Abstract
The utilisation of work assigned mobile technology by enterprise staff to chat and upload contents to the social media applications for personal use has become a key issue for a significant number of enterprises. This work aims to understand the trends amongst the users of work assigned phones when unknowingly downloading and using applications which could breach the security of the enterprise. In this paper; we assess current trends amongst employees and organisations’ use and trust of hybrid and web based social media applications used on a daily basis to communicate. This information is then evaluated alongside human related cyber security risks presented by such applications to provide instructions and advice on the management of social media application use within organisations in the Healthcare, Education and Energy sectors. The findings may be employed to develop a more robust cyber security strategy which focuses at reducing the user related risks.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Accenture Comprehensive Approach Managing Social Media Risk Compliance
Research shows dangers of user-generated content, ComputerWeekly. http://www.computerweekly.com/news/2240150785/Research-shows-dangers-of-user-generated-content. Accessed 28 July 2016
Shullic, R.: Risk Assessment of Social Media. The SANS Institute (2012)
Jayaram, D., Manrai, A.K., Manrai, L.A.: Effective use of marketing technology in Eastern Europe: web analytics, social media, customer analytics, digital campaigns and mobile applications. Uso Eficaz Tecnol. Mark. En Eur. Este Analíticas Web Medios Soc. Analítica Clientes Campañas Digit. Apl. Móviles 20(39), 118–132 (2015)
U.N. Report Declares Internet Access a Human Right | WIRED. https://www.wired.com/2011/06/internet-a-human-right/. Accessed 28 July 2016
Preibusch, S.: Privacy behaviors after snowden. Commun. ACM 58(5), 48 (2015)
Kang, C.: Court Backs Rules Treating Internet as Utility, Not Luxury. The New York Times, 14 June 2016 (2016)
No, the Internet Is Not a Utility, Conservative Review. https://www.conservativereview.com/commentary/2016/06/no-the-internet-is-not-a-utility. Accessed 28 July 2016
Jenab, K., Moslehpour, S.: Cyber Security Management: A Review. Bus. Manag. Dyn. 5(11), 16–39 (2016)
Gardner, L.: “Welcome to the Web World. J. Aust. N. Z. Inst. Insur Fin. 38(3), 1–6 (2015)
Charland, A., Leroux, B.: Mobile Application Development: Web vs. Native. Commun. ACM 54(5), 49–53 (2011)
Dikhit, R.S.: Using android for the enterprise. Open Source You 4(5), 49 (2016)
HTML5 vs Native Whats a Mobile Developer to Do 648997. eWeek (2012)
de M. Barroca Filho, I., Aquino Júnior, G.S.: Development of mobile applications from existing web-based enterprise systems. Int. J. Web Inf. Syst. 11(2), 162 (2015)
The enterprise guide to developing secure mobile apps. Comput. Wkly., 1–19, June 2016
Brewer, D.: Native apps vs. web apps. N. H. Bus. Rev. 33(22), 30 (2011)
Gatlin, A.: Social media privacy settings get few likes from millennials show high level of distrust but survey finds gen yers still need to improve their cybersecurity awareness. Investor’s Business Daily (2015)
Cyber security: strategies: comment: social media is revolutionary, but it can damage your business. The Guardian, London, England (2013)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2016 Springer International Publishing AG
About this paper
Cite this paper
Tagoe, F.T., Sharif, M.S. (2016). The Future of Enterprise Security with Regards to Mobile Technology and Applications. In: Jahankhani, H., et al. Global Security, Safety and Sustainability - The Security Challenges of the Connected World. ICGS3 2017. Communications in Computer and Information Science, vol 630. Springer, Cham. https://doi.org/10.1007/978-3-319-51064-4_25
Download citation
DOI: https://doi.org/10.1007/978-3-319-51064-4_25
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-51063-7
Online ISBN: 978-3-319-51064-4
eBook Packages: Computer ScienceComputer Science (R0)