Abstract:
This journal of information systems technology article discusses in depth the uses of smartphone (social networking, e-commerce, etc.) and the security challenges that may arise due to such uses. The article discusses size as a constraint to mitigating cyber attacks and the different operating systems and the vulnerabilities they have to certain attacks. It discusses security software that is available on the market as well as the infrastructure in place to prevent attacks.
Author:
Jorja Wright, Maurice Dawson, Marwan Omar
Institution:
Florida Institute of Technology, Alabama A&M University, Colorado Technical University