The Future of Enterprise Security with Regards to Mobile Technology and Applications

Conference paper
Part of the Communications in Computer and Information Science book series (CCIS, volume 630)

Abstract

The utilisation of work assigned mobile technology by enterprise staff to chat and upload contents to the social media applications for personal use has become a key issue for a significant number of enterprises. This work aims to understand the trends amongst the users of work assigned phones when unknowingly downloading and using applications which could breach the security of the enterprise. In this paper; we assess current trends amongst employees and organisations’ use and trust of hybrid and web based social media applications used on a daily basis to communicate. This information is then evaluated alongside human related cyber security risks presented by such applications to provide instructions and advice on the management of social media application use within organisations in the Healthcare, Education and Energy sectors. The findings may be employed to develop a more robust cyber security strategy which focuses at reducing the user related risks.

Keywords

Social media Security Mobile technology 

References

  1. 1.
    Accenture Comprehensive Approach Managing Social Media Risk ComplianceGoogle Scholar
  2. 2.
    Research shows dangers of user-generated content, ComputerWeekly. http://www.computerweekly.com/news/2240150785/Research-shows-dangers-of-user-generated-content. Accessed 28 July 2016
  3. 3.
    Shullic, R.: Risk Assessment of Social Media. The SANS Institute (2012)Google Scholar
  4. 4.
    Jayaram, D., Manrai, A.K., Manrai, L.A.: Effective use of marketing technology in Eastern Europe: web analytics, social media, customer analytics, digital campaigns and mobile applications. Uso Eficaz Tecnol. Mark. En Eur. Este Analíticas Web Medios Soc. Analítica Clientes Campañas Digit. Apl. Móviles 20(39), 118–132 (2015)Google Scholar
  5. 5.
    U.N. Report Declares Internet Access a Human Right | WIRED. https://www.wired.com/2011/06/internet-a-human-right/. Accessed 28 July 2016
  6. 6.
    Preibusch, S.: Privacy behaviors after snowden. Commun. ACM 58(5), 48 (2015)CrossRefGoogle Scholar
  7. 7.
    Kang, C.: Court Backs Rules Treating Internet as Utility, Not Luxury. The New York Times, 14 June 2016 (2016)Google Scholar
  8. 8.
    No, the Internet Is Not a Utility, Conservative Review. https://www.conservativereview.com/commentary/2016/06/no-the-internet-is-not-a-utility. Accessed 28 July 2016
  9. 9.
    Jenab, K., Moslehpour, S.: Cyber Security Management: A Review. Bus. Manag. Dyn. 5(11), 16–39 (2016)Google Scholar
  10. 10.
    Gardner, L.: “Welcome to the Web World. J. Aust. N. Z. Inst. Insur Fin. 38(3), 1–6 (2015)Google Scholar
  11. 11.
    Charland, A., Leroux, B.: Mobile Application Development: Web vs. Native. Commun. ACM 54(5), 49–53 (2011)CrossRefGoogle Scholar
  12. 12.
    Dikhit, R.S.: Using android for the enterprise. Open Source You 4(5), 49 (2016)Google Scholar
  13. 13.
    HTML5 vs Native Whats a Mobile Developer to Do 648997. eWeek (2012)Google Scholar
  14. 14.
    de M. Barroca Filho, I., Aquino Júnior, G.S.: Development of mobile applications from existing web-based enterprise systems. Int. J. Web Inf. Syst. 11(2), 162 (2015)Google Scholar
  15. 15.
    The enterprise guide to developing secure mobile apps. Comput. Wkly., 1–19, June 2016Google Scholar
  16. 16.
    Brewer, D.: Native apps vs. web apps. N. H. Bus. Rev. 33(22), 30 (2011)Google Scholar
  17. 17.
    Gatlin, A.: Social media privacy settings get few likes from millennials show high level of distrust but survey finds gen yers still need to improve their cybersecurity awareness. Investor’s Business Daily (2015)Google Scholar
  18. 18.
    Cyber security: strategies: comment: social media is revolutionary, but it can damage your business. The Guardian, London, England (2013)Google Scholar

Copyright information

© Springer International Publishing AG 2016

Authors and Affiliations

  1. 1.Department of Digital Innovation and Creative EnterpriseGSM LondonLondonUK
  2. 2.School of Architecture, Computing and EngineeringUniversity of East LondonLondonUK
  3. 3.Department of Electronic and Computer EngineeringBrunel University LondonUxbridgeUK

Personalised recommendations