An exploration of wireless computing risks: Development of a risk taxonomy

Wireless computing, as a way of providing mobile services, has been growing steadily during the past few years. While wireless communications offer organizations and users many benefits such as portability, flexibility, increased productivity, and lower installation costs; on the other hand, risks inherent and exacerbated by wireless connectivity are widely reported, wherein networks are open to intruders who may cause unwanted consequences to an organization's information resources. Hence, understanding these risks will help protect against unforeseen threats, delays and costs. This paper aims at the development of a taxonomy for wireless computing risks. Six levels are identified including risks associated with the users, mobile devices, wireless networks, wireless applications, the Internet and the corporate gateway. The findings show that there is a need for systematic studies on wireless risk assessment and management. The implications of these findings for both researchers and practitioners are discussed.

[1]  Marko Suoknuuti,et al.  Introduction to Mobile Internet Technical Architecture , 2002, Wirel. Pers. Commun..

[2]  Upkar Varshney,et al.  Mobile Commerce: Framework, Applications and Networking Support , 2002, Mob. Networks Appl..

[3]  Robert C. Nickerson,et al.  Issues in Mobile E-Commerce , 2002, Commun. Assoc. Inf. Syst..

[4]  Troy J. Strader,et al.  Where in the World on the Web Does Location Matter? A Framework for Location Based Services in M-Commerce , 2001 .

[5]  Dongsong Zhang,et al.  Delivery of Personalized and Adaptive Content to Mobile Devices: A Framework and Enabling Technology , 2003, Commun. Assoc. Inf. Syst..

[6]  Muhammed A. Badamas Mobile computer systems - security considerations , 2001, Inf. Manag. Comput. Secur..

[7]  Elsabé Cloete,et al.  Classification of malicious host threats in mobile agent computing , 2002 .

[8]  Diomidis Spinellis,et al.  Security architectures for network clients , 2003, Inf. Manag. Comput. Secur..

[9]  Gordon A. Manson,et al.  Networks security measures using neuro-fuzzy agents , 2003, Inf. Manag. Comput. Secur..

[10]  Sudhir S. Dixit Wireless IP and Its Challenges for the Heterogeneous Environment , 2002, Wirel. Pers. Commun..

[11]  Upkar Varshney Mobile and Wireless Information Systems: Applications, Networks, and Research Problems , 2003, Commun. Assoc. Inf. Syst..

[12]  Asuman Dogac,et al.  Issues in Mobile Electronic Commerce , 2002, J. Database Manag..

[13]  Robert Boncella Wireless Security: An Overview , 2002, Commun. Assoc. Inf. Syst..

[14]  Imran Bashir,et al.  Securing network software applications: introduction , 2001, CACM.

[15]  Sridhar P. Nerur,et al.  A framework for analyzing e-commerce security , 2002, Inf. Manag. Comput. Secur..

[16]  Hideki Imai,et al.  Security in Wireless Communication , 2002, Wirel. Pers. Commun..

[17]  Ravi Sankar,et al.  Demystifying Wireless Technologies: Navigating Through The Wireless Technology Maze , 2003, Commun. Assoc. Inf. Syst..

[18]  Partha Dasgupta,et al.  Secure wireless gateway , 2002, WiSE '02.

[19]  Marc Engels Technology Challenges in the Development of Wireless Personal Area Networks , 2002, Wirel. Pers. Commun..

[20]  Kingpin Kingpin,et al.  Security Analysis of the Palm Operating System and its Weaknesses Against Malicious Code Threats , 2001, USENIX Security Symposium.

[21]  Upkar Varshney,et al.  Supporting Mobile Commerce Applications Using Dependable Wireless Networks , 2002, Mob. Networks Appl..

[22]  Upkar Varshney,et al.  Mobile and Wireless Networks , 2000 .

[23]  Robert C. Nickerson,et al.  Wireless/Mobile E-Commerce: Technologies, Applications, and Issues , 2001 .