Ensuring Information Integrity in a Mobile-Connected World
Keywords:
MDM, mobile security, cloud, data protection, mobile info assurance, encryption, multiple factor authentication, mobile device management, DR, data mirroring, VPN, types of mobile threats, compliancy, data access, security measures.Dimension Badge Record
Abstract
The sunlight adoption of portable devices in individual and business activity has made a higher urgency of appropriate mobile information assurance policies. This article explores key approaches to securing mobile devices and sensitive information, focusing on three major components: Mobile Device Management (MDM), mobile security best practices, mobile cloud computing. MDM solutions are ways through which organizations can gain control in mobile devices with secure policies, distant management, and compliance checks. In addition, best practices for the physical security of mobiles, which include the use of non-disclosed passwords, the enabling of the encrypt or and the use of virtual private networks or other such security tools go further in safeguarding mobile environments against elements like malware and intrusion. Besides, cloud computing supports portable information assurance by providing backup, recovery, and security measures like encryption, and ID confirmation. Solutions based on cloud technology allow to implement effective data sharing and processing, as well as to control data security and compliance with the requirements of existing legislation. Altogether, these measures constitute an integrated security strategy of mobile, it provides protection to sensitive data, makes them accessible, and help in managing or eradicating threats in the connected environment.
Abstract viewed = 32 times
References
Dery, K., & MacCormick, J. (2012). Managing mobile technology: the shift from mobility to connectivity. MIS Quarterly Executive, 11(4).
Chan, C. Y. (2011, April). Connected vehicles in a connected world. In Proceedings of 2011 International Symposium on VLSI Technology, Systems and Applications (pp. 1-4). IEEE.
M. Application, S. Threats, “Mobile Application Security Threats and Vulnerabilities 2019: Mobile Device Security - Attacks Research,” pp. 1–19, 2019, Accessed: Apr. 19, 2021. [Online]. Available: https://www.ptsecurity.com/ww-en/analytics/mobileapplication-security-threats-and-vulnerabilities-2019
Can 5G make you more vulnerable to cyberattacks? - Help Net Security.” 16 March 2020. [Online]. Available: https://www.helpnetsecurity.com/2020/03/16/5gsecurity-vulnerabilities/ . [Accessed Apr. 19, 2021].
Singla, S. R. Hussain, O. Chowdhury, E. Bertino, N. Li, “Protecting the 4G and 5G Cellular Paging Protocols against Security and Privacy Attacks,” Proc. Priv. Enhancing Technol., vol. 2020, no. 1, pp. 126– 142, Jan. 2020, doi: 10.2478/popets-2020-0008.
Z. Whittaker, New Flaws in 4G, 5G Allow Attackers to Intercept Calls and Track Phone Locations, Tech Crunch, 24 February 2019. [Online]. Available: https://techcrunch.com/2019/02/24/new-4g5gsecurity-flaws/ . [Accessed 19 April 2021].
L. Whitney, How 4G and 5G Networks are Vulnerable to Denial of Service Attacks, Tech Republic, 26 March 2020. [Online]. Available: https://www.techrepublic.com/article/how-4g-and-5gnetworks-are-vulnerable-to-denial-of-service-attacks/ . [Accessed 2 April 2020].
3GPP TS 22.261 ETSI, “5G; Service requirements for next generation new services and markets (Release 15),” vol. TS 22.261, pp. 0–52, 2018, Accessed: Apr. 19, 2021. [Online]. Available: https://portal.etsi.org/TB/ETSIDeliverableStatus.aspx.
C. Annual, I. Report, “Cisco Annual Internet Report,” p. 2023, 2018, Accessed: Apr. 19, 2021. [Online]. Available: https://www.cisco.com/c/en/us/solutions/collateral/executive-perspectives/annual-internet-report/whitepaper-c11-741490.html.
Md Minhaz Chowdhury, Kendall Nygard, "Machine Learning within a Con Resistant Trust Model", The 33rd International Conference on Computers and Their Applications (CATA 2018), March 19-21, 2018, Flamingo Hotel, Las Vegas, Nevada, USA.
Sowjanya Param, Md Minhaz Chowdhury, Damian Lampl, Pranav Dass, Kendall E. Nygard, “Energy Demand Prediction Using Neural Networks”, The 28th International Conference on Computer Applications in Industry and Engineering, October 2015, San Diego, California, USA.
Damian Lampl, Md Minhaz Chowdhury, Pranav Dass, Kendall E. Nygard, Vahid Khiabani, “Optimization Modeling in a Smart Grid”, The 15th International Conference on Wireless Networks, 2015, Athens, Greece.
Kendall E. Nygard, Md. Minhaz Chowdhury, Pratap Kotala, “Trust and Purpose in Computing”, The 32nd International Conference on Computers and Their Applications, March 2017, Honolulu, Hawaii, USA.
Posey, C., Bennett, R.J. and Roberts, T.L. (2011), “Understanding the mindset of the abusive insider: an examination of insiders’ causal reasoning following internal security changes”, Computers and Security, Vol. 30 No. 6e7, p. 486e97.
Purtschert, R. (2001), marketing fu¨r Verba¨nde und weitere Nonprofit-Organisationen, Haupt, Bern. Ramireddy, S., Chakraborthy, S., Raghu, R. and Raghav Rao, H. (2010), “Privacy and security practices in the arena of cloud computing – a research in progress”, AMCIS 2010 Proceedings, Paper 574.
Reppy, J. (2012), International School on Disarmament and Research on Conflicts, available at: www.isodarco.it/courses/andalo12/paper/ISO12_ReppyCyber.pdf Roth, G. (2004), “Lessons from the desert: integrating managerial expertise and learning for organizational transformation”, The Learning Organization, Vol. 11 No. 3, pp. 194-208.
Sasse, M.A., Brostoff, S. and Weirich, D. (2001), “Transforming the ‘weakest link’ e a human/computer interaction approach to usable and effective security”, BT Technology Journal, Vol. 19 No. 3, p. 122e31.
Scarfo, A. (2012), “New Security Perspectives around BYODApplications (BWCCA)”, 2012 Seventh International Conference on Broadband, Wireless Computing, Communication and Applications (BWCCA), 12-14 November, pp. 446-451.
Schlienger, T. and Teufel, S. (2003), “Information security culture – from analysis to change”, Proceedings of ISSA 2003, Johannesburg, South Africa, 9-11 July 2003.
Schwarzwalder, R. (1999), “Intranet security”, Database and Network Journal, Vol. 22 No. 2, pp. 58-62.
Serewicz, L.W. (2010), “Do we need bigger buckets of better search engines? The challenge of unlimited storage and semantic web search for records management”, Records Management Journal, Vol. 20 No. 2, pp. 172-181.
Spears, J.L. (2005), “A holistic risk analysis method for identifying information security risks”, Security Management, Integrity, and Internal Control in Information Systems, Springer, New York, NY, pp. 185-202
Stuart, K. and Bromage, D. (2010), “Current state of play: records management and the cloud”, Records Management Journal, Vol. 20 No. 2, pp. 217-225.
Sweeney, S. and Crestani, F. (2006), “Effective search results summary size and device screen size: Is there a relationship?”, Information Processing and Management, Vol. 42, pp. 1056-1074. Von Solms, B. (2000), “Information security – the third wave?”, Computers and Security, Vol. 19 No. 7, pp. 615-620.
Von Solms, S.H. (2006), “Information security – the fourth wave”, Computers and Security, Vol. 25 No. 2006, pp. 165-168. Webb, W. (2010), “Being mobile”, Engineering and Technology, Vol. 5 No. 15, pp. 64-65.
Willis, A. (2005), “Corporate governance and management of information and records”, Records Management Journal, Vol. 15 No. 2, pp. 86-97.
Young, R. and Kamffmeyer, U. (2002), Availability and Preservation: Long-term Availability and Preservation of Digital Information (AIIM Industry White Paper on Records, Document and Enterprise Content Management for the Public Sector), AIIM International Europe: Stephens and George Print Group.
Amatuni L, Ottelin J, Steubing B, Mogollón JM. 2020. Does car sharing reduce greenhouse gas emissions? Assessing the modal shift and lifetime shift rebound effects from a life cycle perspective.
J. Clean. Prod. 266:21869 27. Bi H, Ye Z, Zhu H. 2022. Examining the nonlinear impacts of built environment on ridesourcing usage: focus on the critical urban sub-regions. J. Clean. Prod. 350:131314
Ward JW, Michalek JJ, Samaras C. 2021. Air pollution, greenhouse gas, and traffic externality benefits and costs of shifting private vehicle travel to ridesourcing services. Environ. Sci. Technol. 55(19):13174–85
Cohen A, Shaheen S. 2016. Planning for shared mobility. Rep. 583, Plan. Advis. Serv., Am. Plan. Assoc., Chicago 30. Wenzel T, Rames C, Kontou E, Henao A. 2019. Travel and energy implications of ridesourcing service in Austin, Texas. Transp. Res. D 70:18–34
Hulkkonen M, Mielonen T, Prisle NL. 2020. The atmospheric impacts of initiatives advancing shifts towards low-emission mobility: a scoping review. Sci. Total Environ. 713:136133
Moreau H, de Jamblinne de Meux L, Zeller V, D’Ans P, Ruwet C, Achten WMJ. 2020. Dockless e-scooter: a green solution for mobility? Comparative case study between dockless e-scooters, displaced transport, and personal e-scooters. Sustainability 12(5):1803
Severengiz S, Finke S, Schelte N, Forrister H. 2020. Assessing the environmental impact of novel mobility services using shared electric scooters as an example. Proc. Manuf. 43:80–87
McQueen M, MacArthur J, Cherry C. 2020. The e-bike potential: estimating regional e-bike impacts on greenhouse gas emissions. Transp. Res. D 87:102482
Hu S, Chen P, Lin H, Xie C, Chen X. 2018. Promoting carsharing attractiveness and efficiency: an exploratory analysis. Transp. Res. D 65:229–43
Meng L, Somenahalli S, Berry S. 2020. Policy implementation of multi-modal (shared) mobility: review of a supply–demand value proposition canvas. Transp. Rev. 40(5):670–84
Kapuku C, Kho SY, Kim DK, Cho SH. 2021. Assessing and predicting mobility improvement of integrating bike-sharing into multimodal public transport systems. Transp. Res. Rec. 2675(11):204–13
Fitch D, Mohiuddin H, Handy S. 2020. Investigating the influence of dockless electric bike-share on travel behavior, attitudes, health, and equity. Rep. UC-ITS-2019-03, Univ. Calif. Inst. Transp. Stud., Davis, CA 39. Qiu LY, He LY. 2018. Bike sharing and the economy, the environment, and health-related externalities. Sustainability 10(4):1145
Clockston RLM, Rojas-Rueda D. 2021. Health impacts of bike-sharing systems in the U.S. Environ. Res. 202:111709
Nijland H, van Meerkerk J. 2017. Mobility and environmental impacts of car sharing in the Netherlands. Environ. Innov. Soc. Transit. 23:84–91
Noland RB, Smart MJ, Guo Z. 2016. Bikeshare trip generation in New York City. Transp. Res. A 94:164– 81
Gehrke SR, Sadeghinasr B, Wang Q, Reardon TG. 2021. Patterns and predictors of dockless bikeshare trip generation and duration in Boston’s suburbs. Case Stud. Transp. Policy 9(1):756–66
Martinez LM, Viegas JM. 2017. Assessing the impacts of deploying a shared self-driving urban mobility system: an agent-based model applied to the city of Lisbon, Portugal.Int. J. Transp. Sci. Technol. 6(1):13–27
Bekka A, Louvet N, Adoue F. 2020. Impact of a ridesourcing service on car ownership and resulting effects on vehicle kilometers travelled in the Paris Region. Case Stud. Transp. Policy 8(3):1010–18
Tirachini A, Chaniotakis E, Abouelela M, Antoniou C. 2020. The sustainability of shared mobility: can a platform for shared rides reduce motorized traffic in cities? Transp. Res. C 117:102707
Yu B, Ma Y, Xue M, Tang B, Wang B, et al. 2017. Environmental benefits from ridesharing: a case of Beijing. Appl. Energy 191:141–52
Tirachini A, Gomez-Lobo A. 2019. Does ride-hailing increase or decrease vehicle kilometers traveled (VKT)? A simulation approach for Santiago de Chile. Int. J. Sustain. Transp. 14(3):187–204
Di X, Ban XJ. 2019. A unified equilibrium framework of new shared mobility systems. Transp. Res. B 129:50–78
Lee JB, Byun W, Lee SH, Do M. 2014. Correlation between optimal carsharing locations and carbon dioxide emissions in urban areas. Int. J. Environ. Sci. Technol. 11(8):2319–28
Cannoy, S. D., & Salam, A. F. (2010). A framework for health care information assurance policy and compliance. Communications of the ACM, 53(3), 126-131.
Chakraborty, R., Ramireddy, S., Raghu, T. S., & Rao, H. R. (2010). The information assurance practices of cloud computing vendors. IT professional, 12(4), 29-37.
Chen, Y., Ramamurthy, K., & Wen, K. W. (2012). Organizations’ information security policy compliance: Stick or carrot approach? Journal of Management Information Systems, 29(3), 157-188
Cooper, S., Nickell, C., Piotrowski, V., Oldfield, B., Abdallah, A., Bishop, M., & Pérez, L. C. (2010). An exploration of the current state of information assurance education. ACM SIGCSE Bulletin, 41(4), 109- 125.
Ezingeard, J. N., McFadzean, E., & Birchall, D. (2005). A model of information assurance benefits. Information Systems Management, 22(2), 20-29.
Hamill, J. T., Deckro, R. F., & Kloeber Jr, J. M. (2005). Evaluating information assurance strategies. Decision Support Systems, 39(3), 463- 484.
