Potential security breaches and threats in a wireless computing environment
Document Type
Journal Article
Faculty
Faculty of Computing, Health and Science
School
School of Computer and Information Science
RAS ID
798
Abstract
Recent technological innovations in computing such as wireless computing have opened up new dimensions of threats to data security. These new technologies reveal users’ location and hence make the availability of information vulnerable. Further, by identifying individuals using wireless computing technologies, it is possible to access corporate data, leading to security breaches. This paper discusses the potential for security breaches in wireless computing with respect to location identification technologies.
Comments
Chirathamjaree, C., & Gururajan, R. (2001). Potential Security Breaches and Threats in a Wireless Computing Environment. Journal of Information Warfare, 1(2), 68-75.