Potential security breaches and threats in a wireless computing environment

Document Type

Journal Article

Faculty

Faculty of Computing, Health and Science

School

School of Computer and Information Science

RAS ID

798

Comments

Chirathamjaree, C., & Gururajan, R. (2001). Potential Security Breaches and Threats in a Wireless Computing Environment. Journal of Information Warfare, 1(2), 68-75.

Abstract

Recent technological innovations in computing such as wireless computing have opened up new dimensions of threats to data security. These new technologies reveal users’ location and hence make the availability of information vulnerable. Further, by identifying individuals using wireless computing technologies, it is possible to access corporate data, leading to security breaches. This paper discusses the potential for security breaches in wireless computing with respect to location identification technologies.

This document is currently not available here.

Share

 
COinS