Skip to main content

The Future of Enterprise Security with Regards to Mobile Technology and Applications

  • Conference paper
  • First Online:
  • 1709 Accesses

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 630))

Abstract

The utilisation of work assigned mobile technology by enterprise staff to chat and upload contents to the social media applications for personal use has become a key issue for a significant number of enterprises. This work aims to understand the trends amongst the users of work assigned phones when unknowingly downloading and using applications which could breach the security of the enterprise. In this paper; we assess current trends amongst employees and organisations’ use and trust of hybrid and web based social media applications used on a daily basis to communicate. This information is then evaluated alongside human related cyber security risks presented by such applications to provide instructions and advice on the management of social media application use within organisations in the Healthcare, Education and Energy sectors. The findings may be employed to develop a more robust cyber security strategy which focuses at reducing the user related risks.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Accenture Comprehensive Approach Managing Social Media Risk Compliance

    Google Scholar 

  2. Research shows dangers of user-generated content, ComputerWeekly. http://www.computerweekly.com/news/2240150785/Research-shows-dangers-of-user-generated-content. Accessed 28 July 2016

  3. Shullic, R.: Risk Assessment of Social Media. The SANS Institute (2012)

    Google Scholar 

  4. Jayaram, D., Manrai, A.K., Manrai, L.A.: Effective use of marketing technology in Eastern Europe: web analytics, social media, customer analytics, digital campaigns and mobile applications. Uso Eficaz Tecnol. Mark. En Eur. Este Analíticas Web Medios Soc. Analítica Clientes Campañas Digit. Apl. Móviles 20(39), 118–132 (2015)

    Google Scholar 

  5. U.N. Report Declares Internet Access a Human Right | WIRED. https://www.wired.com/2011/06/internet-a-human-right/. Accessed 28 July 2016

  6. Preibusch, S.: Privacy behaviors after snowden. Commun. ACM 58(5), 48 (2015)

    Article  Google Scholar 

  7. Kang, C.: Court Backs Rules Treating Internet as Utility, Not Luxury. The New York Times, 14 June 2016 (2016)

    Google Scholar 

  8. No, the Internet Is Not a Utility, Conservative Review. https://www.conservativereview.com/commentary/2016/06/no-the-internet-is-not-a-utility. Accessed 28 July 2016

  9. Jenab, K., Moslehpour, S.: Cyber Security Management: A Review. Bus. Manag. Dyn. 5(11), 16–39 (2016)

    Google Scholar 

  10. Gardner, L.: “Welcome to the Web World. J. Aust. N. Z. Inst. Insur Fin. 38(3), 1–6 (2015)

    Google Scholar 

  11. Charland, A., Leroux, B.: Mobile Application Development: Web vs. Native. Commun. ACM 54(5), 49–53 (2011)

    Article  Google Scholar 

  12. Dikhit, R.S.: Using android for the enterprise. Open Source You 4(5), 49 (2016)

    Google Scholar 

  13. HTML5 vs Native Whats a Mobile Developer to Do 648997. eWeek (2012)

    Google Scholar 

  14. de M. Barroca Filho, I., Aquino Júnior, G.S.: Development of mobile applications from existing web-based enterprise systems. Int. J. Web Inf. Syst. 11(2), 162 (2015)

    Google Scholar 

  15. The enterprise guide to developing secure mobile apps. Comput. Wkly., 1–19, June 2016

    Google Scholar 

  16. Brewer, D.: Native apps vs. web apps. N. H. Bus. Rev. 33(22), 30 (2011)

    Google Scholar 

  17. Gatlin, A.: Social media privacy settings get few likes from millennials show high level of distrust but survey finds gen yers still need to improve their cybersecurity awareness. Investor’s Business Daily (2015)

    Google Scholar 

  18. Cyber security: strategies: comment: social media is revolutionary, but it can damage your business. The Guardian, London, England (2013)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to F. T. Tagoe .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer International Publishing AG

About this paper

Cite this paper

Tagoe, F.T., Sharif, M.S. (2016). The Future of Enterprise Security with Regards to Mobile Technology and Applications. In: Jahankhani, H., et al. Global Security, Safety and Sustainability - The Security Challenges of the Connected World. ICGS3 2017. Communications in Computer and Information Science, vol 630. Springer, Cham. https://doi.org/10.1007/978-3-319-51064-4_25

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-51064-4_25

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-51063-7

  • Online ISBN: 978-3-319-51064-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics