurposeThe paper's aim is to provide information about mobile viruses for end‐users or organizations and recommend useful tips of how individuals can protect their mobile phones from the intrusion of mobile phone viruses.Design/methodology/approachThis paper surveys chronicle, securities, risks and countermeasure of mobile phone viruses.FindingsThis paper investigates infection routes, threats, damage, and spreading ways of mobile phone viruses and provides available countermeasures. It also provides useful tips about mobile viruses, indicating what to do and how to do it.Research limitations/implicationsThis research may not be exhaustive about mobile viruses.Practical implicationsA very useful source of information and impartial advice for end‐users or organizations who are planning to protect their mobile phones and their own privacy.Originality/valueThis paper is the first to survey the risk of mobile phones and it discusses how organizations or individuals can protect mobile phones from the intrusion of viruses and how to develop their own mobile virus security plan.
Subject
Industrial and Manufacturing Engineering,Strategy and Management,Computer Science Applications,Industrial relations,Management Information Systems
Reference21 articles.
1. Choi, Y.B., Bache, T.C. and Hill, L.L. (2007), “The pricing of wireless phone services in the USA: issues and development trends”, International Journal of Mobile Communications, Vol. 5 No. 2, pp. 169‐85.
2. Dagon, D., Martin, T. and Starner, T. (2004), “Mobile phones as computing devices: the viruses are coming”, IEEE Pervasive Computing, Vol. 3 No. 4, pp. 11‐15.
3. F‐secure (2006), “Mobile security challenges in 2007”, White Paper, available at: www.f‐secure.de/export/sites/fs_de_site/cebit/presse/Mobile_summary_2006_FINAL.pdf.
4. Howell, M., Love, S. and Turner, M. (2008), “User characteristics and performance with automated mobile phone systems”, International Journal of Mobile Communications, Vol. 6 No. 1, pp. 1‐15.
5. Hypponen, M. (2006), “Malware goes mobile”, Scientific American, November, pp. 70‐7.
Cited by
41 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献