Abstract

The purpose of this document is to provide an overview on the growth on mobile phone and PDA devices and use in business-oriented modern day life style. The explosion of smartphones in enterprise and personal computing heighten the concerns of security and privacy of users. Now a day’s use of mobile is in every walk of life like shopping, trading, paying bill and even using internet banking. But with these facilities some draw backs are also there. Recent studies have shown that applications can host new types of malware. This discussion explores smartphone security through several research works and how user himself can avoid from data hacking and other insecurities.

Highlights

  • The main intention of this manuscript is to give an impression on the growth of mobile phone and Personal Digital Assistants (PDAs) devices, which are indispensable for our business-oriented modern day lifestyle

  • Rapid technological progress is the answer to these issues, and it is envisaged that M-commerce will be much more widely accepted in the future. [17]. Another important issue that needs the attention of mobile network operators is to decide and What the importance of emerging world of M-Commerce if it is restricted for businessto-business or business-to-consumer and/or consumer-toconsumer transactions or will expand their services to act as a reservoir for offering credit for airtime, or for goods and can provide loans or billing services to intermediary companies

  • It has been resolved that the mobile handheld devices are productivity enhancing tools and bring many benefits for the enterprise but at the same time they are devoid of many risks for organization’s security as a considerable amount of confidential corporate and personal data can amass on a wireless handheld device having enough potential to seek the interest of an attacker

Read more

Summary

INTRODUCTION

The main intention of this manuscript is to give an impression on the growth of mobile phone and PDA devices, which are indispensable for our business-oriented modern day lifestyle. This document put emphasis on those technology risks that are associated with using these devices as well as available safeguards to diminish any problems This information will help organizations to improve their levels of security and to decrease such occurrences concerning the use of these handheld wireless devices. [9] Internet connectivity has helped accelerate the tendency of mobile phones from ‘voice-centric to data-centric’ networking systems. These two worlds are gradually converging to support each other. [21] From 2010 on a majority of the cellular networks started undertaking switch-over from the existing third generation communications systems (3G) to the fourth generation systems (4G) This (4G) system mostly incorporates broadband IPbased heterogeneous multimedia services that let users use diverse networks on an anytime and anywhere basis. This (4G) system mostly incorporates broadband IPbased heterogeneous multimedia services that let users use diverse networks on an anytime and anywhere basis. [22] The 4G system is a modified version of third generation mobiles and certainly is a ‘must have’ gadget for the organization. [18]

THE COMMONLY USED MOBILE FEATURES
An overview of device transformation
Some common trends in mobile devices
An insight into futuristic devices what technologies may prevail
Some examples of user-related success stories
E-BUSINESS TRENDS THROUGH MOBILE DEVICES
Mobile banking services
Other financial services ranging from macro to micro payments
Security mobile phones in the usage in business
Unauthorized access to e-mail content by vicious hackers
The factors that drive mobile hacking
Unwanted spam and instance of malware
IS INCREASED USE OF MOBILE PHONES IN WORKPLACES RAISING PRODUCTIVITY ISSUES?
Theft or loss of mobiles may endanger a company’s confidentiality policies
Threats posed by malware may hamper employee productivity
Fraud and lost productivity are likely hacking targets
SAFEGUARDS AND PREVENTIONS
User-oriented measures for maintaining security
User authentication and physical control on the mobile device
Minimized functionality of devices and decrease data exposure
Findings
CONCLUSIONS
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call