The influence of user mobility in mobile viruspropagation: An enterprise mobile securityperspective

In this paper, the authors review the usage of mobile devices in the enterprise and also the major impact from the infected mobile devices.Then the authors highlight the virus threat to enterprise mobile security and how critical the problems are.The authors then discuss the mobile virus infection dynamics which are the Bluetooth infections, mobile emails infections and mobile internet infections which are the threats to the enterprise mobile security. Then the authors discuss on the influences of user mobility issue in spreading mobile viruses before concluded this article.

[1]  A. B. Ruighaver,et al.  Organisational security culture: Extending the end-user perspective , 2007, Comput. Secur..

[2]  Susan Greener,et al.  Business Research Methods , 2008 .

[3]  S. Viveros The economic impact of malicious code in wireless mobile networks , 2003 .

[4]  Fred D. Davis,et al.  User Acceptance of Computer Technology: A Comparison of Two Theoretical Models , 1989 .

[5]  Dong Li,et al.  An Epidemic Model of Mobile Phone Virus , 2006, 2006 First International Symposium on Pervasive Computing and Applications.

[6]  Christopher Brian Shirey Modeling the Spread and Prevention of Malicious Mobile Code Via Simulation CS-2004-15 , 2004 .

[7]  Shane Coursen Mobile Malware: The future of mobile malware , 2007 .

[8]  Michalis Faloutsos,et al.  Overcoming the challenge of security in a mobile environment , 2006, 2006 IEEE International Performance Computing and Communications Conference.

[9]  Kathleen M. Eisenhardt,et al.  Developing Theory Through Simulation Methods , 2006 .

[10]  Andreas Terzis,et al.  On Using Mobility to Propagate Malware , 2007, 2007 5th International Symposium on Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks and Workshops.

[11]  Brian D. Noble,et al.  Analytical Models for Epidemics in Mobile Networks , 2007 .

[12]  Shiva Azadegan,et al.  The Benefits of a Notification Process in Addressing the Worsening Computer Virus Problem: Results of a Survey and a Simulation Model , 2002, Comput. Secur..

[13]  Kang G. Shin,et al.  On Mobile Viruses Exploiting Messaging and Bluetooth Services , 2006, 2006 Securecomm and Workshops.

[14]  Mikko Hypponen,et al.  Malware goes mobile. , 2006, Scientific American.

[15]  Paul C. van Oorschot,et al.  On instant messaging worms, analysis and countermeasures , 2005, WORM '05.

[16]  Averill M. Law,et al.  Simulation Modeling & Analysis , 1991 .

[17]  Geoffrey M. Voelker,et al.  Can you infect me now?: malware propagation in mobile phone networks , 2007, WORM '07.

[18]  Brian D. Noble,et al.  Modeling epidemic spreading in mobile environments , 2005, WiSe '05.

[19]  Anat Hovav,et al.  Deterring internal information systems misuse , 2007, CACM.

[20]  Terrence August,et al.  Network Software Security and User Incentives , 2006, Manag. Sci..

[21]  Balasubramanian Raman,et al.  Mobile Worms and Viruses , 2014 .

[22]  Kathleen M. Carley,et al.  Simulation modeling in organizational and management research , 2007 .

[23]  Giovanni Vigna,et al.  Using Labeling to Prevent Cross-Service Attacks Against Smart Phones , 2006, DIMVA.

[24]  Krishna P. Gummadi,et al.  Exploiting Social Interactions in Mobile Systems , 2007, UbiComp.

[25]  Maziar Nekovee,et al.  Worm epidemics in wireless ad hoc networks , 2007, ArXiv.

[26]  Gordon B. Davis,et al.  An Investigation of Media Selection Among Directors and Managers: From "Self" to "Other" Orientation , 1998, MIS Q..

[27]  Eirik Albrechtsen,et al.  A qualitative study of users' view on information security , 2007, Comput. Secur..

[28]  Shuang Xu,et al.  Moderating Effects of Task Type on Wireless Technology Acceptance , 2005, J. Manag. Inf. Syst..

[29]  Helen J. Wang,et al.  Smartphone attacks and defenses , 2004 .

[30]  P. Reiher,et al.  Mobile contagion: simulation of infection & defense , 2005, Workshop on Principles of Advanced and Distributed Simulation (PADS'05).

[31]  William H. Sanders,et al.  Quantifying the Effectiveness of Mobile Phone Virus Response Mechanisms , 2007, 37th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN'07).

[32]  Tom Martin,et al.  Mobile phones as computing devices: the viruses are coming! , 2004, IEEE Pervasive Computing.

[33]  Siu-cheung Chan,et al.  Understanding Internet Banking Adoption and Use Behavior: A Hong Kong Perspective , 2004, J. Glob. Inf. Manag..

[34]  Neal Leavitt,et al.  Mobile phones: the next frontier for hackers? , 2005, Computer.

[35]  Chao-Min Chiu,et al.  Predicting electronic service continuance with a decomposed theory of planned behaviour , 2004, Behav. Inf. Technol..

[36]  Stefano Zanero,et al.  Studying Bluetooth Malware Propagation: The BlueBag Project , 2007, IEEE Security & Privacy.

[37]  Jeffrey M. Stanton,et al.  Analysis of end user security behaviors , 2005, Comput. Secur..