Höne, K., & Eloff, J. H. P. (2002). Information security policy—what do international information security standards say?. Computers & security, 21(5), 402-409.
Knapp, K. J., Marshall, T. E., Kelly Rainer, R., & Nelson Ford, F. (2006). Information security: management’s effect on culture and policy. Information Management & Computer Security, 14(1), 24-36.
Paul, P.K., Chatterjee, D., Bhuimali,A., Atarthy, A. (2016). Cyber Crime: An Important facet for promoting Digital Humanities—A Short Review in Saudi Journal of Humanities and Social Science, 1 (1), 13-16
Proia, A., Simshaw, D., & Hauser, K. (2015). Consumer cloud robotics and the fair information practice principles: Recognizing the challenges and opportunities ahead. Minn. JL Sci. & Tech., 16, 145.
Rees, J., Bandyopadhyay, S., & Spafford, E. H. (2003). A policy framework for information security. Communications of the ACM, 46(7), 101-106. 18. Reidenberg, J. R. (1994). Setting standards for fair information practice in the US private sector. Iowa L. Rev., 80, 497.
Schou, C. D., & Trimmer, K. J. (2004). Information assurance and security. Journal of Organizational and End User Computing, 16(3), 123-145.
Abate, K. H., Abebe, Z., Abil, O. Z., Afshin, A., Ahmed, M. B., Alahdab, F., et al. (2018). Global, regional, and national incidence, prevalence, and years lived with disability for 354 diseases and injuries for 195 countries and territories, 1990–2017: a systematic analysis for the Global Burden of Disease Study 2017. Lancet 392, 1789–1858. doi:10.1016/S0140-6736(18) 32279-7
Anglada-Martinez, H., Riu-Viladoms, G., Martin-Conde, M., Rovira-Illamola, M., Sotoca-Momblona, J. M., and Codina-Jane, C. (2015). Does mHealth increase adherence to medication? Results of a systematic review. Int. J. Clin. Pract. 69, 9–32. doi:10.1111/ijcp.12582
Bidmon, S., and Terlutter, R. (2015). Gender differences in searching for health information on the internet and the virtual patient-physician relationship in Germany: exploratory results on how men and women differ and why. J. Med. Internet Res. 17, e156. doi:10.2196/jmir.4127
Cheen, M. H. H., Tan, Y. Z., Oh, L. F., Wee, H. L., and Thumboo, J. (2019). Prevalence of and factors associated with primary medication non-adherence in chronic disease: a systematic review and meta-analysis. Int. J. Clin. Pract. (Esher) 73, e13350. doi:10.1111/ ijcp.13350
De Geest, S., Zullig, L. L., Dunbar-Jacob, J., Helmy, R., Hughes, D. A., Wilson, I. B., et al. (2018). ESPACOMP medication adherence reporting guideline (EMERGE). Ann. Intern Med. 169, 30–35. doi:10.7326/M18-0543
Eis, S., Solà-Morales, O., Duarte-Díaz, A., Vidal-Alaball, J., Perestelo-Pérez, L., Robles, N., et al. (2022). Mobile applications in mood disorders and mental health: systematic search in apple app store and google play store and review of the literature. Int. J. Environ. Res. Public Health 19, 2186. doi:10.3390/ijerph19042186
Foley, L., Larkin, J., Lombard-Vance, R., Murphy, A. W., Hynes, L., Galvin, E., et al. (2021). Prevalence and predictors of medication non-adherence among people living with multimorbidity: a systematic review and meta-analysis. BMJ open 11, e044987. doi:10.1136/bmjopen-2020-044987
Gast, A., and Mathes, T. (2019). Medication adherence influencing factors - an (updated) overview of systematic reviews. Syst. Rev. 8, 112. doi:10.1186/s13643-019- 1014-8 Glide (2023).
Glide. Available at: https://www.glideapps.com/(Accessed January 26, 2024). Hamine, S., Gerth-Guyette, E., Faulx, D., Green, B. B., and Ginsburg, A. S. (2015). Impact of mHealth chronic disease management on treatment adherence and patient outcomes: a systematic review. J. Med. Internet Res. 17, e52. doi:10.2196/jmir.3951
Horne, R., Cooper, V., Wileman, V., and Chan, A. (2019). Supporting adherence to medicines for long-term conditions: a perceptions and practicalities approach based on an extended common-sense model. Eur. Psychol. 24, 82–96. doi:10.1027/1016-9040/a000353
Downloads
ARTICLE Published HISTORY
Issue
Section
License
Copyright (c) 2024 Nahid Neoaz, Mohammad Hasan Amin

This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.