Get 20M+ Full-Text Papers For Less Than $1.50/day. Start a 14-Day Trial for You or Your Team.

Learn More →

An exploration of wireless computing risks Development of a risk taxonomy

An exploration of wireless computing risks Development of a risk taxonomy Wireless computing, as a way of providing mobile services, has been growing steadily during the past few years. While wireless communications offer organizations and users many benefits such as portability, flexibility, increased productivity, and lower installation costs; on the other hand, risks inherent and exacerbated by wireless connectivity are widely reported, wherein networks are open to intruders who may cause unwanted consequences to an organization's information resources. Hence, understanding these risks will help protect against unforeseen threats, delays and costs. This paper aims at the development of a taxonomy for wireless computing risks. Six levels are identified including risks associated with the users, mobile devices, wireless networks, wireless applications, the Internet and the corporate gateway. The findings show that there is a need for systematic studies on wireless risk assessment and management. The implications of these findings for both researchers and practitioners are discussed. http://www.deepdyve.com/assets/images/DeepDyve-Logo-lg.png Information Management & Computer Security Emerald Publishing

An exploration of wireless computing risks Development of a risk taxonomy

Loading next page...
 
/lp/emerald-publishing/an-exploration-of-wireless-computing-risks-development-of-a-risk-yAF9JmI8VC
Publisher
Emerald Publishing
Copyright
Copyright © 2004 Emerald Group Publishing Limited. All rights reserved.
ISSN
0968-5227
DOI
10.1108/09685220410542606
Publisher site
See Article on Publisher Site

Abstract

Wireless computing, as a way of providing mobile services, has been growing steadily during the past few years. While wireless communications offer organizations and users many benefits such as portability, flexibility, increased productivity, and lower installation costs; on the other hand, risks inherent and exacerbated by wireless connectivity are widely reported, wherein networks are open to intruders who may cause unwanted consequences to an organization's information resources. Hence, understanding these risks will help protect against unforeseen threats, delays and costs. This paper aims at the development of a taxonomy for wireless computing risks. Six levels are identified including risks associated with the users, mobile devices, wireless networks, wireless applications, the Internet and the corporate gateway. The findings show that there is a need for systematic studies on wireless risk assessment and management. The implications of these findings for both researchers and practitioners are discussed.

Journal

Information Management & Computer SecurityEmerald Publishing

Published: Jul 1, 2004

Keywords: Data security; Risk management; Mobile communication systems

References