Abstract

Security concerns comprise a prominent phenomenon in industrial computing. Software counterfeiting, hardware cloning and loss of data are always at the center of IT professionalism’s thinking as it works to counteract those threats in the workspace. Still lacking however, is the awareness on security holes to industrial and personal computing, emanating from human behavior related to the end-users in the IT consumer blocks of the world, specifically the block of developing countries in Africa. In that context, the main purpose of this paper is to espouse the security holes from the end-user dimension as a way of sensitizing for inclusive security thinking among IT experts. The significance of the paper derives from at least two facts. One: while industrial computing is dominantly important, personal computing is also gaining prominence worldwide. As a result, complacency on security issues at this stage is no longer without felt consequences in industrial and mainstream computing. Two: as mobile technology use grows, so does the number of threats facing mobile data and platforms, as well as security vulnerability at personal computing level. This goes beyond the traditional data, software, and hardware concerns in industrial computing. It is noted that the level at which security concerns are stated makes a difference in the contemplation of solution options.

Highlights

  • The concerns of the developers and providers of information technologies (ITs) in the socio-technically advanced block of the world are software counterfeiting, hardware cloning and loss of data in the corporate world [14, 15]

  • Following the American Institute of Chemical Engineers’ (AICE) guidelines, Tan [20] presents that the LAs variable is further broken down into three sub-variables as: Threat (T) Any indication, circumstance, or event with the potential to cause the loss of, or damage to an asset; Vulnerabilities (V) Any weakness that can be exploited by an adversary to gain access to an asset; and Target Attractiveness (Ar) - An estimate of the value

  • This paper suggests that the IT security professionalism should aggressively push towards the intersection of two knowledge spheres: the knowledge of the properties of physical objects, and the knowledge of human behavior

Read more

Summary

Introduction

The concerns of the developers and providers of information technologies (ITs) in the socio-technically advanced block of the world are software counterfeiting, hardware cloning and loss of data in the corporate world [14, 15]. This is due to the personalized features that are built such as information build-up in the device, enhancements, access to internet based subscriptions and resources, and so many other things It means that it is not just a replacement of a stolen device with another, or having a data backup strategy in Tibuhinda Ngonzi: Developing Countries Based End-User Computing Security Issues: Threats, Holes and Solution Prospects place, that can effectively counteract the damage related to any loss of a device. The text definition of ‘end-user’, from the computing point of view, is an individual using an own [personal] computing device for personal or corporate related operations This is evolved from the definition on ‘end-user computing’ as provided by Hill and Alan [6 p. The fifth section is a challenge of ‘design science’ on HW security technological capabilities for end-user computing, followed by concluding remarks in the last section

End-User Computing Security Risk Modeling
The Security Concerns and Developments in Industrial Computing
The Conceptualization of End-User Security Issues in Developing Countries
Scaling on HW Security Technological Capabilities
Findings
Conclusions
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call