Affiliation:
1. Texas Woman's University, USA
2. Robert Morris University, USA
Abstract
In this chapter, the authors provide a position-based discussion in reference to selective cyberthreats to devices and data breaches (which include malware, phishing, social engineering, data communication interception, malicious insider actions, just to name a few), and further provide information on applicable defenses and their legal implications. Although the authors do not assess the different threats and defenses in order to help prevent future vulnerability towards hacking for consumers, they do provide a conceptual understanding of the growing threats of such attacks and the inability of current legal safeguards to counter such threats. Particularly vulnerable are mobile systems, which are more prone to loss and theft once intercepted.
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Truva Atı Zararlı Yazılımlarına Yaklaşım ve Çözüm Önerileri;Bilgi Yönetimi;2019-06-28
2. Engaging Users with Educational Games;Extended Abstracts of the 2019 CHI Conference on Human Factors in Computing Systems;2019-05-02